© Springer-Verlag GmbH Germany 2017
David L. Olson and Desheng Dash WuEnterprise Risk Management ModelsSpringer Texts in Business and Economics10.1007/978-3-662-53785-5_12

12. Enterprise Risk Management in Projects

David L. Olson and Desheng Dash Wu2, 3
(1)
Department of Management, University of Nebraska, Lincoln, Nebraska, USA
(2)
Stockholm Business School, Stockholm University, Stockholm, Sweden
(3)
Economics and Management School, University of Chinese Academy of Sciences, Beijing, China
 
Project management inherently involves high levels of risk, because projects by definition are being done for the first time. There are a number of classical project domain types, each with their own characteristics. For instance, construction projects focus on inanimate objects, such as materials that are transformed into some purposeful object. There are people involved, although as time passes, more and more work is done by machinery, with diminishing human control. Thus construction projects are among the more predictable project domains. Government projects often involve construction, but extend beyond that to processes, such as the generation of nuclear material, or more recently, the processing of nuclear wastes. Government projects involve high levels of bureaucracy, and the only aspect increasing predictability is that overlapping bureaucratic involvement of many agencies almost ensures long time frames with high levels of change. There is a very wide spectrum of governmental projects. They also should include civil works, which drive most construction projects. A third project domain is information system project management, focusing on the development of software tools to do whatever humans want. This field, like construction and governmental projects, has been widely studied. It is found to involve higher levels of uncertainty than construction projects, because software programming is a precise activity, and getting a computer code to work without bugs is a precise activity.
Seyedhoseini et al. 1 reviewed risk management processes within projects, using the contexts of general project management, civil engineering, software engineering, and public application. Those authors looked at sixteen risk management processes published over the period 1990–2005, spread fairly evenly over their four context areas, identifying methodologies. These contexts all involve basic project management, but we argue that each context is quite different. Project management in civil engineering is usually easier to manage, as the uncertain elements involve natural science (geology, weather). However, there are many different types of risk involved in any project, to include political aspects 2 and financial aspects. 3 While these sources provide more than enough uncertainty for project managers, there is a much more difficult task facing software engineering project managers. 4 We argue that this is because people are more fundamental to the software engineering production process, in the form of developing systems, programming them, and testing them, each activity involving high degrees of uncertainty. 5 Public application projects are also unique unto themselves, with high levels of bureaucratic process that take very long periods of time as the wheels of bureaucracy grind slowly and thoroughly. Slowly enough that political support often shifts before a project is completed, and thoroughly enough that opposition of the “not-in-my-backyard” is almost inevitably uncovered prior to project completion.

Project Management Risk

The Project Management Institute views risk as general to projects, and through the Project Management Body of Knowledge (PMBOK) 6 , which develops standards, policies and guidelines for project management. It focuses on tools and techniques related to project management skills and capabilities. Project management responsibilities include achieving cost, schedule performance objectives. Risk management is a major element of PMBOK, with major categories of:
  • planning,
  • risk identification,
  • quantitative risk analysis,
  • quantitative risk analysis,
  • risk response planning, and
  • risk monitoring and control.
The Project Risk Analysis and Management (PRAM) Guide in the United Kingdom is very similar in approach, 7 and fits the description of a typical risk management program from other sources. Each of these categories applies to all projects to some degree, although the level of uncertainty can make variants of tools applied appropriate. A number of recent papers have proposed risk assessment methodologies in construction, based on an iterative process of risk identification, risk analysis and evaluation, risk response development, and administration. 8 The key is to keep systematic records over time to record risk experiences, with systematic updating. 9

Risk Management Planning

As with any process, inputs need to be gathered to organize development of a cohesive plan. Things such as the project purpose and stakeholders need to be identified, followed by identification of tasks to be accomplished. This applies to every kind of project. These tasks are cohesive activities, usually accomplished by a specific individual or group, and for each task estimation of duration and resources required, as well as immediate predecessor activities is needed. This is the input needed for critical path analysis, to be demonstrated in this chapter. That quantitative approach deals with risk in the form of probability distributions for durations (demonstrated in this chapter through simulation).
But there are other risk aspects that need to be considered. It is important to consider the organization’s attitude toward risk, and qualitatively identify things that can go wrong. Risk attitude depends upon stakeholders. Identification of what might go wrong and stakeholder preference for dealing with them can affect project management team roles and responsibilities.
Risk management planning concludes with a risk management plan. This plan should define methodologies for dealing with project risks. Such methodologies can include training internal staff, outsourcing activities that other organizations are better equipped to deal with, or insurance in various forms. Ultimately, every organization has to decide which risks they are competent to manage internally (core competencies), and which risks they should offload (at some expected cost).

Risk Identification

Once the risk management plan is developed, it can naturally lead to the next step, risk identification. The process of risk identification identifies major potential sources of risk for the specific project. The risk management plan identifies tasks with their risks, as well as project team roles and responsibilities. Historical experience should provide guides (usually implemented in the form of checklists) to things that can go wrong, as well as the organization’s ability to cope with them.
Specific types of risk can be viewed as arising in various ways. A classical view is the triumvirate of quality, time, and budget. Software projects are often said to allow any two of the three—you can get code functioning as intended on time, but it usually involves more cost than expected; you can get functional code within budget as long as you are patient; you can get code on time and within budget as long as you don’t expect it to work as designed. This software engineering project view often generalizes to other projects, but with some different tendencies. In construction, there is less duration variance, although unexpected delays from geology or the weather commonly create challenges for project managers. If weather delays are encountered, the tradeoff is usually whether to wait for better weather, or to pay more overtime or extra resources. If geological elements are creating difficulties, more time and money is usually required. The functionality of the project is usually not degraded. Governmental projects may involve emergency response, where time is not something that can be sacrificed. The tradeoff is between quality of response and cost. Usually emergency response teams do the best they can within available resources, and public outcry almost always criticizes the insufficiency of the effort.
There are a number of techniques that can be used to identify risks. Some qualitative approaches include interviews of experts or stakeholders, supplemented by techniques such as brainstorming, the nominal group technique, the Delphi method, or SWOT analysis (strengths, weaknesses, opportunities, and threats). Each of these methods are relatively easy to implement, and the quality of output depends on the participation of a diverse group of stakeholders. Historical data can also be used if the organization has experience with past projects similar to the current activity. This works well if past experiences are well-documented and retrieved efficiently.
The outputs from risk identification is a more complete list of risks expected in the project, as well as possible responses along with their expected costs. This results in a set of responses that can be reviewed as events develop, allowing project managers to more intelligently select appropriate responses. While success can never be guaranteed, it is expected that organizational project performance will improve.

Qualitative Risk Analysis

After a more precise estimation of project element risk is identified, the relative probabilities and risk consequences can be addressed. Initial estimations usually require reliance on subjective expert opinion. Historical records enable more precision, but one project element of importance is that projects by definition almost always involve new situations and activities. Experts have to judge the applicability of historical records to current challenges.
A qualitative risk analysis can be used to rank overall risks to the organization. A priority system can be used to identify those risks that are most critical, and thus require the greatest degree of managerial attention. In critical path analysis terms, critical path activities would seem to call for the greatest managerial attention. Behaviorally, humans tend to work hardest when the boss is watching. However, the fallacy of this approach is that other activities that are not watched may become critical too if they delay too far beyond their expected duration.
Qualitative risk analysis can provide a valuable screening to cancel projects that are just too risky for an organization. It also can affect project organization, with more skilled personnel assigned to tasks that call for more careful management. It also can be a guide to look for means to offload risk, either through subcontracting, outsourcing, or insurance.

Quantitative Risk Analysis

We will present more formal quantitative tools in the following sections. Quantitative analysis requires data. The critical path method calls for a specific duration estimate, which we will demonstrate. Simulation is less restrictive, calling for probability distributions. But this is often more difficult for humans to estimate, and usually only works when there is some sort of historical data available with which to estimate probability distributions.
Quantitative risk analysis, as will be demonstrated, can be used to estimate probabilities of project completion times, as well as other items of interest that can be included in what is essentially a spreadsheet model. These examples focus on time. It is also possible to include cost probabilities.

Risk Response Planning

Once risk analysis (qualitative, quantitative, or both) is conducted, project managers are hopefully in a more educated position to make plans and decisions to respond to events. Risk response planning is this process of developing options and reducing threats if possible. The severity of risks as well as cost, time, and impact on project output (quality) should be considered.
A broad categorization of risk treatment strategies include:
  • Risk avoidance (adopting alternatives that do not include the risk at issue)
  • Risk probability reduction (act to reduce the probability of adverse event occurance)
  • Risk impact reduction (act to reduce the severity of the risk)
  • Risk transfer (outsourcing)
  • Risk transfer (insurance)
  • Add buffers to the project schedule
The process of project risk management is for project decision makers to tradeoff the costs of each risk avoidance strategy in light of organizational goals. The key to success is for organizations to adopt those risks internally where they have competency in dealing with the risk at issue, and to pay some price to offload those risks outside of their core competencies.
The output of risk response planning can be a prioritized list of risks with potential responses. It also can include assignment of specific individual responsibilities for monitoring events and triggering planned responses.

Risk Monitoring and Control

This category of activity is implementation of all prior categories. Accounting is the first line of measurement of cost activity. Operational project management personnel also need to keep on top of time and quality performance as the project proceeds. When adverse events are identified, corrective action (either adoption of contingency plans, or development of alternative actions) need to be applied. In the long run, it is important to document projects, both in terms of specific time and cost experiences, as well a qualitative case data to enable the organization to do better on future projects.

Project Management Tools

A variety of risk management implementation tools have been applied. We referred to PMBOK earlier, which is intended to provide a process model to generic risk management projects. There are other process models, to include the Software Engineering Institute’s capability maturity model (CMM). The five levels of the CMMI are shown in Table 12.1.
Table 12.1
Capability maturity model for software engineering processes
Level
Features
Key processes
1 Initial
Chaos
Survival
2 Repeatable
Individual control
Software configuration management
Software quality assurance
Software subcontract management
Software project tracking & oversight
Software project planning
Requirements management
3 Defined
Institutionalized process
Peer reviews
Intergroup coordination
Software product engineering
Integrated software management
Training program
Organization process definition
Organization process focus
4 Managed
Process measured
Quality management
Process measurement and analysis
5 Optimizing
Feedback for improvement
Process change management
Technology innovation
Defect prevention
Source: Olson (2004)
The CMM level 1 covers software engineering organizations that do nothing. The other four levels involve distinctly different process areas, leading to better control over software development. It should be noted that attaining each level involves an organizational cost in added bureaucracy, which requires a business decision on the part of each organization. However, there is a great deal of research that indicates that in the long run, software quality is improved dramatically by moving from any level to the next higher level, and that overall development cost and development time are improved. This is a clear example of risk management—paying the price of more formality to yield reduced risk in terms of product output. Other process risk management models in software engineering include Boehm’s spiral model, 10 which provides iterative risk analysis throughout the phases of the software development.
Bannerman 11 categorized software project risk management into the three areas of process models (reviewed above), analystical frameworks (based on some dimension such as risk source, the project life cycle, or model elements), and checklists. Checklists are often found as the means to implement risk management, with evidence of positive value. 12 Checklists can be (and have been) applied in any type of project. To work well, the project must repeat a domain, as each type of project faces its own list of specific risks. The value of a checklist of course improves with the depth of experience upon which it is based.

Simulation Models of Project Management Risk

We will focus on demonstrating quantitative tools to project risk management. We will demonstrate how simulation can be used to evaluate the time aspect of project management risk. The models are based on critical path, which can be modeled in Excel, enabling the use of distributions through Crystal Ball simulation. We begin with a basic software engineering project using a traditional waterfall model. Figure 12.1 gives a schematic of the activities and their precedence relationships.
A194906_2_En_12_Fig1_HTML.gif
Fig. 12.1
Network for software installation example
Table 12.2 gives the input information, along with distributions assumed for each activity. These distributions should be based on historical data if possible, subjective expert judgment if historical data is not available.
Table 12.2
Software installation input data
Activity
Duration
Distribution
Predecessors
A Requirements analysis
3 weeks
Normal (3,0.3)
None
B Programming
7 weeks
Lognormal (7,1)
A
C Hardware acquisition
3 weeks
Normal (3,0.5)
A
D User training
12 weeks
Constant
A
E Implementation
5 weeks
Exponential (5)
B,C
F Testing
1 week
Exponential (1)
E
Figure 12.2 gives the Microsoft Project output for this model.
A194906_2_En_12_Fig2_HTML.gif
Fig. 12.2
Microsoft Project model output
The Excel model based on critical path analysis is given in Table 12.3.
Table 12.3
Crystal Ball model of software installation project. ©Oracle. Used with permission
A194906_2_En_12_Tab3_HTML.gif
Color shades emphasize key points in the prose
Some modeling adjustments were needed. For all distributions, durations in weeks were rounded up in the Duration column of Table 12.1. For normal distributions, a minimum of 0 was imposed. Note that the lognormal distribution in Crystal Ball requires a shape parameter (constrained to be less than the mean). Here the shape parameter is 5, the mean 7, and standard deviation 1. Also note that the exponential distribution’s mean is inverted, so for E Implementation, 5 weeks becomes 0.2. Figure 12.3 gives the simulation results (based on 1000 replications).
A194906_2_En_12_Fig3_HTML.gif
Fig. 12.3
Simulated software installation completion time. ©Oracle. Used with permission
The average for this data was 18.62 weeks, compared to the critical path analysis 16 weeks (which was based on assumed duration certainty). There was a minimum of 15 weeks (0.236 probability) and a maximum of 58 weeks. There was a 0.490 probability of exceeding 16 weeks.
There are other simulation systems used for project management. Process simulation allows contingent sequences of activities, as used in the Project Assessment by Simulation Technique (PAST). 13

Governmental Project

We assume a very long term project to dispose of nuclear waste, with activities, durations and predecessor relationships given in Table 12.4.
Table 12.4
Nuclear waste disposal project
Activity
Duration
Distribution
Predecessors
A Decision staffed
60 weeks
 
None
B EIS
70 weeks
 
A
C Licensing study
60 weeks
 
A
D NRC
30 weeks
 
A
E Conceptual design
36 weeks
 
A
F Regulation compliance
70 weeks
 
E
G Site selection
40 weeks
 
A
H Construction permit
0
constant
D,F,G
I Construction
100 weeks
 
H
J Procurement
70 weeks
 
F SS, I SS + 5weeks
K Install equipment
72 weeks
 
I
L Operating permit
0
 
K
M Cold start test
16 weeks
 
K
N Readiness test
36 weeks
 
M
O Hot test
16 weeks
 
N
P Begin conversion
0
 
L,O
Table 12.5 gives the Excel (Crystal Ball) model for this scheduling project. Normal distributions were used for project manager controllable activities, and lognormal distributions used for activities beyond project manager control Figs. 12.4, 12.5, and 12.6.
Table 12.5
Model for governmental project
 
A
B
C
D
E
1
Activity
Duration
 
Start
End
2
A Decision staffed
=INT(CB.Normal(60,5))
None
0
=D2 + B2
3
B EIS
=INT(CB.Lognormal(70,10))
A
=E2
=D3 + B3
4
C Licensing study
=INT(CB.Lognormal(60,10))
A
=E2
=D4 + B4
5
D NRC
=INT(CB.Lognormal(30,5))
A
=E2
=D5 + B5
6
E Conceptual design
=INT(CB.Normal(36,6))
A
=E2
=D6 + B6
7
F Regulation compliance
=INT(CB.Normal(70,10))
E
=E6
=D7 + B7
8
G Site selection
=INT(CB.Normal(40,5))
A
=E2
=D8 + B8
9
H Construction permit
=0
D,F,G
=MAX(D5,D7,D8)
=D9 + B9
10
I Construction
=INT(CB.Lognormal(100,10))
H
=D9
=D10 + B10
11
J Procurement
=INT(CB.Normal(70,5))
F SS, I SS + 5weeks
=MAX(D7,D10 + 5)
=D11 + B11
12
K Install equipment
=INT(CB.Normal(72,5))
I
=E10
=D12 + B12
13
L Operating permit
=0
K
=E12
=D13 + B13
14
M Cold start test
=INT(CB.Lognormal(16,6))
K
=E12
=D14 + B14
15
N Readiness test
=INT(CB.Lognormal(36,6))
M
=E14
=D15 + B15
16
O Hot test
=INT(CB.Lognormal(16,6))
N
=E15
=D16 + B16
A194906_2_En_12_Fig4_HTML.gif
Fig. 12.4
Network for governmental project
A194906_2_En_12_Fig5_HTML.gif
Fig. 12.5
Gantt chart for governmental project
A194906_2_En_12_Fig6_HTML.gif
Fig. 12.6
Histogram of governmental project completion time in months. ©Oracle. Used with permission
Minimum completion time based on 1000 replications was 280 months, and maximum 391 months. The mean was 332 months, with a standard deviation of 16 months. The distribution of completion times appears close to normal. Table 12.6 gives the probabilities of completion in 10-month intervals:
Table 12.6
Probability of Completion
Months
Probability
310
0.912
320
0.759
330
0.550
340
0.329
350
0.153
360
0.057
370
0.011
380
0.005

Conclusions

We have argued that there are a number of distinct project types, to include more predictable projects such as those encountered in civil engineering, highly unpredictable projects such as encountered in software engineering, and projects involving massive undertakings or emergency response typically faced by government bureaucracies. There are many other types of projects, of course. For instance, we did not discuss military procurement projects, which are extremely important unto themselves. This type of project is a specific kind of governmental project, but here we focused more on emergency management (which military operations is closer to).
We also presented a framework for project risk analysis, based on PMBOK. This included a number of qualitative elements which can be extremely valuable in project management. But they are less concrete, and therefore we found it easier to focus on quantitative tools. We want to point out that qualitative tools are also very important.
The qualitative tools presented start with the deterministic critical path method, which assumes no risk in duration nor in resource availability. We present simulation as a very useful means to quantify project duration risk. Simulation allows any kind of assumption, and could also incorporate some aspects of resource availability risk through spreadsheet models.
While the ability to assess the relative probability of risk is valuable, the element of subjectivity should always be kept in mind. A simulation model can assign a probability of any degree of precision imaginable, but such probabilities are only as accurate as the model inputs. These probabilities should be viewed as subject to a great deal of error. However, they provide project managers with initial tools for identification of the degree of risk associated with various project tasks.

Notes

  1. 1.
    Seyedhoseini, S.M., Noori S. and AliHatefi, M. 2008, Chapter 6: Two Polar Concept of Project Risk Management, in D. L. Olson and D. Wu, eds., New Frontiers in Enterprise Risk Management. Berlin: Springer, 77–106.
     
  2. 2.
    Skorupka, D. (2008). Identification and initial risk assessment of construction projects in Poland, Journal of Management in Engineering 24:3, 120–127.
     
  3. 3.
    Kong, D., Tiong, R.L.K., Cheah, C.Y.J., Permana, A. and Ehrlich, M. (2008). Assessment of credit risk in project finance, Journal of Construction Engineering and Management 134:11, 876–884.
     
  4. 4.
    Chua, A.Y.K. (2009). Exhuming IT projects from their graves: An analysis of eight failure cases and their risk factors, Journal of Computer Information Systems 49:3, 31–39.
     
  5. 5.
    Olson, D.L. (2004), Introduction to Information Systems Project Management, 2nd ed. NY: McGraw-Hill/Irwin.
     
  6. 6.
    Project Management Institute (2013), A Guide to the Project Management Body of Knowledge, 5th ed.Newtown Square, PA: Project Management Institute.
     
  7. 7.
    Chapman, C. (2006). International Journal of Project Management 24(4), 303–313.
     
  8. 8.
    Schatteman, D., Herroelen, W., Van de Vonder, S. and Boone, A. (2008). Methodology for integrated risk management and proactive scheduling of construction projects, Journal of Construction Engineering and Management 134:11, 885–893.
     
  9. 9.
    Choi, H.-H. and Mahadevan, S. (2008). Construction project risk assessment using existing database and project-specific information, Journal of Construction Engineering and Management 134:11, 894–903.
     
  10. 10.
    Boehm, B. (1988). Software Risk Management. Washington, DC: IEEE Computer Society Press.
     
  11. 11.
    Bannerman, P.L. (2008). Risk and risk management in software projects: A reassessment, The Journal of Systems and Software 81:12, 2118–2133.
     
  12. 12.
    Keil, M., Li, L., Mathiassen, L. and Zheng, G. (2008). The influence of checklists and roles on software practitioner risk perception and decision-making, The Journal of Systems and Software 81:6, 908–919.
     
  13. 13.
    Cates, G.R. and Mollaghasemi, M. (2007). The Project Assessment by Simulation Technique, Engineering Management Journal 19:4, 3–10.