4.planning Projects
4.planning Projects
4.planning Projects
Planning Projects:
===========================================================================
1
Project Management Module-4
Fig. 4.1
Step 4
After crashing an activity, find out which is the critical path with the changed conditions?
Sometimes, a reduction in the time of an activity in the critical path may cause a non-critical path
to become critical. If the critical path with which we started is still the longest path, then go to
Step 3. Otherwise, determine the new critical path and then go to Step 3.
Problem 1
A project has activities with the following normal and crash times and cost:
2
Project Management Module-4
F D 5 4 16,000 16,500
G E 7 4 66,000 72,000
H G 4 3 2,000 5,000
Determine a crashing scheme for the above project so that the total project time is reduced by 3
weeks.
Solution
We have the following network diagram for the given project with normal costs:
A B D F
1 2 5 4 6 6 5 8
4
A C E G H
1 2 3 5 7 8
4 4 6 7 4
Therefore, Path II is the critical path and the critical activities are A, C, E, G and H. The non-
critical activities are B, D and F.
Given that the normal time of activity A is 4 weeks while its crash time is 3 weeks. Hence the
time of this activity can be reduced by one week if the management is prepared to spend an
additional amount. However, the time cannot be reduced by more than one week even if the
management may be prepared to spend more money. The normal cost of this activity is Rs. 8,000
whereas the crash cost is Rs. 9,000. From this, we see that crashing of activity A by one week
will cost the management an extra amount of Rs. 1,000. In a similar fashion, we can work out the
crash cost per unit time for the other activities also. The results are provided in the following
table.
3
Project Management Module-4
A non-critical activity can be delayed without delaying the execution of the whole project. But, if
a critical activity is delayed, it will delay the whole project. Because of this reason, we have to
select a critical activity for crashing. Here we have to choose one of the activities A, C, E, G and
H . The crash cost per unit time works out as follows:
Rs. 1,000 for A; Rs. 1,000 for C; Rs. 1,000 for E; Rs. 6,000 for G; Rs. 3,000 for H.
The maximum among them is Rs. 1,000. So we have to choose an activity with Rs.1,000 as the
crash cost per unit time. However, there is a tie among A, C and E. The tie can be resolved
arbitrarily. Let us select A for crashing. We reduce the time of A by one week by spending an
extra amount of Rs. 1,000. After this step, we have the following network with the revised times
for the activities:
4
Project Management Module-4
5
Project Management Module-4
The activities for successful project completion have been identified, their durations determined,
and their sequence defined; all that remains is knowing exactly when they will occur, the specific
time associated with their sequence. Essentially, the PDM puts the pieces of the plan together,
preparing them for the scheduling process. Figure 4 shows an example precedence diagram
where the basic job logic is applied in order to sequence the activities. The figure shows a very
simple sub-network with very few activities, very straightforward logic, and no smart
relationships. Nonetheless, a well-modeled network diagram for even the most complicated
project is absolutely necessary. The scheduling of the model is only as effective as the model
represents reality. Accordingly, in order that scheduling has any relevance, planning must define
inputs that closely model the actual construction of the project.
6
Project Management Module-4
activities in the network will start as soon as possible; each activity will start just as soon as the
last of its predecessors finishes. Furthermore, the activities will finish as soon as possible;
thereafter, succeeding activities will start immediately. The process starts with the first activity
and time zero. The early finish (EF) is found by simply adding the duration of the activity to its
earliest start. The early start (ES) for an activity is the earliest an activity can start; therefore, the
early start is the same as the early finish of a preceding activity. However, if more than one
activity precedes an activity, the early start comes from the latest finish of all preceding
activities. Figure 5 illustrates the ease of the forward pass on a network without smart
relationships.
7
Project Management Module-4
If multiple calendars are employed, forward pass calculations follow this rule: if the ES or EF of
the successor calculated directly from the predecessor is a non-working day, the early time
should be postponed to the next available working date in order to satisfy the minimum time
interval. Clearly, multiple calendars add another layer of complexity, making even the simple
forward pass time consuming and very complicated.
8
Project Management Module-4
Resource Loading
Resource loading describes the amounts of individual resources an existing schedule requires
during specific time periods. Therefore, it is irrelevant whether we are considering a single work
unit or several projects; the loads (requirements) of each resource type are simply listed as a
function of time period. Resource loading gives a general understanding of the demands a project
or set of projects will make on a firm’s resources. It is an excellent guide for early, rough project
planning. Obviously, it is also a first step in attempting to reduce excessive demands on certain
resources, regardless of the specific technique used to reduce the demands. Again, we caution the
PM to recognize that the use of resources on a project is often nonlinear. Much of the project
management software does not recognize this fact. If resources of a project are increased by X
percent, the output of the project usually does not increase by X percent, and the time required
for the project does not decrease by X percent. The output and time may not change at all, or may
change by an amount seemingly not related to X. An increase of 20 percent in the number of
notes played does not necessarily improve the quality of the music. Any time the resource base
of a project is altered from standard practice, the risk that the project may not be successful is
changed, often increased. Given a WBS, deriving a resource-loading document is not difficult.
The part of the WBS lists the personnel resources needed for each activity. Utilizing data in the
WBS, MSP generated the resource usage profile or calendar. Each of the human resources used
in the project is listed, followed by the name of the activities in which the resource is used. The
total hours of work for each resource called for by the WBS are shown together with the amount
planned for each activity. The schedule for resource loading is derived and the loading is then
shown for each resource for each week (or day or month) of the project. It should be clear that if
the information in this calendar were entered into an Excel® spreadsheet along with estimates of
the variability of resource times, Crystal Ball® could be used to simulate the resource loading for
any or all of these resources. Because the project WBS is the source of information on activity
9
Project Management Module-4
precedence, durations, and resources requirements, it is the primary input for both the project
schedule and its budget. The WBS links the schedule directly to specific demands for resources.
Thus, the AOA network technique can be modified to generate time-phased resource
requirements. A Gantt chart could be adapted, but the AOA diagram, particularly if modified to
slacks, will be helpful in the analysis used for resource leveling.
Let us illustrate with the AOA network is illustrated in Figure 4.10, and resource usage is
illustrated for two hypothetical resources, A and B, on the arcs. The expected activity time is
shown above the arc, and resource usage is shown in brackets just below the arc, with the use of
A shown first and B second—for example, [5,3] would mean that five units of A and three units
of B would be used on the activity represented by the arc. Figure 4.11 shows the “calendarized”
AOA diagram, similar to the familiar Gantt chart.
Resource demands can now be summed by time period across all activities. The loading diagram
for resource A is illustrated in Figure 4.12 and that for resource B in Figure 4.13. The loads are
erratic and vary substantially over the duration of the project.
Fig. 4.11. Modified AOA diagram showing activity slack and resource usage (from Figure
4.10)
Resource A, used in tasks a, b, and c, has a high initial demand that drops through the middle of
the project and then climbs again. Resource B, on the other hand, has low initial use but
increases as the project develops. The PM must be aware of the ebbs and flows of usage for each
input resource throughout the life of the project. It is the PM’s responsibility to ensure that the
required resources, in the required amounts, are available when and where they are needed. In
the next three sections, we will discuss how to meet this responsibility.
10
Project Management Module-4
Resource Leveling
Resource leveling, or smoothing, is a method for developing a schedule that attempts to
minimize the fluctuations in requirements for resources. This method levels the resources so that
they are applied as uniformly as possible without extending the project schedule beyond its
required completion time. It is a trial-and-error method in which the start of noncritical activities
(those with positive slack values) are delayed beyond their earliest start times (but not beyond
their latest start times) to maintain a uniform level of required resources. Activities can be
delayed only to the point where all their positive slack is used up, as any further delays would
cause the project to extend beyond the project required completion time. Resource-leveling
attempts to establish a schedule in which resource utilization is made as level as possible without
extending the project beyond its required completion time. To reiterate, construction project
success depends heavily on efficiently utilizing limited and costly resources—labor, materials,
and equipment. A resource-loaded schedule demonstrates the interdependencies between
activities and resources. Once resources are applied to an activity, the project resources should be
leveled (or smoothed) to improve work efficiency and minimize costs. Formally, resource
leveling minimizes the fluctuation in daily resource usage throughout the life of the project by
shifting non-critical activities within their available float. To smooth resources realistically, the
scheduler must employ resource constraints, because no contractor has unlimited resources. The
constraints placed on resources should reflect the most likely amount of labor, equipment, and
materials available to the contractor under normal conditions. The constraints supersede the
original project duration; meaning, the project duration is extended if the constraints cannot be
11
Project Management Module-4
met by using the available total float. Hence, these resource limitations may drive the schedule,
changing the critical path. Figures 4.14 and 4.15 illustrate how leveling resources may or may
not extend the project duration.
Fig. 4.14: Resource leveling without constraints (within original project duration)
Fig. 4.15: Resource leveling with constraints (project duration extended 2 days)
12
Project Management Module-4
Problem 2
Consider the following problem of project scheduling. Obtain a schedule which will minimize
the peak manpower requirement and smooth out period to period variation of manpower
requirement.
13
Project Management Module-4
From this figure, it is observed that the peak manpower requirement is 21 and it occurs from 0 to
6 weeks. The activities which are scheduled during the period are: (1-2), (1-3) and (1-4). The
activity 1-2 is critical activity. So it should not be disturbed. Between activities (1-3) and (1-4),
the activity (1-3) has high slack value of 6 weeks (whereas its only 4 weeks for (1-4)). Hence, it
can be started at the end of 6 weeks. The corresponding modification is shown by the following
histogram.
Problem 3
Cables By Us is bringing a new product on line to be manufactured in their current facility in
existing space. The owners have identified 11 activities and their precedence relationships.
Develop an AON for the project, Plot on Gantt chart and calculate the slack.
Activity Optimistic (to) Most Likely (tm) Pessimistic (tp) Estimated Time (te)
A 2 4 6 4
B 3 7 10 6.83
14
Project Management Module-4
C 2 3 5 3.17
D 4 7 9 6.83
E 12 16 20 16
F 2 5 8 5
G 2 2 2 2
H 2 3 4 3
I 2 3 5 3.17
J 2 4 6 4
K 2 2 2 2
15
Project Management Module-4
Gantt Chart Showing Each Activity Finished at the Earliest Possible Start Date
Gantt Chart Showing the Latest Possible Start Times if the Project Is to Be Completed in 44.83
Weeks
16
Project Management Module-4
17
Project Management Module-4
balancing methods. “Resource Loading/Leveling and Uncertainty,” for proof of the need for
capacity to exceed demand for projects.
3. The “Student Syndrome” This phrase is Goldratt’s term for his view that students often
delay starting school projects until the last possible moment. The same tendency is observed in
projects where project team members delay the start of their work. The problem with delaying
the start of a task is that obstacles are frequently not discovered until the work has been
underway for some time. Delaying the start of a task diminishes the opportunity to cope with
these unexpected obstacles and increases the risk of completing the work late.
4. Multitasking to reduce idle time Consider a situation where there are two projects, A and B,
each with three sequential activities and with you as the only resource required by both projects.
Each activity requires 10 days. In Figure 9.13 see two Gantt charts for sequencing the activities
in the two projects. In the first, switch from project A (dark) to project B (light) for each of the
three activities, that is, carry out Activity 1 for project A, then Activity 1 for project B, then
Activity 2 for A, and so forth. In the second sequence, complete project A before starting project
B. In both cases, the total time required will be 60 days. In the second, note that project A is
completed after 30 days and B after 60 days. In the first chart, however, Project A will be
finished after 50 days and B after 60 days. While the total time required is the same, project A
has been delayed for 20 days by the multitasking. Further, this ignores the startup time and loss
in efficiency that often accompanies switching back and forth between tasks.
5. Complexity of networks makes no difference Consider two different projects as seen in
Figure 9.14. Assume that each activity requires 10 days and is known with certainty. Clearly,
both projects are completed in 40 days though one is considerably more complex than the other.
But let’s get a bit more real. Assume that each activity is stochastic, with normally distributed
times. The mean time is 10 days, and the standard deviation is 3 days. If we simulate the projects
500 times, we get the mean project completion time of about 40 days and for the simulation of
the complex network, its mean completion time is about 46 days. Complexity, uncertainty and
merging paths all join to make trouble.
6. People need a reason to work hard Senior managers of our acquaintance have been known
to argue that project workers—and they include PMs in that category—“always” have enough
slack time in their activity duration estimates to make sure that they can complete the activities
on time and “without too much sweat.” Therefore, it makes some managerial sense to cut back
on the time allowances until they can serve as an incentive to the project team. It has, however,
long been known that for people with a high need for achievement, the maximum level of
motivation is associated with only moderate, not high, levels of risk of failure.
18
Project Management Module-4
7. Game playing This is possibly the most common cause of late projects. It is certainly a major
cause of frustration for anyone involved in a project. Senior managers, firm in the belief that
project workers add extra time and resources to activity time and budget estimates in order to
insure a safe and peaceful life on their portion of a project, routinely cut schedules and budgets.
Project workers, suspecting that senior management will cut schedules and budgets without
regard to any logic or reason, increase their schedules and budgets as much as they guess will be
allowed. Each assumes that the other is not to be trusted. The outcome is simple. Rather than
practice careful risk management, each blames the other for any lateness or budget overage. As
we noted in the “Aside” in Chapter 8, unbiased honesty in estimates on the part of both worker
and manager is mandatory for any reasonable chance of on-schedule performance of projects.
One of the tacit assumptions of probabilistic networks is that early and late activity completions
cancel out. This assumption might be sensible were it not for the matters listed in the previous
subsection. Assume two activities, A and B. A is a predecessor of B. If activity A is late, then
activity B will start late by whatever amount of lateness is bequeathed to it by A. Similarly, if in
spite of all the forces tending to thwart such things, activity A finishes early, B will start early.
The assumption, which is also a tacit assumption of both the analytical and simulation methods
of finding a path’s duration, is generally true for the first case, when A is late. But for the case
when A is early, the assumption is rarely true. Unfortunately, a finish by A in less than its
expected duration almost never translates to a start by B before its expected start time. With a
few exceptions, the fact that early finishes do not become early starts is ignored by most people
involved with projects. Goldratt writes about the phenomenon (1997, Chapter 13 and elsewhere),
and a few others have also briefly discussed the matter. There is a mild debate as to the reason
for this deplorable condition. Goldratt feels that project workers will avoid admitting that an
activity has been completed early out of fear that future time estimates will be cut. Others point
out that when the activity schedule is set; it is presumed that the activity will start immediately
after the most likely finish date of its (latest) predecessor. The reason is simple—its resources
will not be available until that date. There is also a logical explanation of why the start of a
successor is usually delayed until its predetermined expected start time. Some say that project
workers will not report finishes before the most likely duration. The logic of this position
depends on an inherent distrust between project workers and senior management. If an early
finish is reported, workers assume that the shorter-than normal activity duration will be the
expectation for similar activities in the future. Senior managers, the argument proceeds, do not
really understand the uncertainty faced by project workers. Senior management will assume that
19
Project Management Module-4
if an activity can be finished early once, it can be finished early again, or that they were correct
in their assumption that workers “pad” their time and resource estimates. The chance event of an
early finish is, thus, used to substantiate a shortened duration estimate in the future.
There is also a logical explanation of why a successor activity does not receive resources until its
predetermined expected start, which is, by definition, equal to the expected finish of the latest
predecessor activity. A stochastic network has little in common with an assembly line;
nonetheless, we find some managers attempting to delay the deployment of resources to a project
as long as possible. If we agree to start a project as soon as its predecessors are completed, we
must contemplate having the resources available and waiting well before the activity’s expected
start. Idle resources, however, are not acceptable to managers trained in a just-in-time view of the
world. Assembly lines are reasonably predictable; projects are not.
According to Goldratt, the behaviors and practices discussed above lead to the following chain of
events:
1. Assuming that activity times are known and that the paths are independent leads to
underestimating the actual amount of time needed to complete the project.
2. Because the time needed to complete the project is underestimated, project team members tend
to inflate their time estimates by some “safety” time.
3. Inflated time estimates lead to work filling available time, workers not reporting that a task has
been completed early, and the ever-present student syndrome.
4. An important caveat is that the safety time is only visible to the project workers and is often
misused.
5. Misused safety time results in missed deadlines and milestones.
6. Hidden safety time further complicates the PM’s task of prioritizing project activities.
7. The lack of clear priorities likely results in poor multitasking.
8. Task durations increase as a result of poor multitasking.
9. Uneven demand on resources—some overloaded and others underloaded—may also occur as
a result of poor multitasking.
10. In an effort to utilize all resources fully, more projects will be undertaken to make sure that
no resources are underutilized.
11. Adding more projects further increases poor multitasking.
According to Goldratt, this chain of events leads to a vicious cycle. Specifically, as work
continues to pile up, team members are pressured to do more poor multitasking. Increasing the
amount of poor multitasking, leads to longer activity times. Longer activity times lead to longer
project completion times, which ultimately lead to more projects in the waiting line. It might
have occurred to you that one way to reverse this cycle would be to add more resources.
According to Goldratt, however, the appropriate response is to reduce the number of projects
assigned to each person in an effort to reduce the amount of bad multitasking.
Incidentally, a simple way to measure the amount of bad multitasking is to calculate the
difference between the time required to do the work for a task and the elapsed time actually
required to complete the task.
Determining when to release projects into the system is the primary mechanism for ensuring that
the right amount of work is assigned to each person. If projects are started too early, they simply
add to the chaos and contribute to poor multitasking. On the other hand, if projects are started too
20
Project Management Module-4
late, key resources may go underutilized and projects will be inevitably delayed. Consistent with
his Theory of Constraints, Goldratt suggests that the key to resolving this trade-off is to schedule
the start of new projects based on the availability of bottleneck (scarce) resources.
While properly scheduling the start of new projects does much to address the problems
associated with poor multitasking, it does little to address the problem of setting unrealistic
project deadlines and the accompanying response of inflated time estimates. Relying on
elementary statistics, it can be easily shown that the amount of safety time needed to protect a
particular path is less than the sum of the safety times required to protect the individual activities
making up the path. The same approach is commonly used in inventory management where it
can be shown that less safety stock is needed at a central warehouse to provide a certain service
level than the amount of safety stock that would be required to provide this same service level if
carried at multiple distributed locations.
Based on this insight, Goldratt suggests reducing the amount of safety time workers add to
individual tasks and then adding some fraction of the safety time reduced back into the system as
safety buffer for the entire project, called the project buffer. The amount of time each task is
reduced depends on how much of a reduction is needed to get project team members to change
their behavior. For example, the allotted time for tasks should be reduced to the point that the
student syndrome is eliminated. Indeed, Goldratt suggests using activity durations where in fact
there is a high probability that the task will not be finished on time.
Another limitation associated with traditional approaches to project management is that the
dependency between resources and tasks is often ignored. More specifically, Goldratt argues that
two activities scheduled to be carried out in parallel and using the same scarce resource are not
independent as the traditional theory would assume.1 If the supply of the scarce resource is not
sufficient to allow both activities to be carried out simultaneously, then whichever of the two is
given priority immediately lengthens the other activity’s path but not its actual duration.
Assume that two parallel paths compose a project. One path consists of activities A1 and B and
the other path consists of activities A2 and C. Activities A1 and A2 require the same scarce
resource. Activities B and C use different resources. A1 requires 7 days, A2 requires 5 days, B
needs 10 days, and C needs 6 days and thus, the path A1-B is 17 days and the path A2-C is 11
days. If there is not enough of the scarce resource to fund both A activities, they must be done
sequentially. If A1 is done first, A2 cannot start until A1 is complete, thereby adding 7 days to
the A2-C path, making it 18 days long and increasing the project finish date by 1 day. If A2 is
done first, 5 days will be added to the A1-B path, making it 22 days, a 5-day increase over its
original 17-day duration. If this problem seems familiar, it is. This is precisely the issue we dealt
with when we examined the process of resource leveling in Section 9.4. Using Goldratt’s
meaning of the word “dependent,” the activities of a project can be ordered into paths based on
their resource dependencies as well as on their technological precedence requirements. The
longest of these paths of sequentially time-dependent activities is known as the “critical chain.”
A project, therefore, is composed of its critical chain and of noncritical chains that feed into it—
see Figure 9.15. There are two sources of delay for the project. One comes from a delay of one or
more activities in the critical chain. The second results from a delay in one or more of the
activities on a noncritical or “feeder” chain because such delays could delay activities on the
21
Project Management Module-4
critical chain. A project buffer protects the critical chain, and feeding buffers protect the feeder
paths.
Resources used by activities on the critical chain are given priority so that they are available
when required.
In the next chapter, we move to the ongoing implementation of the project and consider the
project information systems used for monitoring progress, costs, scope, and so on. The chapter
also describes some available computer packages for this function.
22
Project Management Module-4
emails, social media, project reports, or project documentation. Project managers spend most of
their time communicating with team members and other project stakeholders, both internal (at all
organizational levels) and external to the organization.
Communication activities have many dimensions, including but not limited to:
Internal- Focus on stakeholders within the project and within the organization.
External- Focus on external stakeholders such as customers, vendors, other projects,
organizations, government, the public, and environmental advocates.
Formal- Reports, formal meetings (both regular and ad hoc), meeting agendas and minutes,
stakeholder briefings, and presentations.
Informal- General communications activities using emails, social media, websites, and informal
ad hoc discussions.
Hierarchical focus- The position of the stakeholder or group with respect to the project team will
affect the format and content of the message, in the following ways:
Upward- Senior management stakeholders.
Downward.-The team and others who will contribute to the work of the project.
Horizontal- Peers of the project manager or team.
Official- Annual reports; reports to regulators or government bodies.
Unofficial- Communications that focus on establishing and maintaining the profile and
recognition of the project and building strong relationships between the project team and its
stakeholders using flexible and often informal means.
Written and oral- Verbal (words and voice inflections) and nonverbal (body language and
actions), social media and websites, media releases.
Communication develops the relationships necessary for successful project and program
outcomes.
Stakeholder management refers to managing communications to satisfy the needs of, and resolve
issues with, project stakeholders. Actively managing stakeholders increases the likelihood that
the project will not veer off track due to unresolved stakeholder issues, enhances the ability of
persons to operate synergistically, and limits disruptions during the project. The project manager
is usually responsible for stakeholder management.
Fig. 4.27 Manage Stakeholders: Inputs, Tools & Techniques, and Outputs
23
Project Management Module-4
24
Project Management Module-4
Approved corrective actions include changes that bring the expected future performance of the
project in line with the project management plan.
4. Organizational Process Assets (Updates)
Lessons learned documentation includes the causes of issues, the reasoning behind the corrective
action chosen, and other types of lessons learned about stakeholder management. Lessons
learned are documented so that they become part of the historical database for both this project
and the performing organization.
5. Project Management Plan (Updates)
The project management plan is updated to reflect the changes made to the communications
plan.
Project Risk Management includes the processes of conducting risk management planning,
identification, analysis, response planning, response implementation, and monitoring risk on a
project. The objectives of project risk management are to increase the probability and/or impact
of positive risks and to decrease the probability and/or impact of negative risks, in order to
optimize the chances of project success.
The Project Risk Management processes are:
1. Plan Risk Management-The process of defining how to conduct risk management activities for
a project.
2. Identify Risks-The process of identifying individual project risks as well as sources of overall
project risk, and documenting their characteristics.
3. Perform Qualitative Risk Analysis-The process of prioritizing individual project risks for
further analysis or action by assessing their probability of occurrence and impact as well as other
characteristics.
4. Perform Quantitative Risk Analysis-The process of numerically analyzing the combined effect
of identified individual project risks and other sources of uncertainty on overall project
objectives.
5. Plan Risk Responses-The process of developing options, selecting strategies, and agreeing on
actions to address overall project risk exposure, as well as to treat individual project risks.
6. Implement Risk Responses-The process of implementing agreed-upon risk response plans.
7. Monitor Risks-The process of monitoring the implementation of agreed-upon risk response
plans, tracking identified risks, identifying and analyzing new risks, and evaluating risk process
effectiveness throughout the project.
KEY CONCEPTS FOR PROJECT RISK MANAGEMENT
All projects are risky since they are unique undertakings with varying degrees of complexity that
aim to deliver benefits. They do this in a context of constraints and assumptions, while
responding to stakeholder expectations that may be conflicting and changing. Organizations
25
Project Management Module-4
should choose to take project risk in a controlled and intentional manner in order to create value
while balancing risk and reward.
Project Risk Management aims to identify and manage risks that are not addressed by the other
project management processes. When unmanaged, these risks have the potential to cause the
project to deviate from the plan and fail to achieve the defined project objectives. Consequently,
the effectiveness of Project Risk Management is directly related to project success.
Risk exists at two levels within every project. Each project contains individual risks that can
affect the achievement of project objectives. It is also important to consider the riskiness of the
overall project, which arises from the combination of individual project risks and other sources
of uncertainty. Project Risk Management processes address both levels of risk in projects, and
these are defined as follows:
-Individual project risk is an uncertain event or condition that, if it occurs, has a positive or
negative effect on one or more project objectives.
-Overall project risk is the effect of uncertainty on the project as a whole, arising from all sources
of uncertainty including individual risks, representing the exposure of stakeholders to the
implications of variations in project outcome, both positive and negative.
Individual project risks can have a positive or negative effect on project objectives if they
occur. Project Risk Management aims to exploit or enhance positive risks (opportunities) while
avoiding or mitigating negative risks (threats). Unmanaged threats may result in issues or
problems such as delay, cost overruns, performance shortfall, or loss of reputation. Opportunities
that are captured can lead to benefits such as reduced time and cost, improved performance, or
reputation.
Overall project risk can also be positive or negative. Management of overall project risk aims
to keep project risk exposure within an acceptable range by reducing drivers of negative
variation, promoting drivers of positive variation, and maximizing the probability of achieving
overall project objectives.
Risks will continue to emerge during the lifetime of the project, so Project Risk Management
processes should be conducted iteratively. Risk is initially addressed during project planning by
shaping the project strategy. Risk should also be monitored and managed as the project
progresses to ensure that the project stays on track and emergent risks are addressed.
In order to manage risk effectively on a particular project, the project team needs to know what
level of risk exposure is acceptable in pursuit of the project objectives. This is defined by
measurable risk thresholds that reflect the risk appetite of the organization and project
stakeholders. Risk thresholds express the degree of acceptable variation around a project
objective. They are explicitly stated and communicated to the project team and reflected in the
definitions of risk impact levels for the project.
TRENDS AND EMERGING PRACTICES IN PROJECT RISK MANAGEMENT
The focus of project risk management is broadening to ensure that all types of risk are
considered, and that project risks are understood in a wider context. Trends and emerging
practices for Project Risk Management include but are not limited to:
26
Project Management Module-4
Non-event risks-Most projects focus only on risks that are uncertain future events that may or
may not occur. Examples of event-based risks include: a key seller may go out of business
during the project; the customer may change the requirement after design is complete, or a
subcontractor may propose enhancements to the standard operating processes. There is an
increasing recognition that non-event risks need to be identified and managed. There are two
main types of non-event risks:
Variability risk-Uncertainty exists about some key characteristics of a planned event or activity
or decision. Examples of variability risks include: productivity may be above or below target, the
number of errors found during testing may be higher or lower than expected, or unseasonal
weather conditions may occur during the construction phase.
Ambiguity risk-Uncertainty exists about what might happen in the future. Areas of the project
where imperfect knowledge might affect the project's ability to achieve its objectives include:
elements of the requirement or technical solution, future developments in regulatory frameworks,
or inherent systemic complexity in the project.
Variability risks can be addressed using Monte Carlo analysis, with the range of variation
reflected in probability distributions, followed by actions to reduce the spread of possible
outcomes. Ambiguity risks are managed by defining those areas where there is a deficit of
knowledge or understanding, then filling the gap by obtaining expert external input or
benchmarking against best practices. Ambiguity is also addressed through incremental
development, prototyping, or simulation.
Project resilience- The existence of emergent risk is becoming clear, with a growing awareness
of so-called unknowable-unknowns. These are risks that can only be recognized after they have
occurred. Emergent risks can be tackled through developing project resilience. This requires each
project to have:
-Right level of budget and schedule contingency for emergent risks, in addition to a specific risk
budget for known risks;
-Flexible project processes that can cope with emergent risk while maintaining overall direction
toward project goals, including strong change management;
-Empowered project team that has clear objectives and that is trusted to get the job done within
agreed-upon limits;
-Frequent review of early warning signs to identify emergent risks as early as possible; and
-Clear input from stakeholders to clarify areas where the project scope or strategy can be
adjusted in response to emergent risks.
Integrated risk management- Projects exist in an organizational context, and they may form
part of a program or portfolio. Risk exists at each of these levels, and risks should be owned and
managed at the appropriate level. Some risks identified at higher levels will be delegated to the
project team for management, and some project risks may be escalated to higher levels if they
are best managed outside the project. A coordinated approach to enterprise wide risk
management ensures alignment and coherence in the way risk is managed across all levels. This
27
Project Management Module-4
builds risk efficiency into the structure of programs and portfolios, providing the greatest overall
value for a given level of risk exposure.
TAILORING CONSIDERATIONS
Because each project is unique, it is necessary to tailor the way Project Risk Management
processes are applied. Considerations for tailoring include but are not limited to:
1. Project size- Does the project's size in terms of budget, duration, scope, or team size require a
more detailed approach to risk management? Or is it small enough to justify a simplified risk
process?
2. Project complexity-Is a robust risk approach demanded by high levels of innovation, new
technology, commercial arrangements, interfaces, or external dependencies that increase project
complexity? Or is the project simple enough that a reduced risk process will suffice?
3. Project importance-How strategically important is the project? Is the level of risk increased for
this project because it aims to produce breakthrough opportunities, addresses significant blocks
to organizational performance, or involves major product innovation?
4. Development approach-Is this a waterfall project, where risk processes can be followed
sequentially and iteratively, or does the project follow an agile approach where risk is addressed
at the start of each iteration as well as during its execution?
Tailoring of the Project Risk Management processes to meet these considerations is part of the
Plan Risk Management process, and the outcomes of tailoring decisions are recorded in the risk
management plan.
CONSIDERATIONS FOR AGILE/ADAPTIVE ENVIRONMENTS
High-variability environments, by definition, incur more uncertainty and risk. To address this,
projects managed using adaptive approaches make use of frequent reviews of incremental work
products and cross-functional project teams to accelerate knowledge sharing and ensure that risk
is understood and managed. Risk is considered when selecting the content of each iteration, and
risks will also be identified, analyzed, and managed during each iteration. Additionally, the
requirements are kept as a living document that is updated regularly, and work may be
reprioritized as the project progresses, based on an improved understanding of current risk
exposure.
28
Project Management Module-4
Fig. 4.28 Risk Management Planning: Inputs, Tools & Techniques, and Outputs
1. Enterprise Environmental Factors- The attitudes toward risk and the risk tolerance of
organizations and people involved in the project will influence the project management plan.
Risk attitudes and tolerances may be expressed in policy statements or revealed in actions.
2. Organizational Process Assets- Organizations may have predefined approaches to risk
management such as risk categories, common definition of concepts and terms, standard
templates, roles and responsibilities, and authority levels for decision-making.
3. Project Scope Statement- The project scope statement describes, in detail, the project’s
deliverables and the work required to create those deliverables. The project scope statement also
provides a common understanding of the project scope among all project stakeholders and
describes the project’s major objectives. It also enables the project team to perform more detailed
planning, guides the project team’s work during execution, and provides the baseline for
evaluating whether requests for changes or additional work are contained within or outside the
project’s boundaries. The degree and level of detail to which the project scope statement defines
what work will be performed and what work is excluded can determine how well the project
management team can control the overall project scope. Managing the project scope, in turn, can
determine how well the project management team can plan, manage, and control the execution of
the project.
4. Project Management Plan-The Develop Project Management Plan process includes the
actions necessary to define, integrate, and coordinate all subsidiary plans into a project
management plan. The project management plan content will vary depending upon the
application area and complexity of the project. This process results in a project management plan
that is updated and revised through the Integrated Change Control process. The project
management plan defines how the project is executed, monitored and controlled, and closed. The
project management plan documents the collection of outputs of the planning processes of the
Planning Process Group.
29
Project Management Module-4
30
Project Management Module-4
table or a Probability and Impact Matrix. The specific combinations of probability and impact
that lead to a risk being rated as “high,” “moderate,” or “low” importance—with the
corresponding importance for planning responses to the risk -are usually set by the organization.
They are reviewed and can be tailored to the specific project during the Risk Management
Planning process.
risk response actions. Stakeholders outside the project team may provide additional objective
information. The Risk Identification process usually leads to the Qualitative Risk Analysis
process. Alternatively, it can lead directly to the Quantitative Risk Analysis process when
conducted by an experienced risk manager. On some occasions, simply the identification of a
risk may suggest its response, and these should be recorded for further analysis and
implementation in the Risk Response Planning process.
Fig. 4.29 Risk Identification: Inputs, Tools & Techniques, and Outputs
32
Project Management Module-4
between those plans and with the project requirements and assumptions, can be indicators of risk
in the project.
2. Information Gathering Techniques
Examples of information gathering techniques used in identifying risk can include:
Brainstorming- The goal of brainstorming is to obtain a comprehensive list of project risks. The
project team usually performs brainstorming, often with a multidisciplinary set of experts not on
the team. Ideas about project risk are generated under the leadership of a facilitator. Categories
of risk, such as a risk breakdown structure, can be used as a framework. Risks are then identified
and categorized by type of risk and their definitions are sharpened.
Delphi technique- The Delphi technique is a way to reach a consensus of experts. Project risk
experts participate in this technique anonymously. A facilitator uses a questionnaire to solicit
ideas about the important project risks. The responses are summarized and are then recirculated
to the experts for further comment. Consensus may be reached in a few rounds of this process.
The Delphi technique helps reduce bias in the data and keeps any one person from having undue
influence on the outcome.
Interviewing- Interviewing experienced project participants, stakeholders, and subject matter
experts can identify risks. Interviews are one of the main sources of risk identification data
gathering.
Root cause identification- This is an inquiry into the essential causes of a project’s risks. It
sharpens the definition of the risk and allows grouping risks by causes. Effective risk responses
can be developed if the root cause of the risk is addressed.
Strengths, weaknesses, opportunities, and threats (SWOT) analysis- This technique ensures
examination of the project from each of the SWOT perspectives, to increase the breadth of
considered risks.
3. Checklist Analysis
Risk identification checklists can be developed based on historical information and knowledge
that has been accumulated from previous similar projects and from other sources of information.
The lowest level of the RBS can also be used as a risk checklist. While a checklist can be quick
and simple, it is impossible to build an exhaustive one. Care should be taken to explore items
that do not appear on the checklist. The checklist should be reviewed during project closure to
improve it for use on future projects.
4. Assumptions Analysis
Every project is conceived and developed based on a set of hypotheses, scenarios, or
assumptions. Assumptions analysis is a tool that explores the validity of assumptions as they
apply to the project. It identifies risks to the project from inaccuracy, inconsistency, or
incompleteness of assumptions.
5. Diagramming Techniques
Risk diagramming techniques may include:
Cause-and-effect diagrams- These are also known as Ishikawa or fishbone diagrams, and are
useful for identifying causes of risks.
33
Project Management Module-4
System or process flow charts- These show how various elements of a system interrelate, and
the mechanism of causation.
Influence diagrams- These are graphical representations of situations showing causal
influences, time ordering of events, and other relationships among variables and outcomes.
34
Project Management Module-4
Definitions of the levels of probability and impact, and expert interviewing, can help to correct
biases that are often present in the data used in this process. The time criticality of risk-related
actions may magnify the importance of a risk. An evaluation of the quality of the available
information on project risks also helps understand the assessment of the risk’s importance to the
project.
Qualitative Risk Analysis is usually a rapid and cost-effective means of establishing priorities for
Risk Response Planning, and lays the foundation for Quantitative Risk Analysis, if this is
required. Qualitative Risk Analysis should be revisited during the project’s life cycle to stay
current with changes in the project risks. Qualitative Risk Analysis requires outputs of the Risk
Management Planning and Risk Identification processes. This process can lead into Quantitative
Risk Analysis or directly into Risk Response Planning.
Fig. 4.30 Qualitative Risk Analysis: Inputs, Tools & Techniques, and Outputs
35
Project Management Module-4
36
Project Management Module-4
As illustrated in Figure 4.31, an organization can rate a risk separately for each objective (e.g.,
cost, time, and scope). In addition, it can develop ways to determine one overall rating for each
risk. Finally, opportunities and threats can be handled in the same matrix using definitions of the
different levels of impact that are appropriate for each. The risk score helps guide risk responses.
For example, risks that have a negative impact on objectives if they occur (threats), and that are
in the high-risk (dark gray) zone of the matrix, may require priority action and aggressive
response strategies. Threats in the low-risk (medium gray) zone may not require proactive
management action beyond being placed on a watchlist or adding a contingency reserve.
Similarly for opportunities, those in the high-risk (dark gray) zone that can be obtained most
easily and offer the greatest benefit should, therefore, be targeted first. Opportunities in the low-
risk (medium gray) zone should be monitored.
3. Risk Data Quality Assessment
A qualitative risk analysis requires accurate and unbiased data if it is to be credible. Analysis of
the quality of risk data is a technique to evaluate the degree to which the data about risks is
useful for risk management. It involves examining the degree to which the risk is understood and
the accuracy, quality, reliability, and integrity of the data about the risk. The use of low-quality
risk data may lead to a qualitative risk analysis of little use to the project. If data quality is
unacceptable, it may be necessary to gather better data. Often, collection of information about
risks is difficult, and consumes time and resources beyond that originally planned.
4. Risk Categorization
37
Project Management Module-4
Risks to the project can be categorized by sources of risk (e.g., using the RBS), the area of the
project affected (e.g., using the WBS), or other useful category (e.g., project phase) to determine
areas of the project most exposed to the effects of uncertainty. Grouping risks by common root
causes can lead to developing effective risk responses.
5. Risk Urgency Assessment
Risks requiring near-term responses may be considered more urgent to address. Indicators of
priority can include time to affect a risk response, symptoms and warning signs, and the risk
rating.
-Quantify the possible outcomes for the project and their probabilities
-Assess the probability of achieving specific project objectives
-Identify risks requiring the most attention by quantifying their relative contribution to overall
project risk
- Identify realistic and achievable cost, schedule, or scope targets; given the project risks
- Determine the best project management decision when some conditions or outcomes are
uncertain.
Quantitative Risk Analysis generally follows the Qualitative Risk Analysis process, although
experienced risk managers sometimes perform it directly after Risk Identification. In some cases,
Quantitative Risk Analysis may not be required to develop effective risk responses. Availability
of time and budget, and the need for qualitative or quantitative statements about risk and
impacts, will determine which method(s) to use on any particular project. Quantitative Risk
Analysis should be repeated after Risk Response Planning, as well as part of Risk Monitoring
and Control, to determine if the overall project risk has been satisfactorily decreased. Trends can
indicate the need for more or less risk management action. It is an input to the Risk Response
Planning process.
Fig. 4.32 Quantitative Risk Analysis: Inputs, Tools & Techniques, and Outputs
39
Project Management Module-4
management, risk categories, the RBS, and revised stakeholders’ risk tolerances.
4. Risk Register
Key items from the risk register for Quantitative Risk Analysis include the list of identified risks,
the relative ranking or priority list of project risks, and the risks grouped by categories.
5. Project Management Plan
The project management plan includes:
Project schedule management plan- The project schedule management plan sets the format and
establishes criteria for developing and controlling the project schedule.
Project cost management plan- The project cost management plan sets the format and
establishes criteria for planning, structuring, estimating, budgeting, and controlling project costs.
Fig. 4.33 Range of Project Cost Estimates Collected During the Risk Interview
40
Project Management Module-4
Figure 4.34. These asymmetrical distributions depict shapes that are compatible with the data
typically developed during the project risk analysis. Uniform distributions can be used if there is
no obvious value that is more likely than any other between specified high and low bounds, such
as in the early concept stage of design.
41
Project Management Module-4
the decision tree provides the EMV (or other measure of interest to the organization) for each
alternative, when all the rewards and subsequent decisions are quantified.
Modeling and simulation- A project simulation uses a model that translates the uncertainties
specified at a detailed level of the project into their potential impact on project objectives.
Simulations are typically performed using the Monte Carlo technique. In a simulation, the
project model is computed many times (iterated), with the input values randomized from a
probability distribution function (e.g., cost of project elements or duration of schedule activities)
chosen for each iteration from the probability distributions of each variable. A probability
distribution (e.g., total cost or completion date) is calculated. For a cost risk analysis, a
simulation can use the traditional project WBS or a cost breakdown structure as its model. For a
schedule risk analysis, the precedence diagramming method (PDM) schedule is used. A cost risk
simulation is shown in Figure 4.35.
This output, typically expressed as a cumulative distribution, is used with stakeholder risk
tolerances to permit quantification of the cost and time contingency reserves. Such contingency
reserves are needed to bring the risk of overrunning stated project objectives to a level acceptable
to the organization. For instance, in Figure 4.35, the cost contingency to the 75th percentile is $9
million, or about 22% versus the $41 million sum of the most likely estimates.
Probability of achieving cost and time objectives- With the risks facing the project, the
probability of achieving project objectives under the current plan can be estimated using
quantitative risk analysis results. For instance, in Figure 4.35, the likelihood of achieving the cost
estimate of $41 million (from Figure 4.32) is about 12%.
Prioritized list of quantified risks- This list of risks includes those that pose the greatest threat
or present the greatest opportunity to the project. These include the risks that require the greatest
cost contingency and those that are most likely to influence the critical path.
Trends in quantitative risk analysis results- As the analysis is repeated, a trend may become
apparent that leads to conclusions affecting risk responses
43
Project Management Module-4
project model is computed many times (iterated), with the input values randomized from a
probability distribution function (e.g., cost of project elements or duration of schedule activities)
chosen for each iteration from the probability distributions of each variable. A probability
distribution (e.g., total cost or completion date) is calculated. For a cost risk analysis, a
simulation can use the traditional project WBS or a cost breakdown structure as its model. For a
schedule risk analysis, the precedence diagramming method (PDM) schedule is used. A cost risk
simulation is shown in Figure 4.35.
Failure Mode and Effect Analysis (FMEA)
FMEA is the application of a scoring model such as those used for project . It is straightforward
and extensively used, particularly in engineering, and is easily applied to risk by using six steps.
1. List the possible ways a project might fail.
2. Evaluate the severity (S) of the impact of each type of failure on a 10-point scale where “1” is
“no effect” and “10” is “very severe.”
3. For each cause of failure, estimate the likelihood (L) of its occurrence on a 10-point scale
where “1” is “remote” and 10 is “almost certain.”
4. Estimate the inability to detect (D) a failure associated with each cause. Using a 10-point
scale, “1” means delectability is almost certain using normal monitoring/ control systems and
“10” means it is practically certain that failure will not be detected in time to avoid or mitigate it.
5. Find the Risk Priority Number (RPN) where RPN S L D.
6. Consider ways to reduce the S, L, and D for each cause of failure with a significantly high
RPN. (We discuss this in Step 5: Risk Response Planning.)
Table 4.1 FMEA Example table
Threat Severity ,S Likelihood , L Ability to Detect , D RPN
1. Tight schedule 6 7.5 2 90
2. Can’t acquire tech knowledge 8.5 5 4 170
3. Client changes scope 4 8 5 160
4. Costs escalate 3 2 6 36
5. Recession 4 2.5 7
Table 4.1 illustrates the use of FMEA for the same five threats we considered in Step 4
previously, but here we use more precise data. As we see from the RPN numbers, the biggest
threats are: Can’t acquire tech knowledge (2), and Client changes scope (3). Threat 2 has a great
severity, should it occur, and threat 3 is quite likely, though the severity is much less damaging.
The cost threat (4) and the recession threat (5) can probably be ignored for now since their
likelihoods are so low. The tight schedule (1) will have some repercussions and is also quite
likely, but we will see it coming early and can probably take steps to avoid or mitigate it. Some
extensions of FMEA use additional scoring categories such as Ability to Mitigate (even if the
threat cannot be detected).
4.4.4 Probability and impact matrix: -
Definitions of risk probability and impact- The quality and credibility of the Qualitative Risk
Analysis process requires that different levels of the risks’ probabilities and impacts be defined.
44
Project Management Module-4
General definitions of probability levels and impact levels are tailored to the individual project
during the Risk Management Planning process for use in the Qualitative Risk Analysis
process. A relative scale representing probability values from “very unlikely” to “almost
certainty” could be used. Alternatively, assigned numerical probabilities on a general scale (e.g.,
0.1, 0.3, 0.5, 0.7, 0.9) can be used. Another approach to calibrating probability involves
developing descriptions of the state of the project that relate to the risk under consideration (e.g.,
the degree of maturity of the project design).
The impact scale reflects the significance of impact, either negative for threats or positive for
opportunities, on each project objective if a risk occurs. Impact scales are specific to the
objective potentially impacted, the type and size of the project, the organization’s strategies and
financial state, and the organization’s sensitivity to particular impacts. Relative scales for impact
are simply rank-ordered descriptors such as “very low,” “low,” “moderate,” “high,” and “very
high,” reflecting increasingly extreme impacts as defined by the organization. Alternatively,
numeric scales assign values to these impacts. These values may be linear (e.g., 0.1, 0.3, 0.5, 0.7,
0.9) or nonlinear (e.g., 0.05, 0.1, 0.2, 0.4, 0.8). Nonlinear scales may represent the organization’s
desire to avoid high-impact threats or exploit high-impact opportunities, even if they have
relatively low probability. In using nonlinear scales, it is important to understand what is meant
by the numbers and their relationship to each other, how they were derived, and the effect they
may have on the different objectives of the project. Figure 4.36 is an example of negative
impacts of definitions that might be used in evaluating risk impacts related to four project
objectives. That figure illustrates both relative and numeric (in this case, nonlinear) approaches.
The figure is not intended to imply that the relative and numeric terms are equivalent, but to
show the two alternatives in one figure rather than two.
45
Project Management Module-4
Probability and impact are assessed for each identified risk. Risks can be assessed in interviews
or meetings with participants selected for their familiarity with the risk categories on the agenda.
Project team members and, perhaps, knowledgeable persons from outside the project, are
included. Expert judgment is required, since there may be little information on risks from the
organization’s database of past projects. An experienced facilitator may lead the discussion,
since the participants may have little experience with risk assessment. The level of probability
for each risk and its impact on each objective is evaluated during the interview or meeting.
Explanatory detail, including assumptions justifying the levels assigned, is also recorded. Risk
probabilities and impacts are rated according to the definitions given in the risk management
plan. Sometimes, risks with obviously low ratings of probability and impact will not be rated, but
will be included on a watch list for future monitoring.
Risks can be prioritized for further quantitative analysis and response, based on their risk rating.
Ratings are assigned to risks based on their assessed probability and impact. Evaluation of each
risk’s importance and, hence, priority for attention is typically conducted using a look-up table or
a probability and impact matrix (Figure 4.37). Such a matrix specifies combinations of
probability and impact that lead to rating the risks as low, moderate, or high priority. Descriptive
terms or numeric values can be used, depending on organizational preference. The organization
should determine which combinations of probability and impact result in a classification of high
risk (“red condition”), moderate risk (“yellow condition”), and low risk (“green condition”). In a
black-and-white matrix, these conditions can be denoted by different shades of gray.
Specifically, in Figure 4.37, the dark gray area (with the largest numbers) represents high risk;
the medium gray area (with the smallest numbers) represents low risk; and the light gray area
(with in-between numbers) represents moderate risk. Usually, these risk rating rules are specified
by the organization in advance of the project, and included in organizational process assets. Risk
rating rules can be tailored in the Risk Management Planning process to the specific project. A
probability and impact matrix, such as the one shown in Figure 4.37, is often used.
46
Project Management Module-4
An organization can rate a risk separately for each objective (e.g., cost, time, and scope). In
addition, it can develop ways to determine one overall rating for each risk. Finally, opportunities
and threats can be handled in the same matrix using definitions of the different levels of impact
that are appropriate for each. The risk score helps guide risk responses. For example, risks that
have a negative impact on objectives if they occur (threats), and that are in the high-risk (dark
gray) zone of the matrix, may require priority action and aggressive response strategies. Threats
in the low-risk (medium gray) zone may not require proactive management action beyond being
placed on a watch list or adding a contingency reserve. Similarly for opportunities, those in the
high-risk (dark gray) zone that can be obtained most easily and offer the greatest benefit should,
therefore, be targeted first. Opportunities in the low-risk (medium gray) zone should be
monitored. Risks are prioritized according to their potential implications for meeting the
project’s objectives. The typical approach to prioritizing risks is to use a look-up table or a
Probability and Impact Matrix. The specific combinations of probability and impact that lead to a
risk being rated as “high,” “moderate,” or “low” importance—with the corresponding
importance for planning responses to the risk are usually set by the organization. They are
reviewed and can be tailored to the specific project during the Risk Management Planning
process.
Several risk response strategies are available. The strategy or mix of strategies most likely to be
effective should be selected for each risk. Risk analysis tools, such as decision tree analysis, can
be used to choose the most appropriate responses. Then, specific actions are developed to
implement that strategy. Primary and backup strategies may be selected. A fallback plan can be
developed for implementation if the selected strategy turns out not to be fully effective, or if an
accepted risk occurs. Often, a contingency reserve is allocated for time or cost. Finally,
contingency plans can be developed, along with identification of the conditions that trigger their
execution.
payment of a risk premium to the party taking on the risk. Transference tools can be quite diverse
and include, but are not limited to, the use of insurance, performance bonds, warranties,
guarantees, etc. Contracts may be used to transfer liability for specified risks to another party. In
many cases, use of a cost-type contract may transfer the cost risk to the buyer, while a fixed-
price contract may transfer risk to the seller, if the project’s design is stable.
Mitigate- Risk mitigation implies a reduction in the probability and/or impact of an adverse risk
event to an acceptable threshold. Taking early action to reduce the probability and/or impact of a
risk occurring on the project is often more effective than trying to repair the damage after the risk
has occurred. Adopting less complex processes, conducting more tests, or choosing a more
stable supplier are examples of mitigation actions. Mitigation may require prototype
development to reduce the risk of scaling up from a bench-scale model of a process or product.
Where it is not possible to reduce probability, a mitigation response might address the risk
impact by targeting linkages that determine the severity. For example, designing redundancy into
a subsystem may reduce the impact from a failure of the original component.
2. Strategies for Positive Risks or Opportunities
Three responses are suggested to deal with risks with potentially positive impacts on project
objectives. These strategies are to exploit, share, or enhance.
Exploit. This strategy may be selected for risks with positive impacts where the organization
wishes to ensure that the opportunity is realized. This strategy seeks to eliminate the uncertainty
associated with a particular upside risk by making the opportunity definitely happen. Directly
exploiting responses includes assigning more talented resources to the project to reduce the time
to completion, or to provide better quality than originally planned.
Share. Sharing a positive risk involves allocating ownership to a third party who is best able to
capture the opportunity for the benefit of the project. Examples of sharing actions include
forming risk-sharing partnerships, teams, special-purpose companies, or joint ventures, which
can be established with the express purpose of managing opportunities.
Enhance. This strategy modifies the “size” of an opportunity by increasing probability and/or
positive impacts, and by identifying and maximizing key drivers of these positive-impact risks.
Seeking to facilitate or strengthen the cause of the opportunity, and proactively targeting and
reinforcing its trigger conditions, might increase probability. Impact drivers can also be targeted,
seeking to increase the project’s susceptibility to the opportunity.
1. What is a project launch meeting? who are the invitees of this meeting? What are the outcomes
of this meeting?
2. What is crashing of the project? Explain with a small example the process of crashing
3. What is resource loading? How does it differ from resource leveling?
4. What is Goldratt’s critical chain method? What is meant by a project buffer?
48