You are on page 1of 7

Work Study

Risk evaluation and its importance to project implementation


Alison MobeyDavid Parker
Article information:
To cite this document:
Alison MobeyDavid Parker, (2002),"Risk evaluation and its importance to project implementation", Work Study, Vol. 51 Iss 4
pp. 202 - 208
Permanent link to this document:
http://dx.doi.org/10.1108/00438020210430760
Downloaded on: 31 January 2016, At: 07:24 (PT)
References: this document contains references to 28 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 6064 times since 2006*
Users who downloaded this article also downloaded:
H. Frank Cervone, (2006),"Project risk management", OCLC Systems & Services: International digital library
perspectives, Vol. 22 Iss 4 pp. 256-262 http://dx.doi.org/10.1108/10650750610706970
Rolf Olsson, (2008),"Risk management in a multi-project environment: An approach to manage portfolio risks", International
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

Journal of Quality & Reliability Management, Vol. 25 Iss 1 pp. 60-71 http://dx.doi.org/10.1108/02656710810843586
Ammar Ahmed, Berman Kayis, Sataporn Amornsawadwatana, (2007),"A review of techniques for risk management in
projects", Benchmarking: An International Journal, Vol. 14 Iss 1 pp. 22-36 http://dx.doi.org/10.1108/14635770710730919

Access to this document was granted through an Emerald subscription provided by emerald-srm:566188 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please
visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of
more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online
products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication
Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.

*Related content and download information correct at time of download.


Introduction
Risk evaluation and its Jarvenpaa and Ives (1994) argue that one
importance to project drawback of project teams is that employee
implementation empowerment and information
decentralisation often result in organisational
knowledge fragmentation and loss of
Alison Mobey and organisational learning. Weiser and Morrison
David Parker (1998) state that formal project
documentation, such as reports, minutes of
meetings and correspondence, usually exist as
disjointed documents stored in files with
informal e-mails and personal notes often not
being retained at all. Much of the post-
contract work involved in delivering the end
product is heavily dependent on the exchange
The authors and management of information in the form
of documents, drawings, schedules, etc. With
Alison Mobey is a Postgraduate Student undertaking
no in-house manufacturing, the company's
research and David Parker is Reader in Operations
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

principal outputs are drawings and


Management, both at the Centre for Organisational
specifications; and, especially, effective
Effectiveness, Bournemouth University, Bournemouth, UK.
project change control over large collections
of specifications, plans and drawings to
Keywords ensure success.
Risk, Risk management, Project management To increase the chances of a proposed
system succeeding it is necessary for the
Abstract organisation to have an understanding of
potential risks, to systematically and
An extensive case study has recently started within a
quantitatively assess these risks, anticipating
major UK company that undertakes engineering process
possible causes and effects, and then choose
solutions, operating on a project management basis with
appropriate methods of dealing with them.
multi-disciplinary teams of professional engineers. The
Once identified, these risks can be reduced,
organisation recently piloted the introduction of an
removed, avoided or accepted.
electronic document management system, that resulted in
The organisation also needed to adopt a
considerable implementation problems for the company.
The consequence of such problems may be such that the
more proactive approach to risk,
system fails to achieve its original objectives. This
understanding how effective evaluation and
highlighted the clear need for risk evaluation prior to
analysis could be used to anticipate potential
implementation. The purpose of this current work was to
risks when implementing new systems, and
understand management's view of risk, identify methods thereby minimise those risks. To ensure that
adopted to highlight potential risk, and explore possible any potential risks are managed effectively,
risk assessment in project management. The research is the risk process needs to be explicitly built
nearing completion and final results will soon be into the decision-making process.
published. The aim of this case study was to evaluate
how effective risk analysis prior to
implementation could have prevented the
Electronic access
problems that occurred. Identifying and
The research register for this journal is available at evaluating potential risks will also enable
http://www.emeraldinsight.com/researchregisters better management and control of these risks
The current issue and full text archive of this journal is in the future.
available at
http://www.emeraldinsight.com/0043-8022.htm
Managing risk in change
Work Study
Considerable literature exists on potential
Volume 51 . Number 4 . 2002 . pp. 202206
# MCB UP Limited . ISSN 0043-8022 software implementation failure; this has been
DOI 10.1108/00438020210430760 written predominantly within the context of
202
Risk evaluation and its importance Work Study
Alison Mobey and David Parker Volume 51 . Number 4 . 2002 . 202206

introducing technology, covering areas such (4) structure;


as task-technology fit, knowledge-technology (5) ownership;
fit, training and user support. The second (6) estimate;
category of literature draws on organisational (7) evaluate;
change theory and models, considering (8) plan; and
human aspects such as barriers to change, (9) manage.
user perceptions and participation.
Other risk assessments have been identified
Risk originated as a concept as early as the
by Buchan (1994), Kahkonen (1997),
seventeenth century and was initially
Software Engineering Institute (SEI), White
associated with gambling (Frosdick, 1997).
(1995), to name but a few. These approaches
Its development through subsequent
emphasise the need to identify risk sources at
centuries saw its emergence in many fields,
the outset.
such as insurance and economics and more
Literature highlights numerous tools for
recently in engineering and science. Mosca
risk identification. Such tools may be based
et al. (2001) state that risk analysis is
on intuitive, inductive or deductive
proposed to deal with the problems involving
techniques. Traditionally the focus has been
uncertainty by identifying, evaluating and
on inductive methods with quantitative risk
monitoring the risks. Moreover:
analysis based on estimating probabilities and
risk analysis gives the decision maker a clear
probability distributions for time and cost
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

presentation and evaluation of the currently


identified major risks, with consideration of the analysis (Tah and Carr, 2000). Other
various decision options available (Buchan, techniques, such as sensitivity analysis,
1994). probability analysis, Monte Carlo simulation,
However, Jablonowoski (2000) highlights that multiple regression, decision tree analysis, etc.
managers rarely use formal risk analysis when are based on quantitative assessment
making important decisions. Tah and Carr (Frosdick, 1997). Conversely, there are
(2000) advocate that often risk management qualitative methods such as scenario and
is ad hoc and dependent on the particular contingency planning and Delphi techniques
skills, experience and risk orientation of (Smallman, 1996).
individual key project participants. Yet It may be concluded, therefore, that risk
identifying potential risks, estimating the analysis can be condensed into three distinct
probability of occurrence and the magnitude phases:
of consequences and thus the acceptability of (1) Identification, where all the potential risks
the risk can provide senior managers with affecting a project are identified;
valuable information on which to base their (2) Estimation, where the identified risks are
decisions. So why is risk assessment not an assessed and their importance, likelihood,
integral management activity? March and severity and impact are determined; and
Shapira, cited in Bandyopadhyay et al. (3) Analysis and evaluation, where the
(1999), conclude that most managers are acceptability of the risk is determined and
unable to conceive risk from a decision theory the actions that can be taken to make the
perspective. Smallman (1996), who explored risk more acceptable are evaluated.
the link between risk management strategy
and organizational behaviour, described
organisations as either proactive or reactive in Technological risks
their approaches.
As organisations become increasingly
technology-dependent, they become highly
Protocols for risk assessment vulnerable to risks of IT failure
(Bandyopadhyay et al., 1999). The most
The Association of Project Managers (APM, obvious risk during system implementation is
2000) has developed a nine-step procedure technology failure in terms of performance or
entitled Project Risk Analysis and reliability. Lassila and Brancheau (1999)
Management (PRAM) for the risk process: highlight problems in predicting performance
(1) define; and simulating the proposed operating
(2) focus; environment during trials. System complexity
(3) identify; can also hinder success (Cannon, 1994;
203
Risk evaluation and its importance Work Study
Alison Mobey and David Parker Volume 51 . Number 4 . 2002 . 202206

Lassila and Brancheau, 1999; Lin and Shao, . Was the system over-complicated? What
2000), compounding poor was the knowledge level required of
knowledge-technology fit, i.e. the gap potential user is? Was there a gap between
between the knowledge level of potential users' knowledge and system complexity?
users and complexity of the system. This . Did users feel that they had sufficient
highlights the need for prototypes and pilot training and sufficient time and resource
tests (Cannon, 1994). to explore the system?
The task-technology fit model offered by
Goodhue and Thompson (1995) focuses on
matching technology capabilities of a system Human risks
to the demands of the task. It proposes that
IT will be used, if the functions available fit Increasingly, emphasis is being placed on
the activities of the user. Therefore, arguably, human factors when assessing risk during
it follows that the greater the degree of user implementation (Clark and Stoddard, 1996;
participation and involvement during Clemons et al., 1995; Lynne and Benjamin,
development and implementation of a system, 1997; Tushaman and Romanelli, 1985).
the more likely it is that the system will Lynne and Benjamin (1997) argue that,
succeed (Lin and Shao, 2000; Hwang and whilst good design of systems is important,
Thorn, 1999; Van Offenbeck and Koopman, successful change requires implementation
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

planning, execution and improvisation to deal


1996).
with resistance and unforeseen events. Many
Greater participation can also improve
organisations devote significant resources to
perception and attitudes; and highlights the
managing financial risks, whilst ignoring the
importance of users' understanding of the
human aspects.
systems' functional and technical features
The technology acceptance model (TAM)
(Lin and Shao, 2000; Gottschalk, 1999). This
of Davis cited in Dishaw and Strong (1999) is
can also be as a result of adequate training
a conceptual model of ITC utilization
(Lassila and Brancheau, 1999), where it can
behaviour. It focuses on users' attitudes of
be argued that the degree of system-related
ITC based on perceived usefulness and ease
training is an important factor in successful
of use. Lassila and Brancheau (1999) tested
implementation. Lassila and Brancheau
whether users perceive the technology to be a
(1999) state that the tendency to cut training
suitable tool and have sufficient time and
and implementation costs can often result in resource to fully explore the new system.
negative user attitudes and limited usage of The discussion of ``human risk'' leads to the
software with the usefulness and potential following research questions:
contribution of the software not being . Did the implementation, planning and
realised. Such work emphasises the execution of the new system consider
importance of creating a positive initial change management to encourage
experience during implementation rather than flexibility and human behaviour?
accepting ``initial teething problems'' that can . Did user resistance contribute to the
cause dysfunctional system integration. system failure?
The review of literature has identified a . Did the users feel threatened by the new
number of avenues for the development of system? For example, may this be due to
this case research. This leads to the following change in job content, loss of
questions to be included in the primary status/power, uncertainty or unfamiliarity
research to explore system utilisation and user or job insecurity?
resistance:
. What was the degree of user participation
and involvement during decision making, Organisational risks
development, planning and
implementation? Clark and Stoddard (1996) argue that project
. What is the task-technology fit (TTF) and managers ignore or minimise the
technology-acceptance model (TAM)? organisational or process changes required to
. Were the system capabilities suitable for take advantage of technological capabilities.
the task and how did users perceive the Lynne and Benjamin (1997) highlight that,
ease of use and usefulness of the system? whilst change management techniques can
204
Risk evaluation and its importance Work Study
Alison Mobey and David Parker Volume 51 . Number 4 . 2002 . 202206

substantially increase the chance of success, The organisation in this instance uses
many organisations neglect this aspect and quantitative risk analysis in a rudimentary
mistakenly believe that ITC itself has the manner during project planning, assigning
power to create organisational change. cost implications to various risks. This is
Clemons et al. (1995) attribute the high conducted by project managers and reviewed
failure rate of re-engineering projects to by senior management. The majority of these
cognitive, motivational and obligation-based people originate from an engineering
barriers to change. They categorise the risk of background, and it has been noted that
failure due to organisational resistance or lack analytical are favoured over qualitative
of commitment as political risk, and argue methods.
that this and functional risk are the dominant This work will incorporate qualitative
risks in innovating firms. research in the form of focus groups
Organisational barriers to change could consisting of key personnel involved in the
undoubtedly offer insights into the human decision-making process, planning and
risk factors when implementing new systems. implementation. Focus groups will allow
Case studies of various system insight into potential risks identified prior to
implementation in a range of sectors decision making and implementation.
highlights the influence of internal resistance Representatives of each business process will
to change and its role in implementation be involved, i.e. operations management, IT,
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

failure or system under-utilisation (Clark and project management, engineering and


Stoddard, 1996; Clemons et al., 1995; Jiang administration.
et al., 2000; Tushman and Romanelli, 1985). Semi-structured interviews with key
Tushman and Romanelli (1985) argue that individuals will then be used to draw on lived
ITC projects, in particular, fail due to experiences. This will identify people's
resistance, if they are inconsistent with attitudes and beliefs. The interviewees will
existing culture and competencies. represent varying seniority within the
Lassila and Brancheau (1999) argue that organisation so as to gain different
the full advantages of information technology perspectives. Additional interviews will be
are not likely to be realized, unless both conducted for project managers, engineers
technology and organizational context are and administrators.
adapted during implementation. They use Issues surrounding behavioural attitudes
action research to corroborate their theory of and user resistance, as identified during the
avoidance, resistance and adaptation by users literature review, will also be incorporated.
regardless of features and whether the Transcripts will then be analysed by content.
technology functions as planned. They claim It is anticipated that the emergent themes
that the initial implementation of new will be linked to literature, both similar and
technology often marks the beginning of a conflicting, to increase the validity of any
new revolutionary period but that ultimately generic framework developed for the
subsequent change processes result in a new organisation. Weighting of these key factors
equilibrium state. has been contemplated but this may be
dependent on analysis of the research.

Company case study: action research


References
The review of literature has identified a
number of possible avenues for the Dixon, M. (Ed.) (2000), Project management, Body of
Knowledge, 4th ed., APM, High Wycombe.
development of this case research. In
Bandyopadhyay, K., Myktyn, P. and Myktyn, K. (1999), ``A
particular the relationship between framework for integrated risk management in
implementing new technology and information technology'', Management Decision,
``organisation'' is highly complex and Vol. 37 No. 5, pp. 437-44.
non-trivial, potentially involving factors Buchan, D. (1994), ``Risk analysis some practical
suggestions'', Cost Engineering, Vol. 36 No. 1, p. 29.
outside the scope of this research. Intuitively,
Cannon (1994), ``Why IT applications succeed or fail: the
however, it is anticipated that this aspect of interaction of technical and organizational factors'',
project implementation will identify insightful Industrial and Commercial Training, Vol. 26 No. 1,
information and benefits for the organisation. pp. 10-15.
205
Risk evaluation and its importance Work Study
Alison Mobey and David Parker Volume 51 . Number 4 . 2002 . 202206

Clark, T. and Stoddard, D. (1996), ``Interorganizational Lin, W. and Shao, B. (2000), ``The relationship between
business process redesign: merging technological user participation and system success: a
and process innovation'', Journal of Management simultaneous contingency approach'', Information
Information Systems, Vol. 13 No. 2, pp. 9-28. and Management, Vol. 37 No. 6, pp. 283-95.
Clemons, E., Thatcher, M. and Row, M. (1995), Lynne, M. and Benjamin, R. (1997), ``The magic bullet
``Identifying sources of reengineering failure: a study theory in IT-enabled transformation'', Sloan
of behavioural factors contributing to reengineering Management Review, Vol. 38 No. 2, pp. 55-68.
risks'', Journal of Management Information Systems, Mosca, R. et al. (2001), ``Risk analysis in the evaluation of
Vol. 12 No. 2, pp. 9-36. plant investments: the contribution of a
Dishaw, M. and Strong, D. (1999), ``Extending the non-deterministic approach'', Project Management
technology acceptance model with task-technology Journal, Vol. 32 No. 3 pp. 4-11.
fit constructs'', Information and Management, Smallman, C. (1996), ``Risk and organizational behaviour:
Vol. 36 No. 1, pp. 9-21. a research model'', Disaster Prevention and
Frosdick, S. (1997), ``The techniques of risk analysis are Management, Vol. 5 No. 2, pp. 12-26.
insufficient in themselves'', Disaster Prevention and Tah, J. and Carr, V. (2000), ``Information modelling for a
Management, Vol. 6 No. 3, pp. 165-77. construction project risk management system'',
Goodhue, D. and Thompson, R. (1995), ``Task-technology Engineering, Construction & Architectural
fit and individual performance'', Management Management, Vol. 7 No. 2, pp. 107-19.
Information Systems Quarterly, Vol. 19 No. 2, Van Offenbeck and Koopman (1996), ``Information
pp. 213-36. systems development: from user participation to
Gottschalk, P. (1999), ``Implementation predictors of contingent interaction among involved parties'',
strategic information systems plans'', Information European Journal of Work and Organizational
Psychology, Vol. 5 No. 3.
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

and Management, Vol. 36 No. 2, pp. 77-91.


Hwang, M. and Thorn, R. (1999), ``The effect of user Weiser, M. and Morrison, J. (1998), ``Project memory:
engagement on system success: a metaphysical information management for project teams'',
Journal of Management Information Systems,
integration of research findings'', Information and
Vol. 14 No. 4, pp. 149-66.
Management, Vol. 35 No. 4, pp. 229-36.
White, D. (1995), ``Application of systems thinking to risk
Jablonowoski, M. (2000), ``Why risk analyses fail'' CPCU
management: a review of the literature'',
Journal, Vol. 53 No. 4, Winter, pp. 223-30.
Management Decision, Vol. 33 No. 10, pp. 35-45.
Jarvenpaa, S. and Ives, B. (1994), ``The global network
organization of the future: information management
opportunities and challenges'', Journal of
Management Information Systems, Vol. 10 No. 4, Further reading
pp. 25-57.
Jiang, J., Muhanna, W. and Klein, G. (2000), ``User Chapman, C. (1997), ``Project risk analysis and
resistance and strategies for promoting acceptance management the PRAM generic process'',
across system types'', Information and International Journal of Project Management,
Management, Vol. 37 No. 1, pp. 25-36. Vol. 15, pp. 273-81.
Kahkonen, K. (1997), ``Implementation of systematic Hamel, G. and Prahalad, C.K. (1994), Competing for the
project risk management in companies from Future, Harvard Business School, Boston, MA.
immediate needs to prospects for the future'', in Shrivastava et al. (1988), ``Understanding industrial
Kahkonen, K. and Artto, K.A. (Eds), Managing Risks crises'', The Journal of Management Studies, Vol. 25
in Projects, E&N Spon, London, pp. 265-74. No. 4, pp. 285-304.
Lassila, K. and Brancheau (1999), ``Adoption and Tushaman, M. and Romanelli, E. (1985), ``Organizational
utilization of commercial software packages: evolution: a metamorphosis model of convergence
exploring, utilization, equilibria, transitions, triggers and reorientation'', in Cummings, L.L. and Staw,
and tracks'', Journal of Management Information B.M. (Eds), Research in Organizational Behavior,
Systems, Vol. 16 No. 2, pp. 63-90. Vol. 7, JAI Press, Greenwich, CT, pp. 171-222.

206
This article has been cited by:

1. Nipon Parinyavuttichai, Angela LinReexamination of the Information Systems Project Escalation Concept: An Investigation
from Risk Perspectives 179-202. [CrossRef]
2. Gholamreza Jandaghi, Mahbube Hosseini. 2015. Evaluating the Risk of Projects Implementation in Various Situations using
Generalized TOPSIS Model and Business Plan. Trends in Applied Sciences Research 10, 245-258. [CrossRef]
3. Kathryn Cormican. 2014. Integrated Enterprise Risk Management: From Process to Best Practice. Modern Economy 05,
401-413. [CrossRef]
4. Kaizer Boikanyo Ratsiepe, Rashad YazdanifardPoor Risk Management as One of the Major Reasons Causing Failure of Project
Management 1-5. [CrossRef]
5. Dawei Tang, Jian-Bo Yang, Kwai-Sang Chin, Zoie S.Y. Wong, Xinbao Liu. 2011. A methodology to generate a belief rule base
for customer perception risk analysis in new product development. Expert Systems with Applications 38, 5373-5383. [CrossRef]
6. Hua Wang, Li-ming Zhao, Yong LiInvest project risk assessment based on joint entropy model 222-226. [CrossRef]
7. Zhang Mei, Wen JinghuaThe decision model of investment selection in family financing V9-415-V9-417. [CrossRef]
8. Shui Yee Wong, Kwai Sang Chin, Dawei Tang. 2010. Strengthening Risk Evaluation in Existing Risk Diagnosis Method.
Industrial Engineering and Management Systems 9, 41-53. [CrossRef]
9. Kwai-Sang Chin, Da-Wei Tang, Jian-Bo Yang, Shui Yee Wong, Hongwei Wang. 2009. Assessing new product development
project risk by Bayesian network with a systematic probability generation methodology. Expert Systems with Applications 36,
9879-9890. [CrossRef]
Downloaded by La Trobe University At 07:24 31 January 2016 (PT)

10. Encon Y.Y. Hui, Albert H.C. Tsang. 2006. The interorganizational relationship in a multicontractor business network.
Journal of Quality in Maintenance Engineering 12:3, 252-266. [Abstract] [Full Text] [PDF]
11. Fraser Dalgleish, Barry J. Cooper. 2005. Risk management: developing a framework for a water authority. Management of
Environmental Quality: An International Journal 16:3, 235-249. [Abstract] [Full Text] [PDF]

You might also like