Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 14, Issue 49;   December 3, 2014: Ten Approaches to Managing Project Risks: III

Ten Approaches to Managing Project Risks: III

by

Project risk management strategies are numerous, but these ten strategies are among the most common. Here are the last three of the ten strategies in this little catalog.
Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944

Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944. The Normandy coast has few natural harbors, and for that reason, among others, the German command regarded it as an unlikely site for a landing. They expected an assault at or near one of the harbors on the French coast, which they therefore fortified heavily. Recognizing the high risk of an attack at or near a harbor, the Allies chose to transform that risk into the risks associated with a beach landing. They then dealt with those risks, in part, by engineering artificial harbors, constructed from chains of caissons like those shown here, which they towed from the English coast and sank off the beaches of Normandy. This approach is a clear example of risk transformation. Photo courtesy U.S. Navy Naval History and Heritage Command.

In Part I and Part II, we explored five ineffective strategies and two somewhat more effective strategies for managing risk. In this Part III, we complete our little catalog with three of the more effective strategies.

Transformation
Transformation strategies entail exchanging the risk or risks in question for a different risk or risks. After the transformation, the asset at risk might be different, or it might be imperiled in a different way, or both. For example, if we're traveling from A to B, and two routes are available, Route 1 might be more congested, while Route 2 might be more hazardous. If we take Route 1 we might lose time; if we take Route 2 we might lose the vehicle and its passengers.
Slogan: "That risk vanishes if we use this alternative approach, but then we would have to deal with this other risk instead."
Advantage: If we can't deal with risk event A, but we can deal with risk event B, then we can proceed with confidence if we take an approach in which risk event A cannot occur, but risk event B might.
Danger: Dealing with risk usually entails estimation. Our estimates can be wrong, either because of the errors inherent in estimation, or because we mislead ourselves.
Compensation
In compensation strategies, we arrange that if the risk event occurs, we make up for it somehow.
Slogan: "If we take these steps, then these good things will happen if the risk materializes."
Advantage: In compensation strategies, we
arrange that if the risk event
occurs, we make up
for it somehow
Even if we can't sufficiently limit the probability or size of the loss, we can proceed with confidence, because the net value of the compensation minus the expected value of the loss is acceptable.
Danger: We might be so emotionally committed to proceeding that we overestimate the value of the compensation.
Transfer
In transfer strategies, we arrange to have some other person or organization (the counter party) bear the consequences of the risk. When the transfer is by mutual agreement, the parties usually exchange some resources as well. Purchasing insurance is an example of a risk transfer strategy.
Slogan: "If we do this, then we don't have to deal with that risk. They will."
Advantage: Transferring risk to another party can relieve us of the burden of planning for the risk. The sum of both the resources required for such planning and the expected value of the loss can exceed the cost of transferring the risk.
Danger: The counter party might not be strong enough, or ethical enough, to cover the loss. When counter parties are coerced into accepting the risk, their reliability can be dubious. Be certain that the transfer is real.

Project risk is inherently imprecise, both numerically and conceptually. By far, the greatest risk is the risk of overlooking or misunderstanding a significant risk, including this one. Ironically, I have never seen it mentioned in a risk plan. First in this series  Go to top Top  Next issue: On the Risk of Undetected Issues: I  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just USD 19.95. Order Now! .

Your comments are welcome

Would you like to see your comments posted here? rbrenYrgSJxVKnKAfTPHUner@ChacYmyoHYeIbPrvOcNeoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

A cup of coffeeDubious Dealings
Negotiating contracts with outsourcing suppliers can present ethical dilemmas, even when we try to be as fair as possible. The negotiation itself can present conflicts of interest. What are those conflicts?
Edward Bernays, nephew of Sigmund Freud and an early pioneer in the field of Public RelationsCommunication Traps for Virtual Teams: I
Virtual teams encounter difficulties that rarely confront face-to-face teams. What special challenges do they face, and what can we do about them?
Vortex cores about an F18 fighter jetGuidelines for Sharing "Resources"
Often, team members belong to several different teams. The leaders of teams whose members have divided responsibilities must sometimes contend with each other for the efforts and energies of the people they share. Here are some suggestions for sharing people effectively.
A stretch of the Amazon rain forest showing storm damageUnnecessary Boring Work: II
Workplace boredom can result from poor choices by the person who's bored. More often boredom comes from the design of the job itself. Here's Part II of our little catalog of causes of workplace boredom.
Darrelle Revis, cornerback in the U.S. National Football LeagueWishful Interpretation: II
Wishful "thinking," as we call it, can arise in different ways. One source is the pattern of choices we make when we interpret what we see, what we hear, or any other information we receive. Here's Part II of an inventory of ways our preferences and wishes affect how we interpret the world.

See also Project Management and Problem Solving and Creativity for more related articles.

Forthcoming issues of Point Lookout

Jeffrey Skilling, in a mug shot taken in 2004 by the United States Marshals ServiceComing May 23: Narcissistic Behavior at Work: IX
An arrogant demeanor is widely viewed as a hallmark of the narcissist. But truly narcissistic arrogance is off the charts. It's something beyond the merely annoying arrogance of a sometimes-obnoxious individual. What is narcissistic arrogance and how can we cope with it? Available here and by RSS on May 23.
The end of the line for a railroad trackAnd on May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendVvNQFVPWxTBhqloner@ChacdSnfADFQGooplOlNoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.