Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 14, Issue 49;   December 3, 2014: Ten Approaches to Managing Project Risks: III

Ten Approaches to Managing Project Risks: III

by

Project risk management strategies are numerous, but these ten strategies are among the most common. Here are the last three of the ten strategies in this little catalog.
Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944

Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944. The Normandy coast has few natural harbors, and for that reason, among others, the German command regarded it as an unlikely site for a landing. They expected an assault at or near one of the harbors on the French coast, which they therefore fortified heavily. Recognizing the high risk of an attack at or near a harbor, the Allies chose to transform that risk into the risks associated with a beach landing. They then dealt with those risks, in part, by engineering artificial harbors, constructed from chains of caissons like those shown here, which they towed from the English coast and sank off the beaches of Normandy. This approach is a clear example of risk transformation. Photo courtesy U.S. Navy Naval History and Heritage Command.

In Part I and Part II, we explored five ineffective strategies and two somewhat more effective strategies for managing risk. In this Part III, we complete our little catalog with three of the more effective strategies.

Transformation
Transformation strategies entail exchanging the risk or risks in question for a different risk or risks. After the transformation, the asset at risk might be different, or it might be imperiled in a different way, or both. For example, if we're traveling from A to B, and two routes are available, Route 1 might be more congested, while Route 2 might be more hazardous. If we take Route 1 we might lose time; if we take Route 2 we might lose the vehicle and its passengers.
Slogan: "That risk vanishes if we use this alternative approach, but then we would have to deal with this other risk instead."
Advantage: If we can't deal with risk event A, but we can deal with risk event B, then we can proceed with confidence if we take an approach in which risk event A cannot occur, but risk event B might.
Danger: Dealing with risk usually entails estimation. Our estimates can be wrong, either because of the errors inherent in estimation, or because we mislead ourselves.
Compensation
In compensation strategies, we arrange that if the risk event occurs, we make up for it somehow.
Slogan: "If we take these steps, then these good things will happen if the risk materializes."
Advantage: In compensation strategies, we
arrange that if the risk event
occurs, we make up
for it somehow
Even if we can't sufficiently limit the probability or size of the loss, we can proceed with confidence, because the net value of the compensation minus the expected value of the loss is acceptable.
Danger: We might be so emotionally committed to proceeding that we overestimate the value of the compensation.
Transfer
In transfer strategies, we arrange to have some other person or organization (the counter party) bear the consequences of the risk. When the transfer is by mutual agreement, the parties usually exchange some resources as well. Purchasing insurance is an example of a risk transfer strategy.
Slogan: "If we do this, then we don't have to deal with that risk. They will."
Advantage: Transferring risk to another party can relieve us of the burden of planning for the risk. The sum of both the resources required for such planning and the expected value of the loss can exceed the cost of transferring the risk.
Danger: The counter party might not be strong enough, or ethical enough, to cover the loss. When counter parties are coerced into accepting the risk, their reliability can be dubious. Be certain that the transfer is real.

Project risk is inherently imprecise, both numerically and conceptually. By far, the greatest risk is the risk of overlooking or misunderstanding a significant risk, including this one. Ironically, I have never seen it mentioned in a risk plan. First in this series  Go to top Top  Next issue: On the Risk of Undetected Issues: I  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just USD 19.95. Order Now! .

Your comments are welcome

Would you like to see your comments posted here? rbrenupNEFAmRjRXnOmTMner@ChacQKgGWHHpumveOAUMoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

FootprintsStatus Risk and Risk Status
One often-neglected project risk is the risk of inaccurately reported status. That shouldn't be surprising, because we often fail to report the status of the project's risks, as well. What can we do to better manage status risk and risk status?
A white shark off the California coastNine Project Management Fallacies: IV
Some of what we "know" about managing projects just isn't so. Understanding these last three of the nine fallacies of project management helps reduce risk and enhances your ability to complete projects successfully.
President Harry S. Truman, and Gen. Douglas MacArthur, meeting at Wake Island, 14 October 1950Ground Level Sources of Scope Creep
We usually think of scope creep as having been induced by managerial decisions. And most often, it probably is. But most project team members — and others as well — can contribute to the problem.
Todd Park, United States Chief Technology OfficerProjects as Proxy Targets: II
Most projects have both supporters and detractors. When a project has been approved and execution begins, some detractors don't give up. Here's Part II of a catalog of tactics detractors use to sow chaos.
Industrial robots assembling automobilesUnnecessary Boring Work: I
Work can be boring. Some of us must endure the occasional boring task, but for many, everything about work is boring. It doesn't have to be this way.

See also Project Management and Problem Solving and Creativity for more related articles.

Forthcoming issues of Point Lookout

Passing the baton in a relay raceComing January 24: Understanding Delegation
It's widely believed that managers delegate some of their own authority and responsibility to their subordinates, who then use that authority and responsibility to get their work done. That view is unfortunate. It breeds micromanagers. Available here and by RSS on January 24.
A serene mountain lakeAnd on January 31: Nine Brainstorming Demotivators: I
The quality of the output of brainstorming sessions is notoriously variable. One source of variation is the enthusiasm of contributors. Here's Part I of a set of nine phenomena that can limit contributions to brainstorm sessions. Available here and by RSS on January 31.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenbpfdqefjDWbsRvUsner@ChacHZdbPnIaeMIYlGtUoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.