Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 14, Issue 49;   December 3, 2014: Ten Approaches to Managing Project Risks: III

Ten Approaches to Managing Project Risks: III

by

Last updated: August 8, 2018

Project risk management strategies are numerous, but these ten strategies are among the most common. Here are the last three of the ten strategies in this little catalog.
Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944

Phoenix caissons being towed to form a Mulberry harbor off Normandy, June 1944. The Normandy coast has few natural harbors, and for that reason, among others, the German command regarded it as an unlikely site for a landing. They expected an assault at or near one of the harbors on the French coast, which they therefore fortified heavily. Recognizing the high risk of an attack at or near a harbor, the Allies chose to transform that risk into the risks associated with a beach landing. They then dealt with those risks, in part, by engineering artificial harbors, constructed from chains of caissons like those shown here, which they towed from the English coast and sank off the beaches of Normandy. This approach is a clear example of risk transformation. Photo courtesy U.S. Navy Naval History and Heritage Command.

In Part I and Part II, we explored five ineffective strategies and two somewhat more effective strategies for managing risk. In this Part III, we complete our little catalog with three of the more effective strategies.

Transformation
Transformation strategies entail exchanging the risk or risks in question for a different risk or risks. After the transformation, the asset at risk might be different, or it might be imperiled in a different way, or both. For example, if we're traveling from A to B, and two routes are available, Route 1 might be more congested, while Route 2 might be more hazardous. If we take Route 1 we might lose time; if we take Route 2 we might lose the vehicle and its passengers.
Slogan: "That risk vanishes if we use this alternative approach, but then we would have to deal with this other risk instead."
Advantage: If we can't deal with risk event A, but we can deal with risk event B, then we can proceed with confidence if we take an approach in which risk event A cannot occur, but risk event B might.
Danger: Dealing with risk usually entails estimation. Our estimates can be wrong, either because of the errors inherent in estimation, or because we mislead ourselves.
Compensation
In compensation strategies, we arrange that if the risk event occurs, we make up for it somehow.
Slogan: "If we take these steps, then these good things will happen if the risk materializes."
Advantage: In compensation strategies, we
arrange that if the risk event
occurs, we make up
for it somehow
Even if we can't sufficiently limit the probability or size of the loss, we can proceed with confidence, because the net value of the compensation minus the expected value of the loss is acceptable.
Danger: We might be so emotionally committed to proceeding that we overestimate the value of the compensation.
Transfer
In transfer strategies, we arrange to have some other person or organization (the counter party) bear the consequences of the risk. When the transfer is by mutual agreement, the parties usually exchange some resources as well. Purchasing insurance is an example of a risk transfer strategy.
Slogan: "If we do this, then we don't have to deal with that risk. They will."
Advantage: Transferring risk to another party can relieve us of the burden of planning for the risk. The sum of both the resources required for such planning and the expected value of the loss can exceed the cost of transferring the risk.
Danger: The counter party might not be strong enough, or ethical enough, to cover the loss. When counter parties are coerced into accepting the risk, their reliability can be dubious. Be certain that the transfer is real.

Project risk is inherently imprecise, both numerically and conceptually. By far, the greatest risk is the risk of overlooking or misunderstanding a significant risk, including this one. Ironically, I have never seen it mentioned in a risk plan. First in this series  Go to top Top  Next issue: On the Risk of Undetected Issues: I  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just . Order Now! .

Your comments are welcome

Would you like to see your comments posted here? rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

Mountain fogSeeing Through the Fog
When projects founder, we're often shocked — we thought everything was moving along smoothly. Sometimes, with the benefit of hindsight, we can see that we had — or could have had — enough information to determine that trouble was ahead. Somehow it was obscured by fog. How can we get better at seeing through the fog?
Apollo 13 Shoulder PatchFilms Not About Project Teams: I
Here's part one of a list of films and videos about project teams that weren't necessarily meant to be about project teams. Most are available to borrow from the public library, and all are great fun.
Mess line, noon, Manzanar Relocation Center, California, 1943Remote Facilitation in Synchronous Contexts: II
Facilitators of synchronous distributed meetings — meetings that occur in real time, via telephone or video — encounter problems that facilitators of face-to-face meetings do not. Here's Part II of a little catalog of those problems, and some suggestions for addressing them.
The Samuel Morse Telegraph ReceiverRemote Facilitation in Synchronous Contexts: III
Facilitators of synchronous distributed meetings (meetings that occur in real time, via telephone or video) can make life much easier for everyone by taking steps before the meeting starts. Here's Part III of a little catalog of suggestions for remote facilitators.
An apple and a skyscraper full of windowsHow We Waste Time: II
We're all pretty good at wasting time. We're also fairly certain we know when we're doing it. But we're much better at it than we know. Here's Part II of a little catalog of time wasters, emphasizing those that are outside — or mostly outside — our awareness.

See also Project Management and Problem Solving and Creativity for more related articles.

Forthcoming issues of Point Lookout

An abandoned railwayComing August 21: Perfectionism and Avoidance
Avoiding tasks we regard as unpleasant, boring, or intimidating is a pattern known as procrastination. Perfectionism is another pattern. The interplay between the two makes intervention a bit tricky. Available here and by RSS on August 21.
A dog playing catch with a discAnd on August 28: Playing at Work
Eight hours a day — usually more — of meetings, phone calls, reading and writing email and text messages, briefing others or being briefed, is enough to drive anyone around the bend. To re-energize, to clarify one's perspective, and to restore creative capacity, play is essential. Play at work, I mean. Available here and by RSS on August 28.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Race to the South Pole: Lessons in Leadership
On 14The Race to the South Pole: Lessons in Leadership December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. But to organizational leaders, business analysts, project sponsors, and project managers, the story is fascinating. We'll use the history of this event to explore lessons in leadership and its application to organizational efforts. A fascinating and refreshing look at leadership from the vantage point of history. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.