See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220672176
Management of risks in information technology
projects
Article in Industrial Management & Data Systems · May 2004
DOI: 10.1108/02635570410530702 · Source: DBLP
CITATIONS
READS
110
2,290
3 authors, including:
David Baccarini
Peter E.D Love
25 PUBLICATIONS 1,068 CITATIONS
535 PUBLICATIONS 9,950 CITATIONS
Curtin University
SEE PROFILE
Curtin University
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Data Science and Cost Overrun Causation on Infrastructure Projects View project
Decommissioning in the North Sea View project
All content following this page was uploaded by Peter E.D Love on 27 April 2014.
The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
Introduction
Management of
risks in information
technology projects
David Baccarini
Geoff Salm and
Peter E.D. Love
The authors
David Baccarini is at the Faculty of the Built Environment, Art
and Design, Curtin University of Technology, Perth, Australia.
Geoff Salm is at Dimension Data, West Perth, Australia.
Peter E.D. Love is at the School of Management Information
Systems, Edith Cowan University, Joondulap, Australia.
Keywords
Risk management, Project management, Information services
Abstract
Information technology (IT) projects are renowned for their high
failure rate. Risk management is an essential process for the
successful delivery of IT projects. In-depth interviews with IT
professionals from leading firms in Western Australia were
undertaken to determine how IT risks were managed in their
projects. The respondents ranked 27 IT risks in terms of likelihood
and consequences to identify the most important risks. The top
five risks, in order, were: personnel shortfalls; unreasonable
project schedule and budget; unrealistic expectations;
incomplete requirements; and diminished window of
opportunity due to late delivery of software. The respondents
overwhelmingly applied the treatment strategy of risk reduction
to manage these risks. Furthermore, these strategies were
primarily project management processes, rather than technical
processes. This demonstrates that project management is a risk
management strategy. Scope, quality management, and human
resource management were solutions applied to several risks. In
particular, managing stakeholders’ expectations is a specific risk
treatment that helps to manage several key IT risks.
Electronic access
The Emerald Research Register for this journal is
available at
www.emeraldinsight.com/researchregister
The current issue and full text archive of this journal is
available at
www.emeraldinsight.com/0263-5577.htm
Industrial Management & Data Systems
Volume 104 · Number 4 · 2004 · pp. 286-295
q Emerald Group Publishing Limited · ISSN 0263-5577
DOI 10.1108/02635570410530702
Information technology (IT) is one of the fastest
growing industries in developed countries (Hartman
and Ashrafi, 2002). IT projects can implement a
rapidly expanding range of equipment, applications,
services, and basic technologies that provide
information to support the operation, management,
analysis and decision-making functions within an
organisation (Gunton, 1993; Keen, 1994;
Hoepleman et al., 1997; Wang, 2001; Yang, 2001).
In 1999, the Standish Group International study of
7,400 IT projects revealed that 34 per cent were late
or over budget, 31 per cent were abandoned, scaled
back or modified, and only 24 per cent were
completed on time and on budget (Cunningham,
1999). Examples of high profile IT project failures
reported in the literature include the American
Airlines Corporation AMR Information Services
(AMRIS), London Ambulance System, the Wessex
Health Service RISP (Regional Information Systems
Plan, London Stock Exchange’s Transfer and
Automated Registration of Uncertified Stock
(TAURUS) system, FoxMeyer Drug Co., Mandata
Human Resource System and the Californian State
Automated Child System (SACSS) (Sauer, 1993;
Beynon-Davis, 1995; Remenyi, 1999; Willcocks and
Graeser, 2001). One consistent factor influencing
project outcomes are the various risks associated
with initiating and implementing IT projects (Jiang
and Klein, 2001; Willcocks and Graeser, 2001). In
particular, the OTR Group (1992) found that only
30 per cent of organisations applied risk analysis in
their IT investment and project management
processes. Likewise, Willcocks (1996) found
organisations undertook little formal risk analysis,
except when undertaking financial calculations.
Evidence indicates that risks in IT projects are not
effectively managed and, as a results their lack of
identification and management during a project’s
life-cycle can contribute to their failure (Willcocks
and Griffiths, 1997; Hedelin and Allwood, 2002).
Given the high failure rates associated with IT
projects, it is prudent for organisations to improve
their ability to manage their IT risks so that projects
can be delivered successfully (Gobeli et al., 1998;
Willcocks and Graeser, 2001; Jiang and Klein, 2001;
Hartman and Ashrafi, 2002). In this paper, those IT
project risks considered most important in terms of
their likelihood and consequences and specific risk
treatment strategies that can be used to manage IT
project risks are identified by practising IT project
managers in Australia. The findings presented will
enable IT project managers to better understand the
key risks in their projects and appropriate risk
treatment strategies to manage these risks. While the
research was conducted in an Australian context, it is
envisaged that the research outcome would be widely
286
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
applicable in other locations. Prior to the
presentation of the research, a review of IT project
risk management, in particular the range of risks and
the options for their management, are presented.
Risks in IT projects
Identifying the risks associated with the
implementation of IT can be a major challenge for
managers, as there are numerous ways in which it
can be described and categorised. Risks vary in
nature, severity and consequence, so it is
important those that are considered to be highlevel risks are identified, understood and managed.
Of the most common IT risks, 27 have been
identified from the literature. Each is described
below and structured into the following categories
(Standards Australia, 1999):
(1) Commercial and legal relationships:
.
Inadequate third party performance. The
contractor selected is not fit for the
purpose of the project. The contractor is
unable to provide a solution that meets
time, cost, quality and performance
objectives (Krasner, 1998).
.
Litigation in protecting intellectual property.
Inadequate protection of software at the
start of the project results in competitors
taking advantage through copying,
resulting in high litigation cost, and loss of
market potential (Krasner, 1998).
.
Friction between clients and contractors.
Personal antagonism or enmity can occur
between clients and software contractors as
a result of misunderstandings,
unanticipated changes in the scope of the
contract, missed or delayed delivery, or
some other item of dispute that polarises
clients and contractors into opposing
camps (Jones, 1993).
(2) Economic circumstances:
.
Changing market conditions. Business return
on investment in IT can be eroded owing
to changing consumer market conditions
or advancements in software engineering
(Jones, 1993; King, 1994).
.
Harmful competitive actions. Competitors
may build software solutions more quickly,
with greater functionality at cheaper cost,
and aggressively deploy the final product
within the same market space (Thomsett,
1989; Jones, 1993).
.
Software no longer needed. Software is
developed that is prematurely terminated
because its value or impact exceeds what
management are prepared to absorb
(Engming and Hsieh, 1994).
(3) Human behaviour:
.
Personnel shortfalls. Inability to complete
work assigned owing to insufficient staff
(Abdel-Hamid, 1989; Abdel-Hamid and
Madnick, 1991; Engming and Hsieh, 1994).
.
Poor quality of staff. Standard of work is
poor owing to lack of ability, training,
motivation and experience of staff
Management of risk in IT projects
Every human endeavour involves risk (Wider and
Davis, 1998). Projects are unique undertakings
which involve a degree of uncertainty and are
inherently risky (Chapman, 1998; Conroy and
Soltan, 1998; Mak et al., 1998; PMI, 2000;
Czuchry and Yasin, 2003). Risk in projects can be
defined as the chance of an event occurring that is
likely to have a negative impact on project
objectives and is measured in terms of likelihood
and consequence (Wideman, 1992; Carter et al.,
1993; Chapman, 1998). Risk management is an
essential practice in achieving the successful
delivery of IT projects (Tuman, 1993; Remenyi,
1999). More specifically, it consists of the
following processes (Standards Australia, 1999):
(1) establish the context;
(2) identify risks;
(3) analyse risks;
(4) evaluate risks;
(5) treat risks;
(6) monitor and review; and
(7) communicate and consult.
The treatment of risk involves the determination of
the most appropriate strategies for dealing with its
occurrence (Standards Australia, 1999).
According to Zhi (1994), there are four main
strategies for responding to project risks:
(1) Avoidance – not undertaking the activity that
gives rise to risk.
(2) Reduction – reduce the probability of a risk
event occurring, and/or the impact of that
event. Risk reduction is the most common of
all risk-handling strategies (Pritchard, 1997).
(3) Transfer – transfer of risk in whole or part to
another party.
(4) Retention – accept risk and therefore the
consequences should it eventuate.
McFarlan (1981) suggested that projects fail due to
lack of attention to individual project risks, aggregate
risk of portfolio of projects and the recognition that
different types of projects require different types of
management. Yet, IT risk management is either not
undertaken at all or is very poorly performed by
many, if not most organisations (Remenyi, 1999). A
reason for this is that focusing on potential problems
may be viewed as being negative. However,
management often wants to instil a positive attitude
towards the implementation of IT, as it is often
viewed as “flagship” for change and subsequent
process improvement within organizations.
287
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
(Cooper, 1993; Yoon et al., 1994). This
lack of experience can extend to hardware,
operating systems, database management
systems, and other software (Fuerst and
Cheney, 1982; Nelson and Cheney, 1987).
(4) Political circumstances:
.
Corporate culture not supportive. Corporate
culture may be project adverse owing to
other hidden agendas, factions within the
company, organisational culture under
continuous change or threat of change, and
other internal priorities. This results in
weak management support for the project
and consequential failure of not meeting
objectives (Leitheiser and Wetherbe, 1986;
Engming and Hsieh, 1994; Irani and Love,
2001).
.
Lack of executive support. Project is
disrupted from achieving its objectives
owing to management playing politics
within and between departments or
external agents (Leitheiser and Wetherbe,
1986). Furthermore, users may not
support the project if they perceive that
there is a lack of top-level management
sponsorship (Barki and Hartwick, 1989).
.
Politically-motivated collection of unrelated
requirements. Owing to political motivations
within the organisation a number of
unrelated requirements are grouped in an
all-encompassing project which becomes
difficult to manage and meet objectives
(Krasner, 1998).
(5) Technology and technical issues:
.
Inadequate user documentation. Users are
unable to fully utilise new IT as it was
intended owing to poor user
documentation (Boehm, 1989).
.
Application software not fit for purpose. There
can be a perception among users that the
software provided does not directly help
them with completing day-to-day tasks.
This can lead to low user satisfaction
(Baronas and Louis, 1988).
.
Poor production system performance. The
selected software architecture/platform
does not meet the purpose for which it was
intended, resulting in a system being
released into production which is
excessively slow or has major operational
problems (Jones, 1993; Glass, 1998).
.
Technical limitations of solution reached or
exceeded. A technical limitation is
encountered during software development
resulting in time delays to the project while
a work-around solution is determined. In
extreme cases, a solution may not be
found. The result is either cancellation of
the project or re-starting with a more viable
technical solution (Boehm, 1989; Jones,
1993).
.
Incomplete requirements. Insufficient
information has been obtained in the
analysis phase, resulting in construction of
a solution that does not meet project
objectives (Shand, 1993; Engming and
Hsieh, 1994).
.
Inappropriate user interface. The software
user interface selected or developed fails to
meet user requirements (Jones, 1993;
King, 1994).
(6) Management activities and controls:
.
Unreasonable project schedule and budget. The
project is unable to realise its objectives
owing to unrealistic restrictions placed on
the projects budget, schedule, quality or
level of performance (King, 1994; Krasner,
1998). A project failing to meet its
committed deliverables or is significantly
over budget can be terminated (Boehm,
1989; King, 1994; Turner, 1999).
.
Continuous changes to requirements by client.
Stakeholders (includes users) continuously
make changes to software functionality
throughout the project life-cycle (Jones,
1993; King, 1994; Clancy, 1994).
.
Lack of agreed-to user acceptance testing and
signoff criteria. The project close-out can be
delayed owing to an unclear understanding
of what constitutes sign-off and final
solution delivery (Boehm, 1989).
.
Failure to review daily progress. Manager
fails to review the progress of daily
deliverables resulting in project slippage
(Clancy, 1994; Yourdon, 1996).
.
Lack of single point accountability. It is
typical of large software projects to have
many team leaders but no single point of
responsibility for deliverables, resulting in
the project failing to meet its objectives
(Fuerst and Cheney, 1982; Thomsett,
1995).
.
Poor leadership. The project manager and/
or steering committee is not committed to
solving problems and providing direction
to the project team (King, 1994; Clancy,
1994).
.
Developing wrong software functionality.
Design and construction of software may
not meet the purpose for which it is
intended (Boehm, 1989).
.
Lack of formal change management process.
Project progress is hindered owing to ad
hoc changes to system specification without
a formal review of technical and project
impact (Jones, 1993; Davis and Olson,
1984; Cunningham, 1999).
288
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
(7) Individual activities:
.
Gold plating (over specification). The team is
focussed on analysing and generating
excessive levels of detail losing sight of the
project’s objectives (Boehm, 1989; Turner,
1999; Cunningham, 1999).
.
Unrealistic expectations (salesperson over sells
product). Items promised for delivery to
individuals by the vendor may be over sold
and unrealistic (Maish, 1979; Ginzberg,
1981; Thomsett, 1995).
availability and the researcher’s belief in their
suitability for inclusion in the study. This sample
selection was based on the following parameters:
.
Project managers actively involved in software
development projects with a minimum of two
years’ experience.
.
Divergent software projects including clientbased object-oriented applications, clientserver PC solutions, Web development,
mainframe-based applications, and personal
digital assistant technologies.
.
Private and public sector companies and
corporations within the Perth metropolitan
area, ranging in size from four employees to
several hundred and with business experience
extending from two years to more than 77 years.
A wide and diverse range of IT project risks have
been identified. However, a ranking of the most
serious risks is needed so that they can be
managed, if they should eventuate. In addition,
types of risk treatment options are needed by IT
project managers to manage risks that could hinder
project performance. There are two processes
within a project (PMI, 2000; Thomsett, 2001):
(1) Project management processes. These describe,
organise and complete the work of the project.
The project management processes are
applicable to most projects and include the
management of scope, cost, time, quality, risk
communications, human resources, and
procurement.
(2) Product processes. These are the technical
processes that specify and create the project’s
product and vary with the nature of the
project, e.g. construction, information
systems, events, and new product
development. Technical management requires
a detailed understanding of the technical
processes of the product, and involves the
provision of expert assistance to the technical
team and the detailed quality assurance of the
technical deliverables.
The range of risk described previously can affect
either of these processes.
Research methodology
The research sample selected for the study
consisted of IT professionals from the State of
Western Australia, and was derived from a
combination of purposive and snowball sampling.
Purposive sampling allows the researcher to select
suitable respondents who have the knowledge of
the research topic so that it would be of most
benefit to the study exercise (Sarantakos, 1998).
Snowball sampling begins with asking a few
respondents to recommend others who would be
able to add value to the research and are
subsequently interviewed (Sarantakos, 1998).
This allows the best respondents to be selected
based on their knowledge of the topic, their
Data were obtained by means of structured
interviews. The research used a combined research
methodology of quantitative (rating risks) and
qualitative questions (risk treatment strategies).
All but two respondents allowed the interviews to
be taped. All taped interviews were fully
transcribed. The questionnaire was pre-tested on
two project managers, who had over 30 years of
collective experience in IT projects, and minor
amendments made. Following the transcription of
all responses, each qualitative question was
analysed and responses were sorted into themes.
This process is a valid way of drawing conclusions
from the data collected (Miles and Huberman,
1993). The research instrument used in the
interviews contained the following sections:
.
Demographic information. This was
background and experience of respondents.
.
Rating risks. A list of 27 risks, derived from the
literature, was provided to the respondents who
were asked to rate each risk in terms of
likelihood (high/medium/low) and
consequence (high/medium/low). These
responses were converted into numeric values
to allow ranking of risks. The values allocated
were: probability values: high ¼ 3,
medium ¼ 2, low ¼ 1; consequence values:
high ¼ 5; medium ¼ 3; low ¼ 1. The nonlinear values for consequences reflect
organisations’ typical desire to avoid highimpact risks (PMI, 2000). Research shows that
the severity of the potential consequences of a
risk produces a greater concern than its
probability in evaluating the overall level of risk
(Kahneman and Tversky, 1982). For example,
a low-probability/high-consequence risk is
typically considered as being higher than a
high-probability/low-consequence risk. The
score for each risk was calculated as follows:
((probability*consequence*percentage value
of respondents selecting this combination).
289
.
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
Risk treatment. Each respondent who rated a
risk as medium or high for both likelihood and
consequences was requested to describe
suitable actions to manage the risk.
A sample of 18 IT personnel was selected,
dominated by IT project managers. Each of the IT
project managers was invited to rank each of the
listed risks and offer treatment strategies. Opinions
about risk in IT projects were also obtained.
Results and discussion
The sample had a mean of ten years’ work
experience which implies that they had
considerable knowledge of the IT project
management process. Key project risks and
treatment strategies ranked by respondents are
presented and discussed below.
Key IT project risks
One of the objectives of this study was to identify IT
project risks considered most important in terms of
their likelihood and consequences. Table I presents
the scores and consequent ranking for the 27 risks
identified in the literature. Here, three dominant
risk ratings emerge of all responses: high
probability/high consequence (23 per cent),
medium probability/high consequence (19 per
cent), and low probability/high consequence (18
per cent). Therefore, 60 per cent of IT risks have
high consequences. This suggests that IT projects
are high-risk ventures and perhaps contributes
towards their high failure rate. It is significant that
“personnel shortfalls” and “unrealistic schedule
and budget” have identified as the primary causes of
risk in the literature (Boehm, 1989). Considering
the findings presented in Table I the project
manager can reasonably expect these particular
risks to exist and have high consequences.
Therefore, the project manager must have effective
project management processes in place:
.
The inability to complete work assigned owing
to insufficient staff should be managed by
human resource management and
procurement management. Today, many
organisations are flat and lean, with many
competencies outsourced, so it is not
unexpected that personnel shortfalls are the
highest ranked risk.
.
The risk of unreasonable schedule and budget
needs to be managed by a combination of time
and cost planning to verify what is a
reasonable baseline; integration management
in terms of achieving the appropriate balance
between time, cost and scope/quality; and
client expectations management to ensure that
the client is made aware of the effect of
unreasonable schedule and budget. It is not
unexpected that unrealistic budget and
schedule is ranked as the second highest risk,
as it reflects the perennial tension within
projects to balance the triple constraints.
In Table I, it is worth noting that two other risks
were highly ranked by the literature and this
research: “continuous changes to requirements by
the client” and “poor production system
performance”. The project management
implications for managing these risks are:
.
Continuous changes to requirements by the client
– this requires change control process for
scope and quality management.
.
Poor production system performance – interestingly,
the treatments for this risk are a combination of
both project management and product processes.
For example, developing and implementing
testing can be viewed both as a technical process
and also a quality control process.
The risks ranked third, fourth and fifth in this
survey have not been ranked highly in comparison
to previous studies (e.g. Boehm, 1989):
.
Unrealistic expectations. It is only in more
recent times that meeting client expectations
has been emphasised as a key criterion for
project success (e.g. PMI, 2000).
Consequently, the risk of unrealistic
expectations has grown in importance and
needs to be managed by quality, scope and
communications management.
.
Incomplete requirements. There is an acute
awareness nowadays of the importance of fully
defining clients’ requirements early in the project
to help achieve project success. Therefore, it is
not surprising that incomplete requirements is
seen as an important risk, requiring scope,
quality and communications management.
.
Diminished window of opportunity owing to late
delivery of software. A critical issue with many
projects nowadays is the need to reach the
market before competitors. Consequently,
missing a window of opportunity is a high risk
and requires good time management. This
was not a high-ranking risk by Boehm (1989)
when speed to market was of lesser
importance compared to today’s relatively
turbulent and dynamic markets.
Risk treatment strategies
The respondents were asked to describe what
strategies they would take to manage risks that they
rated as medium or high for both likelihood and
consequences. Table II shows the responses, which
provide a rich and valuable array of risk treatment
strategies (the results record responses supported
by at least four of the 18 respondents, i.e. 22+ per
cent). It shows that for approximately half the risks
290
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
Table I IT risk rankings
IT risks
Personnel shortfalls (insufficient human resources)
Unreasonable project schedule and budget
Unrealistic expectations (salesperson over sold
product)
Incomplete requirements
Diminished window of opportunity due to late
delivery of software
Continuous changes to requirements by client
Poor production system performance
Poor leadership (project manager and/or steering
committee)
Inadequate user documentation100
Lack of agreed-to user acceptance testing and
signoff criteria
Inadequate third party performance (contractor
not fit for purpose)
Politically motivated collection of unrelated
requirements
Lack of executive support
Lack of single point accountability
Corporate culture not supportive
Technical limitations of solution reached or
exceeded
Inappropriate user interface
Litigation in protecting intellectual property
Application (software) not fit for purpose
Gold plating (over specification)
Friction between clients and contractors
Lack of formal change management process
Developing wrong software functionality
Poor quality of staff
Harmful competitive actions
Software no longer needed
Failure to review daily progress
Distribution as a % of the total
Percentage of respondents
MPHC
MPMC MPLC
LPHC
17
6
0
6
28
6
6
6
LPMC
0
0
LPLC
6
0
Total
%
100
100
Score
1,233
1172
6
11
0
11
6
0
100
100
1,128
1,022
0
0
0
0
17
22
0
6
0
6
0
6
100
100
100
1,006
922
893
0
17
0
0
28
0
11
0
0
17
100
100
893
889
23
12
0
18
12
0
100
888
0
33
11
0
17
11
0
100
879
6
0
0
12
0
0
6
0
11
29
0
6
22
6
6
18
0
0
0
0
17
34
39
12
17
6
11
18
0
6
6
12
100
100
100
100
833
793
783
737
0
0
0
11
6
17
6
11
0
0
6
17
7
0
0
0
0
6
0
0
0
0
0
0
6
1
22
22
17
28
28
11
22
22
11
7
22
0
19
11
28
11
0
17
28
17
0
22
7
6
22
12
0
6
0
0
0
11
0
0
6
0
6
6
1
28
6
11
39
6
6
28
40
33
7
28
6
18
17
22
22
11
11
11
17
11
6
30
6
11
11
6
0
17
6
17
6
6
6
11
20
28
33
8
100
100
100
100
100
100
100
100
100
100
100
100
100
733
733
706
693
689
661
640
611
606
480
389
393
HPHC
67
46
HPMC
0
0
HPLC
0
0
33
39
17
17
0
0
28
17
0
6
0
0
39
39
17
6
11
6
0
17
0
17
6
33
33
6
6
22
28
0
33
0
0
39
6
23
12
0
17
0
28
18
33
23
17
17
22
6
11
11
6
0
11
20
0
0
23
there is one strongly favoured treatment, whereas
the remaining risks have two or more treatments
with similar support. This indicates that there is
not one solution for managing any particular risk
and the project manager must be aware of the
possible need to implement two or more
treatments for one risk. Table III categorises, for
the top ten ranked risk, the treatment strategy into
avoidance, reduction, transfer or acceptance and
indicates that risk:
.
reduction is the overwhelmingly favoured
treatment strategy, which supports the literature;
.
acceptance was not proposed as a treatment
strategy, perhaps because it is typically used
for low risks; and
.
transfer was not proposed as a treatment
strategy. This may be because IT project
managers are given direct responsibility to
manage the risk using in-house organisational
resources.
There are two processes within a project; namely,
project management and product (PMI, 2000).
The former describes, organises and completes the
work of the project; while the latter relates to the
technical processes that specify and create the
project’s product and vary with the nature of the
project. Table III demonstrates that the majority of
treatment strategies are related to project
management processes rather that product
processes. This supports the observation that most
software problems are of a management,
organisational or behavioural nature, not technical
(Hartman and Ashrafi, 2002). The survey provides
a valuable insight, in that it highlights the
importance of project management as the key
solution to managing many project risks. In
particular, Table III also indicates that some
project management processes are risk treatments
for many high-ranked risks:
.
scope/quality management – e.g. requirements
definition, screen proposals;
.
communication management – e.g. managing
expectations, vendor relationships, liaising
with stakeholders; and
.
human resource management – e.g. plan for
personnel resources, experienced project manager.
Managing the expectations of stakeholders is a
critical risk management strategy which should be
291
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
Table II IT risk treatment strategies
Risk event
Inadequate third party performance
Litigation in protecting intellectual property
Friction between clients and contractors
Diminished window of opportunity due to late delivery of software
Harmful competitive actions
Software no longer needed
Personnel shortfalls
Poor quality of staff
Corporate culture not supportive
Lack of executive support
Politically motivated collection of unrelated requirements
Inadequate user documentation
Application (software) not fit for purpose
Poor production system performance
Technical limitations of solution reached or exceeded
Incomplete requirements
Inappropriate user interface
Unreasonable project schedule and budget
Continuous changes to requirements by the client
Lack of agreed-to user acceptance and signoff criteria
Failure to review daily progress
Lack of single point accountability
Poor leadership
Developing wrong software functionality
Lack of formal change management process
Gold plating (over specification)
Unrealistic expectations
Strategy
Screen contractors upfront
Monitor contractor performance
Retain right to remove unfit contractor
Consultative engagement
Contract conditions
Consider personal attributes
Monitor contractor performance
Manage the relationship
Sound project planning and schedule management
Manage expectations
Obtain management support
Develop customer relationship
Maintain market entry barrier
Establish sound business requirements
Manage key stakeholders
Plan for resources
Procure external parties
Plan contingency options
Change project management objectives
Assess project staff capability
Manage stakeholders
Apply political influence
Obtain executive management support
Market the project
Engage management early
Clear scope definition
Consult with key stakeholders
Develop clear requirements definition
Build documentation throughout the PLC
Assign a document writing specialist
Develop clear requirements definition
Perform group reviews
Obtain progressive signoff of milestones
Conduct comprehensive testing in near production conditions
Conduct proof of concept testing
Development conducted in near production conditions
Develop strong technical design
Obtain clear scope specification and signoff
Liaise with stakeholders
Liaise with users
Adopt standards for interface design
Make tradeoffs between cost, time and scope
Manage expectations
Enforce formal change management process
Ensure key project documentation is signed off
Consult/educate user in change management practice
Consult/train the user in test design
Monitor project daily, if required
Create a consultative environment
Project manager is held accountable
Roles and responsibilities clearly defined
Project sponsor/owner is accountable
Establish clear communication and escalation hierarchy
Appoint an experienced project manager
Establish steering committee selection process and operational guidelines
Utilise established communication and escalation hierarchy
Conduct group reviews
Develop clear requirements definition
Obtain signoffs of milestones
Implement a formal change management system
Educate users on the change management process
Monitor and review development to baseline design
Strict adherence to requirements definition
Screen proposals
Develop clear requirements definition
Manage customer expectations
Test validity of vendor claims
292
Percent
83
39
22
83
72
40
22
22
40
33
22
39
39
78
28
40
39
28
28
72
40
28
28
33
39
40
33
39
33
28
40
33
28
33
33
22
72
67
40
83
33
72
28
78
40
22
100
33
22
33
33
28
22
33
39
33
78
39
33
78
22
40
33
33
33
28
28
1
Personnel shortfalls
2
Unreasonable project schedule and budget
3
Unrealistic expectations
3
Incomplete requirements
4
Diminished window of opportunity due to late delivery of software
6
Continuous changes to requirements by client
7
Poor production system performance
8
Poor leadership
9
Inadequate user documentation
Plan for resources
Procure external parties
Plan contingency options
Change PM objectives
Make tradeoffs between cost, time and scope
Manage expectations
Screen proposals
Clear requirements definition
Manage customer expectations
Test validity of vendor claims
Clear scope specification and sign-off
Liaise with stakeholders
Sound planning and schedule management
Manage expectations
Obtain management support
Formal change management process
Ensure key project documentation is signed off
Consult/educate user in change management practice
Comprehensive testing in near production conditions
Conduct proof of concept testing
Development conducted in near production conditions
Appoint an experienced project manager
Committee selection process and operational guidelines
Utilise communication and escalation hierarchy
Monitor leadership effectiveness
Clear requirements definition
Build documentation throughout project life-cycle
Assign a document writing specialist
Consult/train the user in test design
10
Lack of agreed user acceptance testing and sign-off criteria
Percentage
Treatment
Project management (PMBOK)
40
39
28
28
72
28
33
33
28
28
67
40
40
33
22
78
33
22
33
33
22
33
39
33
22
39
33
28
40
Reduction
Transfer
Reduction
Reduction
Retention
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Transfer
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Reduction
Retention
Reduction
Reduction
Transfer
Reduction
Time/human resources
Procurement
Risk
Integration/scope
Integration/scope
Quality/communication
Scope/quality
Scope/quality
Quality/communication
Quality
Scope/quality
Communication
Time
Quality/communication
Human resources
Scope/quality
Quality
Communication
Quality/technical
Quality/technical
Quality/technical
Human resources
Human resources
Communication/human resources
Quality/human resources
Scope/quality
Quality/technical
Human resources
Quality/communication
Industrial Management & Data Systems
Risk treatment strategies
Volume 104 · Number 4 · 2004 · 286-295
293
Risk
Management of risks in IT projects
Rank
David Baccarini, Geoff Salm and Peter E.D. Love
Table III Top ten risks treatment and project management processes
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
addressed. Project success in IT projects is
increasingly being defined in terms of not only
achieving time, cost and quality objectives, but also
meeting stakeholders’ expectations; in particular,
the client/user (e.g. Bennatan, 2002). The
intangible and complex nature of IT projects
makes expectations management difficult, but it is
necessary for managing several risks that occur in
IT projects.
Conclusion
A challenge facing IT project managers is to
identify potential risks and adopt appropriate
actions. The literature review identifies a list of 27
risks in IT projects. The two highest ranked risks,
both in the literature and this survey, were
“personnel shortfalls” and “unrealistic schedule
and budget”. Furthermore, three other risks were
prevalent in this research:
(1) unrealistic expectations;
(2) incomplete requirements; and
(3) diminished window of opportunity owing to
late delivery of software.
This strongly indicates that IT project managers
should be highly sensitive to these risks on their
projects. The overwhelming treatment strategy is
risk reduction using project management
processes. Prevalent project management
processes for high ranked risks are scope/quality
management, stakeholder management and
human resource management. In particular,
managing stakeholders’ expectations will provide
a solution to managing several high-ranking IT
project risks. The research found that most of the
strategies for managing risks entail the application
of project management. So IT project managers
need to be aware that project management is the
key strategy for managing risks, and very few IT
risks have to do with technical issues. The
propensity of IT project managers to become
immersed in technical aspects of their projects
means that the effective management of IT risks
will be impeded. The findings reported can be
used as a checklist of important risks and a rich
and diverse range of treatment strategies that IT
project managers should consider for effective
risk management. Understanding the critical role
of project management as a key and
encompassing strategy for managing IT project
risks is a necessity for project success. In
particular, expectations management is a specific
strategy that would provide efficient and effective
risk management.
References
Abdel-Hamid, T.K. (1989), “The dynamics of software project
staffing: a systems dynamics based simulation approach”,
IEEE Transactions in Software Engineering, Vol. 15,
pp. 109-19.
Abdel-Hamid, T.K. and Madnick, S.E. (1991), Software Project
Dynamics: An Integrated Approach, Prentice-Hall,
Englewood Cliffs, NJ.
Barki, H. and Hartwick, J. (1989), “Rethinking the concept of
user involvement”, MIS Quarterly, Vol. 13 No. 1, pp. 43-63.
Baronas, A.M.K. and Louis, M.R. (1988), “Restoring a sense of
control during implementation: how user involvement
leads to system acceptance”, MIS Quarterly, Vol. 12 No. 1,
pp. 111-23.
Bennatan, E.M. (2002), On Time Within Budget: Software Project
Management Practices and Techniques, Wiley, New York,
NY.
Beynon-Davis, P. (1995), “Information systems failure: the case
of the London Ambulance Service’s computer aided
despatch project”, European Journal of Information
Systems, Vol. 4, pp. 171-84.
Boehm, B.W. (1989), Software Risk Management, IEEE,
Computer Society Press, Washington, DC.
Carter, B., Hancock, T., Morin, J. and Robins, N. (1993),
Introducing RISKMAN: The European Project Risk
Management Methodology, NCC Blackwell, Oxford.
Chapman, R.J. (1998), “Effectiveness of working group risk
identification and assessment techniques”, International
Journal of Project Management, Vol. 16 No. 6, pp. 333-43.
Clancy, T. (1995), “Chaos – IT development projects”,
available at: www.standishgroup.com/msie.htm
(accessed 24 August 2000).
Conroy, G. and Soltan, H. (1998), “ConSERV, a project specific
risk management concept”, International Journal of
Project Management, Vol. 16 No. 6, pp. 353-66.
Cooper, K.G. (1993), “The rework cycle: benchmarking for the
project manager”, Project Management Journal, Vol. 24
No. 1, pp. 17-22.
Cunningham, M. (1999), “It’s all about the business”, Inform,
Vol. 13 No. 3, p. 83.
Czuchry, A.J. and Yasin, M.M. (2003), “Managing the project
management process”, Industrial Management & Data
Systems, Vol. 103 No. 1, pp. 39-46.
Davis, G.B. and Olson, M.H. (1984), Management Information
Systems, Conceptual Foundations, Structure, and
Development, 2nd ed., McGraw-Hill, New York, NY.
Engming, L. and Hsieh, C.T. (1994), “Seven deadly risk factors of
software development projects”, Journal of Systems
Management, Vol. 36 No. 6, pp. 38-42.
Fuerst, W.L. and Cheney, P.H. (1982), “Factors affecting the
perceived utilization of computer-based decision support
systems in the oil industry”, Decision Sciences, Vol. 13
No. 3, pp. 443-69.
Ginzberg, M.J. (1981), “Early diagnosis of MIS implementation
failure: promising results and unanswered questions”,
Management Science, Vol. 27 No. 3, pp. 349-78.
Glass, R.L. (1998), Software Runaways, Prentice-Hall and
Yourdon Press, Englewood Cliffs, NJ.
Gobeli, D.H., Koenig, H.F. and Bechinger, I. (1998), “Managing
conflict in software development teams: a multilevel
analysis”, Journal of Product Innovation Management,
Vol. 14 No. 4, pp. 323-34.
Gunton, T. (1993), A Dictionary of Information Technology and
Computer Science, 2nd ed., TJ Press, Cornwall.
Hartman, F. and Ashrafi, R.A. (2002), “Project management in
the information systems and information technologies
294
Management of risks in IT projects
Industrial Management & Data Systems
David Baccarini, Geoff Salm and Peter E.D. Love
Volume 104 · Number 4 · 2004 · 286-295
industries”, Project Management Journal, Vol. 33 No. 3,
pp. 4-14.
Hedelin, L. and Allwood, C.M. (2002), “IT and strategic decisionmaking”, Industrial Management & Data Systems, Vol. 102
No. 3, pp. 125-39.
Hoepleman, J.P., Mayer, R. and Wagner, J. (1997), Elsevier’s
Dictionary of Information Technology, Elsevier Science,
Amsterdam.
Irani, Z. and Love, P.E.D. (2001), “The propagation of technology
management taxonomies for evaluating information
systems”, Journal of Management Information Systems,
Vol. 17 No. 3, pp. 161-77.
Jiang, J.J. and Klein, G. (2001), “Software project risks and
development focus”, Project Management Journal, Vol. 32
No. 1, pp. 3-9.
Jones, C. (1993), Assessment and Control of Software Risks,
Prentice-Hall, Englewood Cliffs, NJ.
Kahneman, D. and Tversky, A. (1982), “The psychology of
preferences”, Scientific American, January, pp. 160-73.
Keen, P.G.W. (1994), Every Manager’s Guide to Information
Technology: A Glossary of Key Terms and Concepts for
Today’s Business Leader, 2nd ed., Harvard Business School
Press, Boston, MA.
King, J. (1994), “Sketchy plans, politics stall software
development”, Computer World, Vol. 29 No. 24, p. 81.
Krasner, H. (1998), “Looking over the legal edge of unsuccessful
software projects”, Cutter IT Journal, Vol. 11 No. 3,
pp. 11-22.
Leitheiser, R.L. and Wetherbe, J.C. (1986), “Service support
levels: an organized approach to end-user computing”,
MIS Quarterly, Vol. 10 No. 3, pp. 337-9.
McFarlan, F.W. (1981), “Portfolio approach to information
systems”, Harvard Business Review, Vol. 142, SeptemberOctober, pp. 142-50.
Maish, A.M. (1979), “A user’s behaviour toward his MIS”,
MIS Quarterly, Vol. 3 No. 1, pp. 39-42.
Mak, S., Wong, J. and Picken, D. (1998), “The effect on
contingency allowances of using risk analysis in capital
cost estimating: a Hong Kong case study”, Construction
Management and Economics, Vol. 16 No. 6, pp. 615-9.
Miles, M.B. and Huberman, A.M. (1993), Qualitative Data
Analysis: An Expanded Source Book, Sage, Beverly Hills,
CA.
Nelson, R. and Cheney, P. (1987), “Training end-users: an
exploratory study”, MIS Quarterly, Vol. 11 No. 3,
pp. 437-49.
Project Management Institute (PMI) (2000), Project
Management Body of Knowledge (PMBOK) – 2000
Exposure Draft, PMI, Pennsylvania, PA.
Pritchard, C.L. (1997), Risk Management – Concepts and
Guidance, ESI International, Arlington, VA.
Remenyi, D. (1999), Stop IT Project Failures through Risk
Management, Computer Weekly Series, Butterworth
Heinemann, Oxford.
Sarantakos, S. (1998), Social Research, 2nd ed., Macmillan,
Melbourne.
Sauer, C. (1993), Why Information Systems Fail: A Case Study
Approach, Alfred Waller, Henley-on-Thames.
Shand, R.M. (1993), “User manuals as project management
tools: part 1 – theoretical background”, IEEE Transactions
on Professional Communication, Vol. 37 No. 2, pp. 74-80.
Standards Australia (1999), Risk Management, AS/NZS
3360:1999, Standards Australia, Strathfield.
Thomsett, R. (1989), Third Wave Project Management – A
Handbook for Managing Complex Information Systems for
the 1990s, Yourdon Press, Englewood Cliffs, NJ.
Thomsett, R. (1995), Project Pathology: Causes, Patterns and
Symptoms of Project Failure – Training Notes Project Risk
Management, Thomsett Company, London.
Thomsett, R. (2001), “Extreme project management”, Executive
Report Abstracts, Vol. 2 No. 2.
Tuman, J. (1993), “Project management decision-making and
risk management in a changing corporate environment”,
Project Management Institute 24th Annual Seminar/
Symposium, Vancouver, 17-19 October, pp. 733-9.
Turner, R.J. (1999), The Handbook of Project Based Management,
2nd ed., McGraw-Hill, Cambridge.
Wang, S. (2001), “Designing information systems for
e-commerce”, Industrial Management and Data Systems,
Vol. 101 No. 6, pp. 304-15.
Wideman, R.M. (1992), Project and Program Risk Management –
A Guide to Managing Risks and Opportunities, Project
Management Institute, Pennsylvania, PA.
Wider, C. and Davis, B. (1998), “False starts – strong finishes”,
Information Week, Vol. 7 No. 11, pp. 41-53.
Willcocks, L. (1996), Investing in Information Systems:
Evaluation and Management, Thomson Business Press/
Chapman & Hall, London.
Willcocks, L. and Griffiths, C. (1997), “Management and risk in
major information technology projects”, in Willcocks, L.,
Feeny, D. and Iseli, G. (Eds), Managing IT as a Strategic
Resource, McGraw-Hill, Maidenhead.
Willcocks, L. and Graeser, J. (2001), Delivering IT and E-business
Value, Computer Weekly Series, Butterworth and
Heinemann, Oxford.
Yang, Y.H. (2001), “Software quality management and ISO 9000
implementation”, Industrial Management & Data
Systems, Vol. 101 No. 7, pp. 329-38.
Yoon, Y., Guimaraes, T. and O-Neal, Q. (1994), “Exploring the
factors associated with expert systems success”, MIS
Quarterly, Vol. 19 No. 1, pp. 83-106.
Yourdon, E. (1996), “Tools and processes for death march
projects”, Cutter IT Journal – Application Development
Strategies, Vol. 8 No. 12, pp. 27-35.
Zhi, H. (1994), “Risk management for overseas construction
projects”, International Journal of Project Management,
Vol. 13 No. 3, pp. 231-7.
Further reading
Bailey, R. (1996), “Approving system projects. Eight questions an
executive should ask”, PM Network, Vol. 10 No. 5,
pp. 21-4.
Gibbs, W. (1994), “Software’s chronic crisis”, Scientific
American, Vol. 271 No. 3, pp. 86-95.
Ward, J.A. (1994), “Productivity through project management:
controlling the project variables”, Information Systems
Management, Vol. 11 No. 1, pp. 16-21.
295