8th International Conference of Modeling and Simulation - MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
“Evaluation and optimization of innovative production systems of goods and services”
CLUSTERING PROJECT RISKS ACCORDING TO THEIR INTERACTIONS
Ludovic-Alexandre VIDAL, Franck MARLE
Ecole Centrale Paris
Laboratoire Genie Industriel
Grande Voie des Vignes
92290 Châtenay-Malabry
[email protected],
[email protected]
ABSTRACT: Projects are dealing with bigger stakes and facing an ever-growing complexity. Project risks have then
increased in number and criticality. Lists of identified project risks thus need to be decomposed, for smaller clusters are
more manageable. Existing techniques are mainly based on a well-known parameter such as the nature of the risk or its
criticality. But some limits have appeared since project risk interactions are not properly considered. Project interdependent risks are indeed often considered and managed just as if they were independent. We thus propose an interactions-based clustering method with its associated algorithms and heuristics. Our objective is to group risks, so that the
project risk interaction rate is maximal inside clusters and minimal outside. The final objective of this study is to facilitate the coordination of complex projects by reducing interfaces when dealing with risks. We first model project risk
interactions through a matrix representation. Then, the overall mathematical formulation of the problem is presented. A
case study in the construction industry is finally presented and permits us to propose global recommendations, conclusions and perspectives.
KEYWORDS: Project management, Risk, Complexity, Interactions, Clustering.
1
INTRODUCTION
A project is a temporary and unique endeavour undertaken to deliver a result, which generally corresponds to
the creation of a unique product or service which brings
about beneficial change or added value (PMI 2004). A
new organization within the firm is then needed to perform a project: new organization new processes which
must answer project finalities and objectives in terms of
values creation must be set up. These new processes are
performed thanks to resources (notably project actors)
which belong to the created project organizational system.
A project is in essence unique, which means that the
project organizational system is to be conceived for each
project within a firm (as it is specific to a project). Project organizations are thus in essence temporary organizations. They coexist with permanent organizations
which exist within the firm. This coexistence (involving
interfaces and dependencies) makes project and project
management all the more complex. Moreover, the conception of the project organizational system follows the
steps of project phases’ identification and analysis, planning and monitoring. As a consequence when thinking at
projects in terms of systems following several phases,
many dependencies and interdependencies between
phases, sub-systems and other entities can be identified
Project systems are indeed in essence complex, be it only
through the fact they are performed by project actors, i.e.
people (Vidal and Marle 2007; Vidal and Marle 2008).
Focusing on the management aspect, it must be kept in
mind that management is indeed composed of decisions
and activities made by people, those decisions being
made at a given instant to reach an objective in the future. Once made, a decision changes the states of the
elements it impacts and thus the state of the project itself, targeting a final state for the project (composed of
the objectives of the project). The difference between the
targeted state and the reached state basically accounts for
the project performance. Moreover, every management
decision is relative to a context which is the known present situation (resulting from the past decisions). Finally,
decisions at a time T help to reach the future objective,
which is more or less correctly defined and more or less
stable. This overall decisions chaining determines the
trajectories of the evolution of the project system. This
intrinsic complexity of project management makes it
impossible to visualise and manage projects as a whole,
notably because of the existence of project complexity
induced risks.
In order to illustrate this issue of complexity driven risks,
let us consider an example, the case of a project within
the field of automotive industry. A change in the design
of the windscreen (in terms of inclination of this windscreen) implied changes at the connection with the front
structure of the car. This was due to the interdependence
of the final product components and it provoked in the
end several changes which were localised at an interface.
But this change also implied rework and a global increase of the duration and cost of some tasks (change of
various parameters). This means that the first change had
spread throughout the entire system, making it impossible to foresee its evolution properly.
As a whole, project management appears to be a complex and risky activity, which underlines the need for
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
efficient and effective project risk management. As a
consequence, this paper proposes an innovative method
and its associated tools to assist project risk management
under complex contexts by focusing on project risk interdependencies. Our goal is to group risks into clusters
in order to catch inside of them most of project interactions, which is notably to facilitate the coordination of
the project risk management process.
2
CLASSICAL RISK GROUPING
METHODOLOGIES IN PROJECTS
2.1 Classifying project risks by nature and/or value
Project risk management is classically decomposed into
four successive major steps: risk identification, risk
analysis, risk response planning and risk monitoring
(PMI 2004). Risk identification is the process of determining events which, may they occur, could impact
positively or negatively project objectives. Risk identification methods are classified according to two different
families: direct or indirect risk identification (Raz and
Hillson 2005).
This step in the end generates a list of risks. The number
of risks in this list may vary from some decades to some
hundreds of risks. It is then mandatory to decompose this
list into subgroups in order to have more manageable
items. During risk analysis, risks are prioritized, essentially according to their probability and impact. At this
stage, there are two main types of risk analysis: qualitative and quantitative analysis. The main output of risk
analysis is a list or graph, which enables decision-makers
to categorize risks as high, medium or low. Risk evaluation scales are often defined in terms of criticality, which
is generally a function of probability and impact. Next
steps are risk response planning and monitoring. We
argue that these steps should be performed after an innovative project risk analysis based on risk interactions
since current methods have shown their limits.
2.2 Limits of existing approaches
Indeed, the initial goal of clustering processes is to facilitate the coordination and management of risks. Fieldwork proves us this is not always the case with existing
methods. Namely, project complexity, described notably
in (Baccarini 1996; Edmonds 1999; Laurikkala et al.
2001) involves issues in decision-making under complex
situations (Phelan 1995), (Earl et al. 2001). The complexity of a project makes it impossible to visualize
simultaneously the complete project (global vision) and
all the interactions in the project (Marle 2002). This can
notably be underlined when looking at projects through
systems thinking (Simon 1981; Le Moigne 1990). Referring to complementary works (Sinha et al. 2001; Aissa
2004), many factors related to project interdependencies
have been identified as drivers of project complexity,
and thus of risks. But, there are still some phenomena
which are not taken into account by classical project risk
management methodologies, such as loops or non-linear
couplings.
Actually, whatever the criteria used for the decomposi-
tion of an initial risk list, and whatever the rigour and
detail level used, there will always be interactions between risks which do not belong to the same cluster. The
problem with current methodologies is that project risk
interactions are not clearly included, e.g. in Figure 1,
where some links are existing, though not managed (dotted lines). Risks are indeed interrelated with complex
links.
A previous study we had conducted about 23 risk analysis methodologies enabled to identify complexity-related
issues. For instance, there may be propagation from one
« upstream » risk to numerous « downstream » risks, the
climax of this phenomenon being the famous dangers of
the domino effect. Another example may be the existence of loops: amplifying loops are a great danger during projects and are all the more complicated to understand since the nature of the risks which exist within a
loop is likely to be different.
Figure 1. Classification of projects risks by nature and/or
by value
Project management current techniques include classical
principles underpinning scientific management: the
fragmentation of work and the maximization of visibility
and accountability. We can argue that today projects are
generally managed with single-link trees (WBS, pert,
OBS, risk lists) and not as networks (Marle 2002). In the
case of risk management, most of the methods use lists,
screening or sorting risks, as seen before. Traditional
methodologies are mainly single-risk oriented, analyzing
their multiple causes and multiple consequences.
However, some works have been done to model interdependencies between risks. Bayesian networks for instance link several risks, from multiple inputs to multiple
outputs, but they have specific validity conditions: links
must be oriented, and there must not be any loop. That
means that in some cases, they fail to reflect the real
complexity of relationships between project risks.
There is thus crucial need for better awareness, consideration and management of project risks, knowing they
are intertwined. We propose in this article such a methodology. Our ambition is not to give “exact” results: we
want to assist day-do-day project risk management
thanks to our method. This one is notably not based on
the mathematics of probabilities. It can thus take into
account easily the existence of loops and non-linear
couplings for instance.
2.3 Overall problem setting and methodology
As shown by the former paragraphs, risks are managed
thanks to the elaboration of smaller clusters. At this
stage, a management issue arises, since decisions may be
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
blocked, slowed down or ineffective if interactions are
poorly taken into account. Our research problematic is
thus to propose a new additional clustering methodology,
which could take into account interactions between risks,
in terms of existence and strength. First, we identify
possible risk interactions. The whole is synthesized
thanks to binary matrix representation. The matrix is
then transformed to be a numerical one thanks to the use
of the Analytic Hierarchy Process (AHP) principles.
These numerical data permit us to develop a linear programming and two approximate iterative algorithms. We
then express how these results can still be refined thanks
to the introduction of a distance measure and similarity
identification process. All the obtained results are then
compared to classical decompositions, notably thanks to
a case study in the entertainment industry. We then propose some conclusions and call for future perspectives of
research around this issue, after studying the implications of our works on day-to-day management.
3
CATCHING PROJECT RISK INTERACTIONS
The aim of this part is to build up a binary matrix which
can permit to catch and represent project risk interactions
and their strength.
3.1 The Risk Structure Matrix (RSM)
First, the Risk Structure Matrix (RSM) is a binary matrix
is built on the principles of Design Structure Matrix
(DSM). The classical partitioning algorithm for grouping
elements in this type of matrix is presented.
3.1.1 The Design Structure Matrix (DSM) approach
The Design Structure Matrix (DSM) represents and
visualizes relations and dependencies among objects.
The same objects are both in the rows and columns of
the square matrix, which is square. The DSM was introduced by Steward (Steward 1981) with tasks and was
initially used basically for planning issues (Eppinger et
al. 1994). Since, it has been widely used with other objects, like product components, projects or people (Eppinger and Salminen 2001; Sosa et al. 2004; Danilovic
and Browning 2007; Sosa 2008). As for us, we propose
to use the concept of DSM for other objects, which are
risks, in the context of project management. As tasks,
projects and people, project risks are (or can at least be
supposed as):
• in a finite number (since a project is in essence
temporary, with finite resources, objectives,
means, etc., i.e. a finite number of elements),
• managed during the project management process,
• interrelated, (notably because of project and
project management complexity factors (Vidal
and Marle 2008)) which justifies the use of a
methodology for complex interactions management.
The reader may note that in this paper, we define risk
interaction in terms of the existence of a possible cause
and effect relationship between two risks Ri and Rj. We
define the binary Risk Structure Matrix (RSM) as the
square matrix with RSMij=1 (else 0) when there is an
interaction from Rj.to Ri. Main advantages of this approach is to overcome the display issue of complex network and to permit easier calculations which are inherent
to the matrix format (eigenvalues, matrices product,
matrix transposition, ...).
3.1.2 Building up and partitioning the RSM
In order to build the RSM, we need to identify the interactions existing between project risks. The iterative procedure we use is notably addressed in ongoing publications. Classically, the DSM is re-ordered in a way which
permits to show first-level blocks, thanks to the wellestablished partitioning process (Steward 1981; Eppinger
et al. 1994). This one applied to the RSM gives information about:
• the dependent risks: they are engaged in a potential precedence relationship,
• the interdependent risks: they are engaged in
mutually dependent relation, directly or with a
bigger loop,
• the independent risks: the risks are basically
non-related.
The aim of this process is basically to obtain a lowertrigonal by blocks matrix. Partitioning enables to isolate
interdependent risks, but our purpose is different. We
aim at grouping risks in clusters with maximal internal
interactions and minimal inter-clusters interactions. As
seen in part 3.3, the partitioning algorithm does not permit to achieve our goal when the structure is very complex. Indeed, it tends to give very few, but big, blocks
which are difficult to manage.
3.2 Transforming the RSM into the Risk Numerical
Matrix (RNM)
Five steps are necessary to carry out our research and
build up the Risk Numerical Matrix (RNM) which takes
into account the strength of risk interactions.
3.2.1
Step 1: Individual sub-problems
The presence of a 1 in the binary RSM expresses the
existence of a possible cause and effect relationship
between risks Ri and Rj. RSMij=1 implies two possible
ways to address the situation: this can be seen either as a
possible risk input of Ri coming from Rj, either as a
possible risk output from Rj reaching Ri. Similarly as in
(Chen and Lin 2003) for design tasks, we combine these
visions. Two stages must thus be performed. For each Ri,
we isolate the risks which are related with Ri in column
(possible effects) and in row (possible causes). They are
called the Binary Cause or Effect Vectors and are relative to one risk Ri (BCV|Ri and BEV|Ri).
3.2.2
Step 2: Evaluating the interactions’ strength
We buid up two matrices regarding the risk Ri based on
the two previously isolated sets of risks (in rows and in
columns), which constitute the set of alternatives. They
are called Cause or Effect Comparison Matrices and are
both relative to one risk Ri (CCM|Ri and ECM|Ri) (see
Figure 2). They permit to summarize the strength of risk
interactions which are related to the risk Ri which is
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
successively studied as a cause or an effect for other
project risks.
Fieldwork has proved us that sometimes, people find it
easier to say that a cause C1 is more likely to produce an
effect E than another cause C2, or similarly, that an effect
E1 is more likely to be the consequence of a cause C than
another effect E2. Also given that the Analytic Hierarchy
Process (AHP) numerous applications in the field of
project risk management (Gourc and Bougaret 2000),
this led us to claim for the use of the AHP-based principle of pairwise comparisons to assess project risk interactions (as we define them in this article). The Analytic
Hierarchy Process (AHP) was developed by Thomas
Saaty (Saaty 1977; Saaty 1980 ; Saaty 2000; Saaty
2003). It is a multi-criteria decision-making method. It
permits the relative assessment and prioritization of
alternatives. The AHP is based on the use of pairwise
comparisons, which lead to the elaboration of a ratio
scale. The AHP models the problem as a hierarchy, consisting of an overall goal, a group of alternatives, and a
group of criteria which link the alternatives to the goal.
Pairwise comparisons are carried out by asking how
more valuable an alternative A is to criterion C than
another alternative B. Pairwise comparisons finally constitute square matrices, the values of which are between
1/9 and 9, and the diagonal elements of which are equal
to 1 while the other elements verify two conditions:
• The i-jth element is equal to the comparison between i and j regarding the considered criterion.
• For i different from j, the i-jth element is equal
to the inverse of the (j-i) element.
This piece of information is processed mathematically,
in order to transform user information into mathematical
one. Priorities are then determined thanks to these matrices and a global consistency test can be performed to
evaluate the coherence of the judgements. The final
result is a table which gives a global evaluation of each
alternative for the objective and for each criterion.
In our case, we have two parallel pairwise comparison
processes to run. The first one consists in the ranking in
rows for each project risk. Given the risk Rk, the set of
alternatives are all the non-zero elements of risks other
than the diagonal element in row k. The criterion on
which the alternatives are evaluated is the contribution to
Rk in terms of risk input: in other terms, for every pair of
risks which are compared, Ri and Rj (thus following
RSMki=RSMkj=1), the user should assess which one is
more important to risk Rk in terms of probability to be a
risk input (i.e., a cause) for risk Rk. Numerical values
express these assessments thanks to the use of the traditional AHP scales. The second one is the ranking in
columns, according to the same principles.
3.2.3
Step 3: Consolidating the results
When performing the pairwise comparison-based evaluation, eigenvectors of each matrix ECM|Ri and CCM|Ri
are then to be calculated. It enables to find the principal
eigenvectors which are related to the maximal eigenvalue. They are called the Numerical Cause or Effect
Vectors, as shown in figure 2 and are relative to one risk
Ri.(NCVi and NEVi). Consistency of the results should
be tested.
3.2.4
Step 4: Aggregating the results
For each risk Ri, Numerical Cause or Effect vectors are
respectively aggregated into Numerical Cause / Effect
Matrices (NCM and NEM, see figure 2). The i-th row of
NEM corresponds to the eigenvector of CCM|Ri, which
is associated to its maximum eigenvalue. The j-th column of NCM corresponds to the eigenvector of ECM|Rj,
which is associated to its maximum eigenvalue.
3.2.5
Step 5: Compiling the results
The two previous matrices are aggregated into a single
Risk Numerical Matrix (RNM), the values of which
assess the relative strength of local interactions (figure
2). The RNM is defined by a geometrical weighting
operation (based on the possible assumption that both
estimations can be considered as equivalent).
RNM (i, j ) = NCM (i, j ) × NEM (i, j )
(1)
The RNM thus permits to synthesize the existence and
strength of local precedence relationships between risks.
The reader should note that, for all practical purposes,
another possibility to evaluate the strength of these interactions is to perform a direct evaluation on 10 level
Likert scales. This evaluation is less time and resource
consuming but it requires having greater expertise and a
very global vision of the project.
4
PROPOSED CLUSTERING METHODOLOGY
AND REFINEMENTS
4.1 Problem definition
We want to cluster risks to maximize intra-cluster interactions thanks to the use of the RNM (Hartigan 1975;
Fowlkes and Mallows 1983; Murtagh 1983). We do
insist on the fact that the values of the RNM are local
judgements, which implies that risk interactions assessments are in essence relative. However, this first clustering is useful, since it permits to focus on the most significant local risk interactions. A set of risks is in essence a complex one, since interactions do exist between
them. Let us suppose we know the RNM of this set of
risks (the former steps to build the RNM should have
been followed by the user). Let K be the number of clusters of the optimal clustering solution, which maximises
intra-cluster global interactions value. This INTRA value
is defined by the sum of the values of all interactions
between risks which belong to a same cluster. The
INTER (Inter-cluster global interactions) value is defined by the sum of the values of all interactions between
risks which are not paired inside a same cluster. The sum
of INTRA and INTER values corresponds to the sum of
all risk interactions values, which is constant. As a consequence, maximizing INTRA is equivalent to minimizing INTER. We do not know K in advance. However,
we know some constraints about K.
MOSIM
SIM’10 - May 10-12, 2010 - Hammamet - Tunisia
Figuree 22. How to build the Risk Numerical Matrix (RNM)
K
Namely, the goal is to assign project members
me
to clusters
in order to manage more properly the risks
ris which belong
to a same cluster, i.e. which are strongly
gly interdependent.
It is known that people have a limitedd capacity to manage simultaneously numerous objects.
s. W
We introduce the
variable Smax as the maximum size off a cluster. We indeed choose to leave some margin comp
mpared to the classical empirical rule of 7 objects to bee managed
m
simultaneously. This permits us to know a lower
low bound of K,
which is
N −1
K min = INT (
) +1
S max
(2)
where INT is the integer part of a reall nu
number.
ming problem
4.2 Formulating the linear programm
Here is the corresponding integer progr
gramming problem
formulation. This problem is to be solve
lved for each value
of K which is superior to Kmin. We first
fi introduce the
following decision variables:
∀i,1 ≤ i ≤ N , ∀k ,1 ≤ k ≤ K , xik = 1
(3)
if risk Ri belongs to cluster Ck.
The objective function, which is to bee maximized, is as
following in Eq. (4) (which is not linear
ar for the moment)
K
N
k =1 i =1 j =1
Eq. 5 and 6).
Problem constraints are the following (E
(4)
(5)
k =1
as we argue for clusters disju
sjunction in order to permit
easier management in practice.
ce.
N
∀k ,1 ≤ k ≤ K , ∑ xik ≤ S max
m
(6)
i =1
In our case, we fix Smax=9, in order to permit the future
management of the clusters wh
when cluster owners will be
designated.
This problem is not linear bu
but we can make it easily
linear thanks to the introducti
ction of new decision variables (Eq. (7)) and new constra
traints (Eq. (8)).
∀i, ∀j ,1 ≤ i, j ≤ N , ∀k ,1 ≤ k ≤ K , yijk is binary (7)
We finally define yijk by adding
ing the constraints:
∀i,1≤ i ≤ N,∀j,1≤ i ≤ N,∀k,1≤ k ≤ K, yijk ≤ xik + xjk −1 (8)
This equation forces yijk to bee eequal to 0 if xik and xjk are
not both equal to 1, i.e. if Ri and
an Rj do not belong to the
same cluster. All other constra
straints are kept for problem
formulation. The objective ffunction can then be rewritten thanks to these new decision
dec
variables, in Eq. (9).
K
N
INTRA = ∑∑∑ xik x jk RNM (i, j)
j
∀i,1 ≤ i ≤ N , ∑ xik = 1
N
N
INTRA = ∑∑∑ yijk RNM
NM (i, j )
(9)
k =1 i =1 j =1
We use OPL (Optimization Programming
Pr
Language) to
solve this problem. However,
r, its complexity is high (2N1
), and problems over 20-211 rrisks appear to be critical
when testing them. That is why
hy we have based our work
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
on some easy heuristics, which permit us to approximate
the optimal solution of the problem.
4.3 Using heuristics to answer this problem
Both of these approximate algorithms are iterative, but
they use two different values for clustering conditions, as
described in Eq. (10) and Eq. (11). The first iterative
algorithm IA1 is based on the maximum value between
separate clusters. The second one IA2 is based on global
interactions value between clusters. In the two cases,
these values are to be maximized at each step.
Val1 (Cα , Cβ ) =
Val2 (Cα , Cβ ) =
max RNM (i, j )
(10)
i∈Cα , j∈C β
∑ RNM (i, j) + RNM ( j, i) (11)
i∈Cα , j∈Cβ
At the initial step, all risks are isolated: every initial
cluster is a singleton. The maximum value is obtained
for two isolated risks Ri0 and Rj0, which are grouped into
a first cluster C1. At each following step, the previous
value (Value1 or Value2) is maximized. This procedure
is repeated iteratively until reaching a solution which
respects all the constraints. In the case the maximum size
of a cluster is reached before the end of this procedure,
the second maximum value in the RNM is identified and
the clustering operation is done on the corresponding
interaction. The performance of these heuristics was
notably studied in other publications (Vidal and al.,
2009).
5
CASE STUDY
5.1 Introduction
The following case is a large infrastructure project,
which consists in the implementation by a French company of a new tramway transportation system in a city.
The goal is to build both the infrastructure and the transportation system. The customer is a 750 000 inhabitants
city in a country C. This notably comprises:
• The construction of a depot to stock trains
and execute their control and maintenance
• The installation of tracks throughout the
city, with issues about altitudes and high
slopes,
• The construction and onsite delivery of the
corresponding trains.
• The establishment of a traffic signalling
system, interconnected to the existing system dedicated to road.
An industrial partner realises the civil work which is to
permit the installation of the tramway. The project was
initialized by the government of country C in 1995. The
first selections of the firms which would execute the
project occurred in 1999. The project contract was
signed in 2002. After negotiations with banks, the government and the future operator (in which the French
firm which executes the project holds shares), the final
concession contract was signed in 2004. The project
started in February 2005, with a practical start of the
execution in 2006.
Until now, a project risk management process has been
carried out and led to the existence of 8 lists of risks
which nurtured the successive risk reviews. We focus
here on the System product line, which considers the
integration of all the aspects of the project, and is thus to
be one of the most complex ones. The corresponding risk
list (42 risks) we have been working on can be seen
afterwards on Figure 3. The 42 risks which are present in
the list are very diverse and are classified according to
six risk classes (risk nature). Risk ownership in terms of
responsibility is dispatched to 12 actors in the project.
Currently, risk management presently receives moderate
attention within the firm and the following issues are to
be underlined. First, risk lists are elaborated since they
are to be done, but no real attention is paid to them and
they are not used as much as they could be. Risk management is still too often considered as an academic
work which in not necessary for day-to-day project management. Moreover, risk owners (in terms of responsibility) may sometimes be defined too quickly, since the
examination of this list underlines that some ownerships
should be rearranged. Indeed, risk owners belong to
varied hierarchical levels in the firm structure, and some
risk owners are responsible for one risk while other ones
are responsible for more than ten.
5.2 First results
Our work through the consideration of risk interactions
has globally created more inclination and confidence
with the use of risk management approaches. The first
remark is that when performing the study thanks to the
iterative process of risk interaction identification, new
risks appeared. Namely, they were consequences or
causes of some already identified risks, or they were
seen as intermediary risks to explain the link between
two existing risks.
As a whole, 13 risks were newly identified for a lack of
their presence in the list appeared (see Figure 4), which
represents an increase of nearly 31% in the number of
identified and considered risks. Finally, 6 of the risks
which were present in the initial list (R1, R8, R11, R15,
R23, R34) were considered as poorly defined or possibly
negligible.
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Safety studies
Liquidated damages on intermadiate milestone and delay of Progress Payment Threshold
vehicle storage due to depot delay
Vandalism on site
Traction/braking function : behaviour in degraded mode on slope
Local laws and regulations
Traffic signalling, priority at intersections
Unclear Interface with the Client, for Infra eqt
Delays due to client late decisions
Travel Time performance
Limited Force majeure definition
Operating certificate
Reliability & availability targets
Permits & authorisations
Insurance deductibles
Archeological findings
Discrepancies Client / Operator / Concessionaire
CW delay & continuity
Responsibility of client on CW delay
On board CCTV scope
Noise & vibration attenuation
Potential risks of claim from CW partner
Harmonics level
Non compliance contractual Rolling Stock
Non compliance technical specs Rolling Stock
Exchange risk on suppliers
Track installation equipment performance
Tax risk on onshore
more poles
Security requirements
Track insulation
Delay for energising
Fare collection requirements
Construction safety interfaces
Electromagnetic interferences
Exchange risk
Risk of partial rejection of our request for EOT
Interface rail / wheel
Risk on Certification of our equipement
OCS installation
Banks stop financing the project
Costs of modifications not covered by EOT agreement
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
SYS
Actor A
Actor B
Actor A
Actor C
Actor A
Actor A
Actor D
Actor E
Actor E
Actor D
Actor B
Actor B
Actor D
Actor B
Actor F
Actor B
Actor G
Actor H
Actor B
Actor I
Actor D
Actor B
Actor D
Actor A
Actor A
Actor F
Actor J
Actor F
Actor D
Actor E
Actor K
Actor D
Actor G
Actor C
Actor E
Actor F
Actor B
Actor E
Actor L
Actor C
Actor B
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
CLASS
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Technical
Contractual
Contractual
Contractual
Technical
Contractual
Contractual
Contractual
Contractual
Technical
Contractual
Contractual
Technical
Contractual
Financial
Contractual
Contractual
Contractual
Contractual
Technical
Technical
Contractual
Technical
Technical
Contractual
Financial
Client/Partner/Sub-contractor
Financial
Contractual
Technical
Technical
Project Management, Construction site
Contractual
Technical
Technical
Financial
Contractual
Technical
Country
Project Management, Construction site
Contractual
Contractual
COMM ON
RISK OWNER
IN D IV ID U A L
PRODUCT
LINE
D E L IV E R Y (in m o n th s)
RISK IDENTIFICATION
IMPACTED
RS8
Q U A L IT Y - S C O P E
Review Session
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Common
Individual
Individual
Individual
Individual
Figure 3. Initial risk list of the System product line of the project
NEW RISKS
The identification of the existing risk interactions was
thus performed. A direct evaluation on a 10 level Likert
scale of the strength of interactions was executed, although we recommend the use of AHP in most cases,
due to the high expertise of interviewees. An observation
is that there were some difficulties while performing this
step since:
• This step is to require the participation of several experts of the project for it implies a very
wide view of the project elements and stakes.
• Some bias may be included in the evaluation of
interactions since it appears that interactions are
often thought at a first sight in terms of impact
and not in terms of precedence. Great attention
should thus be paid to that point in order to analyse the results.
Return profit
Extra trains
Pedestrian zones
Train performance
Waiting time at stations
Depot delay
Survey
Ticketing design delays
Track installation
Reengineering / Redesign
Slabs pouring
Initial specifications of CW
Available cash flow
N°
43
44
45
46
47
48
49
50
51
52
53
54
55
Figure 4. Newly identified risk thanks to the risk
interaction identification process
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
In the end, a global Risk Numerical Matrix for the studied risk network was obtained and analyzed in next part.
5.3 Deeper analysis and discussion
Even when separating in its connected components, the
LP-problem was too large to be solved by OPL. The use
of heuristics was thus necessary. The clustering iterative
algorithm IA2 was performed to obtain a first good approximate result for the clustering operation. Indeed,
algorithm IA2 proved to offer better results in other cases
and that is why we chose it in that case (Vidal et al.
2009). As a whole, the following clusters were obtained
(Figures 5 and 6). Some risks appear to be high accumulation risks, notably the budget related ones in terms of
return profit (R43) or risk of rejection of extension of
time EOT (R37) and liquidates damages (R2). These ones
are to be considerably monitored since many paths in the
risk network are likely to lead to them. Same observation
can also be made for travel time performance (R10). The
obtained clusters seem to be quite consistent with the
fieldwork as they form groups of risks which seem to be
relevant in order to assist project risk management. Cluster C3 and C4 for instance permit to group possible chain
reactions which could imply delay (respectively for the
permits and authorizations, and for the depot construction and track installation). This appears to be all the
more interesting than such chain reactions were not highlighted and managed before during the project, essentially because they mix schedule, technical, budget and
human aspects. For instance, there were no discussions
between Actor A and Actor E regarding the link between
R3 (Vehicle storage due to depot delay) and R32 (Delay
for energising), whereas this interface should have been
particularly highlighted retrospectively.
One commentary is that cluster C1 should however perhaps be separated into two parts by regrouping all financial risks in a sub-cluster. This appears all the more relevant than these financial risks are also linked to many
other risks which exist in other clusters. Therefore, managing them as a complete cluster could for sure be very
interesting. Another issue which arises is the question of
risk ownerships. Indeed, it appears that within clusters,
there are numerous risk owners, and often numerous risk
classes. One question which is to be addressed is how
coordination can be facilitated since there seems to be
some benefit to discuss with all the risk owners within a
same cluster. One thing which was suggested is that a
meeting with all the impacted risk owners of a cluster
could permit to nominate / vote for a responsible for the
cluster who could facilitate the coordination between the
interrelated risks. One of the possible nominees for this
cluster responsibility could be the least common boss in
the hierarchical structure of the project. Moreover, new
constraints might be added to perform more clustering
solutions. For instance, new tests are to be conducted by
varying the maximum possible size of a cluster. Another
constraint which could be added would also be to add a
maximum number of different risk owners within a cluster.
When comparing with classical approaches, clustering
by interactions permits an important improvement re-
garding the consideration of interactions. Indeed, the
intra-cluster value is increased by as much as 61% when
comparing with classical clusterings. As a whole, the
feedback with this case study is that in order to obtain
helpful results thanks to this methodology would be in
the end to:
• Perform pertinent risk identification and
risk interactions identification and evaluation processes (in group) in order to obtain
a good description of the situation
• To have a same hierarchical level in the
risk structure to study same level risks in
the chain reactions.
• Identify carefully during the initial step the
correct risk owners, i.e. the actors which
seems initially the most appropriate ones to
hold the responsibility for each risk.
• Perform the clustering operation thanks to
the iterative algorithms or with OPL on the
LP problem if processing time can be improved thanks to some operations.
• Analyse the obtained results and identify
possible chain reactions, possible accumulation risks and the actors which are to be
responsible for each risk cluster in order to
facilitate the global coordination of the project risk management process.
6
CONCLUSION
As a whole, this article presents innovative tools based
on the integration of risk interactions in the processes of
risk analysis and risk clustering for efficient project risk
management. As shown by the case studies, the tools
which are proposed here permit greater communication
on project risks as well as a better confidence in risk
management activities thanks to two aspects at least.
• First, the evaluation of risk interactions which is
performed when building up the RNM implies a
two-step process (looking in terms of causes,
and then of consequences). Information can
thus be checked and refined since one interaction should be listed twice (from cause to effect,
and from effect to cause): this checking process
permits a better confidence in risk identification
and risk interaction identification.
• Moreover, clustering risks in order to maximize
intra-cluster global interactions value permits to
facilitate the coordination of risk monitoring
and controlling activities, as it underlines the
need for cooperation and transversal communication within the project team. It permits greater
communication between people, since it does
not seek the identification ownership, responsibility and/or accountability, but the identification of risk interdependencies. After the clustering process, coordination is made by the person
who is assigned to the cluster, but communication has been facilitated before, meaning we
have less defensive phenomena.
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
RO Initial
Actor B
Actor D
Actor J
Actor B
Actor B
Class Initial
Contractual
Technical
Client/Partner/Subcontractor
Contractual
Contractual
C1
Liquidated damages on intermadiate milestone and delay of Progress Payment Threshold
Travel Time performance
Appitrack performance
Risk of partial rejection of our request for EOT
Banks stop financing the project
Return profit
Extra trains
Waiting time at stations
Available cash flow
RO Initial
Actor B
Class Initial
Contractual
C2
Potential risks of claim from CW partner
Initial specifications of CW
RO Initial
Actor E
Actor B
Actor G
Actor G
Class Initial
Contractual
Contractual
Contractual
Contractual
C3
Delays due to client late decisions
Permits & authorisations
Discrepancies Client / Operator / Concessionaire
Fare collection requirements
Ticketing design delays
RO Initial
Actor A
Actor B
Actor H
Actor B
Actor D
Actor E
Class Initial
Contractual
Contractual
Contractual
Contractual
Technical
Project management, Construction site
C4
vehicle storage due to depot delay
Archeological findings
CW delay & continuity
Responsibility of client on CW delay
Noise & vibration attenuation
Delay for energising
Depot delay
Track installation
Slabs pouring
RO Initial
Actor A
Actor D
Actor B
Actor D
Actor E
Actor D
Actor L
Class Initial
Contractual
Contractual
Contractual
Technical
Contractual
Technical
Country
C5
New local laws and regulations
Traffic signalling, priority at intersections
Operating certificate
Reliability & availability targets
more poles
Security requirements
Risk on Certification of our equipement
Reengineering / Redesign
RO Initial
Actor A
Class Initial
Technical
C6
Traction/braking function : behaviour in degraded mode on slope
Train performance
Survey
RO Initial
Actor I
Actor C
Class Initial
Technical
Project management, Construction site
C7
On board CCTV scope
OCS installation
RO Initial
Actor A
Actor D
Class Initial
Contractual
Technical
C8
Non compliance technical specs Rolling Stock
Interface rail / wheel
RO Initial
Actor A
Actor C
Actor E
Actor B
Actor F
Actor E
Actor A
Actor F
Actor F
Actor K
Actor C
Actor F
???
Class Initial
Technical
Contractual
Contractual
Contractual
Financial
Technical
Technical
Financial
Financial
Technical
Technical
Financial
Contractual
Isolated risks
Safety studies
vehicle storage in Bellevue due to depot delay
Unclear Interface with the Client, for Infra eqt
Limited Force majeure definition
Insurance deductibles
Harmonics level
Non compliance contractual Rolling Stock
Exchange risk on suppliers
Tax risk on onshore
Track insulation
Construction safety interfaces
Exchange risk
Costs of modifications not covered by EOT agreement
Pedestrian zones
Figure 6. Results of the clustering operation
Figure 7. The clustered project risk network
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
However, this implies that a shift should be operated in
the skills of project risk managers (or at least the team
members who are in charge of the management of the
obtained clusters). Such project team members should
indeed be able to facilitate communication and to show
great adaptability since they need to manage risks which
are to be of different nature.
As a whole, this article permits to make a comparison
between several possibilities for grouping risks in a project. Our aim is not to criticize the use of classical approaches: on the contrary, we refer to them as points of
comparison and claim for the use of conjoint classifications which can all give powerful insights on reality.
Lots of aspects of this work and its results may however
be discussed. We thus identify several research perspectives to consolidate this approach.
• Challenging the definition of risk interaction
and trying to integrate other risk characteristics
(than probabilities and precedence relationship)
into the definition of risk interactions.
• Evaluating with more reliability the relative
weights of risks. The sensitivity of this evaluation should first be explored.
• Exploring more sophisticated graph partitioning
heuristics and multi-objective clustering.
• Exploring new constraints to perform other
clustering operations. For instance, the maximal
size of the clusters may vary. One could think
of asking for a density constraint or asking that
the obtained clusters may as a whole be of a
similar size.
Finally, new case studies are to be performed in order to
validate even more this approach and study both the
practical applications (and improvements) thanks to
these results and the future implications on project management processes and organization.
REFERENCES
Aissa, A. (2004). Formalisation et quantification de
processus de gestion des interactions des projets. Laboratoire Genie Industriel, Ecole Centrale Paris.
Baccarini, D. (1996). "The concept of project complexity
– a review." International Journal of Project
Management 14(4): 201-204.
Chen, S.-J. and L. Lin (2003). "Decomposition of interdependent task group for concurrent engineering." Computers and industrial engineering.
Danilovic, M. and T. Browning (2007). "Managing
complex product development projects with design structure matrices and domain mapping
matrices." International Journal of Project Management 25: 300-314.
Earl, C., J. Johnson, et al. (2001). Complexity in planning design processes. 13th International Conference on Engineering Design, Glasgow, Scotland.
Edmonds, B. (1999). Syntactic measures of complexity.
faculty of arts. Manchester, University of Manchester. PhD.
Eppinger, S. and V. Salminen (2001). Patterns of product
development interactions. International Conference on Engineering Design, Glasgow, Scotland.
Eppinger, S., D. E. Whitney, et al. (1994). "A modelbased method for organizing tasks in product
development." Research in Engineering Design(6): 1-13.
Fowlkes, E. and C. Mallows (1983). "A method for
comparing two hierarchical clusterings." Journal of the American Statistical Association
78(383): 553-584
Gourc, D. and S. Bougaret (2000). "Le management des
risques appliqué au management des projets et
des portefeuilles de projets en recherche et développement." Revue Travail et Méthodes n°
552: pp 35-42.
Hartigan, J. A. (1975). Clustering Algorithms. New
York, John Wiley & Sons.
Laurikkala, H., E. Puustiner, et al. (2001). Reducing
complexity of modelling in large delivery projects. International Conference on Engineering
Design, Glasgow, Professional Engineering
Publishing.
Le Moigne, J.-L. (1990). La théorie du système général.
Théorie de la modélisation, Presses Universitaires de France.
Marle, F. (2002). Methods for helping decision-making
in projects. PMI Europe Conference, Cannes,
France.
Marle, F. (2002). Modèle d’informations et méthodes
pour aider à la prise de décision en management
de projets. Génie Industriel. Paris, Ecole Centrale Paris. PhD: 220.
Murtagh, F. (1983). "A survey on recent advances in
hierarchical clustering algorithms." The Computer Journal 26(4): 354-359.
Phelan, S. (1995). From chaos to complexity in strategic
planning. 55th meeting of Academy of Management, Vancouver
PMI, S. C. (2004). A guide to the project management
body of knowledge (PMBOK) (2004 ed.). Newton Square, PA, USA. , Project Management Institute.
Raz, T. and D. Hillson (2005). "A comparative review of
risk management standards." Risk Management: An international journal 7 (4): 53-66.
Saaty, T. (1977). "A scaling method for priorities in
hierarchical structures." Journal of Mathematical Psychology 15: 234-281.
Saaty, T. (1980 ). The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation,
McGraw-Hill.
Saaty, T. (2000). Fundamentals of the Analytic Hierarchy Process. Pittsburgh, PA, RWS Publications.
MOSIM’10 - May 10-12, 2010 - Hammamet - Tunisia
Saaty, T. (2003). "Decision-making with the AHP: Why
is the principal eigenvector necessary." European Journal of Operational Research 145(1):
85-91.
Simon, H. (1981). The Sciences of the artificial. Cambridge The MIT Press.
Sinha, S., A. I. Thomson, et al. (2001). A complexity
index for the design process. International Conference on Engineering Design, Glasgow, Professional Engineering Publishing, Bury St Edmunds.
Sosa, M. (2008). "A structured approach to predicting
and managing technical interactions in software
development." Research in Engineering Design.
Sosa, M., S. Eppinger, et al. (2004). "The Misalignment
of product architecture and organizational structure in complex product development." Management Science 50(12): 1674-1689.
Steward, D. (1981). "The Design Structure Matrix: a
method for managing the design of complex
systems." IEEE Transactions in Engineering
Management 28(3): 71-74.
Vidal, L. and F. Marle (2007). Modeling project complexity. International Conference on Engineering Design, Paris, FRANCE.
Vidal, L. and F. Marle (2008). "Understanding project
complexity: implications on project management." Kybernetes, the International Journal of
Systems, Cybernetics and Management Science.
Vidal, L., F. Marle, et al. (2009). Interactions-based
clustering to assist project risk management. International Conference on Engineering Design
ICED'09, Stanford, USA.