RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT

Size: px
Start display at page:

Download "RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT"

Transcription

1 RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT by Hazel Ann Taylor BSc, MSc A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Centre for Information Technology Innovation Queensland University of Technology 2003

2 Certificate of Completion

3 Key Words: Decision-making processes; IS implementation; IS project risk management; software packages; tacit knowledge.

4 RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT Hazel Taylor ABSTRACT This research addressed the need for in-depth investigation of what actually happens in the practice of risk management in software package implementation projects. There is strong official sanction in the IT literature for the use of formal risk management processes for IT projects but there is a confused picture of their application in practice. While many potential risk factors for IT projects have been identified, and formal procedures have been prescribed for the management of these risks, there has been little work investigating how project managers assess these risks in practice and what countermeasures they employ against these risks in their projects. In particular, the study used an interpretive critical decision interview approach to focus on those areas of risk management knowledge that project managers have acquired through experience, i.e. tacit knowledge. A new categorization of risk factors emanating from three sources -- vendor, client, and third party reveals risk factors not previously identified. Some of these new factors arise from the three sources noted, while others arise from the package implementation focus of the projects and from aspects arising from the location of the projects in Hong Kong. Key factors that cause problems even when anticipated and mitigated, and the most often unanticipated problems are also identified. The study further presents an examination of the studied managers risk management practices, and the strategies they use to address both potential and actual problems. This examination revealed close conformance with recommended literature prescriptions at some stages of projects, and significant variation at other stages, with strategies applied being broad and general rather than risk specific. A useful categorization of these strategies into four broad groups relating to different sets of risk factors is presented, reflecting the actual practice of respondents. Tacit knowledge was revealed throughout these investigations in the variances observed between prescribed and actual practice, and particularly from an examination of project managers decision-making practices from two different perspectives - rational and naturalistic. A hybrid decision-making model is proposed to capture the actual processes observed, and to provide prescriptive guidance for risk management practice. The investigation makes a contribution to the field of IT project risk management in three ways. First, the investigation has addressed the need for empirical studies into IT risk management practices and the factors influencing project managers in their choice and application of strategies to manage risk. Second, by examining how experienced IT project managers approach the task of managing risk in software package implementations, the study has extended our understanding of the nature of the knowledge and skills that effective IT project managers develop through experience. Third, the study makes a theoretical contribution to our understanding of IT project risk management by examining the decision-making processes followed by IT project managers from the perspective of two contrasting theories of decision-making the rational method and the Naturalistic Decision Making theory.

5 TABLE OF CONTENTS 1 Introduction Background to the research Research aims Justification for the research Methodology Limitations and key assumptions Definition of key terms Outline of thesis structure Theoretical Foundations Introduction IT software project risk management Project management Project risk management IT project risk management literature Rational decision-making Naturalistic decision making Tacit knowledge Historical beginnings Implicit learning Declarative and procedural knowledge Categories of knowledge Tacit knowledge research in the management field The present study Summary Methodology Introduction Research approach Critical incident technique and critical decision method Research procedures Sample selection (organizations and subjects) Respondent details Project details Instrumentation Data collection - interviews Refinement of interview protocol Reflections on interview process Analysis and coding processes Research Question 1: Key risk factors Research Questions 2 and 3: Risk management practices and strategies Research Questions 4 and 5: Tacit knowledge and gaps between practice and theory Researcher s perspective Ethical considerations Summary...80

6 4 Results and discussion of research question 1: Key risk factors Introduction Risk factors Comparison of risk factors with previous research Risk factors in previous literature not mentioned in this study New risk factors identified in this study Discussion of new risk factors identified in this study Frequency with which risk factors were mentioned Comparison of risk factor rankings with previous research Discussion of comparison of risk factor rankings Anticipated and unanticipated problems, and troubled projects Anticipated problems Unanticipated problems Problems causing projects to become troubled Summary of discussion: Research Question 1 Key risk factors Results and discussion of research questions 2 and 3: risk management practices and strategies Introduction Research Question 2: Risk management practices Pre-project risk management practices Risk management practices at project start-up stage Risk management practices during the course of the project Risk management practices after project completion Comparison of risk management practices with prescribed processes Research Question 3: Risk management strategies Strategies to manage risks emanating from pre-sales practices General categorization of risk management strategies Control strategies Negotiation strategies Research strategies Monitoring strategies Comparison of risk strategies with prescribed processes Summary of discussion: Research Questions 2 and Results and discussion of research questions 4 and 5: tacit knowledge and gaps between practice and theory Introduction Research Question 4: Project managers explicit and tacit knowledge Explicit knowledge applied to project risk management Tacit knowledge applied to project risk management Environmental and situational cues Research Question 5: Gaps between risk management theory and practice, and decision-making processes Decision-making processes in initial assessment situations of routine projects Decision-making processes in initial assessment situations of troubled projects

7 Decision-making processes in problem-arising situations of routine and troubled projects Summary of discussion: Research Questions 4 and Conclusions and implications Introduction Conclusions about each research question Research Question Research Question Research Question Research Question Research Question Implications for theory Implications for practice Limitations Further research Self Assessment of Research Quality Application of sound and rigorous qualitative research methods Recognized principles for conducting interpretive research Summary References Appendix A: Initial Interview Protocol Appendix B: Ethics consent package Appendix C: Practitioner Report

8 LIST OF TABLES AND FIGURES Fig. 2.1: Project risk management processes...23 Fig. 2.2: Recognition-primed decision model (after Klein et al., 1989)...33 Table 2.1: Categories and sub-sets of knowledge...43 Table 3.1: Organization details...60 Table 3.2: Project management perspectives...60 Table 3.3: Types of projects...62 Fig. 3.1: NVivo coding structure...70 Table 4.1: Summarized risk factors...83 Table 4.2: Number of respondents (out of 25) identifying risk factors...84 Table 4.3: Comparison of Risk Factors Identified in Present and Previous Studies...89 Table 4.4: New risk factors identified in the present study Table 4.5: Top 17 Risks (mentioned by at least ten respondents) Table 4.6: Comparison of risk rankings: Schmidt/Keil studies and present study Table 4.7: Problems anticipated, and number still arising Table 4.8: Unanticipated problems arising during the project Table 4.9: Problems responsible for derailing troubled projects Table 5.1: Problem situations Table 5.2: Strategies and risks they addressed Table 5.3: Strategies used in initial assessment and problem arising situations Table 6.1: Examples of tacit knowledge associated with risk management strategies Table 6.2: Strategies and stages in routine and troubled projects Fig. 6.1: Partial rational risk management processes during initial assessment of routine projects Fig. 6.2: Descriptive RPD model of processes at start of routine projects Fig. 6.3: Rational risk management processes during initial assessment of troubled projects Fig. 6.4: RPD model incorporating rational and naturalistic situation assessment during initial assessment of troubled projects Fig. 6.5: RPD model for problem arising situations in all projects Table A.1: Critical decision probe questions (adapted from Klein et al., 1989)

9 STATEMENT OF ORIGINAL AUTHORSHIP The work contained in this thesis has not been previously submitted for a degree or diploma at any other higher education institution. To the best of my knowledge and belief, the thesis contains no material previously published or written by another person except where due reference is made. Signed: Date:

10 ACKNOWLEDGEMENTS Thank you to my husband, Paul, for his unfailing support, encouragement and advice.

11 Chapter 1 1INTRODUCTION The research reported in this thesis was motivated by reports in the literature (for example, Boehm, 1991; Drummond, 1996; Keil & Carmel, 1995; McFarlan, 1981) that continuing problems with IT projects can be attributed, at least in part, to failure to apply rational risk management techniques that have for some time now been considered to be best practice in project management. The study set out to explore the practice of risk management in IT projects, with a focus on vendor-driven software package implementation projects. This exploratory research used a critical decision method to surface tacit knowledge held by IT project managers regarding risk management in their projects, and examined the findings from the perspectives of two contrasting theories of decision-making rational and naturalistic. The results reveal new risk factors and pragmatic strategies for managing risk that have not been identified in the literature. In addition, several gaps between practice and theory are highlighted. In these areas the predominant theoretical approach prescribed in the literature does not adequately describe the more complex realities of practice in these uncertain and changing project environments. This introduction outlines the rationale for the thesis and the nature of the problems it addresses. The chapter is organized into six sections: 1.1) background to the research; 1.2) the research questions; 1.3) justification for the research; 1.4) outline of methodology; 1.5) limitations and key assumptions; 1.6) outline of subsequent chapters Background to the research Reports about problems with IT projects have appeared regularly in the popular and academic literature for over 30 years, including several well-publicized major failures (Drummond, 1996; Lyytinen, Mathiassen, & Ropponen, 1998). Risk management practice has been identified as one critical factor of the success of IT development projects (Schmidt, Lyytinen, Keil, & Cule, 2001), and a significant stream of research has focused on identifying risk factors and prescribing risk management frameworks to aid managers in making decisions about risk factors in IT software development projects (see, for example: Alter, 1996; Barki, Rivard, & Talbot, 1993, 2001; Boehm, 1991; Keil, Cule, 11

12 Lyytinen, & Schmidt, 1998). However, reports of troubled IT projects continue, and while there is a presumption that this is at least partially due to the risk management techniques recommended in the literature not being applied in practice (Keil et al., 1998), there is little research on whether this is indeed the case. While many potential risk factors for IT projects have been identified, and formal procedures have been prescribed for the management of these risks, little is known about how project managers assess each of these risks in practice and what countermeasures they employ against these risks in their projects. In particular, we know little about the knowledge and skills being applied by more experienced project managers, nor of the extent to which these knowledge and skills derive from formal education or training. Software packages are especially interesting in the context of IT risk management practice, in that their use is purported to ameliorate or avoid many of the risks associated with custom developments (Lassila & Brancheau, 1999; Martin & McClure, 1983). With the trend away from custom system development towards generic software packages (Russo, 2000), interest in specific risk issues related to software package implementation projects is increasing (Parr, Shanks, & Darke, 1999; Sumner, 2000). And while it appears that these projects have some unique risks (Sumner, 2000), again there is little research addressing the particular practices of managers of these projects (Davis, 1998; Gable, 1998). One common theme in the risk management literature referred to above is that projects with higher levels of uncertainty and complexity are more risky. Research has investigated how experienced professionals make decisions in poorly-defined and uncertain circumstances in a variety of contexts, including fire-fighting, nursing, the armed forces, and hardware and software design (Klein, 1999; Vicente, 1999). This stream of research has led to the development of a descriptive theory - Naturalistic Decision Making (Zsambok, 1997), and a model of decision-making - the Recognition-Primed Decision model (Klein, 1993; Klein, Calderwood, & MacGregor, 1989), which propose that situation assessment, tacit knowledge (i.e. knowledge gained through experience), and judgment are important factors in decision-making in real-life settings, and that the rational processes assumed by academic prescriptive models and frameworks for decision-making (see, for example, Barki et al., 2001; Boehm, 1991; Charette, 1996b; Fairley, 1994; Heemstra & Kusters, 1996; Keil, 1995; Powell & Klein, 1996) are often not applied in practice. Moreover, studies of skilled practitioners in areas such as business management, 12

13 sales, and military leadership have shown that, when dealing with complex and ill-defined situations, these experts supplement their formal education with tacit knowledge and judgments derived from their experience (Sternberg & Horvath, 1999). Rational decision processes are a basic assumption of the risk management frameworks referred to earlier, and are typically learned through a formal education process. However, in practice, experienced project managers of complex and uncertain software projects may rely more on judgment and tacit knowledge than on the prescribed rational frameworks. The thesis reports on an exploratory and descriptive field study of current practice in risk management of software package implementation projects. In particular, the aim was to gain an understanding of the dynamics of the risk management process and the actions taken with respect to possible risks for a given project in its situational context. This study of current practice provides a useful window into inherent work constraints that limit the applicability of the prescriptive models found in the literature. Further, the study: (1) highlights aspects of current practice that may undermine the effectiveness of risk management practices; (2) lays the foundation for a formative model encompassing aspects of both rational and naturalistic decision-making that can provide better descriptions of actual practice; and (3) offers more practical prescriptive guidance in order to support practitioners effectively Research aims The aims of the research were three-fold. The study explored, firstly, the key risks that experienced project managers attended to in software package implementation projects, and how they managed these risks in practice. Secondly, the study identified knowledge (tacit or explicit) that experienced project managers used in order to plan for and address critical risk situations that arose during the course of their projects. Thirdly, risk management practices were compared with generally accepted prescriptions in the literature to identify gaps between theory and practice. These gaps were examined from the perspective of both rational and naturalistic models of decision making in order to investigate how well each of these theories described and explained practices described by respondents. Specifically, the thesis focused on vendor project managers working primarily with software package implementation projects, and investigated the following inter-related research questions: 13

14 1) What key risks do project managers attend to in software package implementation projects, and how do these compare with the risk factors identified in the literature for software packages as well as for custom development? 2) What risk management practices do project managers employ when planning software package implementation projects, and how do these compare with prescriptions in the literature? 3) What strategies do project managers use to address risks in IT projects both to prevent problems in the first place and to deal with the problems if they do arise (i.e. if the risks identified as potential problems turn into actual problems)? 4) What knowledge (tacit or explicit) do experienced project managers use in order to plan for and address critical risk situations that may arise during the course of software package implementation, and in particular, what environmental and situational cues do managers attend to when managing their projects? 5) What gaps are there between actual practice and the rational risk management processes as recommended in the IT risk management literature, and to what extent can decision making theories such as Naturalistic Decision Making explain any such gaps? The underlying theoretical foundations for these research questions include project risk management, tacit knowledge and decision-making. The literature related to these underpinning areas is discussed in Chapter 2, and a context and motivation for the present research is established in that chapter. A brief summary of the rationale for the current study is given in the next section Justification for the research With the growing demand for high quality information systems in organizations, and with the increasing use of commercial packages rather than custom-developed software (Russo, 2000), strategies for managing risk during the implementation of these packages have become increasingly important. The exploration of how experienced project managers approach the task of managing risk in the implementation of software packages on client sites provides insights for understanding when and why recommended risk management processes are not always being applied in practice. Improved understanding of the knowledge, both explicit and tacit, that successful IT project managers draw on in 14

15 determining strategies to address risk in implementation projects can aid researchers and practitioners in developing better implementation project risk management techniques, and can also be used to develop specific training programs for novice project managers. The investigation reported here makes a contribution to the field of IT project management in three ways. Firstly, the investigation addresses the need for more empirical studies into IT risk management practices (Schmidt et al., 2001) and the factors influencing project managers in their choice and application of strategies to manage risk. Secondly, by examining how experienced IT project managers approached the task of managing risk in software package implementations, the study extends our understanding of the nature of the knowledge and skills that effective IT project managers develop through experience. Thirdly, this research contributes to a better understanding of discrepancies between theoretical prescriptions and practical applications of risk management in package implementation projects, by examining the processes and factors identified in the light of both rational and naturalistic decision-making theories. The next section outlines the methodological approach chosen for the research Methodology The exploratory and descriptive nature of the research required research methods that met the need for contextual information, as the contexts of the situations examined were of paramount importance in gaining an understanding of the dynamics of the risk management process and the decisions made with respect to possible risks for a given project. Investigations of this type lend themselves to broadly interpretive methods of research (Walsham, 1995). Thus, a primarily qualitative analysis approach was used. The study used a critical decision interview approach (DuBois, 2002; Klein et al., 1989) to explore and describe the risk management approaches used by experienced IT project managers during software package implementation projects. This semi-structured interview method enabled the elicitation of critical risk situations illustrating key constraints and environmental and situational cues that could be involved in project managers risk assessment and risk management of projects. Interview transcripts were analyzed with a qualitative content analysis procedure, using the software package NVivo version 2.0, to support and manage the detailed coding and analysis process. The risk management decisions made by IT project managers during their projects were examined from two perspectives using frameworks drawn from standard risk management guides 15

16 typically recommended to practitioners (PMI Standards Committee, 1996), and from naturalistic decision making theory and the Recognition-Primed Decision model developed by Klein, Calderwood, and MacGregor (1989) Limitations and key assumptions The purpose of this research was to learn more about risks and risk management in software package implementation projects, and the knowledge, both tacit and explicit, that project managers draw on when managing these project risks. The methodology relied on a variation of the critical incident interview approach to elicit information about project managers approaches to risk management, and as such was reliant on their self-reports and recollections of their plans and actions and the circumstances surrounding these. An assumption of this approach is that people can and will provide information that draws not only on their explicit knowledge about what ought to be done, but also on their tacit knowledge, gained from experience, about what actually works. While it is acknowledged that one aspect of tacit knowledge is that it is difficult to articulate, previous use of the critical incident technique (Sternberg et al., 2000) and the critical decision method (Klein et al., 1989) for eliciting knowledge has demonstrated that these approaches can describe the function served by tacit knowledge in proficient task performance. All of the project managers interviewed for this research were based in Hong Kong, and there is a possibility that the findings were country/culture specific. To some extent this limitation is mitigated by the international nature of the respondents, all of whom had studied or worked abroad during some stage in their careers, and the international nature of the software packages the managers were working with, since, for the most part, these packages are marketed globally. While some of the risks identified by these managers were clearly related to their Hong Kong location, many of the risks correspond to those reported in the literature previously, and the location-specific risks also have implications for managers in other countries, particularly in view of the increasing trend towards multinational projects that cross traditional country/culture boundaries. Finally, the study focused solely on packaged software implementation, and the exploratory nature of the research and use of in-depth interviews placed practical limitations on the sample size. However, the in-depth analysis of information across a range of informants and organizations in the packaged software field has enhanced our knowledge of risk management practices within this range of empirical circumstances, and 16

17 hence can increase our confidence in applying this knowledge to new settings sharing similar circumstances to those investigated in this research (Baskerville & Lee, 1999). In particular, while this research has focused mainly on software package implementation projects, these projects share many features in common with custom development projects and a future research opportunity is to explore the extent to which the findings from the present study are applicable in other IT project settings Definition of key terms There is some variation in the literature in the definition of certain key terms. While detailed discussion of these key terms and differences in definition can be found in chapters 2 and 3 of the thesis, a brief glossary of key definitions that I have applied in this study is given to aid the reader. Critical Decision Method: A variation of the critical incident technique that has been developed specifically for knowledge elicitation applications, where the aim is to reveal aspects of expertise such as the critical cues used in making perceptual and conceptual discriminations, and the underlying basis for judgment decisions (Klein et al., 1989). Critical Incident Technique: A method for obtaining specific, behaviourally focused descriptions of job performance developed by Flanagan (1954). The critical incident technique has been applied to the elicitation of tacit knowledge related to job performance by a group of researchers working to identify tacit knowledge in applied settings (Sternberg et al., 2000; Sternberg & Horvath, 1999; Sternberg & Wagner, 1986). Explicit Knowledge: Knowledge that is formally learned and easily articulated. Explicit knowledge is held in repositories such as libraries, books, formal data media, written rules and procedures and is acquired through formal learning procedures such as schooling, reading, and formal training. Implicit Knowledge: (Also referred to as tacit knowledge). The broad category of knowledge that individuals find difficult to articulate and have learned by experience, by practice ( doing ) or by osmosis. Researchers have used different degrees of granularity, and different terms, in discussing types of implicit knowledge. See Section for a detailed discussion. 17

18 Project Executive: A senior manager, referred to as a programme manager in some firms, who has responsibility for supervising multiple project managers within the vendor firm and overseeing the projects they are working on. Project executives typically take a strategic and long-term management perspective within their firms, act as executive sponsor or steering committee head for the projects under their oversight, are responsible for balancing the competing resource needs of their projects within their firms, and deal with high-level contract negotiations with client firms. Project Manager: The manager who is assigned overall responsibility for a specific project. In vendor-driven projects, typically there will be a vendor project manager with responsibility for the project from the vendor perspective, and a client project manager with responsibility for the project from the client perspective. Vendor project managers were the focus of the present research. Vendor project managers manage the daily activities of the project, co-ordinate tasks, manage the project team, liaise with their counterparts in the client firm, and are responsible for ensuring the project schedule, budget, and requisite quality are achieved. Risk: Potential problems or issues that may arise and adversely impact on the progress or outcome of a project. Note that while typical definitions of risk with respect to project management relate to potential problems that could impact on the project itself, the vendor respondents in this study also consider a risk to be any potential problem or situation arising from involvement in the project that could adversely impact on their own firm See Section 4.3.2, Environment factors for more discussion. Risk Management Practice: An organization s policies and procedures regarding the management of risk, in particular the planning processes prescribed to evaluate and address risk at the start of a project, and prescribed procedures for managing risk during the project. Risk Management Strategy: Specific strategies applied by managers to address particular risks during the course of the project. These strategies may be prescribed as part of the organization s standard risk management practice, or they may be tactics that project managers have developed through their own experience. Tacit Knowledge: see Implicit Knowledge 18

19 1.7. Outline of thesis structure In this introductory chapter I have set the context and foundations for the thesis, and introduced the research aims and questions. I have presented a justification for the research, briefly overviewed the methodology, and discussed key assumptions and limitations. The detailed description of the research is contained in subsequent chapters as set out in the outline of the thesis structure below. The thesis is structured into eight chapters, including this introduction. In Chapter 2 I discuss the theoretical foundations underlying the research questions investigated in this thesis. In particular, I review the literature on project risk management, with a particular emphasis on risk management research in the IT field. I discuss the assumption underlying this project risk management literature of a rational decision making approach, and consider an alternative theory of decision-making, Naturalistic Decision Making, that incorporates a focus on knowledge gained from experience tacit knowledge. I then examine research in the cognitive psychology field on tacit knowledge, and explore how tacit knowledge has been investigated in related fields such as business and management. I show how researchers working from very different starting points decision-making on the one hand, and tacit knowledge on the other hand have converged in developing a practical method for examining the question of knowledge gained from experience. This method forms the basis of the research approach of this thesis. Finally, I provide a basis for the aims of the present research and discuss in detail the research questions noted in Section 1.3 above. In Chapter 3 I discuss the chosen research approach, the critical decision interview method, and show why it is an appropriate method for the investigation of the research questions. I then detail the research procedures followed, and explain the analysis approach. Demographics and simple descriptive results are reported in Chapter 4, while Chapters 5, 6, and 7 contain results and discussion for the five research questions discussed above. I present conclusions and implications from the research in Chapter 8. 19

20 Chapter 2 2THEORETICAL FOUNDATIONS 2.1. Introduction In this chapter I discuss the theoretical foundations underlying the research questions that were outlined in Chapter 1. Section 2.2 contains a review of the literature on project risk management, with a particular emphasis on risk management research in the IT field. Section overviews project management in general, and Section focuses on project risk management. In Section 2.2.3, I review the IT project risk management literature. In Section 2.2.4, I discuss the underlying assumption of a rational decision making approach to risk management that pervades the risk management literature. In Section I discuss an alternative approach to decision making, Naturalistic Decision Making (NDM), based on empirical studies of decision makers in real-life situations. NDM provides a descriptive model of decision-making, the Recognition-Primed Decision model (RPD), which will be explored for its potential to shed light on the research questions of this thesis. NDM introduces the concept of knowledge based on judgment and experience tacit knowledge, and in Section 2.3 I discuss tacit knowledge, and how tacit knowledge has been investigated in related fields such as business and management. Section overviews the historical beginnings of the study of tacit knowledge, and in I discuss the related concept of implicit learning. In Section I review Anderson s (1982) skill acquisition framework of declarative and procedural knowledge, and in Section I draw together various categories of knowledge that have been proposed by researchers in the business and management arena. In Section I focus on empirical tacit knowledge research in the management field conducted by the group of researchers working with Sternberg and Wagner (Sternberg et al., 2000; Sternberg & Horvath, 1999; Sternberg & Wagner, 1986; Wagner, 1987; Wagner, Sujan, Sujan, Rashotte, & Sternberg, 1999). These researchers have used a critical incident approach to examining tacit knowledge that is very similar to the critical decision method developed by NDM researchers (Klein et al., 1989). These two methods form the basis of the chosen research approach discussed in Chapter 3. 20

21 Finally, in Section 2.4, I show how the literature reviewed in the previous sections forms a basis and context for the aims of the present research and discuss in detail the research questions introduced in Chapter 1. Section 2.5 provides a brief summary of the chapter IT software project risk management Reports of problems with IT projects abandoned projects, cost and schedule overruns, failure to deliver required functionality have appeared regularly in the popular and academic literature for over 30 years (Boehm, 1991; Drummond, 1996; Keil, 1995; McFarlan, 1981). During this period there has also been a steady flow of advice for IT project managers in both the academic and practitioner literature on IT project management, development methodologies, and risk management techniques. IT software project management includes project risk management and is a subset of project management in general. In the following sections I first overview project management in general, with illustrations from IT projects (Section 2.2.1), and I then discuss the generally accepted approaches to project risk management (Section 2.2.2). Following this, I review the two major strands, prescriptive and descriptive, of IT project risk management literature, and researchers recommendations for successful management of IT projects (Section 2.2.3). Finally, I discuss the possible implications of the premise of rational decision-making that underlies accepted general and IT project management techniques (Section 2.2.4) and (Section 2.2.5) review an alternative research approach to decision making - naturalistic decision making, showing how this approach is relevant for the concerns of this thesis Project management The body of knowledge on project management and project risk management is extensive and well established (e.g. PMI Standards Committee, 1996), and provides a basis for understanding project management techniques that are recommended for the IT industry by researchers such as, for example, Boehm (1991), Heemstra and Kusters (1996), and Powell and Klein (1996). Generally accepted definitions of projects, project life cycle, project management, and project risk management are summarized next. Projects are distinguished from operations in that projects are temporary and unique activities, with every project having a distinct beginning and end, producing a unique 21

22 product or service. Operations, in contrast, are on-going and repetitive activities, with no distinct end. While projects may have a repetitive aspect in that a new project may seek to produce a similar outcome to previous projects e.g. a new building or a new software application the specific outcome for each new project is unique in that its particular scope, context and requirements will be different from previous similar projects. Projects typically have specific goals, aim to achieve some sort of change, are constrained by limited resources, and require co-ordination in order to meet the goals. All projects go through a project life cycle, comprising several phases including initiation, planning, and implementation, with some further breakdown within each phase. For IT projects, the systems development methodology chosen for a software development project is an instance of a particular approach to the project life cycle. The project life cycle gives a higher-level view for overall control and management of the project, while the choice of systems development methodology determines how the necessary technical tasks are carried out (McLeod & Smith, 1996 pg 73). The initiation phase of the project life cycle typically corresponds to initiation and feasibility stages of traditional systems development methodologies. The planning phase of the project life cycle occurs if management approves going ahead with the project, and would typically include deciding upon the specific methodological approach to take for the systems development (for example, waterfall approach, prototyping, rapid application development). The implementation phase of the project life cycle then utilizes the chosen methodology to complete the project. Project management involves the application of general and specific management knowledge and skills to project activities in order to meet the stated goals of the key stakeholders in the project. Such goals typically include scope, cost, time and quality objectives. IT projects are sometimes claimed to be less amenable to traditional project management techniques because of the high levels of uncertainty in terms of knowledge about, for example, specific requirements, how long a particular application will take to program, and issues relating to the acceptance of the new application by the organization (McLeod & Smith, 1996 pg 7). However, most IT project management researchers argue that more rigorous application of project management techniques, and in particular, risk management techniques, is the best approach to dealing with the uncertainties that are typical of IT projects (see, for example, Barki et al., 2001; Boehm, 1991; Keil et al., 1998). Project risk management is one of the project management knowledge areas applied over the 22

23 whole project life cycle, with risk assessment being part of the planning phase, and risk monitoring continuing throughout the implementation phase Project risk management Project risk management includes four major processes, illustrated in Figure 2.1 and discussed below (PMI Standards Committee, 1996). RISK IDENTIFICATION RISK ASSESSMENT Risk Analysis Risk Prioritization RISK RESPONSE PLANNING Risk Elimination Risk Mitigation Risk Acceptance Contingent Action Planning RISK MONITORING Progress Feedback Progress Analysis Corrective Action Fig. 2.1: Project risk management processes The risk identification process involves identifying both the sources of potential risk to the progress or outcome of the project, and the risk symptoms, sometimes called triggers or cues, that can provide early warning of an actual risk event. Risks are typically identified using some sort of checklist, specific to the application area of the project. Risk interviews of key personnel can also help to identify atypical project risks not included on the checklists. Once the potential risks have been identified they must be assessed in terms of the likelihood of their occurrence, and the potential impact if they do occur. Typical assessment techniques include quantitative analysis of probabilities of occurrence, and cost of impact if the risk event does occur, in order to give an expected monetary value (probability times cost) for each potential risk. Tools such as simulations and decision trees are used to aid this analysis when probability and cost figures are available, but expert judgment is also used if the probabilities or costs are difficult to estimate because of uncertainties about the potential risk. When expert judgment is used, likelihood of risk and impact are usually estimated on a low-medium-high scale. The expert judgment approach is frequently applied in IS projects because of the typically high levels of uncertainty in these projects (McFarlan, 1981; McLeod & Smith, 1996). The analysis of the risks results in a prioritized list of risks, and also an overall assessment of the level of riskiness of the whole project. In IT projects, the level of riskiness of a project is often considered as a contingent factor in determining the management approach to take for the project. For example, Davis (1982), McFarlan (1981) and Barki et al. (2001) all 23

24 recommend a contingency approach to IT project management depending on the degree of uncertainty (i.e. riskiness) about the project. Some potential risks can also represent potential opportunities depending on the outcome of managing the risk (PMI Standards Committee, 1996), and hence a thorough risk assessment phase also includes consideration of potential opportunities and how to take advantage of these. For example, in IT projects, working with a new programming language could be considered a potential risk to the project s success because of the team s inexperience with the language, but it also can open up new future opportunities if the project team can master the skills required with the new language. However, typically in the IT risk literature, the focus is solely on the negative aspects of risk, with little or no consideration of the broader range of possible outcomes (Lyytinen et al., 1998). The list of risks identified, prioritized as discussed above, is the input for the risk response-planning phase, during which plans are developed to address the various risks (and take advantage of potential opportunities). Each risk is considered, to determine what response is required. Preventive steps are taken to eliminate or mitigate the impact of high priority risks, while lower priority risks may simply be regarded as acceptable and no further action is taken. Contingent actions are planned to occur in the event that a particular risk event actually happens in spite of the preventive steps. Finally, in the risk monitoring stage, the project is checked for risk symptoms, feedback on progress is analyzed and compared with the original plan, and corrective measures are taken as necessary in accordance with the pre-planned contingent actions. Given the many problems that continue to recur in the IT project arena, the question of how project risk management is handled in the IT field is clearly of interest and is the aspect of IT project management focused on in this thesis. I next review the recommendations in the IT literature for successful project risk management IT project risk management literature The IT project risk literature falls into two major strands, the descriptive strand, which has focused on the first stage of risk management, identifying risk factors in software development projects; and the prescriptive strand, which gives advice on how to carry out risk management, and in some cases includes contingency frameworks for deciding when to apply certain risk management approaches. 24

25 Descriptive research on IT risk factors. The descriptive risk factors strand of research has focused on developing complete and comprehensive check-lists of risk factors to be considered when planning and managing an IT project. There is now a substantial body of work on the typical risk factors faced by software project managers, and also the priorities placed on these risk factors by managers (Alter & Ginzberg, 1978; Barki et al., 1993; Boehm, 1991; Heemstra & Kusters, 1996; Schmidt et al., 2001; Sumner, 2000). The risk check-lists vary in detail and emphasis, but the risks identified all generally fall within Sumner s (2000) eight categories of i) organizational fit, ii) skill mix, iii) management structure and strategy, iv) software systems design, v) user involvement and training, vi) technology planning, vii) project management, and viii) social commitment. While the risk check-lists developed by researchers are extensive and based on surveys and interviews with experienced and successful IT project managers, these checklists report what the managers say they attend to when considering IT projects, not how they actually use such check-lists. Perhaps the lists tell us more about managers views of what went wrong with their projects, than about what they actually do to try and ensure a project stays on track. We know very little about what managers actually do and how they assess and manage the risks of a given project. Whether project managers actually use risk checklists or not, they would seem a useful aid for assessing potential project risks. Yet, in practice, they are not always so practical. As Powell and Klein (1996) note, there may be a tendency to assume the checklist is complete, and therefore to overlook possible risks specific to a given project, but not included in the checklist. This is especially of concern since the reported checklists vary considerably in the risk factors on which they focus. For example, many studies cite top management support or the existence of a project sponsor as a crucial factor of success (Heemstra & Kusters, 1996; Moynihan, 1997; Parr & Shanks, 2000; Schmidt et al., 2001; Sumner, 2000). These researchers, and Barki et al. s (1993) initial literature survey of risk factors, all included top management support as a risk variable. However, this variable was dropped from the final measure of software development risk offered by Barki et al. as a tool for organizations wishing to undertake risk assessment of projects, because it did not load on any of the five factors they identified in their factor analysis. Similarly, Boehm s (1991) often cited top ten risk items does not include the lack of top management support or a project sponsor as a risk factor. Project managers who base their risk assessment on McFarlan s (1981) approach will find that he provides a primarily task and technology focused view, while more recent checklists place less emphasis on 25

26 technology and more on organizational, environmental and individual characteristics (Schmidt et al., 2001). Further, identifying risks on a checklist is not a substitute for actually taking action on the risks (Powell & Klein, 1996). Schmidt et al. note we still lack a basic understanding of why certain managerial actions serve to mitigate multiple risks, and under what conditions these actions are no longer effective. There is also little known about the extent to which the risk taxonomies and checklists discussed above are applicable in all software development situations and whether different taxonomies are needed for different project contexts (Moynihan, 1997). For example, Heemstra and Kusters (1996), drawing on evidence from five action research projects, note that the generic 36 risk factor checklist they developed was not suitable for one of the projects, which involved a package implementation and required relatively more emphasis on human aspects and less on technical development risks. And after analyzing seven case studies of firms implementing enterprise resource planning (ERP) systems, Sumner (2000) concluded that nine of the twenty detailed risk factors identified were unique to ERP systems and thus had not been adequately covered in previous checklists. These particularly relate to, firstly, the client s commitment to change business processes and data definitions to match the ERP package; secondly, the ERP firm s ability to obtain and retain personnel skilled in both the specific ERP technology and the client business or alternatively to work effectively with outside consultants providing these skills; and thirdly, the adequacy of training given to both the ERP firm s staff and the client firm s staff. These risk factors correspond to Parr and Shanks (2000) critical success factors of using vanilla ERP (i.e. change the client processes, not the ERP package), and having a balanced team (i.e. a mix of internal/external and business/technical expertise). Parr and Shanks do not mention training. Both Sumner and Parr and Shanks also identify full-time commitment from key client personnel and top management support as important factors but Sumner notes these are not unique to ERP projects. Thus the risk taxonomies and suitable strategies for software package implementation are likely to be different from those for in-house software development. We would, however, expect software package implementation risks to be closer to the bespoke project risks that Moynihan (1997) identified, since both package implementations and bespoke projects address an interface between two organizations vendor-client for packages and external developer-client for bespoke development. In 26

IT projects have an unenviable reputation for their high failure rate. Successful

IT projects have an unenviable reputation for their high failure rate. Successful RISK MANAGEMENT AND PROBLEM RESOLUTION STRATEGIES FOR IT PROJECTS: PRESCRIPTION AND PRACTICE HAZEL TAYLOR, University of Washington ABSTRACT This study reports findings from an exploratory field study

More information

Software Risk Management Practice: Evidence From Thai Software Firms

Software Risk Management Practice: Evidence From Thai Software Firms , March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced

More information

Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models

Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models 2013 Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models 1 Contents 1 Context... 1 2 General... 2 3 Guidelines on Pre-application for Internal Models...

More information

FUNBIO PROJECT RISK MANAGEMENT GUIDELINES

FUNBIO PROJECT RISK MANAGEMENT GUIDELINES FUNBIO PROJECT RISK MANAGEMENT GUIDELINES OP-09/2013 Responsible Unit: PMO Focal Point OBJECTIVE: This Operational Procedures presents the guidelines for the risk assessment and allocation process in projects.

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

Doctor of Education - Higher Education

Doctor of Education - Higher Education 1 Doctor of Education - Higher Education The University of Liverpool s Doctor of Education - Higher Education (EdD) is a professional doctoral programme focused on the latest practice, research, and leadership

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model

Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the

More information

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco

More information

Project Risk Management

Project Risk Management Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management

More information

Guidelines for developing the HDR thesis proposal

Guidelines for developing the HDR thesis proposal Guidelines for developing the HDR thesis proposal Overview All early childhood HDR candidates are required to deliver a research proposal during the first year of enrolment. It is expected that the thesis

More information

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : ens03dse@cs.umu.se Computing Science Department Umea University, Umea, Sweden Abstract. During software development,

More information

Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program

Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program Evaluation Plan: Process Evaluation for Hypothetical AmeriCorps Program Introduction: This evaluation plan describes a process evaluation for Financial Empowerment Corps (FEC), an AmeriCorps State and

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION. Any special criteria Accounting, Accountability MSc. value Equivalent. Credit.

PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION. Any special criteria Accounting, Accountability MSc. value Equivalent. Credit. PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation MSc Accounting, Accountability & Financial Management 2. Final award Award Title Credit value ECTS Equivalent

More information

Instructional Technology Capstone Project Standards and Guidelines

Instructional Technology Capstone Project Standards and Guidelines Instructional Technology Capstone Project Standards and Guidelines The Committee recognizes the fact that each EdD program is likely to articulate some requirements that are unique. What follows are a

More information

Cover Page. The handle http://hdl.handle.net/1887/33081 holds various files of this Leiden University dissertation.

Cover Page. The handle http://hdl.handle.net/1887/33081 holds various files of this Leiden University dissertation. Cover Page The handle http://hdl.handle.net/1887/33081 holds various files of this Leiden University dissertation. Author: Stettina, Christoph Johann Title: Governance of innovation project management

More information

Copyrighted material SUMMARY

Copyrighted material SUMMARY Source: E.C.A. Kaarsemaker (2006). Employee ownership and human resource management: a theoretical and empirical treatise with a digression on the Dutch context. Doctoral Dissertation, Radboud University

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

ISRE 2400 (Revised), Engagements to Review Historical Financial Statements

ISRE 2400 (Revised), Engagements to Review Historical Financial Statements International Auditing and Assurance Standards Board Exposure Draft January 2011 Comments requested by May 20, 2011 Proposed International Standard on Review Engagements ISRE 2400 (Revised), Engagements

More information

Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong

Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong Top Ten Lists of Software Project Risks : Evidence from the Literature Survey Tharwon Arnuphaptrairong Abstract Software risk management is crucial for the software development s. It is used for planning

More information

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA. Red River College Course Learning Outcome Alignment with BABOK Version 2 This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed

More information

Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance

Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance Ayman Bazhair and Kamaljeet Sandhu Abstract The purpose of this research paper to present the synthesized

More information

Integrated Risk Management:

Integrated Risk Management: Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)

More information

Software Risk Management Practice: Evidence From Thai Software Industry

Software Risk Management Practice: Evidence From Thai Software Industry INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon

More information

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements School of Advanced Studies Doctor Of Management In Organizational Leadership The mission of the Doctor of Management in Organizational Leadership degree program is to develop the critical and creative

More information

Volunteer Managers National Occupational Standards

Volunteer Managers National Occupational Standards Volunteer Managers National Occupational Standards Contents 00 Forward 00 Section 1 Introduction 00 Who are these standards for? 00 Why should you use them? 00 How can you use them? 00 What s in a Standard?

More information

School of Management MBA in International Management Section 1 2014-2015

School of Management MBA in International Management Section 1 2014-2015 School of Management MBA in International Management Section 1 2014-2015 1 Contents Page MBA INTERNATIONAL MANAGEMENT AT THE SCHOOL OF MANAGEMENT... 1 DIRECTOR OF MBA INTERNATIONAL MANAGEMENT PROGRAMME...

More information

Professional Development for Engagement Partners Responsible for Audits of Financial Statements (Revised)

Professional Development for Engagement Partners Responsible for Audits of Financial Statements (Revised) IFAC Board Exposure Draft August 2012 Comments due: December 11, 2012 Proposed International Education Standard (IES) 8 Professional Development for Engagement Partners Responsible for Audits of Financial

More information

PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION

PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation MSc Accounting, Accountability & Financial Management For undergraduate programmes only Single honours Joint

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

1. Programme title and designation Applied Linguistics and English Language Teaching 180-195 90-98 N/A. value equivalent. value

1. Programme title and designation Applied Linguistics and English Language Teaching 180-195 90-98 N/A. value equivalent. value PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Applied Linguistics and English Language Teaching 2. Final award Award Title Credit ECTS Any special criteria

More information

Programme Specification

Programme Specification Programme Specification Title: Finance Final Award: Master of Business Administration (MBA) With Exit Awards at: Master of Business Administration (MBA) Postgraduate Diploma (PG Dip) Postgraduate Certificate

More information

Initial Professional Development - Professional Values, Ethics, and Attitudes (Revised)

Initial Professional Development - Professional Values, Ethics, and Attitudes (Revised) IFAC Board Exposure Draft July 2012 Comments due: October 11, 2012 Proposed International Education Standard (IES) 4 Initial Professional Development - Professional Values, Ethics, and Attitudes (Revised)

More information

Palisade Risk Conference, 2014

Palisade Risk Conference, 2014 Advanced Risk Management to Improve Cost and Schedule Performance on EPC Projects Risk-Management Best Practices from Nuclear Experience Palisade Risk Conference, 2014 Sola Talabi PhD MBA MSc BSc RMP Project

More information

INTEGRATING RECORDS MANAGEMENT

INTEGRATING RECORDS MANAGEMENT INTERNATIONAL RECORDS MANAGEMENT TRUST INTEGRATING RECORDS MANAGEMENT IN ICT SYSTEMS Good Practice Indicators CONTENTS Figure 1: Designing a Records Management Improvement Programme iv Figure 2: Integrating

More information

HIGHER DIPLOMA BUSINESS FINANCE

HIGHER DIPLOMA BUSINESS FINANCE BENCHMARK STATEMENTS for HIGHER DIPLOMA in BUSINESS FINANCE SRI LANKA QUALIFICATIONS FRAMEWORK AND QUALITY ASSURANCE UNIT HIGHER EDUCATION FOR TWENTY FIRST CENTURY (HETC) PROJECT Ministry of Higher Education

More information

HENLEY BUSINESS SCHOOL DOCTORAL PROGRAMME SPECIFICATION DOCTOR OF BUSINESS ADMINISTRATION

HENLEY BUSINESS SCHOOL DOCTORAL PROGRAMME SPECIFICATION DOCTOR OF BUSINESS ADMINISTRATION HENLEY BUSINESS SCHOOL DOCTORAL PROGRAMME SPECIFICATION DOCTOR OF BUSINESS ADMINISTRATION 1 1 CONTENTS Page 1. Award Information and Programme Description 3 2. Educational Aims of the Programme 4 Programme

More information

Programme Specification

Programme Specification Programme Specification Title: Master of Business Final Award: Master of Business Administration (MBA) With Exit Awards at: Postgraduate Certificate in Management (CMS) Diploma in Management Studies (DMS)

More information

Exploring How Human Resource Management Initiatives Can Build Organisational Knowledge:

Exploring How Human Resource Management Initiatives Can Build Organisational Knowledge: Exploring How Human Resource Management Initiatives Can Build Organisational Knowledge: A case study of Knowledge Management in a Law firm Erin Marley Bachelor of Commerce Supervised By Dr. Scott Gardner

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division

More information

Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor

Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor Public Health Competency Based Employee Performance Management Toolkit OPHA & Partners, Version

More information

Deriving Value from ORSA. Board Perspective

Deriving Value from ORSA. Board Perspective Deriving Value from ORSA Board Perspective April 2015 1 This paper has been produced by the Joint Own Risk Solvency Assessment (ORSA) Subcommittee of the Insurance Regulation Committee and the Enterprise

More information

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015 Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...

More information

Programme Specification

Programme Specification Programme Specification Title: Master of Business Final Award: Master of Business Administration (MBA) With Exit Awards at: Postgraduate Certificate in Management (CMS) Postgraduate Diploma (PG Dip) Master

More information

United States General Accounting Office GAO. Request for Views RESULTS-ORIENTED BUDGET PRACTICES IN FEDERAL AGENCIES. August 2001.

United States General Accounting Office GAO. Request for Views RESULTS-ORIENTED BUDGET PRACTICES IN FEDERAL AGENCIES. August 2001. GAO United States General Accounting Office Request for Views August 2001 RESULTS-ORIENTED BUDGET PRACTICES IN FEDERAL AGENCIES a GAO-01-1084SP Contents Scope and Methodology 5 Framework for Results-Oriented

More information

Project Management Guidebook

Project Management Guidebook METHOD 12 3 empowering managers to succeed Project Management Guidebook ISBN 0-473-10445-8 A bout this e-book This e-book was created by Method123 (see www.method123.com) to help provide you with a simple

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Nottingham Business School/City 3. Final Award, Course Title

More information

Influence of Tactical Factors on ERP Projects Success

Influence of Tactical Factors on ERP Projects Success 2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Influence of Tactical Factors on ERP Projects Success Shahin Dezdar + Institute for International

More information

Work based learning. Executive summary. Background

Work based learning. Executive summary. Background Work based learning Executive summary Background The training contract stage of qualifying as a solicitor is a prime example of 'work based learning' (WBL), a phrase that generally describes the learning

More information

DOCTOR OF PHILOSOPHY DEGREE. Educational Leadership Doctor of Philosophy Degree Major Course Requirements. EDU721 (3.

DOCTOR OF PHILOSOPHY DEGREE. Educational Leadership Doctor of Philosophy Degree Major Course Requirements. EDU721 (3. DOCTOR OF PHILOSOPHY DEGREE Educational Leadership Doctor of Philosophy Degree Major Course Requirements EDU710 (3.0 credit hours) Ethical and Legal Issues in Education/Leadership This course is an intensive

More information

LONDON SCHOOL OF COMMERCE. Programme Specifications for the. Cardiff Metropolitan University. MSc in International Hospitality Management

LONDON SCHOOL OF COMMERCE. Programme Specifications for the. Cardiff Metropolitan University. MSc in International Hospitality Management LONDON SCHOOL OF COMMERCE Programme Specifications for the Cardiff Metropolitan University MSc in International Hospitality Management 1 Contents Programme Aims and Objectives 3 Programme Learning Outcomes

More information

Governance Guideline SEPTEMBER 2013 BC CREDIT UNIONS. www.fic.gov.bc.ca

Governance Guideline SEPTEMBER 2013 BC CREDIT UNIONS. www.fic.gov.bc.ca Governance Guideline SEPTEMBER 2013 BC CREDIT UNIONS www.fic.gov.bc.ca INTRODUCTION The Financial Institutions Commission 1 (FICOM) holds the Board of Directors 2 (board) accountable for the stewardship

More information

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français.

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français. Guidance Note: Corporate Governance - Board of Directors March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance - Board of Directors (the Guidance

More information

Chapter 1 Introduction to the Study

Chapter 1 Introduction to the Study ` Chapter 1 Introduction to the Study 1.1. Introduction The convergence of computer and communications technologies of the late 20th century has profoundly affected information creation, distribution,

More information

Business Logistics Specialist Position Description

Business Logistics Specialist Position Description Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Master of Arts in Business Education (MA) 29 January 2016. Module 1 Introduction to Business Education (6 ECTS) Content. Learning Outcomes F01 BE01

Master of Arts in Business Education (MA) 29 January 2016. Module 1 Introduction to Business Education (6 ECTS) Content. Learning Outcomes F01 BE01 Module 1 Introduction to Business Education (6 ECTS) F01 BE01 I) Basic ideas and fundamental theories of Educational Sciences Introduction to the Study of Learning Behaviourism Information Processing Theory

More information

Appendix 3 (normative) High level structure, identical core text, common terms and core definitions

Appendix 3 (normative) High level structure, identical core text, common terms and core definitions Appendix 3 (normative) High level structure, identical core text, common terms and core definitions NOTE In the Identical text proposals, XXX = an MSS discipline specific qualifier (e.g. energy, road traffic

More information

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams. : Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks

More information

ECTS equivalent. Any special criteria PGDip International Marketing 120 60 Students undertake 120 credits from taught modules 4. Exit award.

ECTS equivalent. Any special criteria PGDip International Marketing 120 60 Students undertake 120 credits from taught modules 4. Exit award. PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation International Marketing 2. Final award Award Title Credit value ECTS equivalent MSc International Marketing

More information

TABLE OF CONTENTS. Accreditation and Educational Outcomes 1. Curriculum of the Post-Master s DNP Program 1-2. Program of Study 2-3

TABLE OF CONTENTS. Accreditation and Educational Outcomes 1. Curriculum of the Post-Master s DNP Program 1-2. Program of Study 2-3 DNP 2015 2016 TABLE OF CONTENTS Accreditation and Educational Outcomes 1 Curriculum of the Post-Master s DNP Program 1-2 Program of Study 2-3 Course Descriptions for Core Courses 4-6 The E-Portfolio 6-7

More information

PUBLIC ACCOUNTANTS COUNCIL HANDBOOK

PUBLIC ACCOUNTANTS COUNCIL HANDBOOK PUBLIC ACCOUNTANTS COUNCIL HANDBOOK Adopted by the Public Accountants Council for the Province of Ontario: April 17, 2006 PART I: PROFESSIONAL COMPETENCY REQUIREMENTS FOR PUBLIC ACCOUNTING PART II: PRACTICAL

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT 11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

Core Monitoring Guide

Core Monitoring Guide Core Monitoring Guide April 2005 eta UNITED STATES DEPARTMENT OF LABOR EMPLOYMENT AND TRAINING ADMINISTRATION Core Monitoring Guide April 2005 United States Department of Labor Employment and Training

More information

Department of Administration Portfolio Management System 1.3 June 30, 2010

Department of Administration Portfolio Management System 1.3 June 30, 2010 E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized

More information

MA Thesis Handbook AY2014-2015. Program on International Relations New York University. Fifth Floor 19 University Place New York, New York 10003

MA Thesis Handbook AY2014-2015. Program on International Relations New York University. Fifth Floor 19 University Place New York, New York 10003 MA Thesis Handbook AY2014-2015 Program on International Relations New York University Fifth Floor 19 University Place New York, New York 10003 The thesis The thesis is the culmination of independent supervised

More information

Crosswalk Between Current and New PMP Task Classifications

Crosswalk Between Current and New PMP Task Classifications Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the

More information

IPP Learning Outcomes Report. Faculty member completing template: Greg Kim Ju, Marya Endriga (Date: 1/17/12)

IPP Learning Outcomes Report. Faculty member completing template: Greg Kim Ju, Marya Endriga (Date: 1/17/12) Page 1 IPP Learning Outcomes Report Program: Department: Psychology MA (General) Psychology Number of students enrolled in the program in Fall, 2011: 48 (Appendix A) Faculty member completing template:

More information

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected

More information

Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing.

Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing. Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing BSc Important document please read This document contains important

More information

Partnering for Project Success: Project Manager and Business Analyst Collaboration

Partnering for Project Success: Project Manager and Business Analyst Collaboration Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,

More information

Pharmaceutical Sales Certificate

Pharmaceutical Sales Certificate Pharmaceutical Sales Certificate Target Audience Medical representatives Objective The objective of this program is to provide the necessary skills and knowledge needed to succeed as medical representatives.

More information

Quick Guide: Meeting ISO 55001 Requirements for Asset Management

Quick Guide: Meeting ISO 55001 Requirements for Asset Management Supplement to the IIMM 2011 Quick Guide: Meeting ISO 55001 Requirements for Asset Management Using the International Infrastructure Management Manual (IIMM) ISO 55001: What is required IIMM: How to get

More information

A comparison of supply chain risk perceptions in Original Equipment Manufacturers and Tier One suppliers: A case-study in the aerospace industry.

A comparison of supply chain risk perceptions in Original Equipment Manufacturers and Tier One suppliers: A case-study in the aerospace industry. 011-0290 A comparison of supply chain risk perceptions in Original Equipment Manufacturers and Tier One suppliers: A case-study in the aerospace industry. Naomi Brookes Amrik Singh Aston Business School

More information

Master s Programme in International Administration and Global Governance

Master s Programme in International Administration and Global Governance Programme syllabus for the Master s Programme in International Administration and Global Governance 120 higher education credits Second Cycle Confirmed by the Faculty Board of Social Sciences 2015-05-11

More information

IT Service Provider and Consumer Support Engineer Position Description

IT Service Provider and Consumer Support Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

How To Monitor A Project

How To Monitor A Project Module 4: Monitoring and Reporting 4-1 Module 4: Monitoring and Reporting 4-2 Module 4: Monitoring and Reporting TABLE OF CONTENTS 1. MONITORING... 3 1.1. WHY MONITOR?... 3 1.2. OPERATIONAL MONITORING...

More information

BS, MS, DNP and PhD in Nursing Competencies

BS, MS, DNP and PhD in Nursing Competencies BS, MS, DNP and PhD in Nursing Competencies The competencies arise from the understanding of nursing as a theory-guided, evidenced -based discipline. Graduates from the curriculum are expected to possess

More information

The University of Edinburgh MSc Management of Training and Development Course Outlines

The University of Edinburgh MSc Management of Training and Development Course Outlines The University of Edinburgh MSc Management of Training and Development Course Outlines This document gives brief details of the core and main option courses on the MSc Management of Training and Development

More information

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK November 2006 National Qualifications Framework for Higher Education in Thailand Implementation Handbook Table

More information

EIOPACP 13/011. Guidelines on PreApplication of Internal Models

EIOPACP 13/011. Guidelines on PreApplication of Internal Models EIOPACP 13/011 Guidelines on PreApplication of Internal Models EIOPA Westhafen Tower, Westhafenplatz 1 60327 Frankfurt Germany Tel. + 49 6995111920; Fax. + 49 6995111919; site: www.eiopa.europa.eu Guidelines

More information

Criteria for the Accreditation of. DBA Programmes

Criteria for the Accreditation of. DBA Programmes Criteria for the Accreditation of DBA Programmes 1 1 INTRODUCTION 1.1 This document sets out the criteria for DBA programme accreditation. While setting the standards that accredited provision is expected

More information

CIRCULAR 3,647, MARCH 4 2013

CIRCULAR 3,647, MARCH 4 2013 CIRCULAR 3,647, MARCH 4 2013 Establishes the minimum requirements for use of the advanced approach based on internal models for the calculation of the operational risk component (RWA OAMA ) of the Risk-Weighted

More information

Capital Adequacy: Advanced Measurement Approaches to Operational Risk

Capital Adequacy: Advanced Measurement Approaches to Operational Risk Prudential Standard APS 115 Capital Adequacy: Advanced Measurement Approaches to Operational Risk Objective and key requirements of this Prudential Standard This Prudential Standard sets out the requirements

More information

STRATEGY DIRECTIVE (MA 208-2) 6. 3 STEPS OF TICHY FOR CHANGE IN ORGANIZATIONS

STRATEGY DIRECTIVE (MA 208-2) 6. 3 STEPS OF TICHY FOR CHANGE IN ORGANIZATIONS STRATEGY DIRECTIVE (MA 208-2) 6. 3 STEPS OF TICHY FOR CHANGE IN ORGANIZATIONS 6.2 Analysis of the Three Systems Change has become a way of life in America and within the diagnostic model, changes exist

More information

Haulsey Engineering, Inc. Quality Management System (QMS) Table of Contents

Haulsey Engineering, Inc. Quality Management System (QMS) Table of Contents Haulsey Engineering, Inc. Quality Management System (QMS) Table of Contents 1.0 Introduction 1.1 Quality Management Policy and Practices 2.0 Quality System Components 2.1 Quality Management Plans 2.2 Quality

More information

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date

More information

The Influence of Human Resource Management Practices on the Retention of Core Employees of Australian Organisations: An Empirical Study

The Influence of Human Resource Management Practices on the Retention of Core Employees of Australian Organisations: An Empirical Study The Influence of Human Resource Management Practices on the Retention of Core Employees of Australian Organisations: An Empirical Study Janet Cheng Lian Chew B.Com. (Hons) (Murdoch University) Submitted

More information

Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management

Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests t of

More information

ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk

ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk ENGINEERING COUNCIL Guidance on Risk for the Engineering Profession www.engc.org.uk/risk This guidance describes the role of professional engineers and technicians in dealing with risk, and their responsibilities

More information

Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES. First Edition July 2005. Hong Kong

Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES. First Edition July 2005. Hong Kong Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES First Edition July 2005 Hong Kong Contents Glossary...2 Introduction to Standards...4 Interpretation Section...6

More information

Getting things done How governments can deliver public infrastructure projects on time and within budget

Getting things done How governments can deliver public infrastructure projects on time and within budget Getting things done How governments can deliver public infrastructure projects on time and within budget Alexander Franke Alex Wittenberg One of the greatest potential threats to global prosperity is a

More information

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COMMITTEE OF SPONSORING ORGANIZATIONS (COSO) 2013 The Committee of Sponsoring Organizations (COSO) Internal Controls Integrated Framework,

More information

Criteria for the Accreditation of. MBM Programmes

Criteria for the Accreditation of. MBM Programmes Criteria for the Accreditation of MBM Programmes 1 2 1 INTRODUCTION Framework & Eligibility 1.1 This document sets out the criteria for MBM (Masters in Business & Management) programme accreditation. While

More information

Mode of Study The MPH course will be delivered full-time and part-time on campus at the Kedleston Road site

Mode of Study The MPH course will be delivered full-time and part-time on campus at the Kedleston Road site PROGRAMME SPECIFICATION DOCUMENT SECTION ONE: GENERAL INFORMATION Programme Title/ Subject Title: Master of Public Health Award title and Interim awards: Postgraduate Certificate in Public Health Postgraduate

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) 268 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information