SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
Aryana Project Management Conference
Tehran, Iran
March 2005
Use of Cause and Effect Diagram for Risk Management
Michael Stefanovic, P.Eng., PMP, MBA
Procept Associates Ltd.
www.procept.ca
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
1. Introduction
It was November 8, 2004 when I attended a dinner meeting that was organized by the
local PMI chapter. The guest speaker was Dr. David Hillson, of “Risk Doctor and
Partners.” The topic was “Use a Risk Breakdown Structure to Understand Your Risks”
(http://www.risk-doctor.com/). I have listened to David before; he is an excellent speaker
and he knows Risk Management. Again, his presentation was excellent and received a
standing ovation from the capacity crowd.
During the question and answer period, I was prompted to ask David: “Has anyone tried
to use a Cause and Effect Diagram for the same purpose of identifying project risks?” I
do not remember David’s answer, but it was enough to encourage me to explore this idea
further. I cannot pretend that this is an original idea; the PMBOK 2004 edition identifies
Cause and Effect Diagram as a tool for Risk Identification process (ref. #1).
I entered “Cause and Effect Diagram, Risk Management” on Google and got 421,000
hits! Unfortunately, almost all talked about one or the other, but not both (at least the first
50 did not). Rather than spend hours fishing for the right article, I concluded that the
purpose of the Cause and Effect Diagram is risk identification, even if this is not
expressly stated by an article. Therefore, I decided to simply make this link (between the
Cause and Effect Diagram, and Risk Management) more explicit. This, in conclusion, is
the purpose of this presentation.
2. Risk Management Basics
Figure 1 summarizes the 6 Risk Management processes, according to the PMI’s Guide to
the Project Management Body of Knowledge (ref. #1). For the purpose of this
presentation, I think that this is adequate. However, if more information is required, I
recommend reading Chapter 11 of the referenced book.
How to
approach and
conduct risk
management
on a project.
Determining
which risks
might affect
the project
and
documenting
their
characteristics
Prioritizing
risks for
subsequent
further analysis
or action
Numerically
analysing the
effect of
identified risks
on overall
project
objectives
Developing
options and
actions to
enhance
opportunities
and to reduce
threats to
project
objectives
Tracking
identified risks,
monitoring
residual risks,
identifying new
risks, executing
risk response
plans and
evaluating their
effectiveness.
Figure 1 – Risk Management Processes
Risk
Monitoring
And Control
Risk
Response
Planning
Quantitative
Risk
Analysis
Qualitative
Risk
Analysis
Risk
Identificat.
Risk
Management
Planning
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
3. What is Cause and Effect Diagram?
The Cause and Effect Diagram (CAED) organizes and graphically represents the causes
of a particular problem. It is also referred to as the Ishikawa Diagram, or Fishbone
Diagram. Another definition is: “A graphic tool used to explore and display opinion
about sources of variation in a process” (ref. #2).
CAED benefits are that it:
Defines sources that contribute most to the problem;
Defines interrelationships between these sources;
Provides a basis for corrective, or preventive action.
3.1 History
In the 1960 s, Dr. Kaoru Ishikawa developed and started using the concept.
3.2 What Does it Look Like?
Figure 2 shows one example of a CAED.
Late for
Work
Clothing
Alarm Clock
Bathroom Breakfast
Kids Spouse
Snow storm
Train late
Road
accident
Car does not
start
Transportation
Power failure
Alarm set for PM
Alarm set for
wrong time
Alarm not loud
enough
No clean shirts
Dog hid one shoe
Pants wrinkled
Hole in the soc
Kid sick
Kid missed
school bus
Kid lost his
homework
Does not want
to go to school
Town turns
water off
Light bulb burnt
Daughter taking shower
Toilet clogged
Wants to “converse”
Is sick
Forgot her birthday
Can not start her car
Out of eggs
Out of coffee
No clean cups
Toaster smoking
Figure 2 – Cause and Effect Diagram
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
3.3 How is CAED Used?
1. Start with the problem that is being analyzed on the right side of the diagram (e.g.
“Late For Work”);
2. List the possible causes of that problem at the end of each primary branch (e.g.
“Breakfast”). These are given conditions about which there is nothing we can do
(i.e. breakfast is taken before leaving for work);
3. Add secondary branches with risk events within the cause area (e.g. “toaster
smoking”);
4. Add tertiary branches: more detailed risk events that have as effect the risk event
on the secondary branch (e.g. full of crumbs, or wiring insulation too old);
5. Continue developing new, more detailed risk events until you have reached the
level of detail where risk events are specific, measurable and controllable.
This process can be performed by project team brainstorming, by using affinity diagrams,
or other facilitative risk identification tools.
Once completed, this process will provide a list of risk events that need to be addressed if
the probability of the problem occurrence is to be mitigated.
4. Use For Risk Management
4.1 Risk Identification
The process outlined under 3.3 above illustrates how a CAED can be used for risk event
identification.
4.2 Another Form of Risk breakdown Structure
CAED has all the advantages of a Risk Breakdown Structure, which are that it:
Facilitates risk identification;
Provides project risk categories;
Provides a template from past projects for the risk identification process;
Provides a structure for risk assessment;
Facilitates evaluation of the alternatives;
Figure 3 shows an example of a Risk breakdown Structure (ref. #5).
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
4.3 Provides a Hierarchy of Risks
As explained in 3.3, risk events are organized hierarchically. A risk event at one level of
detail becomes an effect (impact) of a more detailed risk event. For instance, the three top
level risk events of any project are:
Project ends late;
Project budget is overrun;
The product that the project delivered does not work.
Everyone knows that for any decently sized project, these risk events are not adequately
specific, measurable, or controllable to be practical. However, they are an example of the
first level of detail below an even higher level: “Project Fails.”
Using CAED as a risk hierarchical structure would lead us to define causes (e.g.
“Breakfast”) as the first level of risk event detail. In such case, we should give it a risk
event characteristic (e.g. “Breakfast Late”).
4.4 Evaluate Competing Proposals
The process for using CAED for evaluating competing proposals can be summarized as
follows:
1. Construct Risk Cause and Effect Diagram for each proposal;
2. Assess probability and impact for risk events at the ends of branches;
3. Multiply probability with impact for each risk event (Expected Monetary Value);
Figure 3 – Example of a Risk Breakdown Structure (Ref. #5)
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
4. Add all expected monetary values for each proposal;
5. Rank proposals in order of risk expected monetary values.
4.5 Prioritize Competing Projects
A very similar process to the one explained in 4.4 can be used for prioritizing between
competing projects:
1. Construct Risk Cause and Effect Diagram for each project;
2. Assess probability and impact for risk events at the ends of branches;
3. Multiply probability with impact for each risk event (Expected Monetary Value);
4. Add all expected monetary values for each project;
5. Rank projects in order of risk expected monetary values.
4.6 Organize Risk Historical Database
CAED can be used effectively for organizing a risk historical database storage and
retrieval system. It can:
1. Group projects by type;
2. Create risk causes categories;
3. Store risk factors information by cause;
4. Retrieve risk information only from applicable causes for a new project.
4.7 Risk Management Reporting
Similar to any other reporting strategy, risk management reports are structured to provide
summary reports to senior management and detailed reports to middle management. The
CAED hierarchy of risks can be used to summarize, or detail risk management reports.
5. Conclusion
A Cause and Effect Diagram can be effective in:
• Risk identification;
• Replacing Risk Breakdown Structure where advantageous;
• Hierarchically organizing risk events;
• Evaluating competing proposals on the basis of their risk levels;
• Prioritizing competing projects on the basis of their risk levels;
• Organizing a risk historical data base;
• Risk management reporting.
www.procept.com
Use of Cause and Effect Diagram for Risk Management
Copyright Procept Associates Ltd. 2005
References:
1. A Guide to the Project Management Body of Knowledge, Project Management
Institute, 3rd
edition, 2004
2. http://mot.vuse.vanderbilt.edu/mt322/Ishikawa.htm
3. http://www.jiscinfonet.ac.uk/InfoKits/risk-management/ishikawa
4. http://www.westfallteam.com/Cause&Effect_Diagrams.pdf
5. http://www.risk-doctor.com/
www.procept.com

Más contenido relacionado

La actualidad más candente

Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
Magdalena Anna Fas
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0
Rachael Phelan
 
What is strategy- Michael Porter
What is strategy- Michael Porter What is strategy- Michael Porter
What is strategy- Michael Porter
Abhilash Kallayil
 

La actualidad más candente (20)

Strategy formulation lecture notes
Strategy formulation lecture notesStrategy formulation lecture notes
Strategy formulation lecture notes
 
KFC in China International Business Strategy Analysis
KFC in China International Business Strategy AnalysisKFC in China International Business Strategy Analysis
KFC in China International Business Strategy Analysis
 
Horizontal integration - integration strategies - corporate level strategies...
Horizontal integration -  integration strategies - corporate level strategies...Horizontal integration -  integration strategies - corporate level strategies...
Horizontal integration - integration strategies - corporate level strategies...
 
Strategies for weak & crisis ridden businesses
Strategies for weak & crisis ridden businessesStrategies for weak & crisis ridden businesses
Strategies for weak & crisis ridden businesses
 
STRATEGIC MANAGEMENT: INCLUDING APPLICATION OF MAQASID AL-SHARIAH AS STRATEGI...
STRATEGIC MANAGEMENT: INCLUDING APPLICATION OF MAQASID AL-SHARIAH AS STRATEGI...STRATEGIC MANAGEMENT: INCLUDING APPLICATION OF MAQASID AL-SHARIAH AS STRATEGI...
STRATEGIC MANAGEMENT: INCLUDING APPLICATION OF MAQASID AL-SHARIAH AS STRATEGI...
 
STRATEGIC MANAGEMENT
STRATEGIC MANAGEMENT STRATEGIC MANAGEMENT
STRATEGIC MANAGEMENT
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
 
Managing risk in financial sector
Managing risk in financial sectorManaging risk in financial sector
Managing risk in financial sector
 
Implementation of Business Process Reengineering in Thermax Ltd.
Implementation of Business Process Reengineering in Thermax Ltd.Implementation of Business Process Reengineering in Thermax Ltd.
Implementation of Business Process Reengineering in Thermax Ltd.
 
Value at risk
Value at riskValue at risk
Value at risk
 
Glencore xstrata
Glencore xstrataGlencore xstrata
Glencore xstrata
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0
 
introduction of business policy||
introduction of business policy||introduction of business policy||
introduction of business policy||
 
Offensive defensive strategy, key success factor, strategic group mapping
Offensive defensive strategy, key success factor, strategic group mappingOffensive defensive strategy, key success factor, strategic group mapping
Offensive defensive strategy, key success factor, strategic group mapping
 
Enterprise risk management summary approach guide
Enterprise risk management summary approach guideEnterprise risk management summary approach guide
Enterprise risk management summary approach guide
 
Risk Return Trade Off PowerPoint Presentation Slides
Risk Return Trade Off PowerPoint Presentation SlidesRisk Return Trade Off PowerPoint Presentation Slides
Risk Return Trade Off PowerPoint Presentation Slides
 
Tata Corus Ppt
Tata  Corus PptTata  Corus Ppt
Tata Corus Ppt
 
What is strategy- Michael Porter
What is strategy- Michael Porter What is strategy- Michael Porter
What is strategy- Michael Porter
 
Growth strategies
Growth strategiesGrowth strategies
Growth strategies
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 

Similar a Use of Causeand Effect Diagrams for Risk Management

Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
MatthewTennant613
 
Repeatable Risk Identification - Paper
Repeatable Risk Identification - PaperRepeatable Risk Identification - Paper
Repeatable Risk Identification - Paper
Daniel Ackermann
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
ejlp12
 

Similar a Use of Causeand Effect Diagrams for Risk Management (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Visual tools for Risk Management Process
Visual tools for Risk Management ProcessVisual tools for Risk Management Process
Visual tools for Risk Management Process
 
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisAdopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too
 
Comprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementComprehensive Overview Of Risk Management
Comprehensive Overview Of Risk Management
 
Building Risk Tolerance into the Program Plan and Schedule
Building Risk Tolerance into the Program Plan and ScheduleBuilding Risk Tolerance into the Program Plan and Schedule
Building Risk Tolerance into the Program Plan and Schedule
 
How Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us DownHow Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us Down
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
Session 10 gdas pmp study group presentation
Session 10   gdas pmp study group presentationSession 10   gdas pmp study group presentation
Session 10 gdas pmp study group presentation
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
Repeatable Risk Identification - Paper
Repeatable Risk Identification - PaperRepeatable Risk Identification - Paper
Repeatable Risk Identification - Paper
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
Managing cost and schedule risk
Managing cost and schedule riskManaging cost and schedule risk
Managing cost and schedule risk
 
Building a risk tolerant integrated master schedule
Building a risk tolerant integrated master scheduleBuilding a risk tolerant integrated master schedule
Building a risk tolerant integrated master schedule
 
Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit Corporate and Project Risk Management Toolkit
Corporate and Project Risk Management Toolkit
 

Más de Procept Associates

Procept Whirlwind Workshop 2007
Procept Whirlwind Workshop 2007Procept Whirlwind Workshop 2007
Procept Whirlwind Workshop 2007
Procept Associates
 
White Paper:Project Management And Business Analysis Maturity
White Paper:Project Management And Business Analysis MaturityWhite Paper:Project Management And Business Analysis Maturity
White Paper:Project Management And Business Analysis Maturity
Procept Associates
 

Más de Procept Associates (8)

Project Scheduling & Controls
Project Scheduling & ControlsProject Scheduling & Controls
Project Scheduling & Controls
 
Ba Certificate Info 2009-09-28
Ba Certificate Info 2009-09-28Ba Certificate Info 2009-09-28
Ba Certificate Info 2009-09-28
 
Decisions Decisions
Decisions DecisionsDecisions Decisions
Decisions Decisions
 
ITILv3 Service Design
ITILv3 Service DesignITILv3 Service Design
ITILv3 Service Design
 
Essential Business Analysis Skills
Essential Business Analysis SkillsEssential Business Analysis Skills
Essential Business Analysis Skills
 
Procept Whirlwind Workshop 2007
Procept Whirlwind Workshop 2007Procept Whirlwind Workshop 2007
Procept Whirlwind Workshop 2007
 
Procept Risk Workshop 2007
Procept Risk Workshop 2007Procept Risk Workshop 2007
Procept Risk Workshop 2007
 
White Paper:Project Management And Business Analysis Maturity
White Paper:Project Management And Business Analysis MaturityWhite Paper:Project Management And Business Analysis Maturity
White Paper:Project Management And Business Analysis Maturity
 

Último

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 

Último (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Use of Causeand Effect Diagrams for Risk Management

  • 1. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 Aryana Project Management Conference Tehran, Iran March 2005 Use of Cause and Effect Diagram for Risk Management Michael Stefanovic, P.Eng., PMP, MBA Procept Associates Ltd. www.procept.ca www.procept.com
  • 2. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 1. Introduction It was November 8, 2004 when I attended a dinner meeting that was organized by the local PMI chapter. The guest speaker was Dr. David Hillson, of “Risk Doctor and Partners.” The topic was “Use a Risk Breakdown Structure to Understand Your Risks” (http://www.risk-doctor.com/). I have listened to David before; he is an excellent speaker and he knows Risk Management. Again, his presentation was excellent and received a standing ovation from the capacity crowd. During the question and answer period, I was prompted to ask David: “Has anyone tried to use a Cause and Effect Diagram for the same purpose of identifying project risks?” I do not remember David’s answer, but it was enough to encourage me to explore this idea further. I cannot pretend that this is an original idea; the PMBOK 2004 edition identifies Cause and Effect Diagram as a tool for Risk Identification process (ref. #1). I entered “Cause and Effect Diagram, Risk Management” on Google and got 421,000 hits! Unfortunately, almost all talked about one or the other, but not both (at least the first 50 did not). Rather than spend hours fishing for the right article, I concluded that the purpose of the Cause and Effect Diagram is risk identification, even if this is not expressly stated by an article. Therefore, I decided to simply make this link (between the Cause and Effect Diagram, and Risk Management) more explicit. This, in conclusion, is the purpose of this presentation. 2. Risk Management Basics Figure 1 summarizes the 6 Risk Management processes, according to the PMI’s Guide to the Project Management Body of Knowledge (ref. #1). For the purpose of this presentation, I think that this is adequate. However, if more information is required, I recommend reading Chapter 11 of the referenced book. How to approach and conduct risk management on a project. Determining which risks might affect the project and documenting their characteristics Prioritizing risks for subsequent further analysis or action Numerically analysing the effect of identified risks on overall project objectives Developing options and actions to enhance opportunities and to reduce threats to project objectives Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans and evaluating their effectiveness. Figure 1 – Risk Management Processes Risk Monitoring And Control Risk Response Planning Quantitative Risk Analysis Qualitative Risk Analysis Risk Identificat. Risk Management Planning www.procept.com
  • 3. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 3. What is Cause and Effect Diagram? The Cause and Effect Diagram (CAED) organizes and graphically represents the causes of a particular problem. It is also referred to as the Ishikawa Diagram, or Fishbone Diagram. Another definition is: “A graphic tool used to explore and display opinion about sources of variation in a process” (ref. #2). CAED benefits are that it: Defines sources that contribute most to the problem; Defines interrelationships between these sources; Provides a basis for corrective, or preventive action. 3.1 History In the 1960 s, Dr. Kaoru Ishikawa developed and started using the concept. 3.2 What Does it Look Like? Figure 2 shows one example of a CAED. Late for Work Clothing Alarm Clock Bathroom Breakfast Kids Spouse Snow storm Train late Road accident Car does not start Transportation Power failure Alarm set for PM Alarm set for wrong time Alarm not loud enough No clean shirts Dog hid one shoe Pants wrinkled Hole in the soc Kid sick Kid missed school bus Kid lost his homework Does not want to go to school Town turns water off Light bulb burnt Daughter taking shower Toilet clogged Wants to “converse” Is sick Forgot her birthday Can not start her car Out of eggs Out of coffee No clean cups Toaster smoking Figure 2 – Cause and Effect Diagram www.procept.com
  • 4. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 3.3 How is CAED Used? 1. Start with the problem that is being analyzed on the right side of the diagram (e.g. “Late For Work”); 2. List the possible causes of that problem at the end of each primary branch (e.g. “Breakfast”). These are given conditions about which there is nothing we can do (i.e. breakfast is taken before leaving for work); 3. Add secondary branches with risk events within the cause area (e.g. “toaster smoking”); 4. Add tertiary branches: more detailed risk events that have as effect the risk event on the secondary branch (e.g. full of crumbs, or wiring insulation too old); 5. Continue developing new, more detailed risk events until you have reached the level of detail where risk events are specific, measurable and controllable. This process can be performed by project team brainstorming, by using affinity diagrams, or other facilitative risk identification tools. Once completed, this process will provide a list of risk events that need to be addressed if the probability of the problem occurrence is to be mitigated. 4. Use For Risk Management 4.1 Risk Identification The process outlined under 3.3 above illustrates how a CAED can be used for risk event identification. 4.2 Another Form of Risk breakdown Structure CAED has all the advantages of a Risk Breakdown Structure, which are that it: Facilitates risk identification; Provides project risk categories; Provides a template from past projects for the risk identification process; Provides a structure for risk assessment; Facilitates evaluation of the alternatives; Figure 3 shows an example of a Risk breakdown Structure (ref. #5). www.procept.com
  • 5. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 4.3 Provides a Hierarchy of Risks As explained in 3.3, risk events are organized hierarchically. A risk event at one level of detail becomes an effect (impact) of a more detailed risk event. For instance, the three top level risk events of any project are: Project ends late; Project budget is overrun; The product that the project delivered does not work. Everyone knows that for any decently sized project, these risk events are not adequately specific, measurable, or controllable to be practical. However, they are an example of the first level of detail below an even higher level: “Project Fails.” Using CAED as a risk hierarchical structure would lead us to define causes (e.g. “Breakfast”) as the first level of risk event detail. In such case, we should give it a risk event characteristic (e.g. “Breakfast Late”). 4.4 Evaluate Competing Proposals The process for using CAED for evaluating competing proposals can be summarized as follows: 1. Construct Risk Cause and Effect Diagram for each proposal; 2. Assess probability and impact for risk events at the ends of branches; 3. Multiply probability with impact for each risk event (Expected Monetary Value); Figure 3 – Example of a Risk Breakdown Structure (Ref. #5) www.procept.com
  • 6. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 4. Add all expected monetary values for each proposal; 5. Rank proposals in order of risk expected monetary values. 4.5 Prioritize Competing Projects A very similar process to the one explained in 4.4 can be used for prioritizing between competing projects: 1. Construct Risk Cause and Effect Diagram for each project; 2. Assess probability and impact for risk events at the ends of branches; 3. Multiply probability with impact for each risk event (Expected Monetary Value); 4. Add all expected monetary values for each project; 5. Rank projects in order of risk expected monetary values. 4.6 Organize Risk Historical Database CAED can be used effectively for organizing a risk historical database storage and retrieval system. It can: 1. Group projects by type; 2. Create risk causes categories; 3. Store risk factors information by cause; 4. Retrieve risk information only from applicable causes for a new project. 4.7 Risk Management Reporting Similar to any other reporting strategy, risk management reports are structured to provide summary reports to senior management and detailed reports to middle management. The CAED hierarchy of risks can be used to summarize, or detail risk management reports. 5. Conclusion A Cause and Effect Diagram can be effective in: • Risk identification; • Replacing Risk Breakdown Structure where advantageous; • Hierarchically organizing risk events; • Evaluating competing proposals on the basis of their risk levels; • Prioritizing competing projects on the basis of their risk levels; • Organizing a risk historical data base; • Risk management reporting. www.procept.com
  • 7. Use of Cause and Effect Diagram for Risk Management Copyright Procept Associates Ltd. 2005 References: 1. A Guide to the Project Management Body of Knowledge, Project Management Institute, 3rd edition, 2004 2. http://mot.vuse.vanderbilt.edu/mt322/Ishikawa.htm 3. http://www.jiscinfonet.ac.uk/InfoKits/risk-management/ishikawa 4. http://www.westfallteam.com/Cause&Effect_Diagrams.pdf 5. http://www.risk-doctor.com/ www.procept.com