Article Preview
TopRra Identification And Structuring
The RRA strategies for threats can be categorized into four different groups: avoidance, transfer, mitigation, and acceptance (PMI, 2004; Tan et al., 2008). The corresponding strategies for opportunities are exploitation, sharing, enhancement, and ignoring (Hillson, 1999). Also, according to Chapman and Ward (2003), there are nine types of generic RRAs for threats including modify objectives, avoid the risk, influence risk probability, modify risk impacts, develop contingency plans, keep options open, monitor the risk, accept the risk, and remain unaware. Additionally, it is useful to consider the timing of RRAs rather than being concerned too much about the type of RRA, which is whether RRA is to be implemented before (proactive) or after (reactive) the risk occurrence.
There are some general techniques, which could be used in RRA identification such as brainstorming, interviewing, checklists, Delphi technique, Cause and effect diagram, etc (Royer, 2000). Some researchers have proposed specific methods for identification and structuring RRAs in the project context.
Synergistic Contingency Evaluation and Review Technique (SCERT) Approach
One of the earliest efforts was a methodology developed by Chapman (1979) named SCERT, which provides a foundation for correlating risks and activities from the project WBS (Work Breakdown Structure). A conventional SCERT approach considers each activity individually and identifies risks and RRAs associated with that activity.