Latest Lambert Mba Project Main Body
Latest Lambert Mba Project Main Body
Latest Lambert Mba Project Main Body
INTRODUCTION
Risk management (RM) is a concept which is used in all industries, from IT related
industry has developed their own RM standards, but the general ideas of the
concept usually remain the same regardless of the sector. According to the Project
Management Institute (PMI) (2004), project risk management is one of the nine
between managing risks and a project success. While RM is described as the most
One concept which is widely used within the field of RM is called the risk
assessment, taking action and monitoring the risks (Barton et al., 2002). In each of
these steps, there are a number of methods and techniques which facilitate handling
the risks.
Many industries have become more proactive and aware of using analyses in
not commonly used (Akkermans et al., 2002). More construction companies are
starting to become aware of the RMP, but are still not using models and techniques
aimed for managing risks. This contradicts the fact that the industry is trying to be
more cost and time efficient as well as have more control over projects. Risk is
associated to any project regardless the industry and thus RM should be of interest
to any project manager. Risks differ between projects due to the fact that every
However there are still many practitioners that have not realized the importance of
al., 2002). Even though there is an awareness of risks and their consequences,
recent years, Nigeria has recognized the importance of the risk management
function, which is why that function has been established in some institutions both
regime of most public institutions and a number of larger private companies. The
and corporate governance processes and ensure that they are adequate and are
function as essential for all institutions and suggests that where the board of such
reasons for its decision should be advanced in the institutions Annual Report.
management departments that have the mandate of regulating and managing the
various risks the companies encounter in the course of doing business. Some of
these risks include: market risk, operational risk, credit risk and funding risk. As a
standard practice they maintain written policies and procedures that clearly outline
their risk management guidance for their trading activities. These policies identify
the risk tolerance of the Board of Directors and clearly delineate lines of authority
and responsibility for managing the risks of these activities. Individuals throughout
the trading and derivatives areas are made fully aware of all the policies and
3
procedures that relate to their specific duties. The Board of Directors, senior-level
management, and members with independent risk management functions also play
growth and development of the sector. To ensure the effective and efficient
could be achieved.
company still faces the problem of embezzlement, theft, inaccurate and unreliable
huge sums of losses to the company, and this invariably affects the company’s
The aim of this research work is to examine the consequences of risk management
projects
i. What are the factors responsible for poor risk management practices in MTN
Telecommunication projects?
ii. What are the various risk response strategies in MTN Telecommunication
projects?
much more diversified and complicated and are generally categorized as the
following: credit risk, market risk, liquidity risk, operational risk, electronic data
issue given the degree of impact it has on the Telecommunication sector and its
systems in the Telecommunication sector has naturally become one of the most
5
Also, the deregulation and increased competition in the Telecommunication
uncalculated risk.
State. The study covered the human resources department of the Organisation.
The study covered the period three months, from February, 2021 to May, 2021
when the project was implemented which emphasized risk management on the
Time and financial constraints limited the number of respondents contacted. The
ideal situation would have been to cover many respondents, but since there is time
6
allocation and financial resources limitation on the part of the researcher, it limited
Also, the degree of reliability of responses due to memory lapses could affect the
In spite of these limitations, the study was still good and reliable since data was
CHAPTER TWO
LITERATURE REVIEW
and how it can be used in practice. According to the authors, risk management
cannot be perceived as a tool to predict the future, since that is rather impossible.
Instead, they describe it as a tool to facilitate the project in order to make better
decisions based on the information from the investment. In this way, decisions
based on insufficient information can be avoided, and this will lead to better
predefined procedures. The scope of its definition differs among the authors;
however the core information is the same. From a number of definitions which can
7
be found in the management literature. Chenoweth et al. (2009) explanation brings
assessment and analysis, and response (Chapman et al. 2007). All steps in RMP
should be included when dealing with risks, in order to efficiently implement the
process in the project. There are many variations of RMP available in literature,
some models there is one more step added, and the majority of sources identify it
as risk monitoring or review. For the purpose of this paper the model of RMP
described by Chapman et al. (2007) will be used for further analysis and will be
Risk and uncertainty are the two most often used concepts in the literature covering
definitions of risk or uncertainty are tailored for the use of a particular project. To
make it more systematized, a literature research was done. The findings of this
2 are similar to each other and the common factor is again lack of information and
used. These two chosen definitions best show the difference between risk and
Kogut et al (1996) find some of the risks to be predictable and easy to identify
before they occur, while the others are unforeseeable and can result in unexpected
time delays or additional costs. This statement finds confirmation in the definition
regarding those two terms implies that uncertainty is a broad concept and risk is a
part of it. This confirms close relation between those two concepts but at the same
9
Risk is also the uncertainty associated with any investment. That is, risk is the
possibility that the actual return on an investment will be different from its
expected return. A very important concept in finance is the idea that an investment
that carries a higher risk has the potential of a higher return. For example, a zero-
risk investment, such as treasury security has a low rate of return, while a stock in
a start-up company has the potential to make an investor very wealthy, as well as
the potential to lose one's entire investment. Certain types of risk are easier to
positive or negative).
There are a number of terms that relate to the word "risk", namely "chance",
According to Flesher (1996) the word "risk" derives from the early Italian risicare,
which means "to dare". In this sense, risk is choice rather than fate. The action we
dare to take, which depends on how free we are to make choices, are what the story
10
According to Kerlinger (2012), risk refers to the probability that an event,
same sense, Kerlinger (2012) states that the concept of risk is fundamental to the
auditing role, since it may be in conflict with the concept of control. Controls are
designed to ensure that objectives are achieved; risk may prevent this. Overall, risk
should be reduced by adequate controls, and the greater the degree of risk, the
greater the need for good controls. Audit has a clear remit to expose and help to
According to Kerzner (2009), "risk" is a common word found liberally used in the
daily news media, weighty academic journals, and the professional magazines for
leaders of business, the economy and government. A manager skimming over the
daily news or perusing a more weighty publication is likely to find the word "risk"
used in many different ways. Risk is the property that causes value to vary in
uncertain ways. It is not the variation that is the source of risk. Managers can and
do anticipate variation and deal effectively with it. The source of risk is the
Khan et al (2007) defines risk as the uncertainty of an event occurring that could
threats and other dangers that are not clearly understood or fully evaluated and too
the occurrence of an event producing a loss, and uncertainty on the outcome of the
event, where the degree of risk is interpreted with reference to the degree of
variability and not with reference to the frequency with which the event will occur
carefully in trying and planning things and whatever precautions they take, the
likelihood is that every now and again things may still go wrong. The situation is
very similar for organizations, except that often the stakes are higher, and the cost
of things going wrong may therefore be far greater. Corporate risk can, thus, be
described as the probability that an event or action may adversely affect the
organization.
In broad terms, the risks faced by an organization can include the following:
programmes
12
- Failure to meet statutory and regulatory requirements
assets adequately
reputation
Due to the nature of the construction sector, RM is a very important process here.
It is most widely used in those projects which include high level of uncertainty.
monitor and control processes.. The easiest way to identify risk is to analyze and
draw a conclusion from projects which failed in the past. To make sure that the
project objectives are met, the portfolio of risks associated with all actors across
the project life cycle (PLC) should be considered (Cleland and Gareis, 2006). In
the early stages of the project where planning and contracting of work, together
with the preliminary capital budget are being drawn, risk management procedures
13
should be initiated. In later stages, RM applied systemically, helps to control those
critical elements which can negatively impact project performance. In other words,
to keep track of previously identified threats, will result in early warnings to the
project manager if any of the objectives, time, cost or quality, are not being met
There are a number of risks which can be identified in the construction industry
and which can be faced in each construction project regardless of its size and
scope. Changes in design and scope along with time frames for project completion
are the most common risks for the construction sector. The further in the process,
changes in scope or design are implemented, the more additional resources, time
and cost, those changes require. Project completion ahead of time may be as
insufficient planning or design problems which in fact shorten the completion time
but on the other hand lead to a low quality of final product and increased overall
cost. Being behind schedule generates greater costs for both investors and
quality tradeoff, which more widely is becoming an important issue for the
- Strategic risk - the risk to revenue, earnings and product offerings as a result of
publicity.
- Credit risk - the risk that counterpart will default on obligation, resulting in a
financial loss.
- Market risk - the risk of any fluctuation in the value of a portfolio resulting from
- operational risk - the risk of loss resulting from inadequate or failed internal
processes and systems, as well as the actions of people or from external events
According to Ovum (2015), risks have many different characteristics. The purpose
- Where does the risk arise (is it external or internal to the company)?
- would the occurrence of the risk directly impact on the company's achievement of
to the formal assessment, give participants a context for understanding how the
According to Ovum (2015), understanding the source of each risk helps to manage
the risk at its source instead of its outcome. If the source of a risk is not identified,
management. External risks (those arising outside the organization) may not be
fully manageable by the company. Internal risks that are not managed at the source
company’s products are not selling as expected due to a perception that the price is
too high, there may be an increased focus on managing price risk within the sales
Sources of risk are elements of the organizational environment that can bring about
positive or negative outcomes. For example, the decision to start the production of
the needs of customers, the quality of the raw materials, etc. are sources of risk for
classification that can cover all types of risks in more detail. Depending on the
environment in which risks arise, their sources can thus be represented as follows:
• Physical environment
• Political environment
• Operational environment
• Legal environment
Each of the phases of the PLC has certain purpose and scope of work assigned. At
the completion of each phase there is a decision point where risk assessment takes
further actions or proceeding to the next phase (Nelson et al., 2008). For project
the PLC. Nachmias, (2005) use 'go', 'maybe' and 'no go' options in a decision
making process. A 'go' status will constitute a green light for proceeding on to the
17
next phase while 'no go' will stop the project. Evaluation resulting in a 'maybe'
decision will lead to return to a previous phase or even phases for further
improvements and minimizing risk (Nachmias, 2005). The further on in the stages
the 'maybe' decision is made, which takes the process back to the initial phases, the
phases within a PLC, however this undermines decisions which were made in
previous stages and leads to waste of resources, usually both time and money
(Modarres, 2006). Decisions which are made at the end of each stage should be
made after a careful study of the possible risks and hindrances which might be
encountered.
As mentioned above, an RMP described by Modarres et al. (2006) has been chosen
for the purpose of this paper. This section will further explain the RMP, its four
Mortensen (2013) claims that the first step in the RMP is usually informal and can
be performed in various ways, depending on the organization and the project team.
It means that the identification of risks relies mostly on past experience that should
needs to be done. This can be decided and arranged by the organization. In this
18
case, no method is better than another, since the only purpose is to establish the
Risks and other threats can be hard to eliminate, but when they have been
identified, it is easier to take actions and have control over them. If the causes of
the risks have been identified and allocated before any problems occur, the risk
management will be more effective (PMI, 2004). RM is not only solving problems
in advance, but also being prepared for potential problems that can occur
within the project, but also a way to transfer risks into opportunities, which can
2013).
all potential risks which might impact a specific project, different techniques can
be applied. It is important to use a method that the project team is most familiar
with and the project will benefit from. The aim is to highlight the potential
problems, in order for the project team to be aware of them. Authors describe
2.1.9.1 Assessment/analysis
19
Risk analysis is the second stage in the RMP where collected data about the
potential risk are analyzed. Risk analysis can be described as short listing risks
with the highest impact on the project, out of all threats mentioned in the
distinguish between terms risk assessment and risk analysis and describe them as
two separate processes, for the purpose of this paper, this part of RMP will be
consistent with the model provided by McKinsey et al. (2016) and described as
one process.
In the analysis of the identified risk, two categories of methods – qualitative and
quantitative – have been developed. The qualitative methods are most applicable
when risks can be placed somewhere on a descriptive scale from high to low level.
The quantitative methods are used to determine the probability and impacts of the
describe the risks than to quantify them (Thapar et al., 2016). In addition, there is
values from quantitative analysis and description of risk factors, the qualitative
Within the quantitative and qualitative categories, a number of methods which use
chosen depending on the type of risk, project scope as well as on the specific
method’s requirements and criteria. Regardless of the method chosen, the desired
Thapar et al., 2016 explains a number of factors that can influence the selection of
the most appropriate methods in the risk assessment for the right purpose. It is up
to each organization to decide which of these factors are the most critical for them
2016, many factors were discovered, and the most important ones are listed below.
Cost of using the method, both the employment cost and the method itself
Credibility
Quantitative methods need a lot of work for the analysis to be performed. The
effort should be weighed against the benefits and outcomes from the chosen
method, for example smaller projects may sometimes require only identification
21
and taking action on the identified risks, while larger projects require more in
depth analysis. The quantitative methods estimate the impact of a risk in a project
(PMI, 2017). They are more suitable for medium and large projects due to the
(PWC, 2017).
The Monte Carlo method is based on statistics which are used in a simulation to
assess the risks. The simulation is used for forecasting, estimations and risk
collected for the simulation is, for instance, historical data from previous projects.
The data represent variables of schedule and costs for each small activity in a
project, and may contain pessimistic, most likely and optimistic scenarios (PWC,
2017). The simulation can be presented as a basket with golf balls, as Mun (2006)
explains the process. Data (the golf balls) are mixed and one of them is picked
each time the simulation is done. The chosen unit is an outcome which is recorded
and the ball will be put back into the basket. The simulation is then redone a
number of times and all outcomes are recorded. After completing the simulations
required number of times, the average is drawn from all of the outcomes, which
will constitute the forecast for the risk (Rabechini et al, 2013). The result from this
22
method is a probability of a risk to occur, often expressed in a percentage (Raz et
al., 2002).
The most common way of performing the Monte Carlo simulation is to use the
performed. This analysis can be also done in Microsoft Excel where a special
function is used to pick the data randomly, but the results can be very limited
The purpose of a sensitivity analysis is to establish the risk events which have the
greatest impact or value. Those events are later weighed against the objectives of
the project. The higher the level of uncertainty a specific risk has, the more
sensitive it is concerning the objectives. In other words, the risk events which are
the most critical to the project are the most sensitive and appropriate action needs
The result from the analysis can be presented in a spider diagram, Figure 4, that
shows the areas in the project which are the most critical and sensitive. Moreover,
one disadvantage with this analysis is that the variables are considered separately,
23
Figure 2.1: shows how a sensitivity analysis can look like (PWC, 2017)
software. According to Smith et al. (2006), the project will benefit if the method is
carried out in the project’s initial phases in order to focus on critical areas during
the project.
24
2.1.9.5 Diagramming technique
Decision tree analyses are commonly used when certain risks have an
exceptionally high impact on the two main project objectives: time and cost
(Robson et al., 2016). There are two types of decisions trees; called Fault tree
The FTA method of analysis is used to determine the probability of the risk and is
used to identify risks that can contribute or cause a failure of one event (Shenhar,
2002). The purpose is to find the underlying causes to this event. It is usually
drawn up as a sketch of a tree. The branches are the causes to the problem, and the
starting point of the tree is the problem itself. Each branch has its own sequence of
events and possible outcomes. The problem could depend on some causes that are
interrelated with each other, or simply random causes (Cooper et al. 2005). By
having many branches, the tree provides an opportunity to choose which branch to
Qualitative methods for risk assessment are based on descriptive scales, and are
used for describing the likelihood and impact of a risk. These relatively simple
techniques apply when quick assessment is required (Cooper et al. 2005) in small
and medium size projects (Robson et al., 2016). Moreover, this method is often
threats in order to identify those of greatest impact on the project (Cooper et al.
2005), and by focusing on those threats, improve the project’s overall performance
(Standish Group, 2014). The complexity of scales (Smith, 2006) and definitions
(Standish Group, 2014) used in this examination reflect the project's size and its
objectives. During the phases of the PLC, risks may change, and thus continuous
Limitations of qualitative methods lie in the accuracy of the data needed to provide
credible analysis. In order for the risk analysis to be of use for the project team, the
Qualitative methods are related to the quantitative methods, and in some cases
PMI (2017) identifies four qualitative methods for risk assessment: Risk
Categorization and Risk Urgency Assessment. These methods are briefly discussed
below.
By applying the method called risk probability and impact assessment, the
well as negative effects which result from threats. For the purpose of this
project (PMI, 2017). This means that clear definitions of scale should be drawn up
and its scope depends on the project's nature, criteria and objectives (Smith, 2006).
impact scale varies from 'very low' to 'very high'. Moreover, assessing impact of
project factors like time, cost or quality requires further definitions of each degree
in scale to be drawn up. Each risk listed under the identification phase is assessed
in terms of the probability and the impact of its occurrence (PMI, 2017).
Figure 2.2: Definition of Impact Scales for Four Project Objectives (PMI,
2017)
27
Risk impact assessment investigates the potential effect on a project objective such
likelihood of each specific risk to occur. The level of probability for each risk and
Explanatory detail, including assumptions justifying the levels assigned, are also
recorded. Risk probabilities and impacts are rated according to the definitions
given in the risk management plan. Sometimes, risks with obviously low ratings of
probability and impact will not be rated, but will be included on a watch-list for
Probability and impact, which were assessed in the previous step, are used as basis
for quantitative analysis and risk response which will be explained further in the
paper. For this reason findings from the assessment are prioritized by using various
methods of calculation which can be found in the literature (PMI, 2017). Westland
(2016) computes the priority score as the average of the probability and impact.
The range of priority score, the rating and color are assigned to indicate the
multiplied by probability. The compiled results are shown in the matrix in Figure
7(PMI, 2004). Such combination of factors indicates which risks are of low,
28
moderate or high priority. Regardless of the calculation method chosen, such a
response. For instance, threats with high impact and likelihood are identified as
high-risk and may require immediate response, while low priority score threats can
be monitored with action being taken only if, or when, needed (PMI, 2017).
Two methods mentioned by PMI (2017) are not as commonly used as probability
to e.g. their sources, in order to identify areas of the project that are most exposed
29
to those risks. Tools which can be used in this method are work break down
structure (WBS) or risk breakdown structure (RBS), and their role is to develop
effective risk response (PMI, 2004). WBS breaks down large activities into small,
(Zailani et al., 2016). RBS categorizes risks and shows their dependencies (Dallas,
2006). The role of the second method, Risk Urgency Assessment, is to prioritize
Lists with risks prioritized by applying qualitative methods, can be used to bring
medium level risks can be a subject of a quantitative analysis to have better control
over them. The threats that are assessed as low impact can be placed on a watch list
and monitored. It will allow the project team to focus on more important issues.
Risk categorization helps reveal the weak links in the project organization where
One way in which to classify risks is to refer to external and internal risks. External
risks are usually very difficult or impossible to control. These include risks such as
economic factors (inflation, petrol price), the financial markets (exchange rates,
share prices), regulating factors (legislation, import control and regulations) and
the actions of competitors (Young and Associates, 2017). Internal risks arise as a
30
result of the organization's own activities, processes, products, contractual
environment.
Young and Associates (2017), states that several events, which can be classified as
either external or internal factors, may affect an organization. The external and
■ External factors
- Economic
- Natural environment
- Political
- Technological
■ internal factors
- Infrastructure
- Personnel
- Process
According to Pickett (2005), the risk management process starts with a method for
identifying all risks an organization faces. This should involve all parties who have
expertise, responsibility and influence over the area affected by the risks in
question. All imaginable risks should be identified and recorded. Business risk is
31
really about these types of issues, and not just the more well-known disasters, acts
can be seen both in terms of threats (something going wrong) and opportunities
AIRMIC, ALARM, IRM (2002) indicate that risk identification sets out to identify
the organization, the market in which it operates, the legal, social, political and
the organization have been identified and all the risks flowing from these activities
are defined. All associated volatility related to these activities should be identified
and categorized.
Various techniques may be used in the process of identifying risk. According to the
• Interviews
This is the best method by which to obtain information with regard to areas that
hold possible risks for the organization. However, for a thorough study it is not
• Questionnaires
• Workshops
Workshops may be arranged to identify information on risk areas. This entails the
bringing together of key figures in the organization at one central point (conference
venue). Certain subjects are discussed by the group, from which the identification
of risks follows with the help of a facilitator. These workshops may be manual or
computer-driven. With a manual system, the facilitator will table certain subjects
and the group will discuss them. From the discussion, the risks will be identified
because there are so many risks. According to a study performed by the Institute of
33
Internal Auditors Research Foundation (Young and Associates, 2017), the top five
areas affected by risk are as follows (it is important to note that this is not a
complete list):
- Reputation or rating
- Technology
- Competition
- Expenses
According to Wipro (2014), the risks that are identified as the most common by
- Financial risk
- Project risk
- Compliance risk
- Reputation risk
- missed opportunities
According to Wieland et al (2012), the entity must be aware of and deal with the
risks it faces. It must set objectives, integrated with sales, production, marketing,
must also establish mechanisms to identify, analyze, and manage the related risks.
34
Risk assessment (risk analysis) is the process of identifying the risks and
safeguards that would mitigate this impact. It includes risk measurement and
prioritization.
the fact that a range of possible outcomes may exist or that the risk may occur a
anticipated and a consistent approach adopted, which, for example, may seek to
impact of the risk on the organization should take the financial impact, the impact
on the organization's viability and objectives and the impact on political and
The assessment and classification of risk will be different for each company and
classification and/or criteria that have been applied. The following is a list of risk
management techniques:
- accept the risk (e.g. for low impact, low likelihood risks)
on (Bagshaw 2002)
Gleim (2004), practice advisory (2600), states that when the chief audit executive
believes that senior management has accepted a level of residual risk that is
unacceptable to the organization, he or she should discuss the matter with senior
management.
If the decision regarding residual risk is not resolved, the chief audit executive and
senior management should report the matter to the board for resolution. One of the
key requirements of the board or its equivalent is to gain assurance that risk
management processes are working effectively and that key risks are managed to
largely on hazard insurance and probable loss, but the risk management practice of
today focuses on the broad issues of general management. This is the essence of
management, and the reason why understanding risk and the practice of risk
responses to change in the environment rather than trying to guess what risks will
affect the organization. In this context, the organization should develop certain
Managers must plan, organize, direct, and control systems to reflect both risk and
plan control systems to deal with both risk and opportunity over multiple time
Risk management has been related to financial loss due to fraud and has also been
preoccupation with administrative processes and controls rather than outcomes and
performance. Risk management has different and more complex dimensions in the
public sector compared to the private sector, which means more attention should be
devoted to "getting the balance right". Managing risk is a continuing activity and
which organizations methodically address the risks attached to their activities with
37
the goal of achieving sustained benefits in each activity and across the portfolio of
all activities. The focus of good risk management is the identification and
treatment of these risks. It marshals the understanding of the potential upside and
downside of all those factors that can affect the organization. It increases the
probability of success, and reduces both the probability of failure and the
should methodically address all the risks surrounding the organization's activities
in the past, present and, in particular, the future. It should further be integrated into
the culture of the organization with an effective policy and a programme led by the
most senior management. This strategy should be translated into tactical and
throughout the organization to each manager and employee responsible for the
CIPFA (2001) explains risk management as the term applied to a logical and
evaluating, treating, monitoring, and communicating the risks associated with any
38
activity, function, or process in a way that will enable the organization to minimize
losses and maximize opportunities. In the public sector there are many cases where
risk management is being practiced under other names, such as health and safety,
management, etc.
Woods (2011) suggests that in the process of risk management, the internal audit
control systems.
impact of this untimely event could threaten a company from meeting its business
objectives. This untimely threat may originate in and/or affect any area of a
The risk management process has gone through the following steps:
39
> Risk identification
operates, the legal, social, political and cultural environment in which it exists, as
objectives, including factors critical to its success and the threats and opportunities
format, for example, by using a table. The risk description figure (Figure 2.2)
When the risk analysis process has been completed, it is necessary to compare the
estimated risks against the risk criteria that the organization has established.
basis to set out its risk management policies and report on its effectiveness in
40
> Risk treatment
the risk. Risk treatment has risk control or mitigation as its major element, but
extends further to, for example, risk avoidance, transfer and financing, etc.
> Monitoring
Effective risk management requires a reporting and review structure to ensure that
risks are effectively identified and assessed and that appropriate controls and
> Objectives
Risk management starts and stops with helping an organization achieve its
One aspect of risk management that comes to the fore when developing suitable
41
> Risk identification
The risk cycle requires that a formal process is in place for identifying risks to the
business. This may be done through research, business analysis, risk workshops,
Once all known risks are documented, there has to be a mechanism to put them
into context, and sort out which ones are important and crucial to address and
which ones can be sidelined for the time being. The idea is that an organization can
allocate its base resources to areas of high risk with a view to mitigation and,
meanwhile, assign venture capital to areas of low risk that can be further exploited.
that fits the organization's risk appetite. Mitigation revolves around implementing
controls where required. Controls increase the certainty that risks will be
addressed, and that objectives will have a better chance of being achieved.
The overall response to risk across an organization will be found at this stage: the
adoption of a risk management strategy. The response to risk depends on the nature
of the risk and whether it is of high, medium or low priority. Some risks have to be
42
accepted, because there is little that can be done to mitigate them, or the cost of
Woods (2011) suggests that the risk management policy of the organization should
fit into the policy on performance management, and each risk status should prompt
different types of actions as a response to the risk exposure identified along, for
- High risk exposure: urgent board level reports and ongoing monitoring
- Trivial risk exposure: review whether able to remove resources away from
monitoring
In this way the board and top management may have a view on risk across the
IRMIC, ALARM and IRM (2002), stress that an organization's risk management
policy should set out its approach to and appetite for risk and its approach to risk
management. The policy should also set out responsibilities for risk management
43
throughout the organization. Furthermore, it should refer to any legal requirements
techniques for use in the various stages of the business process. To work
organization
The board of directors has overall responsibility for ensuring that risks are
managed. In practice, the board will delegate the operation of the risk management
framework to the management team, who will be responsible for completing the
coordinates and manages these activities and has specialist skills and knowledge.
risk management, but the primary responsibility for identifying risks and managing
44
The board is responsible for setting the organization's risk appetite and tolerance.
The audit committee of the board is responsible for overseeing all aspects of risk
financial reporting. The executive and the senior management teams are
for identifying and managing risks in all areas of activity (World Economic Forum,
2015).
successfully, then the evaluation of risk will need to cover the whole spectrum of
the organization's activity to ensure that the most appropriate decision is taken.
risk exposure in order to take sensible and timely decisions, so that objectives are
achieved.
controls to ensure that they meet their objectives. "Internal control" is defined as
efficiently to meet their basic objectives, including both financial and non-financial
performance goals, and to help them in the safeguarding and efficient use of
Organizations seek to operate within the law and abide by relevant regulatory
requirements that apply to them, as infringement can often result in the imposition
46
2.1.19 Benefits with risk management
developed during the entire project. In this way, risks will be discovered and
managed throughout all the phases (World Economic Forum, 2015). The benefits
from RM are not only reserved for the project itself, but also for the actors
involved. The main incentives are clear understanding and awareness of potential
risks in the project. In other words, risk management contributes to a better view of
possible consequences resulting from unmanaged risks and how to avoid them.
level of control over the whole project and more efficient problem solving
analysis of project conditions already in the beginning of the project. (Perry, 1986)
The risk management also provides a procedure which can reduce possible and
organizations, where the approach depends on the company's policy and their
47
2.1.20 Risk response
This third step of the RMP indicates what action should be taken towards the
identified risks and threats. The response strategy and approach chosen depend on
the kind of risks concerned (Winch, 2002). Other requirements are that the risk
needs to have a supervisor to monitor the development of the response, which will
be agreed by the actors involved in this risk management process. (PMI, 2004)
Winch (2002) claims that the lower impact the risk has, the better it can be
managed. Most common strategies for risk response are: avoidance, reduction,
transfer and retention (Potts, 2008). Beyond those types of responses, Winch
(2002) describes that sometimes it is difficult to take a decision based on too little
available in order to deal with the risk. This way of acting is called „Delay the
decision‟ but this approach is not appropriate in all situations, especially when
Avoidance/prevention
of importance to review the project’s aim. In other words, if the risk has significant
impact on the project, the best solution is to avoid it by changing the scope of the
project or, worst scenario, cancel it. There are many potential risks that a project
can be exposed to, and which can impact its success (Potts, 2008). This is why risk
48
management is required in the early stages of a project instead of dealing with the
The avoidance means that by looking at alternatives in the project, many risks can
be eliminated. If major changes are required in the project in order to avoid risks,
Zailani et al (2016) suggest applying known and well developed strategies instead
of new ones, even if the new ones may appear to be more cost efficient. In this
way, the risks can be avoided and work can proceed smoothly because strategy is
Cooper et al. (2005) list some activities that can help to avoid potential risk:
v. Regular inspections
49
Reduction/mitigation
By having an overview over the whole project it is easy to identify problems which
are causing damage. In order to reduce the level of risk, the exposed areas should
be changed (Wallace et al., 2007). This is a way of minimizing the potential risks
expenditures that can provide benefits in the long term. Some projects invest in
guarantees or hire experts to manage high-risk activities. Those experts may find
solutions that the project team has not considered (Wallace et al., 2007).
Contingency planning
Quality assurance
Those risks which should be reduced can also be shared with parties that have
2009). Sharing can also be an alternative, by cooperating with other parties. In this
way, one project team can take advantage of another‟s resources and experience. It
Preston, 2010).
50
Transfer
If a risk can be managed by another actor who has a greater capability or capacity,
the best option is to transfer it. The actors that the risks can be transferred to are,
for example, the client, contractor, subcontractor, designer etc, depending on the
risk’s character. As a result this could lead to higher costs and additional work,
usually called risk premium (Potts, 2008). It must be recognized that the risk is not
eliminated; it is only transferred to the party that is best able to manage it (PMI,
2004). Shifting risks and the negative impacts they bring is also an option when the
risks are outside the project management’s control, for example political issues or
labor strikes (Wallace et al., 2007). The situation may also consist of catastrophes
that are rare and unpredictable in a certain environment. (Winch, 2002) Such risks
that are beyond the management’s control should be transferred through insurance
policies.
Retention
When a risk cannot be transferred or avoided, the best solution is to retain the risk.
In this case the risk must be controlled, in order to minimize the impact of its
occurrence. Retention can also be an option when other solutions are uneconomical
51
Monitoring
This final step of RMP is vital since all information about the identified risks is
collected and monitored (Winch, 2002). The continuous supervision over the RMP
helps to discover new risks, keep track of identified risks and eliminate past risks
from the risk assessment and project (PMI, 2017). PMI (2017) also states that the
assumptions for monitoring and controlling are to supervise the status of the risks
state officials, staff from the central control agencies, auditors or others.
Management override must not be confused with management intervention (ie the
implement the procedure and process. For example, employees may misunderstand
52
instructions or make errors of judgment. Employees may also make mistakes
carefully consider the quality of the entity’s personnel when evaluating risk
2.1.21.2 Collusion
There is always a risk that collusion between individuals will destroy the
receipts from customer can collude with the one who records these receipts in the
customers’ records in order to steal cash from the entity (Voetsch et al., 2004).
2.1.21.3 Judgment
Decisions are often made within a limited time frame, without the benefit of
53
2.1.21.4 Breakdowns
Even well designed risk management procedures and processes can break down.
may also result from new technology and the complexity of computerized
information systems.
The cost of risk management must not exceed benefits to be derived. Potential loss,
associated with exposure, should be weighed against the cost to control it.
not possible. The challenge is to find a balance between excessive risk which is
costly and counterproductive and too little risk which exposes the organization to
This theory was developed by Vroom (1964). The theorist believes that motivation
and rewards. The theory is categorized into three sections namely, valence,
will be followed with certain level of performance. Valence represents a value that
between first level outcome like promotion and second level outcome such as raise.
finish a job. According to Thomas, the result performance could be observed based
outcome of each employee values and define adequate and good performance, in
terms that are observable and measurable so that employees understand managers’
develop measurement guide that can give important feedback to workers therefore
risk management theory advocates for recommends for the measurement and
management of notable risk facing a given entity whole than the management of
each risk independently. Its main aim is to combine the risk management silos in
an organization into one holistic and comprehensive framework. The ERM risk
organization to be involved in the management of risks and not only one or a few
members. The ERM also highlight the importance of clear process and policies for
managing risks. According to Olson and Wu (2010), the theory also affirms that if
10 organizations can embrace formal policies that define risks appetite, strategic
goals, tolerance and systematic processes then they can improve their risk
56
management capacity of identifying, analyzing, and treating of risks. The theory
also stresses on a creation of risk management culture where all stakeholders are
and long-term viability of organizations. The ERM theory has become popular in
project management techniques despite the fact that it was developed for
that have very high rates of failure like construction industry. These failures are as
a result of failure to identify, mitigate and control risk across the entire business
Network theory is a hypothesis that is used to clarify the structure and working of
includes nodes and links associating these nodes. For example, in a given projects,
the nodes may incorporate members of the project team, the task administrator,
suppliers, owner of the project and project financiers. These nodes are associated
with different connections such as supplier buyer relationship, financing, legal, and
influence on every single other line and nodes. The theory is frequently used as a
part of risk management to clarify and educate the procedure of risk analysis.
Moreover, according to Zingrand (2010), this theory also put more emphasis on the
It urges project team to consider how different segments of the project are
evaluation of the effect of specific risk. This theory recommends that in order to
judge the success of project management strategies the researcher should establish
the extent at which this strategy holistic and comprehensive making this theory
Aduma and Kimutai (2018) conducted a study in Nairobi Kenya to investigate risk
Nairobi. A descriptive research design was adopted in the study and a total of 651
proportionate random sampling technique was employed and the sample size was
58
241. Self-administered questionnaires were then administered to the study
respondents who consisted of staff from finance, Health insurance and legal affairs,
Public procurement and human resources departments. The data collected was then
analyzed using both descriptive statistics and inferential statistics a test for
performance of NHIF in that use of outsourcing, high cost of risk premiums and
Nsiah and Bonnah (2014) conducted a study in Ghana to investigate the effect of
case study research design and a total of 5 banks located in the rural area consisted
of the study’ target population. The employed questionnaires and face to face in-
bank managers, strategic and finance officers. For data analysis, the study
employed descriptive and content analysis and findings of the study revealed that
supervisors and general managers of the firms. Data collected was then analyzed
using descriptive analysis and findings of the study revealed that the construction
firm adopted risk transfer strategies such as insurance policy and risk premiums
design and a total of 200 project managers, IT managers and IT analysts working
questionnaires consisting of both open ended and closed ended questions to the
study respondents. Data collected was then analyzed using descriptive statistics.
Findings of the study revealed that risk transfer strategies such as highrisk
Ubani, Amade, Benedict, Aku, Agwu, and Okogbuo (2015) conducted a study in
industry. The study adopted a case study research design and the study’ target
construction companies. Data collected was then analyzed using SPSS and the
findings of the study revealed that the construction firms adopted risk control
strategies through identification of the risk, quantifying and responding to the risk
in accordance to risk management policy of each firm. The findings of the study
further implicated that all of the construction firms adjusted plans and scope of
work in order to counter risk effects, monitoring risk making timely decisions and
keeping project managers informed about possible risk. The study concluded that
projects is enhanced through working within the time limit and budget of projects.
questionnaires that consisted of both open ended and close ended questions. For
the data collected the study employed descriptive statistics and content analysis for
statistical analysis of the data collected. Findings of the study revealed that the
operational and strategic risks. Study findings further revealed that the NGO’s
61
adopted a detailed crisis management plan and a disaster recovery plan as the
mitigation strategies.
Ubani, Amade, Benedict, Aku, Agwu, and Okogbuo (2015) conducted a study in
industry. The study adopted a case study research design and the study’ target
construction companies. Data collected was then analyzed using SPSS and the
findings of the study revealed that the construction firms adopted risk retention
and costs of alternative ways of handling risks. The study findings further
firms.
Aimable, Shukla and Oduor (2015) conducted a study in Rwanda to investigate the
research design and a total of 291 project team located in 4 districts were the study’
population. The study used simple random sampling and the sample size was
analysis techniques. Findings of the study revealed that the construction firm
purchase insurance and have detailed crisis management plan and a disaster
recovery plan in the case of hurricanes. The findings of the study revealed that risk
2.4 Summary
In this chapter, risk management is explained in detail; that is the definition of risk,
and sources, characteristics and the impact of risk. This knowledge is necessary to
understand the role of management and risk department in the risk management
process. The chapter also expands on the risk management cycle and policy, the
63
CHAPTER THREE
METHODOLOGY
The use of descriptive survey research method was used for this research work
(Quantitative approach). The data collection procedure made use of closed end
questionnaire. The chapter concluded with different data analysis techniques, using
In this part of the research, the researcher talked mainly about the assessment of
G.R.A in Rivers State, as a case study. Emphases are therefore on the various risk
For the purpose of this research, the population of study comprised the Clients,
respondents were 103 in numbered. 103 was therefore the Sample Size, Using
n = N
1+N(e)2
n= 103
64
1+103 (0.0025)
For purposes of triangulation (Ghauri and Grönhaug, 2005) both primary and
According to Kumar (2005) primary sources are sources of data collection where
the data is collected for the specific purpose at the time of collection. The primary
sources of data were collected primarily through survey of the staffs using
questionnaires. The study also made used secondary sources of data. To Ghauri
and Grönhaug (2005) secondary sources of data are data that were collected,
recorded and used previously. The secondary sources of data were from featured
the study area was deployed to elicit opinions on the objectives of the study. All
project related issues. One hundred and three (103) questionnaire were distributed
65
via personal contacts to the respondents and a total number of ninety two (92)
were properly filled out and were used for the analysis. The respondents’
experience in project related issues. The five point likert scale, was used in
collected were also used to compare the opinions among Clients, Contractors,
Consultants and Other Professionals on the project related issues. Results from the
questionnaire survey were analyzed using different statistical techniques with the
frequency tables. Secondly, the respondents were asked to provide answers to the
key research questions using the five point likert scale questionnaire format.
The research design used in any study is determined by the nature of the research
problems and by the objective of the study. As this study is focused on evaluating
66
Both descriptive statistics and qualitative approaches were used to analyse the data.
The collected data were summarized and presented in tabular form. The
the results. Key variables were analyzed and ranked in order to establish their
relative importance index (RII) as stated in equation 3.2 below was applied to
prioritize the severity of the factors, the raw rankings were multiplied together to
(CFI) = ΣW [(f1 x n1) + (f2 x n2) + (f3 x n3) +... + (fn x nn)] --------------- 3.1
Where,
fn = score ranking.
highest weighting factor, (that is 5), F=total number of sample. The final results
obtained were presented using Tables and percentages. All these were done in
67
CHAPTER FOUR
4.1 Preamble
Chapter four gives a comprehensive and analytical discussion of the results of the
study in form of tables. The section deals with an analysis of information gathered
objectives of the study. The initial aspect of the result deals with general
Importance Index (RII) to identify the most important factors that impact on risk
SECTION A
identified in the study area. The Table 4.1 above had shown the sample size of the
where all questions in relation to the topic are fully answered. A total of 92
The Table 4.1 also shows the breakdown of the results. 22.8% are Clients, 29.3%
are Contractors, 33.7% are Consultants, while the remaining 14.2% are other
Professionals. The result shows that majority of the respondents are Consultants
69
From the table 4.2 above, it was observed that 19.6% or 18 respondents are
O – Level holders, 22.8% or 21 respondents are OND/NCE holders, 37.0% or 34
respondents are HND/B.Sc. holders, 17.4% or 16 respondents are MBA/M.Sc.
holders and the remaining 3.3% or 3 respondents had Ph.D. qualifications.
Table 4.3 indicates that the results of distribution of the respondents on the basis of
working experience. The table shows that out of the 92 respondents surveyed
31.5% of the respondents have between 0-5 years working experience, 51.1% have
experience between 6-10 years while the remaining 17.4% or 16 respondents have
over 10 years working experience. These finding indicates that the majority of the
respondents have working experiences 6-10 years. The result as displayed provided
the level of working experience and knowledge which would help in creating
confidence in the credibility of the data. It indicates that responses provided could
70
Table 4.4: Average Number of Projects taken.
Table 4.4 indicates that the results of distribution of the respondents on the basis of
average number of projects taken. The table shows that out of the 92 respondents
surveyed, 9.8% of the respondents have taken below 3 projects, 19.6% have taken
between 3-5 projects, 26.1% respondents have taken between 6-10 projects while
71
SECTION B
The viewpoints of the respondents were sought on the Risk factors affecting
project management. The results of the responses were analysed using Relative
Importance Index (RII) and Mean Score as shown in Table 4.5 above. The indices
observed suggest that the higher the important index, the more significant and
influential that factor. Based on Table 4.5 above, Delay in Payment emerged as the
highest ranked factor with a RII value of 0.82 followed by Availability of Labour
and Materials (RII=0.78) as the second ranked factor. Inaccurate Estimates was
72
3rd major factor (RII=0.72) followed by Competence of Consultants and
Contractors as 4th ranked factor (RII=0.71 and Mean Score = 3.59). Design
Changes was ranked 5th, with a RII of 0.68 (Mean Score=3.42), Contract Flaws
with RII of 0.67 was ranked sixth, Poor Communication Among Project Team
with RII of 0.65 as the seventh and Change of Government Policy (RII=0.64) as
the eighth factor. Obsolete Technology was ranked 9th with a RII of 0.62 (Mean
Score=3.10), Price Fluctuation with RII of 0.61 was ranked tenth and lowest
ranked factor among other factors as displayed in the Table 4.5 above.
SECTION C
SA A N D SD
The viewpoints of the respondents were sought on the Risk Response Strategies.
The results of the responses were analysed using Relative Importance Index (RII)
and Mean Score as shown in table 4.6 above. The indices observed suggest that the
73
higher the important index, the more significant and influential that factor. Based
on Table 4.6 above, Risk Reduction as the highest ranked sanitary facility with a
RII value of 0.83 followed by Risk Avoidance (RII=0.77) as the second ranked risk
response strategy. Risk Transfer was 3rd strategy (RII=0.76). Risk Retention with
RII of 0.68 was ranked fourth risk response strategy among others as displayed in
the table 4.6 above. Interestingly, most respondents interviewed in the study area
considered Risk Reduction as highest ranked risk response strategies in the study
area.
Firstly, it was observed from the analysis that the indices observed suggest that the
higher the important index, the more significant and influential that factor. Based
on Table 4.5 above, Delay in Payment emerged as the highest ranked factor with a
the second ranked factor. Inaccurate Estimates was 3rd major factor (RII=0.72)
(RII=0.71 and Mean Score = 3.59). Design Changes was ranked 5th, with a RII of
0.68 (Mean Score=3.42), Contract Flaws with RII of 0.67 was ranked sixth, Poor
Communication Among Project Team with RII of 0.65 as the seventh and Change
ranked 9th with a RII of 0.62 (Mean Score=3.10), Price Fluctuation with RII of
74
0.61 was ranked tenth and lowest ranked factor among other factors as displayed in
The second tables of the respondents were sought on the Risk Response Strategies.
The results of the responses were analysed using Relative Importance Index (RII)
and Mean Score as shown in table 4.6 above. The indices observed suggest that the
higher the important index, the more significant and influential that factor. Based
on Table 4.6 above, Risk Reduction as the highest ranked sanitary facility with a
RII value of 0.83 followed by Risk Avoidance (RII=0.77) as the second ranked risk
response strategy. Risk Transfer was 3rd strategy (RII=0.76). Risk Retention with
RII of 0.68 was ranked fourth risk response strategy among others as displayed in
the table 4.6 above. Interestingly, most respondents interviewed in the study area
considered Risk Reduction as highest ranked risk response strategies in the study
area.
75
CHAPTER FIVE
5.1. Conclusions
This study primarily sets out to examine the consequences of risk management on
identify the factors responsible for poor risk management practices in Nigeria and
outcomes of this study were expected to serve cell site construction projects
implementers with the requisite knowledge on the possible risk associated with this
A cursory search on existing literature on the subject matter indicates that popular
among the various types of risk identified by previous writers are physical works,
delay and disputes, direction and supervision, damage and injury to persons and
property, external factors, payment, and law and arbitration. Classification of risk
The Project Management Institute (2004), being a major source of authority on this
subject matter, also puts together in their literature that two of the major categories
risk analysis approaches on the other hand numerically analysis the effect on
This study primarily makes use of field data sourced through questionnaires
administered in MTN Nigeria, G.RA Branch, Rivers state in Nigeria. In all, a total
of one hundred and three (103) questionnaires were distributed to respondents but
due to high non-response rate, only ninety two (92) were returned by the
respondents representing 89.3% of the non- response rate. The ninety-two (92)
the time of the analysis and concluding on the findings of the study.
paragraph
risk response strategies, it is worth establishing that task such as site feasibility
assessment, survey, and marking; and the finalization of specifications for risk
response strategies in the company. These two major tasks are paramount and must
sector.
77
On the various types of risks associated with the performance of MTN
the responses of the respondents that cell site construction project implementers
give higher attention to financial loss and market leadership related risks than to
On the modalities of how project implementers have identified and managed the
risk. In this regard, the results show that the expected net present value (ENPV)
and expected monitory value (EMV) are the most prevalent quantitative techniques
used by project implementers in the identification of risks. The results also show
the most frequently used and popular method compared to ―personal and
More emphatically, managing risks in the cell site construction project through the
collaboration of project related parties have been found in this study as being
there is a high need for consultative and collaborative interfaces between the
project technical teams, the commercial/market and capital budgeting teams at all
78
stages of the project implementation. There is an effective management and control
organisational objectives of acquiring high returns on the cell site project when this
is done.
5.2. Recommendations
From this study, I propose to stakeholders to employ all due diligence in the
assessment of the feasibility of locations for the installation of cell sites prior to
There is the need to create the platforms in corporate settings that foster an
effective interface among the various units within the organisation especially
among the commercial or marketing teams and the project technical teams in an
efficient manner that enhances the bringing on board of ideas pertaining to good
cell site locations and satisfaction of customer mobile communication needs. A fair
oversight on any cell site project to be constructed would go a long way to enhance
These competitive business times would not reward organisations that rely solely
the feasibility of the implementation of any slated cell site projects without
79
considering the competing views or interest of stakeholder groups in any cell site
construction project.
80
REFERENCES
Addison, W. & Vallabh, P. (2002). Impact of project risk Identification
performance of software projects in IT enterprises in China. Journal of
Project Risk Management, 8 (1), 17-24.
Akkermans, H. & Helden, V. (2002). Vicious and virtuous cycles in ERP
implementation: a case study of interrelations between critical success
factors; European Journal of Information Systems, 11(1), 35-46.
Alhawari, S., Karadech, L., Talet, A., Mansour E. (2012). Knowledge-based risk
management framework for information technology project. International
Journal of Information Management, 32(1), 50–65.
Alfayo, K. & Namusonge, G. (2016). The effect of monitoring, evaluation and risk
management of projects on performance of firms in the telecommunication
sector in Kenya: The Strategic Journal of Business & Change Management,
3(4), 1377-1396.
Aviram-Unger, E., Zwikael, O. & Restubog, S. (2013). Revisiting goals, feedback,
recognition and performance success: the case of project teams. Group &
Organization Management: An International Journal, 38 (5), 570–600
Bakker, K., Boonstra, A., & Wortmann, H. (2011). Risk management affecting
IS/IT project success through communicative action. Pproject Management
Journal, 42(3), 75–90. Retrieved from: http://dx.doi.org/10.1002/pmj.20242
Bannerman, P. L. (2008). Risk and risk management in software projects: A
reassessment. The Journal of Systems and Software, 81(12), 2118-2133.
Barton, T. L., Shenkir, W.G. and Walker, P. L. (2002). Making Enterprise Risk
Management Pay Off. USA, Prentice Hall PTR, Financial Times
Besner, C., Hobbs, B. (2006). The perceived value and potential contribution of
project management practices to project success. Project Management
Journal, 37(3), 37-48.
Bloch, M., Blumberg, S., Laartz, J. (2012). Delivering large-scale IT projects on
time, on budget, and on value, McKinsey & Company in conjunction with
the University of Oxford. Retrieved from
http://www.mckinsey.com/businessfunctions/businesstechnology/our-
insights.
Briggs, R. (2017). Normative Theories of Rational Choice: Expected Utility. The
Stanford Encyclopedia of Philosophy (spring 2017 Edition). Retrieved from
81
https://plato.stanford.edu/archives/spr2017/entries/rationality-normative-
utility. Cagliano, C., Grimaldi, S., Rafele, C. (2015). Choosing project risk
management techniques. A theoretical framework. Journal of risk research,
18(2), 232-248.
Campbell Institute. (2014). Risk Perception: Theories, Strategies and Nest Steps.
The Campbell Institute. Retrieved from https://thecampbellinstitute.org
Chapman, C., & Ward, S. (2007). Project risk management: Process, techniques
and insights (2nd Ed.). Chichester, UK: John Wiley. Chapman, C., and
Ward, S. 1997. Project Risk Management: Process, Techniques and Insights,
John Wiley & Sons.
Chenoweth, T., Minch, R. and Gattiker, T. (2009). Application of Protection
Motivation Theory to Adoption of Protective Technologies. Proceedings of
the 42nd Hawaii International Conference on System Sciences.
Cisco Visual networking Index. (2016). Global Mobile data Traffic Forecast
Update 2016 − 2021, White Paper. Retrieved from https://www.cisco.com
Communication Authority of Kenya. (2015). Mobile operators Fail to Meet
Quality of Service targets for the third year running. Retrieved from
http://www.ca.go.ke/index.php Communication Authority of Kenya. (2017).
Annual report. Retrieved from http://www.ca.go.ke.
Coles, R. S. & Moulton, R. (2003). Operationalizing IT risk management.
Computers and security, 487-492
GSMA (2016). The Mobile Economy Africa report. Gsmaintelligence. Accessed
from https://www.gsmaintelligence.com/research.
Gupta P. (2011). Risk Management in Indian Companies: Enterprise-Wide Risk
Management. Journal of Risk Finance, 121-139.
Hens, T. and Rieger, M. (2016). Financial Economics, Springer Texts in Business
and Economics, Springer-Verlag Berlin Heidelberg.
Hillson, D. (2000). Developing effective risk responses. In Proceedings of the 30th
Annual Project Management Institute Seminars & Symposium, 10-16
October, 1999, Sylva. NC:Project Management Institute;
Hillson, D., and Simon, P. (2007). Practical project risk management. The ATOM
methodology. Vienna, VA: Management Concepts.
Hunt. R. and Kosaroglu, M. (2006) Project manager skill sets in
telecommunications industry new product development projects,
82
International Conference on Project Management (Promac2006), PMI,
September 2006, Sydney, Australia.
Ibbs, C.W., Kwak, Y. (2000). Assessing project management maturity. Project
Management Journal, 31(1), 3243.
Jin, X. & Yean, F. (2006). Key relationship-based determinants of project
performance in China, Building and Environment, 41, 915-925.
Jun, G., Qiuzhen, R. & Qingguo, E. (2010). Effects of project risk planning on IT
project performance focusing on a case of China vendor firms. Project
Management Journal, 31(1), 32-43.
Kerlinger (2012). Leading Change: “Why Transformation Efforts Fail”. Harvard
Business Review, 59-67.
Kerzner, H. (2009). Project Management: A Systems Approach to Planning,
Scheduling and Management, Hoboken, New Jersey, USA, John Wiley
&Sons, Inc.
Khan, O., & Burnes, B. (2007). Risk and supply chain management: Creating a
research agenda, International Journal of Logistics Management, 18(2), 197-
216.
Kinyua, E., Ogollah, K. & Mburu D. (2015) Effect Of Risk Management Strategies
on Project Performance of Small and Medium Information Communication
Technology Enterprises in Nairobi, Kenya. International Journal of
Economics, Commerce and Management, United Kingdom, 3(2), 1-30.
Kululanga, G., Kuotcha, W. (2010). Measuring project risk management process
for construction contractors with statement indicators linked to numerical
scores", Engineering, Construction and Architectural Management, 17(4),
336-351.
Lee, J., & Chun, J. (2009). Risk response analysis model for construction method
using the forced-decision method and binary weighting analysis. Journal of
Asian Architecture and Engineering, No.1:205-12.
Leung, H. V., Tummala, R. & Chuah, K. (1998). A knowledge-based system for
identifying potential project risks. Omega:26, 623-638.
Levinson, M. (2010). IT Project Management: 10 less considered Keys to Success.
Retrieved from http://www.cio.com.
Lientz, B. P & Larsen, L. (2006). Risk Management for IT projects: how to deal
with over 150 issues and risks. USA, Elsevier, Inc.
83
Ludovico, F. & Petrarca, F. (2010), Extreme project management in Telco
industry. Paper presented at PMI Global Congress. EMEA, Milan, Italy.
Newtown Square, PA: Project Management Institute
McKinsey & Co. (2016). Telecommunications industry at cliff’s edge, Report on
Telecommunications, Media, and Technology practice in Middle East and
Africa. Retrieved from https://www.mckinsey.com
Mortensen, M. (2013). The top five Network Migration Implementation Risks
Telecom Project Managers Should Focus On. Retrieved from
http://www.redonis.com.
Modarres, M. (2006). Risk analysis in engineering: techniques, tools, and trends.
Taylor & Francis Group, Boca Raton.
Nachmias, N. (2005). Improvising organizational transformation overtime: A
situated change perspective, 7(1), 63-92.
National Communications Authority. (2012). Mobile Number Portability in Ghana,
First Year Report, 1-15 Retrieved from http://www.nca.org.
Nelson, R. & Winter, S. (2008). Innovation systems, path dependency and policy.
Journal of Economic Behavior & Organization.
Olsson, R. (2008). Risk management in a multi project environment. International
Journal of Quality and Reliability Management, 25, 1, 60-71
Ovum (2015). Africa Market Outlook. Retrieved from http://info.ovum.com
Owino, W., Keraro, N. & Wanjiku, R. (2015). Factors That Influence the
Performance of Information Communication Technology Projects in Kenya.
International Journal of Innovative Social Sciences & Humanities Research,
3(2), 127-135
Pimchangthong, D., Boonjing, V. (2017). Effects of risk management practices on
IT project success. Management and production engineering review, 8(1),
30–37.
Porta, M., Puigdomènech, E., Ballester, F., Selva, J., Ribas-Fitó, N., Llop, S., &
López, T. (2008). Monitoring concentrations of persistent organic pollutants
in the general population: the international experience. Environment
International, 34(4), 546-561.
Project Management Institute. (2017). Pulse of the profession global survey, 9th
Edition. Newtown square, USA. Project Management Inc.
84
Pushpakumari, M., & Watanabe, T. (2009). Do strategies improve SME
performance? An empirical analysis of japan and Sri Lanka. Meijo Asian
Research Journal,1(1).
PWC (2017). The Global Information Technology Report: Strategyand. Retrieved
from http://www.strategyand.pwc.com.
Rabechini, R., Carvalho, M. (2013), Understanding the Impact of Project Risk
Management on Project Performance: an Empirical Study; Journal of
Technology management and Innovation, 8, Special Issue ALTEC.
Raz, T., Shenhar, A. j., Dvir, D. (2002). Risk management, project success, and
technological uncertainty. R&D Management, 32(2), 101-109.
Robson, C., & McCartan, K. (2016). Real world research. John Wiley & Sons ltd.
Westland, Y. (2016). Impact of project risk management, assessment of risks on
project performance in Brazilian Vendor companies. International Journal of
Project Management, Vol. 21 No 2, pp. 97-105.
Rwanda utility regulatory Authority. (2017). Retrieved from http://www.rura.rw
Safaricom (2016). Safaricom Annual Report 2016/2017, accessed from
http://www.safaricom.co.net
Shenhar, A. J. (2002). One size does not fit all projects: exploring classical
contingency domains. Management Science, 47(3), 394–414.
Smith, N. (2006) Managing Risk in Construction Projects, Blackwell Science,
Oxford. Speckle, F., Elten, H. & Kruis, M. (2007). Sourcing of internal
auditing: An empirical study. Management Accounting Research, 36, 1-66
Standish Group. (2014). Chaos Report. Retrieved from
http://www.projectsmart.co.uk
Taylor, H., Artman E., Woelfer, J. (2012). Information Technology Project Risk
Management: Bridging the Gap between Research and Practice, Journal of
Information Technology, 27, 17-34.
Thapar, S. Karmakar, P. (2016). Performance evaluation of LTE network: An
energy saving and capacity gain perspective, International conference on
Advances in Computing, Communications and informatics (ICACCI).
The Institute of Risk Management. (2010). Fundamentals of effective risk
management. London, Kogan Page publishers.
Tuncel, G., & Alpan, G. (2010). Risk assessment and management for supply
chain networks: A case study. Computers in industry, 61(3), 250-259.
85
Voetsch, J., Cioffi, F. and Anbari, F.T. (2004) Project Risk Management Practices
and their Association with Reported Project Success, Proceedings from
IRNOP.
Wallace, P., & Blumkin, M. (2007). Major Construction Projects: Improving
Governance and Managing Risks. Retrieved from www.deloitte.com Ward,
S., Chapman, C. (2003). Transforming project risk management into project
uncertainty management. International Journal of Project Management, 21
(2), 97- 105.
Wieland, A. & Wallenberg, C.M. (2012). Dealing with supply chain risks: Linking
risk management practices and strategies to performance, International
Journal of Physical Distribution and Logistics Management, 42(10), 887-
905.
Wipro (2014). Accelerated Rollout of LTE services, accessed on 20th June 2017
[online]. Available: http://www.wipro.com/documents/accelerated-rollout-
of-LTE-services.pdf
Woods, M. (2011). Risk Management in Organizations: An Integrated Case Study
Approach, Abingdon and Routledge. Harvard Business Review. 79(1): 66-
76.
World Economic Forum. (2015). Global Information Technology Report:
INSEAD. Retrieved from www.weforum.org/gitr. Yin, R.K (2013). Case
study research: Design and methods. Sage publications.
Young and Associates. (2017). Risk articles Retrieved from
http://riskarticles.com/creditrisk-management.
Zailani, S., Ariffin, H., Iranmanesh, M., Moeinzahed, S., Masoomeh I., (2016).
The moderating effect of project risk mitigation strategies on the relationship
between delay factors and construction project performance. Journal of
Science and Technology Policy Management, 7(3).
Zwikael, O., & Ahn, M. (2011). The effectiveness of risk management: an analysis
of project risk planning across industries and countries. Risk analysis, 31(1),
25-37.
86
Appendix
Yours faithfully
…………………………………….
87
QUESTIONNAIRE
1. Group of Respondents
Clients
Contractors
Consultants
Others
2. Level of Education
O – LEVEL
OND/ NCE
HND / B.Sc
MBA / M.Sc
Ph.D
0 – 5 years
6 – 10 years
88
4. Average Number of Projects taken.
Below 3
3–5
6 – 10
Above 10
Table 4.5:
RANKING
Risk Factors SA A N D SD
5 4 3 2 1
Change of Government Policy
Delay in Payment
Obsolete Technology
Availability of Labour and Materials
Competence of Consultants and Contractors
Design Changes
Inaccurate Estimates
Poor Communication Among Project Team
Price Fluctuation
Contract Flaws
89
SECTION C: Ranking of Respondents’ opinions on Risk Response Strategies
SA A N D SD
Risk Avoidance
Risk Transfer
Risk Reduction
Risk Retention
90