What type of risks are most problematic that can cause projects to be shut down?

This article considers threats to a project slipping on budget, schedule and fit-for-purpose. Threat is used here as the collective for risks [quantifiable bad things that can happen] and uncertainties [poorly or not quantifiable bad possible events]. Based on experience with projects in developing countries this review considers that [a] project slippage is due to uncertainties rather than risks, [b] while eventuation of some bad things is beyond control, managed execution and oversight are still the primary means to keeping within budget, on time and fit-for-purpose, [c] improving project delivery is less about bigger and more complex and more about coordinated focus, effectiveness and developing thought-out heuristics, and [d] projects take longer and cost more partly because threat identification is inaccurate, the scope of identified threats is too narrow, and the threat assessment product is not integrated into overall project decision-making and execution. Almost by definition, what is poorly known is likely to cause problems. Yet it is not just the unquantifiability and intangibility of uncertainties causing project slippage, but that they are insufficiently taken into account in project planning and execution that cause budget and time overruns. Improving project performance requires purpose-driven and managed deployment of scarce seasoned professionals. This can be aided with independent oversight by deeply experienced panelists who contribute technical insights and can potentially show that diligence is seen to be done.

Background

This article considers the risks and uncertainties to completing projects within budget, on time and fit-for-purpose. What are the risks and uncertainties? When, where and how do they commonly impact on projects? How might controls be applied to reduce slippage?

Review

Over the past decade ‘planning fallacy’ [underestimating the time and cost to complete a task] has been argued as the soul of project slippage [Flyvbjerg et al. 2003; Ansar et al. 2013; Flyvbjerg 2014] and Kahneman [2012]. Though attributed to Kahneman and Tversky [1979], a related idea of planning shortfalls is stated by Parkinson’s Law that ‘a task will take all the time you give it’, and a bit more [Parkinson 1958]. ‘Fit-for-purpose’ [the project meets the needs for which it was undertaken to satisfy] is less explicitly addressed than time and cost, but implicitly shortcomings in the quality of the product translate into more time and cost [or less benefit]. The Flyvbjerg-Kahneman remedy is to use reference class forecasting [the performance of previous similar projects as the basis for predicting], and realistic and transparent scheduling and estimation of costs and benefits. This article addresses the shortcomings of project planning and execution, focussing on risk and uncertainty controls particularly on the environmental and social aspects of infrastructure, natural resource and socio-economic projects in developing countries.

The framework for this article is the constraints analysis in Figure 1.

Figure 1

Framework for the generic project.

Full size image

The project: risk and uncertainty

Various contemporary perceptions of the nature of risk are described by Blennow et al. [2013]. In this article risk is a bad thing that might happen and for which the probability and the consequence can be quantified. Bad things that potentially can happen in a project and that are poorly to not quantifiable are uncertainties. Threat is here the collective term for risk and uncertainty. Here good things are not threats, but that they might not come about constitutes a risk or uncertainty of obstruction to good things eventuating. This is consistent with what management tries to do – remove obstacles or ease constraints as explained in The Goal [Goldratt 1986]. While risk is often used loosely on projects, the stricter usage here does not invalidate conventions [e.g. likelihood x consequence = severity], as considered below.

Are the threats that most materially affect projects risks or uncertainties? Consider four South African infrastructure construction projects [Table 1]. For the three water supply projects the degree of achievement is generously stated by the principal. The environmental and social impact assessment [ESIA] for the Olifants Water Resource Development Project [ORWRDP] started in 2004. Obtaining environmental authorization took more than two years. This delayed dam and water delivery construction. On the Mooi-Mgeni Transfer Scheme [MMTS], delays in environmental authorization, started in 1999, set back achievement more than stated in Table 1, constructing the transfer pipeline started only in late 2013, and the land dwellers displaced by inundation of Spring Grove Dam have not yet moved into their replacement housing. The Mokolo-Crocodile Water Augmentation Project [MCWAP] has been delayed further by a big flood in March 2014, and later a dam failure. The national road project was designed, and its servitude purchased, more than 40 years ago. The road was never built. The ESIA has been in preparation for 4 years, it is now released for public comment, it has yet to be submitted to the authorities, it might still be contested in court, and construction could be subject to industrial action. In the meanwhile costs are mounting – no return on already incurred costs, and the accidents and lives lost on the present dangerous road.

Table 1 Examples of project setbacks

Full size table

Students of project management might interpret Table 1 by the ‘break-fix’ model [Flyvbjerg 2014]. The project stalls [the break] for want of anticipating threats, so a new version of the project is generated [the fix] with revised budget and timelines. The previous cost and completion date are erased from memory. Iterated ‘break-fix’ can make any project look good.

Time-consuming ESIA preparation and authorization, stakeholder intervention, court injunction, industrial action, rare events and defective construction are the types of threat that are chief project show-stoppers. They are poorly quantifiable. They are not risks, but uncertainties.

Project oversight

Project proponents typically employ professionals to manage and execute. Why then would oversight be required?

Projects can slip for many reasons. Flyvbjerg et al. [2003] consider project politics, planning and execution, and attribute slippage to ambition, egos, vested interests, changes in currency exchange rates, altering or developing project scope and design, underestimated cost, overestimated benefits, optimism that everything goes according to plan [EGAP], and disregard of safety requirements and the full environmental and social externalities. van Marrewijk et al. [2008] present a more benign view with project participants in an alliance collaborating to realise a shared vision. The cultural setting of the project might indeed determine degrees of autocracy, accountability, groupthink, project loyalty, etc., and in many projects many participants perform professionally to complete the project satisfactorily. In hydropower projects the amount of slippage did not correlate with the degree of autocracy/democracy, but slippage occurred possibly for different reasons under the differing cultures [Ansar et al. 2013]. Both autocratic and democratic project leaders have vested interests. They want to know whether the project is running to plan, what shortcomings exist, how achievement might be improved, and neither will want to advertise cost and time overruns. Even if the most able are appointed as leaders, oversight institutions and mechanisms are warranted if shortcomings are to be avoided. Shortcomings range from limitations in expertise, experience and capacity, through vested interests, to corruption and dishonesty. In practice these are not simply told apart. No one is omniscient. All people are dishonest. Unless projects are transparent and publicly reported upon then society’s default assumption – understandable and justified by the behavioural economists’ research [Ariely 2012] – is that there is something to hide.

The World Bank prescribes that construction projects which it funds be reviewed periodically by panels of independent engineering, environmental and social experts. Financial institutions adopting the Equator Principles require peer review for ESIA, construction and operations phases of funded projects. Kaplan and Mikes [2012] and the Flyvbjerg-Kahneman school advocate the ‘outside view’. To some project proponents these panels are unwarranted and unwanted expense and interference. However, a perceived utility of the panels is illustrated by them continuing after World Bank loans close, and by them being adopted on projects without World Bank funding. The panellists act as sounding boards and devils’ advocates, examining and criticizing designs, explaining why things might fail, and suggesting improvements, with savings running to US$ millions. Also, the mere fact of surveillance moderates excesses of ambition and optimism, and is recommended by Ariely [2012] to curtail dishonesty that everyone is prone to if not watched.

The project plan

Key components of the project plan are objectives and scope, what will be delivered and how, resources including budget, and schedule. Objectives and scope are dealt with under stakeholder engagement below, and the other components here. The boundary conditions of our generic project are related. Time is money, and so is fit-for-purpose. If project completion is delayed it likely costs more, because the contractor incurs more cost, and because the benefits, revenue streams and loan payback are postponed. If the product is not fit-for-purpose, further time and expense are incurred to effect remedy which, if not possible, decreases benefit.

From Table 1, project delays, and hence increased costs, are common. In four megaprojects construction costs were 125% to 180% of the initial estimate [Flyvbjerg et al. 2003]. While some projects come in close to budget the Flyvbjerg figures understate the overrun in the typical public and public private partnership projects [PPPs], as illustrated for hydropower projects [Ansar et al. 2014] and Table 2. Ansar et al. [2013] found cost overruns increase with project size and duration. This is not evident from Table 2, but the Flyvbjerg-Kahneman school would say the projects in Table 2 are of different types.

Table 2 Cost overruns in construction projects

Full size table

In some business projects there is an impression of thorough cost-benefit analysis [CBA] or equivalent. It is not the same on PPPs. Why is that? In some public projects the benefit might be very large, and the project is managed not so much to hone the cost-benefit ratio but to expedite the project while containing the cost. The benefit of a 555 km long fuel pipeline connecting economic hubs and costing US$2.4 billion might be infinitely better than a daily 65 km long convoy of 30 000 litre tankers on an already busy freeway [Table 2, second item]. Yet in many cases it can be vital to determine the benefits accurately in order to know what cost can be afforded yet the project remain viable. Suppose a pumped storage scheme. The prices of buying power [to pump water when there is surplus power on the grid] and selling power [when stored water is released to generate hydropower], and the amount of power to be bought and sold, must be known to set an upper limit to the construction, mitigation and operation costs. It is not enough for the ESIA to conclude qualitatively that ‘there are no fatal flaws’ – all impacts can in theory be mitigated, but at what cost? How many households must be relocated? What area of arable land will be lost? How many livelihoods will be destroyed? What will mitigation – probably spanning decades – cost? The cost might be unaffordable, in which case the facile ‘no fatal flaws’ is mistaken.

Done thoroughly at feasibility, with ‘reference class forecasting’ [Ansar et al. 2013], CBA provides a necessary though incomplete guide on project go-ahead. Conventionally it is numerical. Inexactness of number inputs into the CBA can be entered as statistical distributions and Monte Carlo techniques used to produce expected values with confidence limits. The most likely development [MLD] with variation about it should be adopted rather than ‘planning fallacy’ [Kahneman 2012] or optimistic EGAP [Flyvbjerg et al. 2003] that is unlikely ever to arise. Contemporary sensitivity analysis software helps detect where good data are needed, and which are the most critical cost and benefit aspects of the model. If the confidence limits from the Monte Carlo modelling are wide it means that even the numbers are warning that the project is risky. If the confidence limits are narrow there are still the uncertainties that the numbers have not captured, in particular about the future. Circumstances will change but precisely how is unknowable. To illustrate, return to our example of pumped storage schemes. These are huge investments with long operating lives over which payback is required. Yet even now a pilot pumped-heat electricity storage is being developed, anticipated to store energy at 75% of the cost of conventional pumped storage. Might today’s pumped storage schemes become obsolete before capital outlay is repaid? Ansar et al. [2014] urge agile energy alternatives with shorter time horizons than conventional hydropower projects. To limit planning fallacy not only is experience of previous similar ventures relevant, but the proponents should not assume their new project is manned by smarter operators and thereby immune to past perils [Kahneman 2012].

Having done the CBA using reference class forecasting, and though there will remain greater or lesser uncertainties, the project proponents and managers must work within budget and schedule. Providing cost and time reserves or contingencies will, by Parkinson’s Law, guarantee project overrun. I recall one build-operate-transfer project in which the concessionaire had to find his own funding. Is it coincidence or selective memory that there was no project slippage? Follow-up CBAs, conducted through the construction and operation phases, can help keep the project viable [e.g. whether to cut costs, where, by how much, what tariff increases to seek, if and when to abort the project].

Stakeholder engagement

In the previous section project objective and scope were mentioned as key project components. What is the purpose of the project? Project aims can be too vague, too numerous, misdirected or unachievable. A project can solve the wrong problem. What stakeholders want is not enough. What the project proponents think the stakeholders need, can be misperception. Projects must meet real needs, yet often they do not, constituting waste of donor, investor or taxpayer funds. Involuntary stakeholders must be identified and properly informed, which may extend to teaching them how to assess the impacts of a project on their lives, properties and livelihoods. A few examples follow.

Polak and Warwick [2013] report a project to help poor families in Haiti making charcoal from sugarcane waste, providing fuel, jobs and income. A method to make charcoal was indeed developed. What did not materialize though was an efficient technique to produce a competitive and saleable fuel to benefit buyers and enrich producers. What was needed and not obtained was insight into the circumstances. When are sugarcane waste and labour available? At what cost can the charcoaling equipment be bought to produce a saleable product at what price and quality to pay back the investment and make a profit?

In another example, road users in the Gauteng Freeway Improvement Project [GFIP] were not engaged on the scope, nature of improvement, method of funding, and options for payback. All this was decided by the authorities, because they know best [Table 2, fifth item]. Now 80% of road users refuse to register and pay electronic road tolls. In a year the road agency has racked up US$200 million in unpaid toll fees. The users have no ownership over GFIP. There is no social contract.

Polak and Warwick [2013] urge project proponents to clarify the central problem, talk to the people with the problem, and listen to and understand them, to craft the essential intent [McKeown 2014], including scope and boundary conditions. Infrastructure projects are engineer-driven and top-down. Stakeholder engagement in southern Africa is typically authoritarian and only informs and invites comment. No wonder problems arise, as with GFIP. The World Bank’s experience with land reform shows that achieving success goes beyond technical land management and depends on the institutional environment and factors that determine investment and profitability [Binswanger 2007]. Insight into the lives of the stakeholders requires surveys to seek unbiased perceptions, one-on-one dialogue and forum discussion, and stakeholder buy-in is helped by facilitating meetings where stakeholders decide their priorities, and by involving them in implementation [Decker et al. 2012]. For a project to be sustainable, it must be profitable and ideally all stakeholders must benefit [Polak and Warwick 2013; Simanis and Duke 2014]. Porter and Kramer [2006] reshape corporate social responsibility from philanthropy to corporate social integration through designing business activities in which society shares value. One of their examples is Nestlé developing a dairy business at Moga, India. Nestlé built refrigerated dairies and sent trucks to collect milk, at the same time dispensing veterinary and agronomic services, paying more for milk, increasing local farmers from 180 to 75 000, prompting competitive dairies and milk factories and spawning an industry cluster.

If stakeholders are not engaged early in dialogue, and not involved in pilot trials and the like, the project becomes ‘yours’ not ‘ours’, potential benefits are liable to be overlooked, and uncertainties abound that the project will not address real needs, fall short in delivering sustainable benefits, and might be obstructed by civil disobedience, industrial action or court injunction. Participative stakeholder engagement is a necessary measure that, done well, can swing obstructers and objectors into neutral observers, supporters and even ‘make-it-happen’ allies.

Threat management

Conventionally risk [and uncertainty] management involves two components: [a] assessment comprising threat identification, classification, prioritizing, and devising controls, and [b] applying the controls.

ESIA is the most visible form of threat management for projects. A decade ago Flyvbjerg et al. [2003] observed that ESIA was learning only slowly, and shortcomings concerned [a] lack of accuracy in impact prediction, [b] the narrow scope of impacts and their time horizons, and [c] inadequate organization, scheduling and institutional integration of the ESIA process in overall project decision-making. What has happened in the interim, as reflected by project performance in a developing region?

In South Africa ESIAs are done to obtain government authorization, not to control threats [Mentis 2010]. Often the ESIA passes over serious threats. For example for big infrastructure projects the loss of households, cultivated fields and jobs of the poor may be overlooked. Houses are big assets to most people, and poor rural people depend on cultivated fields for their livelihood. Houses can be replaced but in southern Africa arable land is scarce, and restoring the lost livelihood of a poor land-dependent household is difficult. Unskilled labour is not mobile and hard to retrain and retool. Without identifying these issues they are not quantified and included in the CBA, and not considered in control measure affordability and project feasibility. With overlooked threats, the environmental and social management plan [ESMP] is defective, the proposed controls are superficial and might not comply with the law that, for example, in Lesotho requires ‘full description’, and possibly insufficient to enable a tendering contractor to prepare a threat management budget. Often there is poorly defined responsibility for the fuzzily and incorrectly identified threats so that during the project impacts are not avoided and not mitigated, and the project bequeaths detrimental externalities.

In developing regions there is a skills shortage – a scarcity, at all levels, of professionals experienced in planning, constructing and operating projects. Principals too often appoint impact assessors without experience on that reference class of project – a virtual guarantee for overlooked threats, poorly controlled detrimental externalities, and overruns. Blennow et al. [2013] make the point that forest owners seeing and believing the effects of climate change improve prospects for adopting adaptive measures. Awareness, perceptions, belief, commitment and implementation might be aided by forums [e.g. lessons learnt] that rarely take place even within single organizations undertaking several big projects.

Threat identification

In Table 3 examples of methods to identify threats are presented. These are indeed just examples because there is no single right way to assess threats. Rather, good assessment is a mindset and the expert assessor adapts her method to the specific circumstances of a project. Table 3 therefore is intended to illustrate, not prescribe.

Table 3 Methods to identify threats

Full size table

Examples of contemporary methods can be categorized into hindsight, informal, checklist and matrix, and input–output, constraints, scenario and what-if analyses. A chief reason why many ESIAs are weak is that threat identification is informal. It involves cursory thinking [System 1 or automated thinking of Kahneman [2012]]. For example, the local rural poor people are asked and they say that their cultivated fields are unproductive, not because they do not depend on the fields, but because they want employment on the upcoming construction project. The assessor accepts this at face value. He ignores hindsight, and does not use checklists and matrices – what he or others learnt from previous similar projects. He does not entertain the possibility that this new project might have novel aspects and effects. He does not deconstruct the project into components. He does not scrutinize each component for gains and losses of energy, materials, rights and opportunities. He never tries to assemble his threat identification into a coherent picture of cause and effect, as in a constraints analysis. He never gets into deep and effortful thinking [System 2 of Kahneman [2012]].

Threat classification

The identified threats form the project threat register – a list of what might go wrong. Threat management ultimately needs to recognize which threats are material and warrant attention, and which trivial. Conventionally the threats are categorized according to the classical organization functional units such as engineering, environment, finance, health and safety. Done this way project integration can face problems of ‘apples with pears’ comparisons. Rather classify threats by criteria that relate to the manner of control. Group threats into preventable, strategy and external types [Kaplan and Mikes 2012].

Preventable threats are internal. They arise within the functioning of the organization. Examples are biodiversity loss, dust, fuel and oil spills, noise, water contamination and waste. They are controllable, and the aim with them is to avoid or eliminate impacts cost-effectively. Checklists and matrix methods, and input–output analysis [IOA] are effective means to identify preventable threats. A rules-based system is developed [e.g. keep site clear of litter and waste at all times]. Most ESIAs, environmental authorizations and ESMPs focus on the preventable. In some projects, such as MMTS [Table 1, item 2] in which good rapport was struck between consulting engineer and construction contractor, control of preventable threats was done to a high standard. This fits with the alliance model of van Marrewijk et al. [2008]. However, in other projects where the preventable threats were poorly controlled, relations between principal, consulting engineer and contractor were more adversarial and confrontational – of course cause and effect are unclear.

Strategy threats relate to how work is done – commitments, methods, standards, values, etc. The aim of managing strategy threats is to reduce likelihood of occurrence and mitigate consequence if the threat materializes. Unlike with the preventable, strategy threat is not entirely under management control. An example is a strategy to adopt a just-in-time [JIT] inventory. For instance in a construction project the aggregate, cement and sand are not stockpiled months in advance, but procured and delivered as needed. The benefits are reduced cost, small lay-down area and therefore reduced project footprint. The downside is possible disruption in the supply chain – the portion of the threat outside managerial control if an external supplier is used. In constructing a roller-compacted-concrete dam wall, disruption might lead not only to project delays and budget overruns, but interruptions in concrete laying could impair the product. Prevention – not adopting JIT – would seem prudent for roller-compacted-concrete dam walls if outside suppliers are used.

Another strategy example concerns project-affected people. A road agency might disregard loss of jobs that arise because a realigned road causes, say, closure of a filling station, on a rationale that employment destroyed here is recreated there. However, unskilled labour is not mobile, and cannot move readily if ‘here’ and ‘there’ are far apart. Hence the agency strategy does not accord with the economist’s precept of at least one person better off and none worse off, nor with the World Bank’s standard of maintaining or improving livelihoods. The road agency might be sued for lost livelihoods. In contrast the strategy in Lesotho Highlands Water Project [LHWP] is fair and prompt compensation for losses suffered, and no unfortunate precedents. But even with the best plans, the unanticipated can happen – the head of the household loses his identity document or dies, or ownership of the lost asset is disputed, or the losses are unfairly calculated or underestimated so the claimants go to court and the cost balloons, or the loss is unfortunately overrated and this sets a precedent for further claims against the project.

Uncontrollable events fall in the class of external threats. Examples are flood, drought, earthquake, disease epidemic, communications blackout, power failure, price escalation, currency fluctuation, industrial action and political turmoil. Threat management here is to reduce the consequence of eventuation, to develop organizational resilience to Black Swans [unpredictable events of big consequence such as the 2008 global financial meltdown, and the recent seismic events and tsunamis in Indonesia and Japan [Taleb 2008]]. The control measures centre about developing resilience and emergency response and preparedness, and design of organizational and operational structure to retain function in the face of adversity and catastrophe. The logic is to design the organization so it is robust and safe-in-failure [Mentis 2014; Linkov et al. 2014].

The approach to strategy and external threats is to stage internal workshops, use embedded expertise in scenario analysis, ‘stress test’ the plans not only in the business-as-usual context but also for when things are unusual, and supplement with independent review. Strategy and external threats are poorly quantifiable, so they are uncertainties rather than risks. On most projects the ESIAs, environmental authorizations, ESMPs and day-to-day management poorly cover strategy and external threats. Managing the project affected people on LHWP is an exception. Hundreds of households were relocated, water and sanitation programs instituted, living standards maintained, and advice given on investing compensation payments, not without shortcomings and failings, but with policy formulation, planning, budgetary provision, diligent implementation and learning from experience. On other projects, building a fish barrier is done better than relocating displaced land dwellers, culvert design for a new road takes precedence over possible destroyed livelihoods that the road could cause, and a behind-schedule project does not have time to take flood protection precautions and so slips further when flood occurs.

Threat prioritization

Possibly the only limit to what can go wrong with a project is imagination. If the project threat register has been prepared diligently, the list of potential problems will be long. On Sasol’s Mozambique-Secunda pipeline 708 threats were identified in an operations assessment. The top 10% were prioritized. Even that was ambitious. Finally only 2% of 708 were addressed. There are many reasons to prioritize. Simplest is that no one has the resources of time, budget and manpower to do everything, and the more resources are distributed across many controls the less effective can be control on each threat. This is argued about life generally by McKeown [2014]. Notwithstanding this, environmental authorities want comprehensive ESIAs and ESMPs, and if some omitted item, even trivial, is picked up then environmental authorization is withheld. Yet a thought experiment on the economics of threat control shows that prioritization is imperative. Suppose the following. First, resources of budget, staff and time are finite. Second, control measures have variable effectiveness. There is always a bigger or smaller residual impact – remaining effect after the avoidance and mitigation are done. Figure 2 shows the principle of this. As deployment of resources increases so the residual impact reduces, in the form of a decay curve. This is the best case and assumes that resources are deployed first where they have biggest impact reduction. Of course the cost rises as control measures are increased, as reflected by the line rising from left to right in Figure 2. The total cost [add the decay curve and the straight line] gives a saddle-shaped curve which implies that beyond some moderate level of control costs outweigh benefits. Hence, even if funding were infinite, controlling for all threats is not a proposition.

Figure 2

Economics of threat control.

Full size image

Examples of methods to prioritize threats are given in Table 4. As with threat identification, there is no single right method, and the expert adapts her technique to the specifics of her project. The ‘impact assessor’s rating’ in Table 4 is in government guidelines, and widely and often uncritically applied. Its rating of consequence is complicated. It implicitly assumes that threats are absolute whereas they are relative to context. For example, in the rich world the loss of a house is easily managed by paying cash compensation, but in the poor world the lost house must be replaced by the project in a complex and costly exercise. On a South African mine transported personnel are required by mine health and safety law to be buckled up, whereas labour on a farm or timber plantation is transported on the back of an open lorry. The ‘impact assessor’s rating’ does not contextualize threat severity, and often it invokes circular logic: a threat is significant because it needs mitigation, and mitigation is necessary so the threat is significant.

Table 4 Prioritizing threats

Full size table

Simple qualitative rating might be weak also because it assumes threats are absolute, and because it might be too simple and insensitive. At the other extreme, the probability-cost technique can be expensive to undertake for screening many threats, especially when few threats are ever going to be controlled. Probability-cost also assumes absolutism or otherwise that the expected value yielded by the product of probability and cost is the supreme measure of severity [Brown et al. 2001; Evans 2012]. Dollar threat levels might group together events that differ in legal obligation [e.g. buckling up, as above], society’s norms or expectations [e.g. in Gauteng, South Africa, you do not pay your electronic road toll but in other places you do], or commitment in corporate policy [e.g. road agency disregards loss of livelihoods, but LHWP commits to compensate promptly and fairly]. By and large, society objects to a project’s detrimental externalities irrespective of the actual dollar amount, so dollars might be the wrong criterion in threat screening.

Ordinal rating has several merits. Not all relevant variables can be expressed in ratio or interval data, but it is always possible to convert ratio and interval data to ordinal. Ordinal rating can provide a common currency enabling comparison between different types of threat, and different levels of knowledge on individual threats. An example of an ordinal rating is given in Table 5. It easily accommodates qualitative issues such as whether control of threat is legally required, expected by the stakeholders, and prescribed by corporate policy. The scoring can be calibrated to account for context. For example, once all threats in the project threat register have been scored, they can be summarized in a matrix where cells in the matrix are the number of threats corresponding to the relevant rated likelihood and rated consequence [Figure 3]. The locations of a few well known threats in the matrix are then used as a basis to draw a threshold between material threats that warrant control by such criteria as legal requirement, societal expectation or corporate policy, and the other immaterial threats.

Table 5 Rating the likelihood and consequence of identified threats

Full size table

Figure 3

Threat chart. Thick line is threshold between material threats [upper right] and other threats.

Full size image

Having discriminated between the material and non-material, the question arises: Can the project afford to control the threats rated as material? If not then the project should not proceed. Now the control costs, not the unavoided impact costs, need to be determined. It should be the primary function of ESIAs, CBAs and indeed the whole of threat management to put the project decision-makers in an informed position so the affordability of controlling threats can be determined, as explained above about pumped storage, displaced households and lost arable land. If the necessary costing of environmental and social controls is not estimated under the aegis of the ESIA, who is going to do it? Few ESIAs get near this, and the claim of Flyvbjerg et al. [2003] that impact assessment does not integrate into overall project decision-making applies.

The above prioritization procedure does not work for Black Swans. Stock market crashes – with likelihood calculated from normal distributions fitted to daily stock market fluctuations – are so improbable as to be implausible [unlikely since the Big Bang], yet they happen [Taleb 2008]. Interestingly there are some significant non-random variables that affect our lives and projects. Examples in addition to stock market price variations are weather and stream flow. A feature of Black Swans is not a single cause but contingency of events and circumstances. Airliner crashes often do not have one cause that usually the vigilant crew would easily remedy. Rather there is a combination of mechanical failure, lapse in surveillance and preparedness, bad weather conditions, and so on. Similarly with dams. Exceptional heavy rain is accompanied by, say, an uncommonly strong wind that blows water spilling over the dam into the galleries, pumps have not been maintained so the galleries flood, and the low level release valves cannot be operated. Now add reservoir induced seismicity [the dam was never so full] and the implausible event of dam failure suddenly looms large. The poor weather conditions might also disrupt communications so downstream people cannot be forewarned of impending disaster.

Work through the project threat register and flag threats with low likelihood but possible high consequence. These are potential Black Swans that though not above the threshold in Figure 3 warrant control.

There are several ways of controlling threats: avoid, mitigate, offset, transfer, insure, accept and prepare [Table 6]. The troublesome ones are preparedness – discussed above in relation to external threats – and offset and transfer.

Table 6 Threat control methods

Full size table

Offsetting involves compensating for one set of lost resources by investing in another, preferably of equivalent type, extent and value. It might work, as in case of a grant to an organization undertaking environmental protection or remediation [e.g. protected area management, reclamation of contaminated or eroded land, restoration of wetland, afforestation to sequester carbon]. Offsetting greenhouse gas emissions by growing trees is widely publicized. At Eskom’s Ingula Pumped Storage Scheme in South Africa [Table 2, item 4] a condition of environmental authorization was to offset wetland and other resource loss by acquiring, rehabilitating and managing surrounding land, including a large wetland, as protected area. The prospects for effective offset are good because one large area of land is involved and the manager [Eskom] is on site. In a contrasting case of the Mooi-Mgeni Transfer Scheme [Table 1, item 2], offset of wetlands lost by inundation by the Spring Grove Dam is required by the environmental authorities. A dozen or so wetland areas on nearby private land are being viewed. Physical interventions – such as closing drains, erosion control structures and withdrawal of farming – are contemplated. This kind of offset is poorly feasible and has high opportunity cost. Landowners will have to be compensated. The many isolated pieces of land will require management and policing, otherwise land use and condition are liable to return to the pre-offset situation.

The notion of transferring threats might seem to the uninitiated like cheaply disposing of responsibilities. In many recent projects in South Africa the project documents have specified that the project proponent or principal is ultimately responsible for conforming to the conditions of project authorization. As watertight as this might seem, it is a loophole for contractors to evade expending resources on controlling their impacts. The low effectiveness of threat control [

Bài Viết Liên Quan

Chủ Đề