This popular text, recommended reading by the Institute of Risk Management, provides both breadth and depth in terms of the background to and the implementation of enterprise risk management. it details developments in corporate governance in the UK, US, Canada and Australia. It describes through the lens of process mapping the steps in t
This popular text, recommended reading by the Institute of Risk Management, provides both breadth and depth in terms of the background to and the implementation of enterprise risk management. it details developments in corporate governance in the UK, US, Canada and Australia. It describes through the lens of process mapping the steps in the risk management process. The book provides a detailed explanation of the common types of risk such as legal, market and economic and much more.
This book is recommended reading by two successive CEOs of the Institute of Risk Management, business CEOs and Managing Directors. It is considered to be different, valuable and very practical. It provides over 30 case studies supported by pertinent tools to bring the subject to life. The book based on real-world experience examines seve
This book is recommended reading by two successive CEOs of the Institute of Risk Management, business CEOs and Managing Directors. It is considered to be different, valuable and very practical. It provides over 30 case studies supported by pertinent tools to bring the subject to life. The book based on real-world experience examines seven categories of project risk management critical to successful implementation. For each category a number of "rules" are described.
All organisations are affected by fraud, but disproportionately so for SMEs given their size and vulnerability. Some small businesses that have failed to manage business fraud effectively have not only suffered financially but also have not survived. This book provides a guide for SMEs to understand the current sources of business fraud
All organisations are affected by fraud, but disproportionately so for SMEs given their size and vulnerability. Some small businesses that have failed to manage business fraud effectively have not only suffered financially but also have not survived. This book provides a guide for SMEs to understand the current sources of business fraud risk and the specific risk response actions that can be taken to limit exposure, through the structured discipline of enterprise risk management.
The all too common problem of not considering people issues in design and construction management can result in a gross under-estimation of the risk exposure to individual projects and design practices. The aim of the book is to address the balance by providing practical guidance for design and construction professionals on the causes of
The all too common problem of not considering people issues in design and construction management can result in a gross under-estimation of the risk exposure to individual projects and design practices. The aim of the book is to address the balance by providing practical guidance for design and construction professionals on the causes of staff turnover and how to mitigate them to create the right working culture for business success. in particular this book provides an overview of the ubiquitous problem of the loss of a key design member.
Introduction: As reported in the press, on 20 September 2024 the UK’s sixth largest contractor, ISG, including its subsidiary ISG Construction Limited, went into administration. At the time of collapse, ISG was involved in 69 central government projects totalling more than £1 billion including 22 projects for the Ministry of Justice (MoJ)........
Introduction: Those working on a day-to-day basis on critical national infrastructure (CNI) projects may be unaware of the likelihood and potential impact of cyber-attacks on the nation’s CNI or how critical it would be to UK citizens, the economy and national security.....
Introduction: This paper is a development of the themes described in the previous PM World Journal Featured Paper titled “Exposure of the UK’s critical national infrastructure to cyber-attacks and ransom demands” published in February 2024. Further research has shown that the spotlight needs to be kept on the integration of cyber resilience within new CNI projects......
Introduction: Today’s projects are now almost unrecognizable from projects of 25 years ago. They have benefited from developments in, (for instance): project management methodologies, decision analysis, maturity models, the use of common project management software, taxonomies, work breakdown structures, project controls, risk management, reporting formats, databases, benefits analysis, stakeholder management, optimism bias calculations and use of the internet. .....
Introduction: To gain sanction within an organization for the adoption and application of a risk maturity model (RMM) to understand the current and desired project risk management (PRM) capabilities and the gap to be bridged, it is sometimes necessary to prepare a business case. In simple terms business cases are critical project documents that outline a business problem and provide an option or options to solve it. .....
Introduction: As reported in the press, on 15 January 2018 Carillion plc, the British multi-national company declared insolvency and the Official Receiver started to liquidate its assets and contracts. The examination of company insolvencies provides valuable insights into failed corporate processes. These lessons are important not only for executives but also for construction managers, project managers, risk managers and advisers. At the heart of the collapse was an acute lack of understanding and management of risk by both the UK government and Carillion itself .......
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.