×
Home Current Archive Editorial board
News Contact
Original scientific article

STRATEGY OPTIMIZATION FOR RESPONDING TO PRIMARY, SECONDARY AND RESIDUAL RISKS CONSIDERING COST AND TIME DIMENSIONS IN PETROCHEMICAL PROJECTS

By
Asl Maryam Tabatabay ,
Asl Maryam Tabatabay
Contact Asl Maryam Tabatabay

Management Department, Islamic Azad University, Semnan, Iran

Asl Saeedeh Tabababay
Asl Saeedeh Tabababay

Management Department, Islamic Azad University, Tehran, Tehran, Iran

Abstract

Risk management throughout the project life cycle, from the initial phase beginning to the final phase, ended continuously and dynamically, is one of the basic requirements for the success of any project oriented organization. To effectively identify and manage risks at all stages of the project, careful selection must be made at all levels of the organization. In some cases, implementing the response may eliminate the risk but reciprocally create additional risks for the project. Most of the available risk selection methods mainly focus on eliminating the primary risks without understanding the secondary and residual risks that may arise during the project implementation. The occurrence of secondary risk can be a direct result of performing an activity that responds to a primary risk. This study proposes an optimization model to select risk response measures for primary and secondary risks. The difference between our proposed method and Zhao method (2018) will be that the proposed one does not lead to selecting a predetermined strategy. This method examines the two dimensions of time and costs in response to primary and secondary risks. In addition, the genetic metaheuristic algorithm has been used to solve the problem in the dimensions mentioned above.

References

[{"id":4745,"citationNumber":"1","type":"journal-article","title":"Managing risk in projects","DOI":null,"author":[{"given":"D.","family":"Hillson"}],"issued":{"date-parts":["2017"]},"container-title":null,"volume":null,"issue":null,"page":null}]

[{"id":4746,"citationNumber":"2","type":"article-journal","title":"Applying social network analysis to genetic algorithm in optimizing project risk response decisions","DOI":null,"author":[{"given":"L.","family":"Wang"},{"given":"T.","family":"Sun"},{"given":"C.","family":"Qian"},{"given":"M.","family":"Goh"},{"given":"V.K.","family":"Mishra"}],"issued":{"date-parts":["2020"]},"container-title":"Information Sciences","volume":"512","issue":null,"page":"1024\u20131042"}]

[{"id":4747,"citationNumber":"3","type":"book","title":"Engineering Risk Management","DOI":"10.1515\/9783110665338","author":[{"given":"Thierry","family":"Meyer"},{"given":"Genserik","family":"Reniers"}],"issued":{"date-parts":["2022"]},"container-title":null,"volume":null,"issue":null,"page":null}]

[{"id":4748,"citationNumber":"4","type":"article-journal","title":"Applying a risk assessment approach for cost analysis and decision making: a case study for a basic design engineering project","DOI":null,"author":[{"given":"C.","family":"Ou-Yang"},{"given":"W.L.","family":"Chen"}],"issued":{"date-parts":["2017"]},"container-title":"Journal of the Chinese Institute of Engineers","volume":"40","issue":"5","page":"378\u2013390"}]

[{"id":4749,"citationNumber":"5","type":"book-chapter","title":"5. Rethinking Risk Management","DOI":"10.7312\/chew14362-005","author":[{"given":"Ren\u00e9 M.","family":"Stulz"}],"issued":{"date-parts":["2008"]},"container-title":null,"volume":null,"issue":null,"page":"87-120"}]

[{"id":4750,"citationNumber":"6","type":"book","title":"Proactive Risk Management","DOI":"10.4324\/9780367807542","author":[{"given":"Preston G.","family":"Smith"},{"given":"Guy M.","family":"Merritt"}],"issued":{"date-parts":[null]},"container-title":null,"volume":null,"issue":null,"page":null}]

[{"id":4751,"citationNumber":"7","type":"journal-article","title":"Hybrid fuzzy MCDM and FMEA integrating with linear programming approach for the health and safety executive risks: a case study","DOI":"10.1108\/jm2-12-2019-0285","author":[{"given":"Mohammad","family":"Khalilzadeh"},{"given":"Peiman","family":"Ghasemi"},{"given":"Ahmadreza","family":"Afrasiabi"},{"given":"Hedieh","family":"Shakeri"}],"issued":{"date-parts":["2021"]},"container-title":null,"volume":"16","issue":"4","page":"1025-1053"}]

[{"id":4752,"citationNumber":"8","type":"article-journal","title":"Assessment of Options for Substantiating an Infrastructure Project Implementation Plan in the Presence of Associated Risks","DOI":null,"author":[{"given":"A.I.","family":"Denisova"}],"issued":{"date-parts":["2021-03"]},"container-title":"IOP Conference Series: Earth and Environmental Science","volume":"666","issue":"6","page":"062075"}]

[{"id":4753,"citationNumber":"9","type":"article-journal","title":"An Integrated MCDM Approach to Train Derailment Risk Response Strategy Selection","DOI":null,"author":[{"given":"H.","family":"Zhang"},{"given":"Q.","family":"Sun"}],"issued":{"date-parts":["2020"]},"container-title":"Symmetry","volume":"12","issue":"1","page":"47"}]

[{"id":4754,"citationNumber":"10","type":"article-journal","title":"Integrating case-based analysis and fuzzy optimization for selecting project risk response actions","DOI":null,"author":[{"given":"Y.","family":"Zhang"},{"given":"F.","family":"Zuo"},{"given":"X.","family":"Guan"}],"issued":{"date-parts":["2020"]},"container-title":"Physica A: Statistical Mechanics and its Applications","volume":"545","issue":null,"page":"123578"}]

[{"id":4755,"citationNumber":"11","type":"article-journal","title":"Optimized communication plan and its impact on the contingency plan previously put in place for timely crisis response in the air sector","DOI":null,"author":[{"given":"L.","family":"Piedade"},{"given":"J.","family":"Silva"}],"issued":{"date-parts":[null]},"container-title":"VII RIDITA-Air Transportation Sustainability: Technological, Operational, Economic, Social And Environmental Strategies","volume":"1","issue":"VII RIDITA","page":"465\u2013473"}]

[{"id":4756,"citationNumber":"12","type":"article-journal","title":"Application of particle swarm optimization algorithm for adjusting project contingencies and response strategies under budgetary constraints","DOI":null,"author":[{"given":"R.J.","family":"Kuo"},{"given":"Y.","family":"Nugroho"},{"given":"F.E.","family":"Zulvia"}],"issued":{"date-parts":["2019"]},"container-title":"Computers & Industrial Engineering","volume":"135","issue":null,"page":"254\u2013264"}]

[{"id":4757,"citationNumber":"13","type":"article-journal","title":"Risk analysis and assessment in the worksites using the fuzzy-analytical hierarchy process and a quantitative technique\u2013A case study for the Greek construction sector","DOI":null,"author":[{"given":"G.K.","family":"Koulinas"},{"given":"P.K.","family":"Marhavilas"},{"given":"O.E.","family":"Demesouka"},{"given":"A.P.","family":"Vavatsikos"},{"given":"D.E.","family":"Koulouriotis"}],"issued":{"date-parts":["2019"]},"container-title":"Safety Science","volume":"112","issue":null,"page":"104 \u201396"}]

[{"id":4758,"citationNumber":"14","type":"article-journal","title":"The influence of organizational external factors on construction risk management among Nigerian construction companies","DOI":null,"author":[{"given":"A.Q.","family":"Adeleke"},{"given":"A.Y.","family":"Bahaudin"},{"given":"A.M.","family":"Kamaruddeen"},{"given":"J.A.","family":"Bamgbade"},{"given":"M.G.","family":"Salimon"},{"given":"M.W.A.","family":"Khan"},{"given":"S.","family":"Sorooshian"}],"issued":{"date-parts":["2018"]},"container-title":"Safety and Health at Work","volume":"9","issue":"1","page":"124\u2013115"}]

[{"id":4759,"citationNumber":"15","type":"article-journal","title":"Change Detection In Multi-Temporal Images Using Multistage Clustering For Disaster Recovery Planning","DOI":null,"author":[{"given":"M.","family":"Soleh"},{"given":"A.M.","family":"Arymurthy"},{"given":"S.","family":"Wiguna"}],"issued":{"date-parts":["2018"]},"container-title":"Jurnal Ilmu Komputer dan Informasi","volume":"11","issue":"2","page":"110\u2013 117"}]

[{"id":4760,"citationNumber":"16","type":"article-journal","title":"Project selection and scheduling with uncertain net income and investment cost","DOI":null,"author":[{"given":"X.","family":"Huang"},{"given":"T.","family":"Zhao"}],"issued":{"date-parts":["2014"]},"container-title":"Applied Mathematics and Computation","volume":"247","issue":null,"page":"7\u201361"}]

[{"id":4761,"citationNumber":"17","type":"paper-conference","title":"Evolutionary algorithms: A critical review and its future prospects","DOI":null,"author":[{"given":"P.A.","family":"Vikhar"}],"issued":{"date-parts":["2016"]},"container-title":"2016 International conference on global trends in signal processing, information computing and communication (ICGTSPICC","volume":null,"issue":null,"page":"261\u2013265"}]

[{"id":4762,"citationNumber":"18","type":"article-journal","title":"Random route and quota sampling: Do they offer any advantage over probably sampling methods?","DOI":null,"author":[{"given":"V.D.","family":"Rada"},{"given":"V.M.","family":"Mart\u00edn"}],"issued":{"date-parts":["2014"]},"container-title":"Open Journal of Statistics","volume":"ID","issue":"48774","page":null}]

Citation

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.