{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T23:56:32Z","timestamp":1775001392212,"version":"3.50.1"},"reference-count":62,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2004,5,1]],"date-time":"2004-05-01T00:00:00Z","timestamp":1083369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,5,1]]},"abstract":"<jats:p>Information technology (IT) projects are renowned for their high failure rate. Risk management is an essential process for the successful delivery of IT projects. In\u2010depth interviews with IT professionals from leading firms in Western Australia were undertaken to determine how IT risks were managed in their projects. The respondents ranked 27 IT risks in terms of likelihood and consequences to identify the most important risks. The top five risks, in order, were: personnel shortfalls; unreasonable project schedule and budget; unrealistic expectations; incomplete requirements; and diminished window of opportunity due to late delivery of software. The respondents overwhelmingly applied the treatment strategy of risk reduction to manage these risks. Furthermore, these strategies were primarily project management processes, rather than technical processes. This demonstrates that project management is a risk management strategy. Scope, quality management, and human resource management were solutions applied to several risks. In particular, managing stakeholders\u2019 expectations is a specific risk treatment that helps to manage several key IT risks.<\/jats:p>","DOI":"10.1108\/02635570410530702","type":"journal-article","created":{"date-parts":[[2004,6,5]],"date-time":"2004-06-05T01:49:11Z","timestamp":1086400151000},"page":"286-295","source":"Crossref","is-referenced-by-count":117,"title":["Management of risks in information technology projects"],"prefix":"10.1108","volume":"104","author":[{"given":"David","family":"Baccarini","sequence":"first","affiliation":[]},{"given":"Geoff","family":"Salm","sequence":"additional","affiliation":[]},{"given":"Peter E.D.","family":"Love","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020620483477800_b1","doi-asserted-by":"crossref","unstructured":"Abdel\u2010Hamid, T.K. (1989), \u201cThe dynamics of software project staffing: a systems dynamics based simulation approach\u201d, IEEE Transactions in Software Engineering, Vol. 15, pp. 109\u201019.","DOI":"10.1109\/32.21738"},{"key":"key2022020620483477800_b2","unstructured":"Abdel\u2010Hamid, T.K. and Madnick, S.E. (1991), Software Project Dynamics: An Integrated Approach, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020620483477800_b3","doi-asserted-by":"crossref","unstructured":"Barki, H. and Hartwick, J. (1989), \u201cRethinking the concept of user involvement\u201d, MIS Quarterly, Vol. 13 No. 1, pp. 43\u201063.","DOI":"10.2307\/248700"},{"key":"key2022020620483477800_b4","doi-asserted-by":"crossref","unstructured":"Baronas, A.M.K. and Louis, M.R. (1988), \u201cRestoring a sense of control during implementation: how user involvement leads to system acceptance\u201d, MIS Quarterly, Vol. 12 No. 1, pp. 111\u201023.","DOI":"10.2307\/248811"},{"key":"key2022020620483477800_b6","unstructured":"Bennatan, E.M. (2002), On Time Within Budget: Software Project Management Practices and Techniques, Wiley, New York, NY."},{"key":"key2022020620483477800_b7","doi-asserted-by":"crossref","unstructured":"Beynon\u2010Davis, P. (1995), \u201cInformation systems failure: the case of the London Ambulance Service's computer aided despatch project\u201d, European Journal of Information Systems, Vol. 4, pp. 171\u201084.","DOI":"10.1057\/ejis.1995.20"},{"key":"key2022020620483477800_b8","doi-asserted-by":"crossref","unstructured":"Boehm, B.W. (1989), Software Risk Management, IEEE, Computer Society Press, Washington, DC.","DOI":"10.1007\/3-540-51635-2_29"},{"key":"key2022020620483477800_b9","unstructured":"Carter, B., Hancock, T., Morin, J. and Robins, N. (1993), Introducing RISKMAN: The European Project Risk Management Methodology, NCC Blackwell, Oxford."},{"key":"key2022020620483477800_b10","doi-asserted-by":"crossref","unstructured":"Chapman, R.J. (1998), \u201cEffectiveness of working group risk identification and assessment techniques\u201d, International Journal of Project Management, Vol. 16 No. 6, pp. 333\u201043.","DOI":"10.1016\/S0263-7863(98)00015-5"},{"key":"key2022020620483477800_b59","unstructured":"Clancy, T. (1995), \u201cChaos \u2013 IT development projects\u201d, available at: www.standishgroup.com\/msie.htm (accessed 24 August 2000)."},{"key":"key2022020620483477800_b11","doi-asserted-by":"crossref","unstructured":"Conroy, G. and Soltan, H. (1998), \u201cConSERV, a project specific risk management concept\u201d, International Journal of Project Management, Vol. 16 No. 6, pp. 353\u201066.","DOI":"10.1016\/S0263-7863(98)00012-X"},{"key":"key2022020620483477800_b12","unstructured":"Cooper, K.G. (1993), \u201cThe rework cycle: benchmarking for the project manager\u201d, Project Management Journal, Vol. 24 No. 1, pp. 17\u201022."},{"key":"key2022020620483477800_b13","unstructured":"Cunningham, M. (1999), \u201cIt's all about the business\u201d, Inform, Vol. 13 No. 3, p. 83."},{"key":"key2022020620483477800_b14","doi-asserted-by":"crossref","unstructured":"Czuchry, A.J. and Yasin, M.M. (2003), \u201cManaging the project management process\u201d, Industrial Management & Data Systems, Vol. 103 No. 1, pp. 39\u201046.","DOI":"10.1108\/02635570310456887"},{"key":"key2022020620483477800_b15","unstructured":"Davis, G.B. and Olson, M.H. (1984), Management Information Systems, Conceptual Foundations, Structure, and Development, 2nd ed., McGraw\u2010Hill, New York, NY."},{"key":"key2022020620483477800_b16","unstructured":"Engming, L. and Hsieh, C.T. (1994), \u201cSeven deadly risk factors of software development projects\u201d, Journal of Systems Management, Vol. 36 No. 6, pp. 38\u201042."},{"key":"key2022020620483477800_b17","doi-asserted-by":"crossref","unstructured":"Fuerst, W.L. and Cheney, P.H. (1982), \u201cFactors affecting the perceived utilization of computer\u2010based decision support systems in the oil industry\u201d, Decision Sciences, Vol. 13 No. 3, pp. 443\u201069.","DOI":"10.1111\/j.1540-5915.1982.tb01182.x"},{"key":"key2022020620483477800_b19","doi-asserted-by":"crossref","unstructured":"Ginzberg, M.J. (1981), \u201cEarly diagnosis of MIS implementation failure: promising results and unanswered questions\u201d, Management Science, Vol. 27 No. 3, pp. 349\u201078.","DOI":"10.1287\/mnsc.27.4.459"},{"key":"key2022020620483477800_b20","unstructured":"Glass, R.L. (1998), Software Runaways, Prentice\u2010Hall and Yourdon Press, Englewood Cliffs, NJ."},{"key":"key2022020620483477800_b21","unstructured":"Gobeli, D.H., Koenig, H.F. and Bechinger, I. (1998), \u201cManaging conflict in software development teams: a multilevel analysis\u201d, Journal of Product Innovation Management, Vol. 14 No. 4, pp. 323\u201034."},{"key":"key2022020620483477800_b22","unstructured":"Gunton, T. (1993), A Dictionary of Information Technology and Computer Science, 2nd ed., TJ Press, Cornwall."},{"key":"key2022020620483477800_b23","doi-asserted-by":"crossref","unstructured":"Hartman, F. and Ashrafi, R.A. (2002), \u201cProject management in the information systems and information technologies industries\u201d, Project Management Journal, Vol. 33 No. 3, pp. 4\u201014.","DOI":"10.1177\/875697280203300303"},{"key":"key2022020620483477800_b24","doi-asserted-by":"crossref","unstructured":"Hedelin, L. and Allwood, C.M. (2002), \u201cIT and strategic decision\u2010making\u201d, Industrial Management & Data Systems, Vol. 102 No. 3, pp. 125\u201039.","DOI":"10.1108\/02635570210421318"},{"key":"key2022020620483477800_b25","unstructured":"Hoepleman, J.P., Mayer, R. and Wagner, J. (1997), Elsevier's Dictionary of Information Technology, Elsevier Science, Amsterdam."},{"key":"key2022020620483477800_b26","doi-asserted-by":"crossref","unstructured":"Irani, Z. and Love, P.E.D. (2001), \u201cThe propagation of technology management taxonomies for evaluating information systems\u201d, Journal of Management Information Systems, Vol. 17 No. 3, pp. 161\u201077.","DOI":"10.1080\/07421222.2000.11045650"},{"key":"key2022020620483477800_b27","doi-asserted-by":"crossref","unstructured":"Jiang, J.J. and Klein, G. (2001), \u201cSoftware project risks and development focus\u201d, Project Management Journal, Vol. 32 No. 1, pp. 3\u20109.","DOI":"10.1177\/875697280103200102"},{"key":"key2022020620483477800_b28","unstructured":"Jones, C. (1993), Assessment and Control of Software Risks, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020620483477800_b29","doi-asserted-by":"crossref","unstructured":"Kahneman, D. and Tversky, A. (1982), \u201cThe psychology of preferences\u201d, Scientific American, January, pp. 160\u201073.","DOI":"10.1038\/scientificamerican0182-160"},{"key":"key2022020620483477800_b30","unstructured":"Keen, P.G.W. (1994), Every Manager's Guide to Information Technology: A Glossary of Key Terms and Concepts for Today's Business Leader, 2nd ed., Harvard Business School Press, Boston, MA."},{"key":"key2022020620483477800_b31","unstructured":"King, J. (1994), \u201cSketchy plans, politics stall software development\u201d, Computer World, Vol. 29 No. 24, p. 81."},{"key":"key2022020620483477800_b32","unstructured":"Krasner, H. (1998), \u201cLooking over the legal edge of unsuccessful software projects\u201d, Cutter IT Journal, Vol. 11 No. 3, pp. 11\u201022."},{"key":"key2022020620483477800_b33","doi-asserted-by":"crossref","unstructured":"Leitheiser, R.L. and Wetherbe, J.C. (1986), \u201cService support levels: an organized approach to end\u2010user computing\u201d, MIS Quarterly, Vol. 10 No. 3, pp. 337\u20109.","DOI":"10.2307\/249187"},{"key":"key2022020620483477800_b34","unstructured":"McFarlan, F.W. (1981), \u201cPortfolio approach to information systems\u201d, Harvard Business Review, Vol. 142, September\u2010October, pp. 142\u201050."},{"key":"key2022020620483477800_b35","doi-asserted-by":"crossref","unstructured":"Maish, A.M. (1979), \u201cA user's behaviour toward his MIS\u201d,MIS Quarterly, Vol. 3 No. 1, pp. 39\u201042.","DOI":"10.2307\/249147"},{"key":"key2022020620483477800_b36","doi-asserted-by":"crossref","unstructured":"Mak, S., Wong, J. and Picken, D. (1998), \u201cThe effect on contingency allowances of using risk analysis in capital cost estimating: a Hong Kong case study\u201d, Construction Management and Economics, Vol. 16 No. 6, pp. 615\u20109.","DOI":"10.1080\/014461998371917"},{"key":"key2022020620483477800_b37","unstructured":"Miles, M.B. and Huberman, A.M. (1993), Qualitative Data Analysis: An Expanded Source Book, Sage, Beverly Hills, CA."},{"key":"key2022020620483477800_b38","doi-asserted-by":"crossref","unstructured":"Nelson, R. and Cheney, P. (1987), \u201cTraining end\u2010users: an exploratory study\u201d, MIS Quarterly, Vol. 11 No. 3, pp. 437\u201049.","DOI":"10.2307\/248985"},{"key":"key2022020620483477800_b39","unstructured":"Project Management Institute (PMI) (2000), Project Management Body of Knowledge (PMBOK) \u2013 2000 Exposure Draft, PMI, Pennsylvania, PA."},{"key":"key2022020620483477800_b40","unstructured":"Pritchard, C.L. (1997), Risk Management \u2013 Concepts and Guidance, ESI International, Arlington, VA."},{"key":"key2022020620483477800_b41","unstructured":"Remenyi, D. (1999), Stop IT Project Failures through Risk Management, Computer Weekly Series, Butterworth Heinemann, Oxford."},{"key":"key2022020620483477800_b42","doi-asserted-by":"crossref","unstructured":"Sarantakos, S. (1998), Social Research, 2nd ed., Macmillan, Melbourne.","DOI":"10.1007\/978-1-349-14884-4"},{"key":"key2022020620483477800_b43","unstructured":"Sauer, C. (1993), Why Information Systems Fail: A Case Study Approach, Alfred Waller, Henley\u2010on\u2010Thames."},{"key":"key2022020620483477800_b44","doi-asserted-by":"crossref","unstructured":"Shand, R.M. (1993), \u201cUser manuals as project management tools: part 1 \u2013 theoretical background\u201d, IEEE Transactions on Professional Communication, Vol. 37 No. 2, pp. 74\u201080.","DOI":"10.1109\/47.291572"},{"key":"key2022020620483477800_b45","unstructured":"Standards Australia (1999), Risk Management, AS\/NZS 3360:1999, Standards Australia, Strathfield."},{"key":"key2022020620483477800_b60","unstructured":"Thomsett, R. (1989), Third Wave Project Management \u2013 A Handbook for Managing Complex Information Systems for the 1990s, Yourdon Press, Englewood Cliffs, NJ."},{"key":"key2022020620483477800_b61","unstructured":"Thomsett, R. (1995), Project Pathology: Causes, Patterns and Symptoms of Project Failure \u2013 Training Notes Project Risk Management, Thomsett Company, London."},{"key":"key2022020620483477800_b46","unstructured":"Thomsett, R. (2001), \u201cExtreme project management\u201d, Executive Report Abstracts, Vol. 2 No. 2."},{"key":"key2022020620483477800_b47","unstructured":"Tuman, J. (1993), \u201cProject management decision\u2010making and risk management in a changing corporate environment\u201d, Project Management Institute 24th Annual Seminar\/Symposium, Vancouver, 17\u201019 October, pp. 733\u20109."},{"key":"key2022020620483477800_b48","unstructured":"Turner, R.J. (1999), The Handbook of Project Based Management, 2nd ed., McGraw\u2010Hill, Cambridge."},{"key":"key2022020620483477800_b49","doi-asserted-by":"crossref","unstructured":"Wang, S. (2001), \u201cDesigning information systems for e\u2010commerce\u201d, Industrial Management and Data Systems, Vol. 101 No. 6, pp. 304\u201015.","DOI":"10.1108\/EUM0000000005580"},{"key":"key2022020620483477800_b51","unstructured":"Wideman, R.M. (1992), Project and Program Risk Management \u2013 A Guide to Managing Risks and Opportunities, Project Management Institute, Pennsylvania, PA."},{"key":"key2022020620483477800_b52","unstructured":"Wider, C. and Davis, B. (1998), \u201cFalse starts \u2013 strong finishes\u201d, Information Week, Vol. 7 No. 11, pp. 41\u201053."},{"key":"key2022020620483477800_b53","unstructured":"Willcocks, L. (1996), Investing in Information Systems: Evaluation and Management, Thomson Business Press\/Chapman & Hall, London."},{"key":"key2022020620483477800_b54","unstructured":"Willcocks, L. and Griffiths, C. (1997), \u201cManagement and risk in major information technology projects\u201d, in Willcocks, L., Feeny, D. and Iseli, G. (Eds), Managing IT as a Strategic Resource, McGraw\u2010Hill, Maidenhead."},{"key":"key2022020620483477800_b55","unstructured":"Willcocks, L. and Graeser, J. (2001), Delivering IT and E\u2010business Value, Computer Weekly Series, Butterworth and Heinemann, Oxford."},{"key":"key2022020620483477800_b56","doi-asserted-by":"crossref","unstructured":"Yang, Y.H. (2001), \u201cSoftware quality management and ISO 9000 implementation\u201d, Industrial Management & Data Systems, Vol. 101 No. 7, pp. 329\u201038.","DOI":"10.1108\/EUM0000000005821"},{"key":"key2022020620483477800_b57","doi-asserted-by":"crossref","unstructured":"Yoon, Y., Guimaraes, T. and O\u2010Neal, Q. (1994), \u201cExploring the factors associated with expert systems success\u201d, MIS Quarterly, Vol. 19 No. 1, pp. 83\u2010106.","DOI":"10.2307\/249712"},{"key":"key2022020620483477800_b62","unstructured":"Yourdon, E. (1996), \u201cTools and processes for death march projects\u201d, Cutter IT Journal \u2013 Application Development Strategies, Vol. 8 No. 12, pp. 27\u201035."},{"key":"key2022020620483477800_b58","doi-asserted-by":"crossref","unstructured":"Zhi, H. (1994), \u201cRisk management for overseas construction projects\u201d, International Journal of Project Management, Vol. 13 No. 3, pp. 231\u20107.","DOI":"10.1016\/0263-7863(95)00015-I"},{"key":"key2022020620483477800_frdg1","unstructured":"Bailey, R. (1996), \u201cApproving system projects. Eight questions an executive should ask\u201d, PM Network, Vol. 10 No. 5, pp. 21\u20104."},{"key":"key2022020620483477800_frdg2","doi-asserted-by":"crossref","unstructured":"Gibbs, W. (1994), \u201cSoftware's chronic crisis\u201d, Scientific American, Vol. 271 No. 3, pp. 86\u201095.","DOI":"10.1038\/scientificamerican0994-86"},{"key":"key2022020620483477800_frdg3","doi-asserted-by":"crossref","unstructured":"Ward, J.A. (1994), \u201cProductivity through project management: controlling the project variables\u201d, Information Systems Management, Vol. 11 No. 1, pp. 16\u201021.","DOI":"10.1080\/10580539408964615"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570410530702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410530702\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410530702\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:21Z","timestamp":1753400241000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/104\/4\/286-295\/180750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,5,1]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,5,1]]}},"alternative-id":["10.1108\/02635570410530702"],"URL":"https:\/\/doi.org\/10.1108\/02635570410530702","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2004,5,1]]}}}