Risk Mapping in Inter-organizational Project Control

advertisement
Mediating figures: risk mapping in inter-organizational project control
Paper submitted to the IPA conference, Cardiff, 2012
Abstract
In this paper, we analyze the relationship between management control and risk
management by investigating the use of risk maps in an inter-organizational project
collaboration in the Norwegian petroleum industry. The various ways in which risk
maps are drawn upon in the course of the studied project reveal sources of
perceived ‘usefulness’ that are not primarily to do with increased attention towards
early warning signals or the defensive production of audit trails, as suggested by
previous research. Rather, the ethnographic study shows that risk maps act as
mediating instruments which allow distributed actors to associate with ‘the project’
and its progress over time. Several characteristics of risk maps are linked to their
use as mediating instruments, such as figurative, diagrammatic outlook,
commensuration, ambiguous prospective and evaluative connotation and flexible
zones of (ab)normality. Drawing on social studies of science and technology as well
as on the ‘Montreal school’ of organizational communication, the paper extends and
complements existing explanations of the pervasiveness of enterprise risk
management technology.
Keywords: mediating figures, risk representation, risk map, inter-organizational
control, enterprise risk management
Introduction
Risk management technologies have recently gained increasing significance as
internal control technologies and prime objects of corporate governance regimes
(Arena et al., 2010; Mikes, 2009; 2011; Power, 2004, 2007; Power et al., 2009;
Woods, 2009). Power (2004, 2007) has identified a risk management ‘explosion’
since the mid 1990s in which ever more events and things have been seen and
described as organizational ‘risk objects’. Discursive events such as the Brent Spar
controversy in 1995 and diverse corporate scandals as well as ensuing corporate
governance regulations enhanced the discourse of enterprise risk management
(ERM) in terms of a shared understanding that being a ‘good’ organization is
synonymous with having a broad and formal risk management program (Miller et
1
al., 2008; Power, 2004). Characteristics of such ‘holistic risk management’
programs (Mikes, 2009) are the linkage between risk management and strategic
objectives, the inclusion of risks that are hard to quantify such as operational and
reputational risks, and an emphasis on internal control systems which proceduralize
and normalize risks. According to Power (2004, 2007, 2009), this development is
potentially problematic since organizations might focus their attention on
‘secondary risk’ management, that is on the production of risk representations and
documentation that guard organizations from external critique and manage their
reputation, and in that it may reinforce a culture of blame avoidance and
defensiveness where it becomes ‘risky’ for practitioners to exert judgment, respond
to early warning signals and admit mistakes. As such, current risk management
discourses arguably work against the creation of what High Reliability scholars
have called ‘disruptive intelligence’ (Turner and Pigeon, 1997) and ‘mindful
organizing’ (Weick, 1987, Weick et al., 1999; Weick and Sutcliffe, 2001), features
of organizing that allow for flexible revision of assumptions in the face of
unexpected events (Power, 2007).
Currently, only few studies have investigated how and with what effects the
prevalent ERM discourse is actually translated in concrete organizational practices
(Arena et al., 2010; Mikes, 2009, 2011). In particular, there is a lack of detailed
accounts as to how particular risk management technologies are organizationally
enacted (Orlikowsi, 2000) and to which extent their use enhances organizational
mindfulness towards primary risks and a secondary risk management logic of
preoccupation with legitimacy, auditability and defensiveness. So far, analyses of
the translation of ERM into practice have focused on the extent to which ERM
practices are tightly or loosely coupled to operational decision-making,
investigating under which circumstances the ERM agenda becomes central to
managerial decision making or appears to occupy a purely ritualistic role of
impression management (Arena et al., 2010; Mikes, 2009, Power et al., 2009). Less
emphasis has been placed on how particular risk representation technologies are
actually handled in practice and for what kind of purposes they are drawn upon. The
construction and circulation of risk maps and associated risk registers, for instance,
might affect organizational members and their collaboration in more or less subtle
ways, even if managers do not explicitly see these devices as most relevant tools for
paying attention to potential threats and dealing with perceived ‘risks’.
2
This paper seeks to contribute to our understanding of risk management practices
by investigating the performance of risk maps as prominent ERM technologies
(Mikes, 2009; Power, 2007; Woods, 2009). This is done by analyzing the ways risk
maps are deployed in the course of a technological upgrading project in the
Norwegian petroleum industry in which this tool emerged as one of the most
prevalent representational technologies.
Furthermore, in contrast to prior studies, our ethnography is situated in an interorganizational context. Inter-organizational collaboration often involves particular
problems of coordination, control, legitimacy and understanding (Bourrier, 2005;
Vlaar et al., 2006) which make the use of joint representation devices both relevant
and potentially problematic. We thus analyze how risk maps are set up and for what
kind of uses they are enrolled during the inter-organizational project collaboration.
Drawing upon a sociology of science and technology perspective (Callon, 1986;
Latour, 1987; 2005) and the Montreal school of organizational communication
(Cooren, 2004; Cooren et al., 2011; Taylor 2011; Taylor and Cooren, 1997), we
examine risk maps as they are performed in an inter-organizational project and we
relate the particular observed uses to technical-semantic characteristics or
‘affordances’ (Gibson, 1979; Kaplan, 2011) of risk maps and the regulative and
organizational context in which these practices are situated.
In line with Power (2007), we observe that risk maps tend to develop a life of their
own and are implicated in the production of reassurance rather than caution. Project
members are critical of such normalizing and reductionist effects of risk maps.
Actors’ attitudes towards risk maps are ambiguous, however, in that they
characterize them as problematic at the same time as they regard them as valuable
tools for inter-organizational coordination and draw upon them frequently in their
interactions. The various ways in which the maps are drawn upon in the course of
the project reveal sources of perceived ‘usefulness’ that are not primarily to do with
increased attention towards early warning signals or the defensive production of
audit trails, but rather with the creation of commitment and the mediation of
distributed actors’ activities in an inter-organizational setting, allowing the project
to ‘progress’. Several characteristics of risk maps such as figurative, diagrammatic
outlook, commensuration, ambiguous prospective and evaluative connotation and
flexible zones of (ab)normality can be associated with the observed enactment of
risk maps in this context. These characteristics do allow risk maps to act as
3
mediators between distributed project actors, linking ‘non-local’ ERM ideals with
‘local’ aspirations and imperatives of practitioners (Kurunmäki & Miller, 2011)
such as achieving ‘synergy’ and ‘alignment’ in project coordination and control.
Describing how risk maps are put to use and performed, the paper illustrates how
the government of risk is related to mediating instruments and how such mediation
happens in the interplay between texts and conversations.
The paper is structured as follows. First, we review extant research on risk
management practices and their theorizing on how risk representation technologies
are linked to their social and organizational context. We then introduce our
theoretical and methodological approach before describing the study setting.
Subsequently, we move to characteristics of risk maps and analyze their use in our
inter-organizational case. The empirical findings are then discussed in the light of
existing literature and we conclude by outlining areas for further investigation.
Risk management discourse and practice: the role of risk representation
technologies
Social and cultural theories regard risk as a socially constructed category (Beck,
1992; Douglas, 1985; 1992; Giddens, 1991; Weick, 1987; for an overview, Gephart
et al., 2009 and Lupton, 1999). With regard to organizations, Miller et al. (2008)
conceive of risks as those phenomena that are conceptualized and managed as risks
within companies. Likewise, Power (2007) advances an understanding of risk as a
conceptual ‘object’ within institutional space: as the product of social,
organizational and managerial processes by which various objects get recognized
and described as risks. Such an understanding ascribes risk representation
technologies a pivotal role in constituting and institutionalizing what comes to be
seen as ‘risk objects’ and as legitimate ways of managing risks. As Power et al.
(2009: 303) point out, “This conception frames our attention to the routine
management systems and instruments, including definitions and categories for
representing contingent outcomes as risks.” Such instruments are thus seen as not
merely describing, but also performing risks by introducing new understandings of
responsibility, accountability and decision making (ibid.). In his analysis of the
recent risk management discourse of “enterprise risk management”, Power (2004,
2007, 2009), describes how regimes of corporate governance, such as the Sarbanes
Oxley Act, the Basel accords and COSO guidance on monitoring internal control
4
systems are constitutive of a new type of “risk governance”. These regulative
regimes emerged in the 1990s as a response to increased pressures for transparency
and accountability of the risk analysis process itself, thus emphasizing the
managerial processes by which risk assessments are made rather than their content
per se (Power, 2007). The necessity for giving account of accepted risk
management procedures leads to a preference for rationalism and standardization,
where risk management itself becomes the object of secondary risk management in
order to prevent the ‘reputational risk’ of not being able to testify that a proper risk
management process is in place (Power, 2007; Power et al., 2009). Essentially two
problems arise from this development. First, the excessive focus on producing
legitimate accounts of risk management may lead to a decoupling of risk
management technologies and the actual practice of identifying and dealing with
(primary) risks. Second, professional judgment that cannot be supported by
standardized risk management technologies might become suppressed as it loses
legitimacy relative to such technologies, thus fostering a culture of defensiveness
and blame avoidance rather than the ability to critically envision alternative futures
(Power, 2009).
What characterizes enterprise risk management technologies? The ERM discourse
calls for integrated risk management technologies, i.e. comprehensive risk
assessments of quantifiable and non-quantifiable risks that are linked to strategic
objectives and internal control systems. According to Mikes (2009), two sets of
techniques are characteristic of ‘risk-based internal control’, scenario analysis and
decision tree methods borrowed from the strategy and decision making literature on
the one hand, and risk mapping, risk self assessments and risk reviews originating
in internal audit, on the other. The latter, judgmental methods become particularly
important for the assessment of non-quantifiable risks and for the provision of
overview in correspondence to ‘risk governance’ requirements: “[t]he emphasis on
risk identification systems gives technologies of risk visualization or ‘mapping’ a
more central position in the management process than risk calculation; governance
requires overview instruments” (Power, 2007: 80). Judgment-based risk maps, the
focus of this paper, thus constitute central ERM technologies that have become
institutionalized as tools mainly for senior management. They create representations
of a rational risk management process and thereby constitute “a trail of evidence for
5
regulators” (ibid.: 81), but may not be very actionable and functional for internal
decision making.
Empirical studies investigating risk representation technologies as they are enacted
in organizational practice are scarce. Woods (2009) investigates the use of risk
maps in the Birmingham city council. Taking a contingency perspective, she
proposes that risk management as enacted by risk mapping in a public services
context is contingent on central Government policies, the organization’s size and
features of information and communication technology
such as the possibility of
automatic update and the availability of risk registers on the intranet. Arena et al.
(2010) investigate practice variation in ERM along the dimensions of rationalities,
experts and technologies (Miller and O’Leary, 1987; Miller and Rose, 1992),
focusing on the extent to which ERM practices are integrated in or decoupled from
everyday business. They find that ERM practices and their decoupling or
embeddedness vary depending on pre-existing organizational logics. ERM becomes
more integrated in everyday decision-making when it is linked to a ‘pervasive
performance rationality’, when risk experts create a continuous challenge to predict
risks and when ERM is combined with relevant performance indicators in a
measure such as profit-at-risk, rather than depicting risks on qualitative risk maps.
Similarly, Mikes’ (2009, 2011) studies of ERM practices in different banks provide
an account of how different ‘calculative cultures’ conceive of ERM, distinguishing
‘quantitative enthusiasm’ from ‘quantitative skepticism’. These studies show that
ERM is enacted differently in different contexts, and describe characteristics of
such practice variation. With their relatively broad comparative focus, they do not
look at specific technologies-in-use in more detail, i.e. in terms of how different
actors draw upon these technologies in concrete decision-making instances, and
what different roles these tools come to play. Furthermore, extant studies have not
addressed the use of risk representational technologies in contexts where
organizational borders are crossed, that is when representations are constructed for
internal decision-making as well as for reporting, control of and giving accounts to
external parties. We seek to address these issues by investigating how risk maps are
implicated in decision-making and communication processes in the course of an
inter-organizational project collaboration.
Studying the performance of risk maps as an interplay of conversation and text
6
Focusing on what risk maps ‘do’ in practice, we take a sociology of science and
technology perspective (Callon, 1986, 1998; Latour, 1987) and draw upon the
Montreal school of organizational communication (Cooren et al., 2011; Taylor
2011; Taylor and Cooren, 1997). Post-humanist approaches in the sociology of
science and technology (Callon, 1986; Latour, 1987, 1994, 1996, 2005) focus on the
mutual engagement of human and nonhuman actors. Technology is investigated as
to how its performance in diverse local contexts brings about socio-technical
macro-agents such as markets (Callon et al., 2007; Doganova and Eyquem-Renault,
2009; Miller and O’Leary, 2007; Muniesa et al., 2007) and organizations (Talyor,
2011; Taylor and Cooren, 1997), and allows for action and control at a distance
(Ezzamel et al., 2004; Law, 1986; Robson, 1992; Rose and Miller, 1990). Of
particular relevance are intermediaries (Beunza and Garud, 2007; Callon et al.,
2007) or ‘mediating instruments’ (Miller and O’Leary, 2007) that circulate within
techno-economic networks and mediate the relationships between distributed actors,
distinct imperatives and domains such as science and the economy. Representation
devices like technology road maps (Miller and O’Leary, 2007), PowerPoint
technology (Kaplan, 2011, Stark and Paravel, 2008), project time lines (Yakura,
2002), standards (Bowker and Star, 2000) and accounting (Quattrone, 2009) seem
to be particularly inclined to take on such mediating roles, as they build a stable
frame of reference, can be transported through time and space and are abstract and
flexible enough to be associated to local concerns and activities. Building upon this
perspective, the Montreal school of organizational communication holds that
technological action is often discursive, as it happens in ‘conversations’ (e.g., risk
management meetings), and draws upon and produces narrative and calculative
‘texts’ (e.g., risk maps) which are embedded in other texts (e.g. cost information,
internal guiding documents and industry regulations) (Cooren, 2004; Hardy et al.,
2005; Taylor, 2011). It is in the recursive relation between texts and conversations
that collective macro-agents come to form and re-affirm an identity in their ‘coorientation’ towards a particular text (Taylor, 2011; Taylor and Robichaud, 2004).
Studying the performance of risk maps from this perspective implies viewing these
devices not as pure representation technologies which refer to an objectively
existing entity ‘out there’, but as constructive devices which bring about the object
which they represent, such as diverse ‘risk objects’ or other economic entities
(Kalthoff, 2005; Quattrone, 2009; Power et al., 2009). The performativity of
7
technological devices is based on their embeddedness in and interdependence with
particular systems of thought, such as economic theory (Hopwood, 1992;
MacKenzie and Millo, 2003), and on certain material and semantic features or
‘affordances’ that allow them to circulate and be appropriated by different agents
(Latour, 1987; Kaplan, 2011; Miller and O’Leary, 2007; Quattrone, 2009; Robson,
1992; Stark and Paravel, 2008). Importantly, technology is seen as influencing, but
not determining particular shared understandings and courses of action, since its
enactment is regarded as a collective human-nonhuman achievement situated in a
particular context (Qu and Cooper, 2011).
Capturing the performance and peformativity of risk maps, we therefore need to
take into account certain characteristics or ‘affordances’ (Gibson, 1979; Kaplan,
2011) of the risk map technology itself, the ways in which the technology is drawn
upon by different actors (Doganova and Eyquem-Renault, 2009; Stark and Paravel,
2008), as well as the tool’s embeddedness in its inter-organizational and regulative
context (Hardy et al., 2005). We thus consider risk maps ‘in action’ and investigate
the role of risk maps during an inter-organizational project collaboration aimed at
upgrading parts of the technical infrastructure in two gas plants in the Norwegian
petroleum industry.
Study Context and Methods
The empirical material originates from a case study on an upgrading project in the
Norwegian petroleum sector. This project involves an inter-organizational
cooperation between three major actor groups, the owner organization which is a
joint venture of eleven oil and gas companies on the Norwegian continental shelf,
the operator organization and the technical service provider organization (TSP).1
The project’s objective is to change obsolete systems and components in the
compressors variable speed drive systems of two plants. The systems being
upgraded during this four year project are essential for the gas flow in and out of the
plants, so that the project is of high priority at the same time as it is endowed with
several dangers and risks. The operator of the two plants is responsible for the gas
transportation system from Norway to Europe and initiated the upgrading project.
The project is supervised and financed by the owner organization. TSP runs the
1
Other actors such as diverse contractors are variably enrolled in the project, too. We focus in our
analysis on the three central actors involved throughout the whole project, but contractors are
included in the analysis to the extent to which they are referred to in risk management practices, e.g.
when they are made a ‘risk object’ on the risk map.
8
plants on a daily basis and is responsible for implementing the technical solutions
during the course of the project. TSP is supervised by the operator. The relationship
between the organizations is illustrated in figure 1 below.
Owners
supervise
report
Operator
supervise
report
Technical Service
Provider
Figure 1: Main actors groups and their inter-organizational relationship
The operator and TSP closely collaborate and are in frequent contact via meetings,
telephone and email. In regular monthly meetings, the operator and TSP discuss the
project status related to major issues such as cost, schedule, risks and upcoming
milestones. The owner organization receives a monthly report from the operator and
is involved in some project meetings. These three actor groups collaborate on
projects such as the one studied in this paper on a regular basis. Thus, interorganizational projects in this context are heavily institutionalized and they are
regulated by various governing documents of the organizations involved, including
regulations for risk management.
Project management in this inter-organizational setting is organized into four
phases: Feasibility, Concept, Definition and Execution (see figure 2). A project is
usually initiated by defining a business opportunity or a particular problem for
which the project shall develop solutions, in this case the obsolescence of particular
technical systems in two plants. Replacing technical systems was considered
necessary from economic, technical and safety perspectives, due to ageing and lack
of supply materials and the risk of a technical breakdown. Once the decision to
conduct the project has been taken by the owners, project leaders are appointed in
the operator organization and TSP, and project teams are set up in both
organizations. The aim of the first project phase, the Feasibility phase, is to
9
elaborate different possible solutions and to evaluate them with regard to their
technical, economic and HSE (Health, Safety and Environment) feasibility. In the
Concept phase, further information is collected so as to select one solution
(“concept”) which is then to be further defined (detailed engineering plans,
scheduling, cost estimates, assigning of responsibilities, etc.) in the Definition
phase. In the final Execution phase, the planned solution is carried out, e.g. the
obsolete systems are replaced by alternative systems. To enter each of these phases,
the owner organization has to officially approve, i.e. a ‘decision gate’ has to be
passed.
Decision
Gate
Feasibility
Decision
Gate
Concept
Decision
Gate
Definition
Execution
Figure 2: Project Phases
Each project phase is organized into the same milestones that are regulated and
proceduralized by various documents. These milestones are 1) phase start-up
meeting, 2) delivery of the ‘decision gate support package’ from TSP to the
operator, 3) ‘Independent Project Review’ (IPR), 4) the operator’s proposal to the
owners to pass the decision gate and provide funding for the next project phase, and
5) the owners’ approval via email, called ‘license-web’. The phase start-up meeting
sets the agenda for the respective project phase. The ‘decision gate support
package’ consists of a collection of standard documents that TSP is required to
complete, giving account of the project content and status. This report is reviewed
by the operator who creates its own version which is then presented in the IPR
meeting. This meeting is a two-days audit involving all three actor groups as well as
external ‘facilitators’ with the aim of evaluating the extent to which the
requirements for this project phase have been met. If the proposal to pass the
decision gate is approved by the owners, the project enters the next phase.
Risks representations got particular attention in internal and inter-organizational
meetings held at the beginning and end of each project phase (‘Phase start-up’ and
IPR), the ‘monthly meeting’ which is mainly a status report between TSP and the
operator, and in meetings explicitly dedicated to risk management (inter-
10
organizational ‘risk workshops’ held at least twice during a project phase, and
monthly internal ‘risk reviews’) (see figure 3).
Start of
project phase
Beginning of
month
Phase
Risk
Start-Up Workshop
End of
project phase
End of month
Risk
Monthly
Review meeting
Risk
IPR
Workshop
TSP
Operator
Owners
Figure 3: Most important project meetings regarding risk management2
Risk maps were the most prevalent tool for risk representation in this context. They
are included in various project governing documents and prescribed by standard
documents such as the ones to be completed within the decision support packages.
Data on the construction and use of risk maps was collected longitudinally in terms
of a ‘projectography’ (Bragd et al., 2008; Czarniawska, 2007). We followed the
upgrading project by observing meetings (45), collecting documents such as
monthly reports, power point slides, project plans and governing documents, and
conducting interviews with representatives of different actor groups involved in the
project (14). The upgrading project started in 2009 and will be completed by 2013.
The analysis in this paper focuses on the first three project phases that have been
carried out from autumn 2009 until autumn 2011. Table 1 gives an overview of the
collected empirical case data.
Data Type
Interviews
Project manager
Project manager
Core member, project team
Core member, project team
Risk facilitator (core team)
Risk facilitator
Owner representatives
2
Organization(s)
Quantity
Operator
TSP
Operator
TSP
TSP
Operator
Owner organization
2
2
3
2
1
1
3
The dotted rectangles indicate which parties are included in the respective meeting.
11
Total
Meetings observed
Risk workshop
Internal risk review
Monthley meeting
Independent project review (IPR)
Other internal meetings
Other inter-organizational meetings
Total
Documents
Overall governing documents
Risk management procedures
Project governance
Monthly reports
14
TSP & Operator
TSP
Operator & TSP
TSP & Operator
TSP, Operator &
Owner organization
TSP
Operator
TSP & Operator
2
1
2
12
2
TSP
Operator
TSP
Operator
Owner Organization
TSP
Operator
1
3
4
3
1
20
20
52
Total
7
14
5
45
Table 1. Summary of Data Sources
We structure the data analysis along the dimensions of ‘conversation’ and ‘text’ as
put forward by Taylor and Cooren (1997). In terms of text, we analyze the
characteristic semantic properties of risk maps as well as their reference to and
embeddedness in other texts such as internal documents and industry regulations. In
terms of conversation, we distinguish analytically between two kinds of patterns of
risk maps in action: 1) conversation patterns that have mainly to do with the
construction and drawing of risk map texts and 2) conversation patterns that have to
do with the drawing upon and reference to existing risk map texts.
Risk maps as ‘text’
Risk maps depict diverse risk objects within a Cartesian coordinate system,
classifying them along two axes, the probability of the risk’s occurrence and the
severity of its consequences, its potential ‘impact’. Depending on these two
estimated properties of a particular risk object, it is ultimately classified along a
traffic light system as red, amber or green risk. Figure 4 shows an ideal-type risk
map template as presented within TSP’s project documentation.
12
Figure 4. Risk map format as represented in TSP’s monthly report
Relationships between risk maps and other texts
Diverse risk objects, such as cost, HSE, schedule, operation, technical integrity and
reputation (‘public issue’) risks, are to be represented on the map. The represented
risks refer to ‘risk registers’ that are set up for all categories of risk objects in
different project groups. Of all risks identified in the various risk categories, the
risks to be considered as most important are displayed within the risk map. Risk
maps do not only exist for particular projects (‘project risk maps’), but also as a
selective combination of several project risk maps in overview figures that display
the most relevant risks per organization (organizational risk map) and the most
relevant risks of several inter-organizational projects taken together (quasi a ‘metaproject’ risk map). Risk representations thus become more abstract the further they
‘travel’ within the respective organizations’ and project hierarchies ‘up’ to top
management levels and through the project organization ‘up’ to the owners.
A specific characteristic of internal guiding documents and regulations in this
context is the heavy focus on project management. Much activity in this industry is
organized in terms of projects, and project management guidelines stress the ‘riskbased approach’ to be taken. Project management, in terms of setting objectives,
planning, coordinating and controlling activities, according to these guidelines,
shall all be linked to risk assessment. At the two plants involved in the upgrading
project, risk maps have been officially introduced in 2000 and implemented in
projects in 2001. This can be seen as a response to a change in the regulative
13
context. In line with other industries, the regulative regime of the Norwegian gas
and oil industry has moved from a prescriptive-based to a performance-based
approach (Braut and Lindoe, 2010; Petroleum Safety Authority Norway (PSA),
2010). Corresponding to what Power (2007) describes as the rise of ‘risk
governance’, under a performance-based regulative regime companies are expected
to prove that they have a comprehensive risk management and internal control
system. Although the concrete type of risk representation, e.g. by means of risk
maps, risk indicators or otherwise, is not prescribed by these industry regulations,
‘internal’ responses to these regulations consistently feature risk map templates as
one of the most prevalent risk reporting tools. However, risk maps were not
completely alien in this industry before the rise of performance-based regulation.
Maps of a similar outlook have been used in a more informal way already decades
earlier. One TSP engineer, for instance, recollected besides conducting quantitative
risk analyses on technical risks also discussing and placing risks that were harder to
treat quantitatively along probability and impact dimensions in a ‘paper and pencil’
fashion in the early 80s. This was done as an informal brainstorming as to what
factors need to be considered when conducting a project. As compared to these
early risk maps, currently risk maps are comprised of a much wider range of risk
objects, and they are institutionally embedded in a vast array of IT templates,
governing documents and procedures of risk reporting within (inter-) organizational
project management.
Discursive characteristics of risk maps
Several semantic-technical aspects are characteristic of risk maps. As other
inscriptions, they are mobile (transportable through different places and times in
printed or digital form), stable and recognizable in outlook (two-dimensional risk
representation and traffic light colour coding), and combinable, i.e. they allow for
aggregation and recombination of information (Latour, 1987; Robson, 1992; Stark
and Paravel, 2008). We will discuss in this section particularly the nature of the
characteristic discursive form of risk maps, that is i) their figurative, diagrammatic
outlook, ii) the type of commensuration that risk maps bring about, iii) their flexible
classification of zones of (ab)normality and iv) their combination of prospective as
well as evaluative signs.
14
Figurative, diagrammatic outlook
Risk maps are diagrammatic, i.e. imaging, techniques. They constitute overview
images, showing in one single diagram how risky or dangerous, overall, the
operations of a particular system, such as an organization, an organizational unit or
a project, are estimated to be. This is done by the ‘textile order’ (Schneider, 2005)
of the tabular system that interweaves two elements, probability and impact, into
one image. The diagrammatic outlook of risk maps combining several quantitative
and figurative elements into one image can be related to perceptions of clarity,
simplicity and instantaneous ‘overview’. Risk maps, therefore, may tend to be
perceived as easy to understand with an impression of getting a good overview of
an otherwise complex arrangement of (inter-) organizational processes. As one
project member commented:
These tables (risk maps) have been calibrated, fine-tuned, and redesigned over
years. They’re working models which may be updated and changed in the future.
But they’re fairly simple to understand now. A traffic light system. It’s clear. It’s
visual. It’s easy to understand. (I-TSP-3).3
The simplicity of risk maps is also related to the selective representation of
identified risks. Only a certain amount of risks can be represented in an overview
image, and the naming of risks needs to be short to ensure readability. Similar to a
representation of key performance indicators, e.g. on a balanced scorecard,
perceived ‘comprehensiveness’ of risk maps goes along with selection and
abstraction.
Commensuration
The tabular system of linking probability and impact ‘standardizes’ qualitatively
different types of objectives-at-risk, such as financial goals, goals of technical
functionality, and work place safety along two homogenous dimensions, thus
making risks to these objectives appear commensurable (Espeland and Stevens,
1998) and allowing for categorization and prioritization of risks. The symbolism of
traffic lights supports this perception of homogeneity and comparability, as it
integrates the two dimensions into a ranking system by setting thresholds as to
which probability-impact combinations are more or less ‘normal’, or put in more
3
We refer throughout the paper to empirical data by means of codes that indicate the type of data,
i.e. interview (I), meeting (M) or document (D), and the (inter-)organizational affiliation, i.e. TSP,
operator (OP) or owner (O).
15
interventionist terms, ‘tolerable’ or ‘intolerable’, thus requiring intervention or not.
In the sub-text to the risk map template provided in governing documents, green is
associated with ‘risk acceptable, no action required’, amber with ‘risk acceptable,
risk reducing action should be implemented’, also described as ‘ALARP – As Low
As Reasonably Practicable’, and red with ‘risk not acceptable’ (Renn, 2008). The
green-amber-red colour combination has been used for traffic regulation since the
1920s and the meaning and connotations of this symbolism is arguably collectively
shared and highly institutionalised. Traffic lights therefore work effectively as
semantic markers between different ‘zones of acceptability’, enabling a seemingly
clear ranking of represented risks regarding their urgency of intervention.
Flexible zones of (ab)normality
The distinction between tolerable and intolerable on the map is not a purely
mathematical-statistical matter, since which spectrum is considered to be ‘normal’
or ‘acceptable’ is based on a qualitative judgment rather than on a mathematically
based indication (cf. Link, 1996). Such threshold values are therefore, in principle,
flexible and re-locatable on a continuum. As markers between normal and abnormal
cannot be purely mathematical, the border is set by means of semantic-symbolic
markers, i.e. the traffic lights. The operator’s project risk map, for instance, features
more amber areas (8) than green (3) and red (4) areas as compared to the TSP’s
map in which all three areas are equally distributed. It thus represents an unequal
colour distribution, making more probability-impact relations ‘tolerable’ (see figure
5).
16
Consequence
Minimal
Small
Probability
Very Likely Likely 20% - 50% Less Likely Unlikely 1% - 5%
50% - 100%
5% - 20%
Bid waiver
Significant
Very significant
Interfaces at site
Contractor
capacity
c
Compliance with
TR
Personnel risk
Potential DCP
Ex certification
Installation
philosophy contract
Functionality of
the system
Figure 5. Operator’s risk map used in the upgrading project (Concept phase)
Twin prospective-evaluative connotation
Furthermore, risk maps are prognostic images in the sense that the dimensions of
probability and impact are estimates of potential future events. As other prognostic
representations such as growth curves, series and histograms, risk maps use
mathematical-statistical elements, particularly probability values, tabular format and
Cartesian coordinate system of x and y axes. At the same time, however, the traffic
light qualification can be read as indicating past and current performance of the
accounted for entity, i.e. the project. If all identified risks are placed in the green
area, for instance, the project appears to be ‘on track’. Risks maps thus have an
ambiguous prognostic-evaluative connotation, making it in principle amenable to
prognosis, planning and scheduling as well as performance evaluation. Along with
the potential openness to include a wide range of different risk objects and
objectives-at-risk, be it risk to health and safety, technical functionality or risk of
delays and cost overruns in a project, the twin prognostic-evaluative connotation
allows to discursively link different areas of expertise and is well suited to the
17
proclaimed ‘risk-based’ project management approach, linking concerns with risk
to project management agendas.
Other characteristics could be added here, so that our list is not meant to be an
exhaustive catalogue, but rather a suggestive description of the most apparent
discursive features. Importantly, these characteristics are not independent of past
and current uses of risk maps, as they have been developed and become
institutionalized as a particular combination of signs in recurrent interaction. It is
such interaction or ‘conversation’ (Taylor, 2011) in which risk maps are produced
and referred to that we attend to in the following section.
Risk Maps in Conversation
Our analysis of how risk maps are performed in the studied inter-organizational
setting focuses first, on how the involved actor groups constructed and changed risk
representations and second, on how they drew upon and mobilized such
representations in the course of the project collaboration.4 In each section, we
describe observed practices of risk map conversations and highlight characteristic
elements of these practices.
Drawing the map: Identification and placing of risks
As ‘empty’ templates (Quattrone, 2009), risk map formats are drawn upon as texts
that need to be filled with content in the course of a project. During the upgrading
project, both the TSP and the operator created their own versions of risk maps, and
they were required to constantly review and update their maps. Reviews of risk
maps took place in meetings attended by representatives of different project subgroups such as HSE, cost and engineering groups. Sub-groups developed their own
risk registers in separate sub-group meeting, listing a set of risks in their area of
responsibility. The construction and update of risk maps involved the selection of
the most ‘exigent’ risks out of these ‘lower-level’ registers, discussion of potential
additional risks, and the placement of identified risk objects along probability and
The distinction between ‘drawing of’ and ‘drawing upon’ risk maps should be understood as an
analytical one only. One could argue that the map is drawn upon when it is constructed. By
distinguishing these processes, we aim to identify characteristics of processes in which risk objects
are defined and placed on the map versus characteristics of processes in which existing maps are
drawn upon, even if these two processes are often intermingled in practice.
4
18
impact dimensions. In the following, we describe characteristic patterns of these
processes in more detail.
1) Creation of inclusive overview categories
Identification of risk objects to be placed on the map often did not imply a simple
selection of the top risks as ranked in existing sub-group risk registers. Instead,
more inclusive risk objects were defined that ‘summarized’ a few more concretely
defined risks under abstract categories. For instance, ‘functionality of the system’
was defined as a risk object which comprised different uncertainties as to whether
the new technical system to be implemented in the upgrading project would work at
least as well as the current system operating at the two plants. Interestingly, such
overview categories tended to be defined in terms of ‘objectives at risk’ (e.g.,
technical functionality) rather than in terms of ‘risk to an objective’. In this way, the
risk map rendered relevant project objectives visible rather than particular risks to
these objectives. To be sure, the placement of such objectives at risk within green,
amber or red areas could still give an indication of the estimated threats to an
objective, but the particularities of such threats disappeared from sight. Other
constructed risk objects did refer to risks rather than objectives at risk, but their
abstract definition in many cases implied an unclear relationship to a particular
project objective. ‘Interfaces at site’, for instance, was defined as a risk object
which referred to risks emanating from other projects that are conducted in parallel
at the plants to be upgraded, as well as from the necessity to continue plant
operation while undertaking the technical upgrade. A wide range of risks and
related objectives at risks can fall under this category, such as technical problems,
project delays, unexpected costs and increased danger for plant personnel.
Identifying risk objects thus seemed to follow a logic of comprehensiveness and
abstraction rather than selection and specification. At times, project members
criticized risk maps as being too abstract, so that it is hard to understand what lies
behind a risk bubble. On several occasions, actors got frustrated with represented
risks on the map that they couldn’t make sense of, as they forgot over time the
broader context and meaning of the represented risk or ‘objective at risk’ and the
associated actions, or couldn’t interpret it because someone else – not present at the
current meeting – had been originally responsible for placing that risk.
19
2) Quick closure of risk placement discussions
As to the specific placement of a risk object on the map, agreement was reached
surprisingly fast during meetings. Most often, the first suggestion of placing a risk
on the map was accepted so that the risk got placed without further discussion.
Once risk objects were placed, meeting participants quickly moved on to other
issues.The process of risk assessment with regard to their potential impact is meant
to be supported by guidelines for impact categorization (see Appendix A), and
should also be informed by “prevailing risk tolerance criteria (set by risk owner)
and [by] risk appetite” (D-TSP-3). Actual risk placement decisions were mostly
taken without discussing and matching potential impacts to the categories specified
in these guidelines. In interviews, project members commented on this observation
by stating that the exact placement was not that important, since this wasn’t an
exact science anyway. More relevant would be that risks get dealt with and
ultimately reduced. However, the lack of discussion on the potential impact of a
particular risk object, along with the abstraction as discussed above, went along
with actors’ uncertainty and conflicting interpretations regarding what a risk bubble
stood for, and in turn, what mitigating activities should be undertaken. For instance,
some project members referred to the risk object termed ‘personnel risk’ as
personnel safety at risk due to the vicinity of running compressors when conducting
the upgrading work, while others referred to it in terms of a risk to technical
functionality of the running compressors caused by upgrading workers’ potential
incautious use of machinery. In this way, personnel was both seen as an objective at
risk and as a risk to technical functionality. Such differences in conceptions can
imply fundamentally different mitigating activities. Hence, as several mapped risk
objects referred comprehensively to different types of risk and impact at once, it
made practical sense for project members to ignore predefined impact categories
and apply judgment in where to place a particular risk object. At the same time, this
practice furthered multiple interpretations and confusion as to the meaning of a risk
object, as project members did not make related impacts explicit.
3) Representational inertia
Furthermore, a reluctance to change the original risk map in the course of the
project was discernable. Risk mapping seemed to be path dependent, so that
removing risks as well as adding new risks occurred only rarely, and with perceived
20
delay. The stable risk map stood in contrast with talk about newly emerging risks
among project actors. Such change in perceived risks materialized rather at ‘lower’
levels of risk representation, e.g. in the risk registers of project sub-groups, such as
the engineering group concerned with technical risks or the accounting group
concerned with cost risks. Once established, risk maps seemed to develop a life of
their own, being only loosely coupled to more operational discussions in which new
risks might come up, so that there are incongruent risk representations on different
levels. At times, the resulting incongruence was recognized and discussed in
meetings, and interviewees talked in this regard about insufficient updating of the
maps. In an internal project review meeting, for instance, a discussion arose about a
new risk that had not been included in the risk map. The operator’s project manager
argued that he had not included that risk because he wanted to wait and get more
information about it from TSP, i.e. to be more confident about the nature of the risk
before putting it on the map. Other project members, however, criticized this
attitude and cautioned that risks should be mapped as early as possible (M-OP-9).
Path dependence of risk maps did not only mean a tendency to keep the same risks
on one of the actor’s (e.g. the TSP’s) map, but also a tendency of the operator to
simply take over the risks as represented in the TSP’s map when creating the
operator’s own risk map. Some actors perceived this practice as problematic (MOP-9, M-OP-10, I-GL-2), cautioning against the convergence of the TSP’s and the
operator’s risk maps into a single project’s risk map. They argued that taking over
the same map could be regarded as a ‘security blanket’ which would work mainly
in a ritualistic way rather than critically engaging with the specific risks that their
own organization is exposed to.
4) Representing ‘synergy’
One distinctive rationale of risk representation in this inter-organizational context
was the use of identical risk maps, i.e. maps representing the same types of risk
objects, for both plants in which technical systems were to be updated, and also for
a short period for two other projects that were managed within the ‘project
portfolio’ by the same project teams.5 Dealing with upgrading two different plants
The total ‘project portfolio’ included besides the studied project another upgrading project and a
project preparing for processing of products from a new oil field. The latter project differs in many
5
21
in the same project, as well as dealing with different projects within one ‘project
portfolio’ was frequently justified with reference to generated ‘synergy’ effects.
Such synergy was not clearly operationalized, e.g. in a specified amount of cost
savings. However, the fact that the same risk maps were used for these different
undertakings was referred to as ‘evidence’ that project management synergies could
be achieved. The presentation of a common risk map for all three projects in the
monthly report and monthly meeting was soon openly contested and abandoned, as
the operator was concerned about failing to understand the risk map and felt the
need to distinguish project-specific risks. Using a common risk map for the
upgrading of two different plants, however, has been practiced in all project phases
during the study period. This practice is legitimized by pointing to the fact that the
same project team runs the project on both locations, that many of the risks are
identical and that plant specific risks are not problematic, as risk owners would take
them into account in their specific action lists. Two separate, but nearly identical
risk maps managed by the same team would, in contrast, be time consuming,
confusing and pose challenges for documentation, updating of the maps and the
action lists. Thus, ‘synergy’ was made visible by means of identical risk maps.
While all actor groups defended the practice of using a common risk map, they did
at times utter concern over one of the plants (located geographically where most of
the project team of the TSP is situated and close to the operator’s location) getting
more attention than the other plant (where actually most of the work is to be done).
Project members did not explicitly relate this perceived imbalance to the use of
common risk maps, although identical maps can imply that specificities of the
‘neglected’ plant do not get mapped.
5) Omitting risks
Some risks were recognized as relevant by actors in project meetings, but did not
get represented in the map. We observed different ‘non-placement’ practices in this
regard:
First, certain risks got excluded from the map because they were regarded as
‘dangerous’ to report. The perceived danger was related to offending another actor
group and disturbing the relationship by officially naming a risk that results from
respects from the other two. Only the studied upgrading project concerns two plants, the other ones
are related to only one of these plants.
22
the actions of another actor group. The operator, for instance, did not feel
comfortable with officially identifying TSP’s ability to manage the project at the
time as one of the operator’s project risks, although this was considered to be one of
its major risks for a short period at that particular project phase. Both in meetings
and in interviews, actors referred to non-representation of this type of risks as
relevant face-saving activity within inter-organizational cooperation, with justifying
statements like “You can’t flash this right in their face” (I-TSP-4), “That would be
very provocative” (I-OP-1), and “We don’t have a tradition for doing it like that” (IOp-1). One operator representative explained the problem of ‘dangerous’ risk
representation in an interview as follows:
The point is that you have to look at in what setting you’re going to use it (risk
map). Where is it going to be used? If you’re showing to a cooperation partner a
risk that the cooperation is bad, then I think what you’re doing is actually helping
the risk become a reality. So, in some respects, I’ve also seen ones where we don't
think the sponsors will approve the project. We will not put that on a risk matrix
that we show to the sponsor, because that will just… “You’re not expecting us to
approve it.” So, I think the risk register will have a certain amount of, let’s say,
political correctness about it, depending on where it’s to be shown. (I-OP-2)
When it comes to other actors external to the inter-organizational project
management, such as contractors who are not exposed to the risk maps, project
members found it, in contrast, unproblematic to name these as risks on the map (IOP-1, I-TSP-1, I-TSP-4).
Furthermore, there was sometimes disagreement over which risks should be placed
in the map. One underlying cause of such disagreement were divergent
understandings about the relevant time horizon to be taken into account when
considering ‘objectives at risk’. While some held the view that risks to long-term
project objectives should be considered, i.e. impacts of the technical upgrade on the
long-term technical functioning, safety etc., others promoted a narrower view on
risks to the objectives of the respective project phase. One of the defined objectives
of a project phase is to move the project into the next phase, i.e. to get approval by
the owner organization. Evidently, ‘objectives at risk’ and consequently the risks to
be considered as most relevant differ with such divergent time perspectives taken.
The following episode exemplifies such divergent understandings.
In a risk meeting of the operator during the Definition phase of the project, a
discussion arose over the HSE risk of working under the condition of limited space
during the plants’ upgrade, which would take place in the Execution phase. Project
23
members had different opinions on 1) whether this risk should be mapped and
addressed already in a stage of the project in which no phase-specific objectives
would be impacted by that risk and 2) how to place this risk if it gets represented
(which colour category should be assigned):
Project member (PM)1: This [risk ‘HSE in limited space in a live plant’] would be
a risk during the operation/execution phase.
PM 2: This risk map should be for the definition phase. What are the procedures
in [the operator] related to this?
PM 3: I have also wondered about that.
PM 4: It is possible to include risks for the whole project period.
PM 3: Our focus must be on this phase.
PM 4: We must assess the criticality of the risks, and this changes through the
different phases.
PM 3: It is not even sure we make it to the 4th [Execution] phase.
PM 2: Shall we mark it as red now?
PM 4: In this phase it is not red.
PM 2: I think we have different philosophies and practices on this. (…) (M-OP11)
The main argument for placing only phase-specific risks on the risk map was that
such a focused picture would allow for concentrating project activities towards the
main objective of this phase which is to proceed to the next phase, whereas the
main argument against this position was that risks and action plans should be
identified as early as possible so as to prevent them from impacting overall project
objectives. As to the colour coding, some argued for categorizing this risk as a red
risk because no risk reducing activities have yet been implemented, while others
argued it should be marked as green, since it was not critical in the current project
phase.
Similar to the example above, in a monthly meeting between TSP and operator, a
representative of TSP explained the incongruence between the TSP’s risk map and
a risk described as ‘major risk’ in TSP’s monthly report to the operator as resulting
from different perspectives on ‘objectives at risk’. The more ‘general’ risks to the
objectives of the respective project phase, typical risks at this stage for different
kinds of projects, would therefore not necessarily translate into the more ‘specific’
risks of this project to be reported in the risk map:
PM 2 (operator): I see you have a major risk here: ‘Late changes in scope’.
PM 3 (operator): Shouldn’t there be coherence between the risk map and what
you describe as major risks? (…) You recently had a risk review, the risk
should have been included then.
PM 5 (TSP): I hold the risk map to be more specific, and the monthly report to be
more general, to be on a higher level. (M-OPTSP-6)
24
Even though project members discussed such inconsistencies and agreed that they
were problematic, there seemed to prevail an understanding that they cannot be
avoided, so that in some meetings the existence of divergent parallel risk
representations was accepted and not further commented upon.
Third, some project members criticized the map’s abstraction also with regard to the
fact that only the ‘top ten’ risks are displayed on the map, while excluding other
risks from sight. One owner representative who expressed concern over the
simplification of commonly used risk management technologies,6 mentioned the
colour coding as being particularly problematic: “You get blinded by the colours”.
He was concerned that colours direct attention to just the red risks, omitting the
other risks which could be or could become more dangerous (I-GL-1).
Overall, the construction and update of risk maps was a non-trivial matter, based on
assumptions of relevant ‘objectives at risk’, time horizons and levels of generality
of risks to be represented. Also, the process was complicated by considering sociopolitical aspects, such as avoidance to openly denounce another actor group as a
‘risk’. In general, there was a tendency to depict the same risks on the map
throughout the course of the project, these tended to converge over several similar
projects and between actor groups, and as the project progressed they tended to
move on the map towards the green zone.
Drawing upon the map: different roles of risk maps in the project
We now turn to the way risk maps are drawn upon in project management practices
by different actors. Interestingly, it is difficult to identify a commonly accepted
purpose and ideal use of risk maps in this context. In regulations and procedures,
the necessity and relevance of identifying, representing and managing risks is
explicated with reference to an “enterprise-wide risk management approach”, so as
“to make sure that our operations are safe, and to reach our corporate goals in
compliance with our requirements” (D-TSP-5). The particular rationale for using
risk maps is presented in governing documents as increasing efficiency in reporting
and decision-making (D-TSP-3, p.4). As apparent already in the previous section,
and as we will further illustrate in this section, risk mapping was not primarily used
6
This interviewee has been working in this industry for many years and perceived current risk
management practices as markedly different from earlier ones.
25
as a tool to spur critical discussion of emerging threats, and was at times even
regarded as impeding attention to relevant risks. Many project members saw risk
mapping in this inter-organizational setting nonetheless as a relevant activity which
should not be discarded. We will describe in the following what ways of drawing
upon risk maps were discernable in the course of the project, revealing types of
perceived usefulness that go beyond the formally espoused aspirations of safety,
goal achievement and efficient reporting.
1) Defensive construction of audit trails
A few project members stated that risk maps were used primarily in order to
comply with regulative requirements. Thus, along with other documentation, risk
mapping insured against potential blame. Such ‘insurance’ activity was seen as
necessary, but problematic as it took away attention and time from what were
considered to be more relevant activities. An engineering manager at the TSP, for
instance, was particularly pronounced in voicing his concern over the inclusion of
perceived unnecessary risk objects in the map. Since regulations recommended to
account for a broad mix of different types of risk objects in risk representation, he
felt that technical risks which he considered as most complex and relevant in the
upgrading project became under-represented in favour of other risk types such as
HSE risks.
We mustn’t have too much attention on things that are not relevant. (…) What we
have mostly discussed in this project actually are problems around noise inside a
work station. There has been too much focus on this, and also on how to bring
equipment into the building. And when you look at the complexity of the
equipment that is being replaced, and all the issues around this, how it is going to
be installed and so on, it is a paradox that so much of the attention is on these
simple things, instead of having a greater focus on what really could delay the
process.
I: What do you think is the reason for this?
The main issue, I think, are all the terms and regulations. When there is so much
of this and a wide range of governing documentation that very few people
understand, the totality of it, this will result in an uncertainty were one would
cover oneself with everything between the earth and the sky (Norwegian
expression), even when it is not relevant. To take a decision and say ‘we don’t
need this’ is difficult. So one keeps on driving on the same track, to cover up all
eventualities. Then the focus on the most precarious things disappears, but
perhaps one should have spent most of the time on these things (…) You have to
document that you have been through it, and if the project goes wrong at some
point, you can go back and see if the related factors have been addressed earlier.
Whether the risk picture helps you to avoid it or not, is another issue. (I-TSP-2)
26
This interviewee clearly puts forward his engineering perspective of which risks
should be focused on relative to others. More importantly, however, he describes
perceived threats and uncertainty posed by guidelines and governing procedures,
leading project members to defensively produce audit trails so as to be able to prove
compliance with procedures in case something goes wrong. He thus perceives
increased concerns with secondary risk management which permeate professional
attention and activities (Power, 2007). Not everyone expressed such concerns,
however, and some stated that whilst such attitudes towards risk representation have
been present in the past, risk mapping has come to be used in less defensive ways in
this context over time (I-OP-2).
2) Prompting a sense of alignment and concerted action
Despite the apparent confusion as to the meaning of mapped risk objects,
representational inertia, and omission of risks, some project members stated that the
map helped to align the perspectives and activities of different project actors with
regard to the most relevant challenges:
I think it helps with alignment of the project with regard to what the challenges
are, absolutely. (…) You need to remind yourself of what you agreed on. It helps
align people on what the challenges are, either within a group or across groups.
(…)
I: What does alignment mean?
Alignment means that you agree, at least, on what the major challenges are. It’s
an agreement on what the main challenges are of the project, what the agenda
should be, and what we should be looking at. (I-OP-2)
Also during meetings, some project members associated risk discussions around the
map explicitly with notions of alignment, for instance when assessing the ‘success’
of inter-organizational meetings, as illustrated in the following conversation at the
end of a risk review meeting:
PM operator: I think this has been a good review, it is a good thing that we are
aligned.
PM TSP: We are well aligned, that’s true. (M-OPTSP-9)
A sense of alignment was thus achieved as different actors co-oriented towards the
map (Taylor and Robichaud, 2004). Not all actors did regard alignment of
viewpoints and activities as desirable, however. Alignment by means of the map
was also seen as problematic in the sense that collective attention could too quickly
converge towards the mapped risk objects, while disregarding other potentially
27
relevant aspects (e.g., M-OP-12). Clearly, all actors saw risk maps as influencing
their project work, not only because time had to be spent to draw the maps, but also
because they were seen to influence collective attention and action. This was
apparent, for instance, when risk maps were used as a means to structure interorganizational meetings, such as review meetings between TSP and the operator. As
one project owner at the operator stated, the top ten risks on the operator’s map are
used as an agenda for meetings with TSP:
I think the way the risk map is used, hopefully, is that it legitimizes which themes
we’re bringing up with the TSP—so our focus would be with the top ten risks. If
we move outside the top ten risks, then you have to ask yourself, “Why are you
asking that question at all?” If it’s relevant, then maybe it should be on the list. If
it’s not relevant, then you shouldn't be asking it.” What is a good way once you
present it? Here's the operator’s view of the risk table. Generally, they will agree
with it. That then legitimizes the subject you take up in the monthly meetings. If
you didn't have that list, it would just be a, “What can we think of today?” type of
approach. (I-OP-2).
In this way, the representation of a particular risk object on the map strongly
impacted whether it got discussed in the meeting or not. As such, attention and time
was dedicated to represented risks, regarded by some in terms of effective
alignment of viewpoints and activities, and by others in terms of problematic
convergence.
3) Making up ‘the project’ and establishing commitment to the project
collaboration
As discussed earlier, risk maps tended to converge between organizations and were
identical for both plants to be upgraded. The use of identical project risk maps for
the two plants was a means to make proclaimed synergy effects from including both
plants in the same project visible. In this way, the risk map was used to legitimize
the way the project was organized, but it also gave ‘the project’ a recognizable
outlook and identity (Taylor and Cooren, 1997; Taylor, 2011). ‘The upgrading
project’ did not only involve distributed actors working at different places
associated to different formal organizational entities, but membership to the project
constantly changed over the project phases, so that only a few actors worked in the
project during all project phases. What exactly ‘the project’ is made of is therefore
not entirely clear, and even the defined scope of the project can change over time.
Arguably, a broad set of artifacts and inscriptions are implicated in making up the
28
project’s identity, such as meeting protocols, time schedules and governing
documents. However, in contrast to long lists of protocols, technical specifications
or cost tables, the risk map gives the project a comprehensive image that can be
understood ‘immediately’, even without knowing on what concrete information the
map is based and which mitigating activities are undertaken by whom at a particular
moment in time. Since risk objects are expected to and tend to move towards the
green zone in the course of the project, the risk map envisions a future of the project
that should become increasingly certain and it is a means of giving a sense of
identity and stability to an otherwise only vaguely defined entity. One interviewee,
for instance, stated that if all project members would be present in all project phases
and places, risk maps would be less relevant. But since different actors, situated at
different places, join the project at different times, it becomes relevant to build up
stable project artifacts such as risk maps:
For the project itself, the risk map is not a be-all and end-all. Each person has a
risk picture in his own head that you base the work on. But for the project and for
other people that come in at a later stage, you need documentation. In that regard
the risk map tool serves a purpose. If everybody would follow the whole project,
the whole period, it is not revolutionary to put some words into a program (I-TSP2)
In a similar vein, project members referred to risk maps often in terms of relevant
proceduralized reporting milestones which give structure to the inter-organizational
work, and allow the project to ‘move forward’ as long as the risk picture remains
tolerable. Risk maps that do not feature red risks thus signal to project members that
the project is ‘alive’, in a ‘healthy state’, and will not come to a halt, since identified
threats are ‘under control’. A TSP project member described the relevance of risk
maps for inter-organizational cooperation in this regard as follows:
It will help their (operator’s) decision process, of course. They can see that we’ve
made a good risk assessment around this project, and that will help them in their
decision process.
I:
In what way?
They increase their confidence. We’re talking about confidence. How confident
are we that we’re going to perform the work within the right time, within the right
budget, without any injuries? (…) Then they can confidently go to their manager
and say, “TSP has done a good job here. We’re confident that we’re going to
come within the budget frame.” Then their management team will go up to the
owners and say, “We’re confident that they’ve done a very good job. They’ve
looked at all the aspects. Of course, things could pop up totally unexpectedly but
we’re confident that they’ve assessed the situation properly, (…) So, they’re
confident that they can go up and say, “We need this amount of money to install
this item.” (…) If we haven't followed the guidelines or haven't followed the
29
documentation exactly, this might pop up and they’ll say, “We’re not confident
with this. I think we need to go back and make a reassessment. We’ve got to
design again. Stop the project. We’re not going to sanction this project. We’re not
going to deliver money.” (I-OP-GS)
Confidence and commitment to the project by different actors in this interorganizational collaboration is thus built by means of delivering standardized
assessments and reports, including the risk map. If the report is not complete, “if we
haven’t followed the documentation exactly”, this would prompt suspicion of owner
representatives and might delay the project’s progress through the ‘decision gate’.
As Kalthoff (2005) in his analysis of credit risk calculations in banks argues,
symbolic machines such as risk calculations and models imply a shift from truth to
‘correctness’. What is assessed by headquarters’ risk analysts (or the owners in our
case), is whether calculations have been performed correctly according to their
internal calculative logic, or in our case: whether regulations have been followed
and the documentation is complete. Delivering the risk map in the expected format,
embedded correctly in the monthly report, thus represents commitment and
confidence of the reporting party, at the same time as it creates confidence in the
receiving party. This works despite actors of all parties are aware that the map does
not show ‘the whole picture’.
4) Managing boundaries and mediating concerns
By being implicated in the discursive construction of the project’s identity, risk
maps also mediate concerns and interests of the different actors in the project. They
act as a forum for negotiating the boundaries of the project, what Kaplan (2011)
calls with regard to PowerPoint ‘cartographic’ efforts to adjudicate interests.
Limitation or expansion of project boundaries is often driven by actors’ interests in
setting a particular topic on the agenda, or positioning it as outside the realm of the
project. To frame an interest or concern in terms of ‘risk to the project’ seemed to
be seen as an opportunity to be heard and to negotiate for resources. As discussed
earlier, there was an ongoing discussion whether project risks and objectives-at-risk
should be defined narrowly for a particular project phase or more broadly in terms
of goals that the project should achieve for the plants after the upgrading has been
installed. Such ambiguity allowed a wide range of concerns to be uttered in the
name of the project. The project risk map was used in this regard as place to start
30
such negotiations. Thus, instead of directly negotiating resources for a particular
activity, actors sought to first place a concern on the map as a new risk object, so as
to legitimately receive resources to mitigate this risk. For instance, during the
feasibility phase, TSP actors in one of the plants sought to include ‘loud noise’ in
the compressor area of the plant as a HSE risk on TSP’s map. This risk should be
mitigated, they claimed, by means of building a silent room which would protect
workers from the noise. In several meetings between TSP and the operator during
the Concept phase, the operator’s project manager argued against the inclusion of
this risk, since he did not regard the noise problem as linked to the upgrading
project, but as a more general problem of plant operations. As his job as a project
manager in the operator is to keep the project small and simple, he sought to define
the project in narrow rather than broad terms. Seeking to prevent further attempts to
expend the boundaries of the project, he set up a new risk object on the operator’s
map, called ‘change in (project) scope’, and ultimately the plant gave up on this
issue and dealt with the noise problem without building a separate room.
Concerns were not only mediated by means of the risk map in terms of attempts to
expand or limit the project’s boundaries, but also by means of seemingly depoliticizing and rationalizing inter-organizational queries and lack of trust. Actors
found it easier to raise concerns over data delivered by another actor group, such as
technical tests or cost forecasts, by means of framing the concern in terms of ‘risk’,
as explained in the following quote:
We have another discussion always going on in a project where TSP has come up
with a forecast that we believe is too low. Instead of being categorical and saying,
“We think you’re too low in costs,” we say, “There’s a risk, and we evaluate the
risk to be higher than you do.” That could be an argument where we use the risk
map to put forward a point of view. The alternative would be to say, “We don't
believe you,” which would be harder. (I-OP-2)
Raising concerns with risk and making these concerns visible on the project risk
map was thus used as a way to focus another party’s attention to a particular issue
so as to implement mitigating actions. However, actors also referred to risk
documentation in order to shield themselves from other parties’ influence. In some
meetings, reference to efficiency of risk mapping and adherence to standards was
made in order to keep another party from ‘intruding’ into one’s sphere. In one
meeting, for instance, a TSP representative argued for the sufficiency of risk
31
reporting and against access of the operator to more detailed information in a
meeting as follows, “The system is like this, we can’t double up everything” (MOPTSP-6). Furthermore, TSP sought to not let the operator “pollute” the TSP’s risk
map “with other concerns outside our field of responsibility (…) to be able to focus
on our own risks” (I-TSP-1). TSP actors were thus anxious that the operator’s
members would use the risk map to place their concerns on TSP’s map, so as to
shift responsibility to TSP.
Overall, risk maps got used in inter-organizational communication as audit trails to
insure against potential blame, but also as a tool that prompts a sense of ‘alignment’
between distributed actors, gives identity to the macro-agent of ‘the project’, and
serves as a platform to negotiate boundaries of the project and mediates different
interests and concerns.
Discussion and conclusion
The case of risk maps applied in an inter-organizational technical upgrading project
illustrates different ways of how these representation devices take shape and are put
to use in the setting of the Norwegian petroleum industry. We focused on risk
mapping as one prevalent and widely institutionalized technology associated with a
broader Enterprise Risk Management discourse (Mikes, 2009; Power, 2007). In the
following, we discuss our case more explicitly in the light of previous research on
ERM practices, linking observed risk map conversations to discursive
characteristics of risk map texts.
Secondary risk management and decoupling
Risk maps can be seen as powerful devices of secondary risk management (Power,
2004, 2007) in that they offer a simple ‘overview’ picture of identified risks that
works more as an evidence that risk management procedures are in place than
giving visibility of the identified risks and associated concrete risk reduction
activities. As a standardized tabular image, it can be integrated in governing
documents and reports, promising comprehensibility, comparability and thus
efficient reporting. Risk maps were implicated in secondary risk management in the
studied upgrading project to the extent that they were drawn upon as auditable tools
allowing to ‘pass decision gates’, and as reference points to ‘insure’ oneself against
potential critique or blame should something go wrong. In line with Power’s (ibid.)
32
analysis, the usefulness of risk maps as audit trails was by some actors contrasted
with practical problems in using them as devices for spotting and discussing early
warning signals. Project members regarded risk maps as problematic in this regard,
since the ten represented risk objects on the map were abstract, vaguely defined and
not always clearly linked to more specific risk registers. That is, actors did not
blindly accept the use of these representations as ‘good’ risk management activity.
Both, producers (i.e., TSP and operators) as well as receivers of this information in
governing positions (i.e., operators and owners), were often aware of the pseudocontrol that the tool provides, as they criticized its abstract and reductionist
character. However, abstraction and incongruence between risk maps and more
specific risk representations did not mean that risk maps were decoupled from all
project activities. On the contrary, they impacted attention and decision-making
heavily in the course of the project. Risk maps thus did not merely get used as
reporting devices and audit trails. They were implicated in setting the agenda and
structuring discussions, particularly within inter-organizational reviews. Risk
objects that were not presented on the map thus got less attention in these meetings.
Secondly, although several actors criticized abstraction, simplicity, path dependence
and pseudo-control involved in the use of risk maps, they were nonetheless
characterized by nearly all project members as important and relevant technology of
project collaboration. Project members thus did not dismiss such reports as ‘just’
bureaucratic activity. Power (2007) explains “continuing co-existence of local
critique and world-level conformity” (ibid.: 195, emphasis in the original) by the
pervasiveness of neo-liberal political discourses of auditability and isomorphic
pressures for reputation management. However, in our case risk maps were heavily
implicated in actual project activities, and project members’ attitude towards risk
maps was ambiguous in that they criticized them at the same time as they regarded
them as valuable tools for project coordination. The powerful position of risk maps
in this context therefore cannot be fully explained by institutional pressures brought
about by both internal and external rules and regulations and the perceived need for
defensive production of audit trails. The different ways of how risk maps got
enacted in the project indicate that risk mapping was not just a matter of compliance
and insurance. Rather, we have argued that risk maps became involved in the
creation of project identity and commitment and were enrolled as a political
instrument of setting boundaries of what gets associated with the project and what
33
gets defined as being situated outside the project’s realms. We therefore draw on
the concept of mediation (Cooren and Taylor, 1997; Miller and O’Leary, 2007;
Wise, 1988) to complement existing explanations of the pervasiveness of ERM
technologies such as risk maps.
Risk maps as mediating figures
Extant studies on intermediaries or ‘mediating instruments’ have shown how
representational devices and ‘texts’ such as technology road maps (Miller and
O’Leary, 2007) and business plans (Doganova and Eyquem-Renault, 2009) mediate
between different actors and between different domains (e.g., science and the
economy), and thereby contribute to the making of macro-agents such as markets
and organizations (Cooren and Taylor, 1997). Such mediation is often based on the
envisionment of a future of a collective, an organization, a project or an industry, by
means of a plan or a model which distributed actors can draw upon in order to
allocate resources and plan local activities related to the delineated future. Although
actors might not fully trust the representational and prognostic qualities of such
devices, they often find them still useful to communicate, and plan and structure
activities in reference to these artifacts. For instance, Young (1995) observed that
psychiatrists increasingly used the DSM-III (Diagnostical and Statistical Manual of
Mental Disorders, 3rd ed.) language to communicate with each other and their
accounting departments, although they frequently didn’t believe in the categories
they were using. In the studied upgrading project, the project risk map acted
similarly as a mediating figure in the sense that distributed actors could refer to the
map as a relatively stable artifact making up the identity of ‘the project’. The risk
map appeared to be a major device for prompting a sense of alignment in the
project, by means of a co-orientation of actors towards the text (Taylor, 2011;
Taylor and Robichaud, 2004), representing and at the same time furthering
commitment to the joint project. Similar to Young’s (1995) observation, this was
less due to a ‘blind’ belief in the trustworthiness and completeness of the reported
information. Rather, the map allows the project to jointly go ahead, as it offers a
point of common identification. Even though the represented risks can threaten the
project which suggests a negative connotation, their appearance on the map seems
to be positively connoted, as they are under managerial investigation, conveying
confidence that something is done about them. Identification with the project by
34
means of the risk map is also achieved by the expected and often performed
movement of the risks in the course of the projects towards the green and amber
zones of normality and acceptability. The risk map, therefore, envisions a future
that gets more and more certain as the project goes ahead and thereby enrolls
different actors to the project. Its twin prognostic and evaluative connotations
further not only the envisionment of the project’s future, but also a sense of
common achievement. Such positive connotation, we argue, works even though
actors are partly aware of the representational limitations and ‘risks’ of the map. It
is discursively enhanced by flexible zones of normality that enable actors to
conduct normalizing activities, deciding on what is inside and outside of the map
and adjusting borders between tolerable and intolerable risks, themselves (Link,
1996) so as to allow the project to progress. In addition, the map invites
identification with the project as well in that it symbolizes efficiency. In our case,
the use of the same map for different plants and the attempt to use the same map
across different projects within the ‘project portfolio’ made ‘synergies’ visible that
could hardly be operationalized otherwise. Simplifications that were regarded from
one point of view as problematic, were thus from another point of view useful in
order to enact a rhetoric of synergy and efficiency. Furthermore, risk maps were
drawn upon in the project as mediating devices to manage boundaries of the project
and between involved actor groups. Such boundaries concerned areas of attention,
responsibility and resource allocation and the risk map offered a platform for their
negotiation. The map is well suited for such boundary work, as its dimensions of
probability and impact are generic enough to incorporate diverse types of content
and concerns. Along with such openness to include a wide range of risk objects, its
twin prognostic and evaluative connotation more generally invite different areas of
expertise to be associated to the map, such as risk management, project
coordination and performance evaluation.
To be sure, risk maps might work in other contexts in different ways than those we
have observed in this project. It is, we believe, the combination of a regulative
context that furthers the use of commonly accepted risk representation technology
within the broader context of discourses of auditability and responsibilization
(Power, 2007), and the particular setting of temporal, inter-organizational project
collaborations, that constitutes an arena in which technologies such as risk maps get
35
enrolled as mediating devices between different actors and concerns in the creation
of a collective identity of the joint project.
In conclusion, our analysis shows that overview risk representation technologies
such as risk maps which are commonly used as ERM technology can come to be
seen as ‘useful’ in other ways than as tools for increasing collective mindfulness
towards early warning signals or for ritualistic purposes of secondary risk
management (Mikes, 2009; 2011; Power, 2007). While defensive production of
audit trails was present in our case, the risk map got enrolled as well in the creation
of the project’s identity (Taylor, 2011) and as a platform for mediating concerns
between different actors groups in an inter-organizational setting. As such, we have
shown how the governance of risk is related to mediating technologies. Risk maps
can work as powerful mediating instruments in inter-organizational practices, at the
same time as they are ‘risky’ tools when it comes to creation of mindful awareness
and scrutiny. More research is required to better understand these and similar
tensions in the use of risk maps and associated tools such as risk registers and risk
indicators in different contexts. Often, risk maps appear in the form of ‘riskopportunity’ maps. To map opportunities along with risks is in line with the logic of
enterprise risk management and with the logic of progress outlined in this paper. As
yet, we do not know what particular challenges are linked to ‘opportunity-risk’
management and how the inclusion of ‘opportunities’ affects the constitution of risk
objects and risk management practices.
We have highlighted in this paper some discursive characteristics of risk maps and
discussed their link to different types of observed uses of these maps. For a better
understanding of the historical and institutional grounding of these characteristics, it
would be fruitful to investigate the origins of risk mapping and trace how risk maps
came to be institutionalised as an ERM technology. Finally, future research on
ERM technologies and practices could focus more on the use of such practices in
networks of organizations rather than discrete organizational entities. In this paper,
we have only begun to look at some specifics of inter-organizational coordination
by means of ERM technologies. More research is needed to understand how risk
representation and other technologies of inter-organizational coordination interact
and what effects their uses entail.
36
37
References
Arena, M., Arnaboldi, M., Azzone, G., 2010. The organizational dynamics of
Enterprise Risk Management. Accounting, Organizations and Society. 35,
659-675..
Beck, U., 1992. Risk society: Towards a new modernity, Thousand Oaks, CA:
Sage.
Beunza, D., Garud, R., 2007. Calculators, lemmings or frame-makers? The
intermediary role of securities analysts, in Callon, M., Millo, Y., & Muniesa,
F. (Eds.), Market Devices, Oxford: Blackwell, pp.13-39.
Bowker, G.C., Star, S.L., 2000. Invisible Mediators of Action: Classification and
the Ubiquity of Standards. Mind, Culture, and Activity. 7(1&2), 147-163.
Bourrier, M., 2005. An interview with Karlene Roberts. European Management
Journal. 23(1), 93-97.
Bragd, A., Christensen, D., Czarniawska, B., Tullberg, M., 2008. Discourse as the
means of community creation. Scandinavian Journal of Management. 24,
188-208.
Braut, G.S., Lindoe, P.H. 2010. Risk Regulation in the North Sea. A Common Law
Perspective on Norwegian Legislation. Safety Science Monitor. 14(1), 1-9.
Callon, M., 1986. Some elements of a sociology of translation: domestication of the
Scallops and Fishermen of St. Brieuc Bay. In: J. Law (Ed.), Power, Action
and Belief: A New Sociology of Knowledge?, London: Routledge, pp. 196223..
Callon, M., 1991. Techno-economic networks and irreversibility. In J. Law (Ed.), A
sociology of monsters: Essays on power, technology and domination.
London: Routledge.
Callon, M., 1998. Introduction: the embeddedness of economic markets in
economics. In: Callon, M. (Ed.), Laws of the Market, Oxford: Blackwell.
pp. 1-57.
Callon, M., Millo, Y., Muniesa, F., 2007. Market Devices. Oxford: Blackwell.
Cooren, F., 2004. Textual Agency: How Texts Do Things in Organizational
Settings. Organization. 11(3), 373-393.
Cooren, F., Kuhn, T., Cornelissen, J.P., Clark, T., 2011. Communication,
Organizing and Organization: An Overview and Introduction to the Special
Issue. Organization Studies, 32(9), 1149-1170.
Cooren, F., Taylor, J.R., 1997. Organization as an Effect of Mediation: Redefining
the Link Between Organization and Communication. Communication
Theory. 7(3), 219-260.
Czarniawska, B., 2007. Shadowing and other techniques for doing field research in
modern societies, Copenhagen Business School Press.
Doganova, L., Eyquem-Renault, M., 2009. What do business models do?
Innovation devices in technology entrepreneurship. Research Policy, 38,
1559-1570.
Douglas, M., 1985. Risk acceptability according to the social sciences, New York:
Russel Sage Foundation.
Douglas, M., 1992. Risk and blame: Essays in cultural theory, London: Routlege.
Espeland, W.N., & Stevens, M.L., 1998. Commensuration as a social process.
Annual Review of Sociology. 24, 313-343.
38
Ezzamel, M., Lilley, S., Willmott, H., 2004. Accounting representation and the road
to commercial salvation. Accounting, Organizations & Society. 29, 783813.
Gephart, R. P., Van Maanen, J., Oberlechner, T., 2009. Organizations and Risk in
Late Modernity. Organization Studies. 30(02&03), 141-155.
Gibson, J.J., 1979. The Ecological Approach to Visual Perception. Bosten, MA:
Houghton Mifflin.
Giddens, A., 1991. Modernity and self-identity. Cambridge: Polity Press.
Hardy, C., Lawrence, T.B., Grant, D., 2005. Discourse and Collaboration: The Role
of Conversations and Collective Identity. Academy of Management Review.
30(1), 58-77.
Hopwood, A., 1992. Accounting calculation and the shifting sphere of the
economic. European Accounting Review. 1(1), 125-143.
Kalthoff, H., 2005. Practices of Calculation. Economic Representations and Risk
Management. Theory, Culture & Society. 22(2), 69-97.
Kaplan, S., 2011. Strategy and PowerPoint: An Inquiry into the Epistemic Culture
and Machinery of Strategy Making. Organization Science. 22(2), 320-346.
Kurunmäki, L., Miller, P., 2011. Regulatory hybrids: Partnerships, budgeting and
modernising government. Management Accounting Research. 22, 220-241.
Latour, B., 1987. Science in Action: How to Follow Scientists and Engineers
Through Society. Boston. Harvard University Press.
Latour, B., 1994. On technical mediation-Philosophy, sociology, genealogy.
Common Knowledge. 3(2), 29-64.
Latour, B., 1996. On Interobjectivity. Mind, Culture, and Activity. 3(4), 228-245.
Latour, B., 2005. Reassembling the social. Oxford: Oxford University Press.
Law, J., 1986. On the methods of long distance control: Vessels, navigation and the
Portugese route to India. In J. Law (Ed.) Power, action and belief: A new
sociology of knowledge? Sociological review monograph. (Vol. 32, pp. 234263). London: Routledge & Kegan Paul.
Link, J., 1996. Versuch über den Normalismus. Wie Normalität produziert wird.
Göttingen: Vandenhoeck & Ruprecht.
Lupton, D., 1999. Risk. London: Routledge.
MacKenzie, D., Millo, Y., 2003. Constructing a market, performing theory: the
historical sociology of a financial derivatives exchange. American Journal
of Sociology. 109(1), 107-145.
Mikes, A., 2009. Risk management and calculative cultures. Management
Accounting Research, 20(1), 18-40.
Mikes, A., 2011. From counting risk to making risk count: Boundary-work in risk
management. Accounting, Organizations and Society. in press.
Miller, P., O’Leary, T., 1987. Accounting and the construction of the governable
person. Accounting, Organizations & Society. 12(3), 235-265.
Miller, P., O’Leary, T., 2007. Mediating instruments and making markets: capital
budgeting, science and the economy. Accounting, Organizations & Society.
32(7/8), 701-734.
Miller, P., Kurunmäki, L., O’Leary, T., 2008. Accounting, hybrids and the
management of risk. Accounting, Organizations and Society. 33(7-8), 942967.
Miller, P., Rose, N., 1990. Governing economic life. Economy and Society. 19(1),
1-30.
39
Miller, P., Rose, N., 1992. Political power beyond the state: Problematics of
government. British Journal of Sociology. 23, 173-205.
Muniesa, F., Millo, Y., Callon, M., 2007. An introduction to market devices. In:
Muniesa, F., Millo, Y., & Callon, M. (Eds.), Market Devices Oxford:
Blackwell Publishing. (pp.1-12).
Orlikowski, W. J., 2000. Using Technology and Constituting Structures: A Practice
Lens for Studying Technology in Organizations. Organization Science,
11(4), 404-428.
Petroleum Safety Authority Norway: From prescription to performance in
petroleum
supervision
(published
12.03.2010),
derived
from
http://www.ptil.no/news/from-prescription-to-performance-in-petroleumsupervision-article6696-79.html, accessed on 15.12 2010)
Power, M., 2004. The Risk Management of Everything. Rethinking the politics of
uncertainty. London: Demos.
Power, M., 2007. Organized uncertainty: designing a world of risk management.
Oxford: Oxford University Press.
Power, M., 2009. The risk management of nothing. Accounting, Organizations and
Society. 34(6/7), 849-855.
Power, M., Scheytt, T., Soin, K., Sahlin, K. 2009. Reputational Risk as a Logic of
Organizing in Late Modernity. Organization Studies. 30(02&03), 301-324.
Quattrone, P., 2009. Books to be practiced: Memory, the power of the visual, and
the success of accounting. Accounting, Organization & Society. 34, 85-118.
Qu, S.Q., Cooper, D.J., 2011. The role of inscriptions in producing a balanced
scorecard. Accounting, Organizations & Society. 36, 344-362.
Renn, O., 2008. Risk Governance. Coping with Uncertainty in a Complex World.
London: Earthscan.
Robson, K., 1992. Accounting numbers as „Inscription“: Action at a distance and
the development of accounting. Accounting, Organization & Society. 17(7),
685-708.
Schneider, B., 2005. Diagramme und bildtextile Ordnungen. In B. Schneider (Eds.),
Bilderwelten des Wissens. Kunsthistorisches Jahrbuch für Bildkritik. Berlin:
Akademie-Verlag. Volume 3,1. pp. 9-19
Stark, D., Paravel, V., 2008. PowerPoint in public: digital technologies and the new
morphology of demonstration. Theory, Culture & Society. 25(5), 30-55.
Taylor, J.R., 2011. Organization as an (Imbricated) Configuring of Transactions.
Organization Studies. 32(9), 1149-1170.
Taylor, J.R., Cooren, F., 1997. What makes communication ’organizational’? How
the many voices of a collectivity become the one voice of an organization.
Journal of Pragmatics. 27, 409-438.
Taylor, J.R., Robichaud, D., 2004. Finding the Organization in the Communication:
Discourse as Action and Sensemaking. Organization. 11(3), 395-413.
Turner, B, Pigeon, N., 1997. Man-Made Disasters (second edition). London:
Butterworth-Heinemann.
Vlaar, P.W.L., Van den Bosch, F.A.J., Voberda, H.W., 2006. Coping with Problems
of Understanding in Interorganizational Relationships: Using Formalization
as a Means to Make Sense. Organization Studies. 27(11), 1617-1638.
Weick, K. E., 1987. Organizational Culture as a Source of High Reliability.
California Management Review. 29(2), 112-127.
Weick, K. E., & Sutcliffe, K., 2001. Managing the Unexpected. Assuring High
Performance in an Age of Complexity. San Francisco: Jossey-Bass.
40
Weick, K. E., Sutcliffe, K., Obstfeld, D., 1999. Organizing for high reliability:
Processes of collective mindfulness. Research in Organizational Behavior.
21, 81-123.
Wise, M.N., 1988. Mediating machines. Science in Context. 2(1), 77-113.
Woods, M., 2009. A contingency theory perspective on the risk management
control system within Birmingham City Council. Management Accounting
Research. 20(1), 69-81.
Yakura, E.K., 2002. Charting Time: Timelines as Temporal Boundary Objects.
Academy of Management Journal. 45(5), 956-970.
Young, A., 1995. The harmony of illusions: Inventing post-traumatic stress
disorder. Princeton, NJ: Princeton University Press.
41
Appendices
Appendix A: Impact categories for different risk objects on a ‘Consequence
Matrix’ (TSP intranet, D-TSP-PIMS-1)
42
Download