Share determination of stakeholder delays, based on targeted delay analysis of projects, with incursive and defensive (In-De) approach

Autor: Abbas Sheikh Aboumasoudi, Vahid Rooholelm
Rok vydání: 2020
Předmět:
Zdroj: International Journal of Managing Projects in Business. 13:1219-1261
ISSN: 1753-8378
DOI: 10.1108/ijmpb-08-2019-0196
Popis: PurposeAlmost all projects in the world are delayed, and sometimes even lead to the full bankruptcy of their beneficiaries. These delays can be calculated using techniques, but most importantly, there must be a fair and realistic division of delays between project beneficiaries. The most valid delay calculation techniques belong to the SCL Global Protocol, but they also have significant drawbacks, such as these: (1) They do not have the capability to prevent project delays (Delay Risk Management); (2) The protocol identifies and introduces any delays in activities with a ratio of one to one as a delay (Effective Delay); (3) It also does not offer the capability to share delays between stakeholders, which is a huge weakness. Floating in the base schedule activities is one of the cost control tools of projects, but it can hide project delays. In this paper, the researchers believe that the floating ownership belongs to the project and not belong to the stakeholders. This is the main tool for analyzing and sharing delays in this research.Design/methodology/approachThe research methodology adopted included an extensive literature review, expert interviews, use of questionnaire and designing three innovative linked together models by researchers.FindingsIn this research, an integrated technique is introduced which has the following capabilities; delay risk control, result-based delay analysis and stakeholders delay sharing. This technique with an incursive and defensive approach implements claims management principles and calculates, respectively, non-attributable and attributable delays for each beneficiary.Originality/valueThis creativity led to the introduction of the Incursive and Defensive (In-De) technique; in the SCL protocol techniques, none of these capabilities exist.
Databáze: OpenAIRE