Next Article in Journal
Numerical Study on the Flexural Performance of Fully Bolted Joint for Panelized Steel Modular Structure
Previous Article in Journal
Effect of Fiber Type and Content on the Mechanical Properties of High-Performance Concrete Under Different Saturation Levels
Previous Article in Special Issue
Factors Influencing the Safety Enhancement and Cost Reduction in Site Layouts of Construction Projects
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Contextual Evaluation of Risk Identification Techniques for Construction Projects: Comparative Insights and a Decision-Support Model

Department of Civil Engineering, Bursa Technical University, Bursa 16310, Turkey
Buildings 2025, 15(20), 3806; https://doi.org/10.3390/buildings15203806
Submission received: 9 September 2025 / Revised: 15 October 2025 / Accepted: 17 October 2025 / Published: 21 October 2025

Abstract

Risk identification is a foundational process in construction project management, yet the selection of appropriate identification techniques often lacks empirical guidance. To address this gap, this study adopts a case study design and conducts a comparative evaluation of four established but underutilized methods—Delphi, Nominal Group Technique (NGT), Hazard and Operability Study (HAZOP), and Preliminary Hazard Analysis (PHA)—within the context of a large-scale infrastructure project in Türkiye. The Delphi panel consisted of five senior experts. The NGT session involved six site-level practitioners, and the HAZOP team was composed of four multidisciplinary professionals. Two project-level managers conducted the PHA. Each technique was assessed against seven evaluative criteria: methodological structure, stakeholder engagement, analytical depth, resource intensity, flexibility, decision-support value, and contextual fit. The findings reveal that HAZOP achieved the highest analytical depth and decision-support capacity, while NGT demonstrated the strongest stakeholder engagement and contextual adaptability. Delphi provided robust systemic insights but required substantial time and expert availability, whereas PHA offered rapid screening capacity with limited depth. Drawing on these findings, the study proposes a Contextual Decision Support Model that helps practitioners select the most suitable technique based on project complexity, available resources, and stakeholder conditions. This practical framework enables construction professionals to balance methodological rigor with contextual feasibility, ensuring that risk identification processes are both systematic and adaptable to real-world constraints. Beyond its methodological contribution, the study advances risk management in construction by providing a structured and transparent decision-support approach that bridges academic rigor with on-site practice. By aligning method selection with project-specific attributes and stakeholder dynamics, the model strengthens the integration of analytical precision and practical decision-making across the project lifecycle, thereby contributing to more proactive, evidence-based, and resilient risk management in construction projects.

1. Introduction

Construction projects are inherently exposed to multiple categories of risk. Financial risks—including cost overruns and cash-flow interruptions—have been widely observed in large infrastructure projects [1,2]. Safety and health risks, such as occupational accidents and hazardous exposures, remain persistent challenges [3,4]. Additionally, operational and project management risks, including delays, scope changes, and poor coordination, further exacerbate uncertainty [5]. Collectively, these risk categories underscore the crucial importance of systematic risk management in the construction industry. To mitigate such risks, systematic identification is essential, as it forms the foundation of any practical risk management framework.
According to the Construction Market Report [6] published by Research and Markets, the global construction industry is expected to reach a market value of approximately USD 17.04 trillion by 2025, driven by ongoing urbanization, infrastructure investments, and technological advancements in construction practices. This unprecedented size is primarily attributed to the increasing global demand for infrastructure development [7]. Nevertheless, large-scale infrastructure projects are frequently characterized by substantial technical complexity and financial volatility, rendering them particularly susceptible to diverse categories of risk. In this context, the strategic role of risk management has become increasingly pivotal in safeguarding project outcomes [8]. Absent a well-structured and systematically implemented risk management framework, fundamental project performance parameters—such as cost, time, and quality—remain vulnerable to disruption [9]. An overlooked or inaccurately assessed risk, for instance, may lead to significant cost overruns, ultimately transforming a potentially profitable investment into a financially unsustainable endeavor [10]. These multifaceted risks not only challenge individual projects but also shape the trajectory of the global construction sector, where unprecedented growth amplifies both opportunities and vulnerabilities.
Moreover, construction projects are inherently heterogeneous, distinguished by varying objectives, durations, contractual conditions, and financial constraints [11]. This intrinsic diversity implies that risk factors are neither uniform nor universally predictable across projects. Accordingly, risk management is increasingly acknowledged as an indispensable managerial function to ensure project alignment with predefined targets [12]. However, despite growing awareness of potential risks and their consequences among industry professionals, a substantial proportion of construction organizations continue to adopt fragmented or superficial risk management practices [13]. In many cases, risk management is perceived not as a value-adding strategic activity, but rather as a procedural burden that compromises time efficiency [14]. Against this backdrop, establishing a proactive, adaptive, and context-sensitive risk management system is essential for enabling successful project delivery under conditions of uncertainty.
Despite the increasing availability of risk management frameworks and international guidelines, their practical implementation within the construction industry—particularly in developing economies—remains inconsistent [15]. One of the primary barriers to institutionalizing risk management practices is the inadequate comprehension of the foundational stage: risk identification [16]. As the initial and arguably most critical phase of the risk management cycle, risk identification establishes the informational baseline upon which all subsequent analysis and decision-making depend [17]. Failure to accurately and comprehensively identify risks not only impairs the quality of risk assessment and response planning but also fosters a false sense of project control [10]. In this regard, the selection and application of appropriate risk identification techniques—tailored to the project’s complexity, scale, and stakeholder structure—are crucial.
Numerous techniques have been developed to facilitate systematic risk identification, ranging from conventional tools such as checklists and brainstorming sessions to more structured, expert-driven methodologies like the Delphi Method, NGT, HAZOP, and PHA [16]. While each technique offers distinct advantages, their practical utility varies significantly depending on project-specific factors such as organizational maturity, resource availability, stakeholder dynamics, and technical uncertainty [18]. Despite their potential, such methods are often underutilized due to a lack of methodological awareness, limited training opportunities, and cultural resistance to structured decision-making processes [19]. Prior studies consistently note that structured techniques remain underutilized in construction practice, mainly due to limited methodological awareness, lack of training, and cultural resistance to formalized procedures [4,5,20]. For instance, Hwang et al. [5] found that Singaporean contractors often perceived formal risk identification tools as time-consuming. Moreover, Zou et al. [4] highlighted similar patterns of low adoption in Chinese construction projects. Consequently, there is a pressing need to critically evaluate and compare the performance of these techniques across different project contexts to support evidence-based tool selection in risk-sensitive environments, such as construction. Based on the literature, three main research gaps can be identified:
  • Few comparative implementations of Delphi, NGT, HAZOP, and PHA in construction projects, particularly in developing contexts.
  • Limited investigation of contextual determinants, such as project type, institutional maturity, and stakeholder dynamics.
  • Lack of operational selection tools that can guide practitioners in choosing the most appropriate risk identification technique.
These gaps underscore the need for a more thorough examination of existing risk identification techniques and their contextual applicability in construction projects.
Recognizing the pivotal role of systematic risk identification in safeguarding project outcomes—particularly in construction projects characterized by high uncertainty and institutional complexity—this study conducts a structured comparative assessment of four established techniques: Delphi, NGT, HAZOP, and PHA. Their empirical application within the context of a large-scale water treatment infrastructure project in Türkiye generates multiple analytical outputs, including benchmarking of methodological structures, strengths, and constraints; development of a contextual decision tree to support method selection; mapping of strengths and limitations against evaluative criteria; and visual representations such as radar charts and heatmaps to highlight relative performance and convergence patterns. Building on these results, the study pursues three objectives: (i) to evaluate the techniques across seven methodological and contextual criteria, (ii) to analyze the influence of project-specific factors on their applicability, and (iii) to develop a decision-support model to guide practitioners in method selection.
The remainder of this paper is organized as follows. Section 2 reviews the theoretical background and existing scholarship on construction risk management and risk identification techniques, outlining the key methodological families and emphasizing the gaps that this study seeks to address. Section 3 describes the research design and methodology, including the development of the multi-criteria evaluation framework, the systematic literature review process, and the case study protocol for applying the four structured techniques—Delphi, Nominal Group Technique (NGT), Hazard and Operability Study (HAZOP), and Preliminary Hazard Analysis (PHA). Section 4 presents the empirical results derived from the case study, summarizing the identified risks, their overlaps, and categorical distributions across contextual and occupational dimensions. Section 5 discusses the findings in depth, benchmarking them against regulatory data and prior studies, and comparatively evaluating the techniques along seven analytical criteria to reveal their contextual suitability and operational trade-offs. Building on these findings, Section 5.10 introduces the Contextual Decision-Support Model, which synthesizes comparative insights into a practical framework for selecting appropriate risk identification methods under varying project conditions. Section 6 summarizes the paper, discussing key implications, identifying limitations, and suggesting directions for future research. Finally, Section 7 elaborates the study’s contributions through three perspectives: theoretical (Section 7.1), methodological (Section 7.2), and practical (Section 7.3), highlighting how the research advances both academic understanding and professional practice.

2. Background

2.1. Risk Management in Construction Projects

A well-established risk management process typically consists of four sequential stages: risk identification, risk analysis, risk response planning, and risk monitoring and control [21]. Among these stages, risk identification serves as the cornerstone of the entire process, as it determines the breadth and quality of subsequent analyses and responses. Failure to identify risks adequately—either due to methodological limitations or organizational negligence—can compromise the effectiveness of the entire risk management framework, potentially leading to project delays, budget overruns, quality deficiencies, or reputational damage [22,23].
Despite the increasing global emphasis on formalized risk management frameworks, the level of adoption and institutionalization within the construction industry remains limited. Several empirical studies have highlighted that many construction firms either lack structured risk management protocols or apply them in a reactive and fragmented manner [24]. In many cases, risk management is perceived merely as a documentation or compliance requirement rather than a strategic management process. This perception is linked to the absence of in-house expertise, resource constraints, and the limited diffusion of risk-oriented organizational culture. Furthermore, the initial stage of risk identification is frequently overlooked or executed superficially, leading to incomplete risk registers that fail to reflect project-specific vulnerabilities [25]. Therefore, the selection and application of appropriate risk identification techniques remain a pivotal challenge in practice and a central concern of this study.

2.2. Classification of Risk Identification Techniques

To ensure comprehensive identification of potential threats and opportunities, various risk identification techniques have been developed in the literature, ranging from informal approaches to highly structured analytical methods. These techniques can be broadly classified into three main categories: conventional heuristic methods, group-based consensus techniques, and system-based analytical approaches [26,27].
  • Conventional heuristic methods, such as checklists and brainstorming, are among the most frequently used tools in construction projects due to their ease of implementation and low resource requirements [27].
  • The second category, group-based consensus techniques, includes structured expert judgment approaches such as the Delphi Method and the NGT. These methods aim to overcome the limitations of conventional tools by promoting systematic feedback, minimizing social bias, and enhancing group decision-making through iterative or structured procedures [28].
  • The third category encompasses system-based analytical approaches, notably HAZOP and PHA. Originating from the chemical and process industries, these methods have been adapted for use in construction and infrastructure projects where technical complexity and safety concerns are prominent [29].

2.3. Risk Identification Methods

The Delphi Method is an iterative expert-elicitation process involving multiple rounds of anonymized questionnaires with controlled feedback [11]. In construction, it is beneficial where uncertainty is high and empirical data is scarce—such as in early-stage, large-scale, or innovative projects [30]. The method facilitates the identification of latent risks by allowing experts to refine their views after each feedback cycle. In practice, successful application requires well-structured questionnaires and the careful selection of domain-specific experts [31,32].
The NGT is a face-to-face, stepwise process that ensures equal participation through silent idea generation, round-robin sharing, clarification, and voting [33]. In construction projects involving multiple stakeholders—such as contractors, consultants, and clients—NGT allows rapid identification and prioritization of risks in a workshop setting [28]. It is most effective in small groups, where facilitator skill ensures balanced contributions and minimizes dominance bias [34].
HAZOP employs predefined guidewords to examine potential deviations from intended system functions [29]. In construction, it is primarily applied to technically complex projects (e.g., petrochemical facilities, tunneling, healthcare infrastructure) during the detailed design or pre-construction stages. It requires comprehensive design documentation and a multidisciplinary team to explore design and operational risks systematically [35]. Despite its analytical robustness, HAZOP is often underutilized in general construction practice due to its intensive resource requirements and the need for specialized technical knowledge.
PHA is a front-end screening method that identifies significant hazards early in the project lifecycle, using limited available data [10]. In construction, PHA is applied during conceptual design or feasibility phases to flag broad risk categories—such as safety, environmental, and operational hazards—before committing to detailed engineering [36]. It serves as a preparatory stage for more resource-intensive methods, such as HAZOP.

2.4. Research Gap

A broad spectrum of risk identification techniques is available to construction professionals, each characterized by distinct advantages contingent upon project complexity, resource availability, and stakeholder composition. Conventional methods, such as checklists and brainstorming, remain widely adopted due to their operational simplicity and ease of use. In contrast, more structured approaches—including the Delphi Method, NGT, HAZOP, and PHA—offer enhanced analytical rigor and systematicity. Despite the extensive documentation of the theoretical bases and procedural frameworks of these methods, comparative investigations exploring their practical applicability across various construction project typologies, particularly within developing country contexts, are still limited. A concise comparison of prior applications of Delphi, NGT, HAZOP, and PHA in construction projects is provided in Table 1 to clarify the novelty of the present study.
Existing scholarship has predominantly emphasized single-method applications or has been restricted to narrow domains such as occupational safety or process engineering, often neglecting the multifaceted nature of real-world construction environments. The integrated deployment and comparative evaluation of these techniques within multidisciplinary risk identification processes thus represents an underexplored research frontier. Furthermore, prior studies seldom examine the influence of contextual determinants—such as project type, institutional maturity, and stakeholder dynamics—on the operational feasibility and effectiveness of each method. This study seeks to address these gaps through a structured comparative analysis of the Delphi Method, NGT, HAZOP, and PHA, situated within a large-scale infrastructure initiative: a water treatment facility in Türkiye. By grounding the evaluation in an actual project setting, the research not only synthesizes the methodological strengths, limitations, and contextual appropriateness of each technique but also generates empirically informed insights to guide method selection in complex and resource-constrained construction environments.

3. Materials and Methods

The methodology adopted in this study is structured around three interrelated components:
(1)
literature-driven development of evaluation criteria,
(2)
empirical data collection and synthesis through multiple structured techniques, and
(3)
comparative analysis and contextual model development (Figure 1).
Each component was carefully designed to ensure methodological rigor, transparency, and contextual relevance, particularly for construction environments characterized by heterogeneous project typologies and varying levels of institutional maturity in risk management.
Given the inherent complexity and uncertainty of construction projects—especially in emerging economies such as Türkiye—the study employed a multi-criteria analytical framework to evaluate the structural characteristics, operational requirements, and decision-support capacities of four widely applied risk identification techniques: Delphi, NGT, HAZOP, and PHA.
To establish a theoretical foundation, a comprehensive systematic literature review was first conducted to derive a set of evaluation criteria aligned with international risk management standards. These criteria captured seven analytical dimensions: methodological structure, stakeholder participation, analytical depth, resource intensity, flexibility and adaptability, decision-support capacity, and contextual fit.
Subsequently, empirical data were collected through the real-world application of the four techniques within a large-scale infrastructure project involving the design and construction of a drinking water treatment facility. Each method generated distinct sets of artifacts—Delphi produced R1/R2 survey responses and consensus statistics; NGT generated idea sheets, voting forms, and ranking tables; HAZOP yielded deviation logs and node–guideword worksheets; and PHA provided checklist-based hazard identification tables and risk matrices. All method-specific outputs were coded, consolidated, and integrated with the finalized evaluation criteria to form a unified comparative dataset, thereby ensuring a transparent data pathway from raw collection to criteria-based comparison.
In the final phase, these integrated data were comparatively analyzed across established criteria, leading to the identification of the strengths, limitations, and contextual suitability of each technique. The findings were illustrated using radar and heat-map visualizations and consolidated into a contextual decision-support framework that assists practitioners in determining the most suitable risk identification method based on project-specific factors such as uncertainty, technical complexity, resource constraints, and stakeholder interactions.

3.1. Research Design

Methodologically, the research is grounded in an interpretivist epistemological stance, which acknowledges the context-dependent, socially constructed, and experience-based nature of risk identification in construction projects [37,38]. Accordingly, the study does not aim to determine a universally superior technique but rather to understand the contextual appropriateness and operational alignment of each method within varying project environments, stakeholder compositions, and institutional capacities.

3.2. Literature-Driven Framework Development

This first component establishes the evaluation criteria that will later be integrated with empirical outputs from four structured techniques (Delphi, NGT, HAZOP, PHA) in Component 2 (see Figure 1).

3.2.1. Data Collection and Source Selection for Criteria Determination

A secondary data synthesis approach is employed, leveraging insights from peer-reviewed journal articles, books, industry reports, methodological handbooks, and empirical case studies published between 1995 and 2025. Following the PRISMA guidelines, the study selection process was carried out through a systematic, multi-stage procedure, ensuring the rigorous identification, screening, and inclusion of studies for the final synthesis.
In the first stage, keywords based on prior reviews, domain-specific handbooks, and authoritative frameworks, including ISO 31000 [20], the PMBOK Guide [21] (Project Management Body of Knowledge), and the APM Body of Knowledge (BoK) [39] were selected to ensure a strategic literature search process as the following: (“Delphi method” OR “Delphi technique” OR “Nominal Group Technique” OR NGT OR HAZOP OR “Hazard and Operability Study” OR “Preliminary Hazard Analysis” OR PHA) AND (“Risk Identification” OR “Hazard Identification” OR “Project Management”) AND (“Civil Engineering” OR “Construction Management” OR “Construction Process”). To ensure comprehensive coverage, the search was conducted in two types of sources: (i) peer-reviewed journal databases (Scopus, Web of Science Core Collection, ScienceDirect, and Google Scholar), and (ii) academic books and edited volumes dealing with construction risk management. This two-tiered approach ensured that the review encompassed both scholarly publications and foundational textbook knowledge on risk identification in the construction industry.
In the second stage, a set of inclusion and exclusion criteria was carefully established to guide the systematic screening and ensure methodological rigor. These criteria were designed to enhance transparency, minimize subjectivity in decision-making, and ensure that the final pool of studies is directly relevant to the review’s objectives. The inclusion and exclusion thresholds were determined based on established practices in systematic review protocols and tailored to the specific scope of this research. The exclusion and inclusion criteria are represented in Table 2.
In accordance with the PRISMA guidelines, a multi-stage procedure was followed to identify, screen, and select the studies included in this review. First, relevant articles and books were identified through systematic searches across multiple academic databases using predefined keywords. A total of 2565 records were initially retrieved from electronic databases. Second, duplicate records retrieved from different databases were removed, resulting in a comprehensive initial dataset, and 1136 records were captured. In the next stage, the titles and abstracts of all remaining studies were carefully examined to exclude those that were clearly irrelevant to the research scope. This step yielded a refined set of 38 candidate studies. Subsequently, the full texts of all articles in this candidate list were read in detail. Based on the pre-established eligibility criteria, 17 core references were ultimately selected to define the requirements. This structured approach ensured transparency, replicability, and alignment with the PRISMA framework, moving systematically from identification to screening, eligibility assessment, and final inclusion. The review process was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines [40]. The detailed screening procedure is presented in Figure 2.

3.2.2. Development of Evaluation Framework

The construction and operationalization of the multi-criteria evaluation framework is presented, which is used to compare the selected risk identification techniques. To ensure methodological rigor and clarity, the framework is structured around three subcomponents: (i) criteria derivation and justification, (ii) alignment with international standards, and (iii) application strategy for comparative evaluation.
The evaluation criteria were synthesized from an extensive review of peer-reviewed literature, comparative methodological studies, and applied risk management research in construction and engineering contexts.
Methodological structure refers to the extent to which a technique is governed by a formalized process, structured steps, and predefined logic. A well-defined methodological framework enhances the repeatability, transparency, and reliability of risk identification outcomes. Chapman [27] emphasizes that structured approaches—such as facilitated workshops or guided checklists—provide greater consistency and reproducibility compared to ad hoc methods. Nawaz et al. [41] further highlight that the presence of a clear methodological structure reduces ambiguity and supports systematic decision-making in complex project environments. Similarly, Cooper et al. [42] argue that the adoption of formalized processes in risk management strengthens both the credibility and traceability of results, which is critical for organizational learning and stakeholder confidence.
Stakeholder participation assesses a technique’s ability to incorporate insights from diverse stakeholders, thereby enhancing the comprehensiveness, legitimacy, and acceptance of identified risks. Inclusive approaches are particularly valuable in collaborative and multidisciplinary construction environments, where risks often arise from the interaction of multiple actors and perspectives. Okoli and Pawlowski [31] emphasize that structured group techniques such as the Delphi method foster stakeholder engagement by enabling systematic input from experts across different domains. Hallowell and Gambatese [34] further demonstrate that broad participation not only enriches the pool of identified risks but also enhances the credibility of outcomes by reducing individual bias. Similarly, Albert et al. [43] argue that participatory strategies increase both the legitimacy and completeness of risk identification, especially in construction projects characterized by complex stakeholder dynamics.
Analytical depth refers to the extent to which a technique can capture detailed information, causal mechanisms, and interdependencies among risk factors. Methods with higher analytical depth are particularly valuable for identifying complex, latent, or systemic risks that may not be visible through superficial analysis. Tixier et al. [26] emphasize that advanced analytical methods are capable of mapping intricate interrelations among hazards, thereby providing more robust decision support. Similarly, Aven [22] argues that deep analytical approaches allow practitioners to move beyond probability assessments to understand causality and system-level interactions in uncertain environments. Furthermore, Hopkin [23] highlights that capturing hidden interdependencies is critical for large-scale projects, where risks often emerge from the interaction of multiple factors rather than isolated events. Consequently, high analytical depth is a defining attribute of techniques designed to address the complexity and uncertainty of modern project environments.
Resource Intensity denotes the level of human, financial, and temporal resources required for the practical application of a technique. Methods with lower resource demands are generally more feasible for small-scale projects or organizations with limited capacity, while highly resource-intensive approaches may only be viable for large, complex, or safety-critical projects. As Chapman [27] highlights, the selection of risk identification and assessment methods must account for practical resource constraints to ensure efficiency and realism in outcomes. Similarly, Tixier et al. [26] argue that different techniques vary significantly in their time and expertise requirements, which influence their suitability across various project contexts. Hallowell and Gambatese [34] further emphasize that structured, analytical methods—though often delivering deeper insights—tend to require greater resources in terms of expert involvement, data, and time. Therefore, aligning a technique’s resource intensity with the project’s size, scope, and organizational capacity is critical to maximize both efficiency and applicability.
Flexibility and adaptability refer to the technique’s capacity to adapt to variations in project size, phase, scope, and contextual conditions. Techniques that exhibit higher adaptability can be applied effectively across a broader spectrum of projects, thereby enhancing their practical utility. As noted in the PRAM Guide, the level of detail and application of risk management processes should be commensurate with project circumstances [39]. Similarly, the ATOM methodology explicitly differentiates practices for small, medium, and large projects, offering scalable activities aligned with project size [44]. Moreover, Valis [45] highlights that methods such as Delphi can be employed at various phases of the system life cycle, underscoring their flexibility across project stages. Contextual adaptability is further emphasized by De los Pinos and Garcia [46], who stress that single-method approaches may fail to capture project complexity; thus, methodologies must integrate diverse perspectives to remain effective in different project environments.
Decision support value refers to the extent to which a technique’s outputs facilitate actionable decision-making and can be seamlessly integrated into project planning and control processes. Techniques with a strong decision-support capacity not only generate risk registers but also provide structured insights for prioritization, response selection, and monitoring. As Hillson and Murray-Webster [47] emphasize, the ultimate purpose of risk management techniques lies in their ability to inform and improve managerial decision-making rather than merely documenting risks. Similarly, Aven [22] argues that methods with high decision-support value enable practitioners to translate complex risk analyses into practical strategies under uncertainty, thereby enhancing project resilience. Cooper et al. [42] also emphasize that risk analysis adds real value only when its outputs are systematically linked to planning, control, and performance measurement mechanisms, ensuring that decision-makers can effectively act on the identified risks.
Contextual fit assesses the degree to which a technique aligns with the institutional norms, cultural dynamics, and sector-specific constraints within a specific national or organizational context. A strong contextual fit ensures both local relevance and implementation feasibility, as risk management practices that ignore cultural or institutional realities often face resistance or become ineffective. Zou et al. [4] demonstrate that construction risk management frameworks must be tailored to reflect the regulatory, contractual, and cultural environments of the host country to achieve practical applicability. Similarly, Ling and Hoi [48] emphasize that cultural attitudes toward risk and collaboration directly influence the success of project risk management techniques in different national settings. Additionally, Smith et al. [49] argue that sectoral constraints and institutional practices define the adaptability and acceptability of techniques, making contextual alignment a decisive factor in their successful deployment.
Table 3 presents the evaluation criteria used in the comparative framework, along with their operational definitions and key supporting references drawn from relevant literature in risk management, construction engineering, and systems analysis. The finalized criteria constitute the reference schema to which all method-specific artifacts will be coded and aligned in the empirical component.
To ensure content validity and global relevance, the criteria were mapped against two internationally recognized risk management standards:
  • ISO 31000 [50]: 2018—Risk Management Principles and Guidelines
  • PMBOK Guide (7th Edition) [21]—Project Risk Management Domain
This crosswalk ensures that the evaluation framework maintains both theoretical robustness and practical alignment with established best practices in risk management—for instance, C2. Stakeholder Participation aligns with Clause 5.4 of ISO 31000 [50] and the PMBOK’s [21] Stakeholder Engagement Principle, affirming its foundational role in participatory risk identification—similarly, C6. Decision Support Value corresponds to risk evaluation and prioritization functions detailed in Clause 6.5 of ISO 31000 [50] and the PMBOK [21] Decision-Making Environment. Table 4 aligns the selected evaluation criteria with internationally recognized risk management standards, specifically ISO 31000: 2018 [50] and the PMBOK Guide (7th Edition) [21], to ensure content validity and methodological consistency.
Each technique is qualitatively assessed against the criteria through a thematic coding and synthesis of empirical findings from the literature. Rather than assigning numerical scores, a narrative comparative approach is adopted to reflect the nuanced and context-dependent nature of risk identification in construction settings. This framework is also applied to a real-world case study, which serves as an empirical validation setting, allowing the evaluation framework to be tested under realistic constraints (e.g., time, stakeholder diversity, institutional readiness) and offering grounded insights on each technique’s feasibility and performance in practice. To further enhance robustness:
  • Triangulation across multiple data sources and literature domains was performed.
  • Operational definitions were developed for each criterion to ensure clarity and consistency in assessment.
  • Reflexivity was maintained throughout the case study application to address subjectivity and contextual variability.

3.3. Empirical Data Collection and Case-Based Application

This second component operationalizes the study within a real-world infrastructure project and documents the full data collection streams for each technique. Specifically, Delphi generated R1/R2 survey responses and consensus statistics; NGT produced idea sheets, voting forms, and priority ranking tables; HAZOP yielded deviation logs, node–guideword worksheets, and risk register entries; and PHA provided checklist-based hazard identification tables, together with severity–likelihood matrices and ranking reports. All artifacts were subsequently subjected to data coding and synthesis (deduplication, semantic alignment of overlapping risks, and category mapping), after which the consolidated dataset was integrated with the finalized criteria (Figure 1). Templates and supporting materials for all four techniques are presented in Appendix A, Appendix B, Appendix C and Appendix D.
Developed a comparative evaluation framework that is grounded in a process-oriented, context-sensitive approach rather than a numerical ranking or scoring methodology. This decision reflects an epistemological commitment to interpretivism and acknowledges the inherent variability in construction project environments, stakeholder dynamics, and institutional capacities. Unlike prescriptive models that attempt to quantify performance hierarchies across techniques, the present framework emphasizes descriptive richness and operational nuance as core elements of methodological rigor.
Central to the evaluation strategy is the recognition that risk identification techniques do not operate in isolation from their implementation environments. Their effectiveness is shaped not only by their internal structures but also by external constraints such as resource availability, stakeholder diversity, project complexity, and regulatory maturity. As such, a rigid comparative metric would risk oversimplifying the socio-technical interdependencies that characterize real-world project settings.
Accordingly, the framework adopts a multi-criteria comparative lens, organized around evaluative dimensions (C1–C7), which were derived through a synthesis of academic literature and empirical practice (see Table 1). These dimensions—ranging from methodological structure to contextual fit—serve as interpretive categories rather than scoring axes. They guide a structured yet flexible assessment that accommodates the complex realities of infrastructure projects, particularly in emerging economies.
The evaluation was operationalized through a structured application of the selected techniques within an infrastructure project. However, the framework itself remains technique-neutral and adaptable, designed to surface the contextual compatibilities and trade-offs inherent in each method without privileging one over others. This strategy supports methodological pluralism while preserving analytical clarity, ensuring that the evaluation remains relevant across diverse project typologies and institutional contexts. This dual design approach ensured two critical outcomes: (1) methodological consistency across implementations, and (2) comparability of findings based on technique-specific characteristics rather than contextual discrepancies.

3.3.1. Participant Selection

To ensure credibility and expertise, participant recruitment followed strict inclusion criteria. Expert panelists were required to have at least ten years of professional experience in the construction sector, demonstrated familiarity with risk management practices, and had previously prepared or contributed to at least one formal risk management strategy in a construction project. For key roles (e.g., senior geotechnical engineers, project managers, crew leaders), a minimum of two participants with comparable responsibilities were consulted. This approach enhanced the diversity of perspectives and allowed for cross-validation of responses. Results were subsequently compared across participants occupying similar roles to identify consistencies and resolve potential discrepancies. To further reduce respondent bias, multiple participants were recruited for critical positions, and their ratings were systematically checked for internal consistency before consolidation.
Each method was then implemented with participants and documentation relevant to its operational requirements. For example, Delphi utilized iterative expert consultation via anonymized surveys; NGT involved a facilitated group workshop with frontline workers; HAZOP drew on technical schematics and guideword analysis in a multidisciplinary team setting; while PHA applied checklist-based screening during early-stage planning discussions.
Thematic coding of the evaluative criteria (C1–C7) was conducted by the author, with cross-checking performed by an independent colleague familiar with construction risk management. Disagreements in interpretation were resolved through discussion until consensus was achieved. Consistent with the interpretivist stance of the study, no numerical scoring was assigned; instead, the synthesis emphasized contextual themes, trade-offs, and situational appropriateness of each technique. Triangulation was employed by comparing three sources of evidence: (i) prior scholarly literature, (ii) project-specific documentation, and (iii) empirical observations from technique implementation. This multi-source comparison enhanced the robustness of the narrative synthesis, reducing single-source bias and increasing the credibility of the comparative evaluation.

3.3.2. Data Coding and Synthesis, and Integration with Evaluation Criteria

This stage served as the analytical bridge between the method-specific artifacts produced in the empirical component—namely, Delphi, NGT, HAZOP, and PHA—and the literature-driven evaluation framework, comprising seven criteria (C1–C7). The process unfolded as a sequential workflow involving data pre-processing, consolidation, thematic coding, integration, and quality assurance, ultimately resulting in a unified dataset ready for comparative evaluation and visualization.
All raw artifacts were first digitized, anonymized, and stored in a structured repository to ensure traceability. The corpus included Delphi R1/R2 survey responses and consensus statistics; NGT idea sheets, voting forms, and priority ranking tables; HAZOP deviation logs and node–guideword tables; and PHA checklist outputs, hazard identification tables, and risk matrices. These heterogeneous inputs were harmonized into a uniform tabular format, recording essential metadata such as method type, participant role, session date, risk statement, contextual tag, and evidence source. This initial harmonization established a consistent analytical foundation across techniques that differ significantly in documentation format and interaction structure.
In the consolidation stage, redundant and semantically overlapping items were merged to produce a canonicalized risk inventory. Duplicate detection was first performed using text normalization procedures (e.g., lemmatization and removal of repeated phrases). Then, conceptually equivalent risks described differently across techniques were semantically aligned under standardized labels while preserving a traceable back-link to all original entries. For instance, risks noted as “utility conflicts” in NGT and “unmarked utility strikes” in HAZOP were merged under a single canonical label once semantic congruence was verified. Ambiguous or context-dependent items were flagged and re-evaluated during subsequent coding rounds to prevent loss of contextual meaning.
A comprehensive codebook was then developed to guide thematic coding and ensure analytical consistency. The codebook included domain categories (e.g., technical, organizational, environmental), causal mechanisms (design error, logistics, regulatory constraint), and implementation attributes (e.g., facilitation intensity, documentation reliance). The first author conducted the initial round of coding, while a second researcher independently coded a stratified subset of the data to assess intercoder consistency. Any discrepancies were discussed and resolved through consensus, and the definitions in the codebook were refined accordingly. The finalized codebook was applied to the entire dataset, producing a multi-layered coded corpus that captured both the substantive and procedural dimensions of the risk identification outputs.
After thematic coding, all coded entries were integrated with the evaluation framework to align empirical evidence with the seven established criteria. For each technique, the coded data were examined to identify how its outputs reflected the attributes defined under C1–C7. Methodological structure (C1) was interpreted through indicators such as the degree of procedural formalization or documentation control evident in the artifacts, while stakeholder participation (C2) was inferred from the diversity and interaction intensity of contributors. Analytical depth (C3) was assessed through the richness and causality captured in outputs, and resource intensity (C4) was judged by the observable demands on expertise, time, and coordination. Flexibility and adaptability (C5) were derived from the ease with which each method could be tailored to varying project conditions, whereas decision-support value (C6) reflected the extent to which outputs translated into actionable planning inputs. Finally, contextual fit (C7) captured the alignment between technique outputs and the institutional, cultural, and regulatory setting of the case project. Rather than assigning numerical scores, this integration was carried out through qualitative comparative memos, each triangulating empirical observations, documentation evidence, and literature-based theoretical expectations.
To safeguard reliability, multiple quality assurance mechanisms were incorporated throughout the process. Each consolidated risk statement maintained a full provenance trail linking it to its original method-specific sources, ensuring auditability. Coding accuracy was reinforced through peer review of both the codebook and the thematic assignments. Moreover, member checking was implemented by returning synthesized outputs—such as Delphi consensus summaries, NGT priority lists, and HAZOP/PHA deviation logs—to participants for verification and confirmation. Reflexive memos were maintained to document interpretive decisions, and negative cases that contradicted initial assumptions were explicitly analyzed to preserve transparency.
The outcome of this process was a comprehensive, integrated dataset that merged qualitative and procedural evidence across all four techniques. This dataset consisted of a canonicalized risk inventory, a coded corpus with multi-dimensional tags, and a comparative evaluation matrix aligned with the seven criteria. These outputs provided the empirical foundation for the subsequent comparative analyses, radar and heat-map visualizations, and the synthesis of the contextual decision-support model that concludes the study.

3.3.3. Evaluation Procedure, Member Checking and Reflexivity

The evaluation of techniques against the seven criteria (C1–C7) was conducted through a structured interpretivist procedure. No numerical scoring was applied; instead, qualitative coding of expert panel responses and project documentation was performed. To mitigate researcher subjectivity, the first author undertook initial coding and subsequently reviewed it with an independent researcher who has expertise in construction risk management. Disagreements were discussed and resolved through consensus. To further reduce bias, cross-validation was applied across professional roles (e.g., project managers, safety specialists, design engineers), ensuring consistency of responses. Triangulation across expert inputs, project records, and prior literature provided an additional layer of verification. This stepwise procedure enhances both the transparency and replicability of the comparative evaluation.
To further strengthen methodological rigor, member checking was integrated into the iterative design of each technique. In the Delphi process, synthesized risk ratings from Round 1 were returned to participants in Round 2 as median and interquartile range (IQR) summaries, allowing experts to reconsider and adjust their judgments in light of collective feedback. Similarly, in the NGT workshop, aggregated prioritization results were presented to participants, who then engaged in clarification and re-ranking of the results. In the HAZOP and PHA sessions, consolidated deviation logs and checklist outputs were reviewed collaboratively to verify accuracy and completeness. These feedback loops enabled participants to validate synthesized outputs, thereby reinforcing the trustworthiness of the findings.
Reflexivity was also addressed explicitly. The author assumed a dual role, serving as both facilitator during the group sessions (Delphi questionnaire design, NGT moderation, PHA checklist review, and HAZOP node structuring) and as analyst during the synthesis of results. This dual involvement introduced potential sources of bias, such as influencing group dynamics or privileging specific interpretations during the coding process. To mitigate these risks, several safeguards were employed, including the use of standardized protocols (e.g., predefined guidewords, transparent rating scales, structured questionnaires), anonymized feedback structures, and cross-checking of coding outputs by an independent colleague with expertise in construction risk management. This reflexive acknowledgment underscores both the interpretivist orientation of the study and the safeguards implemented to minimize bias and ensure analytical transparency.

3.3.4. Project Background and Context

The selected case study for this research is a large-scale infrastructure project situated in the northwestern region of Türkiye. The project involves the planning and construction of a high-capacity water treatment facility. With a scheduled duration of approximately 24 months, the project encompasses various complex components, including civil works, mechanical and electrical installations, and the integration of advanced treatment technologies. Given its technical sophistication, regulatory sensitivity, and long-term strategic importance, the project represents a critical node in the region’s water management infrastructure. For confidentiality reasons, the specific identity of the project site is anonymized in this manuscript. Permission to report methodological applications was obtained from project stakeholders. Each risk identification technique was applied in alignment with its natural position within the project lifecycle—for example, the PHA was undertaken during the conceptual planning stage, Delphi rounds were conducted in the early design phase, NGT was organized during stakeholder coordination meetings, and HAZOP was implemented in the detailed design stage. This sequencing ensured contextual appropriateness without disclosing sensitive project timelines.
The project site is situated in a semi-urban area, characterized by a combination of residential development, environmentally sensitive zones, and logistical constraints resulting from limited access roads. Geotechnical investigations revealed variability in subsurface conditions, necessitating adaptive design considerations for excavation, foundation works, and pipeline routing. Furthermore, the project operates under the jurisdiction of multiple governmental agencies and involves collaboration among several private contractors, design consultants, and oversight institutions.
This multifaceted stakeholder environment introduces a variety of risk dimensions, including coordination complexity, regulatory uncertainty, and health and safety concerns during the construction phase. The nature of the project aligns well with the application of structured risk identification methodologies, as it involves both predictable risks typical of infrastructure projects and context-dependent risks arising from site-specific and institutional factors. The planning and execution phases required robust mechanisms to uncover, categorize, and prioritize hazards across different domains—technical, operational, environmental, and organizational.

3.3.5. Implementation of Risk Identification Techniques

The Delphi Method was applied through two iterative rounds involving a carefully selected panel of five domain experts, including two senior geotechnical engineers, one occupational safety consultant, and two project managers with over a decade of field experience. The first round aimed to elicit individual risk perceptions through anonymized questionnaires, while the second round facilitated convergence by presenting aggregated feedback for re-evaluation.
NGT was implemented through a structured 90 min workshop involving one site engineer, one safety supervisor, and four crew leaders from key disciplines (excavation, formwork, mechanical works, and logistics). Participants began by silently listing perceived risks, followed by a round-robin sharing process, clarification of listed items, and anonymous voting for prioritization.
HAZOP was implemented with a multidisciplinary team comprising a civil engineer, a geotechnical engineer, a safety coordinator, and a mechanical systems designer. The team analyzed the excavation and foundation phases using a simplified process flow diagram, employing key words such as “more,” “less,” “as well as,” and “reverse” to identify deviations from the design intent.
PHA was conducted through a semi-structured session between the project manager and the safety consultant, using a standard checklist adapted to the project’s lifecycle phases. Table 5 summarizes the operational characteristics of each applied risk identification method, detailing session duration, participant composition, artifacts employed, and the number of risks identified.

4. Results

4.1. Quantitative Traceability of Risk Outputs

Although the present study is grounded in an interpretivist stance, quantitative traceability was also incorporated to strengthen methodological transparency. Across the four techniques, a total of 75 risks were identified: 17 through the Delphi method, 25 through the NGT method, 23 through the HAZOP method, and 17 through the PHA method. A cross-method comparison revealed that while several risks were shared, each technique also provided distinct insights (Table 5). For example, excavation collapse was consistently raised in NGT and PHA, while stakeholder conflicts were raised in NGT and HAZOP. At the same time, method-specific contributions were evident: Delphi uniquely highlighted seismic vulnerability and regulatory approval delays; NGT surfaced operational challenges such as logistics bottlenecks and supplier insolvency; HAZOP generated technically specific issues such as incorrect reinforcement placement and inadequate ventilation; and PHA emphasized early-stage risks, including delay in procurement of safety equipment and design errors in early drawings (Figure 3).
A data note was also included to clarify the derivation of these outputs: risks were first consolidated to remove duplicates, then mapped across methods based on semantic equivalence (e.g., “utility conflicts” in PHA and “unmarked utility strike” in NGT were treated as conceptually overlapping). Counts of unique and overlapping risks were subsequently generated, forming the basis of both the table and the Venn diagram. This combination of descriptive counts and visualizations ensures that the comparative evaluation retains its qualitative depth while providing a clear, quantitative trace of the evidence base. It should be noted that the evaluative criteria (C1–C7) were applied qualitatively, not numerically. This approach aligns with the interpretivist stance of the study and was supported by cross-validation, peer debriefing, and triangulation to ensure consistency.

4.2. Risk Identification

To provide a transparent overview of these patterns, the risks were organized into a comparative framework summarizing unique versus overlapping items. The results indicated that overlaps were most common in categories such as excavation hazards, stakeholder conflicts, and environmental exposures, whereas uniqueness was concentrated in areas reflecting the methodological strengths of each tool. These findings are presented both in tabular form (Table 6) and in a Venn approximation (Figure 3), which together illustrate the distribution of unique and overlapping risks across the four techniques. Axes, legends, and category labels were made explicit to ensure readability of the visuals.

4.3. Risk Categorization

In addition to mapping overlaps and unique contributions across methods, the identified risks were further categorized into two broad classes: occupational health and safety (OHS) risks (e.g., excavation collapse, electrical short circuits, hazardous material exposure, noise and dust exposure, worker fatigue, falls from height) and contextual or project management risks (e.g., budget underestimation, supplier insolvency, regulatory approval delays, stakeholder conflicts). Grouping the risks in this method clarifies their substantive domains while also illustrating how methodological design influences the breadth and emphasis of identified risks. This categorization is summarized in Table 7, which highlights both the domain of each risk and the method(s) by which it was identified, thereby offering a transparent view of overlaps and complementarities across approaches.

5. Discussion

5.1. Validation Against Real-World Risk Data

A consistent picture emerges across regulatory and surveillance sources about the hazards that most frequently lead to severe outcomes in construction. In the United States, OSHA’s “Focus Four” (falls from elevation, struck-by, caught-in/between, and electrocutions) are identified as the leading causes of death on construction sites and remain the core emphasis of federal construction safety outreach and training [51]. Recent surveillance confirms this pattern: national injury-epidemiology syntheses from CPWR [52] show that fatal construction injuries continue to be dominated by falls from elevation, followed by struck-by and caught-in/between events, with electrical contact being a persistent contributor—together accounting for the majority of construction deaths in the last decade. The United Kingdom displays a similar distribution. In Great Britain in 2024/25, HSE [53] reported 35 fatal injuries in the construction sector, and among the “main kinds of fatal accident,” falls from a height accounted for 35 cases, followed by struck by moving object (18), trapped by collapse/overturning (17), struck by moving vehicle (14), and contact with machinery (13). Taken together, these converging data sources indicate that (i) work at height, (ii) impact/struck-by hazards (including plant, vehicles, and materials), (iii) caught-in/between or collapse events (e.g., trench/excavation, formwork), and (iv) electrical exposures represent the modal, high-severity risk channels in construction across jurisdictions. This external patterning provides a grounded benchmark against which to judge the realism of the risks elicited in this study’s techniques (e.g., repeated identification of excavation collapse, scaffolding/formwork failures, utility/electrical hazards, and dust/noise exposures), and it underpins the later mapping between method-specific findings and empirically dominant hazard classes in the sector.
Within the present study, many of these empirically dominant hazard categories were captured by the applied techniques. For example, excavation collapse and falls from height (related to concept scaffolding) were identified in both PHA and NGT, while scaffolding failure was identified in NGT and HAZOP. Electrical risks were consistently observed, with HAZOP surfacing “electrical short circuit during installation” and “exposure to noise above permissible levels,” while NGT emphasized “electrical hazard” and “welding defects.” Struck-by and collapse events were represented through risks such as “crane accident” (NGT), “structural instability due to formwork failure” (HAZOP), and “improper lifting gear selection” (HAZOP). These overlaps indicate a strong alignment between the model’s outputs and the most frequently fatal hazards identified by OSHA and HSE.
At the same time, the distribution of risk categories across methods reflects their methodological strengths. HAZOP’s structured guideword analysis, applied during the design stage, naturally generated detailed OHS hazards involving equipment malfunction, ventilation failures, and formwork instability, aligning with its emphasis on technical-system deviations. NGT, by contrast, emphasized operational risks directly observable on site—such as crane accidents, logistics bottlenecks, and worker fatigue—demonstrating its sensitivity to stakeholder engagement and site-level dynamics. Delphi primarily captured contextual and project management risks, including regulatory approval delays, supply chain uncertainty, and environmental opposition, reflecting its orientation toward eliciting expert judgment on systemic and organizational uncertainties. PHA, as expected from its screening function, surfaced early-phase risks such as inadequate emergency response planning, procurement delays, and concept-stage safety gaps, offering breadth rather than depth.
Beyond occupational safety, contextual and project management risks identified in the study also show strong resonance with established findings on project performance. International benchmarking studies [1,54] consistently report that supply chain uncertainty, design errors, and regulatory approval delays are leading contributors to cost overruns and schedule slippages. In this regard, the Delphi outputs—such as “budget underestimation,” “regulatory approval delays,” and “design–construction misalignment”—align with the high-frequency, high-impact drivers of project underperformance documented in the literature. This suggests that while Delphi may appear less focused on immediate OHS hazards, it adds critical value by surfacing systemic risks with significant downstream severity for project delivery.
Consequently, the study’s elicited risks are not only internally coherent but also externally validated against high-frequency, high-severity categories consistently observed in regulatory statistics and project risk research. While the alignment here is interpretive rather than statistical, it nonetheless provides credible evidence that the proposed model captures the empirically dominant hazard channels in construction. The triangulation between elicited risks, OSHA/HSE fatality statistics, and project risk literature enhances confidence in the contextual realism of the model.

5.2. Comparative Evaluation of Structured Risk Identification Techniques

The comparative evaluation of the Delphi Method, NGT, HAZOP, and PHA within this study yields several findings that both corroborate and refine existing knowledge in the domain of construction risk identification. For instance, previous research by Kiral et al. [16] highlighted the methodological robustness of the Delphi Method in identifying context-specific risk factors in Turkish construction projects. The study’s findings align with this assertion, particularly in terms of the technique’s analytical depth and its ability to accommodate expert tacit knowledge. However, unlike Kiral et al. [16], this study emphasizes the technique’s limitations in terms of implementation time and resource intensity, especially under conditions of rapid decision-making or constrained project timelines. In the case application, while Delphi enabled the identification of latent, cross-disciplinary risks—such as delayed permit approvals and supply chain delays—the method’s multi-round structure led to participant fatigue, with later rounds yielding diminishing engagement and reduced response richness. Moreover, the technique excelled in identifying systemic and latent risks—such as legal ambiguities in environmental permits, risk of deep excavation collapses in geotechnically unstable soil, and potential contractor default. However, challenges emerged in sustaining participant engagement across multiple rounds, coordinating schedules, and ensuring consistent interpretation of risk semantics. Furthermore, the need for a skilled facilitator and sufficient time allocation posed constraints, especially under projects with fast-tracked timelines.
Similarly, while Hallowell and Gambatese endorsed the NGT as an efficient method for safety-related hazard identification, particularly for its inclusivity and participatory structure, the present study reveals that its decision-support capabilities may be diminished in settings characterized by stakeholder asymmetry or hierarchical imbalance [34]. Unlike brainstorming, which was critiqued by Tixier et al. [26] for its lack of structure, the NGT offers procedural rigor; yet, the current findings suggest that the absence of anonymity may introduce social desirability bias or deference to authority figures within construction teams—especially in culturally high power-distance contexts. During the on-site NGT workshop, for example, junior crew leaders appeared reluctant to challenge or override senior staff input, despite divergent perceptions of risk priorities. While the technique facilitated shared ownership of risk perception, it struggled to capture dissenting views under hierarchical pressure. Its inclusive and participatory structure encouraged open communication and fostered a sense of psychological ownership among workers. However, the focus on immediate and observable risks tended to overlook upstream or strategic threats, and the lack of complete anonymity may have discouraged junior participants from expressing dissenting views in the presence of supervisory personnel.
Regarding system-based methods, prior studies (e.g., [35,55]) have generally positioned HAZOP as a best-practice standard for high-risk technical environments. While the present study concurs with these conclusions concerning analytical rigor and depth, it also highlights that HAZOP’s extensive resource demands and reliance on advanced design documentation render it less suitable during early-stage project planning. In field implementation, HAZOP yielded detailed technical failure modes, but required significant facilitation expertise and exhaustive pre-meeting preparation, underscoring its practicality only in mature project phases with substantial documentation in place. The technique demonstrated impressive analytical depth and procedural rigor, particularly in surfacing failure scenarios that could trigger cascading effects. However, its implementation required detailed design documentation, significant preparation time, and technical fluency among team members—conditions that may not always be available in early-stage or resource-constrained projects. Additionally, the abstract nature of guidewords occasionally confused less experienced participants, requiring frequent clarification by the facilitator.
In contrast, PHA is affirmed as a lightweight and agile method for preliminary assessments, echoing earlier insights by Merna and Al-Thani [10]; however, this study further reveals its vulnerability to generalization and its limited integration with downstream risk control mechanisms. The PHA session, conducted during the project’s initial planning phase, identified high-level concerns but lacked granularity for actionable task-level mitigation, requiring further elaboration. The strength of PHA lies in its speed, simplicity, and minimal resource requirements, making it particularly useful during early project planning or tendering stages. However, the method lacked depth in risk interaction analysis, failed to incorporate stakeholder diversity, and provided limited utility for downstream mitigation design. Its tendency to generalize and oversimplify complex risk scenarios also reduced its predictive power in the face of system-level failures.

5.3. Comparative Evaluation Matrix

In terms of methodological structure, the Delphi Method offers a highly organized and iterative framework, in which expert opinions are refined across multiple rounds through anonymized feedback [31,56]. This design enhances the reliability of consensus and is particularly useful in situations marked by high uncertainty and limited data. NGT also follows a structured approach but emphasizes a more condensed, face-to-face format involving silent idea generation, round-robin sharing, and ranked voting [34,57]. HAZOP presents the most rigid methodology among the four, relying on systematic guideword analysis of design components [55]. It is process-intensive but ensures exhaustive hazard identification. In contrast, PHA employs a loosely structured, qualitative approach that supports rapid identification of broad hazard categories without procedural complexity [10].
Regarding stakeholder participation, Delphi allows for widespread and geographically dispersed expert engagement due to its asynchronous and anonymous nature, making it ideal for national or international studies [31]. NGT, by contrast, is most effective in small, physically co-located groups, where balanced interaction can be facilitated in real-time [34,57]. HAZOP requires a multidisciplinary team with technical expertise to analyze system components in live sessions [55] collaboratively. PHA typically involves fewer stakeholders, usually technical staff or project managers, and is conducted early in the project lifecycle with minimal coordination requirements [10].
When evaluated on analytical depth, HAZOP emerges as the most robust technique due to its systematic node-by-node inspection of potential deviations from design intent [35,55]. Delphi also provides considerable depth by aggregating nuanced expert insights, although it leans more on subjective judgment than technical breakdown [31]. NGT delivers moderate analytical depth by ranking group-generated risks but lacks iterative refinement [57]. PHA ranks lowest in this category, as its scope is broad and often limited to qualitative classification of significant hazards [58].
In terms of resource intensity, HAZOP demands the highest level of investment, requiring detailed documentation, skilled facilitation, and time-intensive workshops [35,55]. Delphi is also resource-heavy, mainly due to the need for participant recruitment, round design, and multiple feedback cycles [31]. NGT, on the other hand, is relatively economical, requiring only a trained facilitator and a small participant group to execute effectively [34,57]. PHA is the least resource-intensive, enabling rapid deployment with minimal personnel and documentation [15].
With respect to flexibility, Delphi is highly adaptable, suitable for a wide variety of project types and participant configurations [31]. NGT is moderately flexible, though it is constrained by group size and the need for physical presence [57]. HAZOP is the least flexible due to its dependence on detailed system design and formal guideword protocols [55]. PHA is the most agile technique, as it can be conducted with limited project data and easily adapted to different project phases and team compositions [10].
In terms of decision-support capability, HAZOP provides the most comprehensive output, particularly for design optimization and safety assurance. Its findings are often directly linked to engineering actions [55]. Delphi also supports decision-making effectively by consolidating expert knowledge into prioritized risk lists [25]. NGT facilitates group consensus on key risks but lacks depth in technical recommendations [28]. PHA provides high-level guidance during the conceptual phase but is less effective at supporting detailed decisions due to its generalist nature [35,58].
Finally, in terms of contextual fit, PHA and NGT stand out as practical tools due to their simplicity, low resource demands, and suitability for environments where formal risk management practices are still in the process of evolving [10,34]. Delphi, while methodologically robust, tends to be more feasible for academic or policy-level initiatives given its iterative structure and coordination intensity [31]. HAZOP, despite offering the highest degree of technical rigor, is often underutilized in settings with limited institutional capacity or documentation infrastructure [55]. Its application is typically reserved for high-risk, technically complex projects, such as energy facilities or large-scale industrial systems [35,59]. The comparative performance of the four techniques across the selected criteria is summarized in Table 8, providing a side-by-side evaluation to guide method selection across a wide range of construction project environments.
To strengthen the comparative dimension of the analysis, the distinctive characteristics of the four techniques were synthesized across the seven evaluation criteria (C1–C7). The Delphi Method and NGT both emphasize structured group-based elicitation, yet they differ substantially in terms of process dynamics. Delphi prioritizes anonymity and iterative refinement, which enhances the reliability of expert consensus but often leads to fatigue in multi-round implementations. By contrast, NGT achieves rapid convergence in a single session and fosters inclusivity, though its lack of anonymity may introduce power asymmetries, particularly in hierarchical project environments. This divergence illustrates a key trade-off between methodological rigor and participatory inclusiveness, both of which must be balanced depending on stakeholder configurations.
Similarly, the two system-oriented techniques—HAZOP and PHA—differ in depth and operational scope. HAZOP is characterized by its high diagnostic capacity, systematically decomposing technical systems to identify compound failures. However, its application requires substantial preparatory documentation and facilitation expertise, limiting its practicality in early design or resource-constrained projects. PHA, in contrast, offers a rapid, checklist-based approach suitable for early-phase hazard scanning; however, its outputs are often generic and require further elaboration before being integrated into detailed planning. Taken together, these findings underscore that while all four methods contribute value, their utility is context-dependent, shaped by trade-offs between depth, efficiency, inclusiveness, and resource intensity. To provide a more intuitive overview of these distinctions, Table 9 presents a comparative matrix that summarizes the performance of Delphi, NGT, HAZOP, and PHA across the evaluative criteria (C1–C7). This tabular visualization complements the narrative synthesis by allowing readers to quickly discern methodological differences, overlaps, and trade-offs, thereby enhancing the accessibility and practical utility of the comparative evaluation.

5.4. Cognitive and Behavioral Dimensions of Method Deployment

In addition to structural and technical attributes, the cognitive and behavioral dynamics associated with each technique emerged as influential factors during the applications. These dimensions—often overlooked in formal evaluations—became particularly salient in methods involving real-time group interaction.
For instance, the NGT workshop engaged participants—including site engineers and crew leaders—in identifying site-specific risks. However, the lack of anonymity meant that in the presence of senior personnel, some junior participants self-censored, reflecting known concerns about social desirability bias and hierarchical influence. The literature indicates that NGT, despite its structured format, does not fully mitigate interpersonal and power-related pressures in group settings (e.g., [60]). Moreover, broader research on social desirability bias underscores how social hierarchies can systematically suppress open expression [61]. Thus, while NGT’s stepwise procedure facilitates inclusive participation, organizational culture and interpersonal relationships can still moderate its effectiveness [60,61].
In contrast, the Delphi method, implemented through asynchronous and anonymized expert rounds, reduced interpersonal pressure and encouraged nuanced, experience-based risk articulation. Delphi’s anonymity is well-documented to reduce dominance and conformity effects, promoting more honest and reflective responses [62]. However, its iterative and remote nature introduces limitations: the lack of real-time feedback slows responsiveness, extends timelines, and can cause expert fatigue or attrition [60,63]. Additionally, specific operational nuances—especially those rooted in direct site exposure—were identifiable in the NGT but not captured by Delphi, likely due to its abstraction from the context.
These findings underscore the importance of method selection that considers not only formal structure but also the project’s psychosocial fabric. Real-time collaborative techniques, such as NGT, must be deployed with awareness of hierarchy and communication norms. In contrast, remote or anonymized methods, like Delphi, must address the risks of disengagement or abstraction. Ultimately, no technique is behaviorally neutral; each interacts with the cognitive and relational dynamics of its users, influencing both the risk-identification process and its outcomes.

5.5. Integration with Broader Risk Management Architecture

Another key insight from the case study concerns the integration of identified risks into the broader project risk management workflow. The application of each method revealed critical differences in how their outputs support—or hinder—subsequent phases such as risk analysis, prioritization, mitigation planning, and continuous monitoring.
For example, HAZOP sessions generate structured, scenario-based risk statements tied to specific system functions, which are widely recognized for their compatibility with fault tree models and probabilistic risk assessments [55,64]. This facilitated direct integration into the project’s risk register and supported downstream quantitative analysis. However, the extensive preparation and documentation workload imposed practical constraints, especially in fast-paced project environments with limited staff resources [26].
In contrast, PHA produced general risk categories that proved useful for early-stage screening but lacked the granularity necessary for detailed mitigation planning. Literature on PHA highlights its role as a broad scanning tool, requiring subsequent refinement before it can be translated into actionable safety measures [65,66].
The NGT workshop, while rich in operational detail and inclusive of diverse frontline perspectives, yielded context-specific qualitative insights without a system-level structure. These results were valuable for immediate corrective actions but required reformatting to align with formal reporting or compliance tools [34].
Similarly, Delphi produced a broad set of expert-informed risks, but due to the absence of standardized reporting templates, the outputs varied in format and depth. This is consistent with methodological critiques of the Delphi method, which emphasize variability in outcomes and the additional effort required for synthesis and prioritization [31,60].
These patterns reinforce the consensus in risk management scholarship that risk identification should not be isolated from the broader project risk management architecture. A technique’s operational value lies not only in the risks it reveals but also in the usability, traceability, and interoperability of those insights [21,50,67]. Consequently, the selection of a method must take into account the intended trajectory of risk information throughout the project lifecycle. Methods that provide structured, high-fidelity data may be better suited to projects with robust analytical infrastructures, whereas flexible or participatory methods may require organizational adaptations to ensure continuity across risk management stages.

5.6. Empirical Validation Through Case Study

The contextual decision-support model developed in Section 5.10—Designed to guide method selection based on project attributes such as technical complexity and stakeholder dynamics—was retrospectively validated against the empirical findings from the risk identification exercises conducted within the Water Treatment Plant project. The application of the techniques provided a unique opportunity to assess whether the model’s decision pathways aligned with real-world performance under field conditions.
Specifically, the model recommended the HAZOP method for high-complexity project segments that required detailed technical interrogation and formal system analysis. This recommendation was borne out during implementation: HAZOP proved highly effective in surfacing latent failure scenarios within mechanical and geotechnical subsystems, consistent with its predicted evaluative advantages under criteria C1, C3, and C6. This observation aligns with prior studies that highlight HAZOP’s strength in systematic hazard detection and its suitability for integration with fault tree and probabilistic risk assessments [55,64]. However, its intensive resource requirements also confirmed the model’s caution that HAZOP is only appropriate when documentation is mature and specialist personnel are available [26].
In parallel, the Delphi method was suggested by the model as suitable for scenarios demanding structured expert input without real-time interaction—such as regulatory ambiguity or long-term strategic risk. Its actual deployment corroborated this: Delphi revealed system-level vulnerabilities and institutional coordination gaps, albeit with engagement fatigue and time delays, as anticipated by the model’s logic under C4 and C2. These outcomes are consistent with the methodological literature, which documents both the advantages of anonymity and iteration, as well as the drawbacks of time consumption and participant attrition [31,60].
The model’s routing toward NGT in stakeholder-sensitive, operationally dynamic contexts also aligned with practice. The NGT session captured frontline risks and fostered team ownership, especially among mid-tier site personnel. Although the model flagged potential issues around depth (C3) and anonymity (C2), these were observed in moderated form, reinforcing the model’s diagnostic value. This finding aligns with research indicating that NGT offers inclusive and context-specific operational insights, but is limited by group dynamics and a lack of anonymity [34,57].
Finally, PHA was correctly predicted to be beneficial for early-stage or time-limited conditions where rapid, low-resource risk scanning was needed. Its empirical performance validated the model’s framing of PHA as an agile but shallow tool, suitable primarily for initial scoping rather than detailed planning. This reflects prior work that recognizes PHA’s role in broad hazard categorization, while emphasizing its limited capacity for detailed mitigation planning [65,66].
Taken together, the empirical alignment between the model’s logic and real-world outcomes strengthens its credibility as a practitioner-oriented tool. While the decision tree simplifies a complex process, its structure proved robust in determining the suitability of forecasting methods across varying site conditions. Future applications across diverse project types and organizational settings will be essential to validate further and refine the model, consistent with broader project risk management frameworks that stress iterative validation and contextual adaptation [21,50,67].

5.7. Comparative Reflections Based on Evaluation Criteria

The comparative implementation of the risk identification techniques within the context of the Drinking Water Treatment Plant project has provided rich empirical insights into their practical performance, contextual alignment, and evaluative differentiation across the seven established criteria (C1–C7). These observations, grounded in actual field dynamics and stakeholder interactions, illuminate the nuanced trade-offs and operational realities associated with each method.
C1 Methodological Structure: Both Delphi and HAZOP exhibited pronounced procedural robustness, but their formal requirements—multi-stage iteration for Delphi and guideword-driven logic for HAZOP—were only feasible due to the project’s advanced design maturity and relatively stable planning horizon. Delphi’s iterative rounds enabled the structured convergence of dispersed expert opinions, particularly regarding regulatory uncertainties and supply chain fragilities, consistent with established accounts of its iterative strength [31,60]. HAZOP’s process flow interrogation facilitated the identification of mechanical interdependencies, such as pump and valve integration, echoing prior findings on its diagnostic rigor [55,64]. However, both formats demanded significant facilitation effort, which literature recognizes as a limitation in smaller-scale or earlier-stage projects [26]. In contrast, NGT and PHA offered lighter procedural architectures, enabling rapid deployment within construction coordination meetings, albeit with compromises in depth [65].
C2 Stakeholder Participation: NGT was implemented through a facilitated workshop with the site engineer, safety supervisor, and four crew leaders, allowing for equitable input across occupational tiers. This inclusive participation revealed context-specific hazards, such as vehicular access conflicts and operator fatigue—an outcome consistent with the literature highlighting NGT’s participatory strengths [34,57]. PHA, while more managerially centered, was sufficiently flexible to include cross-functional contributions. Delphi, by contrast, remained expert-centric, as noted in prior critiques [50], and HAZOP required participants with technical literacy, limiting broader engagement [55].
C3 Analytical Depth: The most substantial yield emerged from the HAZOP and Delphi analyses. HAZOP’s ability to detect compound failure modes (e.g., chemical backflow risks due to valve sequencing errors) is well-documented in safety engineering research [66]. Delphi’s open-ended format elicited systemic risks relating to permitting bottlenecks and cross-agency delays, aligning with prior methodological studies [31]. Both required extensive preparatory work, including up-to-date P&IDs for HAZOP and multiple expert rounds for Delphi. In contrast, NGT and PHA identified immediate operational risks, such as fall hazards, but lacked the capacity to detect latent vulnerabilities, as found in previous evaluations of heuristic techniques [65].
C4 Resource Intensity: Delphi required structured communication rounds over multiple weeks, a limitation consistent with its known time and participation burdens [53]. HAZOP, likewise, was document- and expert-intensive, echoing the constraints outlined by Kletz [64]. These methods could only be applied to selected subsystems under tight mobilization schedules. Conversely, NGT and PHA were implemented within routine coordination sessions and required minimal materials, a strength noted in the literature regarding low-resource contexts [34,65].
C5 Flexibility and Adaptability: NGT and PHA demonstrated strong adaptability. NGT was applied across different site teams, producing actionable yet distinct risk maps—a flexibility consistent with its application in dynamic construction settings [28]. PHA checklists were updated midstream to capture environmental compliance risks, reflecting its recognized agility [65]. In contrast, HAZOP’s rigid structure resisted adaptation, and Delphi’s linear, round-based protocol proved inflexible under evolving timelines [60].
C6 Decision Support Value: Delphi and HAZOP provided the highest integration with project risk registers and planning. Delphi prompted a proactive reassessment of procurement timelines, while HAZOP outputs informed commissioning procedures—confirming their high decision-support capacity [55,68]. NGT produces enriched toolbox talks and field safety checklists, echoing earlier findings on the utility of its operational decision-making [34], although its strategic reach remains limited. PHA offered early scoping but little downstream integration [66].
C7 Contextual Fit: In bureaucratically layered environments with limited documentation, NGT and PHA aligned well with prevailing institutional practices, supporting engagement without requiring heavy procedural infrastructure—an advantage emphasized in prior studies [21,50,67]. Delphi, although rigorous, was constrained by the availability of experts and the tolerance for iteration [60], whereas HAZOP required significant adaptation in documentation and facilitation [64].
In summary, the comparative application of these techniques within the Water Treatment Plant project demonstrated that method suitability is highly context-contingent. Structured, resource-intensive techniques like Delphi and HAZOP offer deep insights but require institutional maturity, whereas flexible and participatory approaches, such as NGT and PHA, deliver responsiveness under constrained conditions. These findings underscore the necessity of calibrating method selection based on project phase, organizational readiness, and contextual complexity, consistent with the broader risk management scholarship [21,50,67].

5.8. Contextual Decision Support Model for Risk Identification Method Selection

To address the gap between conceptual evaluation and applied method selection, this study proposes a Contextual Decision Support Model grounded in both analytical criteria and real-world project dynamics. Informed by the structured application of risk identification techniques within a complex infrastructure setting, the model synthesizes theoretical rigor with empirical insights to support informed, context-sensitive selection of appropriate methods across diverse project environments [21,50,67]. Figure 4 visualizes the diagnostic pathway introduced above.
The model is designed around key diagnostic checkpoints that reflect observable project attributes such as technical complexity and the need for stakeholder consensus. These checkpoints are explicitly mapped to relevant evaluation criteria. For instance, projects characterized by high technical complexity (e.g., infrastructure, energy) trigger an assessment of whether detailed technical system analysis is required. If so, HAZOP is recommended due to its formalized, scenario-based structure and high diagnostic depth, which is consistent with its established role in identifying compound system failures [55,64]. If not, the Delphi method becomes more suitable, enabling structured expert elicitation with lower documentation requirements and strong potential for synthesizing expert consensus [31,60].
In contrast, low-to-moderate complexity projects (e.g., residential buildings, roadworks) shift the decision logic toward stakeholder dynamics. Where stakeholder consensus is a priority—such as in participatory design or community-driven development—the model points toward the NGT, widely recognized for its inclusiveness and transparency in group decision-making [28,47]. If consensus is not essential, PHA is recommended as a rapid, resource-efficient screening tool suitable for early-stage hazard scanning [65,66].
Each branch of the decision tree is annotated with the evaluative criteria it reflects, enabling users to trace not only the recommended method but also the rationale behind that recommendation. This approach fosters diagnostic transparency, allowing users to understand which methodological features are prioritized under which conditions, thereby supporting adaptive reasoning rather than rigid prescription.
Importantly, the empirical findings from the case study further validate the contextual logic embedded in the model. For instance, while HAZOP proved highly effective in identifying latent technical risks, its resource intensity and documentation demands posed significant challenges during field implementation, reinforcing its suitability only for high-complexity projects with adequate preparatory resources [26]. Delphi, although methodologically robust, encountered constraints related to expert availability and iteration fatigue, suggesting its application is best suited to contexts where asynchronous expert input is feasible [63]. NGT emerged as a highly accessible technique that promoted worker engagement and ownership, though its outputs remained operational and lacked system-level abstraction, confirming its relevance in low-complexity projects with strong site-level participation [34]. PHA, while efficient and easy to deploy, produced generalized insights that required subsequent translation into actionable items—aligning with prior assessments of its role as an early-stage hazard identification tool rather than a detailed planning method [65,66].
Taken together, these empirical patterns corroborate the model’s bifurcated logic and strengthen its practical credibility. Rather than abstract theorization, the model reflects lived project conditions and method performance in action. While the proposed model offers a valuable aid for strategic method selection, it is not intended as a one-size-fits-all tool. Its utility depends on the accurate assessment of project attributes and practitioner judgment. In ambiguous or hybrid projects, where technical, organizational, and social complexities overlap, professional discretion and iterative deliberation remain essential [67]. Nevertheless, by aligning evaluative reasoning with contextual awareness, the Contextual Decision Tree for Risk Identification Method Selection provides a rigorously grounded and practically practical framework for improving methodological alignment in construction risk management. In this sense, the model not only facilitates informed method selection but also cultivates reflective practice in construction risk governance.

5.8.1. Worked Examples: Application of the Decision Model

To illustrate the practical functioning of the decision tree, two detailed scenarios are presented, each highlighting how project-specific characteristics lead to the final selection of an appropriate risk identification method.
The first scenario involves the construction of a metropolitan subway tunnel beneath a densely populated urban district. The project is part of a strategic transport program designed to alleviate congestion in a rapidly growing city. Early investigations reveal uncertain soil stratigraphy, potential water-bearing layers, and proximity to existing underground utilities. These features indicate high technical complexity and significant safety risks. Applying the decision tree, the evaluator first categorizes the project under “high complexity with strong safety-critical components.” This directs the path toward a system-based analytical technique. After following the decision nodes, the final recommendation is HAZOP, as it systematically decomposes tunneling operations into discrete components (e.g., excavation shafts, lining installation, mechanical ventilation, and conveyor systems). Standard guidewords are applied to each node, producing deviations such as “unexpected groundwater inflow,” “insufficient ventilation in confined areas,” and “formwork instability.” For each deviation, the causes, consequences, and safeguards are documented, resulting in a structured hazard register. Final decision: HAZOP is selected because it best matches the project’s technical depth and safety-critical environment.
The second scenario concerns a large-scale social housing development commissioned by a municipal government. Unlike the tunneling project, the housing program involves the repetitive construction of multi-story residential blocks over two years. While the technical elements are relatively standardized, the project faces heightened social sensitivity. Residents express concerns about noise, dust, and traffic disruption; contractors are under pressure to meet tight delivery deadlines; and municipal agencies require stakeholder-inclusive processes. In this context, the decision tree highlights “stakeholder complexity and social sensitivity” as the dominant determinants. This path leads to the branch for group-based consensus. Following the decision nodes, the final recommendation is NGT, since it facilitates structured and inclusive workshops. In practice, six participants (one site engineer, one safety supervisor, and four crew leaders) identified and prioritized 25 distinct risks, including “dust exposure affecting nearby schools” and “traffic congestion from construction logistics.” Through voting and ranking, dust exposure and traffic congestion emerged as top priorities. Final decision: NGT is selected because it provides a participatory, consensus-driven structure that directly addresses stakeholder-related concerns.
Together, these scenarios confirm that the decision tree moves beyond abstract evaluative criteria by producing clear, context-specific outcomes. The subway tunnel case demonstrates that HAZOP is the optimal choice for technically complex and safety-critical settings, while the housing project illustrates that NGT is most effective in socially sensitive and stakeholder-intensive environments. The explicit inclusion of these final decisions demonstrates how the decision tree not only guides the reasoning process but also delivers actionable outputs for practitioners.

5.8.2. Application Pathways: Owners, Contractors and Insurance Companies

While the Contextual Decision Support Model provides a transparent framework for selecting appropriate risk identification techniques, its value ultimately depends on how it can be operationalized by different stakeholders in construction projects. Owners, contractors, and insurance companies approach risk from distinct vantage points: owners emphasize strategic governance and accountability, contractors focus on execution and operational safety, and insurers evaluate the credibility of risk practices to inform financial coverage decisions. By tailoring the decision tree’s diagnostic logic to these different needs, the model offers concrete implementation pathways that bridge methodological guidance with real-world practice.
For project owners, the Contextual Decision Support Model provides a structured tool for aligning risk identification practices with overarching strategic goals. Owners typically prioritize financial predictability, timely delivery, regulatory compliance, and stakeholder legitimacy [69]. The decision tree allows owners to select techniques that best address these concerns at the earliest stages of procurement and planning. For instance, in large-scale, technically complex infrastructure projects, the model directs owners toward HAZOP or Delphi, ensuring that systemic and latent risks (e.g., geotechnical variability, utility conflicts) are systematically assessed before investment decisions are finalized. In contrast, in socially sensitive or community-driven developments, the model emphasizes the suitability of NGT, allowing owners to incorporate local concerns, such as noise, dust, and disruption, into their risk registers. By embedding these method-specific requirements into tender specifications or contract clauses, owners can ensure that risk identification is not left to contractor discretion but becomes a contractual deliverable. This approach aligns with emerging trends in risk-based contracting [70], where method selection is increasingly tied to project governance and accountability.
Contractors must balance technical execution with cost, time, and safety constraints, making efficient and adaptive risk management essential. The decision tree can guide contractors in sequencing risk identification methods in alignment with project phases and available resources. In early stages, contractors may employ PHA for rapid hazard screening (e.g., site access constraints, preliminary excavation risks), providing a foundation for developing early mitigation measures. As detailed designs progress, Delphi can be used to consolidate expert judgments across engineering and subcontractor teams, supporting the refinement of contingency plans. During execution, NGT workshops with frontline supervisors and workers enable the participatory identification of operational risks, such as crane operation hazards, scaffolding instability, or equipment breakdowns. This phased approach helps contractors allocate resources efficiently, reserving high-intensity methods (e.g., HAZOP) for the most critical technical systems, while relying on lighter tools for operational coverage. Evidence from the construction safety literature suggests that participatory techniques, such as NGT, can improve hazard recognition, worker buy-in, and compliance [34,71]. Thus, the model not only enhances methodological rigor but also fosters a safety culture by integrating worker perspectives directly into structured processes.
Insurance providers assess projects not only in terms of financial exposure but also by evaluating the credibility of risk management practices employed by project stakeholders. The decision tree provides insurers with a transparent benchmark for determining whether projects are applying methods proportionate to their technical and contextual complexity. For high-complexity, safety-critical projects, insurers may require evidence that structured analytical techniques such as HAZOP or Delphi have been deployed, thereby reducing the likelihood of latent systemic failures. Conversely, for projects characterized by stakeholder intensity, adoption of NGT is a sign of proactive governance and dispute minimization. This alignment enables insurers to refine their risk pricing models, differentiating premiums based on the demonstrable rigor of their risk identification practices. Similar approaches have been observed in risk-based insurance frameworks where proactive safety and risk management practices result in more favorable premium adjustments [72]. The model thus creates a bridge between technical method selection and financial risk governance, providing insurers with both transparency and assurance in their underwriting decisions.

5.8.3. Applicability in Developed and Global Construction Contexts

While this study is rooted in the context of a developing country infrastructure project, the applicability of the findings can extend beyond such environments when carefully contextualized. Prior research has shown that project governance structures and risk priorities often differ between developing and developed country settings [69]. For instance, while financial predictability and regulatory capacity may dominate in developed economies, institutional fragmentation and resource constraints often shape risk management in developing contexts. Similarly, Zou and Couani [72] emphasize that supply chain vulnerabilities manifest differently depending on local regulatory maturity and industrial capability, highlighting the importance of tailoring risk identification methods to the institutional environment. In this sense, the Contextual Decision Support Model is not intended as a geographically bounded tool, but as a flexible framework that can be adapted to both mature and emerging construction markets.
At the same time, advances in developed country practice provide complementary insights for interpreting and extending the model. Khodabakhshian et al. [73] highlight the growing importance of deterministic–probabilistic integration in risk management for complex projects, suggesting that hybrid frameworks are increasingly valued in high-capacity environments. Taroun [74] similarly points to the limitations of traditional probabilistic models, calling for more context-sensitive approaches that acknowledge multidimensional project dynamics, a principle that underpins the present model as well. More recently, Yazdi et al. [75] have demonstrated the growing role of AI-driven and machine learning–based systems in risk management, which can augment expert-based approaches by providing predictive insights under uncertainty. These contributions suggest that while structured expert techniques remain foundational, their integration with simulation, BIM-enabled risk analytics, and AI-based platforms represent a promising frontier for global practice.
In multinational and global construction companies, the utility of a decision-support framework lies in its ability to harmonize risk identification across projects with widely varying contexts. Zhang et al. [76] argue that knowledge management systems can enhance performance by standardizing risk-related practices across organizational units, a goal closely aligned with embedding diagnostic criteria such as those in the decision tree. Moreover, Lingard et al. [71] emphasize that occupational health and safety risks demand a systemic perspective even in advanced economies, underscoring the continued relevance of structured participatory tools such as NGT. In this light, the proposed model provides a scaffold for global firms to calibrate their method selection according to project complexity, stakeholder dynamics, and cultural environment, while remaining compatible with emerging digital and AI-based systems.
Taken together, these insights reinforce that the decision-support framework developed in this study is not confined to the challenges of developing country settings. Instead, it contributes to the broader agenda of improving risk governance in global construction, offering a flexible foundation that can be tailored to diverse project environments and integrated with cutting-edge digital technologies.

5.8.4. Positioning the Study Within Decision-Support Systems for Construction Risk Management

The decision-support tree developed in this study can also be situated within the broader stream of research on decision-support systems for construction risk management. For example, Dikmen et al. [77] introduced a decision-support tool that integrates risk and complexity assessment through visualization, enabling practitioners to understand project dynamics better. Similarly, Taroun [74] highlighted the limitations of traditional probabilistic models and called for more context-sensitive approaches that capture the multidimensional nature of construction risk. More recently, Khodabakhshian et al. [73] compared deterministic and probabilistic strategies, highlighting the need for hybrid frameworks that strike a balance between methodological rigor and practical applicability. While these contributions provide valuable insights into risk assessment and visualization, the present study emphasizes a different but complementary dimension: guiding the selection of risk identification techniques according to project context and stakeholder needs. In addition to these traditional and hybrid decision-support approaches, Yazdi et al. [75] demonstrated how artificial intelligence can be leveraged in risk management through comparative analysis of AI-driven tools. Their work highlights the growing role of machine learning and intelligent systems in supporting decision-making under uncertainty. While such AI-based frameworks aim to enhance predictive capacity, the present study complements this stream by focusing on the operational selection of risk identification techniques, offering a transparent and context-sensitive decision tree that can be integrated with future AI-driven platforms. Taken together, these approaches illustrate the evolving landscape of risk-informed decision-support tools in construction, where both quantitative modeling and qualitative method-selection frameworks play critical and mutually reinforcing roles.

5.9. Comparative Contextual Evaluation of Risk Identification Techniques

Table 10 provides a comprehensive comparative evaluation of the four risk identification techniques—Delphi, NGT, HAZOP, and PHA—across the seven predefined criteria (C1–C7) established in this study. The matrix is not intended merely as a static summary of strengths (“+”), weaknesses (“−”), and context-dependent outcomes (“±”), but as an interpretive framework that underscores the situational fit of each method. By systematically aligning methodological attributes with project-specific demands, the table functions as a structured decision-support tool that enables practitioners to identify the most contextually appropriate technique rather than assuming a universally superior option [21,37,67].
The results reveal distinct methodological profiles. Delphi stands out for its strong methodological structure (C1) and analytical depth (C3), producing high-quality insights through iterative expert consultation [25,50]. It also demonstrates significant decision-support capability (C6), particularly in complex or strategic settings [68]. However, these benefits are offset by high resource intensity (C4), as Delphi requires considerable time, coordination, and expert availability, and its contextual fit (C7) diminishes in projects that demand rapid outputs [63].
HAZOP similarly excels in its systematic structure (C1) and delivers the highest levels of technical analytical depth (C3) and decision-support relevance (C6), making it highly reliable in safety-critical environments [45,54]. Yet, its dependence on detailed documentation, expert facilitation, and preparatory resources makes it less adaptable in early-stage or resource-constrained projects [26].
In contrast, NGT demonstrates its most significant strengths in stakeholder engagement (C2) and flexibility (C5), encouraging inclusive participation and adaptability across diverse project types. This makes it particularly well-suited for contexts requiring legitimacy and collaborative input [34,57]. However, NGT offers only moderate analytical depth (C3), and the lack of anonymity can expose the process to conformity pressures, particularly in hierarchical organizational cultures [61].
PHA, on the other hand, is characterized by its simplicity and low resource requirements (C4), making it a practical choice for preliminary screening or projects with tight time and budget constraints [65,66]. Its outputs are rapid and adaptable (C5, C7), but its analytical rigor (C3) and decision-support capacity (C6) remain limited, restricting its use in complex, high-stakes environments.
A cross-analysis of the seven criteria reveals essential trade-offs. The balance between analytical depth (C3) and resource demands (C4) is most visible in Delphi and HAZOP, whereas the tension between stakeholder inclusivity (C2) and decision-support robustness (C6) distinguishes NGT and PHA. These interdependencies highlight that evaluation criteria cannot be considered in isolation; instead, they must be understood as part of a broader methodological ecosystem [21,37,67].
In sum, Table 4 transcends mere tabular comparison by operationalizing contextual alignment. Each technique offers a unique balance of strengths and limitations, reinforcing that method selection should be criteria-driven and project-specific. By capturing the interplay between analytical depth, stakeholder dynamics, resource availability, and contextual maturity, the matrix equips practitioners with a transparent, evidence-based framework to enhance the rigor, adaptability, and robustness of risk management strategies in construction projects.

5.10. Radar Chart Visualization of Comparative Performance Across Risk Identification Techniques

To complement the tabular comparison, a radar chart was developed to visualize the relative performance of the four techniques across the seven evaluation criteria (C1–C7). As shown in Figure 5, this visualization highlights not only the numerical trends but also provides an integrated textual interpretation. For instance, Delphi demonstrates strength in methodological structure and analytical depth, consistent with its iterative and systematic expert-driven design [31,60]. However, it is resource-intensive and rigid in practice, as noted in prior critiques of time and participation burdens [63]. NGT appears as a more balanced approach, characterized by high stakeholder engagement and flexibility, which echoes its recognized ability to facilitate inclusive participation across diverse groups [34,57]. However, it lacks systematic analytical rigor due to its limited depth and the absence of anonymity. HAZOP stands out for its highest technical robustness and decision-support capability, aligning with its well-documented capacity for uncovering complex system failures in process industries [55,64]. However, it is heavily dependent on documentation and expert availability, which constrains its application in early-stage or resource-limited contexts. In contrast, PHA offers quick implementation and minimal resource requirements, consistent with its role as a preliminary hazard screening method [65,66]; yet, its analytical depth and decision-support potential remain limited. This dual-layer presentation (visual and textual) enables a holistic understanding of the strengths and weaknesses of each technique, facilitating more explicit comparisons and context-sensitive decision-making.

5.11. Heatmap Visualization of Technique Performance by Evaluation Criteria

To provide an intuitive and comparative overview of how each risk identification technique performs across multiple evaluation criteria, a heatmap visualization was constructed (Figure 6). This tool translates the weighted scores of Delphi, NGT, HAZOP, and PHA into a color-coded intensity map, where darker shades represent higher suitability and lighter shades indicate weaker performance.
The heatmap enables quick pattern recognition, allowing for the identification of techniques that consistently perform well across diverse dimensions and where trade-offs occur. For instance, Delphi demonstrates vigorous intensity in areas of stakeholder engagement and decision support, consistent with its recognized capacity for synthesizing expert judgment through structured rounds [31,60]. However, it exhibits lighter performance in resource efficiency, reflecting the known participation and time demands [63]. NGT presents balanced coloration, with moderate to vigorous intensity in efficiency and adaptability, echoing its effectiveness in inclusive, practice-based engagement [34,57], although with less emphasis on analytical depth due to its qualitative focus. HAZOP, in contrast, exhibits a concentrated intensity in technical rigor and safety-critical contexts, aligning with its established role in uncovering latent system hazards [55,64], while appearing to have lighter resource demands and a higher inclusivity of stakeholders [26]. Finally, PHA demonstrates intense coloration in early-stage applicability and flexibility, consistent with its use as a rapid screening tool [65,66], but shows weaker tones in structured depth and long-term decision support.
By visualizing the comparative scores in a heatmap, the analysis goes beyond numerical averages and highlights clusters of strengths and weaknesses across techniques. This approach provides a holistic perspective for practitioners, enabling them to quickly assess which technique best aligns with the dominant priorities of their project environment.

5.12. Summary and Implications

In summary, the comparative assessment of the four structured risk identification techniques—Delphi, NGT, HAZOP, and PHA—demonstrates that their practical effectiveness in construction projects is primarily shaped by contextual determinants rather than methodological hierarchy. While HAZOP exhibited the most substantial analytical depth and decision-support capability, NGT proved most effective in fostering participatory stakeholder engagement under time- and resource-constrained conditions. Delphi provided robust systemic insights, yet required significant expert availability, whereas PHA enabled rapid screening but offered limited analytical depth. These findings reinforce prior studies (e.g., [26,34,72]) that emphasize the value of structured and participatory approaches, yet they extend the literature by empirically illustrating how contextual alignment—project complexity, stakeholder diversity, and institutional maturity—ultimately governs the applicability.
Methodologically, the study advances a transparent multi-criteria evaluation framework (C1–C7) that integrates empirical evidence with international standards (ISO 31000 [50] and PMBOK Guide 7th Ed. [21]), thereby bridging conceptual models and field implementation. Practically, it delivers a contextual decision-support model, complemented by radar and heat-map visualizations, that helps practitioners balance methodological rigor with feasibility under real-world constraints. Collectively, these contributions provide a holistic and actionable understanding of how structured risk identification can be systematically integrated into construction project management, thereby enhancing both predictive insight and organizational learning.

6. Research Limitations and Recommendations for Further Research

6.1. Limitations of Study

Despite the methodological contributions of this study, several limitations should be acknowledged. First, the expert panels employed in the Delphi (n = 5), NGT (n = 6), HAZOP (n = 4), and PHA (n = 2) applications were relatively modest in size. While such sample sizes are consistent with methodological guidance for structured expert techniques—where depth of expertise is prioritized over breadth [31,55,78,79,80]—they inevitably limit the generalizability of the findings. The comparative insights derived from the study should therefore be interpreted as illustrative rather than statistically representative. Nonetheless, the use of strict inclusion criteria (a minimum of ten years of professional experience, prior involvement in formal risk management strategies, and role-specific expertise) helped enhance the credibility and stability of the consensus within the panels.
Second, the participant pool was intentionally restricted to technical personnel, including project managers, safety specialists, design engineers, and site supervisors. Non-technical stakeholders, such as clients, policymakers, residents, and operators, were not included in the structured exercises. This choice was guided by the study’s primary objective, which was to evaluate the operational strengths, challenges, and trade-offs of the selected risk identification techniques, rather than to produce a fully comprehensive inventory of project risks. As a result, potential biases linked to the exclusion of non-technical perspectives must be acknowledged. Future research could address this limitation by expanding participant diversity to include a broader set of stakeholders, thereby capturing the social and institutional dimensions of risk perception more comprehensively.
Third, this study deliberately adopted an interpretivist stance and therefore did not assign numerical weights to the evaluative criteria (C1–C7). While this qualitative orientation was selected to preserve methodological nuance and contextual richness, the criteria set was intentionally designed to be compatible with quantitative extensions. In future research, these dimensions could be operationalized using multi-criteria decision-making (MCDM) techniques, such as the Analytical Hierarchy Process (AHP) or Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS), which enable weighted comparisons and numerical prioritization of methods. Such extensions were beyond the scope of the present study but represent a promising avenue for integrating interpretivist insights with quantitative decision-support. While no numerical scoring system was applied, the safeguards employed (double-coding, peer review, triangulation) provide methodological robustness and replicability. Future research may extend this framework by utilizing multi-criteria decision-making tools, such as AHP or TOPSIS, to the same criteria set.
Fourth, while the present study captures a static application of four techniques within a single project phase (detailed planning), it is essential to recognize that risk identification is inherently dynamic and iterative [50]. As projects evolve from conceptual design to execution and operation, both the availability of information and the nature of risks change [74]. In early stages, methods such as PHA are particularly suitable for broad hazard scanning under conditions of uncertainty, whereas Delphi may later support structured expert consensus once more technical and organizational data become available. During execution, participatory techniques such as NGT can be valuable for capturing site-based and operational risks [34], while HAZOP is best reserved for phases with mature design documentation and system-level detail. This adaptive sequencing highlights that the choice of technique should not be static, but rather evolve in response to project complexity, stakeholder dynamics, and data maturity. Future research could explicitly investigate phase-based application of risk identification methods, exploring how hybrid or sequential deployment across the project lifecycle can enhance both efficiency and comprehensiveness of risk management.
Finally, the study focused exclusively on four structured methods (Delphi, NGT, HAZOP, and PHA). While these represent established and widely documented techniques, other approaches, including fault tree analysis, bow-tie analysis, fuzzy logic methods, and AI-based risk assessment tools, could also be considered in future work. The exclusion of these alternatives reflects a deliberate scope decision to enable in-depth comparison of the selected techniques, but it also suggests that the findings should be interpreted within this defined methodological boundary.
Taken together, these limitations should not be viewed as diminishing the study’s central contribution. Instead, they provide essential context for interpreting the findings, which remain valuable in advancing comparative, context-sensitive understandings of risk identification methods. At the same time, they highlight fruitful avenues for future research, particularly in terms of incorporating broader stakeholder perspectives and exploring additional methodological approaches.

6.2. Directions for Future Research

6.2.1. Hybrid and Stepwise Applications of Risk Identification Techniques

An additional dimension worth considering is the potential for hybrid or stepwise applications of risk identification techniques. Rather than treating Delphi, NGT, HAZOP, and PHA as entirely separate approaches, future research could explore how they may be combined sequentially or complementarily to address different stages of a project. For instance, PHA can serve as an early-stage screening tool to capture broad categories of hazards, with subsequent HAZOP sessions providing rigorous system-level analysis during the design stage. Similarly, Delphi may be employed to elicit and refine expert insights in contexts characterized by uncertainty, while an NGT workshop could later validate and prioritize risks in a participatory, site-based setting.
The complementarity of these methods is one of their key strengths. HAZOP’s analytical depth can balance PHA’s rapid coverage, while NGT’s inclusiveness and transparency can enrich Delphi’s structured expert consensus. Hybrid pathways, therefore, offer a more holistic and context-sensitive approach, particularly valuable in complex or resource-constrained construction environments. They also create opportunities for efficiency by ensuring that resource-intensive techniques, such as HAZOP, are reserved for areas where their added value is most excellent, while lighter methods, such as PHA or NGT, provide rapid but reliable coverage elsewhere.
Stepwise integration enhances adaptability across project phases. Risks identified through the PHA in the conceptual stage can inform Delphi consultations during detailed design, with the results later validated through NGT in stakeholder coordination meetings. This would transform risk identification from a one-off task into a dynamic, iterative process aligned with evolving project needs. Such an approach resonates with contemporary calls for flexible, context-driven risk governance that moves beyond static or single-method applications.
Evidence from related fields reinforces the value of such integration. In process safety research, PHAs have been combined with HAZOP to focus resources on the most critical system nodes [81,82]. In organizational domains, sequencing Delphi and NGT has been shown to enhance both methodological rigor and inclusiveness by balancing expert-driven refinement with participatory consensus [33]. Building on these precedents, construction risk management could benefit from more systematic exploration of hybrid pipelines—for example, beginning with PHA for broad hazard scanning, followed by Delphi for expert consolidation, NGT for participatory prioritization, and HAZOP for detailed technical analysis.
Although such integrated deployment was beyond the scope of the present study, acknowledging these possibilities highlights a promising avenue for future research and practice. Exploring hybrid and stepwise pathways may not only strengthen methodological robustness but also increase the practical relevance and adaptability of risk identification in diverse construction project contexts.

6.2.2. Emerging Digital Approaches to Risk Identification

While the present study has deliberately focused on structured expert-based techniques (Delphi, NGT, HAZOP, and PHA), it is essential to acknowledge that recent scholarship has increasingly highlighted the role of digital and data-driven approaches in construction risk management. Tools such as Building Information Modeling (BIM)-based risk analysis, artificial intelligence (AI) and machine learning prediction models, and simulation-based techniques are rapidly advancing and are being integrated into industry practice. BIM-based approaches enable the visualization and coordination of risks embedded within design and construction processes, offering dynamic clash detection and scenario planning [83]. AI and machine learning methods, by contrast, provide predictive capacity by processing large-scale project and safety datasets to forecast risk likelihood and severity with increasing accuracy [75]. Simulation tools, including Monte Carlo and system dynamics, further enhance the ability to test probabilistic scenarios and resource allocations under uncertainty [73,74].
These emerging techniques should not be seen as replacements for structured expert-based approaches, but rather as complementary tools. Whereas Delphi, NGT, HAZOP, and PHA provide systematic frameworks for eliciting tacit expert knowledge and fostering participatory consensus, digital methods excel in data processing, visualization, and predictive analytics. A promising direction for future research, therefore, lies in exploring hybrid and integrated models—where expert-driven methods are combined with BIM, AI, and simulation frameworks to capture both qualitative insights and quantitative predictions. Such integration could enhance the adaptability and robustness of risk identification practices across diverse project contexts, ensuring that methodological rigor is matched with technological innovation.

7. Conclusions

This study offered a systematic and empirically grounded comparison of widely used risk identification techniques—Delphi, NGT, HAZOP, and PHA—within the context of construction project management. By employing a multi-criteria evaluation framework and applying each method to a real-world infrastructure project, the research demonstrated that technique selection should not be viewed as a one-size-fits-all decision, but rather as a context-sensitive design choice shaped by project complexity, stakeholder dynamics, and institutional capacity.
The proposed decision-support model provides both theoretical clarity and practical guidance, enabling project stakeholders to align risk identification practices with broader organizational and environmental constraints. Notably, the study highlights that methodological suitability extends beyond analytical precision to include factors such as cognitive bias, participatory equity, and downstream integration potential.
Ultimately, the findings advocate for a more strategic and adaptive approach to risk identification in construction, one that moves beyond static taxonomies toward dynamic, criteria-based configurations capable of enhancing both procedural legitimacy and project resilience.

7.1. Theoretical Contributions

The contribution of this study extends beyond comparative observations by introducing a contextual decision-support framework that systematically integrates evaluative criteria. This multi-criteria framework advances prior models that tend to emphasize a single dimension, such as analytical depth or stakeholder participation, often neglecting the interplay among these attributes in real-world project settings.
The decision tree model developed in this study (see Figure 2) addresses this gap by aligning method selection not only with project technicalities but also with context-specific constraints such as organizational maturity, budget availability, and stakeholder distribution. The implementation was empirically informed, guiding the structure of each technique within the same infrastructure project. For instance, the decision point favoring HAZOP in high-complexity environments is substantiated by its superior performance in uncovering system-level technical hazards during field trials, albeit at the cost of high resource demand and documentation overhead. Conversely, NGT’s suitability for participatory projects was reinforced by its facilitation of inclusive dialogue among operational staff during the on-site session, even if tempered by hierarchical dynamics.
The comparative evaluation framework, which systematically contrasts Delphi, NGT, HAZOP, and PHA across seven interrelated criteria, offers a significant theoretical advancement in the discourse on construction risk identification. It challenges the long-held assumption of methodological neutrality, arguing instead that risk identification techniques are not universally applicable but are highly contingent upon technical, organizational, and institutional conditions.
This insight reframes risk identification from a mechanistic task to a strategic design problem. Rather than seeking an inherently superior method, the study positions each technique as conditionally optimal, depending on its alignment with project-specific demands. Techniques with high analytical depth and structured outputs (e.g., HAZOP, Delphi) are better suited to large-scale or complex projects, while those emphasizing stakeholder inclusivity and procedural simplicity (e.g., NGT, PHA) may prove more effective in resource-constrained or socially sensitive contexts.
A key theoretical contribution is the formalization of contextual fit (C7) as a meta-criterion—extending beyond technical performance to encompass cultural compatibility, organizational behavior, and decision-making norms. This dimension highlights that the epistemological legitimacy of a method is inseparable from the environment in which it is deployed.
By situating method selection within a broader systems-thinking paradigm, the study further conceptualizes risk identification as an upstream determinant of risk management success. Misalignment at this initial stage can cascade into downstream inefficiencies, suboptimal mitigation strategies, or even strategic failure. As such, the choice of technique becomes a foundational element in shaping project resilience.
Furthermore, the model offers diagnostic transparency: each decision branch is annotated with the specific evaluative criteria being activated, helping users not only identify a method but also understand why it is recommended under given conditions. This positions the framework as both a prescriptive and educational tool—bridging the gap between academic typologies and field-level applicability.
Compared to existing taxonomies of risk identification tools, which offer broad categorizations but limited guidance on method selection, the proposed model delivers actionable pathways grounded in empirical performance. Observed trade-offs shaped its development: for example, the infeasibility of Delphi in fast-track project settings due to expert attrition and scheduling constraints, or the limited downstream integration of PHA, which, although time-efficient, required additional steps to convert its high-level findings into structured mitigation plans.
In essence, the decision model reframes method selection as a strategic design problem, where technique suitability emerges not from abstract classification, but from an alignment between method capabilities and project realities. This approach is particularly valuable in project environments—such as construction—where uncertainty, complexity, and resource limitations co-exist and require adaptive, context-aware decision-making.

7.2. Practical Contributions

From a practitioner’s perspective, this study addresses a critical gap in current project management practice: the frequent reliance on intuition, precedent, or institutional habit in selecting risk identification techniques. Instead, it advocates for a structured, evidence-based approach grounded in seven evaluative criteria (C1–C7), enabling practitioners to align method selection with project characteristics and operational constraints.
The framework empowers decision-makers to avoid common mismatches—such as deploying resource-intensive tools in simple projects or using superficial screening methods in high-risk environments. For example, in environments where financial, technical, or human capital is limited, resource efficiency (C4) becomes a decisive factor. Delphi’s iterative format, while analytically robust, may not be viable under accelerated timelines or limited personnel availability. In contrast, NGT offers a lower operational threshold, making it more adaptable to dynamic stakeholder configurations or on-site decision contexts.
Beyond individual project performance, strategic method selection also supports institutional capacity-building. Iterative use of techniques like Delphi fosters internal expertise, while routinizing participatory methods like NGT can cultivate a culture of shared accountability and risk awareness—particularly relevant in fragmented or multi-tiered project teams.
Moreover, the criteria-based model enhances procedural transparency and traceability. As regulatory authorities, funding agencies, and insurers increasingly demand formalized risk management documentation, adopting a structured rationale for technique selection strengthens compliance and facilitates future standardization.
Ultimately, the findings reframe method selection not as a peripheral task but as a strategic intervention with cascading effects on risk identification, prioritization, and mitigation processes across the project lifecycle.

7.3. Methodological Contributions

Methodologically, this study advances the field in two fundamental ways. First, it departs from traditional single-method investigations by offering a comparative, criteria-based assessment of distinct risk identification techniques. This holistic lens allows practitioners and researchers to weigh trade-offs across a multidimensional space, rather than defaulting to familiar or entrenched practices.
Second, the study moves beyond descriptive typologies by introducing a prescriptive decision-support model grounded in empirical case data and validated through contextual application, unlike prior frameworks that emphasize either analytical depth (e.g., HAZOP in process industries) or participatory inclusion in isolation, the model here integrates multiple performance dimensions—creating a practical tool for navigating complex project environments.
This bridging of theory and practice addresses the long-standing methodological divide in the field, highlighting the persistent disconnect between academic sophistication and practical applicability. By offering a replicable and scalable decision model, this study enhances methodological usability, particularly in settings where formal risk governance is still in its early stages and context-sensitive adaptation is crucial.
In sum, the study not only expands methodological rigor but also democratizes its application—positioning structured risk identification as both a scientific discipline and a practical imperative in contemporary project management.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki. In line with standard academic practice for studies involving professional experts, formal ethical approval was not sought, as the research relied solely on expert consultations and workshops without collecting sensitive personal data, medical interventions, or involving vulnerable populations. Participants were engaged exclusively in their professional capacity.

Informed Consent Statement

Informed consent was obtained from all participants involved in the study. Participants were briefed on the purpose of the research, the voluntary nature of their participation, and the confidentiality of their responses. Written consent forms were collected prior to participation, and no personal identifiers were retained in the dataset.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The author acknowledges the assistance of artificial intelligence–based tools in improving the clarity and presentation of this manuscript. Specifically, OpenAI’s ChatGPT (GPT-5, OpenAI, 2025) was utilized solely for language editing, structural refinement, and formatting consistency. The conceptual development, data interpretation, and final editorial decisions were entirely conducted by the author. The author thanks the project stakeholders who shared insights during the case study implementation. Finally, the author also wishes to express his deepest gratitude to his beloved late mother, whose compassion and unwavering faith continue to inspire every academic and personal endeavor, and to his father, for his constant support, patience, and encouragement throughout this journey. Their enduring influence remains an irreplaceable source of strength and purpose.

Conflicts of Interest

The author declares no competing interest.

Abbreviations

The following abbreviations are used in this manuscript:
AHPAnalytical Hierarchy Process
AIArtificial Intelligence
APMAssociation for Project Management
BoKBody of Knowledge
BIMBuilding Information Modeling
CDCCenters for Disease Control and Prevention
CPWRThe Center for Construction Research and Training
HAZOPHazard and Operability Study
HSEHealth and Safety Executive
IQRInterquartile Range
ISOInternational Organization for Standardization
MCDMMulti-Criteria Decision-Making
NGTNominal Group Technique
OHSOccupational Health and Safety
OSHAOccupational Safety and Health Administration
PHAPreliminary Hazard Analysis
PMBOKProject Management Body of Knowledge
PMIProject Management Institute
PRISMAPreferred Reporting Items for Systematic Reviews and Meta-Analyses
TOPSISTechnique for Order Preference by Similarity to an Ideal Solution

Appendix A. Delphi Template

Note (Confidentiality): These questionnaires are illustrative templates; no real participant data is included.

Appendix A.1. General Design and Instructions

Objective: To generate a comprehensive inventory of risks relevant to a large-scale infrastructure project, to prioritize these risks systematically, and to establish expert consensus on their relative impacts through iterative rounds of structured scoring.
Panel Composition: The expert panel consisted of two senior geotechnical engineers, one occupational safety consultant, and two project managers, representing a balanced mix of technical, safety, and managerial expertise relevant to the project context.
Round Structure:
  • Round 1 (R1): Exploration and initial rating, involving open risk listing, structured Likert-scale assessments, and justification of responses.
  • Round 2 (R2): Controlled feedback and re-rating, where participants were provided with group-level statistical summaries (median and interquartile range) and asked to reconsider their ratings, particularly if they diverged significantly from the panel consensus.
Consensus Threshold: Agreement among experts was evaluated using the IQR, with:
  • IQR ≤ 1 interpreted as high consensus,
  • 1 < IQR ≤ 1.5 as moderate consensus,
  • IQR > 1.5 as low consensus
Scales and Scoring: Each risk item was evaluated on six dimensions using a 5-point Likert scale: (i) Likelihood, (ii) Impact, (iii) Proximity, (iv) Detectability, (v) Controllability, and (vi) Confidence. A composite risk score (R) was calculated as the product of Likelihood (L) and Impact (I) (R = L × I), with optional weighting applied for Proximity where relevant.

Appendix A.2. Round 1 Questionnaire (Exploration and Initial Rating)

Section R1.1—Open Risk Listing: In the first stage, panelists were asked to generate a comprehensive list of risks across predefined categories (Financial, Contractual, Supply Chain, Design, Geotechnical, Occupational Health and Safety, Environmental, Stakeholder, Program, Quality, Digital, and External). For each risk, participants were required to provide a brief rationale and specify the affected project objectives (cost, time, quality, and/or safety).
Section R1.2—Structured Rating: In the second stage, the consolidated risk statements were evaluated on six dimensions using a 5-point Likert scale: Likelihood (L), Impact (I), Proximity (P), Detectability (D), Controllability (C), and Confidence (G). Respondents were also asked to indicate the primary source of evidence supporting their assessment (experience, project data, the literature, expert judgment, or other) and to briefly justify their rating. For example, “Critical equipment delivery delay (>8 weeks)” was presented as a risk item to be rated across all scales, accompanied by an explanatory note.
Section R1.3—Prioritization: Finally, panelists were asked to identify and rank the ten most critical risks according to their professional judgment. In addition, they were required to assign relative weights (in percentage terms) to five key evaluation criteria—Safety, Cost, Time, Quality, and Reputation—so as to capture their prioritization logic.
Example Round 1—Questionnaire:
Table A1. Round 1—Consolidated Risk List and Initial Ratings.
Table A1. Round 1—Consolidated Risk List and Initial Ratings.
Risk IDRisk StatementCategoryMedian (L/I)IQR (L/I)Notes
R-03Unexpected groundwater inflows during excavationGeotechnical4/51/1High consensus; safety & cost critical
R-07Critical equipment delivery delay (>8 weeks)Supply Chain3/51/2Moderate consensus; major impact on schedule
R-12Design errors requiring rework during constructionDesign/Quality4/41/1High consensus; recurring issue in past projects

Appendix A.3. Round 2 Questionnaire (Controlled Feedback and Re-Rating)

Section R2.1—Feedback: In the second round, each participant was provided with their own Round 1 (R1) ratings alongside the aggregated panel statistics (median and interquartile range, IQR) for each risk item. Panelists were then asked to re-evaluate their responses in light of the group feedback. If their revised score remained outside the reported IQR, they were required to provide a short rationale (e.g., project-specific considerations, additional evidence, or differing professional judgment).
Section R2.2—Prioritization Update: Experts were subsequently invited to re-rank the ten most critical risks identified in R1. To enhance consensus, pairwise conflict items (e.g., Safety vs. Schedule; Cost vs. Quality) were explicitly presented, and participants indicated which dimension they would prioritize. Respondents were also allowed to revise the relative weightings assigned to the evaluation criteria (Safety, Cost, Time, Quality, and Reputation) if their views had changed after reviewing the group feedback.
Section R2.3—Methodological Insights: To capture reflections on the suitability of different identification techniques, participants were asked to indicate which risks they considered most appropriately addressed by system-based methods (e.g., HAZOP, PHA) or group consensus techniques (e.g., Delphi, NGT). This step provided complementary insights on the methodological fit of each approach in practice.
Section R2.4—Final Comments: In the concluding part of R2, panelists were invited to provide any additional remarks, including suggestions for overlooked risks, clarifications regarding contextual factors, or reflections on the Delphi process itself.
Example Round 2—Questionnaire:
Table A2. Round 2—Feedback and Re-Rating Results.
Table A2. Round 2—Feedback and Re-Rating Results.
Risk IDRisk StatementR1 Median/IQRR2 Median/IQRConsensus StatusRevised Priority RankNotes
R-03Unexpected groundwater inflows during excavation4/5 (1/1)4/5 (1/0)Improved to High ConsensusTop 3Consensus achieved after R2 re-rating
R-07Critical equipment delivery delay (>8 weeks)3/5 (1/2)4/5 (1/1)Consensus improvedTop 5Stakeholder alignment after R2 feedback
R-12Design errors requiring rework during construction4/4 (1/1)4/4 (1/0)Strong consensusTop 4Remained critical risk across both rounds

Appendix A.4. Scoring, Reporting, and Data Quality

Consolidation: Risk items generated in Round 1 were reviewed to eliminate duplicates and to refine vague or overlapping statements into clear, concise formulations suitable for structured evaluation.
Statistical Summaries: Descriptive statistics were computed for each risk, including median and IQR values across all rating scales.
Consensus Logic: Levels of agreement were determined using IQR thresholds, with IQR ≤ 1 interpreted as high consensus, 1–1.5 as moderate consensus, and >1.5 as low consensus, warranting further attention in Round 2.
Confidentiality: Only aggregated outcomes were reported. Individual responses remained anonymous, and no personally identifiable information was disclosed.

Appendix A.5. Glossary for Respondents

Proximity: Refers to the expected time horizon within which a risk is likely to materialize. Risks anticipated to occur in the near term are assigned higher scores, reflecting their urgency and the limited window for preventive action.
Detectability: Denotes the ease with which a potential risk can be identified before it occurs. Risks that are difficult to detect in advance receive higher scores, as their hidden nature may increase the likelihood of unexpected disruptions.
Controllability: Captures the extent to which a risk, once realized, can be managed, mitigated, or contained through corrective measures. Risks that are difficult to control are scored higher, indicating a greater potential burden on project management resources.
Confidence: Represents the respondent’s perceived strength of evidence underpinning their judgment of the risk item. A higher score indicates stronger confidence, based on experience, empirical data, or corroborated expert knowledge.

Appendix B. NGT Template

Note (Confidentiality): These questionnaires are illustrative templates; no real par-ticipant data is included.

Appendix B.1. General Design and Instructions

Objective: To systematically identify, discuss, and prioritize critical risks in a collaborative workshop format, ensuring balanced input from diverse professional perspectives.
Panel Composition: The panel consisted of six participants, including one site engineer, one safety supervisor, and four crew leaders (excavation, formwork, mechanical, and logistics). This composition ensured a balanced representation of technical, operational, and safety perspectives directly relevant to the project context.
Process: The NGT process followed a structured, stepwise procedure designed to ensure equal participation. The steps included (i) silent idea generation, (ii) round-robin sharing of risks, (iii) clarification of listed risks to ensure shared understanding, and (iv) voting and ranking to establish collective priorities.
Consensus Rule: Risks were ranked according to aggregate voting scores, and Kendall’s W was used to assess the degree of agreement among participants in the prioritization of risks.

Appendix B.2. Step 1—Idea Generation and Clarification (R1)

Section N1.1—Silent Idea Generation: In the initial stage, each participant independently compiled a list of potential risks without group discussion. Risks were organized under predefined categories (Financial, Design, Geotechnical, Occupational Health and Safety, Supply Chain, Environmental, and Contractual) to ensure comprehensive coverage.
Section N1.2—Round-Robin Sharing: Participants then shared their listed risks sequentially in a round-robin format. The process continued until no new items emerged, thereby achieving saturation. The facilitator recorded all risks visibly (e.g., on a shared board or worksheet) to enhance transparency and avoid duplication.
Section N1.3—Clarification: The group subsequently clarified the meaning of each listed risk to establish a shared understanding across participants. This stage focused strictly on clarification rather than debate or evaluation, ensuring that all items were accurately defined before moving to the voting stage.
Example Round 1—Questionnaire:
Table A3. NGT—Idea Generation & Consolidation (R1).
Table A3. NGT—Idea Generation & Consolidation (R1).
Risk IDRisk StatementCategoryClarification Notes
N-05Unsafe scaffolding setupOHSClarified as ‘lack of inspection before use’.
N-09Delay in concrete deliverySupply ChainClarified as ‘supplier reliability issue’.

Appendix B.3. Step 2—Voting & Ranking (R2)

Section N2.1—Individual Voting: Each participant independently evaluated the consolidated list of risks. Voting was conducted using either a 1–5 scoring system (with higher scores reflecting greater perceived criticality) or by ranking the ten most significant risks. This ensured that individual judgments were captured prior to any group influence.
Section N2.2—Aggregation: The individual scores were aggregated to generate a group-level priority list. Statistical summaries (mean, median, and frequency distributions) were calculated to highlight the relative importance of risks. This stage provided a transparent basis for identifying the most consistently emphasized risks.
Section N2.3—Re-ranking (if needed): In cases where substantial divergence in scoring or ranking was observed, participants were invited to briefly explain their rationale. Following this discussion, they were given the opportunity to revise their scores or rankings. This iterative adjustment allowed the group to move closer to consensus while still preserving individual perspectives.
Example Round 2—Questionnaire:
Table A4. NGT—Voting & Final Rankings (R2).
Table A4. NGT—Voting & Final Rankings (R2).
Risk IDRisk StatementIndividual Scores (P1–P6)Total ScoreRankNotes
N-05Unsafe scaffolding setup5, 4, 5, 4, 5, 5281High consensus; safety-critical
N-09Delay in concrete delivery3, 2, 4, 3, 3, 4192Moderate consensus

Appendix B.4. Consensus

Consolidation: Risk items raised during the idea generation stage were consolidated by merging duplicates and rephrasing vague or overlapping statements into clear, actionable formulations.
Consensus: The degree of agreement among participants was assessed using Kendall’s W applied to the ranking outcomes, with higher values indicating stronger concordance.
Reporting: Final outputs were documented in the form of tabulated scores, frequency distributions, and consolidated priority rankings. These summaries provided a transparent record of both individual contributions and group-level outcomes.
Confidentiality: Only aggregated results were reported. No individual participant responses were disclosed, thereby ensuring anonymity and compliance with confidentiality requirements.

Appendix B.5. Glossary for Respondents

Voting Score: Numerical score assigned by each participant to indicate the perceived importance of a risk item (higher = more critical).
Rank Order: The position of a risk item in the prioritized list, derived from aggregated voting scores.
Consensus: The extent of agreement among participants regarding rankings, measured through Kendall’s W.
Facilitator: A neutral individual responsible for guiding the process, recording inputs, and ensuring that all participants contributed equally.

Appendix C. PHA Template

Note (Confidentiality): These questionnaires are illustrative templates; no real participant data is included.

Appendix C.1. General Design and Instructions

Objective: To conduct an early-stage screening of potential hazards in order to systematically identify, categorize, and prioritize major risks before progressing to detailed design and construction activities. This proactive approach ensured that critical hazards were considered at the earliest possible stage of project planning.
Panel Composition: The panel was composed of four participants, including one civil engineer, one geotechnical engineer, one safety coordinator, and one mechanical systems designer. This configuration ensured a balanced representation of technical, geotechnical, safety, and mechanical perspectives, thereby capturing the diverse expertise required for comprehensive hazard identification.
Process: The PHA process followed a structured brainstorming format, supported by hazard checklists and expert judgment. The session emphasized the identification of high-level hazards and their potential consequences during the conceptual and feasibility phases of the project lifecycle.
Consensus Rule: Hazards were retained for further consideration based on majority agreement, defined as more than 60% of panelists acknowledging their relevance. Final prioritization was conducted using a standard severity–likelihood matrix, enabling a transparent ranking of hazards according to their risk potential.

Appendix C.2. Step 1—Hazard Identification

Section P1.1—Checklist-Based Identification: Participants first reviewed a structured checklist covering predefined hazard categories (Safety, Environmental, Technical, Operational, and Financial). This ensured systematic coverage of common hazard domains while allowing for the addition of project-specific risks that may not have been captured in the generic categories.
Section P1.2—Brainstorming: Following the checklist review, participants engaged in an open brainstorming session to expand the hazard list. This stage encouraged free input beyond the initial prompts, thereby facilitating the identification of unique or context-dependent risks.
Section P1.3—Clarification: Each identified hazard was then clarified in terms of its underlying causes, potential consequences, and the specific project objectives (e.g., cost, time, safety, quality) it might affect. This step ensured that all hazards were uniformly understood and framed in a manner suitable for subsequent evaluation.
Table A5. PHA—Hazard Identification (Step 1).
Table A5. PHA—Hazard Identification (Step 1).
Risk IDRisk StatementCategoryClarification Notes
P-02Unstable excavation slopesGeotechnicalRisk of collapse during heavy rainfall.
P-06Improper storage of flammable materialsSafetyPotential fire hazard on site.

Appendix C.3. Step 2—Hazard Evaluation

Section P2.1—Severity and Likelihood Rating: Each hazard item identified during Step 1 was independently assessed by participants using a 1–5 ordinal scale for both severity and likelihood. Severity reflected the potential magnitude of adverse consequences (e.g., injury, cost overrun, environmental damage), while likelihood represented the probability of occurrence within the project lifecycle.
Section P2.2—Risk Matrix Plotting: The paired severity and likelihood scores were then plotted on a standard 5 × 5 risk matrix. This visualization facilitated the classification of hazards into distinct zones (e.g., low, medium, high, or critical risk), enabling a clear comparison of relative priorities.
Section P2.3—Ranking: Hazards were prioritized according to their position on the risk matrix, with items falling into the high-severity/high-likelihood quadrant designated as critical. Rankings were further refined through group consensus to ensure that context-specific considerations (such as detectability or controllability) were adequately reflected.
Table A6. PHA—Hazard Evaluation (Step 2).
Table A6. PHA—Hazard Evaluation (Step 2).
Hazard IDHazard StatementSeverity (1–5)Likelihood (1–5)Matrix PositionPriority Rank
P-02Unstable excavation slopes54Critical (Red Zone)1
P-06Improper storage of flammable materials43High (Orange Zone)2

Appendix C.4. Consensus

Consolidation: Hazards identified during Step 1 were consolidated by merging overlapping items and refining vague statements into precise and operationally meaningful descriptions.
Consensus: Agreement was established through majority rule (i.e., hazards retained when endorsed by >60% of participants) and by observing convergence in severity–likelihood scores. This dual approach ensured both procedural transparency and methodological rigor.
Reporting: Final outputs were summarized in structured hazard registers and visualized using severity–likelihood risk matrices. These formats provided a clear overview of hazard distribution and prioritization.

Appendix C.5. Glossary for Respondents

Hazard: A hazard refers to any potential source of harm, loss, or adverse impact on project objectives, including but not limited to safety, cost, time, quality, or environmental performance. In the context of construction projects, hazards may arise from design flaws, technical uncertainties, site conditions, material or equipment failures, or organizational and human factors. Identifying hazards at the earliest stages of a project is critical, as it provides the foundation for effective risk assessment and management.
Severity: Severity denotes the potential magnitude or intensity of damage, disruption, or negative consequences should the hazard materialize. This encompasses outcomes such as injury or fatality, cost overruns, project delays, structural deficiencies, reputational loss, or environmental degradation. Higher severity scores correspond to hazards with more serious or wide-ranging consequences, thereby demanding stronger mitigation strategies and closer monitoring.
Likelihood: Likelihood refers to the estimated probability of a hazard occurring within the lifecycle of the project. It reflects not only historical frequencies and statistical probabilities but also contextual factors such as project complexity, stakeholder capacity, and external conditions (e.g., weather events, regulatory changes). Hazards with high likelihood scores require greater attention because they represent risks that are not only theoretically possible but practically probable in the project setting.
Risk Matrix: The risk matrix is a two-dimensional analytical tool that maps severity against likelihood to prioritize hazards in a systematic and visual manner. By classifying hazards into categories such as low, medium, high, or critical, the matrix supports transparent decision-making and facilitates resource allocation. It also enables comparison across hazards of different types, ensuring that management attention is focused where it is most needed.
Mitigation: Mitigation refers to the set of actions, strategies, or measures proposed to reduce the probability of a hazard occurring, the severity of its consequences, or both. These may include technical controls (e.g., design modifications, safety devices), organizational measures (e.g., training, revised procedures), and contractual or financial provisions (e.g., insurance, contingency planning). Effective mitigation not only lowers the overall risk exposure but also enhances project resilience by ensuring that adverse events can be anticipated, managed, and contained.

Appendix D. HAZOP Template

Note (Confidentiality): These questionnaires are illustrative templates; no real participant data is included.

Appendix D.1. General Design and Instructions

Objective: To systematically identify potential deviations from intended system functions and to evaluate their possible causes and consequences within the context of a construction project. This structured approach ensured that both technical and operational vulnerabilities were captured at an early stage of project planning.
Panel Composition: The panel consisted of two participants, including one project manager and one safety consultant. This configuration provided complementary managerial and safety expertise, ensuring that both organizational oversight and occupational risk perspectives were adequately represented.
Process: The HAZOP process was carried out through structured, team-based sessions in which predefined guidewords were systematically applied to selected system nodes (e.g., excavation phase, formwork system, mechanical installation). For each identified deviation, the panel documented its potential causes, consequences, existing safeguards, and recommendations for improvement.
Consensus Rule: Deviations were retained for further analysis when at least 70% of participants agreed on their criticality. Final prioritization was determined using severity–likelihood scoring, which enabled a transparent and structured evaluation of risks according to their potential impact and probability of occurrence.

Appendix D.2. Step 1—Node Selection and Guideword Application

Section H1.1—Node Identification: The construction system under analysis was subdivided into logical and functionally coherent nodes (e.g., excavation phase, formwork system, mechanical installation) to ensure a structured and manageable scope for the HAZOP. This subdivision facilitated systematic coverage of all relevant processes and minimized the risk of overlooking critical elements.
Section H1.2—Guideword Application: For each node, standard HAZOP guidewords (e.g., No, More, Less, Reverse, Early, Late) were applied to stimulate the systematic identification of potential deviations from intended design or operational conditions. The use of guidewords ensured that deviations were explored consistently across nodes, reducing reliance on ad hoc judgment and enhancing methodological rigor.
Section H1.3—Documentation: For each deviation identified through the guideword analysis, a structured record was created in tabular form. The documentation captured (i) the underlying causes of the deviation, (ii) its potential consequences for project objectives (e.g., safety, cost, schedule, quality), (iii) the existing safeguards in place to mitigate the risk, and (iv) recommended additional measures to address residual vulnerabilities. This standardized documentation ensured transparency, facilitated traceability of judgments, and provided a systematic basis for subsequent evaluation and prioritization.
Table A7. HAZOP—Example Deviation Log.
Table A7. HAZOP—Example Deviation Log.
NodeGuidewordDeviationCauseConsequenceSafeguard/Recommendation
Excavation PhaseMoreExcess water inflowUnexpected groundwater tableSlope instability and delaysInstall dewatering pumps; improve drainage design
Formwork SystemLessInsufficient concrete coverImproper reinforcement placementReduced structural durabilityEnhanced supervision; corrective rework procedure

Appendix D.3. Step 2—Evaluation and Prioritization

Section H2.1—Severity and Likelihood Rating: Each identified deviation was systematically evaluated using a 1–5 ordinal scale for both severity and likelihood. Severity reflected the potential magnitude of adverse consequences (e.g., worker injury, cost escalation, schedule delay, or structural failure), while likelihood captured the estimated probability of occurrence within the project lifecycle. This dual scoring approach provided a quantitative basis for subsequent prioritization.
Section H2.2—Risk Matrix and Ranking: The combined severity and likelihood scores were plotted on a standard 5 × 5 risk matrix to visualize the relative criticality of deviations. Based on their position within the matrix (e.g., high-severity/high-likelihood zone = critical), deviations were ranked and categorized into priority levels (low, medium, high, critical). This structured ranking enabled the identification of hazards requiring immediate attention.
Section H2.3—Recommendations: For deviations categorized as high or critical, specific mitigation measures were proposed by the panel. These included design modifications, procedural controls, and enhanced monitoring mechanisms. Recommendations were recorded alongside each deviation in tabular format to ensure traceability and to support integration into project risk management plans.
Table A8. HAZOP—Evaluation and Ranking (Step 2).
Table A8. HAZOP—Evaluation and Ranking (Step 2).
Deviation IDDeviationSeverity (1–5)Likelihood (1–5)Risk Matrix PositionPriority Rank
H-03Excess water inflow43High (Orange Zone)2
H-07Insufficient concrete cover32Medium (Yellow Zone)3

Appendix D.4. Reporting and Consensus

Consolidation: During the reporting stage, duplicate or overlapping deviations were merged, and vague entries were refined into precise and operationally meaningful descriptions. This step ensured that the final deviation log was both comprehensive and free from redundancy.
Consensus: Consensus among participants was determined by convergence in severity–likelihood ratings and reinforced through team discussion. Deviations were retained as high priority when at least 70% of the panel members agreed on their criticality. This dual criterion strengthened the methodological rigor of the consensus process.
Reporting: The results were documented in standardized HAZOP worksheets and summarized deviation logs. These tabulated outputs provided a transparent overview of deviations, their associated causes and consequences, and the recommended safeguards or mitigation measures, thereby enabling structured integration into the project’s broader risk management framework.

Appendix D.5. Glossary for Respondents

Node: A discrete and logically bounded part of the system or process selected for detailed HAZOP analysis. Nodes are defined to ensure systematic coverage and manageability of the study scope.
Guideword: A standardized prompt (e.g., No, More, Less, Reverse, Early, Late) applied to each node to stimulate the systematic identification of potential deviations from intended functions or conditions.
Deviation: A departure from the intended design or operational conditions, identified through the application of guidewords. Each deviation is further analyzed for its causes, consequences, and safeguards.
Safeguard: An existing control measure (technical, procedural, or organizational) that reduces either the likelihood of occurrence or the severity of consequences associated with a deviation.
Recommendation: A proposed additional action or measure designed to mitigate residual risks where existing safeguards are insufficient. Recommendations typically address design changes, operational adjustments, or monitoring enhancements.

References

  1. Flyvbjerg, B. Survival of the unfittest: Why the worst infrastructure gets built—And what we can do about it. Oxf. Rev. Econ. Policy 2009, 25, 344–367. [Google Scholar] [CrossRef]
  2. Odeck, J. Cost overruns in road construction—What are their sizes and determinants? Transp. Policy 2004, 11, 43–53. [Google Scholar] [CrossRef]
  3. Hinze, J.; Godfrey, R. An evaluation of safety performance measures for construction projects. J. Constr. Res. 2003, 4, 5–15. [Google Scholar] [CrossRef]
  4. Zou, P.X.; Zhang, G.; Wang, J. Understanding the key risks in construction projects in China. Int. J. Proj. Manag. 2007, 25, 601–614. [Google Scholar] [CrossRef]
  5. Hwang, B.-G.; Zhao, X.; Toh, L.P. Risk management in small construction projects in Singapore: Status, barriers and impact. Int. J. Proj. Manag. 2014, 32, 116–124. [Google Scholar] [CrossRef]
  6. Research and Markets. 2024, Construction Market Report 2025. Available online: https://www.researchandmarkets.com/reports/5939618/construction-market-report (accessed on 11 August 2025).
  7. Gundes, S. Trends in global infrastructure investment and financial consequences. Eur. J. Sustain. Dev. Ment 2022, 11, 66. [Google Scholar] [CrossRef]
  8. Kaplan, R.S.; Mikes, A.; Simons, R.; Tufano, P.; Hofmann, M., Jr. Managing risk in the new world. Harv. Bus. Rev. 2009, 87, 68–75. [Google Scholar]
  9. Kishk, M.; Ukaga, C. The impact of effective risk management on project success. In Proceedings of the 24th Annual ARCOM Conference, Cardiff, UK, 1–3 September 2008. [Google Scholar]
  10. Merna, T.; Al-Thani, F.F. Corporate Risk Management; John Wiley Sons: Hoboken, NJ, USA, 2008. [Google Scholar]
  11. Zhang, L.; Li, X. How to reduce the negative impacts of knowledge heterogeneity in engineering design team: Exploring the role of knowledge reuse. Int. J. Proj. Manag. 2016, 34, 1138–1149. [Google Scholar] [CrossRef]
  12. Song, J.; Munyinda, M.; Sarfo, P.A. Examining the impact of risk management practices on sustainable project performance in the construction industry: The role of stakeholder engagement. Front. Built Environ. 2025, 11, 1575827. [Google Scholar] [CrossRef]
  13. Alexandra, L. Collaborative Risk Management in IPD Projects: Challenges and Opportunities. 2025. Available online: https://www.researchgate.net/publication/393165314_Collaborative_Risk_Management_in_IPD_Projects_Challenges_and_Opportunities (accessed on 11 August 2025).
  14. Raz, T.; Michael, E. Use and benefits of tools for project risk management. Int. J. Proj. Manag. 2001, 19, 9–17. [Google Scholar] [CrossRef]
  15. Albasyouni, W.; Kamara, J.; Heidrich, O. Key Challenges and Opportunities to Improve Risk Assessments in the Construction Industry. Buildings 2025, 15, 1832. [Google Scholar] [CrossRef]
  16. Kiral, I.A.; Kural, Z.; Comu, S. Risk identification in construction projects: Using the Delphi method. In Proceedings of the 11th International Congress on Advances in Civil Engineering, Istanbul, Turkey, 21–25 October 2014; pp. 21–25. [Google Scholar]
  17. George, C. The essence of risk identification in project risk management: An overview. Int. J. Sci. Res. IJSR 2020, 9, 973–978. [Google Scholar] [CrossRef]
  18. Zwikael, O.; Ahn, M. The effectiveness of risk management: An analysis of project risk planning across industries and countries. Risk Anal. Int. J. 2010, 31, 25–37. [Google Scholar] [CrossRef]
  19. Abdulwahab, A.; Isa, R.B.; Bello, A.O. Barriers to Adoption of BIM-Based Risk Management in the Construction Industry: A Systematic Literature Review and Bibliometric Analysis. In Proceedings of the Selçuk Scientific Research Congress, Konya, Turkey, 9 July 2023. [Google Scholar]
  20. Lehtiranta, L. Risk perceptions and approaches in multi-organizations: A research review 2000–2012. Int. J. Proj. Manag. 2014, 32, 640–653. [Google Scholar] [CrossRef]
  21. Project Management Institute (PMI). A Guide to the Project Management Body of Knowledge (PMBOK® Guide)—Seventh Edition and The Standard for Project Management; Project Management Institute: Newtown Square, PA, USA, 2021. [Google Scholar]
  22. Aven, T. Risk assessment and risk management: Review of recent advances on their foundation. Eur. J. Oper. Res. 2016, 253, 1–13. [Google Scholar] [CrossRef]
  23. Hopkin, P. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management; Kogan Page Publishers: London, UK, 2018. [Google Scholar]
  24. Ökmen, Ö.; Öztaş, A. Construction cost analysis under uncertainty with correlated cost risk analysis model. Constr. Manag. Econ. 2010, 28, 203–212. [Google Scholar] [CrossRef]
  25. Erfani, A.; Ma, Z.; Cui, Q.; Baecher, G.B. Ex post project risk assessment: Method and empirical study. J. Constr. Eng. Manag. 2023, 149, 04022174. [Google Scholar] [CrossRef]
  26. Tixier, J.; Dusserre, G.; Salvi, O.; Gaston, D. Review of 62 risk analysis methodologies of industrial plants. J. Loss Prev. Process Ind. 2002, 15, 291–303. [Google Scholar] [CrossRef]
  27. Chapman, R.J. The effectiveness of working group risk identification and assessment techniques. Int. J. Proj. Manag. 1998, 16, 333–343. [Google Scholar] [CrossRef]
  28. Humphrey-Murto, S.; Lee, S.H.; Gottlieb, M.; Horsley, T.; Shea, B.; Fournier, K.; Tran, C.; Chan, T.; Wood, T.J.; Cate, O.T. Protocol for an extended scoping review on the use of virtual nominal group technique in research. PLoS ONE 2023, 18, e0280764. [Google Scholar] [CrossRef]
  29. Elhosary, E.; Moselhi, O. Automation for HAZOP study: A state-of-the-art review and future research directions. J. Inf. Technol. Constr. ITcon 2024, 29, 750–777. [Google Scholar] [CrossRef]
  30. Linstone, H.; Turoff, M. The Delphi Method; Addison-Wesley Publishing Company: Reading, MA, USA, 1995. [Google Scholar]
  31. Okoli, C.; Pawlowski, S.D. The Delphi method as a research tool: An example, design considerations and applications. Inf. Manag. 2004, 42, 15–29. [Google Scholar] [CrossRef]
  32. Rowe, G.; Wright, G. The Delphi technique as a forecasting tool: Issues and analysis. Int. J. Forecast 1999, 15, 353–375. [Google Scholar]
  33. McMillan, S.S.; King, M.; Tully, M.P. How to use the nominal group and Delphi techniques. Int. J. Clin. Pharm. 2016, 38, 655–662. [Google Scholar] [CrossRef] [PubMed]
  34. Hallowell, M.R.; Gambatese, J.A. Construction safety risk mitigation. J. Constr. Eng. Manag. 2009, 135, 1316–1323. [Google Scholar] [CrossRef]
  35. Forbes, D.; Smith, S.; Horner, M. Tools for selecting appropriate risk management techniques in the built environment. Constr. Manag. Econ. 2008, 26, 1241–1250. [Google Scholar] [CrossRef]
  36. Fang, H.; Duan, M. Offshore Operation Facilities: Equipment and Procedures; Gulf Professional Publishing: Houston, TX, USA, 2014. [Google Scholar]
  37. Lincoln, Y.S.; Guba, E.G. Naturalistic Inquiry (Volume 75); Sage Publications, International Educational and Professional Publisher: London, UK; New Delhi, India, 1985. [Google Scholar]
  38. Creswell, J.W.; Poth, C.N. Qualitative Inquiry and Research Design: Choosing Among Five Approaches; Sage Publications: Thousand Oaks, CA, USA, 2016. [Google Scholar]
  39. Association for Project Management. Project Risk Analysis and Management (PRAM) Guide; APM: Princes Risborough, UK, 2004. [Google Scholar]
  40. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, 71. [Google Scholar] [CrossRef]
  41. Nawaz, A.; Waqar, A.; Shah, S.A.R.; Sajid, M.; Khalid, M.I. An innovative framework for risk management in construction projects in developing countries: Evidence from Pakistan. Risks 2019, 7, 24. [Google Scholar] [CrossRef]
  42. Cooper, D.F.; Grey, S.; Raymond, G.; Walker, P. Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements; Wiley: Hoboken, NJ, USA, 2017. [Google Scholar]
  43. Albert, A.; Hallowell, M.R.; Kleiner, B.; Chen, A.; Golparvar-Fard, M. Enhancing construction hazard recognition with high-fidelity augmented virtuality. J. Constr. Eng. Manag. 2014, 140, 04014024. [Google Scholar] [CrossRef]
  44. Hillson, D.; Simon, P. Practical Project Risk Management: The ATOM Methodology, 2nd ed.; Management Concepts Press: Tysons Corner, VA, USA, 2012. [Google Scholar]
  45. Valis, D. Selected overview of risk assessment techniques. Trans. VŠB Tech. Univ. Ostrav. Saf. Eng. Ser. 2009, 4, 19–32. [Google Scholar]
  46. De los Pinos, A.J.C.; García, M.d.L.N.G. Critical analysis of risk assessment methods applied to construction works. Rev. de la Construcción J. Constr. 2017, 16, 104–114. [Google Scholar] [CrossRef]
  47. Hillson, D.; Murray-Webster, R. Understanding and Managing Risk Attitude; Routledge: London, UK, 2017. [Google Scholar]
  48. Ling, F.Y.Y.; Hoi, L. Risks faced by Singapore firms when undertaking construction projects in India. Int. J. Proj. Manag. 2006, 24, 261–270. [Google Scholar] [CrossRef]
  49. Smith, N.J.; Merna, T.; Jobling, P. Managing Risk in Construction Projects; John Wiley Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
  50. Hutchins, G. ISO 31000: 2018 Enterprise Risk Management; Greg Hutchins: Portland, OR, USA, 2018. [Google Scholar]
  51. OSHA Occupational Safety and Health Administration. Construction Industry: Safety and Health Regulations for Construction 29 CFR 1926; U.S. Department of Labor: Washington, DC, USA, 2011.
  52. CDC Centers for Disease Control and Prevention. National Occupational Research Agenda (NORA): Construction Sector Council; U.S. Department of Health and Human Services: Atlanta, GA, USA, 2022.
  53. HSE Health and Safety Executive. Annual Health and Safety Statistics for Great Britain: 2024/25; Health and Safety Executive: London, UK, 2025.
  54. Cantarelli, C.C.; Flyvbjerg, B.; Molin, E.J.; Van Wee, B. Cost overruns in large-scale transportation infrastructure pro-jects: Explanations and their theoretical embeddedness. Eur. J. Transp. Infrastruct. Res. 2010, 10, 5–18. [Google Scholar]
  55. Crawley, F.; Tyler, B. HAZOP: Guide to Best Practice; Elsevier: Amsterdam, The Netherlands, 2015. [Google Scholar]
  56. Hsu, C.C.; Sandford, B.A. The Delphi technique: Making sense of consensus. Pract. Assess. Res. Eval. 2007, 121, 10. [Google Scholar]
  57. Delbecq, A.L.; Van de Ven, A.H.; Gustafson, D.H. Group Techniques for Program Planning: A Guide to Nominal Group and Delphi Processes; Scott, Foresman and Company: Glenview, IL, USA, 1975. [Google Scholar]
  58. Garrido, M.V.; Kristensen, F.B.; Nielsen, C.P.; Busse, R.; Kramme, R. Health Technology Assessment and Health Policy-Making in Europe: Current Status, Challenges and Potential; European Observatory on Health Systems and Policies: Brussels, Belgium, 2011. [Google Scholar]
  59. Shen, L.Y.; Wu, G.W.C.; Ng, C.S.K. Risk assessment for construction joint ventures in China. J. Constr. Engi-Neering Manag. 2001, 127, 76–81. [Google Scholar] [CrossRef]
  60. Hasson, F.; Keeney, S.; McKenna, H. Research guidelines for the Delphi survey technique. J. Adv. Nurs. 2000, 32, 1008–1015. [Google Scholar] [CrossRef]
  61. King, M.F.; Bruner, G.C. Social desirability bias: A neglected aspect of validity testing. Psychol. Mark. 2000, 17, 79–103. [Google Scholar] [CrossRef]
  62. Shang, Z.M. Use of Delphi in health sciences research: A narrative review. Medicine 2023, 102, e32829. [Google Scholar] [CrossRef]
  63. Veugelers, R.; Gaakeer, M.I.; Patka, P.; Huijsman, R. Improving design choices in Delphi studies in medicine: The case of an exemplary physician multi-round panel study with 100% response. BMC Med. Res. Methodol. 2020, 20, 156. [Google Scholar] [CrossRef]
  64. Kletz, T.A. Hazop Hazan: Identifying and Assessing Process Industry Hazards; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
  65. Ericson, C.A. Hazard Analysis Techniques for System Safety; John Wiley Sons: Hoboken, NJ, USA, 2015. [Google Scholar]
  66. Khan, F.I.; Abbasi, S. Techniques and methodologies for risk analysis in chemical process industries. J. Loss Prev. Process Ind. 1998, 11, 261–277. [Google Scholar] [CrossRef]
  67. Hillson, D. Managing Risk in Projects; Routledge: London, UK, 2024. [Google Scholar]
  68. Nasa, P.; Jain, R.; Juneja, D. Delphi methodology in healthcare research: How to decide its appropriateness. World J. Methodol. 2021, 11, 116–129. [Google Scholar] [CrossRef]
  69. Winch, G.M. Managing Construction Projects, 2nd ed.; Wiley-Blackwell: Hoboken, NJ, USA, 2010. [Google Scholar]
  70. Osipova, E.; Eriksson, P.E. Balancing control and flexibility in joint risk management: Lessons learned from two construction projects. Int. J. Proj. Manag. 2013, 31, 391–399. [Google Scholar] [CrossRef]
  71. Lingard, H.; Cooke, T.; Blismas, N. Do perceptions of supervisors’ safety responses mediate the relationship between perceptions of the organizational safety climate and incident rates in the construction supply chain? J. Constr. Eng. Manag. 2012, 138, 234–241. [Google Scholar] [CrossRef]
  72. Zou, P.X.W.; Couani, P. Managing risks in green building supply chain. Archit. Eng. Des. Manag. 2012, 8, 143–158. [Google Scholar] [CrossRef]
  73. Khodabakhshian, A.; Puolitaival, T.; Kestle, L. Deterministic and probabilistic risk management approaches in construction projects: A systematic literature review and comparative analysis. Buildings 2023, 13, 1312. [Google Scholar] [CrossRef]
  74. Taroun, A. Towards a better modelling and assessment of construction risk: Insights from a literature review. Int. J. Proj. Manag. 2014, 32, 101–115. [Google Scholar] [CrossRef]
  75. Yazdi, M.; Zarei, E.; Adumene, S.; Beheshti, A. Navigating the power of artificial intelligence in risk management: A comparative analysis. Safety 2024, 10, 42. [Google Scholar] [CrossRef]
  76. Zhang, X.; Mao, X.; AbouRizk, S.M. Developing a knowledge management system for improved value engineering practices in the construction industry. Autom. Constr. 2009, 18, 777–789. [Google Scholar] [CrossRef]
  77. Dikmen, I.; Atasoy, G.; Erol, H.; Kaya, H.D.; Birgonul, M.T. A decision-support tool for risk and complexity assessment and visualization in construction projects. Comput. Ind. 2022, 141, 103694. [Google Scholar] [CrossRef]
  78. Anshuka, A.; Shenoy, U.; Banerjee, S.; Wajekar, P.; Vasvani, V. Large or small panel in the Delphi study? Application of bootstrap technique. J. Evol. Med. Dent. Sci. 2020, 9, 1267–1271. [Google Scholar] [CrossRef]
  79. Harvey, N.; Holmes, C.A. Nominal group technique: An effective method for obtaining group consensus. Int. J. Nurs. Pract. 2012, 18, 188–194. [Google Scholar] [CrossRef]
  80. Vahedian-Shahroodi, M.; Mansourzadeh, A.; Shariat Moghani, S.; Saeidi, M. Using the nominal group technique in group decision-making: A review. Med. Educ. Bull. 2023, 4, 837–845. [Google Scholar]
  81. Khan, F.I.; Abbasi, S.A. Multivariate hazard identification and ranking system. Process Saf. Prog. 1998, 17, 157–170. [Google Scholar] [CrossRef]
  82. Rathnayaka, S.; Khan, F.; Amyotte, P. SHIPP methodology: Predictive accident modeling approach. Part I: Methodology and model description. Process Saf. Environ. Prot. 2011, 89, 151–164. [Google Scholar] [CrossRef]
  83. Wang, L.; Li, W.; Feng, W.; Yang, R. Fire risk assessment for building operation and maintenance based on BIM technology. Build. Environ. 2021, 205, 108188. [Google Scholar] [CrossRef]
Figure 1. Flowchart of methodology.
Figure 1. Flowchart of methodology.
Buildings 15 03806 g001
Figure 2. PRISMA flowchart of the study selection process.
Figure 2. PRISMA flowchart of the study selection process.
Buildings 15 03806 g002
Figure 3. Venn Diagram of Risks Identified Across Delphi, NGT, HAZOP, and PHA.
Figure 3. Venn Diagram of Risks Identified Across Delphi, NGT, HAZOP, and PHA.
Buildings 15 03806 g003
Figure 4. Contextual Decision Tree for Risk Identification Method Selection.
Figure 4. Contextual Decision Tree for Risk Identification Method Selection.
Buildings 15 03806 g004
Figure 5. Radar chart of Delphi, NGT, HAZOP, and PHA across seven evaluation criteria (C1–C7), accompanied by a textual interpretation summarizing each method’s key strengths and limitations.
Figure 5. Radar chart of Delphi, NGT, HAZOP, and PHA across seven evaluation criteria (C1–C7), accompanied by a textual interpretation summarizing each method’s key strengths and limitations.
Buildings 15 03806 g005
Figure 6. Heatmap of Risk Identification Techniques vs. Evaluation Criteria.
Figure 6. Heatmap of Risk Identification Techniques vs. Evaluation Criteria.
Buildings 15 03806 g006
Table 1. Prior Studies on Risk Identification Methods in Construction.
Table 1. Prior Studies on Risk Identification Methods in Construction.
MethodKey StudiesContext (Project/Domain)Sample
Characteristics
OutputsReported Limitations
Delphi[16,30,31,32]Early-stage, large-scale or innovative construction projects (high uncertainty, scarce empirical data)Expert panels (domain-specific, iterative rounds)Identification of latent/uncertain risks; refinement of expert judgmentsTime-consuming; requires carefully designed questionnaires; dependent on expert availability
NGT[33,34]Multi-stakeholder construction projects (e.g., contractor–consultant–client workshops)Small groups (6–10 participants, structured facilitation)Rapid consensus on prioritized risksLimited scalability; facilitator skill critical; potential bias if not well moderated
HAZOP[29,35]Technically complex projects (tunnels, petrochemical, healthcare infrastructure)Multidisciplinary teams (designers, engineers, safety experts)Systematic identification of deviations from intended design/operationHigh resource and documentation demand; requires specialized training; often underutilized in general construction
PHA[10,36]Conceptual design or feasibility phases of construction projectsSmall teams, often managers/engineersBroad hazard screening across safety, environmental, and operational categoriesProvides limited depth; mainly preparatory for advanced techniques (e.g., HAZOP)
Table 2. Inclusion and Exclusion Criteria for Study Selection.
Table 2. Inclusion and Exclusion Criteria for Study Selection.
Inclusion CriteriaExclusion Criteria
  • Studies offering methodological insights into the selected techniques.
  • Applications of these techniques in real-world construction or infrastructure projects.
  • Publications providing comparative evaluation dimensions—qualitative or quantitative.
  • Non-English articles without verified translations.
  • Purely theoretical papers lacking empirical application.
  • Studies confined to non-transferable industries outside the construction domain.
  • Records retrieved from Web of Science or other databases that were not peer-reviewed publications (e.g., editorials, newsletters, non-scholarly sources).
Table 3. Evaluation Criteria for Comparative Framework.
Table 3. Evaluation Criteria for Comparative Framework.
CriterionISO 31000 [50]Key References
C1. Methodological StructureRefers to the degree to which a technique is governed by a formalized process, structured steps, and predefined logic. A robust methodological structure improves repeatability and transparency of risk identification efforts.[27,41,42]
C2. Stakeholder ParticipationMeasures the technique’s capacity to incorporate inputs from diverse stakeholders, enhancing comprehensiveness and legitimacy of identified risks. Particularly important in collaborative and multidisciplinary construction environments.[31,34,43]
C3. Analytical DepthAssesses the level of detail, causality, and interdependencies captured by the technique. High analytical depth is crucial for uncovering complex, latent, or systemic risks in large-scale projects.[22,23,26]
C4. Resource IntensityCaptures the demands imposed by the technique in terms of time, cost, expertise, and logistical support. Critical for method feasibility in resource-constrained environments.[26,27,34]
C5. Flexibility & AdaptabilityRefers to the technique’s ability to accommodate variations in project size, phase, scope, and context. More adaptable techniques are applicable across a broader range of projects.[39,44,45,46]
C6. Decision Support ValueIndicates the extent to which the outputs of the technique facilitate actionable decision-making. A substantial decision-support value enhances the integration of risk outputs into project planning and control.[22,42,47]
C7. Contextual FitEvaluates how well the technique aligns with institutional norms, cultural dynamics, and sector-specific constraints in local countries’ construction industry. Ensures local relevance and implementation feasibility.[4,48,49]
Table 4. Crosswalk of Evaluation Criteria with International Risk Management Standards.
Table 4. Crosswalk of Evaluation Criteria with International Risk Management Standards.
CriterionISO 31000 [50]PMBOK Guide [21]Explanation
C1. Methodological StructureClause 6.3—Risk Assessment ProcessTailoring ConsiderationsEmphasizes structured steps in method selection
C2. Stakeholder ParticipationClause 5.4—Communication & ConsultationStakeholder Engagement PrincipleEncourages participatory identification processes
C3. Analytical DepthClause 6.4—Risk AnalysisRisk Performance DomainDepth of analysis in identifying risk sources and consequences
C4. Resource IntensityClause 4.3—Integration with GovernanceConstraints and Resource AllocationConsiders the time, cost, and personnel demands of each technique
C5. Flexibility & AdaptabilityClause 4.2 & Principle 6—Continual ImprovementTailoring, Complexity DimensionsMethods’ ability to adjust to context or project scale
C6. Decision Support ValueClause 6.5—Risk EvaluationDecision-Making Environment and Data ModelsMethods’ contribution to prioritization and actionability
C7. Contextual FitClause 4.2—Understanding the OrganizationOrganizational Systems and Environment FitCompatibility with institutional, cultural, and regulatory context
Table 5. Summary of the applied risk identification techniques.
Table 5. Summary of the applied risk identification techniques.
TechniqueParticipants/RolesExperienceApplication ProcedureSession DurationArtifacts Used
Delphi2 Senior Geotechnical Engineers, 2 Project Managers, 1 Safety Consultant>10 years eachTwo iterative rounds; Round 1: anonymized questionnaires; Round 2: aggregated feedback for re-evaluationTwo rounds conducted over ~4 weeksStructured R1/R2 questionnaires
NGT1 Site Engineer, 1 Safety Supervisor, 4 Crew Leaders (Excavation, Formwork, Mechanical, Logistics)10–12 years90 min structured workshop; silent listing → round-robin sharing → clarification → anonymous votingFull-day facilitated workshopIdea sheets, voting forms, priority ranking
HAZOP1 Civil Engineer, 1 Geotechnical Engineer, 1 Safety Coordinator, 1 Mechanical Systems Designer10–15 yearsMultidisciplinary team review; process flow diagram analyzed with guidewords (“more,” “less,” “reverse”)One-day team session during detailed designGuideword tables, deviation logs
PHA1 Project Manager, 1 Safety Consultant10–15 yearsSemi-structured session using an adapted checklist across lifecycle phases3 h session during the conceptual stage Hazard checklists
Table 6. Summary of Method Applications in the Case Study.
Table 6. Summary of Method Applications in the Case Study.
MethodTotal Risks IdentifiedUnique RisksOverlaps with Other Methods
Delphi17152
HAZOP23203
NGT25205
PHA17134
Total (Overlapped Risks Excluded)75
Table 7. Categorization of the Identified Risks.
Table 7. Categorization of the Identified Risks.
MethodContextual/Project ManagementOccupational Health and Safety
DelphiBudget underestimation, Design–construction misalignment, Environmental opposition, High groundwater table, Insufficient site planning, Lack of early safety integration, Legal ambiguities in environmental permits, Potential contractor default, Regulatory approval delays, Schedule compression, Supply chain uncertainty, Unforeseen soil variabilityExposure to hazardous materials, Hazardous excavation conditions, Risk of deep excavation collapses in unstable soil, Seismic vulnerability of foundations, Slope instability in temporary works
HAZOPDelayed material delivery affecting sequencing, Design error in mechanical piping system, Incorrect soil classification in design, Stakeholder conflictsCollapse of excavation sidewalls, Compound failure modes, Dust exposure, Electrical short circuit during installation, Exposure to hazardous materials, Exposure to noise above permissible levels, Failure in dewatering system, Improper crane operation, Improper lifting gear selection, Inadequate ventilation in enclosed spaces, Incorrect reinforcement placement, Malfunction in groundwater dewatering systems, Mechanical equipment malfunction, Misalignment of pipeline supports, Overloading of retaining structures, Overloading of temporary scaffolding, Structural instability due to formwork failure, Unexpected groundwater inflow during excavation, Unmarked underground utility strike
NGTConcrete delivery delay, Design change late stage, Logistics bottleneck, Material price escalation, Permit delay, Stakeholder conflicts, Supplier insolvency, Utility strikeCrane accident, Dust exposure, Electrical hazard, Equipment breakdown, Excavation collapse, Flooding on site, Formwork misalignment, Geotechnical instability, Mechanical system failure, Noise complaints, Rebar corrosion, Scaffolding failure, Welding defects, Worker fall from height, Worker fatigue
PHACaught-in or between, Delay in procurement of safety equipment, Design errors in early drawings, Environmental impact from excavation, Failure to obtain timely permits, Insufficient site planning, Stakeholder opposition during concept stage, Utility strikeExcavation collapse, Fall from height, Hazardous material mismanagement, Heavy equipment accidents, Inadequate emergency response planning, Material storage hazards, Noise and vibration disturbances, Undetected geotechnical variability, Struck-by
The items presented in italics denote risks that were identified through more than one method, thereby representing the overlapping set of risks across techniques.
Table 8. Characteristic of the Methods.
Table 8. Characteristic of the Methods.
CriterionDelphi MethodNGTHAZOPPHA
C1. Methodological StructureHigh—Iterative, formal, structured questionnaireMedium—Structured steps, less iterativeVery High—Guideword-based, standardized processMedium—Checklist-style structure
C2. Stakeholder ParticipationModerate—Limited to selected expertsHigh—Interactive, inclusive of all participantsModerate—Technical team focusedModerate—Early-stage multidisciplinary teams
C3. Analytical DepthHigh—Aggregates expert judgment and refinementMedium—Focused on idea generation and rankingVery High—Identifies design deviations and hazardsLow to Medium—Identifies broad categories only
C4. Resource IntensityHigh—Time-consuming, requires multiple roundsLow—Quick sessions, minimal prepVery High—Requires technical documents and facilitationLow—Fast, minimal documentation required
C5. Flexibility & AdaptabilityHigh—Can be customized across domainsHigh—Easily modified based on scopeLow to Medium—Suited for detailed designs onlyHigh—Flexible for early-phase application
C6. Decision Support ValueHigh—Informed by expert convergenceMedium—Group consensus but less analyticalVery High—Detailed outputs for design-level decisionsMedium—Used for early-stage screening
C7. Contextual FitMedium—Requires expert availabilityHigh—Works well in workshops or training groupsLow—Demands high technical maturityHigh—Suitable for low-resource, early-stage use
Table 9. Matrix Summary of Risk Identification Techniques.
Table 9. Matrix Summary of Risk Identification Techniques.
MethodMain StrengthsLimitationsDominant Risk FocusOverlap with
Others
DelphiDeep expert elicitation; accommodates tacit knowledge; systematic consensus-buildingTime-consuming; risk of participant fatigue; requires experienced facilitatorsContextual/PM risks (budget underestimation, regulatory delays, design–construction misalignment); some OHS (hazardous excavation, seismic risks)Overlaps with PHA (permits, site planning) and NGT (stakeholder conflicts)
NGTHighly participatory; inclusive; transparent prioritizationLack of anonymity; potential social desirability bias in hierarchical settingsOHS risks (crane accidents, scaffolding failures, equipment breakdowns, fatigue) and contextual risks (logistics bottlenecks, supplier insolvency)Overlaps with Delphi (stakeholder conflicts) and HAZOP (dust exposure, utility strikes)
HAZOPRigorous, system-based; detailed node analysis; strong for technical hazardsResource-intensive; requires detailed documentation; not suited for early project phasesOHS risks (incorrect reinforcement, electrical hazards, ventilation issues, equipment malfunctions)Overlaps with Delphi (utility conflicts, hazardous excavation) and PHA (early excavation collapse, material exposure)
PHALightweight, rapid screening; efficient for early stagesGeneralized outputs; lacks detail for task-level planningEarly-stage OHS risks (falls from height, emergency response gaps, material mismanagement) and contextual risks (permits, site planning, environmental impacts)Overlaps with Delphi (permits, site planning) and HAZOP (excavation collapse, dust/noise exposures)
Table 10. Comparative Evaluation of Risk Identification Techniques Across Multi-Criteria Dimensions.
Table 10. Comparative Evaluation of Risk Identification Techniques Across Multi-Criteria Dimensions.
CriterionDelphi MethodNGTHAZOPPHA
C1. Methodological Structure(+) Highly structured, systematic, and iterative process
(−) Long implementation time
(+) Clear procedural steps, easy to implement
(−) Lack of anonymity may create conformity pressure
(+) Highly detailed and technically robust procedure
(−) Limited applicability at early project stages
(+) Simple and quick structure
(−) Does not provide in-depth analysis
C2. Stakeholder Participation(+) Deepens expert insights through multiple rounds
(−) Limited participant interaction (no face-to-face)
(+) Encourages active and equal participation
(−) Diversity of views may decline in high power-distance contexts
(+) Intensive interaction among multidisciplinary teams
(−) Limited contribution from non-experts
(+) Can quickly gather input from different stakeholder groups
(−) Engagement may remain superficial
C3. Analytical Depth(+) Enables deep analysis and synthesis of ideas
(−) Requires substantial time and data
(+) Provides moderate analytical depth in practice
(−) Limited systematic technical analysis
(+) Highest level of technical analytical depth
(−) Cannot be applied without sufficient documentation and data
(+) Conducts basic risk screening
(−) Does not offer detailed analysis
C4. Resource Intensity(−) High demand for time, coordination, and human resources(+) Low cost and time requirements(−) High technical expertise and preparation needed(+) Lowest resource requirements
C5. Flexibility & Adaptability(−) Rigid process, difficult to change
(+) Adjustable by varying the number of rounds
(+) Easily adaptable to different project types(−) High dependence on documentation(+) Quickly integrates into early-stage projects
C6. Decision Support Value(+) Strong, data-driven insights for decision-making(±) Strong for short-term decisions, weaker for long-term(+) Directly linkable to risk mitigation planning(−) Weak decision support, requires additional analysis
C7. Contextual Fit(±) Strong where expert access is easy and there is no time pressure
(−) Challenging under time constraints or with a limited expert pool
(+) Ideal for environments with low documentation and rapid decision needs(±) Effective in projects with high documentation and technical maturity
(−) Difficult to apply in developing sectors
(+) Suitable for contexts with limited resources and quick decision-making needs
(+) denotes a strength or advantage of the method in relation to the given criterion; (−) denotes a weakness or limitation; (±) indicates a context-dependent or neutral effect, where the outcome varies according to project-specific conditions.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kiral, I.A. Contextual Evaluation of Risk Identification Techniques for Construction Projects: Comparative Insights and a Decision-Support Model. Buildings 2025, 15, 3806. https://doi.org/10.3390/buildings15203806

AMA Style

Kiral IA. Contextual Evaluation of Risk Identification Techniques for Construction Projects: Comparative Insights and a Decision-Support Model. Buildings. 2025; 15(20):3806. https://doi.org/10.3390/buildings15203806

Chicago/Turabian Style

Kiral, Isik Ates. 2025. "Contextual Evaluation of Risk Identification Techniques for Construction Projects: Comparative Insights and a Decision-Support Model" Buildings 15, no. 20: 3806. https://doi.org/10.3390/buildings15203806

APA Style

Kiral, I. A. (2025). Contextual Evaluation of Risk Identification Techniques for Construction Projects: Comparative Insights and a Decision-Support Model. Buildings, 15(20), 3806. https://doi.org/10.3390/buildings15203806

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop