The term “concentration risk” is sometimes used to refer to the risk of over-concentrating organizational resources. For example, if an organization concentrates its employees in a small number of centers and one of those centers experiences a disruption, then the organization's operational continuity will likely be disrupted. Organizations typically face a tradeoff between increasing managerial efficiency by locating employees in small number of centers and mitigating concentration risk by distributing those employees over a larger number of centers located in a number of different locations or areas.
Organizations are constantly searching for methodologies to determine an appropriate balance between minimizing concentration risk and maximizing efficiencies without exceeding the respective organization's risk tolerance. According to current methodologies, to evaluate concentration risks, some organizations simply perform a high-level review to determine the level of location distribution among its employees. The results of this high-level review are measured against the organization's concentration-risk threshold, which represents the organization's risk tolerance. For example, a common concentration-risk threshold is a percentage of the organization's total number of employees. In this case, for the organization's concentration risk to be considered acceptable, no single center within the organization can house more than a threshold percentage of the organization's total number of employees. Accordingly, if, after executing the high-level review, the organization determines that no single center houses more than the threshold percentage of the organization's employees, then the organization determines that its concentration risk is acceptable. However, if a single center houses more than the threshold percentage of the organization's employees, then the concentration risk is consider unacceptably high.
However, these known methodologies result in inaccurate or incomplete models because they do not consider the criticality of the various processes performed by the employees. Nor do these known methodologies consider the organization's readiness and capability of migrating work from one center to another center in the event of an operational disruption.
In addition to sometimes being inaccurate and incomplete, these known methodologies contemplate high-level reviews that are executed on an ad-hoc basis and that merely provide a snapshot of the organization at the time of the review. Thus, these current methodologies are inherently retrospective and put the organization's decision-makers in a position where they have to react to the results of the high-level reviews, instead of proactively managing the organization. In sum, these known methodologies have a number of inadequacies that impede decision-makers from being able to accurately and comprehensively model concentration risk on a continuous and forward looking basis to enable proactive decision making.
Accordingly, there is a need for systems, devices, methods, and other tools that allow an organization to obtain a comprehensive and accurate model of its concentration risks.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the present disclosure. The summary is not an extensive overview of the disclosure. It is neither intended to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure. The following summary merely presents some concepts of the disclosure in a simplified form as a prelude to the description below
Concentration risk refers to the risk of over-concentrating organizational resources. For example, if an organization over-concentrates its employees that work on a particular process in a small number of locations, then, depending on the importance of the particular process, the organization assumes the risk that its operational continuity may be disrupted and/or that its customers will be negatively impacted if one of those locations experiences a disruption. Embodiments of the present disclosure assess the redundancy and criticality of each identified process within the organization, where redundancy refers to the organization's capacity to move work on a particular process from one center to another center in the event a disruption occurs at one of the centers and where criticality refers to the importance of a particular process to the organization. Based the redundancy and criticality assessments, embodiments of the present disclosure calculate a concentration-risk score for each of the identified processes within an organization.
In an embodiment, a system is provided for determining the concentration risk for a process within an organization. According to this embodiment, the system includes a user interface and a memory device, which comprises: computer-readable program code; integrated-adoption data relating to redundancy of the process; and criticality-to-organization data relating to criticality of the process. The system, according to this embodiment, further comprises a processor operatively coupled to the user interface and the memory device and configured to: execute the computer-readable program code to: receive, via the user interface, process-identifying information comprising an identification of the process; locate in the memory device using the process-identifying information the integrated-adoption data and the criticality-to organization data; utilize the integrated-adoption data to calculate a redundancy score that measures the redundancy of the process; utilize the criticality-to-organization data to calculate a criticality score that measures the criticality of the process; and utilize the redundancy score and the criticality score to calculate a concentration-risk score for the process.
In another embodiment, a method is provided for determining the concentration risk for a process within an organization. According to this embodiment, the method comprises: storing integrated-adoption data relating to the redundancy of the process; storing criticality-to-organization data relating to the criticality of the process; utilizing the integrated-adoption data to calculate a redundancy score that measures the redundancy of the process; utilizing the criticality-to-organization data to calculate a criticality score that measures the criticality of the process; and utilizing the redundancy score and the criticality score to calculate a concentration-risk score for the process.
In yet another embodiment, a computer program product is provided for determining the concentration risk for a process within an organization comprising a computer-readable medium having computer-readable program code stored therein. According to this embodiment, the computer-readable program code comprises: a first code portion configured to store integrated-adoption data relating to redundancy of the process; a second code portion configured to store criticality-to-organization data relating to criticality of the process; a third code portion configured to utilize the integrated-adoption data to calculate a redundancy score that measures the redundancy of the process; a fourth code portion configured to utilize the criticality-to-organization data to calculate a criticality score that measures criticality of the process; and a fifth code portion configured to utilize the redundancy score and the criticality score to calculate a concentration-risk score for the process.
In still other examples, systems and methods are provided to calculate a concentration risk score based on a redundancy score and a criticality score. In at least some arrangements, the redundancy score may be based on or equal to a percentage of total resources associated with a work process at a first center. The redundancy score and determined criticality score may be transmitted to a concentration risk calculating module and a concentration risk score may be determined.
Reference will now be made to the accompanying drawings to describe some aspects of the disclosure, wherein:
Embodiments of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the disclosure are shown. Indeed, the disclosure may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
As will be appreciated by one of ordinary skill in the art in view of this disclosure, the present disclosure may be embodied as a method, system, apparatus, computer program product, or a combination of the foregoing. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.” Furthermore, embodiments of the present disclosure may take the form of a computer program product comprising a non-transitory computer-readable medium having computer-usable program code embodied in the medium.
Any suitable computer-readable medium may be utilized, including a computer-readable storage medium and/or a computer-readable signal medium. A non-transitory computer-readable storage medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor storage system, apparatus, or device. More specific examples of the non-transitory computer-readable storage medium include, but are not limited to, the following: an electrical connection having one or more wires; a tangible storage medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other optical or magnetic storage device.
Computer program code for carrying out operations of embodiments of the present disclosure may be written in an object-oriented, scripted or unscripted programming language such as Java, Pen, Smalltalk, C-HE, or the like. However, the computer program code for carrying out operations of embodiments of the present disclosure may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages.
Embodiments of the present disclosure are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products. It will be understood that each block of the flowchart illustrations, and/or combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a particular machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create mechanisms for implementing the functions/acts specified in the flowchart block or blocks.
These computer program instructions may also be stored in a non-transitory computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture, including instruction means which implement the function/act specified in the flowchart block(s).
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process, such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart block(s). Alternatively, computer program implemented steps or acts may be combined with operator or human implemented steps or acts in order to carry out an embodiment of the disclosure.
As used herein, the term “apparatus” refers to a device or a combination of devices having the hardware and/or software configured to perform one or more specified functions. Therefore, an apparatus is not necessarily a single device and may, instead, include a plurality of devices that make up the apparatus. The plurality of devices may be directly coupled to one another or may be remote from one another, such as distributed over a network. As used herein, the term “organization” refers to any business or non-business entity that has multiple employees performing multiple processes in multiple centers. As used herein, the term “center” refers to a physical location where an organization's employees perform certain processes in furtherance of the organization's operation. The term location may refer to a street address, particular building or portion of a building (e.g., office, suite, floor, etc.), city, state, and the like.
It will be understood by one of ordinary skill in the art that, although
As will be described in greater detail below, in one embodiment, the concentration-risk modeling system 110 is entirely contained within a user terminal, such as a personal computer or mobile terminal, while, in other embodiments, the concentration-risk modeling system 110 includes a central computing system, one or more network servers, and one or more user terminals in communication with the central computing system via a network and the one or more network servers.
The user interface 120 includes hardware and/or software for receiving input into the concentration-risk modeling system 110 from a user and hardware and/or software for communicating output from the concentration-risk modeling system 110 to a user. In some embodiments, the user interface 120 includes one or more user input devices, such as a keyboard, keypad, mouse, microphone, touch screen, touch pad, controller, and/or the like. In some embodiments, the user interface 120 includes one or more user output devices, such as a display (e.g., a monitor, liquid crystal display, one or more light emitting diodes, etc.), a speaker, a tactile output device, a printer, and/or other sensory devices that can be used to communicate information to a person. In one embodiment, the user interface 120 includes a user terminal, which terminal may be used by an employee of an organization owning or leasing commercial real estate to house its workforce.
In some embodiments, the network interface 140 is configured to receive electronic input from other devices in the network 102, including the internal data sources 170 and the external data sources 180. In some embodiments, the network interface 140 is further configured to send electronic output to other devices in a network. The network 102 may include a direct connection between a plurality of devices, a global area network such as the Internet, a wide area network such as an intranet, a local area network, a wireline network, a wireless network, a virtual private network, other types of networks, and/or a combination of the foregoing.
The processing apparatus 130 includes circuitry used for implementing communication and logic functions of the concentration-risk modeling system 110. For example, the processing apparatus 130 may include a digital signal processor device, a microprocessor device, and various analog-to-digital converters, digital-to-analog converters, and other support circuits. Control and signal processing functions of the concentration-risk modeling system 110 are allocated between these devices according to their respective capabilities. The processing apparatus 130 may include functionality to operate one or more software programs based on computer-readable instructions thereof, which may be stored in the memory apparatus 150. As described in greater detail below, in one embodiment of the disclosure, the memory apparatus 150 includes a modeling application 160 and a data-sourcing application 165 stored therein for instructing the processing apparatus 140 to perform one or more operations of the procedures described herein and in reference to
In general, the memory apparatus 150 is communicatively coupled to the processing apparatus 130 and includes computer-readable storage medium for storing computer-readable program code and instructions, as well as datastores containing data and/or databases. More particularly, the memory apparatus 150 may include volatile memory, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data. The memory apparatus 150 may also include non-volatile memory that can be embedded and/or may be removable. The non-volatile memory can, for example, comprise an EEPROM, flash memory, or the like. The memory apparatus 150 can store any of a number of pieces of information and data used by the concentration-risk modeling system 110 to implement the functions of the concentration-risk modeling system 110 described herein.
In the illustrated embodiment, the memory apparatus 150 includes datastores containing general organization data 152, integrated-adoption data 154, criticality-to-organization data 156, and business-continuity-planning (BCP) process data 158. According to some embodiments, the general organization data 152 includes general information about the organization. In some embodiments, the general organization data 152 includes information about each of the organization's centers. For example, for each center, the general organization data 152 includes the center's identification, the center's address, building information about the center, the number of employees at the center, a description of each of the processes performed at the center, a description of which processes the center is capable of performing, the number of employees assigned to each of the respective processes, a description of the center's delivery systems, e.g., computer programs and networks, and other information related to the center.
In some embodiments, the general organization data 152 also includes data about each of the employees of the organization. Linkages may be provided between the employees and the centers such that the data for those employees working in a particular center is linked to the data for that center. The data about each employee may include identification information, indications of which center the employee is assigned to, indications of the line of business and/or job functions of the employee, indications of which processes the employee is involved in executing, indications of which delivery systems the employee uses, and indications of whether the employee is a contractor or an actual employee of the organization. The general organization data 152 may be received from a user via the user interface 120, or may be obtained through electronic communication with another device, such as the internal data sources 170 or the external data sources 180, via the network 102 and utilizing the network interface 140, and then stored in the memory apparatus 150.
According to some embodiments, the integrated-adoption data 154 includes information about the organization's processes and the redundancy of those processes. As used herein, the term “redundancy” refers to an organization's capacity to move work from one center to another center in the event of disruption in one of the centers. For example, in some embodiments, redundancy refers to whether and how quickly a process can be moved from one center to another center. In an embodiment, the integrated-adoption data 154 includes general information about each process within the organization. For example, for each process, integrated-adoption data 154 includes the name of the process, the identification number/code for the process, a description of the process, information about each of the employees assigned to the process, and the manager in charge of the process. The integrated-adoption data 154 includes further information about the processes. This further information is divided into three groups: location-dispersion data 154a; migration-capacity data 154b; and access-to-same systems data 154c. Each of the three groups will be discussed in turn below.
According to some embodiments, location-dispersion data 154a includes data about the location dispersion of the organization's processes. For each process, the location-dispersion data 154a includes the number of centers and the location of each center where the process is executed or capable of being executed. For example, information about the location of a center includes city and address information as well as specific building information. Also, for each process, the location-dispersion data 154a includes information about how many employees are in a particular center executing that process. Linkages may be provided between the employees, the processes, and the centers such that the data for those employees and centers associated with a particular process is linked to the location-dispersion data for that process.
According to some embodiments, migration-capacity data 154b includes information about the distribution across the various centers of: (1) the volume of work for a particular process; and (2) the number of employees that work on a particular process. For each process, migration-capacity data 154b lists each center where work on that process is done. For each listed center, migration-capacity data 154b includes: (1) the percentage of the overall volume of work for that process that is done at that center; and (2) the percentage of the total number of employees that work on that process that are located at that center. For example, work on a particular process may be distributed across multiple centers located in different cities, but if most of the work is being done in one center, then there may be an over-concentration in that center. Accordingly, for each process, migration-capacity data 154b details the distribution across the various centers of the volume of work and number of employees doing the work. Linkages may be provided between employees, processes, and centers such that the data for those employees, processes and centers can be linked to the migration-capacity data.
According to some embodiments, access-to-same-systems data 154c includes information about whether the systems of one center are compatible with systems of another center and whether work from the systems of one center can be transferred to the systems of another center. For example, access-to-same-systems data 154c includes information that indicates whether employees in different centers have access to the same systems and whether employees are trained to work off of the same systems to move work from one center to another center. Access-to-same-systems data 154c includes information that indicates the number of employees that work on the same process and that have access to the same systems. Further, access to same systems data 154c includes information that indicates the total volume of work that is done for a process using the same system. Linkages may be provided between employees, processes, centers, and systems such that the data for those employees, processes, centers, and systems can be linked to access-to-same systems data.
The integrated-adoption data 154 may be received from a user via the user interface 120, or may be obtained through electronic communication with another device, such as the internal data sources 170 or the external data sources 180, via the network 102 and utilizing the network interface 140, and then stored in the memory apparatus 150.
Turning now to the criticality-to-organization data 156. According to some embodiments, the criticality-to-organization data 156 includes information about the criticality of each of the organization's processes. As used herein, the term “criticality” refers to how important a particular process is to the organization. In an embodiment, the criticality-to-organization data 156 is divided into three groups: service delivery-impact data 156a; enterprise-impact data 156b; and operational-impact data 156c. Each of the three groups will be discussed in turn below.
Service-delivery-impact data 156a includes information for each process that indicates the customer impact that would result from a failure of that process. For example, service-delivery-impact data 156a includes information for each process that indicates whether failure of that process will result in customers being denied access to the organization's products and services. For example, service-delivery-impact data 156a also includes information that indicates customer demand for each process and/or customer demand for products and services that result from each process. According to some embodiments, service-delivery-impact data 156a further includes information that indicates the uniqueness and/or customization of each process. If a process is not particularly unique or customized and can be replaced by other, similar processes, then that process has a relative low criticality score. However, if a process is particularly unique and/or customized and cannot be easily replaced by other processes, then the process has a relatively high criticality score. For example, service-delivery-impact data 156a also includes, for each process, information that indicates whether the failure of the process will result in the organization's failure to timely meet customer-imposed deadlines.
Enterprise-impact data 156b includes information, for each process, that indicates the impact on the organization as a whole if the process were interrupted. For example, some processes may be interrupted, but the organization would not feel much impact and the organization's operational continuity would not be significantly affected. However, interruption of some processes would result in severe impact on the organization. For example, some processes are important to multiple aspects of the organization as a whole, and, if one of those important processes were interrupted, the entire organization would be disrupted.
For example, enterprise-impact data 156b includes financial-risk data, which includes information for each process that estimates the economic impact that would result from a failure of that process. In some embodiments, for each process, financial-risk data includes information that indicates the opportunity costs, such as lost revenue, that would result from the failure of that process. Also, for example, financial-risk data includes information that indicates customer demand for each process and/or customer demand for products and services that result for a particular process. This information may also include revenue and profit information associated with products and processes that may be affected by disruption of a particular process. Further, for example, this information includes data that indicates the extent to which delivery of products and services would be affected by failure of the process. According to some embodiments, like the data described above with respect to service-delivery-impact data, financial-risk data may include information that indicates the uniqueness of each process. If a process is not particularly unique and can be replaced by other, similar process, then failure of that process will likely not result in substantial economic impact and, accordingly, that process has a relative low financial risk. However, if a process is particularly unique and cannot be easily replaced by other processes, then the process has a relatively high financial risk.
Also, for example, enterprise-impact data 156b includes regulatory-risk data, which includes information regarding whether there are any legal obligations to continue a particular process. For example, regulatory-risk data includes information regarding whether the organization would violate a law, rule, or regulation if the organizational allows a disruption to one of its processes, such compliance processes that drive SEC or tax filings. Regulatory-risk data also includes any fines that may result from the violation of any law, rule, or regulation.
Also, for example, enterprise-impact data 156b includes reputation-risk data, which includes information that indicates the reputational impact on the organization that would result from the failure of a particular process.
The criticality-to-organization data 156 may be received from a user via the user interface 120, or may be obtained through electronic communication with another device, such as the internal data sources 170 or the external data sources 180, via the network 102 and utilizing the network interface 140, and then stored in the memory apparatus 150.
Operational-impact data 156c includes information, for each process, that indicates the impact on the organization's operational continuity if the process fails. Operational-impact data 156c includes information that indicates how dependent the organization is on the process. For example, some processes are important to multiple aspects of the organization as a whole, and, if one of those important processes failed, the organization's operational continuity would be disrupted, thereby resulting in financial harm to the organization. However, other processes may fail, but the organization would not feel much of an impact and the organization's operational continuity would not be affected because these processes are not important to multiple aspects of the organization. For example, operational-impact data 156c indicates how many and which subdivisions within the organization are dependent on a particular process. If multiple subdivisions within the organization dependent on a particular process, then that process has a relatively high criticality score because the operation of the organization would be impaired if that process failed. For example, processes are often highly critical if their failure would impact equipment, facilities, suppliers, and/or employees that are instrumental to the organization's operational continuity.
Turning now to the BCP process data 158, by way of background, a typical BCP report details procedures for moving work from one center to another center in the event one of the centers experiences a disruption. Typical BCP reports also provide a time-estimate for completing the work migration. For example, a BCP report for a particular process may indicate that the process can be recovered by a backup center in one hour. In this case, for example, suppose a process is performed in two centers, one in the city of Charlotte and the other in the city of New York. Each center serves as a backup for the other. If either the center in New York or the center in Charlotte experiences a disruption, then the other center can pick up the disrupted center's work within an hour.
With that information about BCP reports as background, according to some embodiments, the BCP process data 158 includes information that indicates when each of the organization's processes was last tested for BCP. For example, according to an embodiment, the BCP process data 158, for each process, indicates whether BCP testing has occurred and, if BCP testing has occurred, the last time it occurred. According to other embodiments, the BCP process data 158, for each process, indicates whether a BCP testing has occurred within the last year.
The BCP process data 158 may be received from a user via the user interface 120, or may be obtained through electronic communication with another device, such as the internal data sources 170 or the external data sources 180, via the network 102 and utilizing the network interface 140, and then stored in the memory apparatus 150.
For the sake of clarity and ease of description, the figures provided herein generally illustrate the general organization data 152, the integrated-adoption data 154, the criticality-to-organization data 156, and the BCP process data 158 as each being separate from one another. However, it will be understood that, in some embodiments, these datastores may be combined or the data described as being stored within such datastores may be further separated into additional datastores. For example, in some embodiments, the general organization data 152 includes the integrated-adoption data 154 to combine data about the organization's processes with the general organizational data contained in the general organization data 152 Likewise, the general organization data 152 may include criticality-to-organization data 156 and/or BCP process data 158.
In one embodiment, data within each of the four datastores shown in
As further illustrated by
With reference to
According to an embodiment, redundancy scores are calculated using integrated-adoption data 154. For illustrative convenience, column 204 of table 200 in
Referring to
In the event information is located in the memory apparatus 150 by the processing apparatus 130 that is associated with process, then, as represented by block 312, the modeling application 160 instructs the processing apparatus 130 to calculate a score for location dispersion. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the location-dispersion data 154a of the integrated-adoption data 154 for the particular process. With reference to the exemplary scoring criteria of column 212 of
Referring now to
After the location-dispersion score has been calculated, the modeling application 160 instructs the processing apparatus 130 to calculate a score for migration capacity, as represented by block 316. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the migration-capacity data 154b of the integrated-adoption data 154 for the particular process. With reference to the exemplary scoring criteria of column 212 of
Examples of calculating migration-capacity scores will now be provided with reference to the exemplary-redundancy score table 400 of
Also, for example, to calculate the migration capacity of the reconciliation process, Charlotte, which has six employees, would be identified as the center having the most employees. The aggregated number of employees that do not work in Charlotte is three. The ratio comparing the number of employees that do not work in Charlotte to the number of employees that do work in Charlotte is three to six. Accordingly, the migration capacity for the reconciliation process is 50%. This means that if the center in Charlotte experiences a disruption, then 50% of Charlotte's work can be migrated to Anaheim.
Further, for example, to calculate the migration capacity for the process of processing, New York, which has fifteen employees, would be designated as the center having the most employees. The aggregated number of employees that do not work in New York is eighteen (twelve in Los Angeles plus six in London). Accordingly, the ratio that compares the number of employees that do not work in New York to the number of employees that do work in New York is eighteen to sixteen. Accordingly, the migration capacity of the process of processing is 100% because all of New York's work can be migrated to Los Angeles and London in the event New York is disrupted.
After the migration-capacity score has been calculated, the modeling application 160 instructs the processing apparatus 130 to calculate a score for access to same systems, as represented by block 320. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the access-to-same-systems data 154c of the integrated-adoption data 154 for the particular process. With reference to the exemplary scoring criteria of column 212 of
Examples of calculating access-to-same-systems scores will now provided with reference to the exemplary redundancy-score table 400 of
After the access-to-same-system score has been calculated, the modeling application 160 instructs the processing apparatus 130 to calculate a score for BCP processing, as represented by block 324. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the BCP processing data 158 for the particular process. With reference to the exemplary scoring criteria of column 212 of
Once the BCP processing data 158 has been located, the modeling application 160 instructs the processing apparatus 130 to determine whether BCP testing has ever been conducted. If testing has been conducted, then the modeling application 160 instructs the processing apparatus 130 to determine whether BCP testing was conducted within a year of the inquiry date. According to an embodiment, if BCP testing has never been conducted, then the BCP testing score is 0.20. If BCP testing was conducted more than one year prior to the inquiry date, then the BCP testing score is 0.10. If BCP testing was conducted within a year of the inquiry data, then the BCP testing score is 0.00. A BCP testing score for each of the processes listed in column 404 of table 400 is provided in column 426. From table 400, one can see that BCP testing has never been conducted for the process of processing, but BCP testing has been conducted within the last year for all other processes.
After each of the location-dispersion, migration-capacity, access-to-same-systems, and BCP testing scores have been determined, the modeling application 160 instructs the processing apparatus 130 to input the respective scores in to a redundancy equation to calculate the redundancy score for the particular process under review, as represented by block 328. According to an embodiment, the modeling application 160 instructs the processing apparatus 130 inputs the respective scores into the exemplary redundancy equation provided in column 430 of table 400, where A is the location-dispersion score, B is migration-capacity score, C is the access-to-same systems score, and D is the BCP testing score.
With reference to
According to an embodiment, criticality scores are calculated based on three criticality components: service-delivery impact; enterprise impact; and operational impact. For illustrative convenience, column 504 of table 500 in
Referring to
In the event information is located in the memory apparatus 150 by the processing apparatus 130 that is associated with process, then, as represented by block 612, the modeling application 160 instructs the processing apparatus 130 to calculate a service-delivery-impact score. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the service-delivery-impact data 156a of the criticality-to-organization data 156 for the particular process. With reference to the exemplary scoring criteria of column 512 of
Once this determination is made, the modeling application 160 instructs the processing apparatus 130 to assign a service-delivery-impact score of: one if disruption of the process would result in little or no impact on customers in the medium term; two if disruption of the process would result in delayed and/or minor impact on customers; or three if disruption of the process would result in immediate and/or severe impact on customers.
After the service-delivery-impact score has been determined for the process, as represented by block 618, the modeling application 160 instructs the processing apparatus 130 to calculate an enterprise-impact score. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the enterprise-impact data 156b of the criticality-to-organization data 156 for the particular process. With reference to the exemplary scoring criteria of column 512 of
Once this determination is made, the modeling application 160 instructs the processing apparatus 130 to assign an enterprise-impact score of one, two, or three depending on the exemplary scoring criteria provided for enterprise impact. It should be appreciated that the scoring criteria is set by the organization's decision-makers. For example, for low risk, the decision-makers select a low-risk value that reflects the maximum amount of money that the organization can afford to lose per day with minimum impact on the organization as a whole. For medium risk, the decision-makers select a medium-risk value range that reflects the amount of money that the organization can afford to lose per day with medium impact on the organization as a whole. For high risk, the decision-makers select a high-risk value that reflects the minimum amount of money lost per day that would highly impact the organization as a whole.
If it is determined the amount of money that the organization will lose per day is equal to or less than the low-risk value, then the modeling application 160 instructs the processing apparatus 130 to assign the process a enterprise-impact score of one. If it is determined the amount of money that the organization will lose per day is within the medium-risk value range, then the modeling application 160 instructs the processing apparatus 130 to assign the process a enterprise-impact score of two. If it is determined the amount of money that the organization will lose per day is equal to or higher than the high-risk value, then the modeling application 160 instructs the processing apparatus 130 to assign the process a enterprise-impact score of three.
After the service-delivery-impact score has been determined for the process, as represented by block 622, the modeling application 160 instructs the processing apparatus 130 to calculate an operational-impact score. To do so, the modeling application 160 instructs the processing apparatus 130 to access the memory apparatus 150 and locate the operational-impact data 156c of the criticality-to-organization data 156 for the particular process. With reference to the exemplary scoring criteria of column 512 of
Once this determination is made, the modeling application 160 instructs the processing apparatus 130 to assign an operational-impact score of: one if the process would not need to be restored; two if the process would need to be restored but not within twenty-four hours; or three if the process would need to be restored within twenty-four hours.
After each of the service-delivery-impact, enterprise-impact, and operational-impact scores have been determined, the modeling application 160 instructs the processing apparatus 130 to calculate the criticality score for the particular process under review, as represented by block 428. Determining the criticality score will be discussed with references to
According to an embodiment, the modeling application 160 instructs the processing apparatus 130 to determine an average-criticality-component score for each of the processes listed in column 704. To do so, the processing apparatus 130 calculates the average of the service-delivery-impact score, the enterprise-impact score, and the operational-impact score for each of the processes. The average of these scores is the average of the service-delivery-impact score. Column 720 lists the average-criticality-component score for each of the processes listed in column 704.
Then, the modeling application 160 instructs the processing apparatus 130 to access the exemplary component-to-criticality conversion table 800 of
After calculating a redundancy score and a criticality score for each process, the modeling application 160 instructs the processing apparatus 130 to calculate a concentration-risk score for each process. However, before describing the process for calculating concentration-risk scores, a brief recap of redundancy scores and criticality scores will be provided. The redundancy score for a process represents the organization's capacity to move work on that process from one center to a backup center(s). For example, in the event a center is disrupted, a process with a high redundancy score is less likely to be disrupted than a process with a low redundancy score, because work on the process with the high redundancy score will more likely be moved from the disrupted center to a backup center. In the examples provided above, redundancy is measured on a scale of zero to one-hundred, where zero represents the most concentration risk because work on the process cannot be easily moved from the disrupted center to a backup center and where one-hundred represents the lest concentration risk because work on the process can be easily moved from the disrupted center to a backup center.
Turning now to criticality scores. The criticality score for a process represents the relative importance of that process to the organization. For example, if a process with a high criticality score is disrupted, the organization will be impacted more than if a process with a low criticality score were disrupted. Accordingly, it is good practice to ensure that processes having a high criticality score also have a high redundancy score. The redundancy score of a process of having a high criticality can be achieved by increasing the location dispersion of the centers working on that process, increasing migration capacity by spreading out employees that work the critical process among the dispersed centers, increase access to same systems by installing the same systems in as many of the dispersed centers as possible, and regularly conducting BCP testing.
With that as a brief recap, concentration-risk scores and calculating concentration-risk scores will now be described in more detail with reference to
Column 916 lists the processes in rank order from the process having the highest concentration-risk score to the process having the lowest. The organization's decision-makers can quickly glean from the concentration-risk scores of table 900 that the processes of exception handling and reconciliation have unacceptably high concentration risk and that all other processes have acceptable concentration risk. After identifying the processes of exception handling and reconciliation as having unacceptably high concentration risk, the organization's decision-makes can then determine the primary causes of the high concentration risk by reviewing table 400 of
As indicated in table 400, the process of exception handling has a low location-dispersion score because all of its employees are located in the same city, Charlotte. Further, because all of its employees are in Charlotte, the process of exception handling has 0% migration capacity and 0% access to same systems. Accordingly, to decrease concentration risk, decision makes can open another center in a different city, location, or country. As indicated in table 700, the process of exception handling has a relatively low criticality score. Accordingly, to decrease concentration risk to an acceptable level, the decision makers do not have to increase the redundancy score by quite as much as they would if exception handling had a higher criticality score. Accordingly, instead of opening a backup center in another country, which would be expensive, the decision makers can open a backup center in a different city or location. Further, if the decision-makers open more than one backup center, they do not have to install the same systems in all of the backup systems, because an access to same systems score of 100% is not necessary to decrease concentration risk to an acceptable level. Nor do they have to reassign many employees from Charlotte to the newly created backup centers.
Also, as indicated in table 400, the process of reconciliation has the second worst (i.e., highest) redundancy score. Because reconciliation has a higher criticality score than exception handling, it has to have a lower (i.e., better) redundancy score than reconciliation in order to have an acceptable concentration-risk score. To reduce reconciliation's redundancy score, the decision makers could open a backup center in a country outside of the organization's home country, thereby increasing the location dispersion score from three to four. However, the cheapest option would likely be to increase reconciliation's migration capacity by relocating one employee from the largest center in Charlotte to the backup center in Anaheim.
The concentration risk modeling system 1000 may further include a criticality score module 1006 for calculating a criticality score for a work process within an organization. As discussed above, the term “criticality” as used herein may refer to how important a particular work process is to the organization. For instance, criticality, according to at least some aspects of the disclosure, considers the impact on the organization's customers if a particular process is disrupted, the impact the organization as a whole if a particular process is disrupted, and the impact on the organization's operational continuity if a particular process is disrupted. Calculation of the criticality score is discussed above and will be discussed more fully below.
The redundancy score module 1004 and criticality score module 1006 transmit scores for a work process within a center of an organization to a concentration risk calculating module 1008. The concentration risk calculating module 1008 may combine the redundancy score and criticality score to obtain a concentration risk score for a work process or plurality of work processes. In some examples, a concentration risk score may be calculated for each center or location in which the process is performed. The concentration risk score may be transmitted to a user via one or more user computing devices 1010a-1010c, such as a user mobile device 1010a, such as a smart phone, cell phone, etc., a user personal digital assistance (PDA) 1010b, and/or a user computer terminal 1010c (e.g., laptop, desktop, notebook, etc.).
In step 1106, a total number of resources within the organization associated with the work process may be determined. In some examples, the total number of resources may be the sum of the number of resources associated with the work process at each center. In step 1108, a percentage of total resources associated with the work function at the at least one center may be determined. In examples in which the number of resources at each center has been determined, the percentage for each center may be calculated. This percentage may be calculated using the following equation:
In step 1110, this percentage may be transmitted as the redundancy score for the center, for instance, to a concentration risk modeling system or concentration risk calculating module for further processing.
Columns 1212-1218 provide a redundancy score for each center for each process. This redundancy score may be a percentage of the total resources associated with the process at each center (e.g., the number of resources at each center divided by a sum of the value in columns 1204-1210 and multiplied by 100). For example, process 1 has seven total resources associated with the process (sum of 4 in Center 1 plus 3 in Center 4). Accordingly, a redundancy score for Center 1 for process 1 may be:
This redundancy score may be combined with a determined criticality score to determine a concentration risk score. As discussed above, criticality scores may be calculated based on three criticality components: service-delivery impact; enterprise impact; and operational impact.
For instance,
In step 1308 a concentration risk score may be determined based on the redundancy score and criticality score. In some examples, the concentration risk score may be calculating according to the following equation:
The calculation of the concentration risk score using a redundancy score based on a number of resources and percentage of resources at a center may simplify the calculation of the risk score and may provide more consistent, repeatable results. Further, by having fewer variables in the redundancy score calculation, there is less opportunity for error, misrepresentation of data, inaccurate data, etc.
Various aspects associated with the concentration risk modeling system and calculation of redundancy score, criticality score, concentration risk score may be used in whole or in part with various other aspects, methods, etc. for calculating the various scores. Nothing in the specification and figures should be viewed as limiting the calculation of redundancy score, criticality score, and/or concentration risk score to the arrangements shown. Rather, the scores may be calculated according to any method described herein, including a combination of methods, without departing from the disclosure.
While certain exemplary embodiments have been described and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not restrictive on the broad disclosure, and that this disclosure not be limited to the specific constructions and arrangements shown and described, since various other changes, combinations, omissions, modifications and substitutions, in addition to those set forth in the above paragraphs, are possible. Those skilled in the art will appreciate that various adaptations and modifications of the just described embodiments can be configured without departing from the scope and spirit of the disclosure. Therefore, it is to be understood that, within the scope of the appended claims, the disclosure may be practiced other than as specifically described herein.
The methods and features recited herein may further be implemented through any number of non-transitory computer readable media that are able to store computer readable instructions. Examples of non-transitory computer readable media that may be used include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, DVD, or other optical disc storage, magnetic cassettes, magnetic tape, magnetic storage and the like.
While illustrative systems and methods described herein embodying various aspects are shown, it will be understood by those skilled in the art that the disclosure is not limited to these embodiments. Modifications may be made by those skilled in the art, particularly in light of the foregoing teachings. For example, each of the elements of the aforementioned embodiments may be utilized alone or in combination or sub-combination with the elements in the other embodiments. It will also be appreciated and understood that modifications may be made without departing from the true spirit and scope of the present disclosure. The description is thus to be regarded as illustrative instead of restrictive on the present disclosure.
This application is a continuation-in-part of pending application Ser. No. 12/651,663, filed Jan. 4, 2010, and entitled “Concentration Risk Modeling,” the content of which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 12651663 | Jan 2010 | US |
Child | 12900630 | US |