1. Technical Field
The present disclosure is directed to systems and method for predicting and quantifying contract risk for information technology (IT) service contracts.
2. Discussion of Related Art
Information technology (IT) service contracts allows clients to contract the operation of IT systems and processes to a specialized service provider, so the clients can focus on their core business functions. As such, service providers strive to provide uninterrupted, high quality delivery of service to achieve high levels of client satisfaction, while at the same time maintaining continuous contract profitability.
In practice, a significant number of new service contracts financially underperform when compared to the original budget and plan. This is because service providers often need to make a decision about whether to undertake a contract without having proper access to the client's IT environment to understand potential risks. During an engagement phase prior to contract signing, clients are often reluctant to reveal critical or precise information about their IT operations as there is no guarantee that the service provider they are negotiating with would eventually be the one who takes over their operations.
Contract risk prediction and quantification is a major challenge that IT service providers face today. Service providers need to know about the potential risks for a given new opportunity ahead of contract signing to (1) make educated decisions about whether to undertake the IT operations of a potential client, (2) be proactive about mitigation planning if they are willing to take on a risky contract, and (3) price the contracts accordingly to account for risks that cannot be mitigated.
Another reason for poor financial performance in the early stages of a contract is often the lack of a quantitative approach to objectively evaluate risk impact and prioritize risk management tasks. Existing risk management processes have limitations. Service providers often need to decide on a contract with limited access to the client's IT environment without thoroughly understanding potential risks. Although many risks can be identified at engagement, there are frequently too few resources to manage them all. Even if risks are known ahead of time, it may not be possible to quantify their impact, which makes it difficult to put price contingencies in contracts should the service provider decide to take on a risky contract. Previous research on impact quantification has mostly focused on high level IT risks and associated costs rather than quantifying contract risks at a fine level of granularity.
According to an aspect of the invention, there is provided a method for predicting and quantifying risk in information technology (IT) service contracts that includes comparing features of a new IT service contract with similar features from one or more previous IT service contracts selected from a plurality of previous IT service contracts to calculate a similarity value between each pair of said new IT service contract and one of the one or more previous IT service contracts, aggregating the similarity values, and using the aggregated similarity values with a prediction model to predict contract profitability and risk factors affecting the new IT service contract and to quantify an impact of each predicted risk factor on an expected gross profit margin. The previous contracts include existing contracts and historical contracts no longer in force. The prediction model recommends mitigating actions for each predicted risk factor.
Exemplary embodiments of the invention as described herein generally include systems and methods for using risk prediction models to predict potential contract profitability, relevant contract risks and their impact. Accordingly, while embodiments of the invention are susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit embodiments of the invention to the particular forms disclosed, but on the contrary, embodiments of the invention cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
A financial risk analytics according to embodiments of the present disclosure can enable quality analysts and risk managers to learn about and proactively manage potential contract risks before they materialize, while also providing guidance to contract pricers to include the necessary cost contingencies into pricing considerations, in case of a high risk contract. Financial risk analytics (FRA) includes predictive models built from historical contract data and observed risks, and provides insights on contract profitability as well as potential risks and their impact for a given new opportunity ahead of contract signing. FRA, thus, enables service providers to make educated decisions about whether to undertake the IT operations of a potential client, or proactively mitigate risks for service providers that are willing to take on a risky contract. Finally, service providers can use FRA insights to adjust contract prices according to the predicted risk impact, if risk mitigation is not feasible.
A financial risk analytics (FRA) tool according to an embodiment of the disclosure can provide predictive models to shed light into potential contract risks and quantify their impact, while also recommending mitigation actions for proactive risk management.
(1) Various risk assessments from historical contracts, such as technical, contract and client risk assessments, as well as differentiating characteristics of contracts, which altogether form a contract fingerprint. Characteristics that differentiate contracts include, but are not limited to, geographic locations of IT service contract providers and clients, an industry of the client, total contract value, contract specifics, such as the type of transformation that will be performed on the client's IT environment, e.g., whether the IT service provider will take over the operation of the client's datacenters or not, etc, and the cost case. Each feature in a contract fingerprint can be converted into a numerical or categorical value. For example, risk managers or quality assurance specialists can answer risk assessment questions using one of N/A, Low, Medium, High and Exceptional, which can be mapped to numeric values as N/A=0, Low=1, Medium=2, High=3, Exceptional=4, for use in calculations.
(2) Risk root causes observed from contract reviews for these historical contracts during transition or delivery. Examples of root causes include, but are not limited to, inaccurate staffing plans, inadequate transition plans, committed service delivery time not achievable, client responsibility not fulfilled, etc.
(3) The financial performance of the historical contracts, namely the actual performance compared to the original plan.
Both the root cause analysis data and the financial data can be quantified, and this quantified data is correlated with the contract fingerprint. Trained with the above data, a predictive model according to an embodiment of the disclosure can, for a new contract, based on its fingerprint, (1) calculate probabilities of attaining a range of predicted GP percentages, from which the model can predict whether a new contract is likely to meet the profit target, and if not, miss by how much; (2) breakdown potential risks along with their likelihood of happening and financial impact; and (3) recommend mitigation actions for proactive management of the predicted risks. In the example shown in
An FRA's predictive model according to an embodiment of the disclosure is based on a similarity measure between contracts.
In a prediction model definition according to an embodiment of the disclosure, two contracts are similar if they have similar contract fingerprints. A historical contract data set according to an embodiment of the disclosure includes more than 300 features in each contract fingerprint, although not all features are equally important or useful for risk predictions. To ensure that the more significant features provide a greater contribution to the similarity measure, higher weights are assigned to them. Since a goal of determining contract similarity is to predict risks, weights are assigned to features based on their correlation with the actual similarity between a pair of contracts, in terms of their reported risks.
Referring to
The Pearson's Correlation coefficient is calculated based on the values of (i) and (ii) at step (iii), which, after normalization, is used as a weight (wf) for each feature. Given a target opportunity i, based on the vector of weighted features, i.e., the weighted fingerprint, the Euclidian distance, denoted Dist(i,j), between the target opportunity and each historical contract is calculated in step (iv) by summing over all features the feature distance between each pair of contracts being compared weighted by the Pearson's Correlation coefficient for the feature. The final step is to calculate contract similarity Sim(i,j) between the target opportunity i and each historical contract j from the Euclidian distance Dist(i,j), as shown in step (v).
According to an embodiment of the present disclosure, contract profitability is measured using the change in the gross profit margin, referred to as a GP delta, which is determined by subtracting from the planned GP % the actually observed GP % for a given contract:
GP Delta=GP Plan−GP Actual.
At step 2, once a regression model according to an embodiment of the disclosure is in place, given a new opportunity and its fingerprint, the regression model yields a set of (bucket, probability) pairs that define the probability of the GP delta prediction falling into a specific bucket. For example, a prediction could yield an 85% probability that the GP delta will fall into bucket [0, 5] which would mean a positive GP delta, indicating that the predicted profit margin is 0 to 5% higher than the plan. Finally, at step 3, an expected value for GP delta is calculated by multiplying the mid-points of the ranges, assuming a uniform distribution within the range, by the respective probabilities (pi) of the GP delta falling in that bucket, and summing the products:
While a regression model according to an embodiment of the disclosure as shown in
In an extended model according to an embodiment of the disclosure, illustrated in
Next, a GP delta of the new opportunity, GP DeltaSR, is predicted by taking a weighted average of the GP deltas of the similar historical contracts, whose GP deltas fall into that particular (say [0, 5]) bucket, where the weights refer to contract similarity, which is normalized to have values in the range [0, 1], as shown in
where totalSimilarity(1,N) is a sum of the Similarity's for each i, where i refers to a similar contract within the bucket range [rai, rbi] predicted by a regression model according to an embodiment of the present disclosure where a contract similarity threshold=x %.
For a service provider, knowing that a given opportunity is likely to become unprofitable is often not enough. Service providers also need to know what the potential risks are as well as how to quantify these potential risks to be able to mitigate them before they materialize.
Risk prediction and quantification can also benefit from a contract similarity determination according to an embodiment of the disclosure, as shown in
For each reported risk (or root cause) of a historical similar contract, the potential impact can be calculated by dividing the GP Delta of this similar contract by the number of risks observed for this similar contract. Note that this is an approximation due to a lack of more accurate impact assignment data at the time of building the model, and can be improved if a risk management process according to an embodiment of the disclosure assigns certain impact values to each reported risk. A weighted average of all calculated impacts for this particular risk observed across all similar contracts is calculated such that the weight is determined by the degree of contract similarity (step 2):
The probability of risk k for target opportunity i is calculated at step 3 by taking a weighted average of the number of occurrences across all similar contracts such that the weight is, again, determined by the degree of contract similarity:
To use a tool according to an embodiment of the invention, a user first selects a Geography and a Sector to narrow down the set of available opportunities to analyze ahead of contract signing, and then selects a contract opportunity of interest. Once the opportunity of interest is selected, e.g., Customer X, contract details are shown, and the user can press the Run Prediction button to display the results of an FRA according to an embodiment of the invention.
An FRA tool according to an embodiment of the disclosure can predict the contract profitability (GP Delta) as well as a predetermined number of top potential risks for the target opportunity. For example, for Customer X,
Selecting a particular risk from the top 15 list reveals more information about that risk, as shown in the screenshot of
For example, the screenshot of
Another important step in risk management is risk mitigation. For each predicted risk, FRA can show a set of mitigation steps the user can take to proactively manage that risk before it materializes.
Finally, the user can be presented with a set of similar historical contracts along with their observed risks to enable a more detailed investigation of potential risks, if needed.
Detailed risk definitions, associated mitigation steps and similar contract names In
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The computer system 91 also includes an operating system and micro instruction code. The various processes and functions described herein can either be part of the micro instruction code or part of the application program (or combination thereof) which is executed via the operating system. In addition, various other peripheral devices can be connected to the computer platform such as an additional data storage device and a printing device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
While the present invention has been described in detail with reference to exemplary embodiments, those skilled in the art will appreciate that various modifications and substitutions can be made thereto without departing from the spirit and scope of the invention as set forth in the appended claims.
This application is a continuation of, and claims priority from, U.S. application Ser. No. 13/685,362, of Abbott, et al., filed on Nov. 26, 2012, in the United States Patent and Trademark Office.
Number | Date | Country | |
---|---|---|---|
Parent | 13685362 | Nov 2012 | US |
Child | 13762568 | US |