1. Field of the Invention
The present invention generally relates to risk analysis for services project management by measuring and managing duration of activities and, more particularly, to a project risk management process that performs steps which will identify the best resource scenario in order to maintain the project schedule and budget, and/or to provide corrective or remedial controls to bring a project back on schedule and budget. The project risk management process utilizes a computer resource based collaborative resource management system that assists in the identification of critical resources and allows those resources to be shared across projects to ensure timely and efficient completion of one or more projects. An important feature of the invention is that it addresses risk management for a plurality of activities across one or more concurrent services projects within an organization.
2. Background Description
Service projects consist of multiple activities that take certain amounts of time (duration) and resources to complete. Since the time it takes to complete an activity is uncertain, there is a need to understand and manage such uncertainty. During project planning and execution, program managers have been generally unsuccessful in managing the risk factors that cause such uncertainty. Known techniques and solutions for project management do not have well established and articulated ways to deal with uncertainty and risk. Known solutions typically use point estimates of activity durations and costs. They also assume a single resource scenario for an activity. Point estimates do not reflect the potential uncertainty in activity duration and cost, and therefore do not give any indication about the overall risk of a project. In addition, a single resource scenario does not leave any flexibility to activity managers and project managers to alter the project duration by changing resource allocation. As a result of the lack of such techniques, it is common for projects to go over budget and get delayed.
Multiple papers discuss risks that occur specifically in the context of outsourcing engagements. In a recent paper, H. Taylor, “Critical Risks in Outsourced IT Projects: The Intractable and the Unforeseen.” Comm. ACM 49 (11), 75 (2006), identified overoptimistic schedules and budgets as the most likely risk to occur, and probably the most difficult to mitigate. A. Cole, “Runaway Projects—Cause and Effects.” Software World (UK) 26(3), pp. 3-5 (1995) also points out that runaway IT projects, even those in services, often have significant overruns in both cost and schedule. Interviews with project executives and project managers reinforce that outsourcing transition engagements often are problematic with respect to projected schedules and resource costs.
Many other surveys attempt to catalog project-level risks—see, for example, M. Sumner, “Risk Factors in Enterprise Wide Information Management Systems Projects.” Journal of Information Technology, Volume 15, Number 4, December 2000, L. Wallace and M. Keil, “Software Project Risks and their Effect on Outcomes,” Comm. ACM, Vol. 47 (4), April 2004, and H. Taylor, “The Move to Outsourced IT Projects: Key Risks from the Provider Perspective,” Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research, Atlanta, Ga., Apr. 14-16, 2005. These surveys mostly apply to software development, but are relevant to services outsourcing, which often includes some level of software integration or implementation. In addition to cost and schedule, risks often mentioned include poorly documented or misunderstood contracts or requirements, inexperienced project management, frequent scope changes, and lack of a shared vision between the client and the vendor. However, there seems to be little agreement on how to take risks into account during project planning or implementation. T. Addison and S. Vallabh. “Controlling Software Project Risks—an Empirical Study of Methods used by Experienced Project Managers.” Proceedings of SAICSIT, pp 128-140, 2002, surveyed project managers and identified a set of risks and their most commonly reported mitigation strategies, but in general, little guidance on quantitative steps in risk mitigation is found.
The BBN approach to quantifying project risks is becoming increasingly popular. Chin-Feng Fan and Yuan-Chang Yu, “BBN-based Software Project Risk Management,” J. Systems and Software 73(2), pp. 193-203, 2004, designed a BBN-based procedure to support decision-making through continuous monitoring of risks during execution of a project. Their approach modeled risks based on the probability of occurrence multiplied by their potential damage cost. They considered the total cost of an activity as a combination of the increased cost due to added resources weighed against the decreased risk as the activity neared completion. This provided an optimization point for tradeoff of cost and risk. As an ongoing project was monitored, project metrics were fed into a BBN to update the risk estimates for the optimization step.
D. Nasir, B. McCabe and L. Hartono, “Evaluating Risk in Construction-Schedule Model (ERIC-S): Construction Schedule Risk Model.” J. Construction Eng. and Management, 129(5), pp. 518-527 (2003), identified risks in construction schedules and formed a BBN to capture the risk interrelationships. The conditional probability tables for the BBN were determined through interviews with experts. They then connected this risk network to a set of eight categories, or groups, of activities to estimate the effect of risk factor combinations on the durations of actual activities within each group. The disadvantage of this approach is that it does not specify the risks tied to each individual activity within a project. Further still, this does not identify specific risk factor combinations that affect the duration of each activity separately and cannot look across multiple projects being performed concurrently.
There is a need for a simplified computer implemented method for project risk management. There is a particularly acute need for a computer implemented method which assists a manager in making changes after a project has begun to get the project back on schedule and on budget. Further, within an organization that has multiple projects, there is a need for a computer implemented method for project risk management which takes into account resource sharing amongst several projects.
It is therefore an exemplary embodiment of the present invention to provide a computer implemented project risk analysis method for at least one of one or more projects each of which can be broken down into a plurality of activities. In this exemplary embodiment, the activity durations are estimated based on resource allocations for the activity, and a plurality of risk factors for the completing the projects are mapped to one or a plurality of the activities to provide quantitative project planning information which accounts for various risk factors. Mapping of the risk factors to activities can be structured according to a Bayesian Belief Network (BBN).
Another exemplary embodiment of the present invention is to provide updating of the plurality of risk factors after a project has started and before it has been completed. This allows for calculating risk factors based on information obtained not only from historical data and/or expert opinion (as will be done to assess project management risks at the beginning of a project), but also from the preliminary and ongoing project data itself. This will allow managers to better adapt to project management risks and be aware of risk factors which are greater or lesser than originally expected from historical data and/or expert opinion (i.e., the number assigned to or calculated for any one of a plurality of risk factors may change). Furthermore, the number of risk factors can be increased or decreased
Yet another exemplary embodiment of the present invention is to provide a method for project risk analysis which identifies a set of resource types, a number of resources for each resource type, and a level of skill for reach resource type. By using a computer implemented method, a resource allocation per activity can be estimated and used in the project risk analysis
Another exemplary embodiment of the present invention is to provide a computer implemented method for optimizing project planning by performing an iterative analysis of each of the plurality of activities against each of the possible plurality of risk factors to calculate an empirical probability distribution and a resource scenario that meet or exceed one or more criteria. These criteria may include but are not limited to minimizing cost to time ratio, minimizing project costs subject to meeting target project duration, minimizing project duration subject to meeting target projected budget, minimizing project cost subject to probability of meeting target project duration, and minimizing project duration subject to probability of meeting target project budget, etc.
According to the invention, there is provided an Adaptive Project Risk Management (APRM) method that can be used to manage project risk. The method relies on statistical estimation techniques to predict project time and cost, and to drive re-planning. The estimation techniques are based on detailed project status information combined with analytical risk models. The invention addresses the risk factors in terms of their impact on relevant project activities and integrates the inherent resource flexibilities in a project that allow it to recover from unplanned delays. The analysis and optimization is performed for each of multiple activities in the one or more projects and for each of a plurality of risk factors.
The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
Referring now to the drawings, and more particularly to
Its major elements include a dashboard (1-1) that allows resource sharing and allocation across multiple projects and enables monitoring and managing project/program/resource. A risk analyzer (1-5) allows planning based on historical risk impact data and/or expert opinion data. In the preferred embodiment, the risk analyzer (1-5) allows for learning from the performances of completed activities during project execution by providing a technique that associates risk factors to specific activities and estimates their impact on activity durations and costs.
The system also includes a project optimizer (1-2) and CPM calculator (1-3). The CPM calculator (1-3) performs probabilistic critical path method (CPM) calculations while the project optimizer (1-2) performs project plan optimization through resource selection and allocation. The project optimizer (1-2) calculates histograms, probabilities, confidence intervals of durations, and costs for activities and the projects. The historical project data (1-7) keeps historical data of risk factors, activity durations, and costs for a variety of projects which have been completed. The historical project data (1-7) may be consulted to determine risk factors and activities for a project that is about to be performed or to assess the relative performance of an ongoing project. Expert opinion data might be used as a substitute for or in addition to historical project data (1-7). Finally, the service model (1-4) provides alternative resource scenarios for each activity; provides resource cost data, skill data, project plan data, activity status data, activity risk; keeps output data; captures inputs and outputs of all components; and integrates the interaction between the components.
Turning now to
Project risk factors are mapped to one or more of the plurality of activities which are required for any one project. Mapping can take the form of organizing the risk factors and activities into a Bayesian Belief Network (BBN) (step 3-3) which allows risks to be causally linked to each other as well as to the activities in the project. A concept behind the BBN representation is simply the given assumption that activities exposed to the same risk factors will experience correlated uncertainty levels.
Other representations which map risk factors to activities may also be used in the practice of the invention.
Another use of the BBN representation of risks is the ability to learn and update quantitative risk-activity relationships. Thus, historical data about risks encountered in past projects can be leveraged to estimate the uncertainty of the durations of similar activities performed in future projects. Beyond this inter-project learning, the structure of the risks captured by the BBN enables intra-project learning. That is, during the execution of a project, the durations of completed activities provides guidance to estimate the impact of existing risk factors on durations of future activities. Since the risk network that may be constructed is the combination of project-specific information and information gathered from past projects, this enables several types of learning and adapting to project risks in mid-stream.
For example, the BBN enables project managers to learn during the course of the project from completed activity durations. The basic idea is that if early activities suffer from delays, it is likely that one or several risk factors are present and may be present at greater levels than projected from historical data and/or expert opinion, and thus future activities will take more time than expected. While this idea is fairly intuitive, the interpolation of current delays towards future delays is less straightforward. There, the BBN structure automates the estimation, updating probabilities of risk factors present, based on observed completion times and then updating the duration of future activities impacted by these risk factors. These computations are readily carried through BBN software, for instance GeNIE developed by the Decision Systems Laboratory of the University of Pittsburgh (http://dsl.sis.pitt.edu). The input needed from project managers is now reduced to informing of activity completion times and, if relevant, of observed risk factors.
The top structure of the BBN, being common across project, can be learned from historical data, and in turn updated (step 3-8) during or after a project is completed. Several algorithms are available for this purpose; see for instance, J. Myers, K. Blackmond Laskey and T. Levitt, “Learning Bayesian Networks from Incomplete Data with Stochastic Search Algorithms,” Proceedings of the Genetic and Evolutionary Conference, Orlando, Fla., 1999. Some algorithms even accommodate missing data. Note that standardization of project activities would further enable learning the full network, including the links from risk factors to activity durations.
Based on observed or estimated uncertainty levels of activity durations, the uncertainty of the entire project duration and cost can be estimated. A critical path analysis (step 3-4) is performed to calculate the probability of any activity being on the critical path for project completion, taking into account the estimated uncertainty levels of activity durations through Monte Carlo simulation. Then, optionally, a sensitivity analysis (step 3-5) can be performed to determine the probability distribution of project duration and cost, and their confidence intervals. In particular, the sensitivity analysis (step 3-5) can estimate the effect of mitigating a risk factor (e.g., implementing incentive programs, etc.) on activity durations, and allow for re-assessing project cost and schedule. By estimating the benefits of risk mitigation actions, the computer implemented method provides project managers with quantitative information to guide their decisions.
The data used as input (3-11) to the sensitivity analysis (3-5) can be that information which has been developed in the previous steps of the method and can include but may not be limited to the list of risk factors for each of the possible projects, the structure of the risk network from step 3-3, the probability of risk factors, and the link (or mapping) of risk factors to activities.
The services project planning preferably can be optimized (3-6). This optimization takes place with or without performing sensitivity analysis (3-5). In the case of one project, the resources are allocated to improve the activity duration to fall within target levels. For the case of multiple projects, the resources are allocated across the plurality of projects and plurality of activities to come as close to target levels as possible. At this point, the project manager can decide if re-optimization criteria have been met (step 3-7).
The computer implemented provides quantitative planning information to the project managers (step 3-9). This can be provided in the form of written and printed reports, e-mailed reports or messages, audio and/or visual displayed information on a computer display or other device. The quantitative data (3-12) can include but is not limited to project specific resource days on task, cost of resource, availability of resource, etc. If the optimization criteria have not been met, the invention will update the BBN (step 3-8) as described earlier.
To incorporate uncertainty from risk factors into the algorithm, any currently available risk analysis simulation can be used such as but not limited to Monte Carlo simulation. Each repetition of the simulation is associated with one sample path of activity duration derived from the BBN, i.e., a set of activity duration multipliers which has been sampled from the BBN.
It is not practical in practice to evaluate all combinations of resource scenarios since there are potentially too many combinations. For instance, a project that has 100 activities, each having 5 resource scenarios will have 5100 resource scenarios. Therefore, it is recommended to find a heuristic for eliminating scenarios that are not likely to be optimal.
In Step 4-2, a BBN sample path is a vector of multipliers that measure the risks of activities. The effective duration for an activity is simply the product of its BBN multiplier by its riskless duration, which is an input to the problem. Therefore, a BBN multiplier cannot be less than 1.
In Step 4-7, if expected project duration is below the target duration, the algorithm stops and reports the current resource scenario as the recommended scenario. Since, in each iteration, the algorithm seeks to increase resource spending minimally while reducing project duration to the maximum, it essentially follows a greedy path to reach its recommendation.
In Step 4-8, empirical distributions are simply calculated based on recorded data from the output of the CPM run for each BBN sample path. BBN sample size is how many such runs are made.
In Step 4-9, each activity has a probability of being on the critical path. A threshold probability is used to decide if an activity should be regarded as critical or not. If its probability of being on the critical path is above the threshold, it is regarded critical. If the threshold probability is too high, there may not be a critical path. In this case, the threshold is reduced gradually until a critical path can be obtained. The best alternative scenario is the one that has the minimum cost to time ratio (CTR) which is calculated as follows:
CTR=(Activity cost under alternative resource scenario−Activity cost under current resource scenario)/(Activity duration under current resource scenario−Activity duration under alternative resource scenario)
In CTR comparison process, only those activities that can reduce the activity time are considered. Note that if an alternative resource scenario can perform the activity less expensively and faster, it's CTR is negative. Such alternative scenarios are immediately selected since they are absolutely superior.
Looking now at
Specifically, we start from a list of risk factors (5-1, 5-2, 5-3, 5-4, 5-5) common across all outsourced services transition projects and structure them into a BBN. The conditional probability tables underlying the BBN are preferably estimated based on historical data about risk factors present in past projects. However, expert opinion may also be used to estimate risk factors. The top half of
The activity durations (5-6, 5-7, and 5-8) are mapped to risk factors (5-1, 5-2, 5-3, 5-4, and 5-5) that are present. As can be seen from
Consider activity duration 1 (5-6) in
The optimization feature of the invention described in
As can be seen on the graph of
For exemplary purposes, the invention is described below in the context of a real customer engagement. The service being offered to the customer was based on an IT solution asset which required certain extensions and customizations to cater it towards the customer's business process. The invention was used to adaptively manage the project plans which were developed to coordinate the extensions and customizations needed to the solution asset. The project plan consisted of 62 activities completed by 15 different resource types. Some of the resource types were project manager, consultants, subject matter experts, developers, testers and network specialists. The baseline plan was developed to be completed in a certain number of days at cost of a certain dollar amount. Working closely with the project management team, two key extensions to the project plan were provided to enable adaptive project risk management.
First, the risks and the cause effect relationship between these risks were identified. Some examples of risks identified were “ill-defined requirements” and “poor communication with the customer”. A Bayesian belief network was built of these risks and mapped the leaf risk nodes to activities in the project plan. It is necessary for every activity affected by the risk to specify the most likely delay for the activity if the risk were to occur. Effective resource scenarios for most activities based on appropriately balancing the quantity, skill level and utilization of resources to the time it takes to complete the activity were defined. Some activities did not have more than the single baseline scenario, but there were numerous activities for which it made sense to factor in multiple resource scenarios allowing for flexibility in terms of cost and time.
To validate the approach, an APRM simulator was built that simulated the execution of a given project plan. The first step in the simulation was to optimize the project plan so as to minimize the project duration subject to meeting the target project budget. Based on the risks and resource flexibility extensions provided in the plan, the system projected a probability of completing the project a certain number of days earlier at a nominal cost savings. Assuming an unconstrained supply of resources, the resulting recommendations were recorded back in the project plan and effected immediately. The actual progress of the plan was simulated according to the initial recommendations of the computer implemented method described herein, allowing for random occurrence of risks affecting the activities being executed. Monthly checkpoints were introduced, simulating a project review allowing for replanning if the project was behind schedule or over budget, based on updated risk profile and available resource scenarios.
While the invention has been described in terms of its preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.