• Tidak ada hasil yang ditemukan

Information Technology Project Management, Seventh Edition

N/A
N/A
Protected

Academic year: 2018

Membagikan "Information Technology Project Management, Seventh Edition"

Copied!
181
0
0

Teks penuh

(1)
(2)

 Understand the importance of good

communications on projects and the need to develop soft skills, especially for IT project managers and their teams

 Review key concepts related to communications

 Explain the elements of planning project

communications and how to create a communications management plan

 Describe how to manage communications,

including communication technologies, media, and performance reporting

Information Technology Project

(3)

 Discuss methods for controlling communications

to ensure that information needs are met throughout the life of the project

 List various methods for improving project

communications, such as running effective

meetings, using various technologies effectively, and using templates

 Describe how software can enhance project

(4)

 The greatest threat to many projects is a failure to communicate

 Our culture does not portray IT professionals as being good communicators

 Research shows that IT professionals must be able to communicate effectively to succeed in their

positions

 Strong verbal and non-technical skills are a key factor in career advancement for IT professionals

Information Technology Project

(5)

Planning communications management:

Determining the information and communications needs of the stakeholders

Managing communications: Creating,

distributing, storing, retrieving, and disposing of project communications based on the

communications management plan

Controlling communications: Monitoring and

(6)

Information Technology Project

(7)

 Project managers say they spend as much as 90

percent of their time communicating

 Need to focus on group and individual

communication needs

 Use formal and informal methods for

communicating

 Distribute important information in an effective and

timely manner

 Set the stage for communicating bad news

(8)

 People are not interchangeable parts

 As illustrated in Brooks’ book The Mythical

Man-Month, you cannot assume that a task originally

scheduled to take two months of one person’s time

can be done in one month by two people

 Nine women cannot produce a baby in one month!

Information Technology Project

(9)

 Research says that in a face-to-face interaction:  58 percent of communication is through body language.

 35 percent of communication is through how the words are said

 7 percent of communication is through the content or words that are spoken

 Pay attention to more than just the actual words someone is saying

(10)

 Introverts like more private communications, while extroverts like to discuss things in public

 Intuitive people like to understand the big picture, while sensing people need step-by-step details

 Thinkers want to know the logic behind decisions, while feeling people want to know how something affects them personally

 Judging people are driven to meet deadlines while perceiving people need more help in developing and following plans

Information Technology Project

(11)

 Short, frequent meetings are often very effective in IT projects

 Stand-up meetings force people to focus on what they really need to communicate

(12)

Amusing examples of miscommunications are common, especially when they involve the use of new technologies. For example, I was teaching an introductory course in information systems several years ago. Other instructors would often sit in on the course to learn how to use the latest software applications. One day, students were learning how to adjust settings and use short cuts on their computers. I would tell the students to “right-click” and then select Properties, or “right-click” and then select Copy. At the end of the class, an instructor quietly approached, waited until the other students were gone, and then said, “I don’t know what I’m doing wrong.” She held up a piece of paper on which she had written the word “click” about a dozen times. In other words, she literally did write “click” when told to do so instead of right-clicking. I asked, “Are you a Mac user?” Macintosh computers do not normally have a mouse with two buttons, so users never have to right-click. I showed the instructor how to right-click a mouse, and in future classes made sure to point out operations that were different on PCs than Macs.

Information Technology Project

(13)

 Don’t bury crucial information

 Don’t be afraid to report bad information

(14)

 Rarely does the receiver interpret a message exactly as the sender intended

 Geographic location and cultural background affect the complexity of project communications

◦ Different working hours

◦ Language barriers

◦ Different cultural norms

Information Technology Project

(15)

Dear Mom and Dad, or should I say Grandma & Grandpa,

Yes, I am pregnant. No, I’m not married yet since Larry, my boyfriend, is out of a job. Larry’s employers just don’t seem to appreciate the skills he has learned since

he quit high school. Larry looks much younger than you, Dad, even though he is

three years older. I’m quitting college and getting a job so we can get an apartment

before the baby is born. I found a beautiful apartment above a 24-hour auto repair

garage with good insulation so the exhaust fumes and noise won’t bother us. I’m very happy. I thought you would be too.

Love, Ashley

P.S. There is no Larry. I’m not pregnant. I’m not getting married. I’m not quitting school, but I am getting a “D” in Chemistry. I just wanted you to have

(16)

 As the number of people involved increases, the complexity of communications increases because there are more communications channels or

pathways through which people can communicate.  Number of communications channels = n(n-1)

2 where n is the number of people involved

Information Technology Project

(17)
(18)

 Every project should include some type of

communications management plan, a document that guides project communications

 The communications management plan varies

with the needs of the project, but some type of written plan should always be prepared

 For small projects, the communications

management plan can be part of the team contract

 For large projects, it should be a separate

document

Information Technology Project

(19)

1. Stakeholder communications requirements

2. Information to be communicated, including format, content, and level of detail

3. Who will receive the information and who will produce it 4. Suggested methods or technologies for conveying the information

5. Frequency of communication

6. Escalation procedures for resolving issues

7. Revision procedures for updating the communications management plan

(20)

Information Technology Project

(21)

 Managing communications is a large part of a

project manager’s job

 Getting project information to the right people at

the right time and in a useful format is just as

important as developing the information in the first place

 Important considerations include the use of

(22)

 Technology can facilitate the process of creating

and distributing information, when used properly

 It is important to select the appropriate

communication method and media

Information Technology Project

(23)

 Natural disasters often disrupt communications

around the world. For example, the scale of the

damage to Japan’s communications infrastructure

(24)

Interactive communication: Two or more people interact

to exchange information via meetings, phone calls, or video conferencing. Most effective way to ensure

common understanding

Push communication: Information is sent or pushed to

recipients without their request via reports, e-mails, faxes, voice mails, and other means. Ensures that the information is distributed, but does not ensure that it was received or understood

Pull communication: Information is sent to recipients at

their request via Web sites, bulletin boards, e-learning, knowledge repositories like blogs, and other means

Information Technology Project

(25)
(26)

 Collaboration is a key driver of overall performance of

companies around the world

 Of all the collaboration technologies that were studied, three

were more commonly present in high-performing companies than in low-performing ones: Web conferencing, audio

conferencing, and meeting-scheduler technologies

 “This study reveals a powerful new metric business leaders

can use to more successfully manage their companies and

achieve competitive advantage,” said Brian Cotton, a vice

president at Frost & Sullivan*

 The study also showed that there are regional differences in

how people in various countries prefer to communicate with one another

*Frost & Sullivan, “New Research Reveals Collaboration Is a Key Driver of Business Performance Around the World,” Microsoft PressPass (June 5, 2006).

Information Technology Project

(27)

Performance reporting keeps stakeholders informed about how resources are being used to achieve

project objectives

Status reports describe where the project stands at a

specific point in time

Progress reports describe what the project team has

accomplished during a certain period of time

Forecasts predict future project status and progress based

(28)

 The main goal of controlling communications is to ensure

the optimal flow of information throughout the entire project life cycle

 The project manager and project team should use their

various reporting systems, expert judgment, and meetings to assess how well communications are working. If

problems exist, the project manager and team need to take action, which often requires changes to the earlier

processes of planning and managing project communications

 It is often beneficial to have a facilitator from outside the

project team assess how well communications are working

Information Technology Project

(29)

 Develop better communication skills

 Run effective meetings

 Use e-mail and other technologies effectively

(30)

 Most companies spend a lot of money on technical

training for their employees, even when employees might benefit more from communications training

 Individual employees are also more likely to enroll

voluntarily in classes to learn the latest technology than in classes that develop soft skills

 As organizations become more global, they realize

they must invest in ways to improve communication with people from different countries and cultures

 It takes leadership to improve communication

Information Technology Project

(31)

 Communications technology, such as using e-mail and

searching the Web, should help improve project communications, but it can also cause conflict

 How? Cyberslackers are people who should be working,

but instead spend their time online doing non-work-related activities, such as annoying friends or co-workers by

sending unimportant e-mails

 A study by Websense suggested that employees are using

the Web more and more for personal reasons, and it is costing U.S. companies $178 billion annually, or $5,000 per employee

 A 2008 survey found that more than a quarter of U.S.

(32)

 Determine if a meeting can be avoided

 Define the purpose and intended outcome of the meeting

 Determine who should attend the meeting

 Provide an agenda to participants before the meeting

 Prepare handouts and visual aids, and make logistical arrangements ahead of time

 Run the meeting professionally

 Set the ground rules for the meeting  Build relationships

Information Technology Project

(33)

 Make sure that e-mail, instant messaging, texting, or collaborative tools are an appropriate medium for what you want to communicate

 Be sure to send information to the right people

 Use meaningful subject lines and limit the content of emails to one main subject, and be as clear

and concise as possible

(34)

 A SharePoint portal allows users to create

custom Web sites to access documents and applications stored on shared devices

Google Docs allow users to create, share, and

edit documents, spreadsheets, and presentations online

 A wiki is a Web site designed to enable anyone

who accesses it to contribute or modify Web page content

Information Technology Project

(35)

 Alaska Airlines uses secure project wikis to

facilitate project communications and collaborations

 Benefits include:

◦ Better documentation

◦ Improved trust and information sharing

◦ Sustained growth

 The Alaska Airlines IT department even created a

“Mother of All Wikis” to serve as an index for all the

(36)

 Many technical people are afraid to ask for help

 Providing examples and templates for project communications saves time and money

 Organizations can develop their own templates, use some provided by outside organizations, or use

samples from textbooks

 Recall that research shows that companies that

excel in project management make effective use of templates

Information Technology Project

(37)
(38)

Information Technology Project

(39)
(40)

 The project manager and project team members should each prepare a lessons-learned report

◦ A reflective statement that documents important things an individual learned from working on the project

 The project manager often combines information from all of the lessons-learned reports into a

project summary report

 See template and sample in Chapter 3

Information Technology Project

(41)

 It is also important to organize and prepare project

archives

Project archives are a complete set of organized

project records that provide an accurate history of the project

 These archives can provide valuable information

(42)

 Many project teams create a project Web site to

store important product documents and other information

 Can create the site using various types of

software, such as enterprise project management software

Information Technology Project

(43)
(44)

 There are many software tools to aid in project

communications

 Today many people telecommute or work remotely at least

part-time. TechCast at George Washington University forecasts that by 2019, 30 percent of U.S. private-sector workers could work from home

 Project management software includes new capabilities to

enhance virtual communications

 While technology can aid in the communications process, it

is not the most important. Far more important is improving an organization’s ability to communicate, which often

involves cultural change

Information Technology Project

(45)

 The goal of project communications management is to ensure timely and appropriate generation,

collection, dissemination, storage, and disposition of project information

 Main process include:

◦ Plan communications management

◦ Manage communications

(46)

Note: See the text itself for full citations.

(47)

 Understand risk and the importance of good project risk

management

 Discuss the elements of planning risk management and

the contents of a risk management plan

 List common sources of risks on information technology

(IT) projects

 Describe the process of identifying risks and create a

risk register

 Discuss qualitative risk analysis and explain how to

(48)

 Explain quantitative risk analysis and how to apply

decision trees, simulation, and sensitivity analysis to quantify risks

 Provide examples of using different risk response

planning strategies to address both negative and positive risks

 Discuss how to control risks

 Describe how software can assist in project risk

management

Information Technology Project

(49)

 Project risk management is the art and science of

identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives

 Risk management is often overlooked in projects,

(50)

 Study by Ibbs and Kwak shows risk has the lowest

maturity rating of all knowledge areas

 A similar survey was completed with software

development companies in Mauritius, South Africa in 2003, and risk management also had the lowest maturity

 KLCI study shows the benefits of following good

software risk management practices

Information Technology Project

(51)

KEY: 1 = LOWEST MATURITY RATING 5 = HIGHEST MATURITY RATING

Knowledge Area

Engineering/ Construction

Telecommunications Information Systems

Hi-Tech

Manufacturing

Scope 3.52 3.45 3.25 3.37

Time 3.55 3.41 3.03 3.50

Cost 3.74 3.22 3.20 3.97

Quality 2.91 3.22 2.88 3.26

Human Resources 3.18 3.20 2.93 3.18

Communications 3.53 3.53 3.21 3.48

Risk 2.93 2.87 2.75 2.76

Procurement 3.33 3.01 2.91 3.33

*Ibbs, C. William and Young Hoon Kwak. “Assessing Project Management Maturity,”

(52)

Information Technology Project

Management, Seventh Edition 52

(53)

 Many people around the world suffered from financial

losses as various financial markets dropped in the fall of 2008, even after the $700 billion bailout bill was passed by the U.S. Congress

 According to a global survey of 316 financial services

executives, over 70 percent of respondents believed that the losses stemming from the credit crisis were largely due to failures to address risk management issues

 They identified several challenges in implementing risk

(54)

A dictionary definition of risk is “the

possibility of loss or injury”

Negative risk involves understanding

potential problems that might occur in the

project and how they might impede project

success

Negative risk management is like a form of

insurance; it is an investment

Information Technology Project

(55)

Positive risks are risks that result in good

things happening; sometimes called

opportunities

A general definition of project risk is an

uncertainty that can have a negative or

positive effect on meeting project objectives

The goal of project risk management is to

(56)

 Some organizations make the mistake of only

addressing tactical and negative risks when performing project risk management

 David Hillson, (www.risk-doctor.com) suggests

overcoming this problem by widening the scope of risk management to encompass both strategic

risks and upside opportunities, which he refers to as integrated risk management

Information Technology Project

(57)

Risk utility or risk tolerance is the amount of

satisfaction or pleasure received from a potential payoff

◦ Utility rises at a decreasing rate for people who are risk-averse

◦ Those who are risk-seeking have a higher tolerance for risk and their satisfaction increases when more payoff is at stake

(58)

Information Technology Project

(59)

Planning risk management : Deciding how to

approach and plan the risk management activities for the project

Identifying risks: Determining which risks are likely

to affect a project and documenting the characteristics of each

Performing qualitative risk analysis: Prioritizing

(60)

Performing quantitative risk analysis:

Numerically estimating the effects of risks on project objectives

Planning risk responses: Taking steps to enhance

opportunities and reduce threats to meeting project objectives

Controlling risk: Monitoring identified and residual

risks, identifying new risks, carrying out risk

response plans, and evaluating the effectiveness of risk strategies throughout the life of the project

Information Technology Project

(61)
(62)

 The main output of this process is a risk

management plan—a plan that documents the procedures for managing risk throughout a

project

 The project team should review project

documents and understand the organization’s and the sponsor’s approaches to risk

 The level of detail will vary with the needs of the

project

Information Technology Project

(63)

 Methodology

 Roles and responsibilities

 Budget and schedule

 Risk categories

 Risk probability and impact

 Revised stakeholders’ tolerances

 Tracking

(64)

Contingency plans are predefined actions that the

project team will take if an identified risk event occurs

Fallback plans are developed for risks that have a high

impact on meeting project objectives, and are put into effect if attempts to reduce the risk are not effective

Contingency reserves or allowances are provisions

held by the project sponsor or organization to reduce the risk of cost or schedule overruns to an acceptable level;

management reserves are funds held for unknown risks

Information Technology Project

(65)

 Several studies show that IT projects share some

common sources of risk

 The Standish Group developed an IT success

potential scoring sheet based on potential risks

 Other broad categories of risk help identify potential

(66)

Information Technology Project

Management, Seventh Edition 66

Success Criterion Relative Importance

User Involvement 19

Executive Management support 16

Clear Statement of Requirements 15

Proper Planning 11

Realistic Expectations 10

Smaller Project Milestones 9

Competent Staff 8

Ownership 6

Clear Visions and Objectives 3

Hard-Working, Focused Staff 3

(67)

 Market risk

 Financial risk

 Technology risk

 People risk

(68)

 KPMG, a large consulting firm, published a study

in 1995 that found that 55 percent of runaway

projects—projects that have significant cost or

schedule overruns—did no risk management at all, 38 percent did some (but half did not use their risk findings after the project was underway), and 7

percent did not know whether they did risk management or not

 The timing of risk management is also an

important consideration

Information Technology Project

(69)

 A risk breakdown structure is a hierarchy of

potential risk categories for a project

 Similar to a work breakdown structure but used to

(70)
(71)
(72)

 Identifying risks is the process of understanding

what potential events might hurt or enhance a particular project

 Another consideration is the likelihood of

advanced discovery

 Risk identification tools and techniques include:

◦ Brainstorming

◦ The Delphi Technique

◦ Interviewing

◦ SWOT analysis

Information Technology Project

(73)

Brainstorming is a technique by which a group

attempts to generate ideas or find a solution for a specific problem by amassing ideas spontaneously and without judgment

 An experienced facilitator should run the

brainstorming session

 Be careful not to overuse or misuse brainstorming.

◦ Psychology literature shows that individuals produce a greater number of ideas working alone than they do through brainstorming in small, face-to-face groups

(74)

 The Delphi Technique is used to derive a

consensus among a panel of experts who make predictions about future developments

 Provides independent and anonymous input

regarding future events

 Uses repeated rounds of questioning and written

responses and avoids the biasing effects possible in oral methods, such as brainstorming

Information Technology Project

(75)

Interviewing is a fact-finding technique for

collecting information in facto-face, phone, e-mail, or instant-messaging discussions

 Interviewing people with similar project experience

(76)

 SWOT analysis (strengths, weaknesses,

opportunities, and threats) can also be used during risk identification

 Helps identify the broad negative and positive

risks that apply to a project

Information Technology Project

(77)

 The main output of the risk identification process is a list

of identified risks and other information needed to begin creating a risk register

 A risk register is:

◦ A document that contains the results of various risk

management processes and that is often displayed in a table or spreadsheet format

◦ A tool for documenting potential risk events and related information

Risk events refer to specific, uncertain events that may

(78)

 An identification number for each risk event  A rank for each risk event

 The name of each risk event  A description of each risk event

 The category under which each risk event falls  The root cause of each risk

Information Technology Project

(79)

 Triggers for each risk; triggers are indicators or

symptoms of actual risk events

 Potential responses to each risk

 The risk owner or person who will own or take

responsibility for each risk

(80)

80

Information Technology Project Management, Seventh Edition

• No.: R44 • Rank: 1

• Risk: New customer

• Description: We have never done a project for this organization

before and don’t know too much about them. One of our company’s strengths is building good customer relationships, which often leads to further projects with that customer. We might have trouble working with this customer because they are new to us.

(81)

 Assess the likelihood and impact of identified

risks to determine their magnitude and priority

 Risk quantification tools and techniques include:

◦ Probability/impact matrixes

◦ The Top Ten Risk Item Tracking

(82)

 A probability/impact matrix or chart lists the

relative probability of a risk occurring on one side of a matrix or axis on a chart and the relative impact of the risk occurring on the other

 List the risks and then label each one as high,

medium, or low in terms of its probability of occurrence and its impact if it did occur

 Can also calculate risk factors:

◦ Numbers that represent the overall risk of specific events based on their probability of occurring and the

consequences to the project if they do occur

Information Technology Project

(83)
(84)

Information Technology Project

(85)

Top Ten Risk Item Tracking is a qualitative risk

analysis tool that helps to identify risks and

maintain an awareness of risks throughout the life of a project

 Establish a periodic review of the top ten project

risk items

 List the current ranking, previous ranking, number

of times the risk appears on the list over a period of time, and a summary of progress made in

(86)

Information Technology Project

(87)

 A watch list is a list of risks that are low priority,

but are still identified as potential risks

 Qualitative analysis can also identify risks that

(88)

 The story of the Titanic is known throughout the

world, and on April 15, 2012, people

acknowledged the 100th anniversary of the

Titanic’s sinking

 A recent article in PMI’s Virtual Library explains

how to avoid “the Titanic factor” in your projects by

analyzing the interdependence of risks

 For example, the probability of one risk event

occurring might change if another one

materializes, and the response to one risk event might affect another

Information Technology Project

(89)

 Often follows qualitative risk analysis, but both can

be done together

 Large, complex projects involving leading edge

technologies often require extensive quantitative risk analysis

 Main techniques include:

◦ Decision tree analysis

◦ Simulation

(90)

 A decision tree is a diagramming analysis

technique used to help select the best course of action in situations in which future outcomes are uncertain

Estimated monetary value (EMV) is the product of

a risk event probability and the risk event’s

monetary value

 You can draw a decision tree to help find the EMV

Information Technology Project

(91)
(92)

 Simulation uses a representation or model of a

system to analyze the expected behavior or performance of the system

Monte Carlo analysis simulates a model’s

outcome many times to provide a statistical distribution of the calculated results

 To use a Monte Carlo simulation, you must have

three estimates (most likely, pessimistic, and

optimistic) plus an estimate of the likelihood of the estimate being between the most likely and

optimistic values

Information Technology Project

(93)

1. Assess the range for the variables being

considered

2. Determine the probability distribution of each

variable

3. For each variable, select a random value based on

the probability distribution

4. Run a deterministic analysis or one pass through

the model

5. Repeat steps 3 and 4 many times to obtain the

(94)

Information Technology Project

(95)

 A large aerospace company used Monte Carlo

simulation to help quantify risks on several

advanced-design engineering projects, such as the National Aerospace Plan (NASP)

 The results of the simulation were used to

determine how the company would invest its internal research and development funds

 See text for examples of how General Motors, Eli

(96)

Sensitivity analysis is a technique used to show the

effects of changing one or more variables on an outcome

 For example, many people use it to determine what

the monthly payments for a loan will be given

different interest rates or periods of the loan, or for determining break-even points based on different assumptions

 Spreadsheet software, such as Excel, is a common

tool for performing sensitivity analysis

Information Technology Project

(97)
(98)

 After identifying and quantifying risks, you must

decide how to respond to them

 Four main response strategies for negative risks:

◦ Risk avoidance

◦ Risk acceptance

◦ Risk transference

◦ Risk mitigation

Information Technology Project

(99)
(100)

 Risk exploitation  Risk sharing

 Risk enhancement  Risk acceptance

Information Technology Project

(101)

 It’s also important to identify residual and

secondary risks

Residual risks are risks that remain after all of

the response strategies have been implemented

Secondary risks are a direct result of

(102)

 Involves executing the risk management process to

respond to risk events and ensuring that risk

awareness is an ongoing activity performed by the entire project team throughout the entire project

Workarounds are unplanned responses to risk events

that must be done when there are no contingency plans

 Main outputs of risk control are:

◦ Work performance information

◦ change requests

◦ updates to the project management plan, other project documents, and organizational process assets

Information Technology Project

(103)

 Risk registers can be created in a simple Word or

Excel file or as part of a database

 More sophisticated risk management software, such

as Monte Carlo simulation tools, help in analyzing project risks

 You can purchase add-ons for Excel and Project

(104)

 Unlike crisis management, good project risk

management often goes unnoticed

 Well-run projects appear to be almost effortless, but

a lot of work goes into running a project well

 Project managers should strive to make their jobs

look easy to reflect the results of well-run projects

Information Technology Project

(105)

 Project risk management is the art and science of

identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives

 Main processes include:

◦ Plan risk management

◦ Identify risks

◦ Perform qualitative risk analysis

◦ Perform quantitative risk analysis

◦ Plan risk responses

(106)

Note: See the text itself for full citations.

(107)

 Understand the importance of project procurement

management and the increasing use of outsourcing for information technology (IT) projects

 Describe the work involved in planning

procurements for projects, including determining the proper type of contract to use and preparing a

procurement management plan, statement of work, source selection criteria, and make-or-buy analysis

 Discuss how to conduct procurements and

(108)

 Understand the process of controlling

procurements by managing procurement

relationships and monitoring contract performance

 Describe the process of closing procurements  Discuss types of software that are available to

assist in project procurement management

Information Technology Project

(109)

Procurement means acquiring goods and/or

services from an outside source

 Other terms include purchasing and outsourcing  Experts predict that global spending on computer

software and services will continue to grow

 People continue to debate whether offshore

(110)

 Some companies, such as Wal-Mart, prefer to do no

outsourcing at all, while others do a lot of

outsourcing. GM recently announced plans to switch from outsourcing 90% of IT service to only 10%

 Most organizations do some form of outsourcing to

meet their IT needs and spend most money within their own country

 The U.S. temporary workforce continues to grow as

people work for temporary job agencies so they can more easily move from company to company

Information Technology Project

(111)

 U.S. companies are transferring more work

abroad, especially in the areas of IT infrastructure, application development and maintenance, and

innovation processes

 India, China, and the Philippines are the preferred

locations for outsourcing, and Latin America is growing in popularity

 A shortage of qualified personnel, not cost

(112)

 To access skills and technologies

 To reduce both fixed and recurrent costs

 To allow the client organization to focus on its core

business

 To provide flexibility

 To increase accountability

Information Technology Project

(113)

 A contract is a mutually binding agreement that

obligates the seller to provide the specified products or services and obligates the buyer to pay for them

 Contracts can clarify responsibilities and sharpen

focus on key deliverables of a project

 Because contracts are legally binding, there is more

accountability for delivering the work as stated in the contract

 A recent trend in outsourcing is the increasing size

(114)

 In 2011, New York City’s mayor, Michael Bloomberg,

acknowledged that City Hall had mismanaged its major IT projects and vowed to improve their

oversight

 For example, prosecutors said the $700 million price

tag for the CityTime payroll system was inflated by fraud, and the mayor demanded $600 million back from the main contractor

 The automated personnel system, Nycaps, suffered

significant delays and cost overruns due to leadership issues, increasing from an original estimate of $66

million to over $363 million

Information Technology Project

(115)

Project procurement management: Acquiring

goods and services for a project from outside the performing organization

 Processes include:

Planning procurement management: Determining

what to procure and when and how to do it

Conducting procurements: Obtaining seller responses,

selecting sellers, and awarding contracts

Controlling procurements: Managing relationships with

sellers, monitoring contract performance, and making changes as needed

(116)

Information Technology Project

(117)

 Identifying which project needs can best be met

by using products or services outside the organization

 If there is no need to buy any products or

services from outside the organization, then there is no need to perform any of the other

(118)

 Several organizations, such as The Boots

Company PLC in England, outsource their IT

services to save money compared with the cost of running the systems themselves

 Carefully planning procurement can also save

millions of dollars, as the U.S. Air Force did by using a unit pricing strategy for a large office automation project

Information Technology Project

(119)

 Different types of contracts can be used in different situations:

Fixed price or lump sum contracts: Involve a fixed total price for a well-defined product or service

Cost reimbursable contracts: Involve payment to the seller for direct and indirect costs

Time and material contracts: Hybrid of both fixed price and cost reimbursable contracts, often used by

consultants

Unit price contracts: Require the buyer to pay the seller a predetermined amount per unit of service

 A single contract can actually include all four of these categories, if it makes sense for that particular

(120)

 The Point of Total Assumption (PTA) is the cost at

which the contractor assumes total responsibility for each additional dollar of contract cost

 Contractors do not want to reach the point of total

assumption, because it hurts them financially, so they have an incentive to prevent cost overruns

 The PTA is calculated with the following formula:

PTA = (ceiling price – target price)/government share + target cost

Information Technology Project

(121)

Cost plus incentive fee (CPIF): The buyer pays

the supplier for allowable performance costs plus a predetermined fee and an incentive bonus

Cost plus fixed fee (CPFF): The buyer pays the

supplier for allowable performance costs plus a fixed fee payment usually based on a percentage of estimated costs

Cost plus percentage of costs (CPPC): The

(122)

Information Technology Project

(123)

 Contract incentives can be extremely effective. On August

1, 2007, tragedy struck Minneapolis, Minnesota, when a bridge on I-35W collapsed, killing 13 motorists, injuring 150 people, and leaving a mass of concrete and steel in the

river and on its banks

 Peter Sanderson, project manager for the joint venture of

Flatiron-Manson led his team in completing the project.

The contractors earned $25 million in incentive fees on top of their $234 million contract for completing the bridge

three months ahead of schedule

 MnDOT justified the incentive payment by saying that each

(124)

 Contracts should include specific clauses to take

into account issues unique to the project

 Can require various educational or work

experience for different pay rights

 A termination clause is a contract clause that

allows the buyer or supplier to end the contract

Information Technology Project

(125)

 Expert judgment

 Market research

Make-or-buy analysis: General management

technique used to determine whether an

(126)

 Assume you can lease an item you need for a

project for $800/day. To purchase the item, the cost is $12,000 plus a daily operational cost of $400/day

 How long will it take for the purchase cost to be

the same as the lease cost?

Information Technology Project

(127)

 Set up an equation so both options, purchase and lease, are equal

 In this example, use the following equation. Let d be the number of days to use the item:

$12,000 + $400d = $800d

Subtracting $400d from both sides, you get: $12,000 = $400d

Dividing both sides by $400, you get: d = 30

(128)

 Describes how the procurement processes will be

managed, from developing documentation for making outside purchases or acquisitions to contract closure

 Contents varies based on project needs

Information Technology Project

(129)

 A statement of work is a description of the work

required for the procurement

 If a SOW is used as part of a contract to describe

only the work required for that particular contract, it is called a contract statement of work

 A SOW is a type of scope statement

 A good SOW gives bidders a better understanding

(130)

Information Technology Project

(131)

Request for Proposals: Used to solicit proposals

from prospective sellers

◦ A proposal is a document prepared by a seller when there are different approaches for meeting buyer needs

Requests for Quotes: Used to solicit quotes or

bids from prospective suppliers

◦ A bid, also called a tender or quote (short for

quotation), is a document prepared by sellers providing pricing for standard items that have been clearly

(132)

Information Technology Project

(133)

 It’s important to prepare some form of evaluation

criteria, preferably before issuing a formal RFP or RFQ

 Beware of proposals that look good on paper;

be sure to evaluate factors, such as past performance and management approach

 Can require a technical presentation as part of a

(134)

 Deciding whom to ask to do the work

 Sending appropriate documentation to potential  sellers

 Obtaining proposals or bids  Selecting a seller

 Awarding a contract

Information Technology Project

(135)

 Organizations can advertise to procure goods and services in several ways:

◦ Approaching the preferred vendor

◦ Approaching several potential vendors

◦ Advertising to anyone interested

(136)

Information Technology Project

(137)

 Organizations often do an initial evaluation of all

proposals and bids and then develop a short list of potential sellers for further evaluation

 Sellers on the short list often prepare a best and

final offer (BAFO)

 Final output is a contract signed by the buyer and

(138)

 Ensures that the seller’s performance meets

contractual requirements

 Contracts are legal relationships, so it is important

that legal and contracting professionals be involved in writing and administering contracts

 It is critical that project managers and team members

watch for constructive change orders, which are oral or written acts or omissions by someone with

actual or apparent authority that can be construed to have the same effect as a written change order

Information Technology Project

(139)

 A recent trend is to hire people in rural areas of the

same country to perform work, often at less cost. Rural sourcing uses two simple premises: Smaller towns need jobs, and workers there often charge 25 to 50 percent less than their urban counterparts.

◦ Onshore Technology Services recruits workers from low-paying jobs and gives them intensive training in IT

specialties. The company employs 65 people in IT centers in the rural Missouri towns of Macon, Lebanon, and Joplin

◦ CrossUSA recruits older IT workers who are nearing

retirement and want to enjoy a small-town quality of life. The company has 100 employees in Sebeka, Minnesota

(140)

 Changes to any part of the project need to be

reviewed, approved, and documented by the same people in the same way that the original part of the plan was approved

 Evaluation of any change should include an impact

analysis. How will the change affect the scope, time, cost, and quality of the goods or services being provided?

 Changes must be documented in writing. Project

team members should also document all important meetings and telephone phone calls

Information Technology Project

(141)

 Project managers and teams should stay closely

involved to make sure the new system will meet business needs and work in an operational

environment

 Have backup plans

 Use tools and techniques, such as a contract

change control system, buyer-conducted

(142)

 Accenture developed a list of best practices from

experienced outsourcers throughout the world: 1. Build in Broad Business Outcomes Early and Often

2. Hire a Partner, Not Just a Provider

3. It’s More Than a Contract, It’s a Business Relationship 4. Leverage Gain-Sharing

5. Use Active Governance

6. Assign a Dedicated Executive

7. Focus Relentlessly on Primary Objectives

Information Technology Project

(143)

 Involves completing and settling contracts and

resolving any open items

 The project team should:

 Determine if all work was completed correctly and

satisfactorily

 Update records to reflect final results

 Archive information for future use

 The contract itself should include requirements for

(144)

 Procurement audits identify lessons learned in the

procurement process

 Negotiated settlements help close contracts more

smoothly

 A records management system provides the ability

to easily organize, find, and archive procurement-related documents

Information Technology Project

(145)

 Word processing software helps write proposals

and contracts, spreadsheets help evaluate

suppliers, databases help track suppliers, and

presentation software helps present procurement-related information

 E-procurement software does many procurement

functions electronically

 Organizations also use other Internet tools to find

(146)

 Project procurement management involves

acquiring goods and services for a project from outside the performing organization

 Processes include:

◦ Plan procurement management

◦ Conduct procurements

◦ Control procurements

◦ Close procurements

Information Technology Project

(147)
(148)

 Understand the importance of project

stakeholder management throughout the life of a project

 Discuss the process of identifying stakeholders,

how to create a stakeholder register, and how to perform a stakeholder analysis

 Describe the contents of a stakeholder

management plan

Information Technology Project

(149)

 Understand the process of managing stakeholder

engagement and how to use an issue log effectively

 Explain methods for controlling stakeholder

engagement

 Discuss types of software available to assist in

(150)

 Because stakeholder management is so important

to project success, the Project Management

Institute decided to create an entire knowledge area devoted to it as part of the Fifth Edition of the

PMBOK® Guide in 2012

 The purpose of project stakeholder management is

to identify all people or organizations affected by a project, to analyze stakeholder expectations, and to effectively engage stakeholders

Information Technology Project

(151)

 Projects often cause changes in organizations, and

some people may lose their jobs when a project is completed. Project managers might be viewed as

enemies if the project resulted in job losses for some stakeholders

 By contrast, they could be viewed as allies if they

lead a project that helps increase profits, produce new jobs, or increase pay for certain stakeholders

 In any case, project managers must learn to identify,

(152)

 Changing the way work is done can send a shock

wave through an organization, leaving many people afraid and even thinking about ways to stop or

sabotage a project

 Donald White, founder and program manager at

Defense Systems Leaders in Washington, D.C.,

described situations that can lead to project sabotage:

◦ Buy-in blues

◦ Short-term profits

◦ Overachieving

◦ Lack of respect

Information Technology Project

(153)

Identifying stakeholders: Identifying everyone involved in

the project or affected by it, and determining the best ways to manage relationships with them.

Planning stakeholder management: Determining

strategies to effectively engage stakeholders

Managing stakeholder engagement: Communicating and

working with project stakeholders to satisfy their needs and expectations, resolving issues, and fostering engagement in project decisions and activities

Controlling stakeholder engagement: Monitoring

(154)

Information Technology Project

(155)

Internal project stakeholders generally include the

project sponsor, project team, support staff, and internal customers for the project. Other internal stakeholders include top management, other

functional managers, and other project managers because organizations have limited resources

External project stakeholders include the project’s

(156)

 www.projectstakeholder.com lists other

stakeholders including:

◦ Program director

◦ Project manager’s family

◦ Labor unions

◦ Potential customers

 It is also necessary to focus on stakeholders with

the most direct ties to a project, for example only key suppliers

Information Technology Project

(157)

 A stakeholder register includes basic information on

stakeholders:

◦ Identification information: The stakeholders’ names, positions,

locations, roles in the project, and contact information

◦ Assessment information: The stakeholders’ major

requirements and expectations, potential influences, and phases of the project in which stakeholders have the most interest

◦ Stakeholder classification: Is the stakeholder internal or

(158)

Information Technology Project

(159)

 After identifying key project stakeholders, you can

use different classification models to determine an approach for managing stakeholder relationships

 A power/interest grid can be used to group

(160)

Information Technology Project

(161)

 Unaware: Unaware of the project and its potential

impacts on them

 Resistant: Aware of the project yet resistant to change  Neutral: Aware of the project yet neither supportive

nor resistant

 Supportive: Aware of the project and supportive of

change

(162)

 Instead of just saying “no” when your project sponsor asks for

something unreasonable, it is better to explain what is wrong with the request and then present a realistic way to solve the problem at hand

 For example, Christa Ferguson, a PMP and independent

program manager in San Francisco, described how she handled a request from a project sponsor to deliver a new tablet device in two months when she knew she would need more time. Based on her experience, she knew the RFQ for the effort alone would take almost a month. Christa quickly researched the facts to propose a realistic delivery schedule.

 The project sponsor reset expectations once he learned what

it took to produce the tablets

Information Technology Project

(163)

 After identifying and analyzing stakeholders,

project teams should develop a plan for management them

 The stakeholder management plan can include:

◦ Current and desired engagement levels

◦ Interrelationships between stakeholders

◦ Communication requirements

◦ Potential management strategies for each stakeholders

(164)

 Because a stakeholder management plan often

includes sensitive information, it should not be part of the official project documents, which are

normally available for all stakeholders to review

 In many cases, only project managers and a few

other team members should prepare the stakeholder management plan

 Parts of the stakeholder management plan are

not written down, and if they are, distribution is strictly limited

Information Technology Project

(165)
(166)

 Project success is often measured in terms of

customer/sponsor satisfaction

 Project sponsors often rank scope, time, and cost

goals in order of importance and provide guidelines on how to balance the triple constraint

 This ranking can be shown in an expectations

management matrix to help clarify expectations

Information Technology Project

(167)
(168)

 Understanding the stakeholders’ expectations can

help in managing issues

 Issues should be documented in an issue log, a

tool used to document, monitor, and track issues that need resolution

 Unresolved issues can be a major source of

conflict and result in stakeholder expectations not being met

 Issue logs can address other knowledge areas as

well

Information Technology Project

(169)
(170)

 Project managers are often faced with challenges,

especially in managing stakeholders

 Sometimes they simply cannot meet requests

from important stakeholders

 Suggestions for handling these situations include

the following:

◦ Be clear from the start

◦ Explain the consequences

◦ Have a contingency plan

◦ Avoid surprises

◦ Take a stand

Information Technology Project

(171)

 You cannot control stakeholders, but you can

control their level of engagement

 Engagement involves a dialogue in which people

seek understanding and solutions to issues of mutual concern

 Many teachers are familiar with various

techniques for engaging students

 It is important to set the proper tone at the start of

(172)

 If a teacher (or manager) does nothing but lecture

on the first day of class (or at meetings) or

criticizes the first person who offers a comment, students (or workers) will quickly decide that their best strategy is to keep quiet and maybe not even attend the class (or meetings)

 On the other hand, if the teacher (or manager)

uses a lot of activities to get all participants to speak or use technology to participate, they will expect to be active participants in future classes (or meetings)

Information Technology Project

(173)

 Many students today like to interact via text messages. Ellen

DeGeneres, a popular comedian with her own television

show, likes to poke fun at text messages in a segment based on amusing errors caused by cell phone auto-correct

(174)

 In addition to watching out for auto-correct errors

when messaging, users must also be careful who they reply to and what they say in reply

 See the text for an example from an actual college

student who forgot about an exam. The professor

called the student’s cell phone shortly after the exam started. Her policy was to assign a grade of zero if students did not show up without a valid excuse

 The student did not answer the phone call, but he

sent several texts, which were obviously not true

Information Technology Project

(175)

 Key stakeholders should be invited to actively

participate in a kick-off meeting rather than merely attending it

 The project manager should emphasize that a

dialogue is expected at the meeting, including texts or whatever means of communication the stakeholders prefer. The project manager should also meet with important stakeholders before the kick-off meeting

 The project schedule should include activities and

(176)

 On some IT projects, important stakeholders are

invited to be members of the project teams

 For example, when Northwest Airlines (now Delta)

was developing a new reservation system called ResNet, it interviewed reservation agents for

positions as programmers on the project team

 Northwest made sure that user needs were

understood by having them actually develop the

system’s user interface

Information Technology Project

(177)

 Productivity software, communications software,

and collaboration tools can promote stakeholder engagement

 Social media can also help engage stakeholders.

For example, LinkedIn has thousands of groups for project management professionals

 Some project management software includes

functionality like Facebook’s to encourage

(178)

 Elizabeth Harrin, author of Social Media for Project

Managers, describes the pros and cons of several social media tools, including blogs, collaboration

tools, instant messaging, microblogs like Twitter and Facebook, podcasts, RSS, social networks,

vodcasts (video podcasts), webinars, and wikis

 Harrin provides advice for when to use social media

and when not to use it

 As the saying goes, “A fool with a tool is still just a

fool.” A lot of stakeholder engagement requires old-fashioned techniques like talking to someone!

Information Technology Project

Referensi

Dokumen terkait

Adapun tujuan umum dari program bimbingan pribadi sosial adalah untuk mereduksi. kecenderungan perilaku merokok

1 ijin berstatus Perjanjian Karya Pengusahaan pertambangan Batubara (PKP2B) yang dikeluarkan Kementerian Energi dan Sumber Daya Mineral. Dari data tersebut, sekita 50 persen

Pelaksanaan pembelajaran berbasis kompetensi dan pembelajaran tuntas, dimulai dari penilaian kemampuan awal peserta didik terhadap kompetensi atau materi yang akan

Padma raksasa (Rafflesia arnoldii) merupakan tumbuhan parasit obligat yang terkenal karena memiliki bunga berukuran sangat besar, bahkan merupakan bunga terbesar di dunia.. Ia tumbuh

Dimulai pada aspek motorik, anak usia pra sekolah telah dapat berjalan naik tangga dengan kaki secara berganti-ganti tetapi turun dengan 2 kaki pada satu anak tangga, seringkali

Bila kualitas dari sebuah produk atau jasa yang dikeluarkan perusahaan itu baik maka pelangganakan mendapatkan kepuasan yang setimpal dengan biaya atau pengorbanan yang mereka

Jika mengutip dari artikel yang tidak ada nama penulisnya, 1 atau 2 kata pertama dari judul artikel dituliskan sebagai sumber dengan diberi tanpa kutip di awal dan di akhir judul.. In

Peningkatan ekspresi COX-2 telah dilaporkan pada berbagai macam tumor, seperti kanker kolon, kanker paru, kanker payudara, kanker lambung, kanker esofagus, kanker kepala dan