You are on page 1of 20

Volume 2, Number 23 http://isedj.

org/2/23/ April 13, 2004

In this issue:

SWOT Analysis and Theory of Constraint in Information Technology


Projects

Asghar Sabbaghi Ganesh Vaidyanathan


Indiana University South Bend Indiana University South Bend
South Bend, Indiana 46634, USA South Bend, Indiana 46634, USA

Abstract: This study focuses on the potential cost and benefit analysis of Information Technology
projects. The purpose of this study is to synergize the role of Strengths, Weakness, Opportunities
and Threats (SWOT) analysis and the Theory of Constraint (TOC) approach in the planning and
execution of Information Technology (IT) projects. Due to limited resource availability and much
needed timely delivery of projects, organizations consider a number of trade-offs during the entire
lifecycle of an IT project. The selection of projects using evaluation and selection tools from the
myriad of proposed projects, particularly when all of them promise value to the organization remain
highly challenging. By minimizing trade-offs, proper selection of projects may be achieved. This
study will use the combined effects of SWOT analysis and TOC to measure the potential benefit and
cost tradeoffs. Such measures can be used to examine the effectiveness and efficiency of IT project
management. A Five-step TOC thinking process framework that will enable project management
teams to develop an integrated strategy is also discussed in this study.

Keywords: project management, SWOT analysis, theory of constraint, effectiveness, efficiency,


planning

Recommended Citation: Sabbaghi and Vaidyanathan (2004). SWOT Analysis and Theory of
Constraint in Information Technology Projects. Information Systems Education Journal, 2 (23).
http://isedj.org/2/23/. ISSN: 1545-679X. (Preliminary version appears in The Proceedings of
ISECON 2003: §2414. ISSN: 1542-7382.)

This issue is on the Internet at http://isedj.org/2/23/


ISEDJ 2 (23) Information Systems Education Journal 2

The Information Systems Education Journal (ISEDJ) is a peer-reviewed academic journal


published by the Education Special Interest Group (EDSIG) of the Association of Information
Technology Professionals (AITP, Chicago, Illinois). • ISSN: 1545-679X. • First issue: 8 Sep 2003.
• Title: Information Systems Education Journal. Variants: IS Education Journal; ISEDJ. • Phys-
ical format: online. • Publishing frequency: irregular; as each article is approved, it is published
immediately and constitutes a complete separate issue of the current volume. • Single issue price:
free. • Subscription address: subscribe@isedj.org. • Subscription price: free. • Electronic access:
http://isedj.org/ • Contact person: Don Colton (editor@isedj.org)

Editor
Don Colton
Brigham Young Univ Hawaii
Laie, Hawaii

The Information Systems Education Conference (ISECON) solicits and presents each year papers
on topics of interest to IS Educators. Peer-reviewed papers are submitted to this journal.

2003 ISECON Papers Chair


Associate Papers Chair Associate Papers Chair
William J. Tastle
Mark (Buzz) Hensel Amjad A. Abdullat
Ithaca College
Univ of Texas at Arlington West Texas A&M Univ
Ithaca, New York
Arlington, Texas Canyon, Texas

EDSIG activities include the publication of ISEDJ, the organization and execution of the annual
ISECON conference held each fall, the publication of the Journal of Information Systems Education
(JISE), and the designation and honoring of an IS Educator of the Year. •The Foundation for
Information Technology Education has been the key sponsor of ISECON over the years.• The
Association for Information Technology Professionals (AITP) provides the corporate umbrella under
which EDSIG operates.

Ⓧc Copyright 2004 EDSIG. In the spirit of academic freedom, permission is granted to make
and
distribute unlimited copies of this issue in its PDF or printed form, so long as the entire document

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 (23) Information Systems Education Journal 3

is presented, and it is not modified in any substantial way.

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 4

SWOT Analysis and Theory of Constraint in


Information Technology Projects
Asghar Sabbaghi1
Indiana University South Bend
South Bend, Indiana 46634, USA

and
Ganesh Vaidyanathan2
Indiana University South Bend
South Bend, Indiana 46634, USA

Abstract

This study focuses on the potential cost and benefit analysis of Information Technol-
ogy projects. The purpose of this study is to synergize the role of Strengths, Weak-
ness, Opportunities and Threats (SWOT) analysis and the Theory of Constraint (TOC)
approach in the planning and execution of Information Technology (IT) projects. Due
to limited resource availability and much needed timely delivery of projects, organi-
zations consider a number of trade-offs during the entire lifecycle of an IT project.
The selection of projects using evaluation and selection tools from the myriad of pro-
posed projects, particularly when all of them promise value to the organization re-
main highly challenging. By minimizing trade-offs, proper selection of projects may
be achieved. This study will use the combined effects of SWOT analysis and TOC to
measure the potential benefit and cost tradeoffs. Such measures can be used to ex-
amine the effectiveness and efficiency of IT project management. A Five-step TOC
thinking process framework that will enable project management teams to develop
an integrated strategy is also discussed in this study.

Keywords: Project management, SWOT analysis, theory of constraint, effective-


ness, efficiency, planning

1. Introduction
project as promised, as well as its cost
and benefits. The recent developments
Advances in information technology and
in IT have also brought significant rami-
intensified competition in the market- fications with regard to the critical re-
place have contributed to the timely de-
quirements for effectiveness and effi-
livery of products and services. This in ciency in IT project management.
turn has contributed to increased bene-
fits and reduced costs of IT project Given the critical importance of project
management. Depending on the size, delivery and reliability as well as the
scope, and complexity of a project, a economic rationale in project planning
number of conflicting elements chal- and implementation, the future of any
lenge IT project management. Project business will be determined by how well
delivery may address the equally impor- projects are managed today. In general,
tant need for reliability in delivering the short period cycle times may lead to

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 5

substantial incremental earnings while


the penalty for long project cycle times taken by U.S. companies in 1999were
may mean missing market opportunities cancelled or abandoned before comple-
altogether. In addition, multi-project tion, representing a loss of almost $62
organizations may often tend to launch million. It was also reported that only
projects as soon as they are under- 13 percent of IT system projects were
stood. These organizations launch the considered successful by sponsoring
projects concurrently with existing pro- managers, while only 16.2 percent of
jects, simultaneously with other new software development projects were
efforts, or without sufficient regard to completed on time and within budget
the capacity of the organization. This (Yeo, 2002).
would commonly lead to an array of
projects with conflicting priorities. Pro- It can be argued that smaller projects
ject resources and managers are re- are more manageable and it is usually
sponsible for sorting these priorities. Of easier to ensure their success, and thus,
particular concern in this regard is that smaller projects are more likely to suc-
the priorities established within a func- ceed than large projects. On the other
tional area may not be in synchrony hand, one can argue that larger projects
with other areas, or more importantly would have more funding and resources
with the company-wide priorities. Ac- and therefore should have a higher
cording to Standish group report probability of success. However, we
(1999), Corporate America spends more argue that while the smaller projects
than $275 billion each year on approxi- may be more manageable, project
mately 200,000 application software management can be the critical factor in
development projects. A great many of ensuring the success of the projects,
these projects will fail for the lack of regardless of the size. Some of the criti-
skilled project management (The Stan- cal factors to project success are user
dish Group International, 1999). The involvement, executive support, and a
projects in this study are classified into clear statement of business objectives.
three resolution types: (1) Success: The In this context, SWOT analysis and the
project is completed on time and on Theory of Constraints provide a com-
budget, with all features and functions prehensive framework that can address
as originally specified; (2) Challenged: the effectiveness and efficiency of pro-
the project is completed and opera- ject planning.
tional, but over budget, over the esti-
mated time, and with fewer features Wei, et al., (2002) proposed a resource
and functions than initially specified; constrained-based project management
and (3) Failure: The project was can- model for project planning, implementa-
celed before completion. According to tion and control. The research does not
this report, only 26 percent of the pro- include Theory of Constraints as a tool
jects were completely successful, while for effective project selection. Another
46 percent of them were “challenged” model used SWOT analysis to make de-
and 28 percent were considered to be cisions on effective use of resources for
failures (Standish Group, 1999). The housing projects (Ziara and Ayyub,
failed projects cost almost $75 billion in 1999.) The methodology considered
1998. Bounds (1998) reported that both the options and constraints of rele-
only 26 percent of IT projects were vant socio-economic factors in the plan-
completed on time and within budget. ning and construction of urban housing-
According to Yeo (2002), approximately project developments. A selection of
31 percent of two hundred thousand R&D projects models consist of integer
software development projects under- decision variables for both the number
of researchers allocated and project se-

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 6

lection. Researcher allocation and pro- as the extent to which the output of a
ject selection are subject to several lin-
project meets the objectives of the pro-
ear and nonlinear goal constraints (Tay- ject. We can define efficiency as the
lor, et al., 1982). In this study, we
ratio between the outputs achieved, i.e.,
have provided a framework for effec- the success of the project in achieving
tiveness and efficiency of IT project
its objectives with the input of the pro-
planning using SWOT analysis and The- ject, i.e., the utilization of resources.
ory of Constraints. There is a potential
The term “objectives” deal with whether
for further research using both these or not the organization will benefit from
tools to address the selection of projects
the project.
in a more efficient and effective man-
ner.
The key element to remember about
project management is that a develop-
2. SWOT Analysis
ment project that fails to address the
right objectives cannot succeed, even if
Over the years, there has been much
those objectives were realized very effi-
emphasis on gaining efficiency in pro-
ciently.
ject management. Existing tools such
as CPM and PERT reduce both project
SWOT analysis is an effective frame-
lead-time and the required resources to
work for analyzing the Strengths,
complete a project. However, the objec-
Weaknesses, Opportunities, and Threats
tives of the project, plans, and required
of an organization (or a project) that
resources assigned have been taken for
helps to address the effectiveness of a
granted. Therefore, insufficient atten-
project planning and implementation.
tion has been paid to analyzing the
The acronym comes from an old term
relevance of the project objectives
from the strategic planning field that is
within the context of broader, company-
concerned with the content and the ob-
wide goals, and to the effectiveness in
jectives of the project, and with identi-
project planning and implementation.
fying the right things to do. What is
How can one distinguish effectiveness
right depends on the specific interface
from efficiency in project management?
between the project, the objectives it
Table 1 displays a brief distinction of
serves, and its environment (target
effectiveness versus efficiency and the
groups, market, law and regulations,
possible outcome under various scenar-
etc.). Strengths would define any inter-
ios.
nal asset (expertise, motivation, tech-
nology, finance, business model, etc.)
In Table 1, we can define effectiveness that will help to meet demands and to

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 7

Key Questions: Typical answers


Internal Strengths What are our advantages? What do we do well?, How are Well-trained man-power , well established
we doing competitively? What are our resources? Are knowledge base, good contact to target
there any internal assets (know-how, motivation, group, technology, etc.
technology, finance, business links) which will help to
meet demands and to fight off threats?

Weaknesses What could be improved? What is done badly? What


should be avoided? Are there any Internal deficits
Lack of motivation, lack of transport
facilities, problems in distribution of
hindering the organization in meeting demands? services or products, low reputation (the
lack of a particular strength)
External

What are the good tasks? What are the interesting trends? Changes in technology and market that
Opportunities What changes do we expect to see in the market over the favor your products or services, changes in
next few years? Are are any external circumstances or government policy related to your industry,
trends that favors the demand for an organization’s changes in social patterns, population
specific competence? profiles, lifestyle, etc., local, national, &
international events increasing purchasing
power.

Threats What is our competition doing? What are the obstacles?


What future changes will affect our organization? Is
Establishment of strong competitors, lack of
cash at household level, governmental
changing technology threatening our position? Do we regulations that limit free distribution of our
have management support? Sufficient resources? Are we product.
using the right tools, software, and platform? Are there
any external circumstances or trends which will
unfavorably influence demand for an organization's
competence?

Table 2. SWOT Key Questions and Typical Answers

fight of threats. What are we good at in cess probability depends on whether its
project management? How are we doing strengths not only match the key suc-
competitively? Moreover, what are our cess requirements for operating in the
resources? Weaknesses describe inter- target environment but also exceed of
nal deficits (lack of motivation, lack of those of project threats. Threats define
transport facilities, problems in distribu- any external circumstance or trend (es-
tion of services or products, low reputa- tablishment of strong competitors, gov-
tion, etc.) that hinder the organization ernment deficit, or regulations that limit
in meeting its demands. In this con- free distribution of our products or buy-
text, one may consider the following ing our services, etc.) that will unfa-
questions: what are we doing badly? vorably influence demand for an organi-
What annoys our clients most? zation’s competence. Table 2 summa-
rizes some of the key questions and
Opportunities describe any external cir- typical answers in each area. Dell Com-
cumstances or trends that favor the puter Corp. can be viewed as an exam-
demand for an organization’s specific ple of how an IT company can use a
competence. For example, what SWOT analysis to carve out a strong
changes in economic, political, or tech- business strategy. Dell recognized that
nological factors (development of new its strength was selling directly to con-
markets for high quality products, new sumers and keeping its costs lower than
technologies that favor our product, those of other hardware vendors. As for
etc.)? Do we expect to see in demand weaknesses, the company acknowl-
in the near future? The project’s suc- edged that it lacked solid dealer rela-

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 8

tionships. Identifying opportunities was


an easier task. Dell looked at the mar- achieved? For example, an IT project to
ketplace and saw that customers in- install a number of computers and rele-
creasingly valued convenience and one- vant software tools can be viewed to
stop shopping and that they knew what enhance productivity in an organization.
they wanted to purchase. Dell also saw According to Horn, Neiman et al (1994),
the Internet as a powerful market- ing it is useful to start with critical factors in
tool. On the threat side, Dell real- ized the project’s environment, i.e., oppor-
that competitors like IBM and Compaq tunities and threats. In particular, they
Computer Corp. had stronger brand argue that opportunities and threats
names, which put Dell in a weaker shall not only be formulated based on
position with dealers. Dell de- veloped a existing conditions but also by future
business strategy that in- cluded mass trends.
customization and just-in-time
manufacturing (letting cus- tomers 3. Theory of Constraints
design their own computers and
custom-building systems). Dell also The Theory of Constraints (TOC) is a
stuck with its direct sales plan and of- management philosophy (Tolerate
fered sales on the Internet. 1980), where the organization may be
considered as an interdependent series
In short, SWOT analysis provides a of processes rather than an independent
framework for better understanding of business unit. TOC offers a methodol-
framework conditions (strengths and ogy for achieving system optimization
weaknesses) from external framework rather than process optimization. The
conditions (opportunities and threats)? theory can be characterized as a set of
For example, an information technology concepts, principles, and measurements
department needs to determine the that focus on the ultimate output of the
strengths and weaknesses of its people whole system, not just that of a compo-
the project objectives by focusing on nent part of it. TOC views any organi-
the following questions: What are our zation as a system, as an integrated
objectives? What do our customers whole instead of a collection of related
want? How do we distinguish ourselves parts with the primary emphasis on the
from competitors? How can we improve output of the entire system, i.e.,
our services? How can we distinguish “Throughput.” Throughput is defined as
internal and its technology. It also the difference between the value of out-
needs to ensure that the IT strategy put (sales) and direct cost (variables
complements the company's business such as raw material, parts, etc.) and
goals. The department head needs to thus as the rate at which the system
ask: What is each staff member good at generates money through sales.
in project management? What are they Therefore, on one hand, TOC promotes
not good at in project management? the use of global system-wide measures
Project leaders also must consider op- rather than local measures and the per-
portunities and threat -- or customers formance of any unit within the organi-
and competitors. How attractive is the zation is measured as to its contribution
market or direction they are consider- to the organizational goals and objec-
ing? What is their market share and tives. The focus of the TOC philosophy
cost structure? is that any organization (or system) has
a constraint (or a number of con-
Effective project management requires straints) that dominates the entire sys-
a development of a mission statement tem. The secret to success lies with
for the project, i.e. what is to be managing these constraints and the
system. On the other hand, TOC moves

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 9

Table 3. Effectiveness and Efficiency in IT projects using TOC

the performance measurement from a Another reason cited for sub-


cost-oriented to a throughput-oriented optimization is analytical thinking
paradigm. Throughput provides a more (Dettmer, 1998). Analytical thinking
meaningful and effective measure of breaks complex problems into smaller,
improving organizational performance, more manageable sub-problems that
and does not necessarily prescribe cost may be analyzed separately. After solv-
cutting and downsizing strategies. ing each sub-problem, often in isolation
from the rest, the pieces are reassem-
In Table 3, we can define effectiveness bled into a whole again. This analytical
as the extent to which all constraints thinking is based on the assumption
are identified and managed in projects. that if we make each part of a system
We can define efficiency as the extent perform to its maximum capability, the
to which all weak links have been system as a whole will benefit. This ap-
strengthened i.e., the utilization of re- proach may be useful in analyzing sub-
sources. The term “objectives” deal components and, thus, there may be a
with whether or not the organization will certain appeal to the idea of disassem-
benefit from the project. bling and reassembling again. How-
ever, as systems become more com-
Deming (1993) described the danger of plex, the interaction and interdependen-
sub-optimization as follows: Anything cies of components (particularly organi-
less than optimization of the whole sys- zations and people) would define the
tem will bring eventual loss to every performance of the system as a whole,
component of the system. He noted and the effectiveness of analytical think-
that the obligation of any component is ing become questionable.
to contribute its best to the system, not
to maximize its own production, profit, In TOC, an organization is viewed as a
sales, or any other competitive meas- system and components of the system
ure. Some components may operate at under management subordinate their
a loss themselves in order to optimize efforts to the larger system of which
the whole system. Sub-optimization they are a part. However, the primary
may result from a lack of awareness or focus is on the constraints that hinder
an assumption that maximizing the per- the organization from achieving its goal.
formance of each component part of the More specifically, the organization is
system will automatically maximize the compared to a chain (Figure 1) or a net-
performance of the system as a whole. work of chains (Figure 2).
According to Deming, this is not a valid
assumption. In this analogy, one weak link limits the

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

complex chain of cause and effect that


can be traced back to a root cause.
Furthermore, in larger organizations,
the policy constraints often go across
multiple functional units and require ad-
dressing those constraints and breaking
them at higher levels of the organiza-
tion. Therefore, due to the relative
complexity of policy constraints,
Goldratt (1992) proposes a more elabo-
rate process, requiring three major
steps:

1. What to change? Where is the con-


performance of the entire chain. This straint?
weakest link is the system’s constraint
that has to be targeted for improve- 2. What to change? What should we do
ment, be carefully examined, and effi- with the constraint? (Develop and
ciently addressed. Once the weakest validate new ideas to break the con-
link is strengthened, the next weakest straint that would deliver the desired
link becomes the constraint that limits results, and at the same time mini-
overall system performance. Therefore, mize the adverse side effects.)
at each stage, improving the perform-
ance (throughput) of the chain requires 3. How to change? How do we imple-
strengthening the weakest link at that ment the change? (Convert those
stage. It may be relatively less complex ideas into effective action and real-
to locate physical constraints, such as ity.)
limitation of resources or technology to
support production/ operation/ distribu- These three questions provide the
tion processes, because they are tangi- framework for the TOC Thinking Proc-
ble. In most cases, however, the real ess. Furthermore, this thinking process
constraints to improving a system’s per- is logic based, and thus not confined
formance are not physical but policy only to physical constraints, manufac-
constraints. They are rules, plans, pro- turing systems, or for-profit organiza-
cedures, measurements, or other guide- tions. It is applicable to any system, as
lines that are less tangible and at the long as the goals of the system can be
same time prescribe the framework for clearly defined. In order to apply this
operations and management of the in- thinking process, there are four criteria
ternal organization, and its interface (Dettmer, 1998) to be satisfied:
with external environment. They can
manifest themselves in training and be 1. Motivation to improve the system,
the benchmarks and measurements that
are used to assess success or failure. 2. Thorough knowledge of the system
that needs to be improved
In Goldratt’s view, the policy constraints
are usually much more devastating than 3. Some degree of authority, or at least
physical constraints, and nearly every influence, to initiate change, and
physical constraint results from some
policy constraint. It is also more diffi- 4. Understanding of the TOC Thinking
cult and challenging to identify the ex- Process methodology.
act policy constraints, as it requires a

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

4. Five-step Thinking Process: Diagram (CRD): This step reveals hid-


A Framework den conflicts and underlying assump-
tions behind the UDEs. It can lead to
Using the rigor and logic of cause-and ef- breakthrough solutions. It helps a
fect, the five-step thinking process (shown management team to begin to answer
in Figure 3) would enable the manage- “what to change to,” and helps the team
ment team to solve a problem and/or de- to agree on the direction of the solution
velop an integrated strategy, beginning that will work.
with the symptoms and ending with a de- Future Reality Tree (FRT): The FRT step
tailed action plan that coordinates the ac- is used to confirm the solution and to
tivities of all those involved in implement- identify potential negative side effects.
ing the solution. The five-step thinking FRT construction starts with the Injec-
process is illustrated in Figure 3. tion from the CRD step, and uses the
logic and UDEs from the CRT to develop
Current Reality Tree (CRT): This step the future system. This would enable
examines the cause and effect logic be- management to remove negative effects
hind the undesirable effects in the sys- and see if a solution will work. As part
tem. The CRT process starts with the of FRT construction, the UDEs are
observed Undesirable Effects (UDEs), turned into Desired Effects.
and builds, with strict logical rules, a
model of the system. It helps man- Prerequisite Tree (PRT): This step is
agement to identify the system con- used to outline how to cause the
straint or what to change. The Man- change. It helps management to iden-
agement team making CRT must have tify obstacles, sequence, and milestones
knowledge of the system and it would and to overcome the obstacles in im-
help if the team agreed on the problem. plementing the solution.

Evaporating Cloud or Conflict Resolution Transition Tree (TT): This is a detailed

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

step-by step implementation of the so-


lution. This is used to cause the change. done. In this traditional approach, the
It would help management to see the Critical Path Method (CPM) of scheduling
plan of action for overcoming obstacles is defined as a project management
and implementing the change. method of calculating the total duration
of a project based on individual task du-
5. TOC Solution in Project Man- ration and their interdependencies. In
agement: A System Approach other words, we determine which path
of work will take the longest, and thus
Applying TOC to the areas of project manage all others to fit within this long-
management provides a whole system est path. However, the common project
view of the challenge. In the TOC ap- focus is on each individual task’s dura-
proach, the set of tasks that determine tion and resource requirement. Thus,
when a project can be completed is the the variation in an individual task’s de-
Critical Chain. They are called a chain, mand for resources would cause varia-
rather than a path, since they take into tion in resource demand during the pro-
account resource dependencies. Thus, ject’s execution.
the faster the critical chain tasks are
completed the sooner one can finish the
project. Therefore, the TOC-based solu-
tion for managing a single project,
whether stand alone or as part of a
portfolio of projects, is known as critical
chain scheduling and buffer manage-
Figure 4. Critical Chain Project Network
ment. It provides part of the answer for
the priority aspect of the question TOC considers a project as a network of
"What should I work on?" which, if not required tasks that move toward a set
addressed appropriately, drives multi- of clear objectives intended to be com-
tasking behaviors in multi-project envi- pleted under budget and on schedule.
ronments (Goldratt, 1997; Newbold As shown in Figure 4, for a project with
1998; Patrick 1999). goals such as developing a new IT ser-
vice for sales management, certain pre-
In managing a project, the emphasis is requisites are needed. These prerequi-
on the delivery of tasks that make up sites are the precedents for the goal,
the project. A task is defined as a set of i.e., what is needed to achieve the goal.
activities performed by one or more re- These precedents become the succes-
sources on a project. For each task, the sors for their prerequisites. In order to
inputs are from one or more resources achieve the goal from the prerequisites,
outside of the task, and its output is re- there may be some underlying assump-
quired for one or more resources out- tions to clarify all needed dependencies
side of itself. A task cannot begin work between the predecessor and the suc-
until all required preceding inputs are cessor. This process is repeated a
received. A task is not complete until number of times until the start task is
all required outputs are not only fin- reached. The result is a network that
ished (according to the task completion describes what must be in place in what
criteria) but also passed on to all subse- order and what is the logic behind these
quent resources requiring the output of successive tasks.
task. It is assumed that if these tasks
are done on time, the project will be Austin and Peschke (1999) have sug-
completed on time as well, and thus
there is more focus on getting the task

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

Activity Immediate Weeks ES EF LS LF Slack Critical?


Precedence Required
A 3 0 3 0 3 0 Yes
B A 2 3 5 6 8 3 No
C A 5 3 8 3 8 0 Yes
D B,C 8 8 16 8 16 0 Yes
E B,C 4 8 12 12 16 4 No
F D,E 2 16 18 16 18 0 Yes
Table 4. Reliable IT project CPM Scheduling

gested a 5-step process in building a


time, there is a tendency not to go at
TOC project network. Traditionally, in full steam, particularly when there is
CPM or PERT, given the focus on indi-
pressure to do other tasks.
vidual activities, there is a strong ten-
dency to include contingency time and
Consider, for instance, an IT project in
other resources within each activity.
the Reliable Company that consists of
This estimate, and often an over esti-
six activities (A, B C, D, E, and F). Ta-
mate of contingencies, are justified to
ble 4 shows the activities and the
account for uncertainty due to individual
PERT/CPM solution to manage the pro-
activity that commonly causes varia-
ject.
tions in the activity as well as special
cause variation that is specific to some
local condition. This is argued to pro-
tect against Murphy’s Law: “If anything
can possibly go wrong, it will go wrong.”
The amount of these contingencies are
not usually well specified, and they are Figure 5. Network for an IT project
justified to meet the deadline with a
high level of certainty and to reduce the Figure 5 displays the network of the ac-
tivities for the project. Figure 6 displays
risk.
the measure of required time and other
resources for completing the project
Furthermore, managers or co-
under the PERT/CPM and TOC ap-
coordinators at each level within the or-
proaches.
ganizational hierarchy could build in
their own reserves on top of the re-
Goldratt believes that a consequence of
serves built in by people reporting to
the three time estimates used in PERT
them. In addition, in this approach, as
and their weighted mean being used for
Goldratt argues, there is a tendency to
scheduling by CPM will be a tendency to
misuse the safety time created within
overestimate the times and other re-
the estimated times for each activity.
sources to give a reasonable degree of
There is often a perception among the
certainty of completion. As he noted,
employees that when safety time is built
the uncertainty existing in every project
into the estimates they do not need to
is the underlying main cause for most
worry about starting on time, and thus,
problems. Furthermore, the allocation
according to Parkinson’s Law, “work ex-
of resources (funding, people time,
pands to fill (and often exceed) the
skills, equipment, etc) to various activi-
time.” Therefore, starts may be de-
ties is viewed as a separate stage of
layed, and this, known as “student syn-
project management. In particular,
drome,” would leave everything to the
last minute. Even if starts are made on

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

many of the resources required for indi- parts, is known as the “project buffer.”
vidual project tasks are often sub- The project team members who work on
contracted, where these resources may the project are expected to make realis-
be committed to other tasks or projects tic estimates of time and resources
at any time. Thus, the nature of distur- communicate their expectations on ac-
bances associated with most project tivity duration and attempt to meet
specific tasks may further complicate those estimates. To prevent non-critical
the availability of resources. In par- activities from delaying critical ones,
ticular, in PERT, all activities, whether or “feeding buffers” are placed where non-
not they are on the critical path, will re- critical paths feed into the critical chain
ceive similar treatment with regard to to protect the start of the critical chain
uncertainty, and thus they will have tasks.
similar safety time and resources.
However, TOC removes all these contin- The feeding buffers, which again can be
gencies from individual activities and smaller than the sum of the parts due to
aggregates them into a buffer for the aggregation, contain most or all of the
entire project, as the commitments re- contingency reserves, relating the rele-
garding the completion date are only vant non-critical path. Proper man-
made at the project level (Figure 6B). In agement of the feeding buffers prevents
other words, the safety associated with the critical chain from changing during
the critical tasks can be shifted to the the project execution and leads to a rig-
end of the chain, protecting the project orous project plan. As a result, the pro-
premise (the real due date) from varia- ject promise will be protected from
tion in the critical chain tasks. This con- variations in the critical chain by the
centrated aggregation of safety, which project buffer, the critical chain is pro-
can be smaller than the sum of the tected from variation in non-critical

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

work by feeding buffers, and conse-


quently the project is protected against project buffer were sufficiently used,
Murphy’s Law. In short, TOC would relo- this would indicate a heightened risk of
cate the safety time and resources in the project promise and the priority for
strategic positions such as project buffer attention in adjusting the allocation of
or feeding buffer. This will have the ef- resources to address the critical tasks
fect of reducing the length of the critical associated with that project. Buffer
path as shown in figure 6A and 6B. The management thus would help project
decision to cut the overall safety time managers focus on maintaining the
and resources is subject to the level of premise of the project (effectiveness)
confidence that appropriate team mem- during its execution, keep it on schedule
bers of the project have in this process. and under budget (efficiency), know the
However, it is recommended that the important priorities, and make the nec-
first emphasis should be placed on fin- essary adjustments.
ishing on time before looking for a re-
duction in overall time: in TOC lan- Therefore, the critical chain approach of
guage, they go for “exploit” before “ele- concentrated protection would bring
vate.” about a dual benefit. First, it helps to
protect the project appropriately with
This TOC approach, by allowing a minimum impact on the estimate of
“whole system” view of the project, overall project duration. Second, it
identifies the critical chain and the pro- would help us to monitor risk effectively
ject buffer that protects it from inevita- throughout the course of the project.
ble uncertainty. Task’s duration esti- The following section will discuss the
mates no longer have to be long enough system of buffer management as an im-
to have a high probability of completion. portant ingredient of TOC and as an ef-
Shortening the task duration estimate, fective method for multi-project man-
therefore, avoids major impact of Park- agement.
inson’s Law (work expands to fill the
time allowed) and Student’s Syndrome 6. The TOC Multi-Project Method
(delaying the start of a task due to hav-
ing more than enough time to accom- Organizations often tend to launch mul-
plish it) at the task level. It also re- tiple projects concurrently in order to
moves detrimental pressures and asso- take advantage of valuable new oppor-
ciated behavior of artificial task dead- tunities. However, the demand of these
lines from the concerns of project re- multiple projects would impose conflict-
sources. The buffers, and their con- ing priorities on the constraint capaci-
sumption and replenishment during the ties, resources, and policies of the or-
actual project execution, can provide ganization. This, in turn, decreases the
guidance in assessing the chain of ac- chance of success of these projects. In
tivities that is in the greatest jeopardy particular, project managers from vari-
of delaying the promise of the project. ous functional areas within an organiza-
This can provide a clear direction for the tion may argue for the functional impor-
attention to be paid to the most critical tance of their own projects and for
constraint of the project and the most higher priority. On the other hand, as
beneficial use of a resource. For exam- Patrick (1999) notes, if a resource di-
ple, if a project buffer is sufficiently un- vides its attention between different
used, the project premise can still be tasks before handing off task deliver-
protected from distractions and disrup- ables, this would prolong all the projects
tions on critical tasks that may jeopard- involved, since all of that resource's
ize the project. On the other hand, if a successors on each project will have to
wait longer than necessary due to time

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

spent on other projects' work. The pro-


jects will also be impacted by the vari- estimates of task duration is that the
ability of not only their own tasks, but estimate of the overall duration of a
also of those associated with the other project grows beyond the limits accept-
projects that are interleaved within able to management, customers, and
them. Therefore, most projects will the bottom line. Therefore, manage-
take significantly longer than necessary, ment usually responds with what we
in both their premise and their execu- might call backpressure. Typically, this
tion. TOC and its principles, when ap- means that management mandates cuts
plied to multi project systems, provides in all estimates of task duration, usually
guidance on assessing the capacity of in a rather arbitrary manner. The battle
such systems and related mechanisms that results between management and
for the synchronized launch of projects staff, of course, rages on. However, the
and improves the effectiveness of their system approach in TOC would concen-
execution. The TOC method consists of trate on the areas of the project’s net-
five steps: (1) Prioritize the organiza- work where the protection is the most
tion's projects, (2) Plan individual pro- effective. There are two such areas:
jects via critical chain, (3) Stagger the first, and perhaps the most important,
projects, (4) Measure and report the is at the end of a project's Critical
buffers, and (5) Manage the buffers, Chain, known as the Project Buffer, and
These steps together overcome the the second, called the Feeding Buffer, is
challenges of physical and policy con- placed between every Critical Chain task
straints, and help to address the priori- and any non Critical Chain task that
ties among the projects and the activi- feeds the Critical Chain task. The pur-
ties within each project. pose of the Feeding Buffers is to protect
the starts of those Critical Chain tasks
1. Prioritize the organization's projects: that require inputs from non Critical
During the first step, the projects must Chain tasks, so that by protecting the
be prioritized at the organizational lead- starts of the Critical Chain tasks from
ership level. Only at that level would the untimely availability of the required
one be able to properly evaluate the po- inputs, with the Feeding Buffers, we
tential contribution of each project to prevent the project's longest chain of
the organizational goals and objectives tasks from becoming longer unneces-
and determine the optimum order of sarily. The TOC approach would help to
priority among the projects. However, if effectively protect each project execu-
the value of this step is left to middle tion, as well as to efficiently manage the
managers or, worse, to individual pro- buffers in a Multi-Project environment.
ject managers, this would increase the
chance of sub-optimization, and conse- 3. Stagger the Projects: The TOC ap-
quently failure of effectiveness. proach staggers the projects based on
the availability of one resource that is
2. Plan Individual Projects via Critical commonly required by most of the pro-
Chain: As was discussed earlier, there is jects within an organization and more
a strong tendency in any functional area heavily used relative to other resources
to overestimate the contingency time (Newbold 1998). This is called the
and resources for each task within a drum resource or synchronizer. The role
project partly to protect against Mur- of the drum resource is to set the pace
phy’s Law, and partly to avoid negative at which projects are launched into the
consequences for themselves. Unfortu- system, and to regulate the flow of
nately, a direct outcome of embedding work-in-process around the full capacity
such “contingencies “ within individual of the most restricted resource. The
production rate of this drum resource

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

typically provides the pace for the rest


of the system, and thus the work- formance, and thus there may be a ten-
schedule for this drum resource is used dency to a biased report of the safe-
to determine the rate at which projects guarding buffers. Therefore, a timely,
are allowed to enter the system. There- unbiased buffer report will be an impor-
fore, the drum resource is never over- tant tool for maintaining focus through-
loaded. Given the relatively heavy load out the organization.
of the drum resource, other resources,
while they are part of the solution, will 5. Manage the buffers: While a timely,
not be overloaded. Furthermore, not all unbiased buffer report plays an impor-
the projects are consistently in use of tant role in maintaining proper focus
the drum resource. Therefore, there throughout the organization, it plays an
are times when the stagger is insuffi- even more significant role in setting pri-
cient to protect other resources from orities correctly. Project managers
peak loading and pressures to multi- must constantly report the status of the
tasking. In order to address this prob- projects and the status of various buff-
lem, additional stagger is added be- ers, interpret them properly, and com-
tween the projects, known as the Ca- municate them to the appropriate man-
pacity Buffer. This would serve to pro- agers in the organization so that they
tect the level of a cross-project, to in- can identify the problems and the need
sure that on average there are enough for possible reprioritization. For exam-
resources to schedule for all the pro- ple, suppose a resource is in critical
jects, and to efficiently protect them need of multiple tasks and one needs to
from any disruptions and delay. Obvi- determine which one of these tasks is
ously, by properly identifying the drum the most urgent. All is needed is to
resource and effectively using capacity look at the buffers associated with the
buffers, staggering the projects of the various tasks, and examine which task
organization can be an important step in is associated with a project buffer since
multi-project management. TOC, in it always has priority over tasks that are
particular, tends to focus on maximizing associated with feeding buffers. Simi-
the flow of work through a system larly, when two or more tasks are all
rather than balancing capacity. This associated with similar buffers, then the
higher-level view of system capacity task whose buffer is in greater jeopardy
rather than resource capacity leads to is clearly given the highest priority.
the conclusion that it is enough to keep Management of the organization's global
as little as one resource effectively util- buffers and their timely and compre-
ized to manage and maximize the hensive reports would help the man-
throughput of the system. agement team to identify the flexibility
in the assignment of resources, and to
4. Measure the Buffers: As we discussed set the priorities that protect all the pro-
earlier, proper attention on buffer meas- jects of the organization from undesir-
urement and reporting throughout the able disruptions and delay. More spe-
execution of each project is vital to the cifically, if such a report indicates that
success of completing the project. This one project is in serious trouble, the
task will become even more critical in same report also shows where the right
multi-project environments as it affects resources can be borrowed without
the reality check of the overall schedule jeopardizing the premises set for the
for the organization. In particular, the projects.
size of the buffers is often viewed by
those who report as an implicit
measurement of their own performance,

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

7. Concluding Comments
8. REFERENCES
Traditionally there has been much em-
phasis placed on gaining efficiency in Austin, K. M., and Peschke, R. E.
project management. CPM, PERT, and (1999). How to Build a TOC/Critical
Gant charts have been developed to fa- Chain Project Network, APICS CM-
cilitate the planning and execution of SIG Symposium Proceedings, March
projects on time and within the budget. 22-23, 1999, Phoenix, Arizona.
On the other hand, project managers
have taken the effectiveness of project Bounds, G. (1998), “The Last Word on
planning and execution for granted. In Project management, “ IIE Solu-
other words, there has not been suffi- tions.
cient emphasis placed on how to
achieve effectiveness in project man- Deming, W. E. (1993). The New Eco-
agement. In particular, a project man- nomics for Industry, Government,
ager needs to clearly identify the pro- Education, Cambridge, MA: MIT,
ject’s goals and objectives in support of Center for Advanced Engineering
the organizational mission and vision Study.
statements so that the project team
could focus on the effectiveness of pro- Dettmer, H. W. (1998). Breaking the
ject planning and execution before look- Constraints to World-Class Perform-
ing for efficiency measures. SWOT ance, Milwaukee, Wisconsin: ASQ
analysis is an effective method for iden- Quality Press.
tifying the strengths and weaknesses
and examining the opportunities and Goldratt, E. M. (1992). The Goal, 2nd
threats in project management. TOC Revised Edition, Great Barrington,
takes a system approach in managing a MA: North River Press.
project, using throughput as an effec-
tive measure of performance evaluation. Goldratt, E. M. (1997). Critical Chain,
It identifies the constraint that domi- Great Barrington, MA: North River
nates the entire project at any given Press.
time and allocates resources to break
the constraint and to achieve the pro- Horn, L., et al. (1994). SWOT analysis
ject’s objectives. Thus, TOC Time Man- and strategic Planning-A Manual,
agement technique (Critical chain (GFA, Eulenkrugstr, 82, D22345
scheduling) contributes significantly to Hamburg, Germany).
the effectiveness as well as to the effi-
ciency of project management. Fur- Newbold, R. (1998). Project Manage-
thermore, TOC has been extended to ment in the Fast Lane, Boca Raton,
allocate resources to multiple projects FL: St. Lucie Press.
that share common resources. This ap-
plication maximizes the number of pro- Patrick, F. S. (1999). Getting Out From
jects that an organization can handle Between Parkinson's Rock and Mur-
while maintaining the principles for re- phy's Hard Place. PM Network 13
ducing project duration on each individ- (April): 57-62.
ual project. TOC can also be effectively
applied to other areas such as project Standish Group Internation (1999),
risk management and project cost man- “Chaos: A Recipe for Success”, The
agement. Standish Group International.

Taylor, B. W., et al. (1982). R&D Project


selection and manpower allocation

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 1

with integer nonlinear goal pro-


gramming, Management Science,
Vol. 28, Issue 10, pp1149 –1158.

Wei, C., et al. (2002). Resource-


constrained project management us-
ing enhanced theory of constraint,
International Journal of Project Man-
agement, Vol. 20, Issue 7, pp 561-
567.

Yeo, K.T. (2002), "Critical Failure Factors in


Information System Projects",
International Journal of Project
Management, Vol. 20, No. 3, April, pp.
241-247.

Ziara, M. M. and Ayyub, B. M. (1999).


Decision Analysis for Housing-
Project Development, Journal of Ur-
ban Planning & Development, Vol.
125, Issue 2, pp 68-83.
1
sabbaghi@iusb.edu
2
gvaidyan@iusb.edu

Ⓧc 2004 http://isedj.org/ April 13,


ISEDJ 2 Sabbaghi and 2

Asghar Sabbaghi, Ph.D., Associate Dean and


Professor of Decision Sciences, has been teaching at
Indiana University South Bend, School of Business and
Economics for many years. He received his Ph.D. in
quantitative economics and business analysis from
Indiana University. Dr. Sabbaghi has attended Harvard
University Management Development Program during
the summer of 1999. He had earlier attended the MIS
Faculty Development Institute at the University of
Minnesota in 1987, and Advanced MIS Faculty
Development Institute at IU/Bloomington in 1989. Dr.
Sabbaghi’s teaching is in the areas of Management
Information Systems (MIS), managerial decision making
models, production/operations management, and
database management systems. His research is in the areas of MIS, decision
support systems, economics of Information technology, scarce resource
planning, and economics of water resource management. The second edition
of his co-authored book, Economics of Water Resources: from Regulation to
Privatization, was published in 1998. A paper presented at the Society for
the Advancement of Information Systems received the Richard Irwin
Outstanding Paper Award. He has reviewed MIS and Operation Management
textbooks, articles for several journals including MIS Quarterly, served as
editorial Board/Reviewer for Journal of Economics and Finance, Journal of
Microcomputer System Management, and Journal of Information Systems
Education as well as a paper referee for professional organizations in
Decision sciences and MIS areas.

Ganesh Vaidyanathan, PhD, is an Assistant Professor


at the School of Business and Economics at Indiana
University, South Bend. He received his Ph.D. from the
Tulane University in 1989. He has over fifteen years
experience in ecommerce, information technology,
automation, strategy, and software engineering with
several high tech industries in US and abroad. Prior to
co-founding eReliable Commerce, Inc., Dr.
Vaidyanathan held executive positions at AlliedSignal,
Inc., General Dynamics, and Martin Marietta Inc. Dr.
Vaidyanathan launched products to include security,
payment processing, insurance, procurement, financing,
shipment, logistics, ERP, and data warehousing. He has consulted with
Fortune 100 companies including United Airlines, Mitsubishi, Motorola, and
Honeywell in technology, business and process reengineering. He has
enhanced effective business processes in Logistics, Payments, Purchasing,
Life Cycle Costs, Decision Support Systems, Marketing and Supply Chain
Management. His current research interests focus on eBusiness, information
technology, supply chain management and project management.

Ⓧc 2004 http://isedj.org/ April 13,

You might also like