Quantifying the value of business requests to IT
(Quantitative Risk Analysis for IT Management)
“We will
deliver solutions with clear, measurable business value.”
--Paul Algreen CIO, Janus Capital Group
This quote, from our CIO, could have been from any CIO in any
industry. It makes sense, is simple to
understand, and is hardly novel. The
issue many IT practitioners including myself have with it though is also simple
and not so novel. Determining the
business value of an IT deliverable is not something that IT can do without a
deep understanding of the processes of the functional areas that they support
and the objectives and strategies of their leaders. As a matter of fact, this should be a
business deliverable to IT prior to project approval and prioritization. Business Analysts can help in some aspects
during the requirements process, but by then, the project has already been
approved, hopefully with some value analysis, but all too often, without any.
The capability enabled or catastrophe avoided by an IT
project, whether it be enabling a holistic view of operations (BI), a reduction
in the risk associated with operations (Security, MDM), an ability to increase
throughput (Storage, Network), new capabilities and efficiencies (Application
Development), etc., should be accompanied by an explanation and measurement of the
financial impact to the bottom line. Mandating
this deliverable however, is beyond of the control of most CIO’s. Despite the fact that much of what does engage
IT resources is strategic in nature even when not quantified, too often, some
are hot button items presented by the most vocal business partners when if
measured, might have been avoided. But requiring
the measurement of the potential value of an ask? Is this even possible? Isn’t
this too burdensome and even obstructionist?
Impossible at worst and bureaucracy run amok at best? Not really, and
I’ll show you why. Let’s examine more
closely an IT initiative that is “invisible” to the business for all practical
purposes, Security. Very little research
is required to understand the impact to reputation and thus, revenue, immediate
and long-term, which accompanies a breach of private customer information. Is it a 20% hit for six months? A 10% hit for
3 years? Is that a reasonable range that encompasses the majority of
scenarios? A small investment of time in
Google should be able to provide some range of possibilities based upon real
events. Even with these broad assumptions
like these, we are able to quantify a reasonable expectation of loss.
By building a simple model in MS Excel, it becomes obvious
quickly why an initiative like this may trump all other initiatives at this
moment. See example below.
Figure 1: Security
Project Estimate
With the previous example, I admit the value was pretty
obvious to anyone who has paid attention to the news in recent years, but I
like to believe that, tying numbers to the effort may have avoided the need for
multiple further discussions and presentations on the topic.
A more tactical and involved example is as follows. In the Business Intelligence (data) world,
the deliverable of complete, accurate, and accessible data can be measured by quantifying
the value of making decisions with more information (less uncertainty=greater
probability of desired outcome). A Sales
or Marketing manager, may be asking themselves, Am I targeting the right
prospects or markets? Spending time with the right customers or markets? Building
the right products? Capitalizing on favorable trends? Avoiding or minimizing
potential risks? They should and probably do have some idea as to how they
expect their world will be impacted by the impending BI initiative. For example, an integration of CRM and
transactional data will provide a picture of how company initiated activities
(meetings, calls, emails) are related to customer initiated ones (purchase,
redemptions) and will certainly cut the time needed to access, consolidate, and
analyze this data prior to making a decision, and that time can be quantified
quite easily. However, labor cost
savings are never enough to compensate for the project expense and much more
intellectual rigor must be applied to identify true benefits from the
initiative. If the manger is tasked with
thinking a little more deeply about what they may be able to accomplish, it may
lead her to propose that she should be able to Increase product diversity of 5%
to 10% of the single product advisors and in doing so, increase their flows by
a range of 10% to 25%. Even a heuristic and
conservative assumption like this, based upon her experiences or business
knowledge is reasonable and enough to quantify her expectations. The illustration below incorporates her set
of possible outcomes from her identified scenarios and quantifies an expected
gain for her from this initiative.
Figure 2: Marketing
Manager Estimate
Note that a 90% confidence used in the Security example is due
to our wanting to cover a large portion of possible outcomes given our
assumptions. The manager on the other
hand may want to stay on the conservative side and choose a confidence level
far below 90%, she may only be comfortable with 20% confidence which would yield, $1,482,564 based upon her assumptions. Still a robust calculation for something that
was previously “unquantifiable”.
With only 1 scenario identified, this initiative is already
worth over $1,000,000. A suite of such possible scenarios that align
with the business leaders’ strategy, when quantified and contrasted against the
cost of delivering the capability, helps everyone to understand the initiatives
value add to the business and in doing so, if push comes to shove can help the business
to prioritize these efforts.
IT would also utilize a similar methodology to quantify the cost
of any proposed project. Without
requirements, a similar approach to identifying a range of hours based upon
heuristics and historic data (if available) could be modeled. See below.
Figure 3: IT Estimate
Example
Without any requirements analysis being completed, we have a
method to have an initial starting point for this effort. And because we have used such a wide range
for each phase, and have developed these ranges by working with your
experienced IT staff, the likelihood of the effort exceeding 845 hours is minimized. The ranges are large and the estimate may be
large because at this moment, uncertainty is at its highest. As the ask becomes clearer and the tasks
become better understood, uncertainty will also decline and as one would expect,
these ranges will narrow and the effort’s costs will fall.
In conclusion, with minimal effort and an ask that our
managers (IT and Business) to think more deeply about how an IT deliverable
will impact the company generally and their world specifically, it is possible
to deliver upon the goal of every CIO, “to
deliver solutions with clear, measurable business value.” One part of making this approach real that I have not
addressed is who will build out these scenarios and develop these estimates? I would suggest that Business Analysts along with
the IT Manager be the ones tasked with gathering this data and building these
models. The Business Analyst will
develop insight into the business beyond its processes and the IT Manager will
better understand how data and technology are used to support the firm’s
strategic initiatives as well as develop relationships that will benefit the
firm overall as IT transforms from being a customer service organization into a
strategic partner.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.