Download as pdf or txt
Download as pdf or txt
You are on page 1of 74

Project

Management
Journal
The Professional Journal of the Project Management Institute
Volume 33, Number 4 | December 2002

PAPERS

4 2002 Student Paper Award Winner


Project Management Maturity Models: The Silver Bullets
of Competitive Advantage?
Kam Jugdev and Janice Thomas

15 Project Schedule Uncertainty Analysis Using Fuzzy Logic


Matthew J. Liberatore

23 Toward a Dynamic Simulation Model for Strategic


Decision-Making in Life-Cycle Project Management
Hemanta Kumar Doloi and Ali Jaafari

39 A Taxonomy of Internet Applications for Project


Management Communication
Steve D. Giffin

48 Critical Chain Project Scheduling: Do Not Oversimplify


Willy Herroelen, Roel Leus, and Erik Demeulemeester

61 Journaling: A Learning Tool for Project Management


Training and Team-building
Robert Loo
Project
Management
Journal
The Professional Journal of the Project Management Institute
Volume 33, Number 4 | December 2002

3 From the Editor


Parviz F. Rad, PhD, PMP

4 2002 Student Paper Award Winner


Project Management Maturity Models: The Silver Bullets
of Competitive Advantage?
Kam Jugdev and Janice Thomas

15 Project Schedule Uncertainty Analysis Using Fuzzy Logic


Matthew J. Liberatore

23 Toward a Dynamic Simulation Model for Strategic


Decision-Making in Life-Cycle Project Management
Hemanta Kumar Doloi and Ali Jaafari

39 A Taxonomy of Internet Applications for Project


Management Communication
Steve D. Giffin

48 Critical Chain Project Scheduling: Do Not Oversimplify


Willy Herroelen, Roel Leus, and Erik Demeulemeester

61 Journaling: A Learning Tool for Project Management


Training and Team-building
Robert Loo

67 Cover to Cover—Book Reviews


Kenneth H. Rose, PMP

71 Calendar

71 Correspondence

72 Advertisers Index
Project Management Journal
PROJECT MANAGEMENT Book Development Editor PRODUCTION SERVICES PROVIDED
JOURNAL EDITOR Richard Schwartz; richard.schwartz@pmi.org BY IMAGINATION PUBLISHING,
Permissions Coordinator CHICAGO, IL, USA
Parviz F. Rad, PhD, PMP
Stevens Institute of Technology Insuk Choe; insuk.choe@pmi.org Senior Editor
Bookstore Administrator Ross Foti; rfoti@imaginepub.com
Book Review Editor
Kenneth H. Rose, PMP Regina Madonna; regina.madonna@pmi.org Assistant Managing Editor
Book Publishing Planner Lauren Strandquist; lstrandquist@imaginepub.com
PMI PUBLISHING STAFF Danielle Moore; danielle.moore@pmi.org Art Director
Publisher Doug Kelly; dkelly@imaginepub.com
Administrative Assistant
Linda Cherry; linda.cherry@pmi.org
Dotti Bobst; dotti.bobst@pmi.org Associate Art Director
Editor in Chief Tonya Weiland; tweiland@imaginepub.com
General e-mail:
Dan Goldfischer; dan.goldfischer@pmi.org
pmipub@pmi.org Associate Art Director
Publishing Support Specialist Theresa Rogulic; trogulic@imaginepub.com
Natasha Pollard; natasha.pollard@pmi.org
Publications Services Manager
Angela Kramer; akramer@imaginepub.com

EDITORIAL REVIEW BOARD PUBLICATION & MEMBERSHIP Project Management Institute, Publishing
John R. Adams, Western Carolina University; Frank T. Department, Four Campus Boulevard, Newtown Square,
The Project Management Journal (USPS 8756-9728/
Anbari, PMP, The George Washington University; Bud Pennsylvania 19073-3299 USA. Phone +610-356-4600,
02) is published quarterly (March, June, September,
Baker, Wright State University; Rick Bilbro, The Innova fax +610-356-4647; e-mail: pmipub@pmi.org
December) by the Project Management Institute. PMJ
Group, Inc.; David Christensen, Cedar City, UT; David Unless otherwise specified, all letters and articles
is printed in the USA by Cadmus Magazine, Richmond,
Cleland, University of Pittsburgh; Helen S. Cooke, sent to the PMI Publishing Department are assumed
VA. Periodical postage paid at Newtown Square, PA
Cooke & Cooke; Dan H. Cooprider, Creative People for publication and become the copyright property
19073 USA and at additional mailing offices.
Management; Jeffrey Covin, Indiana University; Steven of PMI if published. PMI is not responsible for loss,
Canadian agreement #40030957. Postmaster: Send
V. DelGrosso, IBM; Deborah Fisher, University of New damage, or injury to unsolicited manuscripts or other
address changes to Project Management Institute,
Mexico; Vipul Gupta, Saint Joseph’s University; Kenneth material.
Headquarters, Four Campus Boulevard, Newtown
O. Hartley, PMP, Parsons Brinckerhoff; Francis T. Square, Pennsylvania 19073-3299 USA. Phone +610-
Hartman, The University of Calgary; Gary C. 356-4600, fax +610-356-4647. READER SERVICES
Humphreys, Humphreys & Associates; Lewis Ireland, The mission of the PMJ is to provide information Photocopies. PMJ has been registered with the
PMP, Project Technologies Corp.; Peter Kapsales, advancing the state of the art of the knowledge of pro- Copyright Clearance Center, Inc. Consent is given for
Bellcore; Young Hoon Kwak, The George Washington ject management. PMJ is devoted to both theory and copying of articles for personal or internal use, or for
University; Lee R. Lambert, PMP, Lambert Consulting practice in the field of project management. Authors the personal use of specific clients. This consent is
Group, Inc.; Alexander Laufer, Technion-Israel Inst. are encouraged to submit original manuscripts that given on the condition that the copier pays through the
of Technology; Bill Leban, Keller Graduate School are derived from research-oriented studies as well as Center the per copy fee stated in the code on the first
of Management; Robert Loo, The University of practitioner case studies. All articles in PMJ are the page of each article for copying beyond that permitted
Lethbridge; Kenneth G. Merkel, PMP, University of views of the authors and are not necessarily those of by Sections 107 or 108 of the U.S. Copyright Law. The
Nebraska; Michael D. Okrent, Agilent Technologies PMI. Subscription rate for members is $14 per year appropriate fee should be forwarded with a copy of the
Inc.; Peggy C. Poindexter, Great Falls, VA; Tzvi Raz, Tel and is included in the annual dues. first page of the article to the Copyright Clearance
Aviv Unversity; Paul B. Robinson, The Eastern Claims for undelivered copies must be made no Center, Inc., 222 Rosewood Drive, Danvers, MA 01923
Management Group; Arnold M. Ruskin, PMP, Claremont later than two months following month of publication. USA (tel: +508-750-8400; fax: +508-750-4744). The
Consulting Group; Avraham Shtub, Tel Aviv University; The publisher will supply missing copies when losses fee indicated on the first page of an article in this issue
Richard L. Sinatra, PMP, Potomac, MD; Dwight Smith- have been sustained in transit and when the reserve will apply retroactively to all articles published in the
Daniels, Arizona State University; James Snyder, stock will permit. journal, regardless of the year of publication. This con-
Springfield, PA; Paul Solomon, PMP, B-2 Earned Value PMI is a nonprofit professional organization whose sent does not extend to other kinds of copying, such as
Management Systems; Robert G. Staples, Monroe, VA; mission is to serve the professional interests of its col- for general distribution, resale, advertising and promo-
Charles J. Teplitz, University of San Diego; Veljko M. lective membership by: advancing the state of the art tion purposes, or for creating new collective works.
Torbica, PMP, Florida International University; Walter in the leadership and practice of managing projects Special written permission must be obtained from the
A. Wawruck, Vancouver, BC, Canada; Itzhak and programs; fostering professionalism in the man- publisher for such copying.
Wirth, Saint John’s University; Janet K. Yates, San Jose agement of projects; and advocating acceptance of Permissions. Requests to reprint articles pub-
State University project management as a profession and discipline. lished in PMJ must be made in writing to the publisher.
Membership in PMI is open to all at an annual dues of Reprints. Individual articles may be purchased
PUBLICATIONS ADVISORY BOARD $119 U.S. For information on PMI programs and mem- through the Knowledge & Wisdom Department
Linda C. Cherry, PMI Publisher; Greg Hutchins, Quality bership, or to report change of address or problems (www.pmi.org/k&wc) at a cost of $10.00 per article
Plus Engineering; William V. Leban Jr., PMP, Keller with your subscription, contact: for members and $15.00 per article for nonmembers.
Graduate School of Management; Charles J. Teplitz, Project Management Institute, Headquarters, Glossy Reprints. Requests for glossy reprints of
PMP, University of San Diego School of Business Four Campus Boulevard, Newtown Square, Pennsylvania individual articles in quantities of 100 or more can be
Administration; John Sullivan, Reynolds & Reynolds 19073-3299 USA; tel: +610-356-4600; fax: +610- sent to pmipub@pmi.org.
356-4647; e-mail: pmihq@pmi.org Bulk Copies of Current Issues. Copies of the cur-
rent PMJ can be obtained in quantities of 25 or more.
EDITORIAL & ADVERTISING SERVICES Orders must be placed 40 days prior to date of issue.
The cost is $5.50 per copy plus shipping.
Address manuscripts and other editorial submissions,
Back Issues. Back issues are available on request
advertising and mailing list rental inquiries, and
at $20 each. Call +610-356-4600 for availability.
requests for reprints/bulk copies/reprint permission to:

© 2002 Project Management Institute, Inc. All rights reserved.


“PMI” is a trade and service mark registered in the United States and other nations; “PMP” and the PMP logo are registered certification marks in the United States and other nations; “PMBOK” is a
trademark registered in the United States and other nations; and the PMI logo, “PM Network”, “Project Management Journal”, “PMI Today”, and “Building professionalism in project management.” are
trademarks of the Project Management Institute, Inc.

2 Project Management Journal December 2002


From the Editor
Parviz F. Rad, PhD, PMP

P roject management is approaching the presence, stature,


and recognition of well-established professions such as
engineering, law, and medicine. This comparison is prompted
would be a unique blend of scheduling techniques and statis-
tics to create concepts such as PERT or critical chain. The
premise would be that project management practices need
by fundamental similarities between all these applied profes- specific and unique schemas. The second approach is to
sions: They all depend on their allied basic sciences for the directly import an expanded but unaltered subset of the allied
information that is necessary to solve problems encountered in disciplines into the project management practice. Examples of
professional practice. In the same way that medical and this approach would be to use more advanced treatments of
engineering professionals apply principals of physics and project risk through sophisticated statistical analyses, or to
chemistry to create solutions for practical situations, project conduct more advanced observation of people behavior in the
managers apply accounting principles to develop project cost host disciplines of psychology, sociology, and organizational
estimates and behavioral science principles to formulate behavior. The premise for the latter approach is that the growth
recommended best practices for project team-building. of project management knowledge areas can best be accom-
Therefore, independent of the fact that project manage- plished with an in-depth treatment of allied disciplines and
ment is a relatively young profession, one of the interesting not with development of more specialized tools.
facets of the project management body of knowledge is that it As always, on behalf of the editorial board, I invite our
draws from a lot of allied disciplines. As such, the foundation readers to reflect on their professional experiences and
for the project management body of knowledge will come empirical observations and to share these observations with
from the appropriate basic scientific specialty. In broad terms, the project management community by way of submitting
project management covers behavioral, quantitative, and articles dealing with any facet of the project management body
business areas. Behavioral areas, as applicable to project of knowledge.
management, include subspecialties of psychology and
sociology such as motivation, leadership, and conflict man-
agement. Quantitative areas include accounting, statistics, and
economics. Business areas include organizational theory,
enterprise planning, and strategic management.
Throughout the years, and as the project management pro-
fession has matured, specialized subsets of and customized
additions to the basic allied disciplines have been created.
Because the quantitative area of project management was the
first one to be developed, a larger set of examples of such
improvements are available. The quantitative specialty areas
in project management practice include conceptual estimating,
range estimating, bottom-up estimating, basic scheduling,
PERT scheduling, and project risk management. The behavioral
specialty areas in project management include team spirit,
team building, team conflict management, communication
techniques, and leadership issues. The business specialty areas
include program management, project portfolio management,
and project management office.
Even mature professions tend to continue to expand the
body of knowledge through applied research, customization of
recommended practices, and refinement of best practices.
There are two avenues through which new knowledge areas
can be developed specifically for the project management
profession. The first approach is to continue the development
and implementation of customized and focused subsets of the
basic allied disciplines to situations and problems that are
unique to the project management environment. An example

December 2002 Project Management Journal 3


2002 Student Paper Award Winner
Project Management Maturity
Models: The Silver Bullets of
Competitive Advantage?
Kam Jugdev, University of Calgary, Faculty of Civil Engineering, 2500 University Dr. NW, Calgary,
Alberta T2N 14N Canada

Janice Thomas, Athabasca University, Center for Innovative Management, #301 Grandin Park
Plaza, 22 Sir Winston Churchill Ave., St. Albert, Alberta T8N 1B4 Canada

W orldwide, firms are in a race to create value and survive in the increasingly
competitive marketplace. They combine various organizational assets in
unique ways to create value. In turn, value creation involves tangible assets, such as
financial, physical, and technological ones, and less tangible ones, such as human,
organizational, and social assets (Brush, Greene, Hart, & Haller, 2001).
This paper explores project management maturity models (MMs) as a project
management construct and assesses them as sources of competitive advantage.
With the widely publicized project failure rates and related cost overruns
(Standish Group, 2001), more companies are turning to approaches that may help
▼ them improve their project management practices. Firms are turning to project man-
Abstract agement as part of their competitive advantage strategies. This is evident in the expo-
Project management maturity models are nential increase of membership in project management associations such as the
important assessment tools for the profes- Project Management Institute (PMI). In addition, the billions of dollars invested in
sion. Maturity models identify organizational
strengths and weaknesses as well as pro- projects, along with the increasing attention on MMs, quantifying the value of pro-
vide benchmarking information. They cap- ject management, and developing classification systems for the discipline exemplify
ture explicit, codified practice (know-what), support for project management (Bounds, 1998; Ibbs & Kwak, 1997; PMI Standards
but do not include the intangible assets of
Committee, 2000; Schlichter, 2000).
project management (know-how). Some
have made the claim that project manage- Because investments are time, cost, and resource intensive, firms are willing to
ment maturity models (MMs) can lead to a take only a critical interest in those practices that will improve their competitive
competitive advantage for firms. This paper positions. Projects are an essential building block of business value. However, we
uses four resource-based frameworks to
have yet to understand the complex ties between project management and its
assess whether or not maturity models lead
to a sustained competitive advantage. In value as a strategic asset.
the context of the strategy domain, the Over the past decade, MMs emerged in the literature as concrete, tangible ways of
authors conclude that MMs can result in a assessing aspects of a firm’s project management maturity. They help firms compare
temporary competitive advantage but not
a sustained competitive advantage. Clearly,
explicit competences at the project and program level relative to a standard. The
a sustained competitive advantage is rooted models are gaining interest as companies and academics strive to make sense of why
in a combination of know-what and know-how. some projects succeed and others do not. Companies and academics are questioning
project success rates as well as the returns from an investment in project manage-
Keywords: resource-based view; project ment. Proponents claim that the MMs enable firms to achieve a competitive advan-
management maturity models; competitive tage. However, no thorough exploration of this claim has been made.
advantage; strategy
The purpose of this paper is to rigorously explore the foundations of these
claims. The authors posit that the essence of a firm’s competitive advantage rests
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 4–14 in its resources (strategic assets) that are valuable, rare, inimitable, and involve
8756–9728/02/$10.00 per article + $0.50 per page organizational focus (Barney, 2002). The authors begin with an overview of com-
petitive advantage and competitive convergence and then introduce MMs. This is

4 Project Management Journal December 2002


followed with a brief introduction to the resource-based across the industry. Firms unable to maintain operational
view (RBV)—a strategy perspective—and its concepts. Then, effectiveness have short life spans.
the authors assess MMs using several RBV frameworks. The In contrast, a competitive advantage allows for market
paper concludes with a brief discussion on contributions dominance or strategic advantage. It involves doing different
and areas for further research. activities from rivals or similar activities differently (Porter,
1996). Competitive advantage involves a focus on the firm’s
Strategy, Competitive Convergence, internal assets and connotes innovation and creativity in
and Competitive Advantage terms of market positioning. Strategic assets offer long-term
Planning and deploying strategy is a complex undertaking competitive advantages, and they generate long-term rents
for firms. In practical terms, strategic management is about (profit) (Amit & Schoemaker, 1993). Strategic assets are the
“the direction of organizations” and deals with firm success, crux of a management perspective called RBV.
failure, and competition (Rumelt, Schendel, & Teece, 1994, As firms focus on competitive advantage strategies, they use
p. 9). Implementing strategy involves setting direction for a number of performance indicators to determine whether
the firm to achieve performance targets, making long-range they are meeting their goals. Generally, these indicators are of
plans, and managerial decisions (Barney & Zajac, 1994). the efficiency type (financial, accounting, or economic mea-
This is increasingly important in the global economy as com- sures) that emphasize tangible asset measures. Efficiency mea-
pressions of distance and time intensify competition and sures are useful but they do not encompass the breadth of a
focus managerial attention on multiple internal and external firm’s assets. They downplay the intangible assets that focus
factors (Thomas, Pollock, & Gorman, 1999). on the customer, supplier, staff, and partners, such as those
Both formally and informally, companies conduct strate- addressed by the balanced scorecard (Sveiby, 1997).
gic planning exercises using variations and combinations of Intangible assets reside within the company’s knowledge
internal assessments (strengths and weaknesses) coupled base and are represented by its intellectual, organizational, and
with environmental assessments (opportunities and social capital. Project management is one such knowledge-based
threats) to plan their market positions and strategies asset. However, project management has evolved as a tactical
(Porter, 1996). Companies generally under-appreciate mid- construct with value at the operational level, and this approach
dle managers, but firms that involve them in strategy devel- makes it more difficult to think of it as a strategic construct.
opment achieve better performance (Floyd & Lane, 2000;
Floyd & Woolridge, 1992a; Floyd & Woolridge, 1992b; Floyd Operational Value of Project Management
& Woolridge, 1994; Floyd & Woolridge, 1997). Executives Only recently has the project management literature
are keenly aware that it is an ongoing, iterative process to expanded its focus to cover areas beyond the applied
understand the rapidly changing micro and macro environ- sciences, such as strategic planning (Ulri & Ulri, 2000).
ment and adapt through organizational strategies for The success body of literature in project management typ-
improving the firm’s financial picture. ically focuses on the operational level, whereby project-
For the most part, companies focus on the cost, quality, related success and failure characteristics are emphasized
customer service, and time-to-market advantages. But few in terms of time, cost, and scope.
stop to study why some firms develop a competitive advan- Over the past 30 years however, we have moved beyond
tage and others do not. “Understanding the what of compet- simple critical success factor lists to more comprehensive,
itiveness is a prerequisite for catching up … Understanding holistic frameworks (Belassi & Tukel, 1996). We have yet to
the why of competitiveness is a prerequisite for getting out in identify a framework that allows us to measure a project’s suc-
front” (Hamel, 1995, p. 24). cess in terms of its strategic value. Furthermore, the
literature on project success (performance) is not empirically
Competitive Convergence linked to the literature on MMs (Jugdev & Thomas, 2002b).
and Competitive Advantage Recent research on selling project management to execu-
Companies strive to avoid situations of competitive con- tives confirms that most project managers and consultants
vergence or parity, where no one firm has a distinct advan- understand it to be a tactical but not strategic asset (Thomas,
tage. Competitive convergence means competing to do sim- Delisle, & Jugdev, 2002). According to Dinsmore (1998), as
ilar activities better than rivals. This is insufficient in building blocks in the formulation and execution of corporate
achieving a competitive advantage because after some time, strategy, projects also contribute to organizational success in
firms begin to look alike and do the same things. This ulti- terms of competitive positioning in the global marketplace.
mately leads to diminishing returns (Porter, 1996). However, the strategic impact of project outcomes has been
Common strategies such as quality improvement, empow- ignored largely in the literature.
erment, and outsourcing help firms keep up with each
other but do not enable them to excel (Ala, 1997; Jonker, Models
2000; Tippett & Waits, 1994). MMs are based on the Software Engineering Institute’s
Such practices are a necessary intensive part of manage- Capability Maturity Models (CMMs), and they assess prac-
ment but are not strategy. Because rival firms undertake sim- tices against standard criteria (Carnegie Mellon Software
ilar practices, the standard of performance continues to rise Engineering Institute, 2002; Dymond, 1995). According

December 2002 Project Management Journal 5


to Dinsmore (1998), variations of CMMs and MMs gener- literature is misleading because it purports to offer a com-
ally involve five linear stages: petitive advantage but does not define what a competitive
■ Level 1: Initial (ad hoc); advantage means or ground it theoretically (Association
■ Level 2: Repeatable (abbreviated, planned); of Project Management, 2000; Australian Institute of
■ Level 3: Refined (organized, managed); Project Management, 2000; Hartman & Skulmoski, 1998;
■ Level 4: Managed (integrated); International Project Management Association, 2000;
■ Level 5: Optimized (adaptive, sustained). Lambertson, 2001; LSM-International, 2001; Pennypacker,
The MM levels portray a firm’s evolution from immature 2001; Schlichter, 1999). Although MMs emphasize explicit
project management practices to solid practices and the knowledge that can be codified and transferred readily, they
related infrastructure necessary to support projects at an do not assess implicit knowledge or the intangible asset mix
organizational level (Dinsmore, 1998; Kerzner, 2001). Most within a firm.
models provide structured objective criteria to be met at each Despite these shortcomings, MMs have made a
level of maturity. significant contribution to the field. They have heightened
MMs typically are aligned with national project manage- awareness on competences and offer an initial paradigm
ment bodies of knowledge. They can be administered in a with which to assess organizations and their project
paper or electronic survey format using Likert scales or with management maturity. The growing emphasis on MMs also
consultants conducting the assessments. The questions reflects an increasing desire to link project management
generally focus on knowledge areas as per the national project competency to corporate achievements (Birnberg, 2001;
management bodies of knowledge, such as A Guide to the Cabanis, 1998; Compass Fact Based Consulting, 2001;
Project Management Body of Knowledge (PMBOK® Guide) (PMI Cooke-Davies, 2002; Dorling, 1993).
Standards Committee, 2000).
“Companies demonstrate behaviors that reflect their Introduction to the RBV
maturity levels,” according to Dinsmore (1998, p. 24). MMs The RBV is an evolving perspective. It blends the external view
identify project or organizational strengths and weaknesses of strategy (industry and environment assessment) as popu-
and benchmarking information. In addition, most focus on larized by Porter with the internal assessment of the firm
incremental improvements based on quality improvement (Barney, 2002; Porter, 1996). The RBV assesses a firm’s capa-
practices. The five levels enable repeatability in terms of bilities in relation to competitors and goes beyond a “feel
assessments and permit a measurement of progress over good” assessment of strengths and weaknesses. It involves an
time. Most companies are at a MM1 or MM2 level assessment of the breadth of a firm’s capital (human, physical,
(Dinsmore, 1998; Ibbs & Kwak, 2000; Kerzner, 2001; organizational, and social) including tangible and intangible
Pennypacker, 2001). capital to identify strategic assets. In particular, the RBV exam-
However, some have criticized the MMs from a ines intellectual capital (knowledge, skills, and know-how)
practical perspective (Cabanis, 1998; Compass Fact Based that stems from complex human interactions and involves
Consulting, 2001; Dinsmore, 1998; Kujala & Artto, 2000; tacit knowledge that is rooted in action. It is hard to codify
LSM-International, 2001): and resides within the relationships between people and with-
■ Models are inflexible when a flexible model is required in a firm’s routines (Nonaka, 1994).
for managing change and in keeping with quality improve- Two empirical generalizations of the RBV are that systemat-
ment principles; ic differences exist across firms and that these differences are
■ MMs are typically geared toward identifying problem and relatively stable (Schulze, 1994). An implication is that firms
raising awareness but not solving problems. The firm must can achieve stronger performance by building upon or acquir-
develop a plan, implement, control, and adjust it; ing certain resources. The RBV emphasizes the creation,
■ The models do not account for the rapid pace of change maintenance, and renewal of a competitive advantage through
with which firms adopt new technology and change processes, resources, their characteristics, and how they change over time
practices, management systems, or policies; (Barney, 1986; Chandler, 1962; Foss, 1997; Penrose, 1959;
■ The five maturity levels do not offer enough granularity to Peteraf, 1993; Prahalad & Hamel, 1990; Rumelt, 1984;
measure progress over time; Selznick, 1957; Teece, 1980; Wernerfelt, 1984).
■ Models are overly disciplinary, impractical, and overwhelm- Strategic assets (or core competencies) differ from basic
ing as methodologies; or generic competencies and assets. Only strategic assets are
■ Models focus on the work processes and some ignore the considered vital to develop a long-term strategic advantage, as
human resource or organizational aspects; they involve specific resource characteristics and organization-
The MMs also have some limitations from a theoretical al practices. Because the RBV is in the process of theory build-
perspective. They are based on software maturity models ing, it involves a breadth of frameworks and streams of
that lack a theoretical basis. The field of MMs is thought (and debate) that, over time, converge into conceptu-
relatively young and lacks empirical support for determin- al models and theories. This is evident in the range of terms
ing which competencies contribute most to project used by different authors.
success (Skulmoski, 2001). In addition, no one model has A strategic asset includes features such as: valuable; rare
achieved acceptance at a worldwide level. Some of the MM (unique); inimitable (difficult to copy due to firm history,

6 Project Management Journal December 2002


Unique
Advantage

Strategic Assets

Core Competencies

Capabilities

Generic Resources

Source. Brush, C.G., Green, P.G., Hart, M.M., & Haller, H.S. (2001). From initial idea to unique advantage: The entrepreneurial challenge of
constructing a resource base. The Academy of Management Executive, 15 (1), 64–78.

Figure 1. Resource Pyramid of Value Creation

social complexity, and ambiguity); immobile (firm specif- Isolating mechanisms are a blend of resource characteris-
ic); nonsubstitutable; durable (long lasting); low tradabili- tics and managerial practices (Barney, 1989; Grant, 1991).
ty; and organizational focus (corporate attention) (Amit & They make some resources more firm specific and less mobile.
Schoemaker, 1993; Barney, 2002; Collis & Montgomery, Some examples include copyrights, patents, trademark laws,
1995; Grant, 1991; Jugdev & Thomas, 2002a; Peteraf, 1993; invisible assets (the features or organizational practices that
Priem & Butler, 2001a). one takes for granted and are the unspoken or tacit attributes),
In economic terms, value is measured through decreasing and small decisions such as the micro steps involved in
product/service costs or differentiating it to charge a premium quality improvement practices (Collis, 1994; Grant, 1991;
price (Barney, 1998; Duncan, Ginter, & Swayne, 1998). Itami & Roehl, 1987). Strategic assets incorporate isolating
Valuable resources are more worthy. A resource has value when mechanisms as:
it exploits opportunities and neutralizes threats in the ■ Inimitable—Resources are difficult to copy, and firms may
environment (Barney, 1991). Common or generic resources undertake practices to keep competitors from mimicking
are not sources of competitive advantage; at best, they are a them. If resources can be copied, a firm stands to only achieve
source of competitive convergence. competitive parity through resource value and rarity (Collis &
However, rare resources can offer temporary competitive Montgomery, 1995);
advantages and are sources of strength (Mata, Fuerst, & Barney, ■ Path Dependency—History matters. A firm may develop
1995). Rare resources are heterogeneously distributed between or acquire resources in low-cost ways by being, for example, in
firms. If a resource is rare and a firm does not have it, the lack the right place at the right time. It becomes expensive for rival
is perceived to be a weakness (Duncan, Ginter, & Swayne, firms to recreate the conditions as they developed over time
1998). Imperfectly mobile resources are “sticky” to the firm, (Mata, Fuerst, & Barney, 1995). Because the paths companies
meaning that they are not tradable as commodities and do not take are unique, firms have idiosyncratic assets (Barney, 1991).
leave a company when people leave (Priem & Butler, 2001a). ■ Socially Complex—Resources are the result of the interre-
These resources are characterized as: lationships between skills and assets. Social complexity can
■ Nonsubstitutable—Those resources for which other refer to a firm’s culture, relationships, and reputation. These
resources cannot fulfill the same function (Priem & Butler, attributes are related to a firm’s history and cannot be acquired
2001b); quickly or changed rapidly. They can provide firms with tem-
■ Nontransferable—Firm-specific resources that fall in value porary advantages from low-cost imitators. “In complex, high-
when they are transferred (Grant, 1991). This is a synonym for ly interdependent human and technological situations, the
imperfectly mobile resources; causes of success and failure are often difficult to assign” (Reed
■ Embedded—Engrained resources within the company’s & DeFillippi, 1990, p. 12).
routines and processes in contrast to assets that are specific to ■ Causally Ambiguous—Resources that competitors may not
individuals (Grant, 1991). fully understand to be able to copy them. It is costly and time

December 2002 Project Management Journal 7


Organizational
Social

Complex
Technological
Human

Simple

Financial
Physical

Utilitarian Instrumental

Source. Brush, C.G., Green, P.G., Hart, M.M., & Haller, H.S. (2001). From initial idea to unique advantage: The entrepreneurial challenge of construct-
ing a resource base. The Academy of Management Executive, 15 (1), 64–78.

Figure 2. Resource Development Pathway

consuming for rival firms to figure out the sources of the assets. The unique advantages for the firm occur when these
advantage or what makes some resources strategic. assets are valuable, rare, inimitable, and nonsubstitutable
Last, the organizational focus aspect of strategic assets is least (Brush, Greene, Hart, & Haller, 2001). Not all RBV sources dis-
developed in the RBV literature. It refers to the breadth of tinguish between core competences and strategic assets as
managerial commitment and support. Brush does. Many sources treat these terms as synonyms.
These terms reflect the complexity within the perspective. The pyramid indicates that companies have many resources
Several RBV frameworks draw on the concepts and reflect the but few strategic assets. It is a simple, two-dimensional por-
features of strategic assets. trayal of resources that helps us begin to think of MMs in the
RBV context as well as where they may fit in the hierarchy.
RBV Frameworks MMs focus on the know-what within the firm. They cap-
Because the RBV is an evolving perspective, a unified model on ture project management competences in the form of docu-
the concepts and processes of strategic assets is not in place. ments and procedures. MM competences consist of generic
However, a number of frameworks have been proposed in the resources, capabilities, and possibly some core competences.
literature, and they have merit for project management. Of the The generic resources include technology, supplies, and
four frameworks discussed, the first two are classified as frame- materials necessary to plan and execute on the methodology.
works on type, complexity, and use of organizational assets, and These resources could be the hardware, software, communica-
the latter two reflect competitive advantage pathways. tion technology, manuals, templates, and so forth. The
Brush developed two RBV frameworks: the Resource capabilities refer to the individual, team, and organizational
Pyramid of Value Creation and the Resource Development abilities supporting project management. Some examples
Pathway (Brush, Greene, Hart, & Haller, 2001). include individual knowledge and experience, effective
Resource Pyramid of Value Creation. In the pyramid teamwork, good communication routines, and organizational
(Figure 1), generic resources (supplies and materials) are at support for project management methods.
the base and often are easy to identify and access. Once com- Most MMs typically capture explicit knowledge as docu-
bined with other resources, generic ones become capabilities mented in the five levels. They do not capture the intangible
that enhance a firm’s ability to deploy resources. Capabilities assets. MMs do not appear to fit at the apex of the pyramid
are combinations of proprietary resources, knowledge, and where unique advantages or strategic assets are found.
skills that become institutionalized into operating routines Resource Development Pathway. Another framework by
and tacit knowledge. Brush addresses resource complexity and use (Figure 2). It
Beyond this, collections of specialized core competencies groups resources into six categories based on function (Brush,
that allow a firm to outperform rivals combine into strategic Greene, Hart, & Haller, 2001). The two axes map a company’s

8 Project Management Journal December 2002


No Yes
Is a Resource
or Capability
Valuable?

Is It
No Heterogeneously Yes
Distributed Across
Competing Firms?

No Yes
Is It Imperfectly
Mobile?

Temporary Sustained
Competitive Competitive Competitive
Competitive
Disadvantage Parity Advantage
Advantage

Figure 3. Mata’s Resource-Based Model of Competitive Advantage

resource development pathway. Simple resources are tangible, be used to map a firm’s resources over time and compare firms
discrete, and property based. Complex ones are intangible, sys- in terms of their pathways as well. With respect to MMs, a
temic, and knowledge based. firm’s project management resources may fit the simple-utili-
Within the framework, resources are characterized by their tarian or complex-utilitarian quadrants. MMs involve explicit
application to the productive process (utilitarian to instru- codified documents that describe competences. MMs are
mental). A firm applies utilitarian resources directly to the pro- as utilitarian because, unlike financial resources, they do
ductive process or combines them to develop other resources. not provide access to other resources. Instead, their use
For example, machinery is a physical, utilitarian resource is straightforward and geared toward improved project man-
because it produces services or products. However, financial agement processes and practices.
resources are instrumental as they provide access to other MM assets are tangible because they are in the form of doc-
resources. They also are flexible resources because they are uments, surveys, guidelines, templates, or manuals. Although
needed to purchase other resources. Proprietary technology is MMs may assess a department’s or firm’s skills (competence)
either instrumental or utilitarian depending on if it resides within certain project management knowledge areas, the
within a person (intangible), in which case it is instrumental, assessments are based on documented practices. Moving to the
or it is a patented process applied directly to a production next level within a MM often depends on having more
process, in which case it is utilitarian (Brush, Greene, Hart, & extensive documentation, project management procedures, or
Haller, 2001). codified processes in place. Moving to the next level does not
The matrix portrays complex-instrumental resources as take organizational know-how into account.
most intricate. These resources include the human, social, In contrast, strategic assets typically fit the complex-instru-
and organizational resources. Human resources are complex mental quadrant. Complex-instrumental resources are those
and intangible because they are harder to identify and mea- that often are more intricate and connote dynamism and
sure (Brush, Greene, Hart, & Haller, 2001). Complex regeneration. These involve human, social, and organizational
resources and knowledge assets are not like normal tradable resources. An excerpt from a MM instrument describes the
commodities that firms exchange on the market (Priem & competences at MM5:
Butler, 2001a; Wernerfelt, 1984). In general, the characteris-
tics are engrained within the firm’s learning routines making “Level 5: Optimizing Process. Processes are in
them harder for competitors to duplicate. Such resources are place and actively used to improve project man-
embedded within the firm. agement activities. Lessons learned are regularly
The resource development pathway is a more complex examined and used to improve project manage-
representation than the pyramid of value creation. It also can ment processes, standards, and documentation.

December 2002 Project Management Journal 9


Question Valuable? Rare? Difficult Supported Competitive Performance MM
to imitate? by firm implications assessment

Competitive
1 No — — Below normal —
disadvantage

Competitive
2 Yes No — Normal Yes
parity

Temporary
3 Yes Yes No competitive Above normal Yes/No
advantage

Sustained
4 Yes Yes Yes competitive Above normal No
advantage

Source. Mata, F.J., Fuerst, W.L., & Barney, J.B. (1995). Information technology and sustained competitive advantage: A resource-based analysis.
MIS Quarterly, 19 (4), 487–507.

Table 1. VRIO Framework

Management and the organization are not only financial metrics indicating that firms with higher MM scores
focused on effectively managing projects but also perform better and achieve more savings that those with lower
on continuous improvement. The metrics collect- MM scores (Ibbs & Kwak, 1998; Ibbs & Kwak, 2000).
ed during project execution are used to understand The second question of the framework asks if the resource
the performance of not only a project but also for is heterogeneously distributed among competing firms.
making organizational management decisions for Heterogeneous resources connote rarity as not all firms
the future” (Pennypacker, 2001, p. 3). have the same assets. Although MMs can be considered
heterogeneously distributed because not all firms use them,
The excerpt reflects consistent practices, incremental they are widely available to all firms, and it could be argued
improvements, and some managerial support but lacks a clear that they lead to competitive parity.
explanation of how practices are dynamic or regenerational. In The third and final question queries if the resource is
particular, it does not address project management know-how. imperfectly mobile. Recall that imperfectly mobile resources
The Brush matrix underscores a key limitation of MMs in that are characterized as being nonsubstitutable, nontransferable,
they cover the know-what of project management but not the and embedded. Going on the assumption that MMs are
know-how. If the MMs covered both kinds of knowledge, they heterogeneously distributed between firms, an assessment of
could fit the complex-instrumental quadrant. them at this step of the flow chart leads to the decision that
Unlike the two Brush frameworks, the next two frameworks they are mobile and lead to a temporary competitive advantage
move beyond classifying resources by type, complexity, and but not a sustained competitive advantage.
use. They assess the extent to which resources lead to a com- MMs are designed to be implemented in a variety of
petitive advantage. Both are variations of Barney’s framework organizations. They involve codified knowledge that makes
for a strategic asset that is called the VRIO model—valuable, them transferable between firms. The knowledge staff gains
rare, inimitable, and organizationally focused (Barney, 2002). from using the models is readily transferable to other firms.
Resource-Based Model of Competitive Advantage. Mata’s MMs are substitutable as there are a number of such products
framework evaluates assets using three key RBV features: value, on the market that all serve very similar functions. MMs also
heterogeneity, and immobility (Mata, Fuerst, & Barney, 1995). are not embedded within firms as they can leave a company
It is a decision flow chart (Figure 3). with staff turnover.
In assessing MMs according to Mata’s model, the first ques- Although MMs have merit, according to the Mata frame-
tion asks if the resources are valuable. MMs are valuable and work, they appear to result in a temporary competitive
have worth. In part, their worth is evident when companies advantage for some firms and competitive parity for most.
purchase and conduct maturity assessments, pay the consul- According to this flowchart, MMs do not lead to sustained
tant fees, software licensing fees, and provide staff training. The competitive advantages as purported in the literature
contribution of MMs is evident through some efficiency and (Association of Project Management, 2000; Australian Institute

10 Project Management Journal December 2002


of Project Management, 2000; Hartman & Skulmoski, 1998; advantage and are able to replicate them. Because MMs are
International Project Management Association, 2000; tradable, they lack some of the durability characteristics. As
Lambertson, 2001; LSM-International, 2001; Pennypacker, the rents from MMs are not long lasting, the advantage is not
2001; Schlichter, 1999). sustained or durable.
This leads to the fourth and final assessment of MMs
according to the RBV criteria of being valuable, rare, inimitable, Concluding Comments
and organizationally focused (Barney, 1998). Strategic assets offer long-term competitive advantages and
VRIO Framework of Competitive Advantage. Table 1 underpin a firm’s cost advantage (Markides & Williamson,
portrays Barney’s criteria and indicates that meeting them leads 1994). Based on the aforementioned overview of MMs and
to various competitive implications. The last column reflects assessment with the four RBV frameworks, MMs meet some
an assessment of MMs according to the questions identified by strategic asset features, but do not fit the profile in all areas.
number in the first column. MMs are a component of project management but not a holis-
Thus far, this paper described MMs as being valuable, so tic representation of the discipline.
MMs, at a minimum, lead to competitive parity (question 2). This paper indicates that if firms focus mainly on explicit
But, are MMs rare (question 3)? Yes and no. Recall that MMs project management knowledge elements such as those
are widely available. They consistently mirror the software measured by MMs, they may achieve competitive parity but
capability maturity model and follow a linear five-stage miss out on capitalizing on their intangible assets. Project
approach. Many consulting firms and professional management is a complex asset. However, we currently lack
associations offer MMs or are in the process of developing instruments with which to assess the tangible and intangible
them. However, it could be argued that MMs are somewhat assets that comprise project management.
rare as not all companies use them. It doesn’t take long Although there are no silver bullets, there are silver linings.
for rivals to mimic documented practices or institute project Understanding, developing, and sustaining strategic assets is
management procedures for staff to follow. Assessing MMs key to long-term survival and growth (Porter, 1991). The
according to this framework classifies them as offering a authors’ intent in writing this paper was to promote dialog
competitive advantage. on project management as a strategic asset by assessing MMs
Are MMs difficult to imitate? MMs are relatively straightfor- and their merits toward a competitive advantage. The authors
ward, are not in short supply, and are products that can be welcome further discussion on the topic, as it is fosters
purchased (Association of Project Management, 2000; learning and theory building.
Australian Institute of Project Management, 2000; Hartman &
Skulmoski, 1998; International Project Management Contributions and Directions for Future Research
Association, 2000; Lambertson, 2001; LSM-International, Practical areas for future research are well under way with
2001; Pennypacker, 2001; Schlichter, 1999). studies quantifying the value of project management (Ibbs &
The lack of protective mechanisms underscores that MMs Kwak, 1997; Ibbs & Kwak, 2000). This paper makes a
do not offer an enigmatic ambiguity protecting them from practical contribution to the field as it discusses the strengths
competing firms. In fact, the ability to imitate is a feature that and some of the weaknesses of MMs.
MM vendors highlight when they state that their models were A research area for further study could examine
created from best practice databases. Because MMs have been the connection between successful projects and corporate
in existence for about 10 years, they have not been used long strategy. This year, PMI funded a research project entitled
enough to offer the causal ambiguity and social complexity “Investigation of the achievement of corporate strategy
advantages that path dependency (history) offers. MMs are through successful projects.” The research project can be
known for their concrete nature and codifiable knowledge. The found at http://www.pmi.org.research/externalprojects.htm.
degree of tact is not a feature expounded on in the literature. An area for future research relates to the study of social
MMs also face a substitution threat as customers have choices complexity within organizations in terms of culture and its
and can selectively pick the one they want. According to the influence on project management.
Barney framework, MMs are not difficult to imitate and do not To gain the interest and commitment of senior executives,
lead to a sustained competitive advantage. we must show project management to contribute to
To summarize, similar to the Mata framework, Barney’s shareholder value and a sustainable competitive advantage.
VRIO framework places MMs as leading to a temporary com- A recent study sponsored by PMI on the challenges of
petitive advantage for some firms and competitive parity for promoting the value of project management to executives
most. Further support for this statement comes from other confirms that many executives view project management as
characteristics of strategic assets with respect to isolating or having worth at the operational and tactical rather than
protective mechanisms and the characteristics of inimitability, strategic level (Thomas, Delisle, & Jugdev, 2002). Senior exec-
history, social complexity, and causal ambiguity. utives are unlikely to view project management as a strategic
MMs are not firm specific and can be duplicated. They are imperative as long as the primary criteria used to judge
not idiosyncratic assets. Because MMs involve little path project success fall within the operational realm.
dependency, they are not causally ambiguous. Competitors do The authors currently are analyzing data from four interna-
understand the resource characteristics that contribute to the tional companies exploring their use of project management as

December 2002 Project Management Journal 11


a strategic asset. The authors based the study on the RBV and Belassi, W., & Tukel, O.I. (1996). A new framework for
used a MM instrument to corroborate findings. The results determining critical success/failure factors in projects.
should be available in 2003 and include a model depicting the International Journal of Project Management, 14 (3), 141–152.
paths firms take in developing and sustaining project manage- Birnberg, H. (2001). Association for project managers: Project
ment as a strategic asset. The study also assesses firms using a manager certification. Retrieved 15 May 2002, from
RBV framework the authors developed based on strategic asset http://www.constructioneducation.com/apm_project_
characteristics and management practices. It is called the VRIO- manager_certification_program.htm
LDN framework, and it represents the following features: valu- Bounds, G. (1998). The last word on project manage-
able, rare, inimitable, organizational focus, low-tradable, ment. Institute of Industrial Engineers Solutions, 30 (11), 41–43.
durable, and nonsubstitutable. Future research using the Brush, C.G., Greene, P.G., Hart, M.M., & Haller, H.S.
wealth of qualitative data on the know-how within these four (2001). From initial idea to unique advantage: The entrepre-
companies will allow project managers to develop additional neurial challenge of constructing a resource base. The
instruments with which to assess intangible assets in project Academy of Management Executive, 15 (1), 64–78.
management to complement MMs. Cabanis, J. (1998). Show me the money: A panel of
From a theoretical perspective, the authors’ aim in this experts dissects popular notions of measuring project man-
paper was to convey the complexities of the RBV and relate it agement maturity. PM Network, 12 (9), 53–60.
to project management. An area for further theoretical work Carnegie Mellon Software Engineering Institute. (2002).
could focus on a RBV taxonomy. This also would have practi- Carnegie Mellon Software Engineering Institute: Capability matu-
cal implications as it could enable firms to assess their assets rity models. Carnegie Mellon University. Retrieved 15 May
within such a categorization scheme. 2002, from http://www.sei.cmu.edu/cmmi/
Chandler, A.D. (1962). The concept of corporate strategy.
Acknowledgments In N. Foss (Ed.). Resources, firms, and strategies: A reader in the
The authors would like to thank the PMI® Educational resource-based perspective (1st ed., Vol. 1, pp. 52–59). Oxford,
Foundation for its generous support that continues to “light the
UK: Oxford University Press.
lamp of knowledge.” For further information on this topic, inter-
Collis, D.J. (1994). Research note: How valuable are
ested readers may contact the lead author at kjugdev@shaw.ca.
organizational capabilities? Strategic Management Journal, 15
(1), 143–152.
References
Collis, D.J., & Montgomery, C.A. (1995). Competing on
Ala, M. (1997). Keys to success in today’s business envi-
resources: Strategy in the 1990s. Harvard Business Review, 73
ronment. Business Forum, 22 (1), 24–28.
(4), 118–128.
Amit, R., & Schoemaker, P.J.H. (1993). Strategic assets
Compass Fact Based Consulting. (2001). Making a case for
and organizational rent. Strategic Management Journal, 14
the capability maturity model. Retrieved 15 May 2002, from
(1), 33–46.
h t t p : / / c m p c o m . n e w c o m w e b. d e m o n . c o m / h o m e _
Association of Project Management. (2000). What is
whitepapers.htm
Prince2? Retrieved 15 May 2002, from http://www.
Cooke-Davies, T. (2002). Establishing the link between pro-
prince2.org.uk/introduction.htm
Australian Institute of Project Management. (2000). ject management practices and project success. Paper presented
National competency standards for project management. at the Frontiers of Project Management Research and
Retreived 15 May 2001 from http://www.prince Application Conference, Seattle, WA.
2.org.uk/introduction.htm Dinsmore, P.C. (1998). How grown-up is your organiza-
Barney, J.B. (1986). Types of competition and the theory tion? PM Network, 12 (6), 24–26.
of strategy: Toward an integrative framework. Academy of Dorling, A. (1993). SPICE: Software process improve-
Management Review, 11 (4), 791–800. ment and capability determination. Software Quality Journal,
Barney, J.B. (1989). Asset stocks and sustained competi- 2 (4), 209–224.
tive advantage: A comment. Management Science, 35 (12), Duncan, W.J., Ginter, P.M., & Swayne, L.E. (1998).
1511–1514. Competitive advantage and internal organizational
Barney, J.B. (1991). Firm resources and sustained compet- assessment. The Academy of Management Executive, 12
itive advantage. Journal of Management, 17 (1), 99–120. (3), 6–16.
Barney, J.B. (1998). On becoming a strategic partner: The Dymond, K.M. (1995). A guide to the CMM: Understanding
role of human resources in gaining competitive advantage. the capability maturity model for software. Annapolis, MD:
Human Resource Management, 37 (1), 31–46. Process Transition International Inc.
Barney, J.B. (2002). Gaining and sustaining competitive Floyd, S.W., & Lane, P.J. (2000). Strategizing throughout
advantage (2nd ed.). Upper Saddle River, NJ: Prentice- the organization: Management role conflict in strategic
Hall Inc. renewal. Academy of Management, 25 (1), 154–177.
Barney, J.B., & Zajac, E.J. (1994). Competitive organizational Floyd, S.W., & Woolridge, B. (1992a). Managing strategic
behavior: Toward an organizationally based theory of com- consensus: The foundation of effective implementation. The
petitive advantage. Strategic Management Journal, 15 (1), 5–9. Executive, 6 (4), 27–42.

12 Project Management Journal December 2002


Floyd, S.W., & Woolridge, B. (1992b). Middle manage- Lambertson, L. (2001). Personal communication.
ment involvement in strategy and its association with strate- Arlington, VA: ESI-International.
gic type: A research note. Strategic Management Journal, 13 LSM-International. (2001). Enterprise improvement
(Special Issue), 153–167. platform (EIP1). Retrieved 15 May 2002, from http://
Floyd, S.W., & Woolridge, B. (1994). Dinosaurs or www.lsmzone.com/Default.htm
dynamos? Recognizing middle management's strategic Markides, C.C., & Williamson, P.J. (1994). Related diver-
role. The Academy of Management Executive, 8 (4), 47–59. sification, core competences, and corporate performance. In
Floyd, S.W., & Woolridge, B. (1997). Middle manage- N. Foss (Ed.). Resources, firms, and strategies: A reader in the
ment’s strategic influence and organizational perfor- resource-based perspective (1st ed., Vol. 1, pp. 327–344).
mance. The Journal of Management Studies, 34 (3), Oxford, UK: Oxford University Press.
465–485. Mata, F.J., Fuerst, W.L., & Barney, J.B. (1995). Information
Foss, N.J. (Ed.). (1997). Resources, firms, and strategies: technology and sustained competitive advantage: A resource-
A reader in the resource-based perspective (1st ed., Vol. 1). based analysis. MIS Quarterly, 19 (4), 487–507.
Oxford, UK: Oxford University Press. Nonaka, I. (1994). A dynamic theory of organizational
Grant, R.M. (1991). The resource-based theory of com- knowledge creation. Organization Science, 5 (1), 14–37.
petitive advantage: Implications for strategy formulation. Pennypacker, J. (2001). Project management maturity bench-
California Management Review, 33 (3), 114–135. mark: A Center for Business Practices (CBP) research report
Hamel, G. (1995). Reinventing the company. Executive (Published manuscript). Havertown, PA: Project
Excellence, 12 (10), 9–13. Management Solutions Inc.
Hartman, F.T., & Skulmoski, G. (1998). Project man- Penrose, E.T. (1959). The theory of the growth of the firm.
agement maturity. Project Management, 4 (1), 74–78. In N. Foss (Ed.). Resources, firms, and strategies: A reader in the
Ibbs, C.W., & Kwak, Y.H. (1997). Measuring project resource-based perspective (1st ed., Vol. 1, pp. 27–39). Oxford,
management’s return on investment. PM Network, 11 UK: Oxford University Press.
Peteraf, M. (1993). The cornerstones of competitive
(11), 36–38.
advantage: A resource-based view. In N. Foss (Ed.). Resources,
Ibbs, C.W., & Kwak, Y.H. (1998). Benchmarking
firms, and strategies: A reader in the resource-based perspective
project management organizations. PM Network, 12 (2),
(1st ed., Vol. 1, pp. 187–203). Oxford, UK: Oxford
49–53.
University Press.
Ibbs, C.W., & Kwak, Y.H. (2000). Assessing project
PMI Standards Committee. (2000). A guide to the project
management maturity. Project Management Journal, 31 (1),
management body of knowledge. Newtown Square, PA: Project
32–43.
Management Institute.
International Project Management Association.
Porter, M.E. (1991). Towards a dynamic theory of strategy.
(2000). IPMA Certification. Retrieved 15 May 2000,
Strategic Management Journal, 12 (Winter Special Issue), 97–117.
http://www.ipma.ch/site/certification.htm
Porter, M.E. (1996). What is strategy? Harvard Business
Itami, H., & Roehl, H. (1987). Mobilizing Invisible
Review, 74 (6), 61–78.
Assets. Cambridge, MA: Harvard University Press.
Prahalad, C.K., & Hamel, G. (1990). The core competence
Jonker, J. (2000). Organizations as responsible con- of the corporation. In N. Foss (Ed.). Resources, firms, and
tributors to society: Linking quality, sustainability and strategies: A reader in the resource-based perspective (1st ed., Vol.
accountability. Total Quality Management, 11 (4.6), 1, pp. 235–256). Oxford, UK: Oxford University Press.
S741–S748. Priem, R.L., & Butler, J.E. (2001a). Is the resource-based
Jugdev, K., & Thomas, J. (14–17 July 2002a). Blueprint “view” a useful perspective for strategic management
for value creation: Developing and sustaining a project man- research? Academy of Management Review, 26 (1), 26–40.
agement competitive advantage through the resource based Priem, R.L., & Butler, J.E. (2001b). Tautology in the
view. Paper presented at the Project Management Institute resource-based view and the implications of externally deter-
Research Conference 2002: Frontiers of Project mined resource value: Further comments. Academy of
Management Research and Application, Seattle, WA. Management Review, 26 (1), 57–66.
Jugdev, K., & Thomas, J. (3–10 October 2002b). From Reed, R., & DeFillippi, R.J. (1990). Causal ambiguity, bar-
operational process to strategic asset: The evolution of project riers to imitation and sustainable competitive advantage.
management’s value in organizations. Paper presented at the Academy of Management Review, 15 (1), 88–102.
Project Management Institute 33rd Annual Symposium Rumelt, R.P. (1984). Towards a strategic theory of the
and Conference, San Antonio, TX. firm. In N. Foss (Ed.). Resources, firms, and strategies: A reader
Kerzner, H. (2001). Project management: A systems in the resource-based perspective (1st ed., Vol. 1, pp. 131–145).
approach to planning, scheduling, and controlling (7th ed.). Oxford, UK: Oxford University Press.
New York: John Wiley & Sons Inc. Rumelt, R.P., Schendel, D.E., & Teece, D.J. (1994).
Kujala, J., & Artto, K. (2000). Criteria for project Fundamental issues in strategy. In R.P. Rumelt, D.E.
performance in business context. Project Management, 6 Schendel, & D.J. Teece (Eds.). Fundamental issues in strategy
(7), 46–53. (pp. 9–47). Cambridge, MA: Harvard Business School Press.

December 2002 Project Management Journal 13


Schlichter, J. (1999). Surveying project management capa-
bilities. PM Network, 13 (4), 39–40.
Schlichter, J. (2000). Personal communication with Kam
Jugdev. Upper Darby, PA: Project Management Institute.
Janice Thomas, PhD, is the program director for
Schulze, W.S. (1994). Two resource-based theories of the
Athabasca University’s Online Executive MBA in
firm: Definitions and implications. In P. Schrivistava, A. Huff, project management. She also is an adjunct professor
& J.E. Dutton (Eds.). Advances in Strategic Management, (Vol. 10, in project management specialization at the University
pp. 127–151). New York: JAI Press. of Calgary where she supervises masters and PhD research students.
Selznick, P. (1957). Leadership in administration: A socio- Before becoming an academic, she was a project manager in the
informational technology and organizational change realms for
logical interpretation. In N. Foss (Ed.). Resources, firms, and
10 years. Her main focus is on understanding the underlying reasons
strategies: A reader in the resource-based perspective (1st ed., Vol. 1, project management works. The main focus of her research is the
pp. 21–26). Oxford, UK: Oxford University Press. “softer” side of project management.
Skulmoski, G. (2001). Project maturity and competence
interface. Cost Engineering, 43 (6), 11–19.
Standish Group. (2001). The CHAOS chronicles, Retrieved
15 May 2002, from http://standishgroup.com/chaos_
chronicles/index.php Kam Jugdev is a PhD candidate in the project management
specialization at the University of Calgary’s Faculties of
Sveiby, K.E. (1997). The balanced score card (BSC) and the Engineering and Management. Her dissertation is on
intangible assets monitor: A comparison. Retrieved 15 May 2002, strategic project management, and Janice Thomas is
from http://www.sveiby.com/articles/BSCandIAM.html her supervisor. She also is an experienced researcher with more than 20
Teece, D.J. (1980). Economies of scope and the scope of the publication credits. Jugdev has taught at the undergraduate and graduate
enterprise. In N. Foss (Ed.). Resources, firms, and strategies: A level in project management and management. With more than 15
years of project management experience in a range of industries, she
reader in the resource-based perspective (1st ed., Vol. 1, pp. has managed both high technology and information technology projects.
103–116). Oxford, UK: Oxford University Press.
Thomas, H., Pollock, T., & Gorman, P. (1999). Global
strategic analysis: Frameworks and approaches. The Academy of
Management Executive, 13 (1), 70–82.
Thomas, J., Delisle, C., & Jugdev, K. (2002). Framing the
moves that matter: Selling project management to senior executives:
A research monograph (1st ed., Vol. 1). Newtown Square, PA:
Project Management Institute.
Tippett, D.D., & Waits, D.A. (1994). Project management
and TQM: Why aren't project managers coming aboard?
Industrial Management, 36 (5), 12–20.
Ulri, B., & Ulri, D. (2000). Project management in North
America: Stability of the concepts. Project Management Journal,
31 (3), 33–43.
Wernerfelt, B. (1984). A resource-based view of the firm. In
N. Foss (Ed.). Resources, firms, and strategies: A reader in the
resource-based perspective (1st ed., Vol. 1, pp. 117–130). Oxford,
UK: Oxford University Press.

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.

14 Project Management Journal December 2002


Project Schedule Uncertainty
Analysis Using Fuzzy Logic

Matthew J. Liberatore, Department of Decision and Information Technologies, Villanova


University, 800 Lancaster Ave., Villanova, PA 19085–1478 USA

T here is continuing interest in measuring and coping with project risk and uncer-
tainty by both academics (Fernandez, Armacost, & Pet-Edwards, 1998; Tavares,
Ferreira, & Coelho, 1998; Van Dorp & Duffey, 1999) and project management
(Hulett, 2000; Jones, 2000; Royer, 2000; Ruskin, 2000). Program evaluation and
review technique (PERT) and Monte Carlo simulation have been the traditional
approaches used to address project schedule uncertainty. Both methods are based on
critical path analysis and apply the probability theory to quantify the uncertainty
related to the time required to complete project activities. Concerning the use of
these methods, a recent survey of project management professionals (Pollack-
Johnson, & Liberatore, 1998) found that, of the respondents using analytical tech-
niques, nearly 90% used critical path analysis, and more than 20% used probabilis-
tic analysis and/or simulation. A 1999 software survey showed that about 20% of
project management software packages had Monte Carlo simulation capability
(Project Management Institute, 1999).
▼ However, there is an alternative approach for measuring schedule uncertainty
Abstract based on fuzzy logic. Fuzzy logic is an approach for measuring imprecision or vague-
ness in estimation and may be preferred to probability theory in capturing activity
There is continuing interest by academics and
practitioners alike in measuring and coping duration uncertainty in some situations. Several authors have proposed or investi-
with project schedule uncertainty. Fuzzy logic gated the fuzzy logic approach as applied to project schedule uncertainty (Buckley,
has been proposed as an alternate approach 1989; Chanas, 1982; Chanas, 1987; Chanas & Kamburowski, 1981; Chanas &
to probability theory for quantifying uncertainty
related to activity duration. However, the fuzzy
Kuchta,1998; Chanas & Zielinksi, 2001; Chang, Tsujimura, Gen, & Tozawa, 1995;
logic approach is not widely understood, and Dubois & Prade, 1979, 1980; Hapke, Jaszkiewicz, & Slowinski, 1994;
generally accepted computational approaches Kamburowski,1983; Lootsma, 1989; McCahon, 1993; McCahon & Lee, 1988; Prade,
are not available. This paper describes the dif- 1980; Rommelfanger, 1994; Shipley, de Korvin, & Omer, 1997). The dominant
ferences between the probabilistic and fuzzy
approaches and the advantages of the latter.
approach presented in the literature is the fuzzy extension of the standard critical
The paper also illustrates a straightforward path method algorithm, where forward and backward passes are taken in the net-
approach for applying fuzzy logic to assess pro- work to compute earliest and latest start times and slack. However, the backward pass
ject schedule uncertainty. has been reported to yield incorrect results when the minimum and subtraction
operations are replaced by their fuzzy counterparts (Chanas & Kuchta, 1998;
Keywords: activity duration estimating; Kamburowski, 1983; Rommelfanger, 1994).
critical path; schedule development; risk
management; fuzzy logic The direct use of the fuzzy backward pass was used commonly in some of the
early work on fuzzy critical path analysis and is still employed by some authors
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 15–22
(Hapke & Slowinski, 1996; Mares, 1994). Rommelfanger (1994) offers an alter-
8756–9728/02/$10.00 per article + $0.50 per page nate approach for computing the fuzzy backward pass that has some limitations.
A recent article by Chanas and Zielinski (2001) presents a method for analyzing

December 2002 Project Management Journal 15


1

Degree of
Membership

0
175 180 185 190 195
Height in Centimeters

Figure 1. Fuzzy Set of Tall People

the degree of criticality of the fuzzy paths in the project net- we might assign a 0, implying certain exclusion from the set. Of
work but does not present a method for determining the course, because the meaning of the term “tall people” can vary
fuzzy criticality of project activities. by situation, a fuzzy set must be defined in context.
The fuzzy logic approach for project schedule uncertainty Formally, we could define the membership function
analysis is not widely understood, and as is evident, generally mT(194 cm) = 0.95 to represent the degree to which the indi-
accepted computational approaches are not available. This vidual with a height of 194 cm is a member of the set of tall
paper describes the differences between the probabilistic and (T) people. Using “x” to represent height, we could specify that
fuzzy approaches, the advantages of fuzzy approaches, and mT(x) = 1 if x ≥ 195 cm, and mT(x) = 0 if x ≤ 175 cm. For those
illustrates a straightforward approach for applying fuzzy logic values in-between, we could assess specific values for each
to assess project schedule uncertainty. height or use a formula such as mT(x) = [(x–175) / 20], if 175
< x < 195. For x = 193 cm, applying the formula yields 0.90.
Background on Fuzzy Logic This membership function is shown graphically as Figure 1.
Fuzzy logic is not fuzzy thinking. Zadeh (1965) introduced The theory and application of fuzzy sets has seen extensive
fuzzy sets to represent knowledge that is vague or imprecise, development (Dubois & Prade, 1980; Klir & Yuan, 1995; Yen &
that is, “fuzzy.” In a classical set theory, an element either is or Langari, 1999; Zadeh & Kacprzyk, 1992). There are many suc-
is not a member of a set. In contrast to the sharp or “crisp” cessful applications of fuzzy logic in control systems, including
boundaries of classical sets, fuzzy sets allow degrees of mem- water treatment, subway systems, washing machines, automo-
bership in a set, as expressed by a number between 0 and 1. tive transmission systems, and vacuum cleaners (Yen & Langari,
For example, suppose we wish to define membership in a 1999). Applications in management systems include project
set of tall people. In classical set theory, we might define the selection (Machacha & Bhattacharya, 2000), multi-
set of tall people as those individuals who are 195 cm (about criteria decision-making (Chiadamrong, 1999; Siskos, Lochard,
6'4 3/4'') or taller. But what if a person is 194 cm? This indi- & Lombard, 1984), cash flow analysis (Chiu & Park, 1994), and
vidual might naturally be described as somewhat tall, as job shop scheduling (Fortemps, 1997), to mention a few. The
would the person who is 193 cm. Yet, neither individual articles by Bagnoli and Smith (1997) on real estate decision-
would be a member of our set of tall people. This example making and Hutchinson (1998) on financial applications are
demonstrates that tallness might be better represented as a especially useful introductions to fuzzy business applications.
vague or imprecise concept, without sharp borders separating
the tall from those not tall. Fuzzy Logic vs. Probability
In a fuzzy set theory, we can accommodate this imprecision Probability theory often is used to model the uncertain dura-
by associating a degree of membership in the set of tall people tion of a project activity. We might say that the probability that
for individuals of varying heights. For example, we might asso- a given activity will take seven days to complete is 0.8 and the
ciate a value of 0.95 to represent the degree to which the 194 probability that it will take eight days is 0.2. Because these two
cm person is a member of the fuzzy set of tall people and a probabilities sum to 1.0, no other activity durations are possi-
lower value, 0.90, for the degree to which the 193 cm is a mem- ble in this example. The interpretation of these probability
ber. For the person who is 200 cm tall (nearly 6'7'') we would statements is that after repeating this activity many times, the
assign a membership value of 1.00, implying certain member- activity time was seven days in 80% of the cases, and the activ-
ship in the set. For the person who is 175 cm tall (about 5'9''), ity time was eight days in 20% of the cases. In essence, there is

16 Project Management Journal December 2002


A Fuzzy Logic Approach to Critical Path Analysis
Activity Predecessors Membership Let’s begin with a summary of the essentials of critical path
function analysis. A project network is defined as a set of nodes
A — 3/1.0 representing activities that are connected by directed arcs to
B A 1/0.3, 2/1.0, 3/0.5 represent precedence relationships. A precedence relationship
C A 4/1.0 between two activities means that the predecessor activity must
be completed before its immediate successor can begin. We
D B, C 1/0.1, 3/1.0, 4/0.1
assume that the project has a unique start activity (no prede-
E C 5/0.3, 7/1.0, 10/0.3
cessor activities) and a unique finish activity (no successor
F D 1/0.5, 2/1.0, 4/0.4 activities). If the project network does not have unique start
G E, F 2/1.0 and finish activities, we add dummy activities (which have zero
duration) for this purpose. A path is a finite sequence of
Table 1. Immediate Predecessors and Activity Duration activities that connects the start activity to the finish activity.
Membership Functions by Activity for Fuzzy Critical The length of the longest path is the minimum project
Path Example completion time and is called the critical path, and the activi-
ties along it are called critical path activities.
an 80% chance it will take seven days and a 20% chance it will Suppose that fuzzy logic is used to describe uncertain activ-
require eight days. This example shows that randomness ity duration. Let the set of project activities be A1, A2, through
describes the uncertainty of event occurrence in the future: The AN, and their activity times t1, t2, through tN, can be fuzzy quan-
event “activity time takes seven days” does or does not occur, tities with membership functions mi(tI). Also, let mCP(L) be the
and the event “activity time takes eight days” does or does not membership function for the fuzzy critical path length (L). We
occur. After the activity is completed, randomness dissipates define f(t1, t2, through tN|S) to be the function that determines
because the activity is known to have taken a specific amount the critical path length given a set of specific activity times t1, t2,
of time; that is, one of these events occurred. through tN and a specific network structure S (nodes and prece-
Unlike the probability theory, fuzziness does not assume dence relationships). Using the extension principle initially
randomness. Fuzziness is concerned with event ambiguity. It developed by Zadeh (1975), we can generalize the nonfuzzy or
measures the degree to which an event occurs, not whether it “crisp” concept of critical path length to the situation where
occurs. Using fuzzy logic, we might say that the given activity fuzzy logic is used to represent the activity times as follows:
takes “approximately seven days” to complete. This statement Max Min{ mi(ti)}
reflects the imprecision or vagueness of our time estimate. mCP(L) = (t1, t2, through tN) i = 1,2, through N
Here, we define “approximately seven days” as a particular type f(t1, t2, through tN|S)= L
of fuzzy set called a fuzzy quantity. The membership of seven
within this set is 1.0, because seven certainly is a member. The previous equation is Zadeh’s extension principle where
Other possible times such as eight are assigned membership the function f has been specified to represent a mapping of
values, also called beliefs, based on our meaning of the vague a project network with specific activity times (t1, t2, through tN)
notion of “approximately seven days.” Note that the beliefs are and given project network with structure S to a critical path
not required to sum to 1.0. Fuzziness remains after the event length (L).
occurs because the actual time is one of the possible times in This equation can be applied as follows. For a given project
our fuzzy set and still is “approximately seven days.” network, we identify all possible combinations of activity
It is evident that, depending upon the situation, both the times (t1, t2, through tN) that lead to a specific critical path
probability and fuzzy approaches can be applied to model length. We need consider only those activity times that have
uncertain activity duration. The probabilistic approach seems positive belief values from the associated membership func-
best suited for those situations where the same or a very tions. The belief associated with each combination of activity
similar activity has been completed several times in the past times leading to this critical path length is the minimum of the
and some historical information on the activity’s duration is beliefs of all the individual activity times in that combination.
available. The fuzzy logic approach may be suitable in those Finally, the belief of this critical path length is the maximum of
situations where past data is either unavailable or not the belief values over all combinations yielding L. This process
relevant, the definition of the activity itself is somewhat then would be repeated for all possible critical path lengths. In
unclear, or the notion of the activity’s completion is vague. Of a similar fashion, we can apply the extension principle to
course, there are situations that lie between these cases, where obtain membership functions for all critical path lengths, the
perhaps both of these approaches either individually or in belief that each path is critical, and the belief that each activity
tandem can be applied. lies on the critical path.
For a concise introduction to fuzzy models and the Note that the rules presented for processing beliefs,
relationship of fuzziness to probability read Bezdek’s (1993) called max-min composition, are different from the way
editorial and comments on it by Woodall and Davis (1994) that probabilities are processed. In a probability analysis
and a rejoinder by Bezdek (1994). For a more in-depth discus- of a project network, the probability associated with each
sion, read Kosko (1990) and Yen and Langari (1999). combination of activity times leading to a specific value

December 2002 Project Management Journal 17


B F

G
A D

C E

Figure 2. Network for Fuzzy Critical Path Example

for the critical path length is obtained by multiplying the activity on the critical path are identified. The belief that this
probabilities of all the individual activity times in that particular activity is critical is the maximum of the beliefs for
combination. The probability of a specific critical path all cases having this activity on its critical path.
length is the sum of the probabilities over all combina- 5. Compute the center of area (COA) for all paths, includ-
tions yielding that length. More importantly, the meaning ing the critical path to provide “crisp” values for their lengths.
and interpretation of the results of the probability and The COA is a special weighted average whose numerator is
fuzzy approaches are quite different. obtained by multiplying each path length by its belief and
summing over all possible path lengths, while its denominator
A Computational Approach is the sum of the beliefs of all possible path lengths (remem-
In this section, the author describes and illustrates a straight- ber that the beliefs will not sum to 1.0). The COA is our best
forward procedure for fuzzy critical path analysis using the estimate of each path length.
ideas from the previous section. A visual basic program has
been written to automate the enumeration procedure. This Example
enumeration algorithm is: A simple project is chosen to illustrate the application of
1. Enumerate all possible combinations of activity dura- the enumeration method and is explained with the help of
tions. Each combination is referred to as a case. The number of Figure 2 and Tables 1, 2, and 3. To avoid possible confusion
cases is found by multiplying the number of possible positive with activity duration, the activities were labeled using letters
belief values across all project activities. without subscripts. Using the precedence information given in
2. For each case, compute all path lengths and the case Table 1, the project network shown can be drawn as in Figure
belief value and identify the critical path. The belief value for 2. This network is displayed using activity on node (AON)
each case is the minimum of the activity beliefs comprising notation. Table 1 also provides data on the membership func-
this case. The longest path is the critical path for that case. The tions for each activity. The data used are discrete, as contrasted
path lengths and the critical path for this case all are assigned with the continuous approach described in our height example
the same case belief value. and shown in Figure 1.
3. Construct membership functions for the length of all Note that the durations for activities B, D, E, and F can be
paths including the critical path. For a given path, all cases are expressed as “about 2,” “about 3,” “about 7,” and “about 2,”
reviewed, and those having a particular path length are identi- respectively. In this example, the author is using three possible
fied. The belief for this particular length is the maximum of the values along with their belief values to define the uncertainty
beliefs of all cases having this length. This process is repeated associated with each of these four activities. Three-point
for all possible path lengths. estimates such as these are relatively easy to make. The infor-
4. Determine the fuzzy criticality for each activity. For a mation on the membership function for B can be interpreted
given activity, all cases are reviewed, and those having this as having possible values of 1, 2, and 3 with belief values of

18 Project Management Journal December 2002


Activities Paths Activities Paths
A B C D E F G P1 P2 P3 Belief† A B C D E F G P1 P2 P3 Belief†

3 1 4 1 5 1 2 14* 8 11 0.1 3 2 4 3 7 4 2 16* 14 16 0.4


3 1 4 1 5 2 2 14* 9 12 0.1 3 2 4 3 10 1 2 19* 11 13 0.3
3 1 4 1 5 4 2 14* 11 14* 0.1 3 2 4 3 10 2 2 19* 12 14 0.3
3 1 4 1 7 1 2 16* 8 11 0.1 3 2 4 3 10 4 2 19* 14 16 0.3
3 1 4 1 7 2 2 16* 9 12 0.1 3 2 4 4 5 1 2 14* 12 14* 0.1
3 1 4 1 7 4 2 16* 11 14 0.1 3 2 4 4 5 2 2 14 13 15* 0.1
3 1 4 1 10 1 2 19* 8 11 0.1 3 2 4 4 5 4 2 14 15 17* 0.1
3 1 4 1 10 2 2 19* 9 12 0.1 3 2 4 4 7 1 2 16* 12 14 0.1
3 1 4 1 10 4 2 19* 11 14 0.1 3 2 4 4 7 2 2 16* 13 15 0.1
3 1 4 3 5 1 2 14* 10 13 0.3 3 2 4 4 7 4 2 16 15 17* 0.1
3 1 4 3 5 2 2 14* 11 14* 0.3 3 2 4 4 10 1 2 19* 12 14 0.1
3 1 4 3 5 4 2 14 13 16* 0.3 3 2 4 4 10 2 2 19* 13 15 0.1
3 1 4 3 7 1 2 16* 10 13 0.3 3 2 4 4 10 4 2 19* 15 17 0.1
3 1 4 3 7 2 2 16* 11 14 0.3 3 3 4 1 5 1 2 14* 10 11 0.1
3 1 4 3 7 4 2 16* 13 16* 0.3 3 3 4 1 5 2 2 14* 11 12 0.1
3 1 4 3 10 1 2 19* 10 13 0.3 3 3 4 1 5 4 2 14* 13 14* 0.1
3 1 4 3 10 2 2 19* 11 14 0.3 3 3 4 1 7 1 2 16* 10 11 0.1
3 1 4 3 10 4 2 19* 13 16 0.3 3 3 4 1 7 2 2 16* 11 12 0.1
3 1 4 4 5 1 2 14* 11 14* 0.1 3 3 4 1 7 4 2 16* 13 14 0.1
3 1 4 4 5 2 2 14 12 15* 0.1 3 3 4 1 10 1 2 19* 10 11 0.1
3 1 4 4 5 4 2 14 14 17* 0.1
3 3 4 1 10 2 2 19* 11 12 0.1
3 1 4 4 7 1 2 16* 11 14 0.1
3 3 4 1 10 4 2 19* 13 14 0.1
3 1 4 4 7 2 2 16* 12 15 0.1
3 3 4 3 5 1 2 14* 12 13 0.3
3 1 4 4 7 4 2 16 14 17* 0.1
3 3 4 3 5 2 2 14* 13 14* 0.3
3 1 4 4 10 1 2 19* 11 14 0.1
3 3 4 3 5 4 2 14 15 16* 0.3
3 1 4 4 10 2 2 19* 12 15 0.1
3 3 4 3 7 1 2 16* 12 13 0.5
3 1 4 4 10 4 2 19* 14 17 0.1
3 3 4 3 7 2 2 16* 13 14 0.5
3 2 4 1 5 1 2 14* 9 11 0.1
3 3 4 3 7 4 2 16* 15 16* 0.4
3 2 4 1 5 2 2 14* 10 12 0.1
3 3 4 3 10 1 2 19* 12 13 0.3
3 2 4 1 5 4 2 14* 12 14* 0.1
3 3 4 3 10 2 2 19* 13 14 0.3
3 2 4 1 7 1 2 16* 9 11 0.1
3 2 4 1 7 2 2 16* 10 12 0.1 3 3 4 3 10 4 2 19* 15 16 0.3
3 2 4 1 7 4 2 16* 12 14 0.1 3 3 4 4 5 1 2 14* 13 14* 0.1
3 2 4 1 10 1 2 19* 9 11 0.1 3 3 4 4 5 2 2 14 14 15* 0.1
3 2 4 1 10 2 2 19* 10 12 0.1 3 3 4 4 5 4 2 14 16 17* 0.1
3 2 4 1 10 4 2 19* 12 14 0.1 3 3 4 4 7 1 2 16* 13 14 0.1
3 2 4 3 5 1 2 14* 11 13 0.3 3 3 4 4 7 2 2 16* 14 15 0.1
3 2 4 3 5 2 2 14* 12 14* 0.3 3 3 4 4 7 4 2 16 16 17* 0.1
3 2 4 3 5 4 2 14 14 16* 0.3 3 3 4 4 10 1 2 19* 13 14 0.1
3 2 4 3 7 1 2 16* 11 13 0.5 3 3 4 4 10 2 2 19* 14 15 0.1
3 2 4 3 7 2 2 16* 12 14 1.0 3 3 4 4 10 4 2 19* 16 17 0.1

* Indicates critical path


† Indicates computed as the minimum of the beliefs of all activity lengths for each case

Table 2. Case Analysis for Fuzzy Critical Path Example

December 2002 Project Management Journal 19


1
1

0.8

0.6
Beliefs

0.4
0.3 0.3

0.2
0.1 0.1
0
14 15 16 17 18 19
Possible Critical Path Lengths

Figure 3. Membership Function for Critical Path Legend

0.3, 1.0, and 0.5, respectively. In contrast, there is only one pos- certainly critical. On the other hand, B is certainly not critical
sible time with a belief of 1.0 for activities A, C, and G. That is, because it is only on path P2 and this path is certainly not crit-
it is assumed that these three time estimates are certain. The ical. The complete results are given in Table 3.
application of each of the five steps is: 5. The COAs for each path also are given in Table 3.
1. There are 1 x 3 x 1 x 3 x 3 x 3 x 1 = 81 possible cases that To further interpret the results, consider the case where all
must be evaluated; activities assume the length associated with a belief of 1.0
2. An examination of Figure 1 shows that there are three (A = 3, B = 2, C = 4, D = 3, E = 7, F = 2, and G = 2). The critical
possible paths in the network: path for this case is P1 with a length of 16 and a belief of 1.0 as
■ P1: A-C-E-G; shown in Table 2. The COA of 16.17 for the critical path is close
■ P2: A-B-D-F-G; to the value for this case because the network is small and the
■ P3: A-C-D-F-G. uncertainty is not that great. However, there is uncertainty in
For each of the 81 cases, the lengths of each path are completing this project, because P3 is moderately critical, and
computed, and the critical paths are identified. For example, as a result, D and F also are moderately critical. There also is
the belief for the case A = 3, B = 3, C = 4, D = 1, E = 7, F = 1, some uncertainty associated with the critical path length, which
and G = 2 is Min(1.0, 0.5,1.0, 0.1, 1.0, 0.5, 1.0) = 0.1. The com- has possible values ranging from 14 through 19 (Figure 3).
putations of the path lengths and beliefs, and the identification
of the critical paths are given in Table 2. Summary and Conclusions
3. Using the information given in Table 2, we can form the In this paper, the author has offered fuzzy logic as an alter-
necessary membership functions. For example, there are 18 cases native approach for modeling uncertainty in project sched-
where the critical path is 14. The beliefs over these cases are either ule analysis. The fuzzy logic approach has been compared
0.1 or 0.3, leading to a belief of 0.3 for a length of 14 because the and contrasted with probability theory. Fuzzy logic may be
maximum value is selected. The complete results are given in suitable in those situations where past data is either unavail-
Table 3 and shown graphically for the critical path in Figure 3. In able or not relevant, the definition of the activity itself is
a similar fashion, the path criticalities can be determined. somewhat unclear or the notion of the activity’s completion
4. Using the information given in Table 2, we can determine is vague. An enumeration procedure for analyzing a project
the activity criticalities. For example, D is on paths P2 and P3, network whose uncertainty is represented by fuzzy logic has
and an inspection of Table 2 shows that P2 is never critical and been presented and demonstrated. Future work is needed to
that P3 is critical in 23 cases. The maximum of the beliefs of better identify those circumstances where project managers
these 23 cases is 0.4, and so this value is the fuzzy criticality of prefer fuzzy logic to probability theory or where either
D. This same result can be obtained by noticing that the beliefs approach could be used. In addition, improved computa-
that P2 and P3 are critical are 0 and 0.4, respectively. Because tional procedures are needed so that fuzzy logic can be
D lies on both of these paths, we take the maximum (0.0.4) = applied to projects of arbitrary size. These efforts should lead
0.4 to obtain its criticality. The same result holds for F. The activ- to increased practitioner use of the fuzzy logic approach for
ities along P1 (A, C, E, G) are all certainly critical because P1 is measuring project schedule uncertainty.

20 Project Management Journal December 2002


Chanas, S., & Kamburowski, J. (1981). The use of fuzzy
Critical variables in PERT. Fuzzy Sets and Systems, 5, 11–19.
Length P1 P2 P3 path Chanas, S., & Kuchta, D. (1998). Discrete fuzzy optimiza-
tion. In R. Slowinski (Ed.). Fuzzy sets in decision analysis, opera-
<8 0 0 0 0 tions research and statistics (pp. 249–280). Boston: Kluwer
8 0 0.1 0 0 Academic Publishers.
9 0 0.1 0 0 Chanas, S., & Zielinski, P. (2001). Critical path analysis in
10 0 0.3 0 0 the network with fuzzy activity times. Fuzzy Sets and Systems,
11 0 0.5 0.1 0 122, 195–204.
12 0 1.0 0.1 0 Chang, I.S., Tsujimura, Y., Gen, M., & Tozawa, T. (1995).
13 0 0.5 0.5 0 An efficient approach for large scale project planning based on
14 0.3 0.4 1.0 0.3 fuzzy delphi method. Fuzzy Sets and Systems, 76, 277–288.
15 0 0.4 0.1 0.1 Chiadamrong, N. (1999). An integrated fuzzy multi-crite-
16 1.0 0.1 0.4 1.0 ria decision making method for manufacturing strategies
17 0 0 0.1 0.1 selection. Computer & Industrial Engineering, 37 (1, 2),
18 0 0 0 0 433–436.
19 0.1 0 0 0.3 Chiu, C.-Y., & Park, C.S. (1994). Fuzzy cash flow analysis
> 19 0 0 0 0 using present worth criterion. The Engineering Economist, 39
(2), 113–137.
Center
of area 15.79 12.32 14.09 16.17 Dubois, D., & Prade, H. (1979). Decision-making under
fuzziness. In M.M. Gupta & R.K. Yager (Eds.). Advances in
fuzzy set theory and applications (pp. 279–302). Amsterdam:
North-Holland.
Activity Criticality Path Criticality Dubois, D., & Prade, H. (1980). Fuzzy sets and systems:
A 1.0 P1 1.0 Theory and applications. New York: Academic Press.
B 0 P2 0 Fernandez, A.A., Armacost, R.L., & Pet-Edwards, J.J. (1998).
C 1.0 P3 0.4 Understanding simulation solutions to resource constrained
project scheduling problems with stochastic task durations.
D 0.4
Engineering Management Journal, 10 (4), 5–13.
E 1.0
Fortemps, P. (1997). Jobshop scheduling with imprecise
F 0.4
durations: A fuzzy approach. IEEE Transaction on Fuzzy Systems,
G 1.0
5 (4), 557–569.
Table 3. Membership Functions for Path and Critical Path Hapke, M., Jaszkiewicz, A., and Slowinski, R. (1994). Fuzzy
Lengths and Activity and Path Criticalities project scheduling system for software development. Fuzzy
Sets and Systems, 67, 101–117.
Hapke, M., & Slowinski, R. (1996). Fuzzy priority heuristics
for project scheduling. Fuzzy Sets and Systems, 83, 291–299.
References Hulett, D. (2000). Project schedule risk analysis: Monte
Bagnoli, C., & Smith, H. (1997). Fuzzy logic: The new par- Carlo simulation or PERT? PM Network, 14 (2), 43–47.
adigm for decision making. Real Estate Issues, 22 (2), 35–41. Hutchinson, M. (1998). The use of fuzzy logic in business
Bezdek, J.C. (1993). Editorial: Fuzzy models—What are decision-making. Derivatives Quarterly, 4 (4), 53–66.
they, and why? IEEE Transactions on Fuzzy Systems, 1 (1), 1–6. Jones, E. (2000). Risk management—Why? PM Network, 14
Bezdek, J.C. (1994). The thirsty traveler visits gamont: A (2), 39–42.
rejoinder to ‘Comments on fuzzy sets—What are they, and Kamburowski, J. (1983). Fuzzy activity duration times in
why?’ IEEE Transactions on Fuzzy Systems, 2 (1), 43–45. critical path analysis. Proceedings of the International
Buckley, J.J. (1989). Fuzzy PERT. In G.W. Evans, W. Symposium on Project Management, New Delhi, India.
Karwowski, & M.R. Wilhelm (Eds.). Applications of fuzzy set The Netherlands: International Project Management
methodologies in industrial engineering (pp. 103–114). New Association, 194–199.
York: Elsevier Science. Klir, G.J., & Yuan, B. (1995). Fuzzy logic: Theory and
Chanas, S. (1982). Fuzzy sets in few classical operational applications. Upper Saddle River, NJ: Prentice-Hall.
research problems. In M.M. Gupta & E. Sanches (Eds.). Kosko, B. (1990). Fuzziness vs. probability. International
Approximate reasoning in decision analysis (pp. 351–361). Journal of General Systems, 17 (1), 211–240.
Amsterdam: North-Holland Publishing Co. Lootsma, F.A. (1989). Stochastic and fuzzy PERT. European
Chanas, S. (1987). Fuzzy optimization in networks. In Journal of Operational Research, 43 (2), 174–183.
K.S. Kacprzy & S.A. Orlovsk (Eds.). Optimization models using Machacha, L.L., & Bhattacharya, P. (2000). A fuzzy-logic-
fuzzy sets and possibility theory (pp. 303–327). Boston: D. based approach to project selection. IEEE Transaction on
Reidel Public Co. Engineering Management, 47 (1), 65–73.

December 2002 Project Management Journal 21


Mares, M. (1994). Computation over fuzzy quantities. Boca
Raton, FL: CRC Press.
McCahon, C.S. (1993). Using PERT as an approximation
of fuzzy project-network analysis. IEEE Transaction on
Engineering Management, 40 (2), 145–153. Matthew J. Liberatore, PhD, is the John F. Connelly
McCahon, C.S., & Lee, E.S. (1988). Project network analy- chair in management and professor of decision and
sis with fuzzy activity times. Computers and Mathematics with information in the College of Commerce and Finance
Applications, 15 (10), 829–838. at Villanova University. He joined Villanova in 1983 and served as
Pollack-Johnson, B., & Liberatore, M.J. (1998). Project chair of the department of management from 1989 to 1995 and as
management software usage patterns and suggested research associate dean from 1996 until 1999. Liberatore has published more
directions for future developments. Project Management than 50 journal articles in management science, information systems,
Journal, 20 (2), 19–28. project management, and research and engineering management.
Prade, H.M. (1980). Operations research with fuzzy data. He currently serves on the editorial board of the American Journal of
In P.P. Wang & S.K. Chang (Eds.). Theory and application to Mathematical and Management Sciences and IEEE Transactions on
policy analysis and information systems (pp. 155–170). New Engineering Management and previously served on the board of
York: Plenum Press. Entrepreneurship Theory and Practice and as area editor for produc-
Project Management Institute. (1999). Project manage- tion and operations management for Interfaces. Liberatore received
ment software survey. Newtown Square, PA: PMI. a BA in mathematics, and both a master’s and PhD degree in opera-
Rommelfanger, H.J. (1994). Network analysis and infor- tions research, all from the University of Pennsylvania. He previously
mation flow in fuzzy environment. Fuzzy Sets and Systems, taught at Temple University and held management positions at RCA
67, 119–128. and FMC Corp.
Royer, P. (2000). Risk management: The undiscovered
dimension of project management. Project Management
Journal, 31 (1), 6–13.
Ruskin, A. (2000). Using unders to offset overs. PM
Network, 14 (2), 31–37.
Shipley, M.F., de Korvin, A., & Omer, K. (1997). BIFPET
methodology versus PERT in project management: Fuzzy
probability instead of the beta distribution. Engineering and
Technology Management, 14 (1), 49–65.
Siskos, J., Lochard, J., & Lombard, J. (1984). A multi-
criteria decision-making methodology under fuzziness:
Application to the evaluation of radiological protection
in nuclear power plants. TIMS Studies in the
Management Sciences (Vol. 20, pp. 261–283). North-
Holland: Elsevier Science.
Tavares, L.V., Ferreira, J.A., & Coelho, J.S. (1998). On the
optimal management of project risk. European Journal of
Operational Research, 107 (2), 451–469.
Van Dorp, J.R., & Duffey, M.R. (1999). Statistical depen-
dence in risk analysis for project networks using Monte
Carlo methods. International Journal of Production Economics,
58 (1), 17–29.
Woodall, W.H., & Davis, R.E. (1994). Comments on
Editorial: Fuzzy models—What are they, and why? IEEE
Transactions on Fuzzy Systems, 2 (1), 43.
Yen, J., & Langari, R. (1999). Fuzzy logic: Intelligence, con-
trol, and information. Upper Saddle River, NJ: Prentice Hall.
Zadeh, L.A. (1965). Fuzzy sets. Information and Control, 8,
338–353.
Zadeh, L.A. (1975). Calculus of fuzzy restrictions. In L.A.
Zadeh, K.S. Fu, K. Tanaka, & J. Shirmara (Eds.). Fuzzy sets and
their application to cognitive and decision processes (pp. 1–39).
New York: Academic Press.
Zadeh, L.A., & Kacprzyk, J. (Eds.). (1992). Fuzzy logic for
the management of uncertainty. New York: John Wiley &
Sons Inc.

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.
Toward a Dynamic Simulation
Model for Strategic Decision-Making
in Life-Cycle Project Management
Hemanta Kumar Doloi, The University of Sydney, Department of Civil Engineering,
Building J05, Sydney NSW 2006 Australia

Ali Jaafari, The University of Sydney, Department of Civil Engineering, Building J05,
Sydney NSW 2006 Australia

P roject management concepts and processes are being utilized increasingly in


the strategic planning of service and operational processes. The technique
involves re-engineering processes with new and innovative ideas and therefore more
effective, productive, and efficient ways of doing business. To achieve the overall
business goals of the project, management must adapt to the market dynamics,
maintain operability and functionality of project facilities, adopt total quality man-
agement of end products, and seek customer satisfaction (Morris, 2000). Artto
▼ (1994) suggests a similar concept, i.e., the investment decisions on product life cycle
Abstract should be based on the view of final customer’s perspective.
This paper argues that process simulation Economic analysis reflecting the final customer’s or investor’s life-cycle costs
technology is an added facility in the quest for vis-à-vis the project deliverables, are important during decision-making, particularly
optimizing project decisions based on market in the early phase of projects (Jordanger, 1998; Morris, 1998). This is because
and external uncertainties associated with the
solutions devised and commitments made at the early phase fix a major part of
project’s environment. The authors put forward
a dynamic simulation modeling system (DSMS) the project cost. Cleland (1999) emphasizes continuous improvement, which
as a tool for proactive and optimal decision- helps increase the efficiency of current operations through better utilization of
making in the project life cycle. DSMS is facilities, resulting in greater effectiveness with new strategies to do the right things
geared toward representing generic processes
in the right time.
with a hierarchical and modular model struc-
ture. DSMS facilitates the optimization of tech- To deal with the growing project complexity, organizations increasingly rely
nical and operational functionality during upon the benefits of new technologies (Heindel & Kasten, 1996). Technologies
development and operation phases of pro- must be incorporated in the end result of a project, i.e., a product, a system, or a
jects. Project life-cycle objective functions are
the basis for decision-making throughout the
facility, as well as being applied in the management of the project, i.e., technology
project’s life. The paper reviews the limitations to support planning, control, communication, and decision-making (Storm, 1996).
of the current systems’ ranges and capabili- Key strategies in the global marketplace include the development of high-
ties. A review of the existing simulation tech- quality products at lower cost and faster commercialization. The main objective of
niques leads to a discussion on the need for
setting up an integrated model to encompass
the project definition process is to maximize the chances of successful project
the entire project life cycle. Details of the sys- realization; define the project concepts, selection of alternatives, technical contents
tem are described, and a case study is used to and project scope; and determine financial and commercial requirements
demonstrate its capabilities. (Kahkonen, 1998).
Westinghouse Corporate Services Council estimates that 85% of the product’s
Keywords: dynamic simulation; process life-cycle cost is determined before the manufacturing department becomes
modeling; optimization; life-cycle project
management involved with a new product. An additional dollar spent before manufacturing
can save $8 to $10 on manufacturing and post-manufacturing activities (Artto,
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 23–38
1994). Marmon (1991) and Luk (1990) emphasized the use of simulation to
8756–9728/02/$10.00 per article + $0.50 per page study design, construction, and production phases of the facilities to justify and
fine-tune the impacts on process design changes.

December 2002 Project Management Journal 23


Define the Product in Define the Product in
the New Facility the Existing Facility

Life-Cycle Model for Life-Cycle Model for


New Products Existing Products

Define Processes for Define Processes for


the New Facility Existing Facility

Simulate
Processes

Optimize
Processes

Yes Yes
Proceed With Should We Invest Proceed With
the New Product in a New Product? the New Product

No
Define the New Product Define the New Product
Do Not Proceed With LCC Model as Baseline
LCC Model as Baseline
the New Product

No
Should We Implement the
Alternative Products?

Yes
Accept the Alternative
Repeat the Process and Make the Alternative
as Required the New Baseline

Figure 1. Process Simulation in the Life-Cycle Decision Model

This paper introduces a holistic approach for effective Simulation Model and the Integrated
front-end planning and management of the project deliver- Facility Engineering System
ables by focusing on the business objectives during the Discrete event simulation is a powerful means for the design of
early phases of the project. The underlying methodology mathematical-logical models of the real-world system and
enables project managers in meeting some of these chal- experimentation with alternative scenarios on the computer
lenges and allows design, evaluation, and visualization of screen. Simulation makes the target facility more realistic in
new and existing processes throughout the project life terms of functionality, and the required total investment cost
cycle. Development of a dynamic simulation modeling can be forecasted more accurately. Figure 1 shows a typical
system (DSMS) allows simulation and optimization of process simulation in the life-cycle decision model. Investment
selected processes during planning, implementation, and decisions can be optimized on project facilities based on finan-
operation phases and evaluation of the impacts of changes cial LCOFs (Jaafari & Manivong, 1998). The technique facili-
on the life-cycle objective functions (LCOFs) (Manivong & tates improved understanding of the real-life situation during
Jaafari, 1999). the conceptualization and finalization phases of the project.

24 Project Management Journal December 2002


Integrated Facility Engineering (IFE) System
Project

Part 1 Part 2 Part 3 Part 4

Process Process Process Process

Simulation Level
Simulation Simulation Simulation Simulation

Output Output Output Output

Whole Project
Process Simulation

Submit

Optimization Level
Scope Evaluation
Resubmit in SPMIS Framework Resubmit

No LCOFs No
Satisfied

Yes

Visual Design Soft Issue


Management System Project Management
Databank

Figure 2. Simulation Model Integration in the Integrated Facility Engineering System

Figure 2 shows the overall architecture of the Integrated The IFE system entails integrated modules including:
Facility Engineering (IFE) project, currently under develop- ■ A smart project management information system (SPMIS)
ment at the University of Sydney’s Department of Civil to facilitate the analysis of project management functions
Engineering. The IFE is a generic system that aids management (Jaafari & Manivong, 1998);
of capital projects in an integrated project management envi- ■ A visual design management (VDM) system to assist in visu-
ronment. Target values set for LCOFs are used as the criteria to alization/schedule simulation and management of the design
guide decision-making. The architecture has been conceptual- process (Chaaya & Jaafari, 1999);
ized and designed to facilitate the uptake of life-cycle project ■ A construction management information system (CMIS)
management (LCPM) methodology for the delivery of projects (Jaafari, Manivong, & Chaaya, 2000);
(Jaafari & Manivong, 1998). ■ A dynamic simulation modeling system (DSMS) to
The LCOFs include: enhance the strategic decision analysis for project viability
■ The project’s financial status and its profitability; (Doloi & Jaafari, 2000);
■ The operability, quality, or performance of the facility; ■ A soft issues management system (SIMS) to evaluate soft
■ The soft issues such as project short- and long-term functions such as community and stakeholder issues (Jaafari
liabilities, including occupational health and safety (OH&S) & Vlasic, 1999).
risks throughout project life, environmental impacts, and The IFE system has a unified project databank that estab-
third-party liabilities. lishes a multi-access intranet configuration. It allows entry

December 2002 Project Management Journal 25


at the point of information generation, provides distributed Idealized Simulation Model for
access to the system, and furnishes the required functions to Proactive Life-Cycle Project Management
aid information integration and expedite communication Simulation modeling allows evaluating a broad range of sys-
and decision processes within the client-server protocol. tem conditions to monitor the consequences of altering
The work breakdown structure (WBS) determines the so- processes and measuring the impacts, including performance
called parts and products of the project (Jaafari & and sensitivity of input/output characteristics related to project
Manivong, 1998). IFE facilitates an iterative planning operations. An idealized simulation tool must facilitate con-
process to assemble and evaluate information, solutions, struction of a digital model of the project processes. This tool
effectiveness of the same, and the overall impacts on the would be capable of acting as an experimental test-bed for
project. The project management team presides over the decision-making throughout the project life cycle. It should
entire process and evaluates all decisions or alternatives to furnish the capability to test diverse scenarios to derive the
locate an optimal solution to meet or exceed the target val- most viable solution in the project’s life cycle.
ues set for LCOFs. To set up a benchmarking template of the capabilities of
The remainder of this paper will map a logical approach an idealized simulation model, the authors have identified
to research and development of a DSMS module. For 17 model characteristic functions (Table 1). This is based
further information on other modules, refer to Jaafari and on an extensive literature study of the currently available
Manivong (1998), Chaaya and Jaafari (1999), and Jaafari simulation systems.
and Vlasic (1999).
Review of Current Simulation Systems
DSMS System Classifications. The existing systems fit in three main
The integrated DSMS module adds a process simulation capa- categories (Table 2):
bility to the IFE system for decision evaluation (Figure 2). The ■ Construction-oriented simulation systems;
main purpose of the DSMS is to facilitate the optimization ■ Manufacturing-oriented simulation systems;
of the end facility—particularly reliability, throughput ■ General-purpose simulation systems.
times, stocks, facility utilization, process streamlining, and A total of 28 popular systems have been sampled for the
optimization vs. LCOFs. The DSMS has been conceptual- purpose of this study. These systems can be divided further into
ized to meet these requirements in a practical and objective two classes:
manner. The functionality incorporated in DSMS allows ■ In-house, typically proprietary systems that are developed
process mapping, modeling, simulation and animation, generally as prototype systems;
data analysis, and reporting of input/output results. It facil- ■ Commercial systems that are available in the market or
itates performance analysis, capacity analysis, capability developed and employed within research institutions.
analysis, comparison study, sensitivity analysis, optimiza- Among the 28 systems sampled, 16 are commercially avail-
tion study, decision/response analysis, constraint analysis, able, and the rest are prototypes (Table 2). The sample encom-
and visualization. passes functional variations across different systems as far as
possible. Information on these systems was gathered from
Process Simulation and Project Management published articles in leading journals, conference proceedings,
Numerous examples provide evidence how organizations can textbooks, and handbooks without independent evaluation.
save millions of dollars and avoid major risks using process The authors have selected these systems for a comprehensive
simulation (Chen, 1997). While development of computer- analysis in terms of functional features and are not biased
aided process simulation techniques have accelerated in recent toward any one particular system.
years, its use for project definition, management of project The purpose of the study is primarily to compare the fea-
deliverables, and end management of the investment life cycle tures offered by the selected systems and to verify whether the
is not widespread. Simulation in project management development of a new generation simulation system is war-
has been limited to only project management education and ranted (Table 1). As seen from Table 2, a significant number of
training (Cano, Saenz, & Sanz, 1998; Tsuchiya, 1997). modeling and simulation methodologies have been developed
Due to the existence of traditional barriers, dynamic in the past three decades.
modeling and simulation tools play little or no role in Functions Covered. Among commercial systems sampled,
defining business objectives for the project. Project managers all are found to be excellent in performing certain model char-
are hindered severely by the lack of appropriate simulation acteristic functions for which they have been designed. However,
tools and environments. The complexity of simulating a a critical evaluation of the systems shows that none really satisfy
process typically acts as a constraint to the utilization of sim- the capabilities sought for the idealized DSMS. These systems
ulation technology for the evaluation of real-life situations. have not been designed as proactive decision-making tools. The
Thus, an easy to use conceptual model that simplifies the increasing complexity and uncertainty brought about by operat-
task of project managers would be ideal for testing the ing in a dynamic global business environment certainly require
project concept against fluctuations in operational environ- continual re-evaluation of project functionality, operability, reli-
ments and facility characteristics as well as improving ability, and market responsiveness, which are not supported by
process design and operational improvements. the current systems (McCahill & Bernold, 1993).

26 Project Management Journal December 2002


Number Characteristic function Methods and application
1 Life-cycle application Embraces whole life cycle including conceptual, planning, design, manu-
facture, operation and maintenance, demolition and recycle phases;
evaluation of project scope based on the target values set for life-cycle
objective functions (LCOFs).
2 Hierarchical and Development of hierarchical breakdown structure identifying major
modular structure parts, processes, and operations; operation sequencing techniques;
interconnectedness of various processes for final product simulation;
hierarchical model composition structures of discrete event simulation
with process interaction approach; explicit and modular definition of
event rules.
3 Application methods Flexibility and capability of the model for generic use as well as specific
process simulations.
4 Process optimization Optimization of processes in terms of efficiency, performance,
functionality, operability evaluation, and LCOFs requirement; percent
completion reports for operation processes.
5 Resource utilization Bar charts, histograms, S-curves, learning curve, pie charts and resource
tables; supply-demand curves; percent resource utilization charts.
6 Proactive evaluation and Proactive decision evaluation based on process simulation; scope
continuous project definition re-evaluation based on input-output requirements; what-if scenario
analysis and reports.
7 Modeling environment User friendliness; graphic user interface (GUI); hardware and software
systems requirement; object-oriented technology, Web server application;
Internet and intranet capabilities; input and output requirements; pro-
grammability, extensibility and usability.
8 Pre- and post- Pre- and post-review reports; cost-benefit analysis, profitability
completion review index; technical cost achievement report.
9 Facility management Viability of overall facility based on end deliverables; change impact
analysis; percent facility utilization charts; bar charts, pie charts, and
documentation.
10 Operation time Cycle time, schedule, operational duration estimates to cope with
market fluctuation; make-to-order, work-in-progress, and just-in-time.
11 Market and customer Market demand and fluctuation monitoring plan; market change
management analysis and forecast plan; life-cycle impact analysis; model flexibility to
supply-demand adjustment.
12 Scope management Project configuration and feasibility evaluation; needs assessment;
project prioritization analysis.
13 Product management Product management plan, implementation; monitoring and controlling
facility; production curve; production scheduling.
14 Performance evaluation Performance evaluation in terms of functionality and average facility usage.
15 System integration Prototype system integrating with the Integrated Facility Engineering
(IFE) system for dynamic project viability evaluation; integrating with
other systems such as spreadsheet and CAD application software.
16 Reporting, visualization, Graphical and tabular presentation of results, reports,
and animations documentation, visualization, and animations; pie charts,
histograms, time-series plots, bar charts.
17 Dynamic implementation Model implementation is based on real-time scenarios rather than static
CAD-based applications; model simulates processes and feeds relevant
outputs dynamically into various modules in the IFE system as required.

Table 1. Definition of Characteristic Functions for an Idealized Process Simulation Model Embodying a Project
Management Information System

December 2002 Project Management Journal 27


System name System status Source/Author Percent comparability*
Construction-oriented
CIPROS Prototype Tommelein et al. (1994) 29
AP3 Prototype Sawhney (1994) 28
CRUISER Prototype Hajjar and AbouRizk (1998) 27
SimCon Prototype Chehayeb and AbouRizk (1997) 26
SEACONS Prototype McCahill and Bernold (1993) 25
COOPS Prototype Liu (1991) 24
MICROCYCLONE Prototype Halpin (1990) 21
STROBOSCOPE Prototype Martinez and Loannou (1995) 20
SIREN Prototype Kavanagh (1985) 18
Manufacturing-oriented
PROMODEL Commercial Harrel and Leavy (1993) 41
FACTOR/AIM Commercial Enrlich and Lilegdon (1997) 38
WITNESS Commercial Markt and Mayer (1990, 1997) 37
Taylor II Commercial Nordgren (1995) 36
MODSIM III Commercial Goble (1990, 1997) 35
EXTEND Commercial David (1995) 31
SIMPROCESS III Commercial Jones (1995) 31
PROSIM Commercial Lingineni et al. (1995) 29
SIMFACTORY II.5 Commercial Globe (1991) 28
General purpose
SIMPLE ++ Prototype Geuder (1995) 40
AweSim Commercial Pritsker and O’Reilly (1997) 36
SIMAN/Cinema V Commercial Glavach and Sturrock (1993) 34
GPSS/WORLD Commercial Cox (1991) 33
SLAM II Commercial O’Reilly (1995) 31
SIMULA Commercial Dahl and Nygaard (1966) 29
PETRI-NET Prototype Petri (1962, 1997) 27
SIMOBJECT Commercial Jones (1995) 27
C++/CSIM17 Commercial Schwetman (1995) 27
SIMSCRIPT II.5 Prototype Russell (1993) 23

* Percent comparability is found by expressing the average total score from Table 3 as percentage of 6 (ideal score). For example, an average total
score of 3 is equal to 50% comparability.

Table 2. Description of Simulation Systems and Their Comparison to the Idealized System

System Interfacing. Most of the systems do not provide full many CAD programs to display static background and to
integration of the characteristic functions shown in Table 1. define material handling paths. Taylor-II (Nordgren, 1995) can
However, the commercial systems in the sample generally pro- generate model documentation in text file format and process
vide better integration with existing information technology external files (ASCII-file) for the whole model.
(IT) tools compared to the prototype systems. For example, Point Comparison and Ranking. The authors have under-
AweSim (Prisker & O'Reilly, 1997) is built on a relational data- taken a point comparison of the systems in the sample to eval-
base and accessible through standard tools such as DBase, uate their technological and functional capabilities (Table 3).
Access, FoxPro, and Microsoft Excel. Input data can move easi- The scoring scale ranges from 1 to 6:
ly from an Excel worksheet to the AweSim input tables. FAC- ■ Score 1: Poor;
TOR/AIM (Ehrlich & Lilegdon, 1997) allows creating custom ■ Score 2: Fair;
reports and graphs using Access report wizards. Output data ■ Score 3: Moderate;
can be saved directly as an Excel spreadsheet for further analy- ■ Score 4: Good;
sis. Many provide explicit integration capabilities with CAD ■ Score 5: High;
programs and dynamic data exchange. SIMAN/Cinema ■ Score 6: Ideal.
(Glavach & Sturrock, 1993), ProModel (Harrel & Leavy, 1993), Table 3 shows the total average score derived for each
and WITNESS (Markt & Mayer, 1997) import drawings from system. Individual scores are shown in columns against each

28 Project Management Journal December 2002


Reporting, visualization, and animation

Average total score (Ideal score = 6)


Market and customers management
Hierarchical and modular structure

Pre- and post-completion review

Operation time management


Characteristic

Dynamic implementation
functions

Performance evaluation
Modeling environment

Product management
Life-cycle application

Facility management
Process optimization
Application methods

Proactive evaluation

Scope management
Resource utilization

System integration
Simulation
systems

Construction-oriented
1 MICROCYCLONE 2 4 4 2 1 3 1 1 3 1.24
2 COOPS 2 4 4 3 1 4 1 2 3 1.41
3 CIPROS 3 3 4 4 4 1 3 2 2 3 1.71
4 STROBOSCOPE 2 3 3 3 3 1 2 3 1.18
5 SimCon 1 3 4 4 3 1 4 1 2 3 1.53
6 SIREN 2 3 3 3 3 1 3 1.18
7 SEACONS 2 2 4 4 3 4 2 1 3 1.47
8 CRUISER 2 2 4 4 3 1 4 2 1 4 1.59
9 AP3 3 2 4 4 3 2 2 2 2 4 1.65
Manufacturing-oriented
10 MODSIM III 3 2 5 5 4 1 5 3 3 5 2.12
11 PROMODEL 2 4 5 5 5 3 5 3 5 5 2.47
12 SIMFACTORY II.5 2 4 4 3 1 4 3 3 4 1.65
13 FACTOR/AIM 2 3 5 5 5 2 5 3 4 5 2.29
14 WITNESS 2 3 5 5 5 1 5 3 4 5 2.24
15 Taylor II 2 3 5 5 5 1 5 2 4 5 2.18
16 EXTEND 2 2 5 5 4 1 5 3 3 5 2.06
17 PROSIM 3 4 4 4 1 3 3 4 4 1.76
18 SIMPROCESS III 2 3 5 5 4 1 4 3 1 4 1.88
General purpose
19 GPSS/WORLD 2 3 5 5 4 1 4 3 3 4 2.00
20 SLAM II 3 5 5 4 1 5 4 5 1.88
21 PETRI-NET 3 4 4 3 1 4 2 3 3 1.59
22 SIMOBJECT 3 4 4 5 1 3 3 4 1.59
23 SIMPLE ++ 4 4 5 5 5 2 4 3 5 4 2.41
24 C++/CSIM17 2 3 4 4 4 1 3 3 3 1.59
25 SIMSCRIPT II.5 3 4 4 4 1 3 4 1.35
26 SIMAN/Cinema V 2 3 5 5 4 1 5 5 5 2.06
27 AweSim 1 4 5 5 4 2 5 1 5 5 2.18
28 SIMULA 3 5 5 4 1 5 3 4 1.76

Table 3. Point Comparison Between Existing Systems and the Idealized System

December 2002 Project Management Journal 29


(a) (b) (c)

Entity Process Subprocess

(d) (e) (f)

Queue Activity Resource

Activities

Generate Delay Assemble Release Replenish Block Batch Unbatch Interruption Discard

Figure 3. Modeling Elements for Process Simulation

function. A blank space in a column represents a nonexistent used to represent these elements. A total of ten activities with
capability. An examination of these columns shows that none unique block symbols (generate, delay, assemble, release,
of the systems sampled provides the full capabilities sought. replenish, block, batch, unbatch, interruption, and discard) are
The last column of Table 2 shows the ranking of used to represent the behavior of processes and subprocesses
samples against the idealized DSMS in descending order. in the model.
The system with the highest ranking possesses less than Figure 4 shows the generic relationships among model-
one-half of the total capabilities defined for the idealized ing elements in DSMS framework. Processes involve a log-
system. The construction-oriented simulation tool, ically and sequentially related set of activities on selected
Construction Integrated PROject and process planning entities. The entity changes and produces an output at the
Simulation system (CIPROS) (Tommelein, Odeh, & Carr, end. If a process involves more than one function within
1994) scored the highest with 29% comparability require- the system that becomes too complex, the process must
ments. In the manufacturing category, ProModel scored further break down into subprocesses. Activities take place
the highest with 41% comparability. Under the general- within processes and subprocesses. Queue establishes the
purpose simulation category, SIMPLE++ (Geuder, 1995) necessary logical links between processes and subprocess-
came in first with 40% comparability. es. Resources are allocated for each activity within
Most of the available systems facilitate one or a combi- processes. It is postulated that this methodology can be
nation of the characteristic functions in various contexts. utilized as a generic application in various service situa-
The authors have concluded that a generic simulation sys- tions. DSMS interfaces will allow users to represent the
tem for decision evaluation within an integrated environ- real-life situations as a simulated model without prior
ment with the required capabilities (Table 1) does not exist. simulation training.
Furthermore, none of the systems reviewed provide a facil- The DSMS model utilizes a hierarchical and modular struc-
ity for proactive project scope evaluation based on holistic ture (Figure 5). This structure enhances the program’s capabil-
considerations. Under the traditional project management ity in simulating varied design alternatives (Zeigler, 1987). The
approach, projects are not proactively scrutinized, and deci- WBS adopted for each project facilitates this requirement. The
sions are mainly based on short-term profitability criteria WBS used in DSMS is based on the following hierarchy:
(Riggs, 1989). This clearly indicates that there is potential 1. Project. The project is considered to be the highest compo-
to research and develop a system that can furnish a lot nent in the hierarchy model and focuses on the gross project
more capability and functionality than the best systems attributes. At this level, attributes are project identification and
currently available. overall management issues from startup to the end of the project.
2. Part. A part is considered to be a subproject and defined
DSMS Specifications either as a physical part of the project or an associated soft
The DSMS has been conceptualized to simulate typical service deliverable. Major parts are identified at this level.
and production processes throughout the project life cycle. Six 3. Process. At this level, processes for each constituent
broad elements are utilized to construct the process model part are identified. The dynamic composition for a part is
(Figure 3). These include entities, processes, subprocesses, described as a system in terms of activities, events, and
queues, activities, and resources. Different block symbols are processes. If the processes are not easily identifiable at the

30 Project Management Journal December 2002


Processes in Part 1
Process
Process 1.3 Process
1.1 1.5
Entity Queue Process
Process Process 1.7
Process
1.2 1.4 1.6
Queue

Resources

Subprocesses
Subprocess Subprocess Resource
1.2.1 1.2.3 1

Subprocess Resource
Subprocess 1.2.4 2
1.2.2
Resource
3

Activities Activity
1.2.4.3
Activity
1.2.4.1 Activity
1.2.4.2

Figure 4. Process Modeling Elements and Their Relationship in the Dynamic Simulation Modeling System

part level, parts are broken down further into products, The process simulation engine produces a design solution
i.e., subsystems. Processes are used to represent whole or at both the part and project levels. A user can select the time
part of the life of temporary entities in the real system. units in seconds, minutes, hours, days, and weeks. The model
Usually, a number of processes exist in a system model at statistics can be collected at all levels of the hierarchy.
any point in time. The process level is very important with- Modeling variability associated with uncertainties or
in the project hierarchical structure and defines function- randomness, such as activity times, interarrival times, time-to-
ality of the project. failure, and time-to-repair values, are achieved using statistical
Operational and technological sequencing of the distribution functions. The model outcomes are produced in
processes must be identified at the process level (Abdalla, the form of reports, bar charts, pie charts, tables, histograms,
1991). These processes are broken down further into sub- time plot variables, and text files. The model outputs are uti-
processes, and logical links are established with user- lized in terms of performance analysis, capacity analysis, com-
defined interfaces. The logical links between processes and parison study, sensitivity analysis, optimization study, deci-
subprocesses in DSMS methodology are treated as a queue sion/response analysis, constraint analysis, and visualization.
(Figure 4). Every queue stands as an individual unit with its The accepted scenario from the model output is further
own specific properties. The queue links adopted in DSMS analyzed for life-cycle impact evaluation (Jaafari, 1988).
are one of the unique innovations in process simulation Functions can be linked across the life-cycle phases within the
theory. The activity is the smallest piece of operation with a IFE environment to get a comprehensive overview of the pro-
finite execution time. A sequence of activities, i.e., an oper- ject’s status in real time. This objective-based approach will
ation, is initiated when an event occurs. One or more activ- allow planners to verify the impact of any changes on the sub-
ities transform the state of a system. A basic set of activities ject project. If LCOFs are not satisfied at the project level, the
constitutes the subprocesses and allows modeling the corresponding process must be re-evaluated for alternative
sequence of events in chronological order. solutions, and the procedure is repeated (Figure 3).

December 2002 Project Management Journal 31


Project
Level 1

Define Resource
Yes Define Library
Process Clear? Processes No
No
Parts No Yes
Subprocess Exist? Unified LCOFs
Level 2

Project Satisfied?
Yes
Database
Process Clear? Yes
Define
No Subprocesses
Products
Level 3

Yes Define Define Queue


Process Clear? Queue Links Properties

Define Activity
Define Activity
Properties

No Can the Yes


Model Run? Simulation

Figure 5. The Three-Level Hierarchy Structure in the Dynamic Simulation Modeling System

IT Outlook. The object-oriented environment using 1991) provides all the necessary flexibility, speed and industry
C++/Visual C++ programming languages have been used for support during the design of the model.
development of the DSMS as well as the IFE system. The The object-oriented simulation model consists of a set of
DSMS is designed to set up automatically project-based interrelated object classes. It interacts with other objects
process models against instructions from the users and uti- through exchanging messages. An object can have defined
lizing information extracted from the IFE system. Interactive properties through which it is possible to construct a com-
Windows facilitate users to determine the association plex assembly of objects in order to define the processes of a
between each object class in the DSMS. Data exchanging and facility (Abdalla, 1991).
dynamic linking capabilities allow the DSMS to integrate The DSMS approach utilizes the discrete event simulation
into the IFE system. technique (Pidd, 1984) with process interaction approach
Furthermore, DSMS’s interfacing capabilities provide an (Garrido, 1999). In discrete event process simulation, entities
added facility for entering and modifying system inputs, representing products or services are induced into the model;
reviewing facility needs, redefining project scope, and produc- they compete for resources and perform the activities and are
ing reports and maps. A database management system discarded at the end (Figure 5).
(ObjectStore®) is being utilized to capture the entire project In the process interaction simulation approach, a process is a
and process data within the IFE framework. sequence of logically related activities in time. A process can be
represented as a class. The attributes of a process are represented
Process Simulation Framework as attributes of the class. The behavior of a process is modeled by
Object Oriented Technologies. The Booch Object-Oriented the operations to be performed on the process. The modeler
Analysis and Design method (Booch, 1993) is a suitable declares process objects and specifies their behavior via available
solution for design of the simulation model. Due to its object- methods. Thus, the integration of all the defined process objects
oriented nature, the C++ programming language (Stroustrup, into a single process unit provides the simulation model.

32 Project Management Journal December 2002


Project Definitions and Specifications
Process Resource Model Performance
Definition Assignments Formulation Measurement

User Interface

Knowledge-based
Process Generation
Module
Module
Link Identification
Subprocess and Generation
Generation Module Module

Resource Queue Generation


Library Module
Activity
Generation Module
Output Generation
Module
Resource
Allocation Module Intranet/Internet-
based Application
Module
Object-Oriented Simulation and
Database Optimization
Module

Figure 6. Broad Architecture of the Dynamic Simulation Modeling System

Process Interaction Approach. Processes are the set of implementation lead to viable business solutions. For exam-
abstract data structures and entities carrying out the operation ple, the pulp handling system in a paper mill is considered a
sequences within the system (Figure 4). Activities are assigned major system. Design and specification of this system must be
to each subprocess to represent the system behavior, and each optimized in respect of the overall project vs. LCOFs.
process maintains its own list of activities. Subprocesses act as In the DSMS methodology, the entire model library (con-
nodes linked with interactive queue connections. Each sub- taining invisible elements or submodels) resides in the main
process contains the respective event time and activities in the project’s repository. Dialog boxes allow users to define relevant
system. The processes can be in one of the several states: rules, constraints and logical connectivity of all processes and
■ Active—When its activities are being executed; subprocesses. The knowledge-based system facilitates the syn-
■ Ready—When the process is waiting to start; thesis of the required process model automatically.
■ Idle—When the process is not active; Of course, the needed level of abstraction may have to be
■ Terminated—When the process has exhausted its action and explicitly specified or deduced from clues provided by the user.
is not going to be active again in the run under consideration. As an example, if a production engineer in a factory wants to
Thus, the process interaction approach in simulation mod- increase production by 50% due to market demand, the sys-
eling represents the dynamic behavior of a group of processes tem can synthesize an appropriate model automatically using
carrying out the operations and interactions with one another the information supplied by the user.
(Garrido, 1999).
Project and Process Model. DSMS is needed to support Process Interaction Implementation
proactive management of the project, particularly with respect Process Activity Interaction. The process model set up by
to LCOFs. The LCOFs must be evaluated not only for a select- DSMS consists of four major types of objects: processes,
ed major process, but for the complete project to ensure that resources, transactions, and queues. Processes use available
decisions made on the formulation, design, specification, and resources to provide the definitive results. Activities interact

December 2002 Project Management Journal 33


Figure 7. Interaction Between Process Data and Database in the Dynamic Simulation Modeling System

inclusively within the processes. The process object allows rep- Transaction Modeling. Transactions are the entities that
resenting several subprocesses in multiple levels. Every process flow through the processes. Transactions can be used to repre-
and subprocess has a name and identification defined in the sent physical objects such as an order, a customer, telephone
model interface. calls, or work units. Every entity has its own properties such as
The total eight activities (generate, delay, assemble, release, a name, identification, arrival time, and service time. Users can
replenish, block, batch, and unbatch) define the unique define the state of transactions such as periodic arrival, cyclical
dynamic behavior of the processes and subprocesses arrival, and random arrival along with the generation points, as
(Figure 3). In the DSMS approach, the activities cannot be required in the real-life situation.
broken down. Every activity has the user-defined interactive Process Connectivity. Queue links are utilized among
properties of its own. Resources can be allocated from the processes and subprocesses for logical connectivity in the
resource library for each process vis-à-vis the activity. The sim- DSMS framework. These are used for defining the workflow.
ulation engine manages the processes in the object database Queues are modeling objects with their own characteristics
by carrying out three main tasks: process placement, process such as a name, identification, maximum queue size, priority,
removal, and process rescheduling. The engine keeps track of etc. More than one queue is used to define the concurrent
the simulation clock and decides which process is for imme- processes. Users can define the logical links by selecting prede-
diate activation based on the process connectivity (Pidd, cessor and concurrent processes in the process interfaces. A
1984). For the sake of brevity, details of the activities have not process that has multiple incoming and outgoing queues can
been discussed in this paper. be modeled using multiple queue links. DSMS allows collect-
Resource Modeling. Resources are the agents that are ing the queue statistics during and after the simulation run.
required in performing a process or subprocess through an
activity. The performance of the dynamic processes usually is Proposed DSMS Architecture
constrained by the limited availability of the resources or Components of DSMS. Figure 6 illustrates a conceptual archi-
resource interdependencies, which form queues in the system. tecture of the simulation model. The DSMS comprises four
DSMS modeling capability allows defining type, identification, broad subsystems:
capacity, cost, schedule, and allocation for resources. The sim- ■ Process Generation Module. This model facilitates the
ulation engine keeps track of resource utilization and queu- hierarchical process generation following the top-down
ing/delays for each process during the simulation run. Users approach. The processes are broken down into subprocesses in
can select the resource schedule and resource interruption the next level of the hierarchy model. The progressive break
options in the resource interfaces. down continues until a sufficient level of details can describe

34 Project Management Journal December 2002


Subprocesses
Washing Filling Sealing
Line 1 Line 1 Line 1

Washing Filling Sealing


Line 2 Line 2 Line 2
Queue ID
Prs1_Prs2_Q1
Bottling
Line 1 ‘Prs2’ Labeling Box Packaging
Line 1 ‘Prs5’ Line 1 ‘Prs7’ Box Box
Bottle Arrive Bottling Labeling 1 Storage
‘Prs1’ Line 2 ‘Prs3’ Labeling Box Packaging ‘Prs9’ ‘Prs10’
Line 2 ‘Prs6’ Line 2 ‘Prs8’
Bottling
Line 3 ‘Prs4’

Figure 8. Network Model for a Bottling and Packaging Line

Figure 9. Process-Process Relationships and Queue Link Mechanism in the Dynamic Simulation Modeling System

the behavior of the subprocesses. Activities in the subprocesses and subprocesses in the overall model. The simulator manages
are defined in a different interface, and resources are allocated and runs the relevant processes with input and output require-
as required. The resource library maintains the overall resource ments. The simulator maintains the simulation clock. It pro-
data. The information on process data, site condition, vides a set of operations that can be called or invoked by the
historical data, production data, product properties, and simulation model. Functionality and operability offered by dif-
design constraints are identified during the model definition. ferent scenarios are observed and optimized based on the
Different scenarios are combined with various constraints dur- model behavior and simulation run statistics.
ing simulation model construction. ■ Knowledge-Based Intelligent System. The knowledge-based
■ Simulation and Optimization Module. The simulation intelligent system facilitates the establishment of logical links
engine facilitates systematic sequencing of different processes between processes and subprocesses based on the expected

December 2002 Project Management Journal 35


scenarios via the digital model of the project. The queues are Future Directions
generated between processes and subprocesses and properties At present, development of DSMS is about half completed and
are defined using interfaces. The multiple objectives of the the full functionality of the model is yet to be achieved. To
process alternatives are assessed within the process-modeling verify and validate the model, the authors have started to con-
framework. The input analyzer refines the stochastic data using duct a series of case studies. The model focuses on manufac-
probability analysis (Jaafari, 1988). The output generator engine turing-, construction-, or services-type processes throughout
provides reports and documents with visualization and anima- the project life cycle. The case study will provide a thorough
tion capabilities. The intelligent system maintains the track of understanding of how simulation techniques can be used
simulation object libraries. Note that the DSMS will be designed effectively to optimize decisions in every stage of the project. It
as a multi-user program using a client/server configuration to set helps in forecasting the impacts of business process re-engi-
up the IFE system. neering or changes due to benchmarking exercises. The inte-
■ Database Management System, or Repository System. An gration of DSMS within the IFE system will facilitate life-cycle
object-oriented database system acts as a motherboard in the project management through real-time evaluations and opti-
IFE system. All program modules reside as segments in the mizations of the project’s LCOFs.
database and enable real-time interactions with one another. A further development planned for the future is that DSMS
The object data from the process models are stored persistent- should be Web-enabled to permit distributed teamwork. The
ly in the object-oriented database management system users should be able to reach the system via Web application
(OODBMS). The OODBMS accommodates multimedia data servers. The DSMS application will consist of data storage, data
objects such as text files, image files, spreadsheet files, CAD indexing and retrieval, the Web server, the application server,
drawings and project information. and many other components. The system requires users to
input data, which will be stored into the project repository sit-
System Capabilities and Applications ting on the remote application server. The application software
DSMS interfaces are window oriented. It utilizes pop-up and typically developed in C++, PERL, and JAVA will respond
pop-down menus, dialog boxes, selection lists, and editors for dynamically to the requests over the Web server (Skibniewski
developing process logic. Interactive graphic user interfaces & Abduh, 2000). Thus, the system will be designed to foster
allow users to build process models by filling simple forms creativity and innovation via rapid testing of multiple alterna-
without prior simulation training. The user can customize the tives, in conjunction with other IFE modules.
reports by selecting statistics for resources, locations, entities,
variables, etc. Reports can be displayed, printed or imported Summary and Conclusion
into the typical application software and plotted in the form In this paper, the authors argued that discrete event process
of pie charts, histograms, time-series plots, etc. simulation is a valuable tool in terms of optimizing project
Figure 7 shows Dialog boxes provided for an interaction decisions vis-à-vis life-cycle objective functions. Projects are
between process data and the database in the DSMS applica- considered as value-driven business undertakings. Simulation
tion. Dialog 1 shows the main menu and a floating palette technology can be used to improve the project’s baseline value
bar on the left side. User can create activities by clicking on and determine project investment decisions optimally.
the palette bar icons. Figure 8 shows a case study database A review of the existing systems against an idealized sys-
file for simulation of a bottling and packaging line. The tem indicated the need for DSMS development. The project’s
process data file stored in the ObjectStore database can be functionality and operability can be simulated, reflecting
retrieved as shown in Dialog 2. Processes can be defined anticipated future market shifts at an early stage of the pro-
using the general project-process sheet (Dialog 3), and sub- ject. This permits greater understanding of the project’s capac-
processes can be assigned further in edit dialog box of the ity to respond to market dynamics and maintain its business
respective processes. Resource libraries and entity character- competitiveness.
istics can be defined by using the resource and entity dialog Object-oriented technology utilized for the development of
boxes as shown in Dialog 3. DSMS facilitates the integration of the system into the IFE sys-
Figure 9 shows the establishment of logical connections tem. The hierarchical and modular structure of the model pro-
between selected processes and their dependencies (Dialog vides a framework for process simulation of the whole project
4). In Figure 8, the Bottle Arrive-Prs1 process is the prede- as well as parts or subsystems. Process interaction approach
cessor to the Bottling Line1-Prs2 process. Queue links are adopted within the DSMS framework helps logical and
assigned between these two processes by using the Add sequential mapping of the selected process. Six model ele-
Queue button. Queues are further edited by using Dialog 5 ments with a set of eight unique activities facilitate the model
and 6 as shown in Figure 9. construction. Alternative scenarios vis-à-vis projects’ processes
Subprocesses for the process Bottling Line1-Prs2 have can be easily simulated and optimized via the evaluation of
been defined in Dialog 4. A maximum of five alternative their impacts on LCOFs.
scenarios can be analyzed for each model run. Activities are The DSMS is designed as generic prototype application soft-
assigned by selecting the respective buttons of the applica- ware that responds to the user’s instructions interactively. The
tion, and the corresponding resources can be allocated from DSMS allows users to create relevant dynamic process models
the predefined resource library (Dialog 4). using graphic interfaces and without prior training. DSMS

36 Project Management Journal December 2002


helps estimate the real-life process characteristics such as input Heindel, L.E., & Kasten, V.A. (1996). Next generation PC-
quantities and variations, cycle time, percentage utilization of based project management systems: The path forward.
service facility, processing time, supplier lead times, personnel International Journal of Project Management, 14 (4), 249–253.
utilization, resource utilization, critical variation, bottlenecks, Jaafari, A. (1988). Probabilistic unit cost estimation for
queues, and output variations more accurately. Information project configuration optimization. International Journal of
derived from DSMS supports improved strategic decision- Project Management, 6 (4), 266–234.
making on project’s facilities in a dynamic environment. Jaafari, A., & Manivong, K. (1998). Towards a smart project
management information system. International Journal of
References Project Management, 16 (4), 249–265.
Abdalla, J.A. (1991). An object oriented architecture and Jaafari, A., Manivong, K.K., & Chaaya, M. (2000). The story
concept for an integrated structural engineering system. of VIRCON in simulating and teaching professional construc-
Proceedings of the 2nd International Conference on the Application tion management. Proceedings of the International Conference on
of Artificial Intelligence to Civil and Structural Engineering, Construction Information Technology, Hong Kong, China. Hong
Edinburg, Scotland. Stirling, Scotland: Civil-Comp Ltd., Kong, China: The Hong Kong Polytechnic University, 515–532.
147–155. Jaafari, A., & Vlasic, A. (1999). Integration of soft issues
Artto, K.A. (1994). Life cycle cost concepts and method- into a life-cycle project management system. Proceedings of the
ologies. Journal of Cost Management, 3, 28–32. Second International Conference on Construction Process Re-engi-
Booch, G. (1993). Object-oriented analysis and design with neering, Sydney, Australia. Sydney, Australia: Australian Center
applications. Redwood City, CA: Benjamin Cummings. for Construction Innovation, 211–223.
Cano, J.L., Saenz, M.J., & Sanz, D. (1998). Development of Jordanger, I. (1998). Value-oriented management of pro-
a project simulation game. Proceedings of the 14th World ject uncertainties. Proceedings of the 14th World Congress on
Congress on Project Management, Slovenia, Finland. Slovenia, Project Management, Slovenia, Finland. Slovenia, Finland:
Finland: Cankarjev dom Cultural and Congress Center, Cankarjev dom Cultural and Congress Center, 813–821.
620–628. Kahkonen, K. (1998). Understanding and facilitating
Chaaya, M., & Jaafari, A. (1999). Integrated design man- investment project definition process. Proceedings of the 14th
agement within a life cycle project management paradigm. World Congress on Project Management, Slovenia, Finland.
Proceedings of the Second International Conference on Slovenia, Finland: Cankarjev dom Cultural and Congress
Construction Process Re-engineering, Sydney, Australia. Sydney, Center, 362–368.
Australia: Australian Center for Construction Innovation, Luk, M. (1990). Hong Kong air cargo terminals to work
279–289. in synch because of simulation applications. Industrial
Chen, J. (1997). Achieving maximum supply chain Engineering, 11, 42–45.
efficiency. IIE Solutions, 6, 30–35. Manivong, K., & Jaafari, A. (1999). A life cycle project
Cleland, D.I. (1999). Project management, strategic design management model to maximize value for clients. Proceedings
and implementation (3rd ed.). New York: McGraw-Hill. of the Second International Conference on Construction Process
Doloi, H., & Jaafari, A. (2000). Application of simulation Re-engineering, Sydney, Australia. Sydney, Australia: Australian
tool for strategic decision evaluation for life cycle project man- Center for Construction Innovation, 59–70.
agement. Proceedings of the 17th International Symposium on Markt, P.L., & Mayer, M.H. (1997). WITNESS simulation
Automation and Robotics in Construction (ISARC 2000), Taipei, software: A flexible suite of simulation tools. Proceedings of the
Taiwan. Taipei, Taiwan: National Taiwan University, 739–744. 1997 Winter Simulation Conference, Atlanta, GA. New York: The
Ehrlich, J.N., & Lilegdon, W.R. (1997). Making better man- Institute of Electrical & Electronics Engineers, 711–717.
ufacturing decisions with AIM. Proceedings of the 1997 Winter Marmon, C. (1991). Teledyne applies simulation to the
Simulation Conference, Atlanta, GA. New York: The Institute of design and justification of a new facility. Industrial Engineering,
Electrical & Electronics Engineers, 552–554. 3, 29–32.
Garrido, J.M. (1999). Practical process simulation using object- McCahill, D.F., & Bernold, L.E. (1993). Resource-oriented
oriented techniques and C++. Boston: Artech House. modeling and simulation in construction. Journal of
Geuder, D.F. (1995). Object-oriented modeling with Construction Engineering and Management, 119 (3), 590–606.
SIMPLE++. Proceedings of the 1995 Winter Simulation Morris, P.W.G. (1998). Why project management does not
Conference, Arlington, VA. New York: The Institute of Electrical always make business sense. Project Management, 1, 12–16.
& Electronics Engineers, 534–540. Morris, P.W.G. (2000). Benchmarking project management
Glavach, M.A., & Sturrock, D.T. (1993). Introduction to bodies of knowledge. Proceedings of the UMIST 4th
SIMAN/Cinema. Proceedings of the 1993 Winter Simulation International Conference of the International Research Networks on
Conference, Los Angeles, CA. New York: The Institute of Organizing (IRNOP-IV), Sydney, Australia. Sydney, Australia:
Electrical & Electronics Engineers, 190–192. Sydney University of Technology, 467–481.
Harrel, C.R., & Leavy, J.J. (1993). ProModel tutorial. Nordgren, W.B. (1995). TAYLOR II manufacturing simula-
Proceedings of the 1993 Winter Simulation Conference, Los tion software. Proceedings of the 1995 Winter Simulation
Angeles, CA. New York: The Institute of Electrical & Electronics Conference, Arlington, VA. New York: The Institute of Electrical
Engineers, 184–189. & Electronics Engineers, 401–404.

December 2002 Project Management Journal 37


Pidd, M. (1984). Computer simulation in management
science. New York: John Wiley & Sons.
Prisker, A.A.B., & O’Reilly, J.J. (1997). AWESIM: The
integrated simulation system. Proceedings of the 1997 Winter Hemanta Kumar Doloi is a graduate in civil engineer-
Simulation Conference, Atlanta, GA. New York: The Institute of ing from the University of Dibrugarh. He has completed
Electrical & Electronics Engineers, 545–551. his master’s of engineering from the Asian Institute of
Riggs, L.S. (1989). Risk management in CPM network. Technology. He was awarded a PhD scholarship
Journal of Microcomputers in Civil Engineering, 3 (3), 229–235. through the University of Sydney’s Civil Engineering Department and is
Skibniewski, M.J., & Abduh, M. (2000). Web-based project currently engaged on research and development of an integrated
management for construction. Proceedings of the International dynamic simulation system. Prior to starting his PhD, Doloi worked in
Conference on Construction Information Technology, Hong Kong, the construction of elevated expressway projects in Greater Bangkok.
China. Hong Kong, China: The Hong Kong Polytechnic
University, 56–77.
Storm, P.M. (1996). The management of soft projects.
Proceedings of the World Congress on Project Management, Paris,
Ali Jaafari is currently a professor in the University of
France. The Netherlands: International Project Management
Sydney’s Department of Civil Engineering. He has more
Association, 803–810.
than 29 years of international business, teaching, and
Stroustrup, B. (1991). The C++ programming language.
consulting experience on projects and programs
Reading, MA: Addison-Wesley.
around the world. He has authored more than 100 publications in pro-
Tommelein, I.D., Odeh, A.M., & Carr, R.I. (1994).
ject and program management. Since 1982, he has conducted cours-
Knowledge-based assembly of simulation networks using con-
es and seminars for more than 2,000 executives, managers, and pro-
struction designs, plan, and methods. Proceedings of the 1994
fessionals in Australia, Asia, and Europe. Jaafari has held visiting pro-
Winter Simulation Conference, Buena Vista, FL. New York: The
fessorial appointments at a number of universities, in the United
Institute of Electrical & Electronics Engineers, 1145–1152.
States, United Kingdom, Europe, and Asia.
Tsuchiya, S. (1997). Simulation/Gaming: An effective tool
for project management. Proceeding of the Project Management
Institute’s 28th Annual Symposium, Chicago. Newtown Square,
PA: Project Management Institute, 325–329.
Zeigler, B.P. (1987). Hierarchical, modular discrete-event
modeling in an object-oriented environment. Simulation, 49
(2), 219–230.

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.

38 Project Management Journal December 2002


A Taxonomy of Internet Applications for
Project Management Communication

Steve D. Giffin, 120 35th Street, Hermosa Beach, CA 90254–2020 USA

T he Internet is a worldwide communication system particularly suited for project


management communication. Project management, as defined by the Project
Management Institute (PMI Standards Committee, 1996), is a temporary endeavor
undertaken to create a unique product or service. This temporary and unique nature
creates a need for communication systems that can be deployed rapidly and used by
diverse, interorganizational teams to share information with minimum training and
administration (Giffin & Stankosky, 2000). Consequentially, the Internet and other
electronic networks have facilitated the evolution of virtual project organizations:
temporary organizations that depend on communication to accomplish projects
from a distance (Guss, 1998).
Nevertheless, coordinated efforts to use the Internet to improve project
management are only at an experimental stage in many project management
▼ disciplines (Giffin & Jefferson, 2000). For example, the architecture, engineering,
and construction (AEC) industry has been targeted by several vendors offering a
Abstract
variety of specialized Internet-based services, known as project sites or project
A taxonomy of Internet applications has been
created to describe the use of the Internet for
portals for project management (Doherty, 1999). However, only 1% of AEC firms
project management communication. It is have reported using this technology, and there is skepticism about its benefits as
based on the technological characteristics well as concerns about liabilities such as security issues (Roe & Phair, 1999).
of Internet applications, the requirements of In the field of project management research, there is a notable lack of peer-
project management communication, and the
organizational issues associated with using reviewed studies that demonstrate the effectiveness of Internet communication in a
Internet applications. Its dimensions are the project management environment (Giffin & Jefferson, 2000). In fact, one study that
sender/receiver synchronization and the rela- measured the effectiveness of e-mail and other communication tools in virtual
tionship between the number of senders and
organizations determined that e-mail often is perceived as contributing negatively to
receivers. The taxonomy is populated with six
Internet applications that are used commonly project success (Enghavanish, 1999). Therefore, understanding how the Internet is
in project management communication. The best used in project management is an important consideration for firms attempting
taxonomy is presented as an aid to under- to improve the effectiveness and efficiency with which they execute projects.
standing the capabilities and limitations of
This issue can be addressed by creating a taxonomy that characterizes Internet
Internet applications for different types of
project management communication. applications according to their technological characteristics inside a framework that
is relevant to project management communication.
Keywords: Internet; communication;
taxonomy Background
Traditional Categorization of Electronic Communication Mechanisms.
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 39–47 Traditionally, communication has been defined as a basic four-element model con-
8756–9728/02/$10.00 per article + $0.50 per page sisting of a sender, a receiver, the medium, and the message (Figure 1). Although
communication taxonomies generally include each of these elements to some extent,

December 2002 Project Management Journal 39


Message

Sender Receiver

Media

Figure 1. Traditional Communications Model

they are concerned primarily with describing the selection of In another well-known approach, McGrath and Hollingshead
an appropriate mechanism, i.e., medium or channel, to (1994) characterized communication by the task being
encode, transmit, and decode the message. accomplished in addition to classifying tools according to
Categorization of communication mechanisms is impor- dimensions of contiguousness and synchronization. They
tant as a means for describing the selection of the most described e-mail as a distal, asynchronous technology, which
appropriate channel given the requirements of a particular may cause the natural order of messages to be disrupted. They
message (Robbins, 1998). The selection of a communication considered text-based e-mail a poor fit for tasks of increasing
mechanism also can influence the quality of information information requirements based on its relatively low richness.
received. The relationship between communication mecha- Technologies judged more appropriate for such tasks were
nisms and effectiveness is recognized presently in the field of audio or video systems and face-to-face systems.
knowledge management, where viscosity, or channel rich- Limitations of Traditional Taxonomies. One limitation of
ness, is used to describe the ability of a communication classifying Internet tools by time and distance is the decreasing
mechanism to transfer information-rich content (Davenport relevance of those factors in the contemporary business work-
& Prusak, 1998). place. When groupware taxonomies were introduced in the
Some important research in the use of electronic tools for early 1990s, integration of local area network technology and
group communication preceded the widespread organization- Internet communication was not common. (Note that elec-
al use of Internet applications by several years. The tronic networks are identified as same place/same time in
taxonomies created by these researchers generally categorized Figure 2, while Internet tools are categorized as different
communication tools in terms of time/synchronization and place/different time.)
place/distance. However, in the late 1990s, Internet applications, particu-
First, Johansen, Sibbet, Benson, Martin, Mittman, and Saffo larly e-mail, became very popular business communication
(1991) defined electronic communication tools used by tools, even when traditional methods might be better suited
groups as same time/same place, same time/different place, due to factors of task, location, or relative effectiveness
different time/same place, or different time/different place (Jefferson, 2000). The present popularity of e-mail and
(Figure 2). Electronic tools for same-time/place communica- intranet-based Web technology has contributed to the
tion were considered synchronous because interactive commu- realization that electronic networks and Internet tools
nication occurs in real time. Theoretically, such communica- currently are considered anytime/anyplace technologies—a
tion therefore can substitute for face-to-face conversation. With concept considered futuristic by Johansen et al. (1991).
asynchronous, i.e., different-time communication, one party Internet tools that are useful in project management
cannot respond until the other has finished sending. E-mail is communication include e-mail, static Web sites, group-
an example of asynchronous communication. ware, conferencing, and discussion group applications
In different-place communication, geographic separation (Giffin & Stankosky, 2000). E-mail, Web sites, and
prohibits face-to-face communication even if the participants discussion applications use client/server technology, while
are communicating simultaneously. Conferencing and other conferencing applications may be implemented in peer-to-
electronic technologies for remote communication are exam- peer or client/server configurations. Groupware is
ples of different-place tools. deployed on the Internet through database-backed Web
With same-place technology, participants either use the servers that also may implement discussion and confer-
same electronic tools synchronously or asynchronously, such encing applications or employ other Internet technologies
as with an electronic meeting room (synchronous) or a work- such as file transfer. The characteristics of these underlying
station used in shifts (asynchronous). technologies have distinct implications for the types of

40 Project Management Journal December 2002


project management communication for which each tool
is useful. Some of these technological characteristics are

ou e
on im
s)
discussed in Table 1.

hr T
nc nt
sy re
(A iffe
Proposed Framework for

D
Categorization of Internet Applications Voice Mail
Requirements for Categorization Scheme. Like the E-mail

no e
ro im

)
us
approach of the traditional communications model, there

ch T
yn e
are advantages to making the message the central compo-

(S Sam
nent of a taxonomy for Internet communication in project Two-Way
management. Primarily, this strategy allows communication Video Team Rooms
to be defined independent of the project and its context, Shift Work
Screen
therefore creating the possibility that the new taxonomy can
Sharing
define many types of communication, all of which may be

e
Electronic

ac
used at various times in a project. In addition to the mes-

Pl
Networks

nt
sage-centricity of the traditional communications model, the

re
ffe
concept of synchronization from Johansen et al. (1991) also PC Projectors

Di
is useful. Notwithstanding the contemporary notion of

e
Internet tools anyplace/anytime, there are still important

ac
Pl
differences between the tools in terms of their ability to facil-

e
m
itate real-time communication.

Sa
However, the traditional taxonomies did not address other
relevant attributes of Internet applications and project
Source. Johansen, R., Sibbet, D., Benson, S., Martin, A., Mittman, R.,
management, e.g., the use of Internet applications in the and Saffo, P. (1991). Leading business teams: How teams can use
send-only mode and the suitability of certain applications for technology and group process tools to enhance performance. Boston,
this specific task, such as static Web pages. This consideration MA: Addison-Wesley Publishing Co.
can be addressed by including one-way communication as a
distinct class, the appropriateness of which is supported by Figure 2. Categorization of Electronic Tools
the project management function of disseminating informa-
tion or providing reference material.
Another consideration that should be addressed is the people communicating with many. The categories on this
relationship between the utility of Internet tools and the axis may be defined rigidly or loosely depending on the
number of recipients of the message. For example, a Web capabilities of the tools being classified. If justified, addi-
page may be a better method for delivering information to a tional divisions on this axis could include one person
large diverse group than e-mail, if the sender does not have communicating with a few, a few people communicating
an effective means of maintaining an e-mail distribution list. with a few others, a few people communicating with many,
This and similar types of situations may be considered by and so on.
including the number of senders and receivers as a dimen- The framework of Figure 3 also is independent of distance
sion of the taxonomy. and location. For example, a group of people in one room
Last, the proposed taxonomy must have a level of detail could carry on many one-to-one conversations about different
sufficient for describing a full range of communication needs subjects. Because the subjects are different, each conversation
in project management while having only the minimum represents an individual message, and the communication
number of categories necessary to differentiate between the type would be synchronous one-to-one. However, if all were
available Internet tools. conversing freely about the same subject, the communication
Proposed Categorization Framework. The identified type would be synchronous many-to-many. In fact, both types
requirements include the synchronization between the of communication could occur simultaneously in one place
sender and receiver, the number of senders and receivers, the because it is the message not the location that determines the
possibility of one-way communication, and the ability to communication type.
describe each of these about an individual message. Nine categories of communication are defined by the basic
Incorporating these into a two-dimensional taxonomy pro- framework of Figure 3:
duces the framework of Figure 3. This scheme accounts for ■ One-Way 1:1. One sender sends to one receiver;
the consideration of one-way communication as a special ■ One-Way 1:Many. One sender sends to more than one
category of synchronousness. Combined with asynchronous receiver;
and synchronous two-way communication, a full range of ■ One-Way Many:Many. More than one sender sends to more
communication possibilities is provided on one axis. than one receiver;
On the other axis, the number of senders and receivers ■ Asynchronous Two-Way 1:1. One sender communicates
varies from one person communicating with one to many non-interactively with one receiver;

December 2002 Project Management Journal 41


Internet tool Description
E-mail Electronic messaging service capable of sending text messages and attached files over local area
networks and the Internet. Users receive messages in their inbox and can reply, forward, or store
them for later use. To send a message, the user must know the e-mail address of the receiver.
Static Web Documents viewed in a Web browser, which may include text, images, files, and hyperlinks
pages pointing to other Web pages or e-mail addresses. Static pages exist as files and reside on a
server, which may be attached to the Internet or an intranet. To access a Web page, users
must know the address of the page, which commonly consists of a registered domain name,
the name of the Web server, the name of an individual file, and a three-letter extension.
Web-based Web sites that implement traditional groupware features such as a personal task lists,
groupware calendars, integrated e-mail, private and shared folders, or scheduling. Examples may include
e-commerce, search engines, “project sites,” and online communities. Web-based groupware
typically requires a log-in process that identifies the user and provides tools to facilitate interac-
tion with other members of the “community.” Contents of groupware sites are stored as entries
in a database rather than a static file. Web pages are compiled as necessary by the server so
they always reflect the most current data. Unlike static Web pages, users can upload data to a
database-backed site.
Discussion Specialized messaging system that allows many users to review and respond to comments or
groups questions from others about a common topic. Also called online group forums, discussion
groups may be implemented through Lotus Notes, Usenet Newsgroups, or as part of an online
community or groupware package. Special features may include the ability to search for mes-
sages, receive e-mail updates, and assign different levels of access such as read-only, author,
and moderator. To submit or read messages, the user must know the name of the forum and
have write-access if the forum is protected. Because some forums are replicated in several
locations, recent posts may not show up until the next scheduled replication, often the next day.
Video/audio Transmission of interactive voice or video images over a private network or the Internet. May
conferencing require special software/hardware, but the capability to receive video or audio also can be
implemented through a Web browser. Users can initiate videoconferences provided they have
the appropriate tools, or they can join multicast groups and view video playing from a server.
Text Two-way interactive text conferencing with a potentially unlimited number of users. This includes
conferencing “chat rooms,” “instant messaging,” “net meeting,” and other common applications. Conferences
may be hosted on a server, where the users can join a group discussion, or they may operate
“peer-to-peer.”

Table 1. Utility of Internet Applications in Project Management

■ Asynchronous Two-Way 1:Many. One sender communi- the communication to include contextual cues and personal
cates non-interactively with more than one receiver; reaction. Therefore, it is a measure of the suitability of a tool for
■ Asynchronous Two-Way Many:Many. More than one sender problem solving or knowledge transfer.
and more than one receiver communicate non-interactively; The other axis, which represents the number and relation-
■ Synchronous 1:1. One sender communicates interactively ship of senders and receivers, is important from both techno-
with one receiver; logical and management viewpoints. From the standpoint of
■ Synchronous 1:Many. One sender communicates interac- management, an increase in message recipients implies an
tively with more than one receiver; opportunity to reduce cost and risk by exploiting electronic
■ Synchronous Many:Many. More than one sender commu- communication. For example, the Internet is used in con-
nicates interactively with more than one receiver. struction projects to reduce cost associated with revising and
Relevance of Proposed Framework to Project Management publishing blueprints (Tedeschi, 2000). The cost savings from
Communication. The two axes of Figure 3 encompass several this activity will consequentially be more attractive as more
important criteria from the perspectives of Internet applications people need a set of plans. Similarly, the risk of someone not
and project management. First, the axis that describes the syn- receiving an important update will be reduced if all use a
chronization of senders and receivers also describes the ability of common system.

42 Project Management Journal December 2002


1:1 1:Many Many:Many

One-way

Two-way/
Asynchronous

Two-way/
Synchronous

Figure 3. Framework for Categorization of Internet Applications

From a technical standpoint, the cost of implementation real-time communication. Consequently, they are the most
and support also is related to the number of parties involved. appropriate tools for each type of synchronous communication
For example, if only a few need to communicate, e-mail may in the model. Conferencing applications may support text,
be the least expensive form of communication. However, if the audio, or video transmission, however audio and video
cost of implementing and maintaining a Web site can be transmissions are best suited for small groups with few con-
spread out over many, the Web becomes a more efficient mech- nections due to bandwidth requirements. Additionally, as the
anism for providing information. number of active participants in video and audioconferencing
grows, it becomes more difficult for individuals to follow the
The Completed Taxonomy conversation. Text conferencing is less vulnerable to this
Categorization of Internet Applications. To populate the limitation because all contributions to the conversation are
taxonomy, the characteristics of Internet tools in Table 1 displayed in the same window and participants can scroll
must be considered within the bounds of the framework of upward to view previous comments. Therefore, text con-
Figure 3. The optimal position of each tool in the matrix is a ferencing should be better suited than videoconferencing as
consequence of two factors. First, the technological charac- the number of participants increases;
teristics of some tools may prevent their inclusion in certain ■ E-mail and Web Communication. Compared to confer-
areas. For example, the only tools that facilitate real-time encing, e-mail and the remaining Internet applications are not
communication are conferencing technologies. The others real-time. However, by virtue of their lack of synchronousness,
are either one-way or asynchronous-only mechanisms. they allow the user to review and respond to messages at the
Second, the efficiency with which certain tools can be used most convenient time, thereby increasing efficiency. E-mail is
in different organizational environments should be considered. well suited for individual one- and two-way communication
For example, although it is possible to use e-mail to provide and may be used effectively with larger groups, particularly if
information to a large number of people, if the information is all participants are members of the same organization.
on a Web site, the sender is not burdened with keeping track of However, as the number of e-mail participants increases, the
e-mail addresses. Additionally, if the recipients are unknown to challenges of maintaining large distribution lists and support-
the sender, the Web is the only mechanism that is suitable. ing individual e-mail clients and external programs for viewing
Conversely, if two-way communication is required in large attachments becomes a burden. In particular, Web-based com-
groups, a Web-based groupware system that allows participants munication is more effective when a group is not associated
to subscribe to distribution lists may be the most effective. with a single organization. Unlike static Web sites, which are
The justification for categorizing the Internet applications primarily suited for one-way communication, database-backed
based on technical and management aspects (as summarized sites can implement two-way communication protocols and
in Table 2) is: provide customized content, security, and user authentication.
■ Conferencing Applications. Conferencing applications are Because they are more efficient than conferencing applications,
the only tools in Table 1 that are capable of supporting e-mail and Web communication are more appropriate for

December 2002 Project Management Journal 43


Internet application Technical and organizational attributes
E-mail Useful for sending individual messages; This is best suited for one-to-one communica-
tion. It also may be used for communication with several people with some success.
Static Web sites Useful for dissemination of information to large groups; It becomes increasingly useful as
the number of people increases who need access to information.
Web-based groupware Best suited for structured communication within moderate to large groups;
The only type of Web site that allows two-way communication.
Discussion groups Best suited for allowing large, unassociated groups to follow topics of interest; The only
non-interactive Internet technology that truly facilitates collaboration.
Conferencing Best suited for interactive communication of complex information;
(Audio/video) Best suited between two parties (May be used by more than two parties although
effectiveness diminishes rapidly).

Conferencing (Text) Useful for interactive communication between larger/more diverse groups where
audio/videoconferencing are not practical.

Table 2. Attributes of Internet Applications

asynchronous and one-way communication. Web communi- communication, is useful for describing the case in which the
cation is preferable as the number of participants increases. In participants share some sort of relationship, e.g., they belong to
the case of one-way Web communication, static pages are most a common organization. For example, a common association
efficient and are preferable. Database-backed sites are required allows technologies such as e-mail to be used effectively,
for two-way communication; whereas unassociated groups would find e-mail less effective
■ Discussion Groups. Compared to Web and e-mail com- due to the absence of a common directory of addresses.
munication, discussion group applications allow many The completed taxonomy is presented in Figure 4. The areas
senders to collaborate on the content of the message. Like e- where each Internet application was deemed most appropriate
mail, discussion group applications are message-centric, i.e., are depicted with shaded ovals. Areas where the ovals overlap
participants in the conversation can view a list of replies to depict the expectation that more than one application may be
each individual message and respond to any comment as they used effectively.
choose. Unlike e-mail applications, messages are not delivered
automatically to a user’s in-box. However, as the number of Discussion
users increases, this attribute becomes less inconvenient Application of the Taxonomy. The completed taxonomy
because discussion group applications allow users to select should be viewed as a tool for structuring project communica-
messages to be read before their contents are retrieved. Last, tion systems based on the synchronization and relationship
discussion group applications allow senders to provide infor- characteristics of project communication requirements. For
mation or submit responses without knowing the identities of example, if the ability to collaborate by asking questions and
the other participants in the communication. For this reason, reviewing others’ results is important to the success of a pro-
discussion group applications are well suited for communica- ject, then technologies suited for asynchronous many:many
tion in which the participants belong to many organizations. If communication should be provided. According to Figure 4,
the participants wish to restrict access to particular messages or discussion group technologies suit these requirements.
restrict communication to certain participants, discussion- If the ability to provide information to many parties is
group applications also can be implemented through important to the success of the project, Web sites should be
database-backed Web sites that can provide both security and used for maximum efficiency. Conversely, if most of the project
authentication. Based on their ability to support collaboration, communication is expected to be 1:1, the use of e-mail should
discussion groups are most appropriate for many:many be encouraged and resources made available to facilitate
communication, except in real time. However, e-mail and Web audio/videoconferencing.
sites are more convenient and, therefore, more appropriate Table 3 demonstrates a hypothetical analysis that employs
when there is only one sender. the framework of the taxonomy to categorize project informa-
Population of the Taxonomy. To accommodate the attrib- tion elements. In Table 3, the dimensions of synchronization
utes summarized in Table 2, a subcategory of communication are defined in terms relevant to project communication. One-
must be added to the framework of Figure 3 between the 1:1 way communication includes providing information, as well
and 1:many classes. This additional class, represented as 1:few as the creation and maintenance of project documentation.

44 Project Management Journal December 2002


1:1 1:Few 1:Many Many:Many

One-way Static Web


Sites

E-Mail Discussion
Groups
Two-way/ Web-based
Asynchronous GroupWare

Two-way/ Audio/Video
Synchronous Conferencing Text Conferencing

Figure 4. Taxonomy of Internet Applications for Project Management

Two-way asynchronous communication is described as The taxonomy primarily identifies one application as opti-
offline communication to represent communication that might mal for each type of communication. However, this list implies
typically take place through channels such as regular mail, fac- that the application indicated is theoretically the best suited for
simile transmission, or interoffice memos. Synchronous com- that type of communication, not that other applications can-
munication primarily contemplates information that would oth- not be used successfully.
erwise be exchanged or created in meetings or on the telephone. Organizations that study the effectiveness of Internet com-
The steps involved in preparing an analysis (Table 3) munication may find that user satisfaction with Internet tools
include identifying project information elements, identifying increases when the tools are used within their realm of suit-
the personnel or teams responsible for creating or receiving ability as defined by the model of Figure 4. In the absence of
each element, and categorizing the relationship of those tools suited for specific tasks, individuals might substitute
involved as 1:1, 1:few, 1:many, or many:many. another mechanism of electronic communication that con-
The project information elements then should be plotted tributes less effectively to project outcomes. Therefore, firms
within the framework of the taxonomy, and Figure 4 should be also may benefit from providing a full complement of Internet
employed to determine which Internet technologies are most tools for project management communication.
applicable for the various project information and comm-
unication requirements. The completed table of information Conclusion
elements also could be used in conjunction with the project A taxonomy has been created to describe the ability of
organization chart and schedule to identify the number of Internet applications to support different types of communi-
users and the phases of the project for which various Internet cation in project management. Because the taxonomy
technologies might be employed most effectively. defines communication based on the requirements of an
Further Development. At present, the taxonomy meets the individual message, it can be used as a model for using
identified needs for project management communication multiple types of Internet applications with multiple types of
based on the available Internet applications. However, it also communication in any given project.
can be expanded if the availability of applications supports The axes of the taxonomy describe the numbers of
additional categories. For example, if communication applica- senders and receivers and the synchronization between
tions are dissected further according to their ability to carry them. Special cases of communication are used to describe
information-rich content, a third axis of viscosity could be one-way communication and to differentiate between com-
added to the scheme. In that case, e-mail with multimedia munication with groups under common association with
attachments could be considered a highly viscous mechanism the sender and communication in groups without common
for 1:1 asynchronous communication. Messaging that does not association. The taxonomy differs from previous categoriza-
support attachments would rate lower on the viscosity scale. tion schemes in that it supports the classification of Internet

December 2002 Project Management Journal 45


Type 1:1 1:Few 1:Many Many:Many

One-way ■ Meeting notes; ■ Project schedule; ■ Announcement of ■ Bulletin board;


(Providing ■ Backup for ■ Project budget; contracts/Reports ■ Industry standards;
information/ proposal (cost, ■ Task descriptions; for Propsal/etc.; ■ Regulations;
Records) schedule, technical ■ Status reports on ■ Organizational ■ Central
performance same, e.g., chart, directory; project file;
elements); timesheets, formal ■ Project plans, ■ Training/Reference
■ Daily record. reports, etc.; specifications, material, e.g.,
■ Project tracking project/System standards,
records. requirements; templates, etc.
■ Public
announcements.

Two-way/ ■ Contract ■ Development of ■ Bidding/Request ■ Development


Asynchronous execution/ information ele- for Proposal of project
(Offline Procurement; ments listed above process; documentation;
communication) ■ Approval of prior to project, ■ Status of ■ Development of
individual e.g., plans, specs, projectwide regulations or
expenditures/ requirements, etc., schedule, budget, standards;
Requests; and maintenance expenditures, etc. ■ Industry or project
■ Task assignment/ during the project. forum.
Status of
individual task.

Two-way/ ■ Negotiation; ■ Status update ■ Training session; ■ Informal meeting,


Synchronous ■ Interviews; meeting; ■ Pre-project briefing; e.g., watercooler;
(Meetings) ■ Conflict resolution. ■ Pre-proposal ■ Conference/ ■ Free-form meeting,
meeting; lecture. e.g., brainstorming
■ Project/proposal or problem-solving.
presentation.

Table 3. Common Project Information Elements by Communication Type

tools as anytime/anyplace technologies and expands the Enghavanish, S. (1999). Analysis of the effectiveness of
concept of group communication to include one-way communication and information sharing in virtual project
dissemination of information. organizations. (Doctoral dissertation, The George
The taxonomy uses a graphical approach to depict the effec- Washington University, 1999).
tiveness of each application, with the region of the taxonomy Giffin, S.D., & Jefferson, T. (2000). Conducting project
encompassed by each Internet application defining the theo- management over the internet. Proceedings of the 21st Conference
retical realm of its maximum effectiveness. Applications do not of the American Society of Engineering Management, Washington,
overlap except for the case of 1:few communication. DC. Rolla, MO: ASEM.
Otherwise, only one application is considered to be a best fit. Giffin, S.D., & Stankosky, M. (2000). Internet applications
By analyzing the communication requirements of the for project management communication. Proceedings of the 21st
project management team and matching those requirements Conference of the American Society of Engineering Management,
with the appropriate communication applications, organiza- Washington, DC. Rolla, MO: ASEM.
tions may improve their ability to meet their goals for effec- Guss, C.L. (1998). Virtual project management: Tools
tive technology use. This taxonomy may serve as a theoreti- and the trade. Project Management Journal, 29 (1), 22–30.
cal model for project management organizations seeking to Jefferson, T. (2000). Virtual project teams in an academic
improve their effectiveness and efficiency. setting. Proceedings of the 21st Conference of the American
Society of Engineering Management, Washington, DC. Rolla,
References MO: ASEM.
Davenport, T.H., & Prusak, L. (1998). Working knowledge. Johansen, R., Sibbet, D., Benson, S., Martin, A., Mittman, R.,
Cambridge, MA: Harvard Business School Press. & Saffo, P. (1991). Leading business teams: How teams can use
Doherty, P. (1999). Site seeing. Civil Engineering, 69 technology and group process tools to enhance performance. Boston,
(5), 38–41. MA: Addison-Wesley Publishing Co.

46 Project Management Journal December 2002


McGrath, J.E., & Hollingshead, A.B. (1994). Groups interact-
ing with technology. Thousand Oaks, CA: Sage Publications.
PMI Standards Committee. (1996). A guide to the project
management body of knowledge (PMBOK® Guide). Retrieved 3 Steve D. Giffin, an employee of ExxonMobil Corp.,
October 1999, from http://www.pmi.org/publictn/pmboktoc recently completed his doctorate degree in engineering
.htm#PMBOK1996 management at The George Washington University.
Robbins, S.P. (1998). Organizational behavior: Concepts, con- He has been responsible for management of large-scale
troversies, applications (8th ed.). Princeton, NJ: Prentice Hall. projects and has taught courses in telecommunications as an adjunct
Roe, A.G., & Phair, M. (1999). Connection crescendo. ENR, professor at the University of Baltimore’s Merrick School of Business.
248 (10), 22–26. He is a registered professional engineer and holds a bachelor’s degree
Tedeschi, B. (2000). Construction heads into the Internet in civil engineering from the Georgia Institute of Technology and a
age. The New York Times, 21 February 2000, Sec. C, 1, 9. master’s in environmental engineering from the University of Maryland.

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.

December 2002 Project Management Journal 47


Critical Chain Project Scheduling:
Do Not Oversimplify

Willy Herroelen, Katholieke Universiteit Leuven, Department of Applied Economics,


Naamsestraat 69, Leuven B-3000 Belgium

Roel Leus, Katholieke Universiteit Leuven, Department of Applied Economics, Naamsestraat


69, Leuven B-3000 Belgium

Erik Demeulemeester, Katholieke Universiteit Leuven, Department of Applied Economics,


Naamsestraat 69, Leuven B-3000 Belgium

C ritical chain scheduling/Buffer management (CCS/BM)—the direct application


of the theory of constraints (TOC) to project management—has received much
attention in the project management literature. Subsequent to the publication
of Goldratt’s book Critical Chain in 1997, numerous books (Newbold, 1998;
Leach, 2000) and papers (Cabanis-Brewin, 1999; Globerson, 2000; Herroelen
& Leus, 2000, 2001; Leach, 1999; Maylor, 2000; Patrick, 1999; Pinto, 1999;
Rand, 2000; Umble & Umble, 2000) have been written to clarify the CCS/BM
philosophy. Internet discussion groups also have been set up to discuss critical chain
scheduling issues. These groups include the critical chain Yahoo group
(http://groups.yahoo.com/group/criticalchain) and more general TOC-oriented
groups such as the Yahoo TOC Experts (http://groups.yahoo.com/group/tocexperts)
and the APICS Constraints Management special interest group (accessible via
http://www.apics.org/lists/default.htm).
While real-world applications by companies such as Lucent Technologies and
Harris Semiconductor have been described to demonstrate the effectiveness of the
▼ CCS/BM approach (Leach, 1999; Umble & Umble, 2000), other sources
Abstract (Zalmenson & Zinman, 2000, 2001) alert the reader to serious drawbacks and
Critical chain scheduling/Buffer management implementation failures or at least claim CCS/BM is not at all innovative (Wilkens,
(CCS/BM)—the direct application of the theory 2000). There still is a lot of controversy over the merits and pitfalls of the CCS/BM
of constraints (TOC) to project management— methodology. Being confronted with many views and comments on CCS/BM writ-
has received much attention in project manage-
ment literature. There still is controversy over
ten by either true believers or committed naysayers who fail to offer a fair appraisal
the merits and pitfalls of the CCS/BM method- of the CCS/BM project technique, PM Network, the professional magazine of the
ology. This paper focuses on the fundamental Project Management Institute, put an editor’s note in its January 2001 issue stating
elements of CCS/BM logic and pinpoints some “PM Network is neutral on Theory of Constraints; the publishing division holds no
intricacies that are not commonly referred to in
the available literature. The authors’ analysis allegiance either for or against it.” The objective of this paper is not to defend or
is based on a critical review of the relevant reject CCS/BM. The CCS/BM methodology has much to offer if applied wisely and
sources and experimentation with both com- if the practical implications and limitations are well understood. The authors’ analy-
mercial CCS/BM software and an internally
sis is based on a critical review of the relevant literature and experimentation with
developed CCS/BM-based tool.
both commercial CCS/BM software and an internally developed CCS/BM-based
tool (Herroelen & Leus, 2000).
Keywords: critical chain; buffer management;
resource-constrained project scheduling
The CCS/BM Methodology
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 48–60
The fundamentals of CCS/BM are summarized in Table 1. CCS/BM builds a baseline
8756–9728/02/$10.00 per article + $0.50 per page schedule using activity duration estimates based on a 50% confidence level. Activity
due dates and project milestones are eliminated, and multitasking is to be avoided.

48 Project Management Journal December 2002


50% probability activity duration estimates
No activity due dates
No project milestones
No multitasking
Scheduling objectives = minimize makespan; minimize work in progress
Determine a precedence and resource-feasible baseline schedule
Identify the critical chain
Aggregate uncertainty allowances into buffers
Keep the baseline schedule and the critical chain fixed during project execution
Determine an early start-based unbuffered projected schedule and report early completions (apply the
roadrunner mentality)
Use the buffers as a proactive warning mechanism during schedule execution

Table 1. Fundamentals of CCS/BM

Prioritize the projects


Plan the individual projects according to CCS/BM fundamentals
Stagger the projects by inserting capacity buffers
Insert drum buffers
Measure and report the buffers
Manage the buffers

Table 2. CCS/BM Multiproject Method

To minimize work in progress, a precedence-feasible sched- path leading into it. Resource buffers (RB), usually in the form
ule is constructed by timing activities at their latest start of an advance warning, are placed whenever a resource has to
dates based on critical path calculations. If resource conflicts perform an activity on the critical chain, and the previous crit-
occur, they are resolved by moving activities earlier. The ical chain activity is done by a different resource.
critical chain then is defined as that chain of precedence and During project execution, both the critical chain and the
resource dependent activities that determines the overall baseline schedule should be fixed. Project activities are execut-
duration of a project. If there is more than one critical chain, ed according to the roadrunner mentality using an unbuffered
just select one. projected schedule. This schedule is early start-based, except for
The safety time that is eliminated from the critical chain activ- the gating tasks (activities without predecessors), which are to
ity durations by selecting aggressive duration estimates is shifted be started at their baseline scheduled start times. Early com-
to the end of the critical chain in the form of a project buffer pletion of activities must be reported, and activities should be
(PB). This PB should protect the project due date promised to started as soon as work becomes available. The execution of
the customer from variability in the critical chain activities. the project is managed by using the buffers as a proactive
Feeding buffers (FB) are inserted whenever a noncritical warning mechanism.
chain activity joins the critical chain. Their aim is to protect the As activities are completed, project management should
critical chain from disruptions on the activities feeding it and keep track of buffer consumption. As long as a predeter-
to allow critical chain activities to start early in case things go mined portion of the buffer remains [buffer consumption is
well. Although more detailed methods can be used for sizing only in the green (O.K.) zone], everything is assumed to go
the buffers (Newbold, 1998; Product Development Institute, well. If buffer consumption moves beyond a certain point, a
1999), the default procedure is to use the 50% buffer sizing warning is raised (the yellow watch-and-plan zone). If it
rule, i.e., to use a PB of half the project duration and to set the deteriorates past a critical point (the red act zone), corrective
size of a FB to half the duration of the longest noncritical chain action must be taken.

December 2002 Project Management Journal 49


In a multiproject environment, CCS/BM relies on the six
common steps summarized in Table 2:
1. Prioritize the organization’s projects;
2. Plan the individual projects according to the CCS/BM 1 1 5
fundamentals;
3. Stagger the projects; 2 6 7
4. Insert drum buffers; 1 2 1
5. Measure and report the buffers; 0
0 2
6. Manage the buffers.
Step 1 aims to avoid multitasking among projects. Step 2 1 3 9
calls for the identification of the most constraining company
0 2 0
resource as the “bottleneck” (strategic or drum resource). 4
Projects are staggered (Step 3) on the basis of the schedule for
the strategic resource (drum plan). This is done by placing a 4
capacity buffer in front of a strategic resource activity that is 2
on the critical chain in the strategic resource schedule. A 3 3
drum buffer (Step 4) is placed before activities on the strate-
5 8
gic resource to protect the strategic resource from disruptions
on nonstrategic resources. The buffers then can be managed 2 2
more or less the same way as done in the single-project case
(Steps 5 and 6).

CCS/BM Scheduling Approach


For discussions on a more managerial level, the authors refer Figure 1. Project Network Example
to Pinto (1999), Elton and Roe (1998), and McKay and
Morton (1998). The authors focused on the procedures for
identifying the critical chain in the baseline schedule, buffering CCS/BM has revealed the importance of this critical chain
the baseline schedule, using the buffers as a proactive mecha- to the practitioner and plays a crucial role in the awakening
nism, and the issue of stability and rescheduling. process to the disappearance of the traditional critical path
Throughout the discussion, the authors refer to major find- concept in the presence of resource constraints. Moreover,
ings of a factorial experiment conducted by Herroelen and CCS/BM’s argument that time protection against uncertainty
Leus (2001) on the well-known Patterson (1984) test problem should not be allocated to the individual activities but should
set, which contains test instances with a number of activities be aggregated and concentrated at particular points in the base-
ranging from seven to 50 and requiring up to three renewable line schedule is well-taken and commonly accepted in TOC-
resource types each. The authors confronted the results based scheduling. In short, the idea of generating a determin-
obtained using an exact solution procedure for the resource- istic baseline schedule and protecting it against uncertainty is
constrained project scheduling problem (Demeulemeester & sound and appeals to management. CCS/BM paved the way
Herroelen, 1992, 1997) with the results generated using their for the recent introduction of protective buffering mechanisms
own computerized CCS/BM software and tested the impact of into commercial project planning software. Examples include
the project scheduling mechanism, the buffer size computa- ProChain as an add-in to Microsoft Project® and the critical
tion method, the composition of the critical chain, and the chain-planning functions of Scitor’s PS8 package.
recomputation mechanism of the baseline schedule. A baseline schedule may contain more than one critical
chain, and the composition of the critical chain(s) is entirely
Identifying the Critical Chain dependent on the procedure used for generating the baseline
One of the fundamental merits of CCS/BM is that it explicitly schedule. Creating a precedence and resource-feasible baseline
recognizes it is the interaction between activity durations, schedule that minimizes the project duration—the number
precedence relations, resource requirements, and resource one objective used by CCS/BM’s baseline scheduling logic—is
availabilities that determines the project duration. This inter- not easy because most resource-constrained project scheduling
action results in one or more sequences of activities—consist- problems are NP-hard (they cannot always be solved to opti-
ing of precedence-related and resource-dependent segments— mality in polynomial time). Goldratt (1997, p. 217) seems to
that determine the length of the baseline schedule. Goldratt minimize the issue and claims that “in each case the impact on
(1997) identifies such a sequence as the critical chain. This the lead time of the project is less than even half the project
concept is not new; Wiest (1964) introduced the concept of a buffer” and suggests (p. 220) to cut for each step a piece of
critical sequence more than 30 years ago. It has been used by paper so that “the length represents time. This way we can
many researchers in project scheduling to compute a lower move them around until there is no contention.”
bound on the project duration (Herroelen, De Reyck, & Also, there is a lack of consensus in the CCS/BM literature
Demeulemeester, 1998). about the activity duration estimates to be used for generating

50 Project Management Journal December 2002


5 5
2
4 3 8 4 3
Units

Units
3 6 3 5 6
2 7
2 2 8

1 5 4 1 4
7

1 2 3 4 5 6 7 1 2 3 4 5 6 7 8 9
Time Time

Figure 2. Minimum Makespan Schedule for the Network Figure 3. Schedule Obtained Using Microsoft Project
of Figure 1

the initial baseline schedule. Goldratt (1997) suggests using from the ones present in the optimal duration schedule of
the median, while the Product Development Institute (1999) Figure 2: the chain 4–7 and the chain 5–6–7.
argues in favor of the mean. Herroelen and Leus (2001) con- If the project planner would rely on the ProChain software,
clude from their full factorial experiment that the use of the the schedule in Figure 4 would be obtained. The schedule now
mean activity duration provides the safest estimates of the has a length of eight time periods and has two critical chains: the
project duration. chain 3–5–8 and the chain 3–6–7. Both activity 2 and activity 4
To illustrate that the length of the baseline schedule and the have been right-shifted, i.e., scheduled as late as possible within
collection of possible critical chains is entirely dependent on the scheduling horizon determined by the critical chains. The
the scheduling procedure used, consider the example network software selects the chain 3–6–7 as the critical chain.
given in Figure 1 (Demeulemeester, Herroelen, Simpson, If the user relies on PS8 for generating the baseline sched-
Baroum, Patterson, & Yang, 1994). The numbers above each ule, the optimal seven-period schedule of Figure 2 results, with
node denote the activity duration of the corresponding activi- the critical chains 2–6–7, the chain 2–6–8–3 (8 and 3 have
ty (node 1 and node 9 are dummy nodes with zero duration). switched position), and the chain 5–4. The software selects the
It is assumed that these activity duration estimates do not critical chain 2–6–7.
include individual safety provisions. The numbers below each In short, four different baseline schedules have been
node of the network in Figure 1 represent the number of units obtained for the same project, ranging in duration from seven
of a renewable resource, e.g., workers, required during every to nine periods, and each providing the planner with a differ-
period of the corresponding activity’s duration interval. It is ent population of critical chains. Goldratt (1997) contends
assumed that the renewable resource has a constant availabili- that it does not really matter which critical chain is chosen.
ty of five units per period. This simple example proves the fact that generating a good
Figure 2 gives a minimum duration schedule. This can be baseline schedule does matter, and that statements such as “the
obtained, for example, by using the branch-and-bound pro- critical chain is never ambiguous” (Leach, 2001b) must be
cedure of Demeulemeester and Herroelen (1992, 1997). As interpreted with sufficient care. The length of the baseline
can be verified easily, the project duration is seven time peri- schedule, the set of candidate critical chains, and the activities
ods (by poor luck this corresponds to the length of the in the chosen critical chain all depend on the procedure used
longest critical path 1–2–6–7–9). The baseline schedule for generating the baseline schedule.
reveals three critical chains: the chain 2–6–7, the chain Adding a 50% integer length PB (according to CCS/BM
2–6–3–8, and the chain 5–4. logic) to the baseline schedules of Figures 2, 3 and 4 would
Figure 3 shows the baseline schedule generated by inspire management to make the customer promise to
Microsoft Project. This baseline schedule has a length of nine deliver the project in at least 11, 14 or 12 periods, respec-
time periods and reveals two possible critical chains, different tively. These should be interpreted as “lower bounds:” The

December 2002 Project Management Journal 51


noted by Wiest (1964), however, we must recognize the condi-
tional nature of slack when resources are limited: Slack values
are associated with a particular schedule. Moreover, the
rescheduling policy adopted also will influence activity slack
[refer to Bowers (1995), who works in an environment where
5 resource allocation remains unchanged].
When the FBs are inserted by pushing back their feeding
4 4 chains, the critical chain may no longer be the longest chain in
the network. This has serious implications for the projected
Units

3 6 schedule, which is unbuffered and in which every gating task


2 7 (task without real predecessors) is set to start at its scheduled
2 time in the baseline schedule and the roadrunner mentality
dictates the start times of the other activities. It may well be that
1 3 5 8
the critical chain, the most important chain of activities that is
supposed to determine the duration of the project, is started
later than noncritical chain activities. This is a rather counter-
1 2 3 4 5 6 7 8 9
intuitive way of work.
Time Also, gaps may be created in the critical chain of the
buffered baseline schedule. CCS/BM offers a pragmatic
response to these problems in that the critical chain simply is
defined as the longest chain before the buffers are inserted
(Product Development Institute, 1999). Last, inserting the FBs
may lead to immediate resource conflicts. These conflicts must
Figure 4. Schedule Obtained Using ProChain be resolved with sufficient care to avoid an unnecessary
increase of the length of the baseline schedule.
While the buffer protection idea certainly is defendable
insertion of FBs may well lead to larger committed project and widespread within scheduling practice, the practical
durations. If one fails to use the minimum duration base- implications should be understood well. First, project
line schedule as the starting point for buffering and negoti- management should be sufficiently alert for the idiosyncrasies
ating the project due date with the customer, one may well of the project planning software package in use and should
lose the contract. interpret the buffered schedules generated by commercial soft-
ware packages with extreme care. Figure 5 shows the buffered
Buffer Insertion and Management baseline schedule generated by a commercial software
CCS/BM argues that safety time should best be eliminated package with integrated CCS/BM scheduling logic for the pro-
from individual activity duration estimates and aggregated ject of Figure 1. The planned project duration is 13 periods.
in the form of buffers at crucial locations in the baseline The critical chain activities 2–6–7 are kept in series, but the
schedule. The buffers should offer protection against statisti- chain exhibits a one-period gap.
cal variation and should act as safeguards that provide a Figure 6 shows the buffered baseline schedule obtained for
proactive protection mechanism. The experiment of the same project with an add-in commercial software package.
Herroelen and Leus (2000) revealed that the 50% rule for The planned project duration also is 13 periods, but now man-
sizing the buffers may lead to a serious overestimation of the agement is invited to focus on a different critical chain 3–6–7,
required PB size and, consequently, of the project duration which is no longer a chain. The critical chain activities are not
committed to the customer. kept in series. Critical chain activity 3 is shifted forward and is
By buffering the baseline schedule so that the completion scheduled in parallel with critical chain activity 7.
time of the last positioned critical chain activity is scheduled to FBs should be inserted with sufficient care or an unwant-
occur much later than the completion of any other noncritical ed serious increase in the length of the baseline schedule may
chain of activities, CCS/BM avoids the cumbersome task of well be the result. Rather than using the CCS/BM textbook
performing generalized PERT calculations (Elmaghraby, 1977) approach to simply shift activities back and forth until
to make reliable predictions about project completion in the resource contention is resolved, the authors recommend
presence of resource constraints. The FBs decouple the critical treating the buffers as artificial activities and rescheduling the
chain from the remaining activities in the network, and as such network. Also, the buffer protection mechanism may fail to
they help management focus and set realistic due dates. As a be proactive. To illustrate the first point, consider the project
result, there is a subtle difference between the interpretation of shown in Figure 7. The numbers above each node again
a FB and the critical path notion of activity float. denote the activity duration, and the numbers below each
On the other hand, the management of the buffers during node represent the renewable resource requirement per peri-
project execution does not notably differ from float manage- od for a single resource type with a constant availability of
ment in the absence of resource constraints. As was already three units per period. As such, activity 5 has a duration of

52 Project Management Journal December 2002


Figure 5. Buffered Baseline Schedule Generated by an Integrated Commercial Software Package

Figure 6. Buffered Baseline Schedule Generated by a Commercial Add-in Software Package

five periods and requires two units of the renewable resource activity 5, the buffer FB6 should be inserted after activity 6,
type during each of its execution periods. and the buffer FB7 should be placed after activity 7. If a
Figure 8(a) shows a minimum duration schedule for the person applies the 50% rule for buffer sizing and assumes
project. The critical chain is identified as chain 1–2–3–8 with integer length buffers, FB5 should have a length of four
a 17-period duration. As indicated in Figure 8(b), three FBs periods, FB6 should have a length of three periods, and FB7
must be inserted: The buffer FB5 should be inserted after should be two periods long.

December 2002 Project Management Journal 53


If the buffers are inserted by pushing the chain of activities
feeding the FB backwards in time, immediate resource conflicts
may occur. If activity 5 is pushed backwards, an immediate
resource conflict is created with activities 6 and 7. Shifting 6 11
activity 7 backwards does not create sufficient room for
activity 5. Activity 4 is a predecessor of both activities 5 and 6. 2 3
Shifting the chain of activities 4–6 backwards in time does not 2 1
release sufficient resources for the placement of activity 5,
which may be allowed to jump over activity 6, but cannot 5
jump over its predecessor activity 4. Shifting backwards the
3 5
chain of activities 4–5, which feeds FB5 does not help either. 0 0
The manager is forced by the resource constraint to increase the 1 4 2 8
project duration by almost 50%, as shown in Figure 8(b). 3
If, however, the buffers are treated as dummy activities with 0 1 0
a positive duration and a minimal duration schedule is com-
6
puted, keeping the critical chain unchanged, the schedule of 1
Figure 8(c) results. It has exactly the same length as the original 3
baseline schedule of 8(a) and only differs in the planning of the 7
noncritical chain activities. Sufficient room is available for the
1
proper insertion of the three feeding buffers.
The fact that the penetration of FBs may instantaneously
lead to resource conflicts that prohibit the FBs from acting as
a proactive warning mechanism can be illustrated on the exam-
ple network shown in Figure 9(a). The numbers above each Figure 7. Example Network
node again denote the corresponding activity durations. Six
resource types are used in this project. Resource types A, B, C, D,
and F have a constant availability of one unit per time period, hence, an estimate of the project due date. As shown in the
while resource type E has a constant availability of two units per experiments conducted by Herroelen and Leus (2001), it may
time period. The activity resource requirements are indicated be beneficial to update the size of the PB during project execu-
below each network node. tion, as a reaction to the dynamic process of reevaluating the
The buffered baseline schedule is shown in Figure 9(b). The chances of meeting the due date. A related idea would be to
critical chain consists of the activities 1–4–8. Assume now that shift the alert thresholds of buffer consumption backward in
during project execution, activity 2 is the subject of a very small time, assessing the consumption of buffers relative to project or
delay. This delay will cause a penetration of FB3–4. Given the critical chain completion.
small delay, this penetration will not exceed the first third of Patrick (2001) discusses various techniques in depth in
the buffer, so that no management action is required. However, messages of the Yahoo discussion group. His preference (and
the delay also will lead to an immediate resource conflict with the authors’) is recalculation of the PB size:
activity 6, which requires the same resource B. Delaying
activity 6 will not just lead to a penetration of FB 7–8. While “One advantage of this approach is that rather than
this penetration will be too small to call for management depend on some arbitrary percentage of the buffer ... the
action, it also will lead to a resource conflict with critical chain threshold is determined not at the launch of the project
activity 4, which requires the same resource B. The FBs do not but in a ‘just-in-time’ manner that allows the process to
protect the critical chain from the merge bias. The result is an take into consideration new information encountered dur-
immediate delay in the critical chain. This will be the case even ing the execution of the project.”
if a resource buffer (wake-up call) for resource B would be pre-
sent in front of activity 4. Clearly, FB 3–4 and FB 7–8 fail to act Rescheduling and Stability
as a warning mechanism in anticipation of future difficulties. Consider the buffered schedule of Figure 8(c). If activity 7 were
The FBs used by CCS/BM are time buffers. Time buffers may to take zero time, or activity 2 were to take three time units
fail to cushion resource conflicts. Such immediate resource con- more than anticipated, activity 6 could be repositioned before
flicts must be resolved, possibly requiring actions to repair the activity 5. In general, it makes sense at every project status
schedule. In this simple example, the required schedule repair update to check for opportunities to speed up the projected
actions are rather trivial. This no longer will be the case for real-life schedule by rearranging jobs. This is usually done implicitly by
project network structures in which multiple activities and multi- available software packages, but it is interesting to explicitly
ple resource types may be involved. recognize the option.
Buffer sizes may very well be updated as the project pro- The example project in Figure 10(a) assumes that all the
gresses. The PB provides an estimate of the project completion activities have the same unit duration. Activities F and H
time that can be realized with an appropriate probability and, cannot be scheduled in parallel because they compete for the

54 Project Management Journal December 2002


3
7
2 5
Units
4 6

1 2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Time

(a) Minimal Duration Schedule

3
FB5
7 FB6
FB7
Units

2
6
1 5 2

4 3

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Time

(b) Buffered Schedule Using Push-back Method

3 FB5
7 4 FB6
FB7
Units

2 5
6

1 2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Time

(c) Optimal Buffered Schedule

Figure 8. Insertion of Feeding Buffers

December 2002 Project Management Journal 55


1 1
2 3
B D

6 4 2
1 4 8
A, E B, E E
3 2 1
5 6 7
F B, E C

(a) Project Network Example

(b) Optimal Buffered Schedule

Figure 9. Project Network and Corresponding Buffered Baseline Schedule

same resource with unit availability; the same holds for D and schedule shown in Figure 11(b), which has a smaller
E. Resource usage of the other activities is not restrictive. One makespan. However, the new projected schedule actually is an
possible critical chain would be B–E–H–F–I. The correspond- implicit recognition of a new critical chain. It would be logical
ing buffered baseline schedule is shown in Figure 10(b). The to identify this chain and insert/resize the buffers accordingly.
unbuffered projected schedule is depicted in Figure 10(c). This also allows full exploitation of the updated PB size in
Suppose that at the foreseen end of activity D, this activity making reliable project completion time estimates. Similar
is perceived to take longer than expected. Keeping the critical observations were made as a result of the simulation experi-
chain unchanged would yield the new projected schedule ments in Herroelen and Leus (2001): If the critical chain must
shown in Figure 11(a). Clearly, the makespan of the projected be kept in series during project execution, the makespan can be
schedule has increased. improved by regularly reevaluating the “tightness” of the criti-
Assume that the critical chain no longer is required to cal chain, or in other words, one should avoid concentrating
remain in series. In this case, it no longer is necessary to sched- on an ex ante-derived critical chain that is no longer the real
ule activity H in front of activity F. The result is the projected constraint on project makespan.

56 Project Management Journal December 2002


cause variation requires management action, while common
cause variation does not.
A C F I The experimental set-up used in the funnel experiment con-
sists of a target on the floor, a funnel on a movable stand, and
a marble to drop from the funnel. The aim of the system is to
cause the marble to land on the center of the target. In the con-
D G J End text of project scheduling, the target can be thought of as the
committed project completion date and cost. The funnel exper-
iment shows that adjusting a stable process to compensate for
an undesirable result or an extraordinarily good result will pro-
B E H K duce output that is worse than if the process had been left
alone. Moving the funnel in the opposite direction whenever
the marble misses the target [Leach (2001a) relates this to expe-
diting a newly identified critical path], or moving the funnel
(a) Example Project back to zero each time before making the adjustment [Leach
(2001a) relates this to updating the project baseline schedule
with a change or adjusting the plan to actual before taking the
management control action] leads to an increase in variation.
A C FB F I Leach (2001a) claims that these actions boil down to an adjust-
ment for statistical fluctuation, or common cause variation,
D G J instead of real change, or special cause variation.
FB
There is, however, a subtle difference between the parame-
ter setting of a univariate or bivariate statistical process and the
B E H K FB Time
rather combinatorial nature of project scheduling, even with
variable activity durations: The analogy does not hold. In
many companies, rescheduling is undesirable, but mostly
(b) Buffered Baseline Schedule because of organizational choices for coordinating resources,
rather than because of underlying statistical intuition, as is the
case in the funnel experiment. Statistical process control is
about observing the same statistical process multiple times
A C F I (production environment), whereas every single activity is
executed only once in a project, which has by itself a unique
character. This observation makes any intimate comparison
D G J
between the two settings faulty.
In addition, the closest equivalent obtainable in the fun-
B E H K Time nel experiment to receiving new information about activity
durations would not be the case in which one tampers with
the settings of the funnel after one observation. Rather, it is
(c) Projected Schedule the situation in which one adjusts the location of the funnel
because the variability of the output is reduced (the project
Figure 10. Project Example and Associated Baseline and moves toward completion) and the location of the funnel can
Projected Schedule be better positioned unambiguously. This is because project
activities are precedence and resource dependent. During the
execution of a project, the occurrence of disturbances changes
CCS/BM recommends that the baseline schedule and the the structure of that part of the project that remains to be
selected critical chain should not change during project execu- executed: They provide additional information. This infor-
tion (except for very fundamental disruptions that consume mation should not be treated only as the result of statistical
the protection offered by the PB), motivated by the idea that fluctuation but should be interpreted as special cause
rescheduling and changing the critical chain may lead the pro- variation that may require management action.
ject team into losing focus. Leach (1999, 2001a, 2001b) illus- Opportunities for speeding the remaining part of the
trates the point through an analogy with the funnel experi- ongoing project may be exploited by rearranging the sched-
ment conducted by Deming (1982) to illustrate the differences ule. Discarding from the outset information that will allow
between common cause and special cause variation. Common the remainder of the schedule to be completed fastest may
cause variation refers to a cause that is inherent in the system. not always be wise. The factorial experiment performed by
Special cause variation refers to a cause that is specific to some Herroelen and Leus (2000) confirms that—whether we like
group of workers, a particular production worker, a specific it from a practical project management viewpoint or not—
machine, or a specific local condition (Leach, 1999). Special regularly recomputing the baseline schedule and updating

December 2002 Project Management Journal 57


the critical chain leads to significantly smaller realized
project durations. Jorgensen (1999) also has discussed this
reactive type of approach in a more theoretical setting. A C F I
Some authors argue that workers will think management is
unqualified and only relies on improvisaton if it routinely D G J
reschedules the baseline. Note, however, that the projected
schedule, which indicates when workers are to start their next B E H K Time
job, is updated every time project status updates occur.
Herroelen and Leus (2001) clearly show that this mechanism is
most similar to a dispatching approach. At times, it may be a (a) Projected Schedule Keeping Critical Chain in Series
different critical chain that determines the projected schedule
updates and job dispatching; this situation should not upset
workers more than with an unchanged baseline schedule, espe-
cially if project accelerations are achieved in this way.
On the other hand, there are a number of cases where A C F I
rescheduling is not desirable. Dispatched jobs must not
be interrupted normally due to shifting priorities. Such D G J
decisions will be counterproductive and introduce system
nervousness, and it might be difficult to transfer expert staff B E H K Time
and special resources between activities at short notice
(Bowers, 1995).
Schedule stability will be required as a result of ex ante (b) Projected Schedule With New Critical Chain
imposing limits on certain activity start and end times to
coordinate resources, for instance, across multiple projects. Figure 11. Effect of a Duration Disturbance
This is one reason why piloting a single project according to
the CCS/BM methodology in a multiproject organization
will demand extra care. It may be necessary in a multiproject “Feeding buffers are another story altogether, simply
environment to make advance bookings of key staff or because they are a pain in the neck to manage for all
equipment to guarantee their availability (Bowers, 1995). but very small projects. As work is replanned to incor-
Other sources of the need for such stability can be hard porate changes and work around plans, the buffers
delivery dates for suppliers or subcontractors, or in a larger need to be relocated and adjusted.”
sense, a hard due date for project deliverables, e.g., mile-
stones—in other words, any time restriction that is external Clearly, the need for intelligent scheduling/repair
to the project itself. Remember that it is standard CCS/BM mechanisms remains, and additional research is needed in the
procedure to introduce a separate PB per deliverable development of powerful mechanisms for the creation of
(ProChain, 1999). If supplier delivery dates or “ready times” robust baseline schedules and the deployment of effective
are tight or due dates are not, the plan may have to be proactive warning mechanisms.
created backward from or within those dates.
If the due dates are tight on the other hand (after exhaust- Conclusions
ing all possible “activity crashing” alternatives), a baseline The CCS/BM methodology has acted as an important eye-
schedule loses its significance, and implicit buffer sizes follow opener in project management practice. It correctly recognizes
from comparing the projected schedule with the imposed that the interaction between the time requirements of the pro-
dates; there is no real distinction anymore between buffer ject activities, the precedence relations defined among them,
management and “classical” float management. the activity resource requirements, and the resource availabili-
In conclusion, the decision to repair the schedule or ties has a crucial impact on the duration of a project. This
engage in rescheduling requires extreme care. Simple, clear- point, largely unrecognized by many project management
cut answers do not seem to exist. This being said, the project- practitioners and blind critical path fanatics, is well taken and
ed schedule will require regular adaptation anyway to completely in line with the profound insights gained in the
account for resource contention. Also, proponents of uncon- resource-constrained project scheduling literature. Given the
ditionally keeping the critical chain unchanged should ask complexity and the moderate research progress of stochastic
themselves whether they refuse to revise the baseline sched- resource-constrained project scheduling, the idea of construct-
ule because it introduces system nervousness, or rather ing and protecting a mean activity duration-based precedence
because such schedule management in the CCS/BM way and resource-feasible deterministic baseline schedule is sound.
becomes rather arduous. Reevaluating the most critical part It often is the best thing one can hope for and rely on from a
of the schedule in such situations regularly boils down to computational point of view.
completely repositioning the buffers and the critical chain. The methodology of inserting and managing resource, feed-
For instance, Wilkens (2000, p. 69) states: ing, and project buffers—essentially the application of the

58 Project Management Journal December 2002


TOC to project scheduling—provides a simple and workable constrained, single project scheduling problem. European
tool for setting realistic project due dates and for monitoring Journal of Operational Research, 76 (1), 218–228.
the project during execution. It emerged into project manage- Deming, W.E. (1982). Out of the crisis. Cambridge, MA:
ment software, which allows project management to shift from MIT Press.
a time-oriented (critical path-based) to a resource-constrained Elmaghraby, S.E.E. (1977). Activity networks—Project
(critical chain-based) view. Daily project management practice planning and control by network models. New York: Wiley
was in a desperate need for such a shift in focus. Interscience.
The danger, however, lies in the oversimplification. Elton, J., & Roe, J. (1998). Bringing discipline to project
McKay and Morton (1998, p. 762) relate: “We believe that management. Harvard Business Review, 76 (2), 153.
most project managers will benefit from a conscious reflec- Globerson, S. (2000). PMBOK and the critical chain. PM
tion of what Goldratt has written ... However, a danger exists Network, 14 (5), 63–66.
for the project manager who does not understand the neces- Goldratt, E.M. (1997). Critical chain. Great Barrington, MA:
sary preconditions.” Indeed, the practical implications of The North River Press Publishing Corp.
applying CCS/BM must be recognized clearly. Pinto (1999, Herroelen, W., De Reyck, B., & Demeulemeester, E. (1998).
p. 51) concludes: “My concern lies in the strong potential for Resource-constrained project scheduling: A survey of recent
many companies, who do not understand both TOC’s developments. Computers and Operations Research, 25 (4),
strengths and weaknesses, to latch on to it as TNBT [The Next 279–302.
Big Thing, meaning a management fad] regardless of their Herroelen, W., & Leus, R. (2000). On the merits and pitfalls
particular and unique circumstances.” of critical chain scheduling. Proceedings of the 1st PMI Research
Resource-constrained project scheduling problems are hard. Conference 2000, Paris, France. Newtown Square, PA: PMI,
Constructing and protecting a baseline schedule is not an easy 283–295.
pursuit. CCS/BM offers a practical, software-supported project Herroelen, W., & Leus, R. (2001). On the merits and pitfalls
scheduling tool. Identifying the critical chain is not easy. Due of critical chain scheduling. Journal of Operations Management,
to the complexity of the resource-constrained project 19 (5), 559–577.
scheduling problem involved, management is forced to rely on Jorgensen, T. (1999). Project scheduling—A stochastic dynam-
heuristic procedures for generating a precedence and resource- ic decision problem. Unpublished doctoral dissertation,
feasible baseline schedule for real-life projects. Norwegian University of Science and Technology,
Different scheduling methods may yield different project Trondheim, Norway.
durations and/or a different set of critical chains. The proce- Leach, L.P. (1999). Critical chain project management
dures used for inserting the buffers may have a strong impact improves project performance. Project Management Journal, 30
on the project completion times committed to the customer, (2), 39–51.
and commercial software packages may provide ambiguous Leach, L.P. (2000). Critical chain project management.
results. The authors have shown that during project execution, Boston: Artech House Professional Development Library.
the buffers may fail to act as a real proactive protection Leach, P. (2001a). Putting quality in project risk man-
mechanism and pointed out that management must face the agement—Part 1: Understanding variation. PM Network, 15
trade-offs involved in schedule repair and rescheduling. (2), 53–56.
Simple, clear-cut answers do not seem to exist. Further research Leach, P. (2001b). Putting quality in project risk man-
is needed in the development of workable and effective agement—Part 2: Dealing with variation. PM Network, 15
mechanisms for creating robust baseline schedules and (3), 47–52.
effective mechanisms for schedule repair. Maylor, H. (2000). Another silver bullet? A review of the theory
of constraints approach to project management. Paper presented
References at the 7th International Annual European Operations
Bowers, J.A. (1995). Criticality in resource constrained net- Management Association Conference, Ghent, Belgium.
works. Journal of the Operational Research Society, 46 (1), 80–91. McKay, K.N., and Morton, T.E. (1998). Critical chain. IIE
Cabanis–Brewin, J. (1999). “So … So What?” Debate over Transactions, 30 (8), 759–762.
CCPM gets a verbal shrug from theory of constraints guru Newbold, R.C. (1998). Project management in the fast
Goldratt. PM Network, 13 (12), 49–52. lane—Applying the theory of constraints. Boca Raton, FL: The
Demeulemeester, E.L., & Herroelen, W.S. (1992). A branch- St. Lucie Press.
and-bound procedure for the multiple resource-constrained Patrick, F.S. (1999). Critical chain scheduling and buffer
project scheduling problem. Management Science, 38 (12), management—Getting out from between Parkinson’s rock
1803–1818. and Murphy’s hard place. PM Network, 13 (4), 57–62.
Demeulemeester, E.L., & Herroelen, W.S. (1997). New Patrick, F.S. (2001, 2 January). Critical chain project manage-
benchmark results for the resource-constrained project sched- ment, program management, TOC and projects [Msg 33].
uling problem. Management Science, 43 (11), 1485–1492. Message posted to http://groups.yahoo.com/group/criticalchain
Demeulemeester, E., Herroelen, W.S., Simpson, W.P., Patterson, J.H. (1984). A comparison of exact procedures
Baroum, S., Patterson, J.H., & Yang, K.K. (1994). On a paper for solving the multiple constrained resource project schedul-
by Christofides et al. for solving the multiple-resource ing problem. Management Science, 30 (7), 854–867.

December 2002 Project Management Journal 59


Pinto, J.K. (1999). Some constraints on the theory of
constraints—Taking a critical look at the critical chain. PM
Network, 13 (8), 49–51.
ProChain Solutions Inc. (1999). Introduction to ProChain. Willy Herroelen, PhD, is professor in operations
Retrieved 19 February 2002, from www.prochain.com/ management at the Department of Applied Economics
university.asp at the Katholieke Universiteit Leuven. He teaches cours-
Product Development Institute. (1999). Critical chain es in the area of production scheduling and sequencing,
tutorial. Retrieved 23 September 2002, from http://www.pd facilities planning, organization of the production process, and project
institute.com/tutorial/contents.html management. He has published widely on resource-constrained project
Rand, G.K. (2000). Critical chain: The theory of constraints scheduling. His current research activities focus on scheduling and
applied to project management. International Journal of Project sequencing under various resource and capacity constraints. He is a
Management, 18 (3), 173–177. member of the Project Management Institute and several professional
Umble, M., & Umble, E. (2000). Manage your projects for management science and operations management associations.
success: An application of the theory of constraints. Production
and Inventory Management Journal, 41 (2), 27–32.
Wiest, J.D. (1964). Some properties of schedules for large
projects with limited resources. Operations Research, 12 (3), Roel Leus holds a commercial engineering degree
395–418. from the Department of Applied Economics at the
Wilkens, T.T. (2000). Critical path, or chain or both? PM Katholieke Universiteit Leuven. He is research assis-
Network, 14 (7), 68–74. tant of the Fund for Scientific Research—Flanders
Zalmenson, E., & Zinman, E. (2000). People oriented project at the same department where he is preparing a PhD dissertation
management. Retrieved 23 September 2002, from on robust and reactive project scheduling. He is a member of the
http://users.actcom.co.il/cyberman/articles/People_Oriented_ Project Management Institute and Institute for Operations Research
PM.doc and the Management Sciences.
Zalmenson, E., & Zinman, E. (2001). Theory of constraints
analysis. Retrieved 23 September 2002, from http://users.
actcom.co.il/cyberman/articles/toc_eng.doc
Erik Demeulemeester, PhD, is professor in operations
management at the Department of Applied Economics
at the Katholieke Universiteit Leuven. He teaches
courses in quality management and production man-
agement. He has published widely on resource-constrained project
scheduling. His current research activities focus on scheduling and
sequencing under various resource and capacity constraints. He is a
member of the Project Management Institute and several professional
management science and operations management associations.

Statement of Ownership, Management and Circulation


1. Publication Title: Project Management Journal 8. Complete Mailing Address of Headquarters or General 11. Known Bondholders, Mortgagees, and Other Security
2. Publication Number: 8756-9728 Business office of the Publisher: Project Management Holders Owning or Holding 1% or More of Total Amount
3. Filing date: 12/01/02 Institute, Four Campus Boulevard, Newtown Square, PA of Bonds, Mortgages, or Other Securities: None
4. Issue Frequency: Quarterly 19073–3299 USA 12. For completion by nonprofit organizations authorized to mail
5. Number of Issues Published Annually: 4 9. Full Names and Complete Mailing Addresses of Publisher: at special rates. The purpose, function, and nonprofit status of
6. Annual Subscription Price: $14.00 Linda Cherry; Four Campus Boulevard Four Campus this organization and the exempt status for federal income tax
7. Complete Mailing Address of Known Office of Publication: Boulevard, Newtown Square, PA 19073–3299 USA purposes: Has Not Changed During Preceding 12 Months
PMI Publishing Division, Four Campus Boulevard,Newtown 10. Owner: Project Management Institute, Four Campus 13. Publication Name: Project Management Journal
Square, PA 19073–3299 USA Boulevard, Newtown Square, PA 19073–3299 USA 14. Issue Date for Circulation Data Below: November 2002

15. Extent and Nature of Circulation


Average No. Copies Each Issue Actual No. Copies Single Issue
During Preceding 12 Months Published Nearest to Filing Date
a. Total No. Copies (Net Press Run) 93,894 100,275
b. Paid and/or Requested Circulation
(1) Sales Through Dealers and Carriers, Street Vendors, and Counter Sales (Not Mailed) Does Not Apply Does Not Apply
(2) Paid or Requested Mail Subscriptions (Include Advertisers’ Proof Copies/Exchange Copies) 92,794 99,175
c. Total Paid and/or Requested Circulation
[Sum of 15b(1) and 15b(2)] 92,794 99,175
d. Free Distribution by Mail (Samples,
Complementary, and Other Free) Does Not Apply
e. Free Distribution Outside the Mail
(Carriers or Other Means) Does Not Apply
f. Total Free Distribution (Sum of 15d and 15e) Does Not Apply
g. Total Distribution (Sum of 15d and 15f) 92,794 99,175
h. Copies Not Distributed
(1) Office Use, Leftovers, Spoiled 1,100 1,100
(2) Return from News Agents Does Not Apply
i. Total [Sum of 15g, 15h(1), and 15(2)] 93,894 100,275
(1) Percent Paid and/or Requested Circulation (15c / 15g x 100) 98.7% 98.9%
16. This Statement of Ownership will be printed in the December 2002 issue of this publication.
17. Name and Title of Editor, Publisher, Business Manager, or Owner: Linda Cherry Date: 12/01/02

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.
Journaling: A Learning Tool for
Project Management Training
and Team-building
Robert Loo, The University of Lethbridge, Faculty of Management, Lethbridge,
Alberta T1K 3M4 Canada

T eamwork and managing teams can be very stressful because of interpersonal and
task conflicts, the pressures of deadlines, performance standards, and resource
scarcity, among other disagreements that typically threaten team effectiveness and
success. Project managers control such threats to team effectiveness partly through
measures such as timely training in leadership skills, conflict management skills,
communication skills, and the like. Another method to manage such threats is
through the implementation of various administrative procedures and practices such
as team meetings and performance reviews.
This paper focuses on the usefulness of reflective learning journals as a method of
promoting both individual and team performance in the context of project manage-
▼ ment training and team-building (Fleming & Koppelman, 1997; Goodge, 1998;
Abstract Zimmerer & Yasin, 1998). Critical reflection upon project team experiences through
journaling should facilitate learning specific skills including interpersonal commu-
This paper describes the application of
reflective learning journals to promote critical nications, conflict management, managing effective meetings, managing stress, and
self-awareness. This technique improved both leadership skills. The nature of reflective learning, the use of reflective learning jour-
individual and team performance among nals, and their application in teamwork are illustrated along with recommendations
members in nine management undergraduate
teams conducting project management
for the effective use of journaling in project management.
research projects. Qualitative analyses of
entries in the journals revealed seven major Theory and Practice of Reflective Learning
themes: interpersonal relationships, team Boyd and Fayles (1983) define reflection as “the process of internally examining and
communication, stress-time pressures, team
vs. individual work, personal criticisms and
exploring an issue of concern, triggered by an experience, which creates and clarifies
improvement, lessons learned and future meaning in terms of self and which results in a changed conceptual perspective”
actions to improve one’s performance, and (p. 100). Reflection is embedded within several theoretical frameworks (Hutchinson
evaluation and comments about journaling. & Allen, 1997; Kember, Jones, Loke, McKay, Sinclair, Tse, Webb, Wong, F., Wong,
Analyses of the journaling evaluation data
showed that participants found journaling a M., & Yeung, 1999; McCaugherty, 1991; Riley-Doucet & Wilson, 1997; Scanlon &
useful learning tool. Recommendations are Chernomas, 1997). This paper used Scanlon’s and Chernomas’s (1997) three-stage
presented for using reflective learning journals model because it is a relatively simple model that easily can be communicated and
as one tool in project management training
used. As seen in Figure 1, the first stage of reflection is awareness, where awareness
and team-building.
might be stimulated by some uncomfortable or positive thoughts or feelings about a
learning situation or event. Without such awareness, reflection cannot occur.
Keywords: learning journals; team-building;
training In the second stage, the individual critically analyzes the situation, bringing to
bear his or her relevant knowledge and experiences as well as the application
©2002 by the Project Management Institute
2002, Vol. 33, No. 4, 61–66
of new knowledge resulting from the analysis process. This stage should involve
8756–9728/02/$10.00 per article + $0.50 per page critical thinking and evaluation and self-examination with accompanying growing
self-awareness.

December 2002 Project Management Journal 61


The third and final stage involves the development of a new ■ Stated questions should help stimulate ideas and keep
perspective based upon one’s critical analysis and the applica- focused on learning in this course requirement, but feel free to
tion of new knowledge to the (learning) situation under reflec- discuss other questions/topics or incidents that you judge to be
tion. The new perspective may be marked by affective, cogni- important to your learning effectiveness;
tive, and behavioral changes. The author expects that such ■ Be self-aware, honest, and open in your reflection—
changes are adaptive in the sense that the individual becomes self-delusion won’t help improve your effectiveness. Go from
more effective as an individual and team member; clearly then, genuine self-awareness to self-evaluation, and then to actions
learning has occurred. for improvement.
Essentially, this view of reflective learning fits well with sev- Given that these guiding questions and tips were provid-
eral theoretical frameworks such as Schon’s (1987) reflective ed to all students as part of a handout and the various occa-
practitioner and “knowing-in-action” and the empowerment sions in which class discussion took place about journaling,
literature (Shulman, McCormack, Luechauer, & Shulman, the process might be described as “guided journaling.”
1993; Spreitzer, 1995) because journaling is a process whereby Journals were submitted in electronic form, and students
learners take a great deal of control over their own learning received individual feedback on their journal along with
experiences and give meaning to their learning. Reflective their grade. Class feedback on journaling was provided when
learning journals are an important tool in translating theory research reports were returned to the class. Last, students
into practical action, i.e., praxis. were asked to evaluate the journaling approach by respond-
ing to five questions (Table 1) and adding their comments,
Applications Example at the end of semester.
The present example illustrates the use of reflective learning
journals in project teams, specifically, in four-student teams in Analyses and Findings From
a faculty of management undergraduate project management the Reflective Learning Journals
course. The 35 management undergraduates formed their own The qualitative software program NUD*IST (Non-Numerical,
four-student teams for a total of nine teams at the beginning of Unstructured, Data: Indexing, Searching, and Theorizing)
the semester to work on a major term paper worth 30% of their (NUD*IST, 1997) and a dictionary of codes, e.g., positive and
final grade. The team worked together over a period of about negative interpersonal communication, interpersonal con-
10 weeks. Peer evaluations were used at the end of the assign- flict, and lessons learned, generated by the investigator were
ment to apportion marks among group members. used to categorize the text in the journals; each sentence was
In addition to the information provided in the course out- a unit of analysis. The investigator then used an iterative
line, handouts (available from the authors upon request) were process to develop and refine themes and subthemes that
provided as well as class discussions held on several occasions reflect the information in the learning journals. The themes
concerning the nature and scope of the term paper, the and subthemes were subject to a reliability check by the
Scanlon and Chernomas (1997) model of reflective learning, research assistant.
and the guidelines for the reflective learning journals. Seven major themes plus subthemes emerged from the
A reflective learning journal was part of the electronic sub- journals: interpersonal relationships, team communication,
mission requirement at the end of the assignment, and each stress-time pressures, team vs. individual work, personal criti-
journal was worth a maximum of 5% of each student’s final cisms and improvement, lessons learned and future actions to
grade. It was emphasized that journals are not simply a “diary” improve one’s performance, and evaluation and comments
or “log” but an articulated narrative that follows from the about journaling.
reflective and critical thinking about one’s learning experiences
or specific learning events. Six questions were posed to help Interpersonal Relationships
students stay focused and make journaling a useful exercise: This team assignment was associated with a mix of positive
■ What was the learning situation/event? and negative interpersonal interactions over the course of the
■ What have I learned, and how did I learn it? assignment as indicated by a number of subthemes.
■ How do I feel (good and bad feelings) about what I learned? Shared Goal and Focus. Some students were quite happy
■ How could I have learned more effectively/efficiently? with their group, mainly because team members shared a com-
■ What actions can I take to learn more effectively/ mon goal, did their share of work, met deadlines, and the like.
efficiently in the future? ■ “The one thing that made our paper and team come
■ In what ways do I need to change my attitudes, expectations, together was the fact that we all had the same goals. When
values, and the like to feel better about learning situations? everyone in a group has the same group performance goals,
Tips also were provided to students in the handout as well group work is a more satisfying experience;”
as during class discussion: ■ “This group I have been working with have been great.
■ Pick a quiet place and reflective time, e.g., early evening in Everyone seems to be eager to work, and I like how we divided
your room, to do your journal entries; up the work load;”
■ Entries should be done at least twice weekly or daily when ■ “Our group did work well together, when we were
there is significant project activity, e.g., project meetings or at meetings there was not a lot of idle chit chat; we got down
completing the project report; to business.”

62 Project Management Journal December 2002


Statements Agree Agree Disagree Disagree
strongly strongly

1. I found the learning journal 0.0% 22.2% 61.1% 16.7%


very difficult to do.

2. I now have a better grasp about 5.6% 55.6% 38.8% 0.0%


how to do a learning journal.

3. I now feel that I have greater 11.8% 52.9% 35.3% 0.0%


insight into my own learning.

4. I think I will use a learning 0.0% 33.3% 44.5% 22.2%


journal in the future.

5. In the future, I will reflect more 23.5% 58.9% 17.6% 0.0%


upon my learning experiences.

Table 1. Percent Responses to the Five Evaluation Statements

Personal Compatibility. Other students commented on the ■ “This lack of focus was mainly due to our lack of knowledge
good fit of personalities or effective aspects of group interactions. of each other personally.”
■ “As far as personalities go, our personalities coincide Friends vs. Colleagues. While students may believe initial-
very well;” ly that working with friends will make projects easier, they
■ “[We] possess similar personalities, so we enjoy learning soon discover that is not always the case.
from one another;” ■ “I also reaffirmed my belief that having team members with
■ “We seem to be getting along great so far this semester and whom you also share a social relationship with is not always
I hope that it continues throughout the project.” conducive to getting things accomplished.”
Safe Environment. Some comments reflected a “safe envi- Interpersonal Conflict. Some students noted conflict with
ronment” team in that the team climate was supportive rather other group members.
than threatening. ■ “For the first time in my university career, I feel like get-
■ “What really worked well during this meeting was the fact ting mad every time I have a meeting in this group. It’s not
that everyone contributed their ideas, and no one criticized that I have personal differences with anyone, in fact [we]
ideas offered ... I have found that this group has helped me to are good friends. It’s just that we seem to argue over the
come out of my shell;” stupidest things.”
■ “There was [sic] no criticism or accusations made ... I believe Self-Awareness and Interrelationships. Some students rec-
that this cohesion produced a fantastic paper and a great ognized aspects of their own personality and interpersonal
rapport between each of us;” style that hindered constructive interrelationships. Some made
■ “I found it great that we all accepted each other’s feedback efforts to change their behaviors.
and made the suggested changes to our individual work.” ■ “At these meetings, I can’t help but feel that I’m taking
Humor. There were a few comments about the positive charge too much. A nasty habit of mine, I usually try to dom-
effects of humor in group meetings. inate the conversation ... I am concerned that I may be
■ “I have a good sense of humor and like to display that, offending my other group members, and I have tried to talk
especially in a group setting. This sense of humor helped with about it with my group members. Nobody has made any
loosening our group up at the beginning of our meetings.” complaints so far;”
On the other hand, there were negative comments about ■ “I have traditionally hated working in groups ... Having
interactions within the team. been let down in the past, I seem to have developed a bit of a
Interactions Lacking Focus. Some students noted the frus- pessimistic outlook when it comes to relying on other people
trations when group meetings lacked focus or were discussions for work that will directly affect me;”
about unrelated matters. ■ “I can get aggravated quite easily if I am under pressure
■ “Made it difficult to get any work done because of talking and if things don’t go the expected way I planned, so I need
about unrelated subjects, disagreements, and differing out- to take a deep breath, step back, and remember that my team
looks, which had to be treaded on carefully in order to keep members are in the same boat as I am with school, work, and
from hurting any feelings;” social lives.“

December 2002 Project Management Journal 63


Awareness Critical Analysis Learning

Connects Present With


Present Future
the Past and Future

Note. Adapted from the Atkins and Murphy (1993) three-stage model of reflective learning.

Figure 1. Reflective Process

Group Communication Negative Reactions to E-mail. While some students had pos-
Not surprisingly, there were many comments related to itive evaluations of e-mail as a communications tool, others did
communication within teams, including comments about not like using e-mail or found the communications frustrating.
both effective and ineffective communications. ■ “We discussed after our first team exercise that e-mailing was
Usefulness of E-mail as a Communications Tool. Several a bad means of communicating ... Some team members were
journal entries emphasized the usefulness of e-mail as a com- not as keen as others on using e-mail for correspondence;”
munication tool for the group assignment. ■ “She said she would e-mail us a draft and we could look it
■ “I sent an e-mail to all team members, getting folks to start over and send it back to her on Thursday. That sounded like a
thinking about the kind of project they wanted to do. We great plan, but Netscape was down most of Wednesday and
e-mailed back and forth two or three times and finally all Thursday so I couldn’t get my mail.”
confirmed the topic;”
■ “We were all up to speed because we kept in touch Stress-Time Pressures
through e-mail;” Some students commented on stress mainly due to time pressures.
■ “I learned that I love e-mail!” ■ “We realized we started too late on this paper, and we’re
Effective Communication Leading to Effective Meetings. starting to get snappy and crabby at and with each other—
Some students noted examples of effective group communica- unjustified actions;”
tion leading to effective meetings. ■ “From the beginning, we failed to get organized. Now we
■ “During this meeting we had excellent communication and are all in a panic trying to find the easiest way to produce a
focus. The meeting was not long—just under an hour—but we good paper;”
got a lot accomplished and I think that we all came away from ■ “I have so much other work to do that I can’t organize or get
the meeting with a good feeling;” other people going and coordinate the proceedings.”
■ “What really worked well during this meeting was the fact On a positive note, one student stated:
that everyone contributed their ideas and no one criticized ■ “After a good meeting like this, my stress level just dropped
ideas offered.” two notches.“
There also were instances of ineffective communications The distressful effects of time pressures also were mentioned:
noted in some journal entries. ■ “I’m worried that we don’t have enough done yet, and I’m
Off-Task Communications. Some students noted the frus- worried that we are not going to finish this in time. We need to
trations of group meetings in which they felt that too much get going, but everyone’s schedule is so limited;”
time was spent on discussions not relevant to the task—the ■ “I think we may have been feeling the pressure because
group term paper. there is [sic] only two weeks before the paper is due.”
■ “We really haven’t done that much together, and when we
do get together, we tend to talk a lot about unrelated topics.” Team vs. Individual Work
Ineffective Communications. There were journal entries While the assignment was a group paper, some students
that noted ineffective communications in the sense that commented favorably on the ability to divide the work
communication was not focused, ambiguous, and the like. among members, or in other words, the ability to do indi-
■ “I think we must have been on different wavelengths the vidual as well as group work. Other students commented
evening we chose our topic. It was very different than what we that the group assignment allowed individual work too;
talked about;” therefore, students could break the project into individual
■ “Today we discussed our problem, and I realized that it was tasks and coordinate the work.
pretty bad. Ironically, by talking about it, we got even further ■ “The ability for the individual team members to work
off track without addressing the real problem. I guess it would individually, yet still [work] towards [sic] the common goal
help if we had an agenda and appointed someone to be the of the group saved everyone a lot of unnecessary meeting
watch dog for each meeting.” times and headaches in the end.”

64 Project Management Journal December 2002


Personal Criticism and Improvement ■ “In the past, I had always been disapproving of other peo-
Some students made critical self-assessments and then went ple that missed scheduled project meetings. What I learned
the next step to identify points for personal improvement. was that sometimes it truly is unavoidable.”
■ “I have to learn to control my anger ... I personally can be Learning From Others. A few entries reflected the useful-
better prepared through planning and time management; ness of social learning and imitation.
hopefully this will also make me a better communicator;” ■ “I learned a lot from just watching [him] operate in
■ “I admit that I tend to procrastinate, but with this group I a group setting. [He] was a good chairperson or leader
can’t do that. That is a good thing;” of meetings. From this I learned some important
■ “I have to admit when I am wrong and accept someone leadership techniques.”
else’s way of doing things sometimes;” Learning From “Bad” Experiences. Some students recog-
■ “I made a point to listen to what people were saying and nized the value of learning from situations that were ineffec-
making myself more aware of their opinions.” tive, so they learned not to behave that way in the future.
■ “I have learned more from this completely ineffective
Lessons Learned and Future group than I would have from any good group I may have
Actions to Improve One’s Performance worked with. Maybe not more, but different things, which I
In line with the main purpose of the learning journals, many consider more important for me to know;”
students reflected upon the team assignment and identified ■ “I learned what not to do.”
lessons learned as well as actions they could take to improve
their own learning and team effectiveness in the future. Evaluation and Comments About Journaling
Journal entries were grouped into four categories: manage- The responses to the seven evaluation questions are present-
ment skills, the “people” side of teamwork, learning from ed in Table 1. Overall, the results were positive but there were
others, and learning from “bad” experiences. participants who found journaling difficult to do or who
Management Skills. Comments in this category reflected would not consider doing journals in the future. Clearly,
basic management skills such as communications skills, there is a need when using this method to communicate
planning, time management, and the like. more convincingly to participants the usefulness of journal-
■ “In the future I plan to take a speech class in order to help ing in effective learning. There were several positive com-
me with my communication skills;” ments about the usefulness of journaling.
■ “In the future I am going to make a list of things I want to ■ “Overall I think this was a good experience, and I enjoyed
get done;” doing the learning journal as well;”
■ “I found that the scheduling of these meetings gave us ■ “I believe I learned quite a bit from my [sic] writing my
ample time to get accomplished what we needed to, as journal myself. I saw definite areas that need to be polished,
well as giving us some ‘cushion time’ in case of delays, need to be started sooner, more structure to them [sic], set
missed meetings, research time, and so on. Through this, I milestones, etc., and areas that I can help make these differ-
quickly learned that a ‘cushion’ amount of time is just as ences happen—not pass it off on others. The problems, good
vital as a ‘cushion’ amount of money in a project budget. points, and feelings in this journal, and the possible
This is extremely apparent when the weather turned bad in solutions are such that they can be applied to other similar
the final week of the project. If we had not the additional situations I may run into in the future.”
time prior to this past week, the project would have been
in dire straits;” Lessons Learned and
■ “… Decision-making and leadership styles are largely sit- Recommendations for Managers
uational and will have to change in order to best suit the Journaling can be a useful learning tool for managers to record
needs of the project;” and critically reflect upon their own work performance with
■ “The one thing I really learned through the whole experi- the aim of improving their management skills and perfor-
ence is that we need better planning and communication. mance. Senior managers who mentor or coach new managers
The whole project would have gone a lot smoother and faster may find that assigning a journaling exercise is a useful way of
if we just planned out what we were going to do;” obtaining specific work-related information for discussion and
■ “I have learned now that I can’t do as much as I want to advice-giving in the mentoring/coaching relationship.
sometimes, so I have to pace myself and realize that I can’t Managers can use journaling as one tool in team-building
work 24 hours a day.” for project teams or management teams. Journaling also can
“People” Side of Teamwork. Comments included in help turn problem teams around because the analysis of jour-
this category reflected the interpersonal relations side nal entries from problem teams can identify problem areas—
of teamwork. technical or people problems—for corrective actions.
■ “So, at this point, I learned that groups take time to get
use [sic] to each other. I learned to be patient and get to know Lessons Learned and
group members before tackling a big problem;” Recommendations for Trainers
■ “I learned that it really helps when individuals allow each Instructors need to thoroughly and convincingly communicate
other to work in their [sic] areas of strength;” to participants the purpose, value, and procedure for learning

December 2002 Project Management Journal 65


journals. Comprehensive handouts and periodic reminders to and practice in first-year student nurses: An action research
participants about doing their journaling, i.e., coached reflec- study. Journal of Advanced Nursing, 16 (5), 534–543.
tion, are important. NUD*IST. (1997). QSR NUD*IST 4 user guide (2nd ed.).
It is important to provide detailed individual and class Thousand Oaks, CA: Sage Publications.
feedback on the journals along with specific recommenda- Riley-Doucet, C., & Wilson, S. (1997). A three-step method
tions for students to improve their future learning. Instructors of self-reflection using reflective learning journal writing.
must ensure the confidentiality of journals so students feel Journal of Advanced Nursing, 25 (5), 964–968.
secure in recording sensitive and personal information. Scanlon, J.M., & Chernomas, W.M. (1997). Developing the
Instructors also should identify problem learning reflective teacher. Journal of Advanced Nursing, 25 (6),
areas, e.g., poor communication and time management 1138–1143.
skills, or obstacles to learning, e.g., inadequate management Schon, D.A. (1987). Educating the reflective practitioner:
support for training, in order to offer remedial action in Toward a new design for teaching and learning in the profes-
training courses. sions. San Francisco: Jossey-Bass.
Shulman, G.M., McCormack, A., Luechauer, D.L., &
Lessons Learned and Shulman, C. (1993). Using the journal assignment to create
Recommendations for Learners empowered learners: An application of writing across the cur-
Learning is an active empowering process so students must be riculum. Journal on Excellence in College Teaching, 4 (1), 89–104.
encouraged to take control over their own learning and ability Spreitzer, G.M. (1995). An empirical test of a comprehen-
to learn from experience. Reflective learning journals provide sive model of intrapersonal empowerment in the workplace.
learners with an important opportunity to empower them- American Journal of Community Psychology, 23 (5), 601–609.
selves and to learn if they take journaling seriously. Zimmerer, T.W., & Yasin, M.M. (1998). A leadership profile
Learners need to hone basic project management skills, e.g., of American project managers. Project Management Journal, 29
doing detailed planning, scheduling, and prioritizing of activi- (1), 31–38.
ties, including self-management skills, e.g., conflict resolution,
communication, and time management skills.

Conclusions
Findings from this study show that reflective learning journals,
with the guidance and support of instructors, are useful tools
that can help staff learn as individuals as well as members of Robert Loo, PhD, is professor of management at the
teams. Significantly, this group of students provided evidence University of Lethbridge. Before joining the university
demonstrating they learned that identification of their short- in 1989, he worked extensively in both private and
comings is important and that it is essential to take steps to public sector organizations since the 1960s. Loo has
change behaviors to work compatibly within teams. The reflec- held both project and program management positions in organiza-
tive learning journals stimulated students to contemplate how tions such as the Canadian Department of National Defense, the
they would fit in as a contributing member of a team. Systems Division at Bell-Northern Research, and the federal Public
Service Commission of Canada. He has published more than 100
References journal articles and book chapters over the past 25 years.
Boyd, E.M.E., & Fayles, A.W. (1983). Reflective learning: Key
to learning from experience. Journal of Humanistic Psychology, 23
(2), 99–117.
Fleming, Q.W., & Koppelman, J.M. (1997). Integrated
project development teams: Another fad ... or a permanent
change. Project Management Journal, 28 (1), 4–11.
Goodge, P. (1998). How do we make management devel-
opment effective? Journal of Management Development, 17
(1), 83–87.
Hutchinson, D.J., & Allen, K.W. (1997). The reflection inte-
gration model: A process for facilitating reflective learning. The
Teacher Educator, 32 (4), 226–234.
Kember, D., Jones, A., Loke, A., McKay, J., Sinclair, K., Tse, H.,
Webb, C., Wong, F., Wong, M., & Yeung, E. (1999). Determining
the level of reflective thinking from students’ written journals
using a coding scheme based on the work of Mezirow.
International Journal of Lifelong Education, 18 (1), 18–30.
McCaugherty, D. (1991). The use of a teaching model to
promote reflection and the experimental integration of theory

This article is copyrighted material and has been reproduced with the permission of PMI. Unauthorized reproduction of this material is strictly prohibited.
Cover to Cover
Book Review Editor, Kenneth H. Rose, PMP

Managing Multiple Projects: Planning, scheduling, resources, and reporting, he provides a clear path
Scheduling, and Allocating Resources for to improved productivity.
Competitive Advantage In Part II, Mike McCauley, Ann Bundy, and William
edited by James S. Pennypacker and Lowell D. Dye Seidman debunk the myths of resource management.
Conventional wisdom has it that resource shortages may be

L ike Shakespeare’s sorrows,


projects nowadays come not
as single spies, but in battalions.
overcome in three ways: Hire more people, use portfolio man-
agement to identify priorities, or level resources against an over-
all profile. The authors explain why none of these really work
More and more organizations are and suggest “resource bottleneck analysis” as a more effective
managing projects not as single alternative. They include a case study that restates the theory in
entities, but as elements of a larger practical terms and ensures understanding by the reader.
whole. Managing Multiple Projects: The theory of constraints applied to multiple project manage-
Planning Scheduling, and Allocating ment is the subject of separate chapters by Francis S. Patrick and
Resources for Competitive Advantage, Tony Rizzo in Part III. Patrick addresses ways to deal with multi-
edited by James S. Pennypacker tasking and utilize shared resources. So does Rizzo, but in a
and Lowell D. Dye, presents con- broader context of a five-step multiproject management model.
temporary views on dealing with In the longest chapter in the book, Robert Cooper, Scott
this emerging challenge. Edgett, and Elko Kleinschmidt discuss new solutions for making
The book comprises 23 chap- portfolio management of new product development projects
ters organized by overview; time, more effective. They identify and discuss four common chal-
cost, and other management issues; tools, techniques, and lenges, then present a series of solutions: Improve information
methods; and best practices and applications. Each chapter is a quality, analyze resource capacity, and develop a product inno-
stand-alone article from a recent technical conference or an vation and technology strategy. They discuss in detail a variety of
adaptation or extract from an author’s previously published portfolio tools to meet management goals and describe two spe-
material. Pennypacker and Dye have woven them together into cific ways to analyze resource capacity vs. demand.
something much like a project portfolio: a strategically linked Authors Martien Hendricks, Bas Voeten, and Leon Kroep
group with differing characteristics and priorities. remind readers in Part IV that there is more to project man-
The editors open with their own introduction to the subject. agement than considerations of cost and schedule. Human
They define the difference between a collection of projects—a resource allocation can be a make-it-or-break-it process. They
group of independent projects consuming time and resources— identify five vital elements: long-term, medium-term, and
and a project portfolio, which consists of projects deliberately short-term allocation, linking, and feedback. Their discussion
selected for their relevance to the organization’s strategy, of the scatter factor and the resource dedication profile pro-
planned with a mid- to long-term view, and managed in a way vides new tools for managing staff allocation.
that recognizes interdependencies and optimizes resources. The chapter by Michael Cusumano and Kentaro Nobeoka
Pennypacker and Dye further define the difference between on Toyota’s multiproject development centers is perhaps the
project category (size, value, duration, and overall contribution) most substantive in the book. Facing competitive and other
and priority (time and criticality of delivery date). They briefly pressures, Toyota introduced a radical change in its product
discuss historical shortcomings in managing multiple projects development organization beginning in 1992. The authors pre-
and offer limited suggestions and models for improvement. sent a background analysis of the situation, a careful description
A chapter by Lewis R. Ireland provides more specifics in of actions taken, and a clear, concise evaluation of outcomes.
managing multiple projects in the 21st century. He discusses In all, Managing Multiple Projects contains much more than
both programs—a family of closely related projects—and mentioned here. Depending on their own technical domain
multiple independent projects managed by a single manager. and project management environment, readers probably will
Ireland gives most attention to the latter, providing extensive find information of value in many other chapters in the text.
guidance for considering and selecting projects for this type That is the book’s great strength: It is a comprehensive
of management. Addressing work breakdown structures, collection of recent theory and practice on a topic that has

December 2002 Project Management Journal 67


recently risen to the list of critical few. Managing multiple pro- Webster continues his practical approach when he says
jects no longer is an option or even a best practice. It is required scheduling ensures the “feasibility of completing the project by
for organization survival and success. the required date.” It is the outcome, not the tool, that is
important. He describes and discusses three basic types of
Marcel Dekker Inc., 2002, ISBN: 0–8247–0680–3, hardcover, scheduling techniques: time-constrained, resource-con-
352 pp., $80.75 member, $85.00 regular. strained, and critical chain. The latter is a newcomer that shows
great promise by recognizing the role of uncertainty and bot-
Reviewed by Ken Rose, PMP, an instructor for ESI tlenecks to a greater degree than traditional techniques have.
International residing in Hampton, VA, USA, and vice Webster offers a compelling summary and points readers to
president for programs, PMI Hampton Roads Chapter. sources of further information.
The extended discussion of time/cost tradeoffs in schedul-
ing is realistic and enlightening. Webster explains that the
PM 102 According to the Olde Curmudgeon: An time/cost relationship is not linear. Costs increase with both
Introduction to the Basic Concepts of Modern reduced and extended time around a notional optimum. He
Project Management also discusses the easily overlooked social aspects of cost/time
by Francis M. Webster Jr. tradeoffs. Savvy project managers will consider the effects of
various options on motivation within the workforce.

T he second shoe has final-


ly dropped. With PM 102
According to the Olde
The author’s holistic view of cost management—something
that begins with the statement of work and extends through
the life of the product of the project—is refreshing. Earned
Curmudgeon, Francis M. value and other project tools are necessary but not sufficient.
Webster Jr. completes the Life-cycle costs are critical to project success. Webster’s com-
odyssey through modern pro- plete coverage addresses key cost drivers of scope, design, pur-
ject management that began chase and subcontract, schedule, materials, labor, methods,
with PM 101 published in equipment, and change. Readers may be a bit overwhelmed,
2000. It is a true continua- but they certainly will be better prepared by the comprehensive
tion, starting right where PM treatment of this area.
101 left off. Readers must be Webster’s view of quality embraces four aspects: customer
familiar with the previous text satisfaction, specifications, quality of the product, and quality
to grasp complete content of the project. The first three are rather traditional and follow
and to obtain full benefit Philip Crosby’s definition of quality as “conformance to
of this highly readable and requirements.” The last is a welcome addition. It addresses
comprehensive pair. how the project team achieves the first three and affects hard
This volume deals with the nitty-gritty, practical side of and soft issues such as cost, schedule, motivation, and morale.
project management. Beginning with estimating, Webster Beyond theory, Webster suggests three specific quality actions
offers his trademark combination of sage advice and useful and explains the benefits to project performance.
tools. He reminds readers that estimates may be calculated by Risk is omnipresent in project management. So is uncer-
several different means, but the critical factor is often the who tainty. Webster differentiates the two and explains their role in
aspect, not the how. He offers a detailed model that may not managing projects. His direct discussion does much to clarify
be completely applied in all cases, but provides a foundation what is often a complex issue. He walks readers through the
for understanding all the elements involved. risk management process of A Guide to the Project Management
Webster runs readers through the steps of manually calcu- Body of Knowledge (PMBOK® Guide) and presents a taxonomy
lating critical paths, then reminds them that computers are of risks that gives readers a firm footing in recognizing possible
more effective, stressing both understanding of concepts and risks. He discusses uncertainty with a view toward Monte Carlo
efficiency of execution. One of the gems in this text is his list of simulation as an effective management tool.
16 ways to reduce project duration that progresses from low to In closing, Webster breaks some of the treasured icons of
high cost and risk. It is interesting to note the 10 ways that pre- project management by comparing traditional measurement
cede “Apply Additional Resources,” a method that is often an methods to driving a car while looking in the rear-view mirror.
early recourse in the project world. He makes a strong case for managing the manageable elements
Resource management involves much more than merely of scope, activity definition and performance, resource appli-
crunching numbers in a financial spreadsheet. Webster cation, and some aspects of the project itself such as visibility,
describes a taxonomy that includes managerial, human, urgency, and systems design. Final comments address manage-
financial, physical, and intangible resources and advises ment style and managing organizational senior management.
readers how to make the most of all. This information is Throughout, Webster offers more than descriptions and
important: Resources—often viewed as constraints—also advice. He links both to the real world by means of continuing
present opportunities. Identifying and exploiting them examples from the Mars Pathfinder Project as well as singular
depends more on good judgment than computer programs. examples form individual relevant projects.

68 Project Management Journal December 2002


PM 102 stands apart from other project management litera- According to Rad and Levin, when marginal project perfor-
ture because of its conversational style and down-to-earth tone. mance is evident, it often is the result of inadequate scope defini-
But make no mistake—this is no lightweight “Aw, shucks” frip- tion and planning. An effective, well-functioning PMO can pre-
pery to be superficially skimmed. It, along with its predecessor vent problems of this kind. Also, once things go bad, the PMO
volume, provides a powerhouse of practices that should be in may provide a project recovery manager to get things back on
every project manager’s performance repertoire. track. Always, the PMO must foster commitment to continuous
improvement that goes beyond repair of the immediate problem.
Project Management Institute, 2002, ISBN: 1–880410–78–8, The authors present a comprehensive discussion of project
paperback, 342 pp., $28.95 member, $34.95 regular. manager competency, pointing out that “getting by”—good
enough in the past—is nowadays a prescription for failure.
Reviewed by Ken Rose, PMP, an instructor for ESI They advise that project managers must be competent in three
International residing in Hampton, VA, USA, and vice areas: technical skills, quantitative skills, and people skills.
president for programs, PMI Hampton Roads Chapter. They further suggest that a PMO is well suited to identifying
the competencies necessary for project managers and team
members and to develop lists of competencies by role and
The Advanced Project Management Office: A position within the organization.
Comprehensive Look at Function and To this end, Rad and Levin present two sample lists: one that
Implementation shows duties performed by seven typical project-related positions
by Parviz F. Rad and Ginger Levin and one that shows the knowledge and competency require-
ments of the positions. These lists may not be the universal norm,

T he project management
office (PMO) is a matter
of more frequent consider-
but they provide a framework and foundation that does much to
remove the mystery associated with project organizations.
The discussion of maturity models shows that PMOs need
ation and cautious application. not leap to life fully formed. They may be tailored to fit the
Different views exist as to just needs and project maturity of the organization. The authors link
what a PMO is and the various maturity to metrics, showing how a PMO can play a lead role in
views have their own propo- organizational performance measurement by identifying key
nents and detractors. Parviz F. project and process issues, selecting and defining corresponding
Rad and Ginger Levin have metrics, and integrating the metrics into existing processes.
made some sense of this situa- Guidance for implementation begins with a summary of
tion with their highly rational PMO functions. An effective PMO performs functions that assist
and readable new book The projects and support organizationwide project management.
Advanced Project Management Rad and Levin describe 17 separate project-focused functions
Office: A Comprehensive Look at and 11 enterprisewide functions and areas of performance.
Function and Implementation. The authors’ approach to implementing a PMO addresses
In the introduction, the authors differentiate between a pro- motivation, cost and benefits, current practices, and organi-
ject office, which is limited in application to a specific project zational structure. They offer a six-step life cycle for imple-
and ceases to exist when the project ends, and a project man- mentation and discuss deployment of the PMO relative to its
agement office, which is enterprisewide in scope and exists sponsorship and intended influence.
independent of individual project duration. The book closes with a brief but contemporaneously rele-
The substance of the book stands in two parts: elements and vant discussion of the PMO and professional responsibility.
implementation. In four brief chapters, Rad and Levin address The PMO can provide mentoring, consulting, and guidelines
project performance facets, marginal project performance, pro- in areas of professionalism, integrity, and diversity.
ject manager competency, and maturity models. This all estab- Project management offices are not likely to replicate in
lishes a foundation. They follow with two chapters that address rapid cookie-cutter fashion. Divergent issues and interests
functions of the PMO and implementing a PMO. affect both startup and operation. The Advanced Project
The authors describe determining project performance as a Management Office does not prescribe a solution. Instead,
critical role of the PMO, but do not prescribe a specific, uni- it offers a solution method that may be applied flexibly accord-
versal set of attributes and ratings. Rather, they offer a method- ing to the need and desires of those who would improve
ology for formalizing and documenting attributes and ratings organization project management performance.
that responds to different needs among different projects.
They explain deliverables-focused client viewpoints and St. Lucie Press, 2002, ISBN: 1–57444–340–2, hardcover, 224
means-focused project team viewpoints in a clear, logical way. pp., $56.95 member, $59.95 regular.
Their summary of project evaluation criteria is clear and com-
plete and supports the implementation of an honest-broker Reviewed by Ken Rose, PMP, an instructor for ESI
element such as a PMO to apply, evaluate, and document the International residing in Hampton, VA, USA, and vice
criteria and results. president for programs, PMI Hampton Roads Chapter.

December 2002 Project Management Journal 69


It’s Your Ship: Management Techniques one example, Abrashoff describes his authorized purchase of a
From the Best Damn Ship in the Navy commercial off-the-shelf item of foul-weather clothing that was
by Captain D. Michael Abrashoff superior to the more expensive Navy supply item. The crew
loved it. When the crew of another ship saw the item, they want-

N ot too long ago, conven-


tional wisdom was that if
you want to make the boat go
ed it, too. The commander of the other ship—an officer senior
to Abrashoff—responded in a predictable way: He ordered
Abrashoff to recall the item from the Benfold crew because it was
faster, whip the oarsmen hard- causing dissatisfaction among his own crew. Abrashoff respond-
er. D. Michael Abrashoff knows a ed predictably: He refused. The senior commander relented, but
better way and explains how in could have handled the matter differently had he viewed the
It’s Your Ship: Management positive effect the items had on the Benfold’s crew as an oppor-
Techniques From the Best Damn tunity to obtain collective achievement from an individual orga-
Ship in the Navy. nization success, or “A rising tide lifts all boats.”
The book is misnamed. Project mangers can gain much from this book. The Navy
Abrashoff may characterize his experiences—even those involving junior enlisted personnel
subject as “management,” but matters—translate readily as concepts and principles to a pro-
it is immediately apparent that ject management environment. Abrashoff’s first-person
he is talking about leadership. account offers wisdom and insight that makes It’s Your Ship
He deals not with disciplined, well worth the read. Project managers—and organization lead-
controlled execution of an exhaustively prescribed plan, but ers in general—will find application of the Benfold experience
rather with innovative, creative solutions to both traditional a short leap. After all, it’s your project.
and novel problems. The tools for those solutions—the
media through which organizations achieve enduring, supe- Warner Books, 2002, ISBN: 0–446–52911–7, hardcover, 256
rior performance—are people. pp., $23.70 member, $24.95 regular.
Abrashoff, former commander of the guided missile
destroyer USS Benfold, provides hard numbers that show Reviewed by Ken Rose, PMP, an instructor for ESI
reduced costs in operations and maintenance, increased reten- International residing in Hampton, VA, USA, and vice
tion rates, and improved tactical performance. He provides president for programs, PMI Hampton Roads Chapter.
anecdotal evidence of improved motivation and morale, those
unquantifiable, almost magical elements that enable people to
move mountains when the need arises.
The key to all this is in the book’s title. Early in command,
Abrashoff was approached by a sailor with a problem. As com-
mander, he could have issued instructions as a solution. Such
a traditional response would have been expected. It also would
have perpetuated a dependent, cautious command environ-
ment that had not served the ship well in the past. Instead,
Abrashoff invited/challenged the sailor to suggest a solution.
After all—and here’s the zinger—It’s your ship.
This simple yet powerful turnaround became the command
philosophy and the motto for the ship. Using it as a founda-
tion, Abrashoff began a leadership journey that he details in a
conversational, engaging way throughout the book.
He documents the journey by way of a series of thematic
chapters that are subdivided into central leadership points,
which are in turn illuminated by examples from experience.
This gives the book a comfortable, practical feel that readers
will find compelling.
For example, Chapter 6 is titled “Look For Results, Not
Salutes.” It includes: Help knock down the barriers, let your crew
feel free to speak up, free your crew from “top-down-itis,” nur-
ture the freedom to fail, innovation knows no rank, and chal-
lenging your crew beyond its reach. Ten other chapters are orga-
nized in a similar manner. In all, they cover the bases of leader-
ship in an environment of importance, opportunity, and risk.
Abrashoff’s anecdotes are informative and say as much about
organizational culture as they do about Benfold leadership. In

70 Project Management Journal December 2002


Calendar of Events
December 16–18 Information Systems Project Management. San Francisco, Calif., USA. Sponsored by the American
Management Association. For more information, visit www.amanet.org.
2003
January 14–16 PMI Arabian Gulf Chapter 9th Conference, Seminars and Exhibitions. Manarna, Bahrain. For more
information, visit www.pmi-agc.org.
March 23–28 3rd World Project Management Week. “Powering Through Adversity.” Surfers Paradise Marriott
Resort, Gold Coast, Australia. Managed by Eventcorp and supported by PMI chapters in Australia,
Singapore, Hong Kong, and the Women in Project Management Specific Interest Group. For more
information, visit www.wpman.com or e-mail wpmweek@eventcorp.com.au.
April 30 PMI GLC Spring Symposium. Michigan State University Management Education Center, Troy,
Mich., USA. For more information, visit www.pmiglc.org/programs/seminars.html.
May 1–2 PMI Southern Alberta Chapter Symposium 2003. Calgary, Alberta, Canada. For more information,
visit www.pmisac.com/symposium/2003.htm.
May 1–2 Professional Development Day. Madison, Wis., USA. Sponsored by the PMI Madison South-Central
Wisconsin Chapter. For more information, visit www.pmi-madison.org. Note: Day 2 of the event is
a repeat of Day 1.
June 3–6 17th IPMA World Congress. Moscow, Russia. For more information, visit www.sovnet.ru or
www.pmcongress.ru.
June 18 PMI Madison South-Central Wisconsin Chapter monthly dinner meeting. Madison, Wis., USA. For
more information, visit www.pmi-madison.org.
June 22–25 47th Annual Meeting of AACE International. Walt Disney World Resort, Orlando, Florida, USA. For
more information, visit www.aacei.org.
October 8–9 IV Argentina Project Management Symposium. Buenos Aires, Argentina. Sponsored by the PMI
Buenos Aires Chapter. For more information, visit www.pmi.org/chap/argentina.

Correspondence
The Current State of Project Management vast array of government and educational institutions in
Research: Trends, Interpretations, and Predictions the United Kingdom, Australia, South Africa, India, etc., all
I have somewhat belatedly finished reading “The Current in English.
State of Project Management Research: Trends, My complaint is not so much that these other resources
Interpretations, and Predictions” [June 2002, Project have not been researched—the cost and workload would be
Management Journal, p. 5] and was amazed to find that the enormous—rather the exaggerated claim of having researched
authors (T.J. Kloppenborg and W.A. Opfer) seem to be all articles published in “English.” The more accurate descrip-
unaware of the fact that English is spoken in places outside tion of the research would be “a limited range of articles pub-
of the North American continent, in particular the United lished in the USA/Canada.”
Kingdom! Their claim to have reviewed all of the research —Patrick Weaver
published in English from 1960 to 1999 is patently false.
The major easily accessed information resource ignored
in the paper is the International Journal of Project Authors’ Response:
Management, published by Pergamon Press (ISSN There are a couple of minor points on which we feel that Mr.
0263–7863). This journal has, since the early 1980s, only Weaver has merit, but we disagree with most of what he asserts.
published refereed project management articles with a high We would first point out that, while the article certainly
proportion referring to research projects. does imply an extensive search of the English language sources,
Kloppenborg and Opfer also have apparently ignored “This research study project covers research published in
the vast amount of published literature available in other English from 1960 through 1999,” it does not make any claim
publications including the Association of Project “to have reviewed all of the research published in English from
Management (United Kingdom) and Australian Institute 1960 to 1999.” This is a somewhat semantic argument, but we
of Project Management, to mention only two, and from a think it is valid.

December 2002 Project Management Journal 71


Weaver’s claim that the paper ignores the International Every country Weaver mentions is represented in
Journal of Project Management is patently false. In the table of the database.
best article candidates at the end of the paper, five of the 56 From the United Kingdom:
“best articles” come from the International Journal of Project ■ British Telecommunications Engineering;
Management. That’s just shy of 10%. What percentage of inclu- ■ British Journal of Administrative Management;
sion no longer qualifies as ignoring? ■ International Journal of Project Management;
However, upon investigation, we did discover that this ■ European Journal of Information Systems;
journal was only “easily accessed” from 1992, when ■ GEC Journal of Research;
ABI/Inform started indexing it. We did do hard copy search- ■ Process Engineering;
es for several key journals that were not indexed online back ■ Proceedings of the Institution of Civil Engineers;
to 1960; they are listed in the article in Table 3. Older issues ■ Ocean and Coastal Management;
of the International Journal of Project Management were not ■ International Journal of Quality and Reliability Management;
reviewed because the oldest issues in OhioLINK are from ■ International Journal of Physical Distribution & Logistics
1992 at OSU’s library in microfilm. So we are missing arti- Management;
cles from 1983 to 1991. We have since done a search on ■ International Journal of Production Research;
INSPEC which indexes the title back to 1985 and found 57 ■ European Management Journal.
articles from the International Journal of Project Management. From Australia:
This only represents a selective indexing of this title for at ■ Road and Transport Research;
least some of these years. ■ Australian Accountant.
Weaver is correct in claiming that the project manage- From South Africa:
ment association publications from the United Kingdom ■ Civil Engineer in South Africa.
and Australia are not included in the database, and he is cor- From India:
rect in pointing out that to have reviewed these publications ■ Chemical Age of India;
would have entailed considerable expense. We did consider ■ ASCI Journal of Management.
the possibility of trying to acquire some additional indexes In addition, several other international journals are rep-
to cover international publications. However, we did have resented, including Bulletin of the Polish Academy of Sciences:
access to ABI/Inform, which is described as, “the most com- Technical Sciences (Poland); Chartered Accountants Journal of
prehensive multidisciplinary index to the scholarly literature New Zealand (New Zealand); Singapore Management Review
of management” (Business Information: How to find it, How to (Singapore); Japanese Railway Engineering and Japan Annual
use it, 2nd ed.) and as “the premier abstracting and indexing Reviews in Electronics, Computers & Telecommunications
database covering leading academic business and manage- (Japan); International Journal of Technology Management
ment journals” (Magazines for Libraries, 10th ed.). (Switzerland and Romania); International Journal of
Weaver’s claim that only North American publications were Production Economics, Engineering Geology, Automation in
reviewed is incorrect. As is listed in the article in Table 2, Construction, and European Journal of Operational Research
ABI/Inform coverage at the time “includes more than 350 (The Netherlands); Doktorsavhandlingar vid Chalmers
English-language titles from non-U.S. sources.” Furthermore, Tekniska Hogskola (Sweden); Dalian Ligong Daxue
in doing the database searches, we did use truncation to maxi- Xuebao/Journal of Dalian University of Technology and Chung-
mize returns for English language variants. For instance “pro- kuo Kung Ch’eng Hsueh K’an/Journal of the Chinese Institute of
gram$” was used to find both “program” and “programme.” In Engineers (China).
addition, just reviewing the journals in the best articles table The authors are happy to discuss any of these points with
undermines this claim. Not only is the International Journal of anyone. Please direct inquiries to assisteditor@pmi.org.
Project Management listed, but so is the ASCI Journal of —T.J. Kloppenborg and W.A. Opfer
Management (India).

Index of Advertisers

Mindjet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C2
PMI Knowledge & Wisdom Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Primavera Systems Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C4

72 Project Management Journal December 2002


Call for Nominations for the PMI Educational Foundation’s

2003 Student Paper Awards


An award recognizing excellence in student Selection: Initial selection from abstracts and final
development of original concepts in project selection of the winning paper(s) will be made by
management. a panel of three experts in project management.
These experts will place emphasis on originality
Purpose: To recognize and honor two students, of presented concept, applicability to the field of
one graduate and one undergraduate, for research project management, practical applications of the
and creative efforts directed toward advancing the concept, and suitability for presentation to PMI
concepts, tools, and techniques of managing pro- Congress participants.
ject-oriented tasks. Selected candidates will be notified of their
selection as a finalist via formal letter from the
Eligibility: Any individual who is or was a student PMI Educational Foundation by 15 March 2003.
in good standing at an institute of higher learning Completed papers must then be submitted
during the period covered by the nomination. before 30 April 2003. The panel of experts will
select the winning paper(s) from among the
Qualifications: Any paper dealing with an original
finalist candidates by 15 June 2003. The Institute
concept and related to any aspect of the manage-
reserves the right to elect not to present an
ment of projects will be considered. Papers must
award in 2003 on the basis of abstracts received.
be written by a single author, completed after
October 2002, and must not have been previously
The Panel: The panel will consist of a practicing
accepted for publication.
project manager, a consultant in project manage-
ment, and a member of the academic community.
Nomination Procedure: Students will submit
abstracts of not more than 1,500 words by 30
January 2003. The abstracts should propose the Frequency and Number: Not more than two
subject and concept to be addressed by the Student Paper Awards may be awarded annually.
paper. Abstracts will contain only the title of the
proposed paper and must be accompanied by a Award: The award recipient(s) and their sponsor-
separate letter containing the author’s name, ing faculty member(s) will receive travel and hotel
address, institution, major course of study, and expenses to a PMI Congress and a cash award of
expected degree. If the paper has been complet- $500. The winning paper will be presented at a
ed, the date of completion must be included in session of a PMI.
the letter.
A candidate must be nominated/sponsored by Presentation and Recognition: Student Paper
an educator at the institute of higher learning at Awards will be formally presented at a PMI
which the nominee is or was a student in good Congress. Photographs and biographical informa-
standing. A letter of recommendation from the tion of the Student Paper Award recipients will
student’s sponsoring faculty member must be published in PMI Today, and the paper will be
accompany the abstract. published in the Project Management Journal.

Abstracts must be received by 30 January 2003 and should be addressed to:

Chair, Student Paper Award Committee


PMI Educational Foundation
Four Campus Boulevard
Newtown Square, PA 19073–3299 USA
Voice: +610–356–4600, ext. 1059 / Fax: +610–356–4647

You might also like