SWOT Analysis and Theory of Constraint in Information Technology Projects
SWOT Analysis and Theory of Constraint in Information Technology Projects
net/publication/228795629
CITATIONS READS
19 2,489
2 authors, including:
Ganesh Vaidyanathan
Roosevelt University
40 PUBLICATIONS 509 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ganesh Vaidyanathan on 03 October 2017.
In this issue:
Abstract: This study focuses on the potential cost and benefit analysis of Information Technology
projects. The purpose of this study is to synergize the role of Strengths, Weakness, Opportunities
and Threats (SWOT) analysis and the Theory of Constraint (TOC) approach in the planning and
execution of Information Technology (IT) projects. Due to limited resource availability and much
needed timely delivery of projects, organizations consider a number of trade-offs during the entire
lifecycle of an IT project. The selection of projects using evaluation and selection tools from the
myriad of proposed projects, particularly when all of them promise value to the organization remain
highly challenging. By minimizing trade-offs, proper selection of projects may be achieved. This
study will use the combined effects of SWOT analysis and TOC to measure the potential benefit and
cost tradeoffs. Such measures can be used to examine the effectiveness and efficiency of IT project
management. A Five-step TOC thinking process framework that will enable project management
teams to develop an integrated strategy is also discussed in this study.
Recommended Citation: Sabbaghi and Vaidyanathan (2004). SWOT Analysis and Theory of
Constraint in Information Technology Projects. Information Systems Education Journal, 2 (23).
http://isedj.org/2/23/. ISSN: 1545-679X. (Preliminary version appears in The Proceedings of
ISECON 2003: §2414. ISSN: 1542-7382.)
Editor
Don Colton
Brigham Young Univ Hawaii
Laie, Hawaii
The Information Systems Education Conference (ISECON) solicits and presents each year papers
on topics of interest to IS Educators. Peer-reviewed papers are submitted to this journal.
2003 ISECON Papers Chair Associate Papers Chair Associate Papers Chair
William J. Tastle Mark (Buzz) Hensel Amjad A. Abdullat
Ithaca College Univ of Texas at Arlington West Texas A&M Univ
Ithaca, New York Arlington, Texas Canyon, Texas
EDSIG activities include the publication of ISEDJ, the organization and execution of the annual
ISECON conference held each fall, the publication of the Journal of Information Systems Education
(JISE), and the designation and honoring of an IS Educator of the Year. • The Foundation for
Information Technology Education has been the key sponsor of ISECON over the years. • The
Association for Information Technology Professionals (AITP) provides the corporate umbrella under
which EDSIG operates.
c Copyright 2004 EDSIG. In the spirit of academic freedom, permission is granted to make and
distribute unlimited copies of this issue in its PDF or printed form, so long as the entire document
is presented, and it is not modified in any substantial way.
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 3
and
Ganesh Vaidyanathan2
Indiana University South Bend
South Bend, Indiana 46634, USA
Abstract
This study focuses on the potential cost and benefit analysis of Information Technol-
ogy projects. The purpose of this study is to synergize the role of Strengths, Weak-
ness, Opportunities and Threats (SWOT) analysis and the Theory of Constraint (TOC)
approach in the planning and execution of Information Technology (IT) projects. Due
to limited resource availability and much needed timely delivery of projects, organi-
zations consider a number of trade-offs during the entire lifecycle of an IT project.
The selection of projects using evaluation and selection tools from the myriad of pro-
posed projects, particularly when all of them promise value to the organization re-
main highly challenging. By minimizing trade-offs, proper selection of projects may
be achieved. This study will use the combined effects of SWOT analysis and TOC to
measure the potential benefit and cost tradeoffs. Such measures can be used to ex-
amine the effectiveness and efficiency of IT project management. A Five-step TOC
thinking process framework that will enable project management teams to develop
an integrated strategy is also discussed in this study.
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 4
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 5
lection. Researcher allocation and pro- as the extent to which the output of a
ject selection are subject to several lin- project meets the objectives of the pro-
ear and nonlinear goal constraints (Tay- ject. We can define efficiency as the
lor, et al., 1982). In this study, we ratio between the outputs achieved, i.e.,
have provided a framework for effec- the success of the project in achieving
tiveness and efficiency of IT project its objectives with the input of the pro-
planning using SWOT analysis and The- ject, i.e., the utilization of resources.
ory of Constraints. There is a potential The term “objectives” deal with whether
for further research using both these or not the organization will benefit from
tools to address the selection of projects the project.
in a more efficient and effective man-
ner. The key element to remember about
project management is that a develop-
2. SWOT Analysis ment project that fails to address the
right objectives cannot succeed, even if
Over the years, there has been much those objectives were realized very effi-
emphasis on gaining efficiency in pro- ciently.
ject management. Existing tools such
as CPM and PERT reduce both project SWOT analysis is an effective frame-
lead-time and the required resources to work for analyzing the Strengths,
complete a project. However, the objec- Weaknesses, Opportunities, and Threats
tives of the project, plans, and required of an organization (or a project) that
resources assigned have been taken for helps to address the effectiveness of a
granted. Therefore, insufficient atten- project planning and implementation.
tion has been paid to analyzing the The acronym comes from an old term
relevance of the project objectives from the strategic planning field that is
within the context of broader, company- concerned with the content and the ob-
wide goals, and to the effectiveness in jectives of the project, and with identi-
project planning and implementation. fying the right things to do. What is
How can one distinguish effectiveness right depends on the specific interface
from efficiency in project management? between the project, the objectives it
Table 1 displays a brief distinction of serves, and its environment (target
effectiveness versus efficiency and the groups, market, law and regulations,
possible outcome under various scenar- etc.). Strengths would define any inter-
ios. nal asset (expertise, motivation, tech-
nology, finance, business model, etc.)
In Table 1, we can define effectiveness that will help to meet demands and to
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 6
Weaknesses What could be improved? What is done badly? What Lack of motivation, lack of transport
should be avoided? Are there any Internal deficits facilities, problems in distribution of
hindering the organization in meeting demands? services or products, low reputation (the
lack of a particular strength)
External
Opportunities What are the good tasks? What are the interesting trends? Changes in technology and market that
What changes do we expect to see in the market over the favor your products or services, changes in
next few years? Are are any external circumstances or government policy related to your industry,
trends that favors the demand for an organization’s changes in social patterns, population
specific competence? profiles, lifestyle, etc., local, national, &
international events increasing purchasing
power.
Threats What is our competition doing? What are the obstacles? Establishment of strong competitors, lack of
What future changes will affect our organization? Is cash at household level, governmental
changing technology threatening our position? Do we regulations that limit free distribution of our
have management support? Sufficient resources? Are we product.
using the right tools, software, and platform? Are there
any external circumstances or trends which will
unfavorably influence demand for an organization's
competence?
fight of threats. What are we good at in cess probability depends on whether its
project management? How are we doing strengths not only match the key suc-
competitively? Moreover, what are our cess requirements for operating in the
resources? Weaknesses describe inter- target environment but also exceed of
nal deficits (lack of motivation, lack of those of project threats. Threats define
transport facilities, problems in distribu- any external circumstance or trend (es-
tion of services or products, low reputa- tablishment of strong competitors, gov-
tion, etc.) that hinder the organization ernment deficit, or regulations that limit
in meeting its demands. In this con- free distribution of our products or buy-
text, one may consider the following ing our services, etc.) that will unfa-
questions: what are we doing badly? vorably influence demand for an organi-
What annoys our clients most? zation’s competence. Table 2 summa-
rizes some of the key questions and
Opportunities describe any external cir- typical answers in each area. Dell Com-
cumstances or trends that favor the puter Corp. can be viewed as an exam-
demand for an organization’s specific ple of how an IT company can use a
competence. For example, what SWOT analysis to carve out a strong
changes in economic, political, or tech- business strategy. Dell recognized that
nological factors (development of new its strength was selling directly to con-
markets for high quality products, new sumers and keeping its costs lower than
technologies that favor our product, those of other hardware vendors. As for
etc.)? Do we expect to see in demand weaknesses, the company acknowl-
in the near future? The project’s suc- edged that it lacked solid dealer rela-
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 7
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 8
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 9
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 10
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 11
step-by step implementation of the so- done. In this traditional approach, the
lution. This is used to cause the change. Critical Path Method (CPM) of scheduling
It would help management to see the is defined as a project management
plan of action for overcoming obstacles method of calculating the total duration
and implementing the change. of a project based on individual task du-
ration and their interdependencies. In
5. TOC Solution in Project Man- other words, we determine which path
agement: A System Approach of work will take the longest, and thus
manage all others to fit within this long-
Applying TOC to the areas of project est path. However, the common project
management provides a whole system focus is on each individual task’s dura-
view of the challenge. In the TOC ap- tion and resource requirement. Thus,
proach, the set of tasks that determine the variation in an individual task’s de-
when a project can be completed is the mand for resources would cause varia-
Critical Chain. They are called a chain, tion in resource demand during the pro-
rather than a path, since they take into ject’s execution.
account resource dependencies. Thus,
the faster the critical chain tasks are
completed the sooner one can finish the
project. Therefore, the TOC-based solu-
tion for managing a single project,
whether stand alone or as part of a
portfolio of projects, is known as critical
chain scheduling and buffer manage-
ment. It provides part of the answer for Figure 4. Critical Chain
the priority aspect of the question Project Network
"What should I work on?" which, if not
addressed appropriately, drives multi- TOC considers a project as a network of
tasking behaviors in multi-project envi- required tasks that move toward a set
ronments (Goldratt, 1997; Newbold of clear objectives intended to be com-
1998; Patrick 1999). pleted under budget and on schedule.
As shown in Figure 4, for a project with
In managing a project, the emphasis is goals such as developing a new IT ser-
on the delivery of tasks that make up vice for sales management, certain pre-
the project. A task is defined as a set of requisites are needed. These prerequi-
activities performed by one or more re- sites are the precedents for the goal,
sources on a project. For each task, the i.e., what is needed to achieve the goal.
inputs are from one or more resources These precedents become the succes-
outside of the task, and its output is re- sors for their prerequisites. In order to
quired for one or more resources out- achieve the goal from the prerequisites,
side of itself. A task cannot begin work there may be some underlying assump-
until all required preceding inputs are tions to clarify all needed dependencies
received. A task is not complete until between the predecessor and the suc-
all required outputs are not only fin- cessor. This process is repeated a
ished (according to the task completion number of times until the start task is
criteria) but also passed on to all subse- reached. The result is a network that
quent resources requiring the output of describes what must be in place in what
task. It is assumed that if these tasks order and what is the logic behind these
are done on time, the project will be successive tasks.
completed on time as well, and thus
there is more focus on getting the task Austin and Peschke (1999) have sug-
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 12
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 13
many of the resources required for indi- parts, is known as the “project buffer.”
vidual project tasks are often sub- The project team members who work on
contracted, where these resources may the project are expected to make realis-
be committed to other tasks or projects tic estimates of time and resources
at any time. Thus, the nature of distur- communicate their expectations on ac-
bances associated with most project tivity duration and attempt to meet
specific tasks may further complicate those estimates. To prevent non-critical
the availability of resources. In par- activities from delaying critical ones,
ticular, in PERT, all activities, whether or “feeding buffers” are placed where non-
not they are on the critical path, will re- critical paths feed into the critical chain
ceive similar treatment with regard to to protect the start of the critical chain
uncertainty, and thus they will have tasks.
similar safety time and resources.
However, TOC removes all these contin- The feeding buffers, which again can be
gencies from individual activities and smaller than the sum of the parts due to
aggregates them into a buffer for the aggregation, contain most or all of the
entire project, as the commitments re- contingency reserves, relating the rele-
garding the completion date are only vant non-critical path. Proper man-
made at the project level (Figure 6B). In agement of the feeding buffers prevents
other words, the safety associated with the critical chain from changing during
the critical tasks can be shifted to the the project execution and leads to a rig-
end of the chain, protecting the project orous project plan. As a result, the pro-
premise (the real due date) from varia- ject promise will be protected from
tion in the critical chain tasks. This con- variations in the critical chain by the
centrated aggregation of safety, which project buffer, the critical chain is pro-
can be smaller than the sum of the tected from variation in non-critical
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 14
work by feeding buffers, and conse- project buffer were sufficiently used,
quently the project is protected against this would indicate a heightened risk of
Murphy’s Law. In short, TOC would relo- the project promise and the priority for
cate the safety time and resources in attention in adjusting the allocation of
strategic positions such as project buffer resources to address the critical tasks
or feeding buffer. This will have the ef- associated with that project. Buffer
fect of reducing the length of the critical management thus would help project
path as shown in figure 6A and 6B. The managers focus on maintaining the
decision to cut the overall safety time premise of the project (effectiveness)
and resources is subject to the level of during its execution, keep it on schedule
confidence that appropriate team mem- and under budget (efficiency), know the
bers of the project have in this process. important priorities, and make the nec-
However, it is recommended that the essary adjustments.
first emphasis should be placed on fin-
ishing on time before looking for a re- Therefore, the critical chain approach of
duction in overall time: in TOC lan- concentrated protection would bring
guage, they go for “exploit” before “ele- about a dual benefit. First, it helps to
vate.” protect the project appropriately with
minimum impact on the estimate of
This TOC approach, by allowing a overall project duration. Second, it
“whole system” view of the project, would help us to monitor risk effectively
identifies the critical chain and the pro- throughout the course of the project.
ject buffer that protects it from inevita- The following section will discuss the
ble uncertainty. Task’s duration esti- system of buffer management as an im-
mates no longer have to be long enough portant ingredient of TOC and as an ef-
to have a high probability of completion. fective method for multi-project man-
Shortening the task duration estimate, agement.
therefore, avoids major impact of Park-
inson’s Law (work expands to fill the 6. The TOC Multi-Project Method
time allowed) and Student’s Syndrome
(delaying the start of a task due to hav- Organizations often tend to launch mul-
ing more than enough time to accom- tiple projects concurrently in order to
plish it) at the task level. It also re- take advantage of valuable new oppor-
moves detrimental pressures and asso- tunities. However, the demand of these
ciated behavior of artificial task dead- multiple projects would impose conflict-
lines from the concerns of project re- ing priorities on the constraint capaci-
sources. The buffers, and their con- ties, resources, and policies of the or-
sumption and replenishment during the ganization. This, in turn, decreases the
actual project execution, can provide chance of success of these projects. In
guidance in assessing the chain of ac- particular, project managers from vari-
tivities that is in the greatest jeopardy ous functional areas within an organiza-
of delaying the promise of the project. tion may argue for the functional impor-
This can provide a clear direction for the tance of their own projects and for
attention to be paid to the most critical higher priority. On the other hand, as
constraint of the project and the most Patrick (1999) notes, if a resource di-
beneficial use of a resource. For exam- vides its attention between different
ple, if a project buffer is sufficiently un- tasks before handing off task deliver-
used, the project premise can still be ables, this would prolong all the projects
protected from distractions and disrup- involved, since all of that resource's
tions on critical tasks that may jeopard- successors on each project will have to
ize the project. On the other hand, if a wait longer than necessary due to time
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 15
spent on other projects' work. The pro- estimates of task duration is that the
jects will also be impacted by the vari- estimate of the overall duration of a
ability of not only their own tasks, but project grows beyond the limits accept-
also of those associated with the other able to management, customers, and
projects that are interleaved within the bottom line. Therefore, manage-
them. Therefore, most projects will ment usually responds with what we
take significantly longer than necessary, might call backpressure. Typically, this
in both their premise and their execu- means that management mandates cuts
tion. TOC and its principles, when ap- in all estimates of task duration, usually
plied to multi project systems, provides in a rather arbitrary manner. The battle
guidance on assessing the capacity of that results between management and
such systems and related mechanisms staff, of course, rages on. However, the
for the synchronized launch of projects system approach in TOC would concen-
and improves the effectiveness of their trate on the areas of the project’s net-
execution. The TOC method consists of work where the protection is the most
five steps: (1) Prioritize the organiza- effective. There are two such areas:
tion's projects, (2) Plan individual pro- first, and perhaps the most important,
jects via critical chain, (3) Stagger the is at the end of a project's Critical
projects, (4) Measure and report the Chain, known as the Project Buffer, and
buffers, and (5) Manage the buffers, the second, called the Feeding Buffer, is
These steps together overcome the placed between every Critical Chain task
challenges of physical and policy con- and any non Critical Chain task that
straints, and help to address the priori- feeds the Critical Chain task. The pur-
ties among the projects and the activi- pose of the Feeding Buffers is to protect
ties within each project. the starts of those Critical Chain tasks
that require inputs from non Critical
1. Prioritize the organization's projects: Chain tasks, so that by protecting the
During the first step, the projects must starts of the Critical Chain tasks from
be prioritized at the organizational lead- the untimely availability of the required
ership level. Only at that level would inputs, with the Feeding Buffers, we
one be able to properly evaluate the po- prevent the project's longest chain of
tential contribution of each project to tasks from becoming longer unneces-
the organizational goals and objectives sarily. The TOC approach would help to
and determine the optimum order of effectively protect each project execu-
priority among the projects. However, if tion, as well as to efficiently manage the
the value of this step is left to middle buffers in a Multi-Project environment.
managers or, worse, to individual pro-
ject managers, this would increase the 3. Stagger the Projects: The TOC ap-
chance of sub-optimization, and conse- proach staggers the projects based on
quently failure of effectiveness. the availability of one resource that is
commonly required by most of the pro-
2. Plan Individual Projects via Critical jects within an organization and more
Chain: As was discussed earlier, there is heavily used relative to other resources
a strong tendency in any functional area (Newbold 1998). This is called the
to overestimate the contingency time drum resource or synchronizer. The role
and resources for each task within a of the drum resource is to set the pace
project partly to protect against Mur- at which projects are launched into the
phy’s Law, and partly to avoid negative system, and to regulate the flow of
consequences for themselves. Unfortu- work-in-process around the full capacity
nately, a direct outcome of embedding of the most restricted resource. The
such “contingencies “ within individual production rate of this drum resource
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 16
typically provides the pace for the rest formance, and thus there may be a ten-
of the system, and thus the work- dency to a biased report of the safe-
schedule for this drum resource is used guarding buffers. Therefore, a timely,
to determine the rate at which projects unbiased buffer report will be an impor-
are allowed to enter the system. There- tant tool for maintaining focus through-
fore, the drum resource is never over- out the organization.
loaded. Given the relatively heavy load
of the drum resource, other resources, 5. Manage the buffers: While a timely,
while they are part of the solution, will unbiased buffer report plays an impor-
not be overloaded. Furthermore, not all tant role in maintaining proper focus
the projects are consistently in use of throughout the organization, it plays an
the drum resource. Therefore, there even more significant role in setting pri-
are times when the stagger is insuffi- orities correctly. Project managers
cient to protect other resources from must constantly report the status of the
peak loading and pressures to multi- projects and the status of various buff-
tasking. In order to address this prob- ers, interpret them properly, and com-
lem, additional stagger is added be- municate them to the appropriate man-
tween the projects, known as the Ca- agers in the organization so that they
pacity Buffer. This would serve to pro- can identify the problems and the need
tect the level of a cross-project, to in- for possible reprioritization. For exam-
sure that on average there are enough ple, suppose a resource is in critical
resources to schedule for all the pro- need of multiple tasks and one needs to
jects, and to efficiently protect them determine which one of these tasks is
from any disruptions and delay. Obvi- the most urgent. All is needed is to
ously, by properly identifying the drum look at the buffers associated with the
resource and effectively using capacity various tasks, and examine which task
buffers, staggering the projects of the is associated with a project buffer since
organization can be an important step in it always has priority over tasks that are
multi-project management. TOC, in associated with feeding buffers. Simi-
particular, tends to focus on maximizing larly, when two or more tasks are all
the flow of work through a system associated with similar buffers, then the
rather than balancing capacity. This task whose buffer is in greater jeopardy
higher-level view of system capacity is clearly given the highest priority.
rather than resource capacity leads to Management of the organization's global
the conclusion that it is enough to keep buffers and their timely and compre-
as little as one resource effectively util- hensive reports would help the man-
ized to manage and maximize the agement team to identify the flexibility
throughput of the system. in the assignment of resources, and to
set the priorities that protect all the pro-
4. Measure the Buffers: As we discussed jects of the organization from undesir-
earlier, proper attention on buffer meas- able disruptions and delay. More spe-
urement and reporting throughout the cifically, if such a report indicates that
execution of each project is vital to the one project is in serious trouble, the
success of completing the project. This same report also shows where the right
task will become even more critical in resources can be borrowed without
multi-project environments as it affects jeopardizing the premises set for the
the reality check of the overall schedule projects.
for the organization. In particular, the
size of the buffers is often viewed by
those who report as an implicit
measurement of their own performance,
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 17
Traditionally there has been much em- Austin, K. M., and Peschke, R. E.
phasis placed on gaining efficiency in (1999). How to Build a TOC/Critical
project management. CPM, PERT, and Chain Project Network, APICS CM-
Gant charts have been developed to fa- SIG Symposium Proceedings, March
cilitate the planning and execution of 22-23, 1999, Phoenix, Arizona.
projects on time and within the budget.
On the other hand, project managers Bounds, G. (1998), “The Last Word on
have taken the effectiveness of project Project management, “ IIE Solu-
planning and execution for granted. In tions.
other words, there has not been suffi-
cient emphasis placed on how to Deming, W. E. (1993). The New Eco-
achieve effectiveness in project man- nomics for Industry, Government,
agement. In particular, a project man- Education, Cambridge, MA: MIT,
ager needs to clearly identify the pro- Center for Advanced Engineering
ject’s goals and objectives in support of Study.
the organizational mission and vision
statements so that the project team Dettmer, H. W. (1998). Breaking the
could focus on the effectiveness of pro- Constraints to World-Class Perform-
ject planning and execution before look- ance, Milwaukee, Wisconsin: ASQ
ing for efficiency measures. SWOT Quality Press.
analysis is an effective method for iden-
tifying the strengths and weaknesses Goldratt, E. M. (1992). The Goal, 2nd
and examining the opportunities and Revised Edition, Great Barrington,
threats in project management. TOC MA: North River Press.
takes a system approach in managing a
project, using throughput as an effec- Goldratt, E. M. (1997). Critical Chain,
tive measure of performance evaluation. Great Barrington, MA: North River
It identifies the constraint that domi- Press.
nates the entire project at any given
time and allocates resources to break Horn, L., et al. (1994). SWOT analysis
the constraint and to achieve the pro- and strategic Planning-A Manual,
ject’s objectives. Thus, TOC Time Man- (GFA, Eulenkrugstr, 82, D22345
agement technique (Critical chain Hamburg, Germany).
scheduling) contributes significantly to
the effectiveness as well as to the effi- Newbold, R. (1998). Project Manage-
ciency of project management. Fur- ment in the Fast Lane, Boca Raton,
thermore, TOC has been extended to FL: St. Lucie Press.
allocate resources to multiple projects
that share common resources. This ap- Patrick, F. S. (1999). Getting Out From
plication maximizes the number of pro- Between Parkinson's Rock and Mur-
jects that an organization can handle phy's Hard Place. PM Network 13
while maintaining the principles for re- (April): 57-62.
ducing project duration on each individ-
ual project. TOC can also be effectively Standish Group Internation (1999),
applied to other areas such as project “Chaos: A Recipe for Success”, The
risk management and project cost man- Standish Group International.
agement.
Taylor, B. W., et al. (1982). R&D Project
selection and manpower allocation
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 18
1
[email protected]
2
[email protected]
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004
ISEDJ 2 (23) Sabbaghi and Vaidyanathan 19
c 2004 EDSIG http://isedj.org/2/23/ April 13, 2004