The Engineering Management Handbook 2nd Edition 0997519509 9780997519501
The Engineering Management Handbook 2nd Edition 0997519509 9780997519501
The Engineering Management Handbook 2nd Edition 0997519509 9780997519501
ISBN: 978-0-9975195-0-1
Published by:
The American Society of Engineering Management
P.O. Box 820
614 Pine Street, Ste. 206B
Rolla, MO 65401
Printed in the United States of America. No part of this work may be reproduced or transmitted in any form or by any
means, electronic, manual, photocopying, recording, or by any information storage and retrieval system, without prior
written permission of the publisher.
ACKNOWLEDGMENTS
The American Society of Engineering Management (ASEM) and the authors and editors of this handbook
would specifically like to thank Dr. Donald N. Merino, Alexander Crombie Humphreys Chaired Professor of
Economics of Engineering Emeritus at Stevens Institute of Technology for his financial contribution that made
the writing of the 2nd edition of the Engineering Management Handbook possible. We would also like to thank
the editors Dr. John V. Farr and Dr. S. Jimmy Gandhi for their time dedicated to the handbook.
The following organization through their generosity supported the final editing and publishing:
Dr. He Jishan
Honorary Member of ASEM, Member of the Chinese Academy of
Engineering, Honorary President for Life of Junefield College of CSU
TchI Innovation
Change & Innovation in Technical Environments
Training & Consultancy, Tremelo, Belgium
University of Arkansas
Department of Industrial Engineering
Fayetteville, Arkansas
We would like to also acknowledge Mr. Nakul Sharma, Graduate Student at California State University,
Northridge for helping organize and supporting the updating of the handbook. He did an outstanding job of
managing the development of this handbook. Ms. Lisa Fisher and Kristine Gallo served as the editor and lay-
out, and designed the covers, respectively. Most importantly the editors would like to thank every author who
gave of their time to support ASEM through this handbook.
Lastly, we would like to thank ASEM leadership for continuing to recognize the value of this handbook.
iii
PREFACE
Welcome to the 2nd edition of the Engineering Management Handbook. The first edition was published in
2010. Six years later we have updated much of the original material and added seven new chapters. We hope
to continue to update this handbook with plans to produce case studies as supplemental materials, include new
material, update and expand the existing material, etc.
Engineering managers have traditional been educated to work in the manufacturing sectors but now
must succeed in a world where services based industries account for most economic activity. In today’s global
business environment, engineer managers must use a wide variety of traditional engineering and leadership
skills from the fields of operations research, statistics, management, systems engineering, business, traditional
engineering, etc. There is value to having one source that can summarize many of the methods, processes, and
tools (MPTs) for mainly the practicing engineering manager.
Given this backdrop, we chose to organize this handbook into six sections:
• Historical, Professional, and Academic Perspective,
• Governance and Management of Engineering Core Competencies,
• Quantitative Methods and Modeling,
• Accounting, Financial and Economic Basis,
• Project Management and Systems Engineering, and
• Business Acumen.
There are 23 chapters that have been divided into these areas. Most of the 16 chapters in the first edition
were updated and in some cases totally rewritten. Seven new chapters were added to this edition to include
material addressing patents, intellectual property, multi-generational workers, informatics, quality, innovation,
entrepreneurship, and supply chain. The MPTs presented must be viewed as enablers of solutions and not
just a collection of traditional academic stovepipes. Like this handbook, engineering management (EM) must
evolve to remain relevant in our globally society.
This handbook is intended to serve engineering managers and a wide range of professionals in related disci-
plines to include systems engineers, software engineers, technology management, traditional engineers, etc. In
particular, this handbook should serve engineers at all levels in industry, government, and academia involved in
the management of professionals and technology. Our goals in writing in this handbook include:
• Defining the different MPTs needed by the 21st century engineering manager in support of lifelong
learning,
• Handbook for academics,
• General reference into what is EM,
• Reference for the practicing engineering manager, and
• Advance the understanding of the complexity of method, processes, and tools needed by all engineers and
technologists for our technology centric society.
Hopefully, this 2nd edition will continue to serve as a catalyst for follow-on editions. No one source can
in depth capture all of the MPTs to be a successful engineering manager. However, our goal was simply to
provide one reference that can introduce the readers to certain MPTs. Lifelong learning is the key remaining
relevant into today’s technology driven workforce.
v
Unfortunately, like many books we had to “freeze” this edition to produce a product with many topics
still not addressed. As we were developing the handbook we realized that there are still many MPT gaps in the
handbook. For example, chapters on the following topics would greatly improve the handbook:
• Performance Appraisals and Metrics,
• Mentoring and Coaching,
• Statistical Quality Control,
• Business Operations of Technical Organization,
• Team Dynamics and Management, and
• Multinational and Multicultural Issues.
vi
TABLE OF CONTENTS
ACKNOWLEDGMENTS................................................................................................................................................................ iii
PREFACE...................................................................................................................................................................................... v
ix
Chapter 8: Managing the Multi-Generational Knowledge Based Workforce..................................................................................... 93
8.1 Introduction ................................................................................................................................................................. 94
8.1.1 Overview................................................................................................................................................................... 94
8.2 Generations.................................................................................................................................................................. 94
8.2.1 Baby Boomers............................................................................................................................................................ 95
8.2.2 Generation X (Gen X’ers)........................................................................................................................................... 95
8.2.3 Generation Y (Gen Y)................................................................................................................................................. 96
8.3 Management Impacts................................................................................................................................................... 96
8.3.1 Baby Boomers............................................................................................................................................................ 96
8.3.2 Generation X.............................................................................................................................................................. 96
8.3.3 Generation Y.............................................................................................................................................................. 97
8.4 Management Strategies for Leaders and Followers..................................................................................................... 97
8.5 Optional Content Commitment ................................................................................................................................... 97
8.5.1 Commitment and the Generations............................................................................................................................ 98
8.6 Recommendations for the Management Discipline..................................................................................................... 99
8.6.1 Understanding........................................................................................................................................................... 99
8.6.2 Bias............................................................................................................................................................................ 99
8.7 References.................................................................................................................................................................. 100
Chapter 13: Engineering Informatics – State of the Art and Future Trends............................................................................183
13.1 Introduction ............................................................................................................................................................. 184
13.2 Overview of Engineering Information Integration.................................................................................................... 187
13.2.1 IIIE-A New Discipline of Industrial Information Integration.................................................................................... 187
13.2.2 Engineering Integration......................................................................................................................................... 188
13.3 Enabling Technologies.............................................................................................................................................. 191
13.3.1 Business Process Management............................................................................................................................. 191
13.3.2 Information Integration and Interoperability........................................................................................................ 194
13.3.3 Enterprise Architecture and Enterprise Application Integration........................................................................... 195
13.3.4 Service-oriented Architecture (SOA)..................................................................................................................... 196
13.4 Summary and Challenges......................................................................................................................................... 196
xii 13.5 References................................................................................................................................................................ 197
Chapter 14: Basic Accounting and Finance.............................................................................................................................199
14.1 Introduction ............................................................................................................................................................. 200
14.1.1 Importance of Accounting to Engineers................................................................................................................ 200
14.1.2 Accounting and Engineering Economics................................................................................................................ 200
14.1.3 What is Accounting? ............................................................................................................................................. 200
14.1.4 Users of Accounting Information .......................................................................................................................... 200
14.2 Basic Accounting....................................................................................................................................................... 200
14.2.1 Introduction........................................................................................................................................................... 200
14.2.2 Financial Accounting.............................................................................................................................................. 201
14.2.3 Transactions........................................................................................................................................................... 202
14.2.4 Financial Condition................................................................................................................................................ 202
14.2.5 Financial Statement Terminology.......................................................................................................................... 202
14.2.6 Financial Performance........................................................................................................................................... 204
14.2.7 Accounting Equation.............................................................................................................................................. 204
14.3 Income Statement.................................................................................................................................................... 204
14.3.1 Introduction........................................................................................................................................................... 204
14.3.2 The Income Statement......................................................................................................................................... 205
14.4 Balance Sheet........................................................................................................................................................... 206
14.4.1 Introduction............................................................................................................................................................ 206
14.4.2 The Balance Sheet................................................................................................................................................. 206
14.5 Stockholder’s (Owner’s) Equity................................................................................................................................ 209
14.5.1 Introduction........................................................................................................................................................... 209
14.5.2 Stockholder’s Equity.............................................................................................................................................. 210
14.5.3 Paid-In Capital ....................................................................................................................................................... 210
14.5.4 Retained Earnings.................................................................................................................................................. 211
14.5.5 Example of Retained Earnings .............................................................................................................................. 211
14.6 Cash Flow Statement................................................................................................................................................ 211
14.6.1 Introduction........................................................................................................................................................... 211
14.6.2 The Cash Flow Statement...................................................................................................................................... 212
14.6.3 Example of Cash Flow Statement.......................................................................................................................... 213
14.7 Depreciation............................................................................................................................................................. 214
14.7.1 Introduction........................................................................................................................................................... 214
14.7.2 Depreciation Terminology..................................................................................................................................... 214
14.7.3 Depreciation Methods........................................................................................................................................... 215
14.7.4 Gains and Losses from the Disposal of Assets....................................................................................................... 217
14.8 After Tax Analysis...................................................................................................................................................... 217
14.8.1 Introduction .......................................................................................................................................................... 217
14.8.2 After Tax Analysis and Cash Flow.......................................................................................................................... 218
14.8.3 After Tax Cash Flow from Depreciation Charges.................................................................................................... 218
14.8.4 After Tax Cash Flow from Investment Tax Credit .................................................................................................. 218
14.8.5 After Tax Cash Flows from Loans........................................................................................................................... 219
14.9 Accounting Process................................................................................................................................................... 219
14.9.1 Introduction........................................................................................................................................................... 219
14.9.2 The Accounting Process......................................................................................................................................... 219
14.9.3 Double Entry Accounting....................................................................................................................................... 219
14.10 Financial and Managerial Accounting..................................................................................................................... 220
14.10.1 Introduction......................................................................................................................................................... 220
14.10.2 Breakeven Analysis.............................................................................................................................................. 220
14.10.3 Contribution Margin............................................................................................................................................ 221
14.10.4 Contribution Margin Ratio................................................................................................................................... 221
14.10.5 Breakeven Sales in Dollars................................................................................................................................... 221
14.10.6 Target Net Profit.................................................................................................................................................. 222
xiii
14.10.7 Sales to Achieve Target Return on Sales.............................................................................................................. 222
14.10.8 Degree of Operating Leverage............................................................................................................................. 222
14.11 Advanced and Other Topics.................................................................................................................................... 222
14.12 Summary................................................................................................................................................................ 223
14.13 References.............................................................................................................................................................. 223
xviii
LIST OF FIGURES
Chapter 1
Figure 1.1. Management and Educational Trends That Have Affected the EM Field..........................................................4
Figure 1.2. Engineering Management as the Bridge Between Engineering and Management..........................................6
Figure 1.3. Challenges for the Technical Organization and Engineering Manager............................................................11
Figure 1.4. Five Knowledge Roles of the EM Discipline....................................................................................................12
Chapter 2
Figure 2.1. Organizational Stakeholders...........................................................................................................................20
Chapter 4
Figure 4.1. The Five Elements of the Integrated Management Model.............................................................................36
Figure 4.2. Maslow’s Hierarchy of Human Needs............................................................................................................39
Figure 4.3. Traditional Organization Structure.................................................................................................................47
Figure 4.4. Team-Based Organization..............................................................................................................................48
Figure 4.5. Likert’s Basic Model.......................................................................................................................................49
Figure 4.6. The Managerial Grid......................................................................................................................................50
Chapter 6
Figure 6.1. Page of U.S. Patent.........................................................................................................................................71
Figure 6.2. Sample Drawing for a U.S. Patent...................................................................................................................74
Figure 6.3. Typical Pages of the Specifications.................................................................................................................76
Figure 6.4. Claims Section of a Patent..............................................................................................................................79
Chapter 9
Figure 9.1. Operations Research Methodology..............................................................................................................107
Figure 9.2. Basic Linear Programming Formulations......................................................................................................108
Figure 9.3. Feasible Region and Iso-Objective Lines.......................................................................................................109
Figure 9.4. Corner Point Optimal Solution......................................................................................................................110
Figure 9.5. Dual Linear Programs for Basic Linear Programs..........................................................................................112
Figure 9.6. Piecewise Approximation to a Non-linear Function.....................................................................................114
Figure 9.7. Big Data Value Chain.....................................................................................................................................127
Chapter 10
Figure 10.1. Modeling and Simulation as a Discipline....................................................................................................135
Figure 10.2. Visualization of the Principle of the Inverse Transform Method/Algorithm...............................................138
Figure 10.3. Time Advance in Discrete Event Simulation...............................................................................................140
Figure 10.4. Phases for Conducting a Study as Recommended in the NATO COBP........................................................144
Figure 10.5. Executing an ARENA Model.........................................................................................................................145
Figure 10.6. Architectural Frame Addressing Main Agent Characteristics......................................................................147
Figure 10.7. Agents, Environment, and Societies...........................................................................................................148
xix
Chapter 11
Figure 11.1. Decision Conference...................................................................................................................................154
Figure 11.2. Dialog Decision Process..............................................................................................................................154
Figure 11.3. Basic Influence Diagram.............................................................................................................................156
Figure 11.4. Basic Decision Tree.....................................................................................................................................157
Figure 11.5. Basic Cumulative Risk Profile......................................................................................................................157
Figure 11.6. Influence Diagram with Test.......................................................................................................................158
Figure 11.7. Decision Tree with Test...............................................................................................................................158
Figure 11.8. Influence Diagram with Test and Market Survey........................................................................................159
Figure 11.9. Probability Calculations..............................................................................................................................159
Figure 11.10. Decision Tree with Test and Market Survey..............................................................................................160
Figure 11.11. Three Utility Functions.............................................................................................................................162
Figure 11.12. Four Types of Value Functions..................................................................................................................163
Chapter 12
Figure 12.1. A Simple Three-Level AHP Model...............................................................................................................172
Figure 12.2. Simple ANP Network for a Decision-Making Process.................................................................................176
Figure 12.3. The Shape of a Hypothetical Utility Function.............................................................................................181
Chapter 13
Figure 13.1. The Scope of Engineering Informatics Proposed........................................................................................186
Figure 13.2. IIIE Discipline History..................................................................................................................................187
Figure 13.3. Discipline Structure of IIIE..........................................................................................................................188
Figure 13.4. The Relationship Between Engineering Integration, Manufacturing Integration, Customer Integration, and
Enterprise Integration....................................................................................................................................................189
Chapter 14
Figure 14.1. Concept of Breakeven Analysis..................................................................................................................221
Chapter 15
Figure 15.1. Shorthand Notation Used for Engineering Economics...............................................................................230
Figure 15.2. Cash Flow Notation ...................................................................................................................................231
Figure 15.3. Constant Payments - Interest and Principle Combined (amortization).......................................................232
Figure 15.4. Cash Flow Diagram for Purchasing an Automatic Welder .........................................................................233
Figure 15.5. Capitalized Cost.........................................................................................................................................234
Figure 15.6. Generalization of an R&R Problem.............................................................................................................238
Figure 10.6. General Decision Model to Determine Economic Feasibility......................................................................249
Chapter 16
Figure 16.1 Project Management Related to Engineering Management.......................................................................252
Figure 16.2. Project Management Process Groups........................................................................................................253
Figure 16.3. Work Breakdown Structure........................................................................................................................257
Figure 16.4. Linear Responsibility Chart.........................................................................................................................258
Figure 16.5. Project Performance Target - Scope, Time, and Cost..................................................................................260
Figure 16.6. Earned Value Graph....................................................................................................................................261
Chapter 17
Figure 17.1. Mind Map of SE Key Concepts....................................................................................................................266
Figure 17.2. U.S. Army Corporal Sounding Rocket..........................................................................................................267
Figure 17.3. Hall’s Book on Systems Engineering............................................................................................................268
Figure 17.4. Common Systems Engineering Lifecycles in Use Today..............................................................................268
Figure 17.5. ISO/IEC 15288 Systems Engineering Processes..........................................................................................269
xx
Figure 17.6. Sample Hybrid SUV Operational Use Case..................................................................................................271
Figure 17.7. Input/Output Matrix...................................................................................................................................272
Figure 17.8. DoDAF Architecting Guidance....................................................................................................................275
Figure 17.9. Big Bang Approach to Integration...............................................................................................................276
Figure 17.10. Bottom-Up Approach to Integration.........................................................................................................277
Chapter 18
Figure 18.1. Using the Foundations of Systems..............................................................................................................290
Figure 18.2. Philosophic Level Spectrum........................................................................................................................292
Figure 18.3. Observation Through Intervention Activities Loop.....................................................................................305
Figure 18.4. Making Sense of “Methodologies,” “Methods” and “Tools”......................................................................306
Figure 18.5. Levels of Integrated Systems Thinking Application.....................................................................................312
Chapter 19
Figure 19.1. Schematic of the Activities in the Risk Management Framework..............................................................321
Figure 19.2. Simplified FTA Showing How Causalities of Risk Scenarios Can Be Represented by
Events and Gate Symbols.............................................................................................................................................326
Figure 19.3. Estimating Probabilities of Damages..........................................................................................................327
Figure 19.4. Example of Risk Matrix to Rank Risk Scenarios Based on Consequence and Likelihood ...........................331
Chapter 20
Figure 20.1. Process Map Example.................................................................................................................................352
Figure 20.2. Histogram Examples...................................................................................................................................353
Figure 20.3. Pareto Chart................................................................................................................................................354
Figure 20.4. Ishikawa Diagram........................................................................................................................................355
Figure 20.5. Control Chart 1............................................................................................................................................356
Figure 20.6. Control Chart 2...........................................................................................................................................357
Figure 20.7. Scatter Chart Reflecting Positive Correlations.............................................................................................357
Figure 20.8. Scatter Chart Reflecting Negative Correlations...........................................................................................358
Chapter 21
Figure 21.1. Strategic Management Process..................................................................................................................363
Figure 21.2. Goals, Objectives, Strategies......................................................................................................................365
Chapter 22
Figure 22.1. Functions of an Entrepreneur.......................................................................................................................................381
Figure 22.2. Innovation Process - Six Stages....................................................................................................................................384
Figure 22.3. Design Thinking Process.................................................................................................................................................387
Figure 22.4. Stages of Entrepreneurial Process...............................................................................................................................389
Figure. 22.5. Continuous Improvement Process.............................................................................................................................390
Chapter 23
Figure 23.1. Supply Chain Organizational Pyramid.........................................................................................................................394
Figure 23.2. SIPOC Diagram................................................................................................................................................................396
Figure 23.3. Attributes of Lean Supply Chain...................................................................................................................................397
Figure 23.4. Definitions of Supply Chain Agility by Executives ...................................................................................................400
Figure 23.5. Agile Supply Chain...........................................................................................................................................................401
xxi
xxii
LIST OF TABLES
Chapter 1
Table 1.1. ABET accredited and ASEE EM Related Programs..............................................................................................3
Table 1.2. Common Characteristics of EM Definitions........................................................................................................5
Table 1.3. Professional Societies Associated with the EM Discipline..................................................................................7
Table 1.4. Journals Associated with the Engineering Management Discipline...................................................................8
Table 1.5. Professional Conferences Associated with the EM Discipline............................................................................9
Table 1.6. EM Discipline’s Stakeholder Needs..................................................................................................................13
Chapter 4
Table 4.1. Overlapping Concepts......................................................................................................................................44
Table 4.2. Theory of Motivating Knowledge Workers.......................................................................................................51
Chapter 8
Table 8.1. Influence of Commitment on Workplace Impact.............................................................................................98
Chapter 11
Table 11.1. Advantages and Disadvantages of Decision Processes................................................................................155
Table 11.2. Elements of the Swing Weight Matrix..........................................................................................................164
Table 11.3. Topics Referenced to Standard Texts in the Field........................................................................................167
Chapter 12
Table 12.1. Scale for Pair-wise Comparison Using AHP1.................................................................................................172
Table 12.2. Pair-Wise Comparison Between Attributes..................................................................................................172
Table 12.3. Pair-Wise Comparison Between Attributes with Totals................................................................................173
Table 12.4. Normalized Values of Pair-Wise Comparison Between Attributes...............................................................173
Table 12.5. Pair-Wise Comparison Between Brands with respect to Maintenance Cost................................................176
Table 12.6. ANP Supermatrix—Un-weighted.................................................................................................................177
Table 12.7. ANP Supermatrix—Weighted.......................................................................................................................177
Table 12.8. ANP Limit Supermatrix.................................................................................................................................177
Table 12.9. Final Alternative Values based on ANP........................................................................................................178
Chapter 14
Table 14.1. Comparison of Types of Business Entities....................................................................................................201
Table 14.2. A Typical Income Statement.........................................................................................................................206
Table 14.3. Assets, Liabilities and Equity for ASEM LLC..................................................................................................208
Table 14.4. Balance Sheet for ASEM LLC.........................................................................................................................209
Table 14.5. Two Sources of Equity Capital for Shareholders Equity...............................................................................210
Table 14.6. Stockholder’s Equity Based Upon Two Sources of Equity Capital................................................................210
Table 14.7. ASEM Corporation Stockholder’s Equity Statement on December 31, 200X..............................................211
Table 14.8. Stockholder’s Equity Statement for ASEM Corp as of December 31...........................................................211
Table 14.9. Cash Flow Statement....................................................................................................................................212
Table 14.10. Revenue and Expenses for Merino Realty.................................................................................................213
Table 14.11. Cash Flow from Merino Reality Income Statement...................................................................................214
xxiii
Table 14.12. SL Depreciation Example...........................................................................................................................216
Table 14.13. MACRS Depreciation Example...................................................................................................................217
Table 14.14. Loan Balance / Amortization Table.............................................................................................................219
Table 14.15. T-account Method of Recording Debits and Credits..................................................................................220
Table 14.16. Location of Typical Items That are Posted..................................................................................................220
Chapter 15
Table 15.1. Demonstration of Simple vs. Compound Interest.......................................................................................228
Table 15.2. Effects of Compounding Period...................................................................................................................230
Table 15.3. Salvage Value and O&M Costs by Year.........................................................................................................238
Table 15.4. Capitalized Costs by Year..............................................................................................................................239
Table 15.5. EVAC Calculation for O&M Costs..................................................................................................................239
Table 15.6. Total EVAC for an O&M Example..................................................................................................................239
Table 15.7. Net Cash Flow from Operating Activities.....................................................................................................243
Table 15.8. Net Cash Flows from Capital Related Activities............................................................................................243
Table 15.9. Loan Balance / Amortization Table...............................................................................................................245
Table 15.10. Total Cash Flow (Operating and Capital) Discounted.................................................................................245
Table 15.11. Economic Data for the ATA Problem..........................................................................................................246
Table 15.12. ATA Loan Amortization Table......................................................................................................................246
Table 15.13. Depreciation Expenses for the ATA Problem..............................................................................................247
Table 15.14. Net Cash Flows from Operating Income....................................................................................................247
Chapter 16
Table 16.1. Project Management Tools and Techniques.................................................................................................257
Chapter 17
Table 17.1. Input/Output Matrix....................................................................................................................................272
Table 17.2. Requirements Traceability Matrix................................................................................................................273
Chapter 18
Table 18.1. Multiple Perspectives of Systems Thinking..................................................................................................288
Table 18.2. Distinctions between Hard and Soft Systems Thinking................................................................................289
Table 18.3. Guiding Systems Principles for Systems Thinking.........................................................................................293
Table 18.4. Systems Thinking Characteristics.................................................................................................................302
Table 18.5. System-based Methodologies.....................................................................................................................307
Table 18.6. Jackson’s “Creative Holism” Taxonomy........................................................................................................307
Chapter 19
Table 19.1. PHA Worksheet............................................................................................................................................323
Table 19.2. JSA Worksheet..............................................................................................................................................324
Table 19.3. FEMA Worksheet..........................................................................................................................................325
Table 19.4. Basic FTA Symbols........................................................................................................................................325
Table 19.5. Example of Risk Matrix to Rank Risk Scenarios Based on Consequence and Likelihood .............................328
Table 19.6. Exploratory Questions That Can Be Used to Describe Risk Scenarios..........................................................329
Table 19.7. Risk Analysis Tools .......................................................................................................................................332
Table 19.8. References for Advanced Risk Analysis .......................................................................................................335
Chapter 20
Table 20.1. Pareto Results Example ...............................................................................................................................355
Chapter 23
Table 23.1. Varying Definitions of Supply Chain as Provided by Different Authors........................................................394
Table 23.2. Outsourcing Risks.........................................................................................................................................399
xxiv
Engineering Management: Past, Present, and Future
1
Engineering Management—Past, Present,
and Future
Timothy G. Kotnour
University of Central Florida
John V. Farr
United States Military Academy
1
Engineering Management Handbook
1.1 Introduction
1.1.1 Overview of Engineering Management
With the globalization of the manufacturing base, outsourcing of many technical services, the efficien-
cies derived from advances in information technology (and the subsequent decrease in mid-management
positions), and the shifting of our economy to be service-based, the roles of the technical organization
and the engineering manager have dramatically changed. The 21st century technical organization must be
concerned with:
1. Maintaining an agile, high quality, and profitable business base of products or services in a fluctuating
economy,
2. Hiring, managing, and retaining a highly qualified and trained staff of engineers, scientists, and tech-
nicians in a rapidly changing technological environment, and
3. Demonstrating a high level of capability maturity.
Engineers often enter the job market not as traditional engineers but as project managers, technical sales,
and lead systems engineers (especially within the defense and information management arenas) involved
with conceiving, defining, architecting, designing, integrating, marketing, and testing complex and
multi-functional information technology centric systems (Abel, 2005). Within five years, for most engi-
neers this has become their primary job function. Combined with the fact that the modern engineering
enterprise is now characterized by geographically dispersed and multi-cultural organizations, engineering
management (EM) is more relevant than ever. Because of the blurring of boundaries between technical
and management roles, engineers must continue to redefine their roles to remain relevant in the modern
economy. Like all technical professions, EM has evolved dramatically because of the information age and
the interdisciplinary nature and complexity of modern systems.
2
Engineering Management: Past, Present, and Future
one has been accredited in the US for the first time in the last five years. Only five use the term “engi-
neering management” exclusively for the program name. A recent American Society for Engineering
Education (ASEE) publication on domestic engineering programs lists 23 EM undergraduate programs,
which also are summarized in Table 1.1.
Table 1.1. ABET accredited and ASEE EM Related Programs (from Kaufman et al., 2015)
* Programs with “Management” in the name, ** “Engineering Management” programs, *** “Engineering and Management”
programs. The number in parenthesis under ABET accredited programs is the year that the program was first accredited.
The EM profession mirrors both trends in business and education. Early business engineering focused
on the civil and mechanical engineering disciplines. As shown in Figure 1.1, with the work Taylor (1911)
contributed to the early focus on manufacturing that dominated the discipline through the 1990s. Rapid
advances in information technology in the 1980s and organizational changes in all engineering practices
led to decline in the specialist engineer and a rise in the generalist engineer. To reflect the shift from man-
ufacturing to turn-key systems integrators in a global economic environment many EM programs are now
aligned with systems engineering programs (Farr and Buede, 2003).
3
Engineering Management Handbook
Figure 1.1. Management and Educational Trends That Have Affected the EM Field
(Shewart, 1924)
Quality Control,
Department of
(Taylor, 1911)
Stevens Int of
(Jacko, 2005)
(Clark, 2000)
Management
Engineering,
Tech (1902)
Principles of
Engineering
Statistical
Industrial
Scientific
Business
(1909)
1900-1925
(ORMS, 2005)
Operations
Research
(1937)
1925-1950
Thinking Emery
and (Trist,
Systems
1960)
1950-1975
Six Sigma (1986)
Champy, 1993)
Reengineering
(Hammer and
Schon, 1978)
Organization,
Management
Total Quality
(Argyris and
(ISO, 2005)
Learning
Process
1975-2000
4
Engineering Management: Past, Present, and Future
Definition Reference
Engineering management is designing, operating, and continuously improving Omurtag (1988)
purposeful systems of people, machines, money, time, information, and energy
by integrating engineering and management knowledge, techniques, and skills to
achieve desired goals in technological enterprise through concern for the envi-
ronment, quality, and ethics.
The engineering manager is distinguished from other managers because he or Babcock and Morse
she posses both the ability to apply engineering principles and a skill in organizing (2002)
and directing people and projects. He or she is uniquely qualified for two types
of jobs; the management of technical functions (such as design or production) in
almost any enterprise, or the management of broader functions (such as market-
ing or top management) in a high technology enterprise.
Engineering management is the discipline addressed to making and implementing IEEE (1990) and
decisions for strategic and operational leadership in current and emerging tech- Kocaoglu (1991)
nologies and their impacts on interrelated systems.
Engineering management is the art and science of planning, organizing, allocating American Society
resources, and directing and controlling activities which have a technological for Engineering
component. Management
In today’s global business environment, engineer managers integrate hardware, Farr (2011)
software, people, processes and interfaces to produce economically viable and
innovative products and services while ensuring that all pieces of the enterprise
are working together.
5
Engineering Management Handbook
Figure 1.2. Engineering Management as the Bridge Between Engineering and Management
In reviewing the journals, professional societies, and conferences, five disciplines contribute to defin-
ing three different perspectives on the EM field. The five discipline groups are as follows:
1. Engineering disciplines. The core engineering disciplines in which the discipline focuses on the engi-
neering and design process unique to a domain (e.g., civil, traditional industrial, mechanical, electrical).
2. Discipline specific engineering management. The EM discipline that focuses on the management
process for a specific engineering discipline (e.g., management of the civil engineering process, man-
agement of the industrial engineering process).
3. Generalist engineering management. The EM discipline that focuses on the fundamental EM pro-
cess across many engineering disciplines.
4. Management of technology. The business or management discipline that focuses on managing the
creation, development, and use of technology (Badaway, 1998).
5. General management. The management discipline that focuses on the management of any organization.
Given these descriptions, three perspectives to EM are: (1) discipline specific EM, (2) generalist EM,
and (3) management of technology. Industrial engineering could be considered to be part of the overlap
between engineering and EM in Figure 1.2. As will become evident in the rest of this section, the EM
field continues to support this view. The EM discipline emerges from five unique sets of journals, profes-
sional societies, and conferences to provide three unique perspectives to the field.
Disciplines Associated • Association for the Advancement of Cost Engineering (AACE) (aacei.org)
with Processes and • International Council of Systems Engineering (INCOSE) (www.incose.org)
Tools Used by the • Project Management Institute (PMI) (www.pmi.org)
Engineering Manager
7
Engineering Management Handbook
Group Journals
8
Engineering Management: Past, Present, and Future
Group Conferences
faster decision-making, learning, and innovation; faster newness and obsolescence of knowledge; more
frequent environmental discontinuities; faster industry life-cycles; greater risk of competency traps; and
faster newness and obsolescence of organizations. The challenges are being driven by the increased global-
ization of the knowledge economy and the increasing complexity of the systems. Technology managers are
facing challenges managing in this domain. Engineering managers face challenges that include: (1) strate-
gic planning for technology products, (2) new product project selection, (3) organizational learning about
technology, and (4) technology core competencies (Scott, 1998). During the 2003 annual conference of
the American Society for Engineering Management (ASEM), a session was held with both practicing and
academic EM participants on defining the challenges associated with EM. During this session the partic-
ipants identified challenges in three groups: (1) business environment trends and challenges, (2) organi-
zational trends and challenges, and (3) engineering management/manager trends and challenges (Utley,
Farrington, and Kotnour, 2003). The business environment trends and challenges included:
• Globalization,
• Short-term profit focused,
• Increased regulatory/environmental stewardship/ethical focus, and
• Changing demographics of the workforce.
These trends create further trends and challenges for the technical organization:
• Forging partnerships,
• Operating networks of relationships,
• Implementing a process-based organization,
• Continuously managing change, and
• Gaining/maintain employee loyalty and commitment.
The engineering manager then faces of the challenges of operating in this environment. Specific chal-
lenges include:
• Managing and leading teams,
• Understanding and managing uncertainty,
• Managing and leading the workforce,
• Changing culture,
• Using tools and metrics to manage, and
• Developing the needed management and leadership skills and behaviors.
Figure 1.3 summarizes these challenges. These trends and challenges offer the strategic context for the
EM discipline. For example, the discipline needs to become more global and integrative across disciplines.
The EM discipline must define a body of knowledge that provides the knowledge needed by the engineer-
ing manager to be successful in the challenging environment.
10
Engineering Management: Past, Present, and Future
Figure 1.3. Challenges for the Technical Organization and Engineering Manager
We Defined EM Challenges
Business Environment Trends & Challenges
• Globalization
• Short-term profit focused
• Regulatory, environmental and ethical
• Demographics (age of the workforce, diversity, attitudes of the
workforce)
These five knowledge roles are needed to provide positive outcomes for the EM discipline’s stakehold-
ers. The strategic issue facing the EM discipline is on how to integrate these five roles across the global and
diverse set of contributing disciplines, professional societies, journals, and conference of EM. The intent
of the rest of this chapter is to define specific challenges facing the EM discipline.
11
Engineering Management Handbook
Technical
Generate Research
Assistance
Knowledge Function
Assimilate Service
Organization Generalized
Unique
Application Level
12
Engineering Management: Past, Present, and Future
Society • Strong, stable society • Provide graduates who are functional and
• Useful products and services make a difference
University community • Enhance the reputation of the • Provide an outlet (i.e., conferences
university and scholarly journals) for faculty to
professionally grow and gain recognition
for academic programs
Faculty • Enhanced reputation and • Provide the infrastructure and outlets for
freedom to intellectually conducting teaching, research, and service
explore
Accreditation • Meet the desired outcomes • Define the bodies of knowledge and
institutions of the accreditation process characteristics of the EM discipline
• Systematically implement the accreditation
process
the global economic community. This can mainly be attributed to our main role as continuing education
for engineers and scientists. In practice, we have had to be on the leading edge of managerial trends to
produce competitive products and services. In order to remain relevant, we have had to adapt our skill
sets. However, the role of EM is changing from both an educational and practical perspective. Most EM
programs are run very similar to MBA programs with adjunct faculty. EM education is becoming more
accepted within most universities. Unfortunately, few universities have standalone EM programs at the
undergraduate and graduate levels staffed with mainly full-time faculty. The number of undergraduate
programs has experienced steady growth. From a practicing EM perspective, the challenges in many ways
are more daunting. Rapid changes in business practices require a continual self-evaluation and retraining
to remain relevant.
Second, the EM profession needs to build an integrated approach of teaching, research, technical
assistance, training, and service. From this integration, the discipline will continue to grow and make
significant contributions. Third, to draw this synergy, the EM profession must also recognize the comple-
mentary perspectives that different contributing fields can bring. These complementary perspectives will
help develop and transfer the knowledge needed to address the challenges of the technical environment
and technical organization. Fourth, the EM professional societies offer a key mechanism to foster collab-
oration across disciplines. The leadership for the profession needs to come from active participation from
the discipline itself and the leadership of the professional societies.
1.7 References
Abel, K., An Analysis of Stevens Engineering Management Graduates, 1990 – 2004, Hoboken, NJ: Stevens
Institute of Technology, 2005.
Argyris, C., and Schon, D. A., Organizational Learning: A Theory of Action Perspective, Reading, MA:
Addison-Wesley, 1978.
Babcock, Daniel, “Management Divisions of Engineering Societies,” Engineering Management Journal,
vol. 1, no. 3, Sept. 1989, pp. 9-14.
Babcock, Daniel, “Tribute to Bernie Sarchet,” Engineering Management Journal, vol. 12, no. 1, March
2000, p. 2.
Babcock, Daniel, and Morse, Lucy C., Managing Engineering and Technology, 3rd Edition, Upper Saddle
River, NJ: Prentice Hall, Inc., 2002.
Badaway, M. K., “Technology Management Education: Alternative Models,” California Management
Review, vol. 40, no. 4, 1998, pp. 94-116.
Baldridge, D. C., Floyd, S. W., and Markoczy, L., “Are Managers from Mars and Academicians from
Venus? Toward an Understanding of the Relationship Between Academic Quality and Practical Rel-
evance,” Strategic Management Journal, vol. 25, no. 11, 2004, pp. 1063-1074.
Barkema, H. G., Baum, J. A., and Mannix, E. A., “Management Challenges in a New Time,” Academy of
Management Journal, vol. 45, no. 5, 2002, pp. 916-930.
Boudreau, J. W., “Organizational Behavior, Strategy, Performance and Design in Management Science,”
Management Science, vol. 50, no. 11, 2004, pp. 1463-1476.
Boyer, E. L., Scholarship Revisited: Priorities of the Professoriate, The Carnegie Foundation for the Advance-
ment of Teaching, 1990.
Clark, Geoffrey W., History of Stevens Institute of Technology – A Record of Broad Based Curricula and
Technogenesis, 1870-2000, Jersey City, NJ: Jensen/Daniels Publishers, 2000.
Collins, T. R., Berivudes, M. G., Youngblood, A. D., and Pazos, P., Professional Development Training for
Engineering Managers,” Engineering Management Journal, vol. 16, no. 3, Sept. 2004.
Deming, W. E., Out of Crisis, Massachusetts Institute of Technology, Center for Advanced Engineering
Study, Cambridge, MA, 1982.
Dorf, R. C., The Technology Management Handbook, CRC Press, 1999.
Emery, F. E., and Trist, E. L., “Socio-technical Systems,” In C.W. Churchman and M. Verhulst (editors),
Management Sciences: Models and Techniques, Oxford: Pergamon, 1960.
14
Engineering Management: Past, Present, and Future
Farr, J., and Bowman, B., “ABET Accreditation of Engineering Management Programs: Contemporary
and Future Issues,” Engineering Management Journal, vol. 11, no. 4, December 1999, pp. 7-13.
Farr, John V., and Buede, Dennis, “Systems Engineering and Engineering Management: Keys to the
Efficient Development of Products and Services,” Engineering Management Journal, vol. 15, no. 3,
September 2003, pp. 3-11.
Farr, John V., Systems Life Cycle Costing: Economic Analysis, Estimation, and Management, CRC Press,
January 2011.
Hammer, M., and Champy, J., Reengineering the Corporation, New York: Harper Business, 1993.
Hicks, P., Utely, D., and Westbrook, J. “What are we teaching our engineering managers?” Engineering
Management Journal, vol. 11, no. 1, March 1999, pp. 29-34.
IEEE Editorial, “Research and Education Characteristics of the Engineering Management Discipline,”
IEEE Transactions on Engineering Management, vol 37, no. 3, August 1990, pp. 172-176.
International Organizations for Standardization, http://www.iso.ch/iso/en/iso9000-14000/index.html,
accessed January 24, 2005.
Jacko, Julie A., http://www.isye.gatech.edu/lhci/hci_role.pdf, accessed January 24, 2005.
Johnson, J. H., Micro Projects Cause Constant Change, presented at Second International Conference on
Extreme Programming and Agile Processes in Software Engineering, (20-23 May 2001), Cagliari, Italy,
Kocaoglu, Dundar, “Engineering Management Education and Research,” Engineering Management Con-
ference/International Congress on Technology and Technology Exchange, Pittsburgh, PA, October 8,
1984.
Kocaoglu, Dundar, “Strategic Opportunities for Engineering Management,” Engineering Management
Journal, vol. 1, no. 1, March 1989, pp. 8-10.
Kocaoglu, Dundar, “Education for Leadership in Management of Engineering and Technology,”
PICMET 91 – Portland International Conference on Management of Engineering and Technology,
pp 78-83, Portland OR, 1991.
Kotnour, T. G., “Building Knowledge for and about Large-Scale Organizational Transformations,” Inter-
national of Operations and Production Management, 2001.
Motorola Inc., http://www.motorola.com/content/0,,3074-5804,00.html, access January 24, 2005.
Murray, Susan L., and Raper, Stephen A., “Engineering Management and Industrial Engineering: Six One
Way, A Half Dozen the Other,” American Society of Engineering Education Annual Conference,
Session 2542, 1997.
OR/MS Today, http://www.lionhrtpub.com/orms/orms-2-01/nps.html, accessed January 24, 2005.
Ramos-Rodrigues, A. R. and Ruiz-Navarro, J. “Changes in the Intellectual Structure of the Strategic
Management Research: A Bibliometric Study of the Strategic Management Journal, 1980-2000,” Stra-
tegic Management Journal, vol 25, no. 10, 2004, pp. 981-1004.
Sarchet, Bernie, and Baker, Merl, “Engineering Management—Key to the Future,” Engineering Manage-
ment Journal, vol. 1, no. 1, March 1989, pp. 4-7.
Sarchet, Bernie, and Baker, Merl, “Defining the Boundaries of Engineering Management,” Engineering
Management Journal, vol. 7, no. 2, March 1995, pp. 7-10.
Scott, G. M., “The new age of new product development: Are we there yet?” R & D Management, vol.
28, no. 4, 1998.
Shewhart, Walter A., Bell Laboratory Memorandum, Issued May 16, 1924, http://www.itl.nist.gov/
div898/handbook/pmc/section1/pmc11.htm, accessed January 24, 2005.
Taylor, Frederick Winslow, The Principles of Scientific Management, 1911.
Triad Business Journal, http://triad.bizjournals.com/triad/stories/2004/03/29/focus2.html?t=printable,
accessed March 1, 2005.
Utley, D., Farrington, P., and Kotnour, T. G., “Understanding the Challenges of the Engineering Man-
ager,” working paper, Author, University of Alabama Hunstsville, 2003.
Waters, Bob, “Engineering Management Tradition and Education: Past, Present, and Future,” Engineering
Management Journal, vol. 6, no. 3, Sept. 1994, pp. 5-8.
15
16
Professional Responsibility, Ethics, and Legal Issues
2
Professional Responsibility, Ethics,
and Legal Issues
William J. Daughton
Missouri University of Science and Technology
17
Engineering Management Handbook
2.1 Introduction
2.1.1 Relevance and Importance
As a profession, engineering must adhere to the highest standards of integrity and honesty. Engineering
has a direct impact on society in terms of safety and quality of life so engineers must be vigilant in adher-
ing to the highest principals of ethical conduct in conducting their professional work.
Engineering is often directly involved with the creation of technology-based work product that has
significant value to the employer or client. The value of this work product must be protected leading to
patents and copyrights. Engineering managers must be aware of their responsibilities in this domain to
ensure the proper protection of company work product assets.
18
Professional Responsibility, Ethics, and Legal Issues
Suppliers Customers
Stockholders
For simplicity, Employees include everyone, managers as well. Some sources separate employees and
managers due to their different roles (Jones and George, 2006), but purposes of this treatment they are
combined. Here, the term Communities refers to the local communities in which the organization has a
presence as well as the broader content of national or international communities.
The four ethical principles that can be applied to analyze the impact of managerial decisions on the
above group of stakeholders are (Jones and George, 2006):
1. Utilitarian Rule
2. Moral Rights Rule
3. Justice Rule
4. Practical Rule
These rules are in practice useful guidelines to guide decision-making by balancing the self-interest of
the organization with those of the stakeholders.
In addition rights of free speech and privacy arise as well. The practical difficulty with this rule is that
decisions that protect the rights of some stakeholders may hurt the rights of others.
environment. Managers need to understand how to ethically behave when conducting business
outside the United States. Moral beliefs, social customs, and culture create different ethical standards
in other parts of the world. Engineering managers must recognize these moral, social, and culture
influences define what is considered appropriate and acceptable in doing business. Further, compa-
nies themselves must let their engineering managers know what is expected of them when working in
foreign locations.
Basic human rights include the right to good health, good standard of living, and the opportunity
for economic advancement. In essence, they represent human dignity. Cultural-specific norms refer to the
norms in the culture or cultures being affected by the decision. Clearly the term “reconciled” may raise
some eyebrows as it appears to be a way to circumvent ethical obligations. However, the reference here is
to find ways to work within the culture of a given country or part of the world while still respecting the
legal and ethical requirements of the home country. This often arises with respect to gifts. As an example,
in a country where exchanging gifts are the norm, a large company-to-company gift may be considered
while small, nominal value personal gifts are exchanged. This would meet the requirements of both the
U.S. and the other country.
and lack of complete information to be addressed. There are occasionally stories circulating through a
laboratory or engineering office about some type of unethical situation or behavior, often totally false or
perhaps with a grain of truth. Unless these can be dealt with openly, they will take on a life of their own.
What may have been a something almost trivial can grow to be a source of major discontentment and sus-
picion. There must be a working culture that encourages this kind of dialog and one that does not imply
threats to an individual’s career for raising these issues.
2.6.3 Patents
If an organization determines that an invention disclosure is novel and valuable, it may choose to purse a
patent to protect the invention. Patents in the U.S. are held for 20 years for an invention (14 years for a
design) and provide the organization with exclusive rights of use and the opportunity to license the inven-
tion to others. Typically, patent attorneys employed by the organization manage the application process.
Patents provide the owners with the opportunity to license the invention to others for their use in
exchange for payment, which may create a significant revenue stream.
23
Engineering Management Handbook
2.6.4 Copyrights
Copyrights can be awarded to owners of works such as books, pamphlets, lectures, professional papers,
and training materials. The owner of the work may be the author, or in a professional setting, the em-
ployer if the work was created as part of the author’s assignment or job duties. The owner may see value
in protecting such materials from free use and dissemination for strategic, competitive, or economic
reasons and choose to identify the work as copyright protected. Effectively, a created work is considered
protected as soon as it exists, and no public filing for copyright protection required.
There are several limitations to the use of copyrighted material without authorization:
• Single copies for private, non-commercial use.
• Free use provided the source is properly referenced. This exception also allows for the use of protected
works for teaching purposes or for news reporting.
• Fair use depending on such things as the nature of the use, the amount of the total work used, and
the impact the use has to the potential value of the whole work.
• Non-voluntary licenses when compensation is paid to the author in respect of the use.
Copyrights may be transferred by the owner. All economic rights may be transferred to a third
party and such transfers may include selling those rights in return for payment. Transfers take two
forms:
1. Assignments or the transfer of property rights. The party to whom the property rights are transferred
becomes the new copyright owner. Often the publication of technical papers in proceedings or jour-
nals is contingent upon the assignment of copyright to the publisher.
2. Licenses are granted to third parties to use the copyrighted materials but the copyright remains with
the original owner. License agreements may include payment to the original owner for use by the
third party.
2.7 References
C. M. Chang, Engineering Management, Challenges in the New Millennium, Pearson/Prentice Hall, 2005.
Jones, G. and George, J., Contemporary Management, McGraw-Hill Irwin, 4th edition, 2006.
National Association of Professional Engineers (NSPE), Code of Ethics, http://www.nspe.org/Ethics/
CodeofEthics, 2009.
P. Northouse, Leadership Theory and Practice, Sage, 7th edition, 2016.
24
Management Theory and Concepts
3
Management Theory and Concepts
Jerry Westbrook
University of Alabama, Huntsville
Chris Edmonds
Roddies’ Code and Roddie Edmonds Foundation
25
Engineering Management Handbook
3.1 Introduction
The objective of this chapter is to layout the evolution of the EM theory in order to better define the cur-
rent thinking about EM. The end result may be a more standardized approach as to what is taught in EM
academic programs and what is practiced by EM professionals in this country and around the world.
Frenchman Henri Fayol (1949) is generally credited with being the first to develop general manage-
ment principles. Fayol published his management principles in 1916 but they were not translated into
English until 1949. He was an engineer who rose to the position of general manager in a mining firm.
Fayol made two significant contributions to management theory. He was the first to propose management
principles and he was the first to define elements of management. His 14 principles include:
1. Division of work
2. Authority and responsibility (relationship)
3. Discipline
4. Unity of command
5. Unity of direction
6. Subordination of individual to general interest
7. Remuneration (fairness of )
8. Centralization (degree of appropriateness)
9. Scalar chain (of command)
10. Order
11. Equity (loyalty and fairness)
12. Stability of tenure (unnecessary turnover)
13. Initiative (motivation of subordinates)
14. Espirit de corps
Fayol’s (1949) elements of management are: planning, organizing, commanding, coordinating, and
controlling. These are considered to be fundamental concepts that are still being taught ninety years after
they were first published.
It can be seen that division of labor is implied in these four principles. There is an overriding assump-
tion that management divides the work and makes decisions affecting the way work is to be done. Taylor
(1911) believed that if any task is studied sufficiently, management can determine the one best way for
doing anything and can optimize productivity. He further believed that the variation introduced by the
workers could be reduced to insignificance through training and incentives. Workers and machines were
seen as only slightly different.
1. A well-defined hierarchy of authority with centralized decision making (by top management)
2. A clear division of work (labor)
3. Rational program of personnel administration
4. Rules and regulations as to how each job was to be done and the acceptable rate of production
5. Written records
6. A staff of experts to assist managers in solving complex problems
According to Weber’s (1947) concept, the manager represented authority. The manager was at the
top of the organizational pyramid and made decisions based on “his sphere of competence.” “Rules and
regulations” (Weber, 1947) prescribed as many decisions as possible, thus ensuring fair treatment of em-
ployees.
The purpose of the “rational program of personnel administration” (Weber, 1947) was to “pre-make”
decisions so that every employee is treated exactly like all others. Job descriptions and production quotas
would ensure that only reasonable work would be expected of employees. Complex problems were to be
solved by the manager and his staff of experts, not by the workers. Weber felt that not only would workers
be protected by such a system but that the organization would be more productive also. Again, we see the
familiar division of labor.
Division of labor helped to train managers for each division of the process. This proliferation of man-
agers adds levels to the organization. The many levels of the organization also contribute to the primary
attribute of this system control. So, multi-levels of structure and a small span of control are characteristic
of Weber’s design. Weber failed to see that his system would only function adequately in a stable environ-
ment where neither competitors nor technology were changing rapidly. If either of these were to begin to
change, the organization bound by rules and a strict chain of command could not adapt to the changing
environment. Weber’s system was designed to control, to prevent abuses. It was not designed to innovate,
to develop new products or processes. It was called by a familiar name—it is the bureaucracy and it created
a set of problems never envisioned by Weber.
3.4.1 A Critique
The problem is that most industries in the U.S. use some version of the bureaucratic management
principles just discussed. Chris Argyris (1957) wrote perhaps the most accurate critique of these manage-
ment principles. First, he researched the common characteristics of personality development. They are as
follows:
1. Man develops from a passive infant to an increasingly active adult
2. Goes from a state of dependence to independence
3. Changes from simple behavior to complex with maturity
4. From shallow interests, man develops deep commitments
5. Goes from short time frames to long time frames—more affected by the past than the future
6. Develops from family subordinate to peer or leader
7. Goes from a lack of awareness of self to the development of self control
Argyris (1957) further identified four common classical organization concepts and compares the
result of using them with the traits of normal personality development listed above.
• Division of labor—The individual sells skills rather than total abilities
• Chain of command—This tends to make individuals dependent, passive
• Unity of direction—This is leader oriented, not a function of workers
• Span of control (usually four to eight)—Adds levels to the organization, thus increases dependence
3. The result will be inter-subordinate hostility, rivalries, and a focus on parts of the organization rather
than the whole.
Argyris (1957) found that management frequently (at the time of the writing of his article) used con-
cepts designed for use on uneducated women and children in manual labor factories.
3.7 Summary
Hallmarks of classical management are division of labor, unity of command, and chain of command. Ar-
gyris (1957) found that applications of these concepts tend to cause problems for the organization. Taylor
(1911) proposed the development of a body of knowledge on all-important tasks; there is one “best” way
for doing a task, and management and workers should work together to solve production problems. This
solved some production problems but contributed to others. Assortments of quantitative methods are
available to assist managers, and there are concepts to motivate workers to do the jobs that need to be
done. There are probably more examples of poor management than good. How, then, do we choose the
best management practices under a specific set of circumstances?
29
Engineering Management Handbook
Then the question becomes one of balance between the concepts and their appropriate relationship
to each other. The EM field is dominated by knowledge workers, professionals, and talented technical
personnel. Classical management concepts (as Argyris pointed out) were developed for unskilled workers
in an environment controlled by upper management.
Not included in the Schools of Management Thought is the impact of the organization structure.
Burns and Stalker (1961) discovered that organizational success showed a relationship between the level of
technology used and the type of structure employed. “Organic” structures were better adapted to orga-
nizations using moderate or high technology as a critical part of the enterprise. “Mechanistic” structures
were used by organizations producing commodities with low technology processes. This 1961 study was
done at a time when the use of low technology was a real option. Today, there are few organizations with
that luxury. The implication drawn is that the Human Behavior School is more important to most organi-
zations, especially to those employing the highest levels of technology.
ally improve them. There are too many instances where company executives attempt to manage with
financial data without process knowledge.
• Behavioral Approaches—Capabilities of knowledge-workers must be harnessed to achieve success
in the era of the global economy. Willing, capable employees solve problems and create solutions and
opportunities. Talented workers must participate in decisions affecting their work. Decisions must
be made close to the situation by managers most familiar with the situations. Complex work is done
in teams that coordinate tasks as a normal team function. Training is expected of all employees. The
organizations cannot improve unless its members improve.
• Quantitative Approaches—Mathematical models and probabilistic approaches have much to offer in
the solution of complex problems but they are not a substitute for a positive, productive culture.
• Organization Structure—Flat organization structure, fewer levels, relatively high employee to
manager ratio is the norm. Management layers add control when flexibility is more valued. Imposed
controls are counterproductive. Team developed goals are part of an effective control system.
There are literally dozens of “systems” being used by industries that use some combination of these
factors. Some of the systems in current use are: Total Quality Management, Statistical Process Control,
Just in Time Inventories, Team Management, Management by Objectives, etc. Other companies, not
wanting to be left out, have attempted to use these systems with widely varying success. These systems in
themselves are no panaceas.
Educators in EM should not be tempted to base programs in the classical theories that have limited use
in the typical EM environment; nor should they be tempted to over-commit to the latest management “fads”
such as TQM. If properly implemented, some of these “fads” may be productive. If they are used in an appro-
priate structure with the knowledge of behavioral theories, their probability of success goes up dramatically.
3.10 Conclusion
There is a place for both classical management concepts, new techniques in EM curricula. Additional in-
formation on the nature of the external and internal environments has much to do with the way each is to
be applied. Other necessary ingredients for a successful management strategy are: an appropriate structure
and a knowledge of behavioral theories that underlie the new techniques.
3.11 References
Argyris, Chris, “The Individual and Organization: Some Problems of Mutual Adjustment,” Administrative
Science Quarterly, vol. 2, June 1957.
Burns, Tom, and Stalker, G. M., The Management of Innovation, London, 1961.
Fayol, Henri, General and Industrial Management, Pitman Books Limited, 1949.
George, Claude S., Jr., The History of Management Thought, Englewood Cliffs NJ: Prentice Hall Inc.,
1968.
Herzberg, Frederick, “One More Time: How Do You Motivate Employees,” Harvard Business Review,
January- February, 1968.
Koontz, Harold, “The Management Theory Jungle,” Journal of the Academy of Management, December
1961.
Maslow, Abraham H., “A Theory of Human Motivation,” Psychological Review, 1943, p. 50.
McGregor, Douglas M., “The Human Side of the Enterprise,” Management Review, November 1957.
Mintzberg, Henry, Managerial Work: Analysis From Observation, Management Science, vol. 18, no. 2,
October 1971.
Peters, Thomas J., and Waterman, Robert H. Jr., In Search of Excellence, New York: Warner Books, 1982.
Taylor, Frederick W., Shop Management, New York: Harper and Brothers, 1911.
Weber, Max, The Theory of Social and Economic Organization, McMillan Publishing Co., 1947. (A trans-
lation of the original document.)
Wren, Daniel A., The Evolution of Management Thought, New York: John Wiley and Sons, 1979.
31
32
Managing Knowledge Workers
4
Managing Knowledge Workers
Chris Edmonds
Roddies’ Code and Roddie Edmonds Foundation
33
Engineering Management Handbook
4.1 Introduction
It is generally agreed that management is the way an organization functions to get needed things done.
That is about all that is agreed on. Management has been an issue for thousands of years. The Egyptians
organized thousands of workers to build the pyramids and hundreds of impressive monuments. Romans
built aqueducts to provide its cities with fresh water. They built roads that are still visible today. Much of
the ancient accomplishments were built with slave labor or other kind of forced labor. This is the day of
the knowledge worker (Drucker, 1959). People who work with their brains are critical to the success of
most, if not all current organizations.
Koontz (1961) attempted to summarize most management schemes that are in use today. He called
them “Schools of Management Thought.”
They are the:
• Management Process School
• Empirical School
• Social Systems School
• Human Behavior School
• Mathematical School
• Decision Theory School
Research by Mintzberg (1971) indicates that these activities do not adequately describe what a man-
ager does in organizations he studied. Mintzberg found more communication activities such as “figure-
head” and “spokesperson” and other activities such as “disturbance handler and resource allocator. The
“management activities” do seem to be helpful in providing a conceptual framework to describe manageri-
al activities. In other words, they form a good starting point in describing management.
34
Managing Knowledge Workers
2. The Empirical School—The Empirical School is promoted by the Harvard Business School. It uses
case studies of actual situations to train and educate future managers and organizational leaders. Prin-
ciples of management are formulated based on experiences either actual or resulting from studies of
real situations. The case study approach allows students to learn from managers’ successes and failures.
Studies of cases allow students to begin forming their own “principles” of management.
3. Social Systems School—This school of management thought examines how workers perform in
groups or teams. The Hawthorne Experiments was the initial study for this way of looking at man-
agement. The Hawthorne Experiments showed that both external conditions such as lighting and
work rules affect productivity, but so does how teams relate to organizational goals. Achieving success
through group or team processes has been developed by many more researchers and theorists, includ-
ing Blake and Mouton (The Managerial Grid), Likert’s “Four Systems,” and Katzenbach and Smith
(The Wisdom of Teams).
4. The Human Behavioral School—This school infers that management is providing the environment
where people want to get the work done versus just expecting it knowledge workers work with their
minds. How they feel about their job influences their effectiveness. Individual theories of this school
include the motivation research of Herzberg (Motivators and Hygienes), Maslow (Hierarchy of Hu-
man Needs), McGregor (Theory X and Theory Y), McClelland (The Urge to Achieve) and others.
5. The Mathematical School—This school attempts to model a significant portion of an organization’s
systems. Mathematical techniques such as linear or non-linear programming are then used to opti-
mize each system to get maximum productivity. Modeling a significant portion of the organization’s
functions is a formidable task. Regardless, proponents of this school forge ahead. Several university
EM programs focus on this school.
6. Decision Theory School—Decision Theory seeks to determine strategies for unique situations likely
to be encountered by an organization. Decision rules that yield the best result for the broadest array
of situations are used to select the best strategies. Probability of the occurrence of each situation is
estimated and enters in the decision process. This school is prevalent during election years. Research
programs are considered depending on which candidate may win a major office. For example, if a
Democratic candidate should win, environmental research may be funded at a higher level. If the
Republican candidate should win, new weapons systems may receive additional funding. Both univer-
sities and private contractors use decision theory to assist in resource allocation for potential future
projects and project proposals.
4.1.2 Summary
Each school of management thought makes significant contributions to the study and practice of man-
agement. Many of these schools are taught without referring to the others. The case study approach is a
valuable tool for teaching management concepts. Linear and non-linear programming can solve problems
other schools cannot approach. It is important to know when any one school is applicable to a situation
existing in an organization.
35
Engineering Management Handbook
The Integrated Management Model is shown below in Figure 4.1. It has five elements. The overall
interpretation of the model is that management is composed of management systems, the organization
structure and a people (knowledge worker) orientation. These are inter-related building blocks. The exter-
nal and internal business environments impact them.
• Customers » Management
• Competitors Management Systems » Employee
demographics
• Suppliers
(age, etc.)
• Community Org. Structure » Skills
• Regulators » Facilities
• Funding People Orientation » Structures (levels)
agencies
Each of these must be known and dealt with strategically. For example, a strong customer may ver-
tically integrate and become a competitor. A supplier may give competitors better prices. Competitors’
research and development programs may yield a better, cheaper product. The community may support
a local organization or may attempt to put unfavorable regulations in place. Maintaining favorable local
relations is important. These entities are a fundamental part of a strategic plan. Threats and opportunities
are developed from an analysis of the external environment.
36
Managing Knowledge Workers
A strategic analysis of the internal environment yields strengths and weaknesses. The resources avail-
able to an organization impact the management of that organization.
The higher the technology level in use, the faster communications must be. This is associated with
relatively flat structures. Complex, tall structures do not tend to thrive in rapidly changing business envi-
ronments.
37
Engineering Management Handbook
raised concerns about what is considered normal management practice. If there is any semblance of truth
in Argyris’ work, those guiding EM programs must be very careful about what they teach as being accept-
able practice.
After World War II, many behavioral theories were developed. The ill-fated “human relations” move-
ment spawned much research which has proved to be beneficial but not the total answer. We will explore
the major behavioral concepts that apply to knowledge workers by engineering managers. Concepts
developed by Douglas McGregor, Abraham Maslow, Frederick Herzberg and David McClelland will be
discussed in depth.
Neither assumption should be assumed to be good or bad. They were assumptions that formed the
bases of decisions. McGregor observed that management made these assumptions about its workers and
made decisions based on the assumptions. If the assumptions were in error, workers developed resent-
ment that management never understood. Problems arose when assumptions became reality. If a man-
ager assumed that workers could not be trusted and made decisions based on that assumption, workers
responded to how they were treated. They became like the assumption. Likewise, if there are assumptions
that the workforce strongly supports the organization, workers tend to value the relationship and respond
positively. McGregor observed that management made work rules governing access to facilities and adher-
ence to job descriptions as if the workers needed close supervision or could not be trusted. In most cases
the Theory X assumption became a self-fulfilling prophecy. Knowledgeable, capable workers acted as if
they needed to be told what to do when in fact they knew very well what needed to be done, many times
better than management. McGregor exposed hidden potential that organizations are missing due to their
unwarranted assumptions.
self-
actualization
morality, creativity,
spontaneity, acceptance,
experience purpose,
meaning and inner potential
self-esteem
confidence, achievement, respect of others,
the need to be a unique individual
love and belonging
friendship, family, intimacy, sense of connection
physiological needs
breathing, food, water, shelter, clothing, sleep
39
Engineering Management Handbook
The first is the physiological level. Maslow observed that unless the physiological needs are met, no
other needs motivate an individual. Once these needs are met, then the individual seeks to meet safety
and security needs. When any need is substantially (approximately 85%) met, then individuals seek the
next higher level.
The higher level needs are more long-term than physiological needs. A good job and adequate hous-
ing normally meet the safety and security needs. After those needs are met, Membership (love and belong-
ing) needs will be sought. Because employment meets the Safety and Security needs, the new employee
will likely seek to join a group. A union will be attractive to many individuals. Others may be satisfied by
being a part of a close-knit project team or by participating in company-sponsored sports leagues.
After Membership needs are substantially met, we are motivated to seek Esteem needs; first self
esteem, then public esteem. At this point, it is not enough to be a member of an organization; we want to
be recognized as a leader or as a superior member in some way.
Finally, after Esteem needs are met, we desire to achieve Self Actualization. At this level we are con-
tributing not only to the organization but also to the good of the industry, mankind or some other higher
level good. We work to contribute and are recognized as an expert in some field.
According to Maslow, workers are motivated to achieve the next level in the hierarchy. The organi-
zation must recognize this and initiate efforts to assist this process. The organization benefits when its
members are advancing up Maslow’s Hierarchy. In 2011, researchers from the University of Illinois put
the hierarchy to the test. They found that fulfillment of needs strongly correlated with happiness. Between
2005 and 2011, via the Gallup World Poll, they surveyed people from 155 countries representing every
major region of the world. They concluded that while Maslow’s “hierarchy of needs” suggests that basic
needs must be fulfilled before higher needs are pursued, their study indicated that people benefit from sat-
isfying any of these needs in any order. They further reported that self-actualization and social needs were
important even when basic needs were unfulfilled. There are many cautions for management by under-
standing the Hierarchy. Management is most likely at one of the higher levels. Most workers are at a lower
level and seeking different needs than management. Workers may be seeking to fit in at the membership
level whereas management is dedicated to the organization at the self-actualization level. Management
must recognize where workers are on the hierarchy and assist them in reaching the next level. This should
promote better understanding throughout the organization. Positive actions by management should come
from this increased understanding.
Dr. Herzberg determined that because only motivators motivated employees, the best that could be
expected from hygienes was neutrality. Hygienes are primarily dissatisfiers but if are at a reasonable level,
they may be able to lead to neutrality in employee motivation.
If management observes a problem in employee motivation, consideration might be given to a higher
focus on motivators such as more equitable recognition or the opportunity to advance—that is to learn
how to accomplish more challenging tasks or to increase responsibility. Additional hygienes are short-term
and will likely make matters worse.
Herzberg observed that management frequently attempts to use hygienes to motivate the workforce
but an increase in hygienes only raises the anticipation of further increases. Costs rise but motivation and
productivity do not. The motivators are more difficult for management to apply but are not as expensive
as hygienes. He further observed that hygienes must be maintained at an appropriate level to prevent
dissatisfaction but they cannot motivate.
The Herzberg study has been replicated many times with similar results for subjects in different pro-
fessions, countries, and cultures. A study of blue-collar workers showed similar overall results but hygienes
were of more importance and motivators were of slightly less importance than in other Herzberg studies.
These workers were labeled nAchievers (nAch) because they exhibited a need to achieve. The second
group was described as follows:
• They stayed home for a while.
• The checked the newspaper for jobs similar to the ones they lost.
• They checked with state and federal and state employment agencies.
• They met in small groups to see if anyone had heard that the plant was reopening or if another com-
pany had bought it.
McClelland labeled this group as nAffiliators (nAff) for their need to affiliate. There was a group
discovered in another study—the nPower (nPow) group. They were motivated by the need for power
independent of achievement.
McClelland discovered that organizations tend to take on the characteristics of its workers. Some are
achievement oriented while some are more affiliating organizations. Organizations need to examine their
recent recruits to determine what kind of employees they are attracting. Organization productivity and
success are products of its workforce but may not be achievable if the organization has the wrong kind of
employees—nAffiliators, and fewer nAchievers.
41
Engineering Management Handbook
McClelland has had success in training company workforces to become nAchievers. Apparently, peo-
ple can be trained to become nAchievers.
McClelland further suggests that these concepts can be used to describe whole countries. There is
little doubt that the US was, at one time, populated by nAchievers. One can but wonder if that prepon-
derance of achievers is still in evidence.
According to Skinner’s theory, if a manager sees a behavior that is favorable to the organization, the
behavior should be rewarded. The reward need not be financial, but that is not excluded. A favorable
comment, a write-up in the company newsletter, a mention before employees in the same department,
etc. can be used to good effect by the alert manager.
The second statement of the theory is significant. If a manager ignores positive accomplishment, he or
she runs the risk of “extinguishing” it. Negative behaviors may be ignored and thereby discouraged as long
as positive behaviors are rewarded. This does not mean ignoring violation of rules or failure to follow pre-
scribed methods or procedures. They are dealt with according to policy. It is assumed that many negative
comments and attitudes are an attempt to get attention. If the attention is not given, the behavior is likely
to be “extinguished.”
Behavior that is punished generates a negative, fragmented response. This is interpreted that the per-
son being punished perceives that the punishment is not deserved, above what others doing similar things
get. This type of punishment causes a backlash, perhaps not immediately but sooner or later. That is not
the intent of the action (punishment) but such is likely to happen. The manager has to always make sure
that the offense merits the punishment. The offender should expect the action taken.
42
Managing Knowledge Workers
Each generation brings its own view of the world, which creates both threats and opportunities for
organizations. Effective managers will learn to work with these diverse groups by understanding work
styles, considering generational values, sharing perceptions, finding commonality, and learning from each
other.
43
Engineering Management Handbook
4.3.9 Summary
Maslow’s Hierarchy of Human Needs, McGregor’s Theory X and Theory Y, Herzberg’s Motivators and
Hygienes, and McClelland’s Achievers and Affiliators may at first glance seem to be independent concepts.
They are different approaches that are very complementary.
For example, Maslow’s Self Actualization and Esteem Needs are closely related to Herzberg’s Motiva-
tors. Theory Y is a natural way of thinking about such employees who tend to be nAchievers.
Those having membership and security needs tend to focus on hygienes, to be nAffiliators and per-
haps assumed to be described by Theory X. These overlaps are shown in Table 4.1.
In order to motivate knowledge workers, Theory Y must be assumed; self actualization must be en-
couraged with opportunities; there must be a focus on motivators and achievement.
In order to limit dissatisfaction, membership activities should be assisted; Theory X assumptions must
be avoided and hygienes should be provided at as high a level as can be reasonably afforded.
Argyris further identified four common classical organization concepts and compares the result of
using them with the traits of normal personality development listed above.
• Division of labor—The individual sells skills rather than total abilities
• Chain of command—This tends to make individuals dependent, passive
• Unity of direction—This is leader oriented, not a function of workers
• Span of control (usually 4 to 8)—Adds levels to the organization, thus increases dependence
44
Managing Knowledge Workers
3. The result will be inter-subordinate hostility, rivalries, and a focus on parts of the organization rather
than the whole.
If there is any truth to these hypotheses, and many believe that there is, there must be management
concepts that use the whole ability of individuals that will not generate such problems. The concepts that
use total abilities are discussed in the next sections.
He documented the concepts used by the most successful organizations and continuously compared
them with those of less successful organizations.
He concluded that high producing organizations and their managers managed differently than man-
agers of low producing organizations. Managers using classical management theories were less successful
than those managers who managed in a way that will be discussed.
In short, those managers who demand success don’t get it. Those managers who allow employees to
be successful are in successful organizations.
45
Engineering Management Handbook
This type of manager is with his or her employees rather than just being above them. This manager is
heavily involved with both the work and the employees.
The manager’s work (in high producing organizations):
• Plans and schedules work, trains employees, supplies subordinates with required material, tools and
information required for them to be successful
• Provides technical competence when needed
• Develops subordinates into a working team, uses participation and group leadership practices.
46
Managing Knowledge Workers
C
B D
C
This is the way unenlightened managers deal with their employees. This is frequently true organiza-
tion wide. They know no other way of supervising.
A simplified representation of a team-based organization is shown in Figure 4.4. Characteristics of a
team-based organization include:
• The good of the organization as a whole is easy to relate to.
• Communications are with the whole group, filtering is not possible.
• Vigorous debate focused on the issues generates better decisions.
• Sharing of resources is looked upon with favor as it allows unnecessary unit cost to be reduced by
loaning employees to units in greater temporary need.
• Decisions are better supported. Even those whose recommendations are not followed had input
and know the other positions and can generally support the decision.
47
Engineering Management Handbook
The results of an organizational communications study was released several years ago. Typically there
is communication loss from the top level down.
When top management communicates:
• Middle management receives 67%
• General manager receives 50%
• Supervisor receives 33%
• Worker receives 20%
This indicates that those at the base of the organization receive very little accurate information that
emanates from the top. Likert’s Team Management concept seeks to improve on this kind of organization
communication. Another significant question is: “What are the similar percentages going from the bot-
tom of the level to the top?” That is easy. It doesn’t happen, so it is zero. Team Management can improve
that situation also.
48
Managing Knowledge Workers
No one has actually surveyed the population of current organizations, but it is widely believed that
most organizations are somewhere in System II. A few organizations can be described as using System III.
Organizations using System IV are rarely found.
Likert believed that in assessing the value of an organization that the value of the human asset must
be assessed. A layoff is a liquidation of a valuable asset just as surely as selling equipment, land, facilities or
inventories; except that the latter can be easily replaced and the human asset cannot.
Valuation of the human asset involves:
• Recruiting costs
• Training costs
• Familiarization costs
• Capability costs
• Development costs
All these are lost when human resources are liquidated. Many of these costs will have to be paid again,
at a higher rate, without the guaranty that the work will be done as well.
Likert’s philosophy: Attitudes and skill generate productivity. He observed that the management
systems that an organization uses drive attitudes. Attitudes generate productivity and profits. In other
words, attitudes impact productivity and profits. System IV obviously has much in common with Theory
Y, Self-Actualization, Motivators, etc.
These managers:
• Used teams extensively
• Confronted issues to resolve conflict
• Got extensive input from employees
• Developed employee capabilities.
1-1 Avoids decisions and uses “policies” instead of positions. Do such managers really exist? Unfor-
tunately, they do. They hide behind policies and avoid confrontation. They certainly aren’t oriented to
toward production either. They stay in their offices a lot. Conflict resolution is to ignore the conflict.
1-9 The country club manager tries to keep people happy. These managers hope that production will
take care of itself if employees are “happy”. They are attempting to meet goals by manipulating employees.
Conflict resolution is to sweep problems “under the rug.”
9-1 This is the autocrat position. He solves problems by edict. It is production first. People are hired
to get the work done. Conflict resolution is “my way or the highway.”
5-5 This type of manager views people and production equally but is not strong on either. This is a
bureaucratic, status-quo position. There are more managers in this position than all others according to
standardized tests. They tend to solve problems by compromise.
9-9 This is the team manager position. She uses teams to gather and share information and to identify
and solve productivity problems. There is a natural balance between people and production. She works to
solve problems by confronting them.
1,9 9,9
concern for people
5,5
1,1 9,1
concern for production
50
Managing Knowledge Workers
Results
Only managers with strong concerns for both people and work were in high productivity units. The
managers:
• Used teams extensively
• Confronted issues to resolve conflict
• Received extensive input from employees
• Developed employee capabilities
4.5 Summary
Notice that all of the studies that have been discussed reach similar conclusions. Argyris shows that tradi-
tional management doesn’t work very well. As shown in Table 4.2, efforts to get high productivity under
classical principles are not successful. Likert’s system IV had similar constructs and results as Blake and
Mouton’s Managerial Grid 9-9 position.
It should also be noted that concepts in this chapter correlate with those in Chapter 2. Managers
making a Theory Y assumption and a focus on motivators will likely use Likert’s System IV and have a 9-9
management style on the Managerial Grid.
4.6 References
Argyris, Chris, The Individual and Organization: Some Problems of Mutual Adjustment, Administrative
Quarterly, vol. 2, June 1957.
Blake, Robert, and Mouton, Jane, The Managerial Grid, Houston: Gulf Publishing Co., 1964.
Drucker, Peter, The Effective Executive, The Definitive Guide to Getting the Right Things Done, Harper Busi-
ness Essentials, 1966.
Fry, Richard, Millennials Surpass Gen Xers as the Largest Generation in U.S. Labor Force, Pew Research
Center, 2015.
Herzberg, Frederick, “One More Time: How Do You Motivate Employees,” Harvard Business Review,
January- February, 1968.
Koontz, Harold, “The Management Theory Jungle,” Journal of the Academy of Management, December
1961.
Likert, Rensis, New Patterns of Management, McGraw Hill, Inc., 1961.
Maslow, Abraham H., “A Theory of Human Motivation,” Psychological Review, 1943, p. 50.
McClelland, David, “That Urge To Achieve,” Think Magazine, 1966 by the IBM Corporation.
McGregor, Douglas M., “The Human Side of the Enterprise,” Management Review, November 1957.
Mintzberg, Henry, Managerial Work: Analysis From Observation, Management Science, vol. 18, no. 2,
October 1971.
Pink, Daniel H., Drive, The Surprising Truth About What Motivates Us, The Penguin Group, 1995.
Skinner, B. F., Science and Human Behavior, New York: McMillan, 1953.
Tay, L., and Diener, E., Needs and subjective well-being around the world, Journal of Personality and
Social Psychology, 2011.
51
52
Types of Intellectual Property
5
Types of Intellectual Property
Donald W. Merino
Transpacific Advisors
53
Engineering Management Handbook
5.1 Introduction
There are at least four types of intellectual property that are commonly used today. They are copyright,
trademarks, trade secret, and patents. In order to understand the value of patents and how they fit into
the landscape, a review of the various types of intellectual property is required.
5.2 Copyrights
The first type of intellectual property is copyrights. A copyright is a legal right created by the laws of a
particular country. This grants the creator of the work exclusive rights to use and distribute this work.
Typically, this is a limited time right. The right is applicable to any express representation of a creative
work. It can be shared among multiple authors, where each one has the right to use the licensed work.
These are called “rights holders.”
Other rights frequently included in copyrights include control over derivative work, distribution,
public performance and what is called “moral rights”. Moral rights are unique and typically seen in
Europe but are now becoming more common around the world. Basically, a moral right is a right that
preserves the integrity of the work and bars alteration, distortion or mutilation of the work. Much of
the fight over the colorization of black-and-white films was a battle over “moral rights.”Copyrights came
about with the invention of the printing press. The legal concept originated in England in the 17th centu-
ry with the “Licensing of the Press Act” in 1662, which was an act by Parliament. Since then the law has
been further modified and codified.
One of the best examples of where copyright protection is found is in the U.S. Constitution. In
1787, the U.S. Constitution included a clause:
“to promote the progress of science and useful arts” found in Article 1, Section 8, Clause 8 of the U.S.
Constitution. This clause gives Congress the right:
“to promote the progress of science and useful arts, by securing for limited time to authors and inventors
the exclusive right to their respective writings and discoveries.”
This clause in the U.S. Constitution is the basis of copyright and patent law.
What is the justification for creating copyrights? It is to enable the creators of intellectual property to
create wealth to financially support themselves and, hopefully, to continue to create new works. Examples
of copyrighted materials include songs, paintings, books, movies and photographs. One distinction of
copyrights compared to patents for example, is that copyrights do not cover the idea or the information
itself but rather how those are expressed. For example, in a typical story where boy meets girl, boy loses
girl, boy gets girl back, the “Arc of the Story” is not copyrightable but the actual story and characters are.
Since copyrights are protected by law, there are exclusive rights usually attached to them. These in-
clude the right to:
• Produce copies and to sell those copies
• Import or export the work
• Create derivative works
• Perform or display the work publicly
• Sell the rights to others
• Transmit or display the work by radio or video
Because of these rights, copyright holders can become extremely wealthy. For example, it is often
the songwriter who is the wealthiest member of any band. The Beatles member, Paul McCartney, is far
wealthier than Ringo Starr because he wrote many of the famous songs that the Beatles and others have
performed. Every time you hear songs like “Hey Jude” or “Let it Be” on the radio you can be assured that
Paul McCartney is obtaining payment for that broadcast. Interestingly, the richest songwriter today is
Andrew Lloyd Webber who rarely performs at all but only writes the songs that others perform.
The duration of copyrights varies by country. In the United States copyrights have increased in duration
initially starting at 28 years and currently running the life of the author and +70 years after the author’s death.
54
Types of Intellectual Property
In the case of joint works, a copyright lasts 70 years after the last of the joint owners dies. And in the case of
what is called “anonymous works” or “works made for hire” the term is 120 years from the year of creation.
For many years software inventions were considered un-patentable and instead were protected by
copyright. As the wealth of software companies grew software became patentable. It wasn’t until 1996
that the U.S. Patent and Trademark Office (USPTO) issued guidelines for examining computer-related
patents. Over the last 30 years the number of patents granted per year in USPTO class codes that relate to
computer-implemented inventions has grown from less than 1,000 to over 17,000.
5.3 Trademarks
The next form of intellectual property is the trademark. A trademark is a recognizable sign or design or an
expression that identifies a product or service from a particular source. Most sources agree that trademarks
were first used by blacksmiths when they made marks to identify which blacksmith made which sword.
During the reign of Henry III in 1266, the English Parliament required all bakers to use a distinctive
mark for the bread they sold. This could probably be considered the first trademark legislation.
Modern trademark laws began to emerge in the late 19th century particularly in France when they
passed the “Manufacture and Goods Mark Act.” England in 1862 passed a similar law called the “Mer-
chandise Marks Act.” In the United States Congress first attempted to establish a trademark system in
1870 relying on Article 1, Section 8, Clause 8 of the United States Constitution. The U.S. Supreme
Court struck down this first attempt because it did not agree that a trademark would promote the prog-
ress of science and useful arts. In 1881 Congress instead passed the new trademark act that was pursuant
to the commerce clause powers. This basic act has been modified through the years.
The law considers trademark to be a form of property. These rights are established through actual use
in the marketplace or through registration with a trademark office. Depending on the country, a trade-
mark can be established by either or both means. Some jurisdictions do not recognize trademarks through
use of the trademark. In other countries the holder of the right will not be able to enforce his or her right
through trademark infringement proceedings unless the trademark is registered. In the United States the
trademark rights registration process requires the examination of the trademark for compliance.
Once a trademark is obtained there are a series of rights that are conferred upon the owner. These
rights typically include the right to exclusively use of the mark for products and services created. In
most countries the law also allows the owner of a trademark to stop others from using his or her mark in
relation to products or services that are identical or very similar to his or her product. The test is usually if
there is any sort of confusion on the customer side as to the source of the product. One interesting aspect
of trademarks is that trademarks must be maintained by actual use. In most countries if the trademark is
not used for five years it is considered to be abandoned. Additionally, in many jurisdictions it is required
that the trademark owners defend their trademark from other infringers.
When the author was working at Intel Corporation he had a front-row seat to one of the best ex-
amples of trademark and trademark enforcement. One of the issues for Intel was that, as a component
manufacturer, its ability to distinguish its product was limited. For example, how many of us open the
computer we use and look inside at the chips? Not many, unless we are engineers.
In 1991 Intel created the “Intel Inside” brand program. Many case studies can be found that describe
the details of this program and its success. Intel then set about to convince the computer manufacturers
that if they featured an Intel microprocessor the customer would see value in that. Part of the strategy was
to “co-market” with their customers to highlight the “Intel Inside” brand.
Separately, Intel also created very aggressive trademark enforcement. Intel was able to establish
through its protection process that anything that was “blank - Inside” would create customer confusion
and therefore would need to change its trademark. For example, there was a group in California called the
“Yoga Inside Foundation,” which provided yoga instructions to at-risk juveniles. Intel was concerned that
“yoga inside” would likely cause confusion and/or dilute Intel trademark rights. Ultimately, “Yoga Inside”
changed its name to “Yoga on the Inside” and reached an agreement with Intel to stop legal action.
Why would Intel risk the wrath of the public by being so aggressive? The answer is the value of the
Intel trademarks. The Intel name and the Intel Inside program were considered one of the four pillars that
55
Engineering Management Handbook
kept Intel’s margins so high. The Intel trademark and brand recognition was probably the strongest pillar
of Intel’s business. While there are many ways to measure the value of the brand, Intel has for many years
been one of the top 10 most valuable brands. In 2013, Intel was listed as the ninth most valuable brand
and the value of the brand was in excess of $37 billion. This would make up between 20% and 30% of
Intel’s total market capitalization, a very significant number indeed.
Has been subject to reasonable steps under the circumstances by the person lawfully in control of
the information to keep it secret.”
In 1970s the US Supreme Court allowed states to freely develop their own trade secret laws. In
response to this many states adopted the Uniform Trade Secrets Act (UTSA). This law has been further
amended and currently 47 states in the US have adopted it as the basis of their trade secret law.
Thus, in the U.S. trade secret law is a law both on a state-by-state basis and at the federal level. At the
federal level the US developed the Economic Espionage Act of 1996 (18 U. S. C. Chapters 1831-1839).
This is a law that has used the example definition of a trade secret above.
Most countries in the world are signatures to the international agreement on TRIPS. TRIPS is an in-
ternational agreement administered by the World Trade Organization (WTO) and attempts to set a series
of standards for intellectual property regulation for all members of the treaty. While the TRIPS agreement
calls for standardization for copyright, patent and trademark protections, it also calls for the protection
of undisclosed information in Section 7 Article 39. While the TRIPS agreement is rather general, it does
form the basis for protection of trade secrets throughout the world.
56
Types of Intellectual Property
So what does one have to do to create a trade secret? Distinguished from other types of intellectual
property there is no registration requirement for a trade secret. Rather it is up to the company or individual
to keep the information secret and to protect it. When one says that it must be kept confidential, it does not
mean that the information cannot be shared, but that a company must take care in disclosing that infor-
mation. For example, the use of non-disclosure agreements and non-compete agreements helps companies
disclose trade secrets to others, for example vendors and employees, while maintaining their confidentiality.
Often companies need to decide what information should be patented and what information should
be kept as a trade secret. If a trade secret is successfully kept as a secret there is no time limit imposed and
the trade secret can last for an indefinite period of time. But a trade secret can be legally reverse engi-
neered and/or if that trade secret becomes common knowledge due to other people’s research, then it
will no longer be a trade secret. For example, the recipe for Coca-Cola has been kept secret for over 100
years and to date no one has been able to reverse engineer the Coca-Cola recipe. Interestingly, in 2006 a
Coca-Cola employee tried to sell the recipe to Pepsi. To Pepsi’s credit they notified Coca-Cola officials and
the employee was arrested.
So, while recipes are a clear example of a trade secret, what are some of the other examples? Certain
methods and processes can be considered trade secrets. For example, how the New York Times determines
which books will be on its bestseller’s list is a method that the New York Times considers a trade secret.
Additionally, many kinds of business information can be considered trade secrets; for example, how a
company determines its pricing for certain products, a company’s marketing strategy or customer lists.
Also, designs and methods can be considered trade secrets.
When a trade secret is stolen or misappropriated there are number of penalties that can be imposed.
Many states as well as the U.S. federal law include both imprisonment and fines for stealing trade secrets.
Additionally, the federal law and many state laws also call for forfeiture of any profits obtained from the
stolen trade secret. This law applies not only to the person who steals the trade secret, but also to anyone
who tries to buy the trade secret knowing that it was stolen. In many trade secret cases today the person
who is the violator is the person who wants to sell the stolen trade secrets.
One interesting problem that most companies face is the question “should I file a patent on an inven-
tion or should I keep it a trade secret?” There are pros and cons to both courses of action. Much depends
on the product and some depends on the ease of reverse engineering. In the chemical and pharmaceutical
industries most companies elect to patent inventions because reverse engineering is relatively simple. In
the electronics industry most companies chose a mixed strategy. In other words, companies will patent
certain inventions and at the same time keep some inventions as trade secrets. The more complex the
product the more inventions are usually needed to make the product work.
5.5 Patents
What is a patent? According to the World intellectual Property Organization (WIPO), a patent is an
exclusive right granted for an invention. The invention is a product or process that provides, in general, a
new way of doing something or offers a new technical solution to a problem. To receive a patent, techni-
cal information about the invention must be disclosed to the public. The principle of a patent is that the
patent owner obtains from a government agency the exclusive right to prevent or stop others from using
the patented invention. In other words, patent protection means an invention cannot be commercially
made, used, distributed, imported or exported by someone without the patent owner’s consent. Patents
are territorial rights that are the exclusive rights applicable in the country or region where a patent has
been filed and granted. Generally, a patent is granted for a limited period of time, mostly 20 years from
the date the application is filed.
Why do countries grant patents? In general it is because patents represent a bargain between the govern-
ment and the inventor. That bargain is: the inventor is willing to donate his or her invention to the public;
the government, in return, will grant a monopoly right for the invention. Why does this make sense? It
makes sense because throughout history there have been technologies that have been lost to mankind. These
include Stradivarius violins, Damascus steel, Roman cement and a number of herbal drugs. Let’s look at a
few of these cases.
57
Engineering Management Handbook
Stradivari violins are considered some of the best musical instruments ever built. Approximately 1000
of these were produced by the Stradivari family between 1650 and 1750. Today many of these violins are
worth millions of dollars and there are only around 600 of these instruments left. The name Stradivari is
one of the most prized brand names even today. The problem is that the technique for building a Stradi-
vari violin has been lost.
Another example is Roman cement. Modern concrete was developed in the 1700s and is a simple
mixture of cement, sand, water and rocks. But this recipe, invented in the 1700s, was not the first time it
was invented. In fact, concrete was widely used by the Romans over 2000 years ago. The Roman mastery
of concrete allowed them to build many of the famous structures that we associate with the Romans like
the Coliseum, the aqueducts and the Roman baths. Like many technologies of the Greeks and Romans
this technology was lost during the dark ages. Why it was lost we will never know; some believe it was
a trade secret of stonemasons. What is the most interesting is that Roman cement has certain qualities
that are different and better when compared to traditional cement that we use today. Structures like the
Coliseum in Rome have managed to last for thousands of years while many modern structures are known
to wear down much faster. Many believe that this is the result of different chemicals the Romans added to
their cement, including things like milk and blood. It is believed that these different chemicals allow the
material to better expand and contract with the heat and cold. Unfortunately, we will never know because
the written recipe of the method is lost.
The history of patents can be traced back to the concept of “Letters Patent.” A “Letters Patent” was a
royal decree that granted something to somebody. Throughout history, Letters Patent were used to grant
property to individuals. Additionally, in the 1300s Edward III decided to grant “letters of protection” to
various artisans to encourage them to come to England and develop their skills within England.
The first evidence of a “letters of protection” appeared in 1331 when King Edward III granted one
to John Kempe, a Flemish weaver, as part of the effort to encourage foreign artisans to settle in England.
Apparently, other craftsmen were encouraged to immigrate to England and were offered similar privileges
that included clockmakers from Delft and craftsmen in the metalworking field who could help manufac-
ture cannons and gunpowder. Another example was the grant by Henry VI in 1449 to John of Utynam,
a Flemish man, who was skilled in the art of making stained-glass. Other examples outside of England
include a patent awarded by the Republic of Florence to an architect for a barge and hoisting gear that
was used to carry marble along the rivers. That patent was a three-year patent.
By the 1450s the growing city state of Venice began issuing patents for new and inventive devices; the
period of protection was for 10 years and was mostly in the field of glassmaking. As these Venetian crafts-
men began emigrating to new countries they sought similar patent protection in their adopted countries.
The king of France introduced the concept of publishing a description of the patent a century later.
The English patent system evolved from those humble beginnings into the first modern recognizable
patent system. In the 16th century it was common for the British crown to grant letters of patents or mo-
nopolies to their favorites or to people who were prepared to pay for them. The power to grant monopo-
lies was used to raise money for the crown and was widely abused as the king granted patents to all sorts
of common goods like salt and starch. After a certain amount of public outrage, James I of England was
forced to revoke all existing monopolies and declared that the grant of “Letters Patent” could only be used
for “projects of new invention.” This was incorporated into the “statute of monopolies,” which was passed
in 1624. While the statute has been considered a key foundation of patent law, it also marks the transition
of England’s economy from a land-based agrarian feudal system to that of industrial capitalism.
Through the process of judicial interpretation of the law important developments emerged in the
18 century. During the reign of Queen Anne patent applications were required to supply a complete
th
specification of how the invention worked. This complete specification would be available to the public.
Legal battles in 1796 occurred over the steam engine. James Watt was a Scottish inventor and mechanical
engineer who made significant improvements to the Newcomen steam engine. He had realized that the
current engine designs wasted a great deal of energy by repeatedly cooling and heating the cylinder. Watt
introduced a design enhancement that used a separate condenser and this radically improved the power
efficiency and cost-effectiveness of steam engines. Eventually, he got his engine to produce rotary motion
which greatly increased the use of the steam engine beyond just pumping water. Edward Bull, the origi-
58
Types of Intellectual Property
nal manufacturer that Watt used, started making his own design of the steam engine and then challenged
Watt’s patent on enforceability when Watt tried to stop him from producing his design. Bull believed that
Watt had not invented the steam engine but had just improved the existing steam engine and the ques-
tion whether or not an improvement could be patented became the issue of the case. The judges in 1799
issued a decisive opinion in favor of Watt and the concept of patenting an improvement was accepted.
As discussed in the section on copyrights the “patent and copyright clause” of the U.S. Constitution
was proposed in 1787 by James Madison in the Federalist papers (Federalist No. 43). Madison wrote:
“the utility of the clause will scarcely be questioned. A copyright of the author’s has been solemnly
adjudged, in Great Britain, to be a right of common law. The right to useful inventions seems with
equal reason to belong to the inventors. The public good fully coincides in both cases with the
claims of the individual”.
The first patent act of the U.S. Congress was passed April 10, 1790 and is titled “An Act to Promote
the Progress of Useful Arts.” The first patent was granted July 1790 to Samuel Hopkins for producing
potash. The act called for the Secretary of State, the Secretary of War and the Attorney General or any
two of them to decide if the invention is useful and important and the cause of the letters of patent to
be issued. Additionally, in this act it set up the need to have a specification in writing and a model to be
delivered and filed in the office of the Secretary of State. The requirement of the model was dropped later
in the century. The act called for the monopoly to last for 14 years once issued. From these humble begin-
nings the patent system was borne and a separate patent office to examine patents was created in 1802.
Patent rights became more international upon the signing of the “Paris Convention for the Protection
of Industrial Property” in 1883. This convention is still in force. As of September 2014 it had 176 mem-
ber countries. The convention called out three main ideas: national treatment of intellectual property,
priority right and common rules.
The first of these is “national treatment,” which means that when an application is filed for a patent in
a foreign country, the applicant and application will receive the same treatment as if they lived and were
born in the country that they are seeking the patent in. For example, if an American citizen files a patent
in Germany, the German government cannot treat that American citizen and his patent application any
differently than it would treat a German citizen. Also, if the patent is granted, the owner will benefit from
the same protections and legal remedies as if the owner were a national in the country where the infringe-
ment occurred. The next element of the convention is the “priority right.” Here the convention calls for
the priority right (or priority date) as the first filing date that would have the same priority date in another
country so long as the application is filed within 12 months of the patent.
From this first convention a number of other treaties, international treaties and agreements have been
established. The “Patent Cooperation Treaty” (PCT) signed in 1970 establishes an international patent
filing system that makes it possible to seek patent protection for invention simultaneously in a number of
countries. (Currently, there are 148 countries that are signatories to the treaty.)
The “Patent Law Treaty” (PLT), signed in 2000, establishes common and maximum requirements
regarding many procedures and formalities related to national and regional patent applications and patents.
(Currently, there are 59 countries and the European Patent Organization who are signatories to the treaty.)
At this time there is a proposed international patent treaty called “The Substantive Patent Law Treaty”
(SPLT). This treaty, in contrast to the “patent law Treaty,” goes beyond formalities and seeks to harmonize
requirements such as novelty, inventive step, non-obviousness, and sufficiency of disclosure, utility of an
invention and claim drafting and interpretation. As of this writing this treaty is on hold.
The “Budapest Treaty” signed 1977 (currently there are 79 countries and the European Patent Organiza-
tion that are signatories to the treaty) concerns the international disclosure of biotechnological inventions. It
stipulates that for the purpose of patent the applicant must deposit the microorganism with an international
“depository authority.” This will ensure that there are examples of the organisms for future generations.
These treaties and others are administered by the World Intellectual Property Office (WIPO).
As was stated earlier, a patent is an exclusive right for invention. This exclusive right to the product or
process is only available if it is a new way of doing it or if it offers a new technical solution to a problem.
To receive a patent, the invention must be disclosed to the public in the patent application. Once a patent
59
Engineering Management Handbook
has been obtained the patent owner has the permission to license other parties to use the invention. The
owner may also sell the rights to someone else. If this is done then the new owner of the patent has the
same rights as the original inventor.
Once a patent expires the protection ends and the invention enters the public domain. In other
words, after the patent expires anyone can commercially exploit the invention without fear of infringe-
ment. During the period of protection it is the patent owner who has the right to decide who may or
may not use the patented invention. Patents can be granted in many fields of technology—everything
from computer chips, nanotechnology, chemical compounds as well as plants and everyday kitchen
devices. Patent protection is limited to a period of 20 years from the filing date of the application. Patents
are territorial rights; in general, the exclusive right is only applicable to the country or region where the
application has been filed and granted and only in accordance with the laws of that country or region. To
enforce his or her rights the patent owner has to take someone to court. In most systems a court of law
has the authority to stop patent infringement, but it is up to the patent owner to monitor, identify and
take action against infringers.
In order to obtain patent protection the inventor needs to meet certain key conditions. While it is
not possible to compile an exhaustive list there are five key conditions that typically must be met. First,
the invention must show novelty. That is, it needs to show some new characteristic that was not known
before and it must be different from the “prior art.” The invention must be “non-obvious”; it needs to be
something that someone who has ordinary skill in the art would not have known. The invention must be
useful. It has to go beyond a mere theoretical phenomenon and the subject matter of the invention must
be disclosed in a manner that is clear and complete and would enable someone with ordinary skills in the
art to replicate the invention. And lastly, a patent must be patentable under the law of the country. In
some countries scientific theories, mathematical methods, plant or animal varieties or computer programs
are not patentable, but in other countries they are.
There is no universal international system for granting patents. Rather, patents are granted by nation-
al offices or by regional offices that carry out that task for a number of countries. An example of a regional
office is the European Patent Office (EPO). Under these regional systems an applicant will request pro-
tection from one or more member states of the original organization. The regional office accepts a patent
application, examines the patent and if all criteria are met, it ultimately grants the patent.
sure that the application develops into a clear and complete record. He tries to act cooperatively with the
inventor to investigate the patentability of the idea according to patent laws. Ultimately, the examiner will
serve as a judge as to the patentability of the inventions claimed in the patent application. Based on that
the examination process is there to make sure that the examiner can understand the invention set forth in
the specification and determine if the application and specification is adequate to define the “metes and
bounds” of the claimed invention.
Additionally, the examiner will determine if the patent application is novel, useful, non-obvious and
patentable. The examiner will communicate with the applicant by writing Office Actions (OA), which
identify and analyze the patentability of claimed inventions. The applicant has the ability to respond to
these Office Actions and argue his case with the patent examiner. This back and forth is called “patent
prosecution.” In the end, the examiner is trying to answer certain questions about the application: what
subject area is most related to the applicant’s invention; what are the existing inventions the applicant
identifies; what problems did the applicant identify with the existing inventions; how does the applicant
propose to solve the problem; how does the applicant implement the solution and do the claims incorpo-
rate the applicant’s solution.
In the U.S. Patent Office, the applicant needs to decide what type of application to file.
a similar requirement to utility but there is a difference. Generally, to fulfill the requirement of utility for
patents, there are three main issues to review: the operability of the invention, the use of the invention that
must be beneficial, and the practical use of the invention. Operability is satisfied by enabling the invention
in the detailed description of the patent. The beneficial use must be that the patent is capable of providing
some benefit. In the past it was believed that beneficial utility established in a patent should not be granted if
frivolous or immoral or against public policy. But recently the patent office has taken the following position:
“A rejection under 35 U.S.C. 101 for lack of utility should not be based on grounds that the invention is
frivolous, fraudulent or against public policy” (Manual of Patent Examining Procedure 706.03(A) III). The
last issue is practical use; in other words, the invention must have some real-world use.
With utility patents there are two different types of applications that can be filed in the United States.
The first is the traditional non-provisional application. The second is the provisional application.
Since 1995 the USPTO has offered inventors the ability to file provisional applications for a patent.
A provisional application pendency lasts 12 months from the date it is filed. It cannot be extended and at
the end of the 12 months the provisional application expires. While a provisional application is inexpen-
sive one must understand that in order for it to be in force a non-provisional application will need to be
filed also. There are a few benefits to the filing of provisional but also some risks.
The benefits include a simplified filing at a lower investment that gives the inventor 12 months to
assess the invention and determine if additional investment should be made. Another benefit is that while
the provisional establishes the application filing date for the invention it also permits the usage of “patent
pending” notice for 12 months after the description of the invention is filed.
A provisional application begins the Paris Convention priority year and it also allows an inventor to
begin to promote the invention while having some degree of protection.
The risks are that the benefit of the provisional application cannot be claimed after or if the 12-
month deadline is passed and the provisional application cannot result in a U.S. patent unless the corre-
sponding non-provisional application is filed within 12 months.
Provisional application cannot be filed for design patents and provisional applications are not examined.
Oftentimes provisional applications have not completely disclosed the invention and therefore the parts of
the non-provisional application cannot claim benefit to what is not disclosed in the provisional application.
Inventors must understand that the provisional application will not mature into granted patent without fur-
ther submissions and cost by the inventor. Some unscrupulous invention promotion firms have misused the
provisional application process leading inventors to believe that they can obtain a patent inexpensively. These
firms instead take the money from the inventor and leave the inventor without a patent.
Different from a provisional application is a standard application. The standard application requires
all the necessary parts of the patent including a written description of the invention as well as the claims.
It should include all the information required to grant the patent. The application may or may not result
in a grant of the patent; it depends on the outcome of the examination of the patent office. Here we are
talking about application filing, preparation and prosecution, sometimes called “prep and process.”
G. The description shall first state the title of the invention as appearing in the request and shall:
i. Specify the technical field to which the invention relates;
ii. Indicate the background art which, as far as known to the applicant, can be regarded as useful for
the understanding, searching and examination of the invention, and, preferably, cite the docu-
ments reflecting such art;
62
Types of Intellectual Property
iii. Disclose the invention, as claimed, in such terms that the technical problem (even if not expressly
stated as such) and its solution can be understood, and state the advantageous effects, if any, of
the invention with reference to the background art;
iv. Briefly describe the figures in the drawings, if any;
v. Set forth at least the best mode contemplated by the applicant for carrying out the invention
claimed; this shall be done in terms of examples, where appropriate, and with reference to the
drawings, if any; where the national law of the designated State does not require the description
of the best mode but is satisfied with the description of any mode (whether it is the best contem-
plated or not), failure to describe the best mode contemplated shall have no effect in that State;
vi. Indicate explicitly, when it is not obvious from the description or nature of the invention, the
way in which the invention is capable of exploitation in industry and the way in which it can be
made and used, or, if it can only be used, the way in which it can be used; the term “industry” is
to be understood in its broadest sense as in the Paris Convention for the Protection of Industrial
Property.
In some patent offices, patent applications can also be filed as continuations to previous applications.
These are convenient methods to include material from previous applications in a new application. In
some cases the new application will take the priority year from the earlier patent. These are called “con-
tinuations.” Additionally, in the U.S., there is a method called a continuation-in-part application that
allows the applicant to add new material to the application. In this case an applicant would add subject
matter not disclosing the original patent but will repeat significant portions of the patent specification
and will share at least one inventor with the original patent. This is the way to claim enhancements that
were developed on the original invention. One of the odd situations is that in a “continuation-in-part” the
applicant is likely to end up with two priority dates—one for the original patent and another priority date
for the added material. The courts will use these two dates to determine the priority date of the patent and
therefore what prior part is applicable.
In some patent offices it is also possible to file what is called a “divisional patent application.” This
application also claims the priority of the filing date from the parent application but is a divisional and
claims distinct independent claims that are different from the parent application. Oftentimes division-
als are filed when the patent attorney determines that the specification covers more than one invention.
Additionally, the patent examiner may issue what is called a “restriction requirement” because a patent
can only claim a single invention. This would cause the applicant to file a divisional on all but one of the
inventions disclosed. It should be noted that continuations and continuations-in-part are a USPTO phe-
nomenon and generally not available in other jurisdictions. Divisional patent applications on the other
hand are often found in other countries.
63
64
What is a Patent?
6
What is a Patent?
Donald W. Merino
Transpacific Advisors
65
Engineering Management Handbook
made creating patents a priority and urges companies and individual inventors to invent and file patents.
While not a perfect market, many people believe that China will continue to strengthen its patent laws in
court and ultimately become a location where getting patents will become imperative.
The problem in architecting any portfolio is that there is no one simple solution. One needs to con-
sider a case-by-case basis filing strategy. A company needs to look at what its goals are, what market it is
in and who its competitors and or IP threats are.
“To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and
Inventors the exclusive Right to their respective Writings and Discoveries.”
What is interesting and often misinterpreted in this clause is that it grants the power to Congress to
do these things it does not require that Congress actually do is these things. In order for there to be patent
laws the U.S. Congress needed to take affirmative action and pass laws. The substantial law in the United
States is found under Title 35 of the United States Code. Title 35 has five parts or sections, four of the
parts are related to patents and one section is related to industrial designs. The first part establishes the
United States patent and trademark office. As part of this section the Congress allows the United States
patent and trademark office to set the procedures for granting a patent.
The second part is titled Patentability of Inventions and Grant of Patents. Key in this part are sections
101, 102 and 103. In section 101 the law describes what is patentable and states:
“Whoever invents or discovers any new and useful process, machine, manufacture, or composition
of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the
conditions and requirements of this title.”
Section 101 has recently been under scrutiny as to what can and cannot be patented. For example,
can software be patentable under section 101? Or can an electromagnetic wave shape be patentable under
this section?
Section 102 covers the condition for patentability; novelty. In particular, this section sets up the idea
of novelty as compared to the prior art. It states:
“(a) Novelty; Prior Art. — A person shall be entitled to a patent unless—
(1) the claimed invention was patented, described in a printed publication, or in public use, on
sale, or otherwise available to the public before the effective filing date of the claimed invention;”
67
Engineering Management Handbook
This section has become one of the bases for determining if a patent is valid. In particular, it requires
of the person be the first to have invented the patent.
Section 103 covers conditions for patentability; non-obvious subject matter. This section states that a
patent must be not obvious to somebody having ordinary skill in the art. Specifically, this section says:
“A patent for a claimed invention may not be obtained, notwithstanding that the claimed inven-
tion is not identically disclosed as set forth in section 102, if the differences between the claimed
invention and the prior art are such that the claimed invention as a whole would have been obvious
before the effective filing date of the claimed invention to a person having ordinary skill in the art
to which the claimed invention pertains. Patentability shall not be negated by the manner in which
the invention was made.”
Some years ago a section 103 objection was considered a rather easy bar for a patent holder to over-
come. More recently the courts have interpreted section 103 much more aggressively and now 103 objec-
tions are not only common but many times prevail in patent cases either in District Court, the Appeals
Court and/or in the Patent Office.
The next chapter under part 2 describes the law for the application of patents. Of particular note is
section 112, the specification section. This section states that a patent must have a written description
of the invention and must set forth what is called the “best mode” contemplated by the inventor. It also
states that the description has to be in such a way to “enable” a person skilled in the art to make and use
the invention. Often times patents will be challenged based on this section. The challenge is that the
patent is not patentable under section 112 because either the inventor did not describe the “best mode” or
the patentee did not “enable” the invention in the specification. There has been a recent argument around
what are called “paper patents.” These are patents only of ideas for which there are no working models or
prototypes. The argument goes that many “paper patents” should not be granted because they do not en-
able someone to make use of the invention. This has become a common challenge now in District Court,
the Appeals Court and in the Patent Office.
Other chapters in Part 2 include who can review patent and trademark decisions, how patents are
issued, the rules governing plant patents, designs and patent rights inventions made with government
assistance, etc.
Part 3 of U.S. code 35 is titled Patents and Protection of Patent Rights. This part covers a number
of things; most important for us is chapter 28, which discusses infringement of patents. Section 271
describes what it means to infringe a patent, how to file an infringement case and what some of the rules
are about infringement. Chapter 29 of part 3 is titled Remedies for Infringement of Patent, and Other
Actions. This chapter sets out the remedies for infringement of the patent, the presumption of validity
and available defenses. Section 282 states that the defenses for infringement are either non-infringement,
invalidity based on section 101, 102 or 103 or that a patent fails to comply with section 112 which, as we
discussed earlier, is the best mode and enablement section. Section 283 relates to injunctions and states
that courts may grant injunctions on such terms that the court deems “reasonable.” Section 284 covers
damages and states that the floor of damages is a “reasonable royalty” for the use of the invention by the
infringer. Three important chapters in part 3 are chapters 25, 31 and 32, which establish what is called a
reissue procedure, “Inter Parties Review” (IPR) and the post-grant review processes. Chapter 25 allows the
patent owner to reissue effective patents; in other words, the patent owner has the ability to go back to the
patent office and have the patent looked at again by the patent office. This chapter lays out the proceed-
ings for making simple corrections as well as corrections in the title and/or the inventorship. It also allows
a request for supplemental reexamination of a patent. If the reexamination is done within two years of the
issue of the patent the patent owner can apply for a broader set of rights by broadening their claims but, if
the reexamination request is done after two years, then the patent owner can only have the patent reex-
amined and only the same or narrower rights can be issued. Reexamination is usually done for one of two
reasons. First, it is an attempt by the patent holder to broaden the claims of the patent. In this case the
patent owner should review the patent on a regular basis and determine if the specification of the patent
can yield broader claims. Since this can be done up to two years after the patent application issue, the
68
What is a Patent?
patent owner now has a chance to understand better how the technology is developing and craft a better
set of claims. The goal is to develop claims that would be easier to prove infringement of.
The second case is if the patent owner realizes that there is perhaps additional prior art that was
not cited by the patent office. Thus, he now wants to put the prior art in front of the patent office and
preserve claims that would still be useful for an infringement case. The second case is typically called a
Narrowing Reexam, while the first case is called a Broadening Reexam.
The IPR is a procedure that allows defendant companies to request the patent office to review the
patentability of the patent that they are accused of infringing. This is a relatively new procedure and is a
process that lets the patent office determine the validity of a patent after the patent has already been is-
sued. In the first years of this new proceeding almost 80% of all patents brought to the patent office were
found to have defects of validity and were declared invalid. It will be interesting to see how this process
changes over the years. Many believe that this new process is just a burden for patent holders while others
believe that determining the validity of a patent at an early stage will not only decrease litigation but will
also ensure that litigation only goes forward on valid substantial patents. Once infringers initiate an IPR
they are enjoined from further challenging the validity.
was an important case because the Supreme Court unanimously decided that an injunction should not
automatically be issued on finding a patent infringement. It basically gave the District Court judge much
more latitude to decide not to issue an injunction than was previously the purview of the District Judge.
The court described a four-factor test to determine if an injunction should be issued. The factors are that
the patent holder must demonstrate:
1. That the plaintiff suffered irreparable injury;That the remedies available in the law such as monetary
damages are inadequate to compensate for the injury;
2. That, considering the balance of hardships between the plaintiff and defendant, a remedy in equity is
warranted; and
3. The public interest would not be disserved by a permanent injunction. … These familiar principles
apply with equal force to disputes arising under the Patent Act.
This was a pretty radical departure from what most people thought the law was and it also radically
affected patent valuations in the marketplace. In the past most companies and individuals felt that if they
had a valid and infringed patent they could enjoin the other side from selling its infringing products. Be-
cause of the possibility of injunction most companies considered this a severe penalty that they wanted to
avoid. This led to numerous settlements of patent cases just before trial as few companies wanted to risk
the possibility of an injunction being issued. With this threat removed most companies, unless they have
a directly competing product, only have to worry about monetary damages. Therefore they feel that time
is on their side and that even if they lost a District Court case they can appeal it to the Federal Circuit
and only delay the payment. It is obvious how this change in law had a direct impact on patent values
as the payment time was lengthened. It also shows the importance of knowing the current case law and
what cases are being decided that can drastically change the business environment for those involved with
patents.
70
What is a Patent?
For those who are unfamiliar with patents, the parts of a patent will be discussed. Note that how
patents look changes depending on the source you are viewing it from. This example shows how the
patent looks when sent to the inventor or printed from the USPTO image database. If one uses an online
database, the same information appears but frequently the information shows up in different areas. For
example, on the USPTO website, the claims are not written at the end of the patent but rather right after
the bibliographic information.
71
Engineering Management Handbook
Below are the numbers of the patent in Figure 6.1. These will be used to identify the sections.
(12) Type of Document: For an issued patent, this will just read “United States Patent” (or, if appro-
priate, “United States Design Patent”, “United States Plant Patent” or “Patent Application Publication”).
”Reissued Patent”: This patent is based on another patent, which was previously issued. Earlier in the
chapter I discussed the process for reexamination and reissue was discussed. The Reissue Patent has been
examined a second time because there are usually modifications to the claims.
(10) Number: The patent number. This is a serial number of the patent – patents are issued and given
the consecutive number in the series. Patent 6,000,000 was issued December 1999; Patent 7,000,000 was
issued February 2006 and patent 8,000,000 was issued April 2011. Note that there is also a prefix. The
prefix tells a little more about the patent. Sometimes there are prefixes to the number prefixes before the
number, which indicates the kind of document:
•B - Reexamination Certificate, issued after a patent was issued and has been examined again by re-
quest of the patentee. The numeric portion of the number is the number of the patent to which the
reexamination certificate refers. (For design, plant, reissue patents, the Reexamination Certificate
will include the normal designation letter - BD for design, BP for plant, etc.)
•D or Des. - Design Patent - 14-year term, covers ornamental appearance of a useful object•PP or
Plt. - Plant Patent - covers certain plants•RE - Reissue patent (RD for reissued design patent, RP
for reissued plant patent)
Documents also have a letter or letter/number after the number. These appear on the face of the
patent only after January 2, 2001; these suffixes have meaning and tell us a little more about the
patent. Here are a few of the common suffixes:
•A1 - Published Patent Application - (if application is published more than once, A2 for second,
etc.)
•B1 - Utility Patent, not previously published
•B2 - Utility Patent, previously published as an application
•C1 - Reexamination Certificate (if more than one certificate, then C2, C3...) (B1 ... is used for
pre-2001 Reexamination Certificates)
•P1- Plant Patent (before 2001)
•P1 - Published Plant Patent application (after 1/2/2001 - additional publications are P4, P5...)
•P2 - Issued Plant Patent without pre-grant publication (after 1/2/2001)
•P3 - Issued Plant Patent that was previously published (after 1/2/2001)
•S - Design Patent
(45) Date of Patent: The date the patent was issued by the USPTO. This is important because only
after this date is the patent enforceable; sometimes this is the date that the term of the patent is measured
from. These dates always fall on a Tuesday.
(54) Title: This is the full title of the patent. Sometimes the title is very clear and one can quickly tell
what the invention is. But sometimes the title is much more obscure and understanding the technology is
very difficult for a generalist.
(75) Inventors: All of the inventors will be listed on the patent. A practicing patent attorney said that
if there were more than three inventors he felt it was important in a litigation to interview each inventor
and ask what he contributed to the invention. It was his feeling that often companies will add names to a
patent based on the group of people who were working on the project and therefore misrepresent the true
inventor. This could have dire consequences in litigation.
(73) Assignee: If the patent is owned by an entity it is listed here. There will be no assignee field if the
assignee is the inventor. It is important to note that the assignee name is filled in when the patent issue fee
72
What is a Patent?
was paid and, therefore, if there is a change of ownership after that time, the cover of the patent will not
change. There is a separate database at the PTO that shows who the current assignee of the patent is but
it is also important to know that it is not required assignees register their new assignment in the patent
office. For example, when one company buys another company they it transfer all the patents legally in
the contract for the sale but may not record the assignment in the patent office. This occurs many times.
(*) Term extension notice: the term extension notice is relatively new and it will indicate if there are
additional days of life to the patent. Basically, the patent office does not penalize the applicant for
time the patent application spends in the queue at the patent office. This has been as much as three
additional years; knowing the life of the patent is critical in determining the value.
(21) Application Number: The identifying number of the application on which this patent was based.
The serial number is always six digits, assigned sequentially as applications are received by the USPTO,
prefixed by a two-digit series number. When the number reaches 999,999, they start a new series. There
are two unique series that should be mentioned: series that begin with 90 represent patents that have
been reexamined under Ex Parte Reexamination procedure and series that begin with 95 indicate patents
reexamined under Inter Parties Reexamination procedure.
(22) Filing date: the filing date is the date that the patent application was filed. Note the time the ap-
plication was originally filed if the patent is a continuation and this may not be the “first filing date.”(65)
Prior Publication Data: If this patent was published while it was a pending application, the publication
number and date will be listed here.
(60) Related U.S. Application Data and (30) Foreign Priority Data: If this application is related to
any other applications or patents, they will be listed here. This field will often tell you what the “first filing
date” was.
(51) International Patent Classification: Patents are classified based on the IPC for ease of searching.
Sometimes patents have multiple IPC numbers. All patents are classified by subject matter for ease of
searching. The classifications in which a patent is indexed are listed in these sections.
(53) U.S. CL: The USPTO uses its own U.S. Patent Classification System (USPC) in which all in-
ventions are first put in a class having a three-digit number, then in a numbered subclass under the class.
The subclasses are arranged in hierarchical form but not necessarily in numerical order.
(58) Field of Search: These are the U.S. classes/subclasses that the examiner searched when he or she
reviewed the patent.
(56) References Cited: This is the list of prior art that was cited in this case. Some of the prior art may
have been found by the examiner when he or she did the patent search or the prior art may be listed by
the patentee when the patentee filed the application. Both U.S. and foreign patents may be listed as well
as non-patent literature. In the U.S. and other countries such as Japan and Canada there is a “duty to
disclose.” It is found in 37 C.F.R. 1.56. Duty to disclose information is material to patentability.
“A patent, by its very nature, is affected with a public interest. The public interest is best served, and
the most effective patent examination occurs when, at the time an application is being examined,
the Office is aware of and evaluates the teachings of all information material to patentability. Each
individual associated with the filing and prosecution of a patent application has a duty of candor
and good faith in dealing with the Office, which includes a duty to disclose to the Office all infor-
mation known to that individual to be material to patentability as defined in this section.”
The number of references cited will sometimes indicate the importance of the patent. In other words,
if the references cited are very long, the inventor and the inventor’s patent counsel thought that this
73
Engineering Management Handbook
pattern is particularly valuable. With that said it is not fair to say that because there are few references the
patent is not valuable. There are many valuable patents that have very few references. Conversely, there are
many patents that are not valuable that have a great number of references.
Primary Examiner, Assistant Examiner: These are the USPTO examiners who examined the patent.
(74) Attorney, Agent or Firm: When the Issue Fee is paid for the patent, one or more patent attor-
neys, patent agents or law firms may be listed on the cover sheet.
(57) Abstract: A brief summary of the invention, with the emphasis on “brief ” (less than 150 words).
Number of claims and drawing sheets: Lists the number of claims and drawing sheets in the patent.
This is useful to determine if the copy of the patent is complete.
Representative drawing: The examiner will pick one of the drawing figures and put it on the first
page. This is usually figure number one but other figures can be picked.
74
What is a Patent?
Most U.S. patents have drawings. But some chemical patents do not have drawings. The drawings are
numbered from “fig(ure) 1” up and sometimes a figure will be divided into several subfigures.
The subfigures are identifiable because there is a letter suffix to the figure number.
(fig. 1A, fig. 2B, etc.). It is sometimes necessary to show the “prior art” as a figure. These figures will
be labeled as “prior art” so that one knows by looking at the patent that it is not part of the patented
invention. You will notice on each of the figures that there are often reference numbers on the label. These
are used so that the reference numbers can easily be called out for the specification of the patent. Fre-
quently, there are several kinds of drawings for mechanical patents that will be a 3-D view, cutaway view,
or an exploded view of the device. Cutaway views are used for semiconductor process patents. A cutaway
view can show the layers of the semiconductor or the structure of a transistor after the process. In many
electrical patents circuit schematics as well as block diagrams will be shown as figures. Block diagrams
are used to show the system in general terms and how they work in relationship to each other. Sketches
as well as flowcharts are often shown. Method patents often have flowcharts that show the steps of the
method.
After the drawings the “specification” of the patent appears. The specification is the written part of the
patent. It has a number of parts:
75
Engineering Management Handbook
76
What is a Patent?
77
Engineering Management Handbook
Reading down the first column of the first page there are a number of sections:
(A) First is the Title of the Invention: (See 37 CFR 1.72(a).) (B) Next is Cross-Reference to Related
Applications: (See 37 CFR 1.78.) For the sample patent shown this part is not presented but if the panel
is related to other patents and or earlier filed applications it will be stated right after the title. This will
include if a provisional application has been filed or if the patent is a continuation or continuation of part
of other applications or if the patent is a divisional of another application. Often foreign priority applica-
tions are listed here also but this is not required.
Sometimes, if the invention was developed using federal research and development money, there will
be a Statement Regarding Federally Sponsored Research or Development:
(C) Next is the Background of the Invention: Most specifications set forth the background of the
invention into different parts.
(D) Following the Background of the Invention is the Field of the Invention: The field of the inven-
tion is usually a very broad description of the area of technology of the invention. Sometimes reading the
section will give a clue to what the patent is actually useful for.
(E) Then there is the Description of the Related Art: The description of related Art section talks about
some of the prior art that was known before the invention occurred. This description may have references
to specific patents and/or other documents. For example, if the patent was developed as part of a stan-
dard-setting organization, the standard number would be referenced here.
Often this Background of the Invention is rather short. This was often done because patent attorneys
feared that the Background of the Invention could be used to invalidate the patent or limit the scope of
the claims and litigation.
(F) Next is the Brief Summary of the Invention: This is a summary of the invention (see 37 CFR
1.73). The summary should give you the idea of the invention and hopefully is useful in directing people
to understand what technology the patented invention covers. Sometimes this is the case but many times
it is not and the summary of the invention is as dense and incomprehensible as the abstract of the inven-
tion. The summary should be broad; in fact, it should be broader than the broadest claim.
(G) Then there is a Brief Description of the Drawing: This is typically a one-sentence description of
the figures.
(H) The last major section before the claims is the Detailed Description of the Invention this typical-
ly is the largest section of the patent: this is the description of the preferred embodiment of the invention
(see CFR 1.71). What is most important here is that the description needs to be able to accurately de-
scribe the invention and ensure that the invention is actually enabled. Frequently the detailed description
of the invention will end up defining some of the terms that are used in the claims.
In this section of the specification each of the figures will be explained. Sometimes a detailed descrip-
tion will include the method for making the invention or the method for using the invention. Often there
will be more than one example. This section of the specification is used to describe the various embodi-
ments of the invention in great detail.
78
What is a Patent?
In a printed patent the claims usually come last. With online databases, they are usually shown first
immediately after the bibliographic information in the abstract. As mentioned before, the claims are the
most important part of the patent because they define the metes and bounds of the patent grant. One
way of thinking about patent claims is to use a property analogy. The patent claims represent the descrip-
tion of what is the piece of property that you own. Understanding these claims is key in determining if a
79
Engineering Management Handbook
product or process infringes the patent. This is oftentimes not an easy thing to do and we will discuss this
in more detail later. A few points about claims:
• If one claim is infringed the patent is infringed.
• All elements of the claim must be used by the product or process in order to be infringed.
• Many of the elements of a claim are part of the prior art. Only one element of the claim needs to be a
novel one.
granting someone the right to use your invention but you are also telling the person that you will grant
others the same rights. To put this in a property context imagine that you have a plot of land. You may
grant people the right to travel over your land to get to the beach on the other side. You may even decide
to charge them for that right. But you will grant that right to many different people. You may also grant
the right to many different people at the same time. Imagine a town that owns the beach and charges
people a certain amount of money to park near the beach. This is a nonexclusive right to use the beach
parking facilities.
The other option is an exclusive license. With an exclusive license one only grants the rights to use the
invention to one person or company. That entity has the “exclusive” rights to use the invention. Back to
the example: If you wanted to be the only person to have rights to park at the beach and no one else could
park at the beach, you would then have “exclusive rights.” While this may sound excessive in our example,
there are examples in the property industry were “exclusive rights” are commonly found. For example, if
your property has certain natural resources on it, minerals from mining or timber for harvesting then you
may grant an entity “exclusive rights” to mine the minerals or harvest the trees. In a technology setting
exclusive rights frequently depend on the specific technology. Exclusive licenses are somewhat rare in the
high-tech industries of computer science and electronics. Many of these products require tens of thou-
sands or hundreds of thousands of patents to work and, therefore, granting an exclusive license is not
necessarily beneficial. In other industries like pharmaceuticals, where a specific formulation of the drug
might be covered by one or two patents, exclusive licensing is much more common.
Other than licensing, what else can one do with a patent? The other two options are: selling the
patent or abandoning the patent. To abandon the patent, not paying the maintenance fees that are due on
the patent accomplishes this. Many large companies in the electronics industry routinely abandon a large
number of their patents. These companies will periodically look at their portfolio to see if the patents they
are keeping in force are still useful.
Patents that are neither in the current marketplace nor relevant to the potential intellectual property
competitors should be considered for sale or abandonment. Frequently, because of the market dynam-
ics of the company and who the company’s customers are, it is not feasible for the company to assert its
patents against one of its customers. Since the company has developed a valuable portfolio and one of
its customer’s businesses is not relevant to its business, perhaps there is somebody else who may want
to buy the patent. It would make sense at this time to test the market and see who needs those patents.
Often companies will buy patents because they are entering into new markets where they feel they have
inadequate patent coverage. Oftentimes companies need to buy patents when they have few patents of
their own but have very successful products. Recent history abounds with companies that fall into that
category: Cisco, Broadcom, Google, HTC and Xiaomi have all faced this issue. In each case, the very
successful product company had not developed a strong enough patent portfolio quickly enough to fend
off those who thought they were due license fees. This led to litigation and a need for these companies to
buy patents as well as to file more patents quickly. Since filing a patent takes a long period of time it was
very difficult for these companies to gain protection from an internally generated patent portfolio if the
patents took between three and five years to issue. Additionally, when generating a new patent portfolio
the inventions that are generated often do not become commercially acceptable until many years after the
patent issues.
81
82
Leading Individuals and Engineering Project Teams
7
Leading Individuals and
Engineering Project Teams
Donna Brazil
United States Military Academy
Darcy L. Schnack
United States Military Academy
83
Engineering Management Handbook
7.1 Introduction
As an engineer chances are very good that you were hired for your technical skills and expertise. You stud-
ied hard in school, you are technically savvy, and you certainly know your area of expertise. You worked
your way up in the organization and now they want you to lead an engineering project team. Initially,
you were excited about this promotion and new challenge, but now after just a few meetings you are
beginning to think twice about that excitement. As you think back to your preparation, you suddenly
realize that while you were promoted because you were a good engineer, no one really trained you to lead.
A great definition of leadership is that “Leadership is providing purpose, direction and motivation
while operating to accomplish the mission and improve the organization” (U.S. Army, 2012). It gives
the leader a starting point – providing purpose, direction and motivation as well as dual end states – to
accomplish the mission and improve the organization. Let’s look at the starting points first and return to
the end states later.
This chapter will begin by introducing the basics of a systematic way to approach leadership. We will
start with understanding yourself as a leader and then look at the characteristics of followers, motivational
issues that might arise when leading individuals, and some issues that are common to all groups. We will
then turn to theories of leadership that take the situation and the task into consideration.
A fascinating tool for discovering your preferences is the Implicit Associations Test (IAT) developed
by researchers at Yale, Harvard and other institutions. Available at https://implicit.harvard.edu/implicit/
This tool offers you the opportunity to measure the strengths of your preferences on a number of dimen-
sions from gender and race to religious and political affiliation as well as current social issues such as self
esteem, anxiety and mental health (Project Implicit, 2011). The results do not predict behavior but they
might provide you with personal insight into your preferences. Keep in mind that having a preference or
bias is not the same as acting on that bias, but having thought about them beforehand is critical to mini-
mizing the potential impact. Acknowledging these preferences upfront will make you more self aware
and better prepared to manage and leverage diversity on your team and to try new behaviors in this
new situation.
Some key self-awareness issues to think about from the perspective of a leader:
What are my predispositions toward:
• People of other races?
• People of the opposite gender?
• People of a different sexual orientation?
• People from a different academic or technical discipline?
As you can see from this short list, there are many facets to being a leader and it is helpful to take
stock of yourself and your preferences and determine if they are the best fit for your particular situation.
If they are not, you might consider how you can develop your capabilities in these particular areas. Tak-
ing time upfront to consider these issues before you are under a deadline or in the middle of a crisis will
certainly be time well spent.
The common way to look at motivation is to focus separately on intrinsic and extrinsic motivation;
intrinsic motivation comes from within the individual or task itself while extrinsic comes from an external
force. We will come back to intrinsic motivation later, but let’s start with extrinsic.
Extrinsic motivation is an external force, normally a reward or threat of a punishment that compels
an individual to accomplish a task. The more they want the reward (or want to avoid the punishment),
the more motivated they are work to accomplish the task. Sounds simple, right? So why doesn’t it always
work? Researchers have discovered a number of explanations that are worth your consideration as you
begin to diagnose the motivation issues of your team members.
Stacy Adams (1965) explained a lack of motivation through the lens of fairness or equity. He sug-
gested that individuals seek to get their “fair share” out of most situations. In a simple explanation, equity
theory suggests that group members look at their inputs (work, effort) and their outcomes (compensation,
praise, self-worth) and determine if their ratio is equal to or better than the other members of the team. If
they feel that their input/outcome ratio is lower than their peers’ then they will determine that the situa-
tion is inequitable and will work to resolve that inequity (Adams, 1965). When team members think that
they are being treated unfairly in a situation, they might lower their effort or in extreme situations, they
might quit altogether. As the team leader, you can work with the members and try to see the situation as
they see it. Sometimes they will identify a valid inequity in the system that you were not aware of. Often,
you will find that you and the team members have different perceptions about the quality and quantity
of both inputs and outcomes and all that is required is talking about the differences so that you all have
a clearer picture of the situation. The bottom line in these situations is to understand that perceptions
matter, and addressing the perceptions of your team members will make them feel valued and will in turn,
increase their motivation.
Another theory that explains possible sources of motivation issues is expectancy theory (Mitchell,
1974). Based on expectancy theory, individuals are motivated to perform a specific behavior to a specified
standard in order to receive a specific reward. This framework is helpful in understanding motivation as
it enables a leader to break a situation down into three components: the specific individual behavior that
you want the member to perform, the standard that you want the performance to reach and the reward or
outcome that the team member will receive for meeting this standard. Motivation therefore comes into
play in any one of three ways: the team member might lack the confidence that he or she can perform
the task to the established standard; the team member might not trust that he or she will actually get the
promised reward or finally that the team member might not value the promised outcome or he or she
believes that the energy expenditure required to meet the standard is not worth the outcome. Using this
framework as you approach the situation of a seemingly unmotivated subordinate, you might first ask
yourself a few questions. What is the task I want completed? What standard have I established for this
task? What will the team member get for his or her effort?
Since a motivation issue can involve any one or more of these components, you should then talk to
the team member to determine which linkage is weak. Your leader action will follow directly from the
weak link. If the team member lacks the confidence to meet the standard, you might break the task down
into smaller subtasks or you might ensure that the team member gets additional training, or if necessary,
you might revaluate the standard. If the team member doesn’t believe that you or the organization will
provide the promised outcome, you must work on trust issues and ensure the team member that you will
in fact make good on your promises. Most trust issues are based on past experience so you will need to
convince the team member that you are different than their past leaders and that you will see to it that the
reward is realized. Finally, if the team member does not value the reward or thinks that it is not worth the
effort, you can discuss what they would like as the reward and try to come to a compromise that will suite
you both.
Equity and expectancy are two ways to look at extrinsic motivation. While most of us desire and
indeed need compensation for our work, many professionals stay in their particular field for intrinsic
reasons. Certainly, we could earn more money, have a bigger house or expense accounts; but we like what
we do, it gives us meaning. When these team members lack motivation, another way to diagnose the
situation is to through the components of intrinsic motivation (Deci and Ryan, 1985). In terms of Deci
and Ryan’s theory, individuals who are motivated intrinsically are thought to find completing the task
86
Leading Individuals and Engineering Project Teams
enjoyable in and of itself. Intrinsically motivated individuals enjoy tackling a new task and finding a new
way to solve the challenges. They are motivated by being given the opportunity to challenge themselves
and the freedom to determine their own course of action.
Understanding these conditions will help you as the team leader of intrinsically motivated members.
These members enjoy taking on and accomplishing new challenges and being allowed the freedom to
figure it out. These individuals find the challenge rewarding and might feel manipulated when offered
a reward as an incentive for completion. Any rewards for these individuals should be given after com-
pletion of the task and will serve as information – namely that their performance was exceptional and
appreciated.
You are probably thinking that intrinsic motivation and extrinsic motivation are at odds with each
other. In some ways, you are correct and this highlights the importance of your initial diagnosis of the
situation and your team members. Promising a reward to one person will assist in raising motivation,
while for another, it could make him or her feel manipulated and therefore lower motivation. According
to expectancy theory, challenging a team member who feels uncertain about his or her performance might
overwhelm and cause a drop in motivation while an intrinsically motivated team member will excel when
challenged. Obviously, the key to selecting the best actions as a leader start with truly understanding your
team members. It is important to take the time to know what their strengths and weaknesses are as well
as what they value and expect from you as their leader.
Remember, just as you are different than every past leader, your team members are different from
each other. Each comes with a history, with varying levels of experience and with different personal
needs. The better you understand them, the better you will be able to bring them together as a team.
7.4.1 Forming
In this first stage of group development, members are more concerned about personal characteristics and
issues than they are about actually performing the task. This is a time when group members attempt to
figure out how they fit in, who has status, what skills everyone has and so forth. Many leaders come to
the first team meeting with a full agenda planning to jump right into a meaty discussion of the project at
hand. A leader who understands group development and who has thought through the “first encounter”
will facilitate the needs of his or her team by allowing some time up front for the informal interaction that
the team needs. You can also assist the group in working through this stage of development by clarifying
roles and facilitating their desire to share information among each other.
7.4.2 Storming
As groups start to get to know each other and work together, it is normal for them to enter a period of
conflict. In this stage, members are assigned to roles and differences in status begin to emerge. Some
members might believe that they are better qualified to perform a task than the member who was assigned
to it; others might be concerned about where they fit in. Informal leaders might begin to build allianc-
es with other members in order to solidify their position in the group. While it can appear chaotic and
messy, this is an important time in the development of a group. You should not think that you are failing
because the group begins this period of conflict; on the contrary, most teams that never go through this
stage have probably never really been tested and when they do hit rough times, the issues that were never
resolved will come to the surface. You can facilitate the group’s movement through this stage by working
to build consensus, investing the time to assist with role clarity and negotiation, and openly discussing
87
Engineering Management Handbook
conflict issues. If you can work to eliminate or minimize these sources of conflict, you can facilitate the
group’s movement to the norming stage.
7.4.3 Norming
Groups really start to click during the norming stage. They have achieved consensus on how tasks should
be accomplished, they have established norms that are self-enforced and individual status has been iden-
tified and agreed to. There may be some cycling back through storming and norming as new members
or tasks are added but as the norms solidify, the cycles become shorter and the smoother. In this stage
you as the leader can start to focus more on the social and emotional needs of group members and you
might serve the group best by keeping them focused on the task by ensuring their other individual needs
are met. Leaders of groups at this stage need only give guidance and allow the systems that the group has
developed to take over. That said, there might be a tendency in this stage to allow the “systems” to substi-
tute for thinking and decision making. You must be attentive to rigid adherence to a system that has been
agreed on but is no longer functional. You can assist the team’s development by playing or appointing
a devil’s advocate, encouraging deviance from time to time and sharing the leadership decisions of the
group. Groups who successfully negotiate this stage move on to the performing stage.
7.4.4 Performing
In this stage, group members are very comfortable with themselves and each other. They are interdepen-
dent and creative. They are not wedded to any particular structure or system and instead are expected
to suggest improvements and point out potential problems. As the leader you are able to fade into the
background and are completely free to work strategic issues that might facilitate the group’s current task
or future task.
By now you are probably thinking to yourself “well that’s a great theory, but my REAL teams never
get that far.” Well, take comfort in knowing that you are not alone in your experience. Despite the name
of the “performing” stage, groups will perform – and if forced to, will produce something– no matter
what stage they are in. In fact, some groups never get out of the storming stage as they continue to go
about their task.
7.4.5 Adjourning
Few groups exist in perpetuity. Recognizing this and reviewing subsequent literature, Tuckman and
Jensen (1977) updated an earlier model of group development to address the feelings of separation a
group experiences as it disbands. Members may feel a sense of loss for group relationships or distress over
accomplishment of group goals. As a leader, it is important to focus on communication within the group
and to prepare for this stage if the group’s dissolution is anticipated. Take the time to celebrate the group’s
accomplishments and the teamwork that you have all shared. As a leader, understanding the normal stages
of development and the issues faced by group members at each stage can assist you in facilitating the
needs of the group. Quite simply, a group performs better at a higher stage of development. If you are
able to recognize the issues and move your group forward, all the better.
Having discussed the importance of understanding yourself as a leader and the individual and group
characteristics of the followers, it is now time to turn our attention to leading.
7.5 Leading
The issues and discussions above are all absolutely critical functions of a leader and are almost prereq-
uisites to being able to enact the traditional theories of leadership. For these theories to be effective, a
foundational understanding of yourself and your team members is essential.
Perhaps the most useful leadership theories for an engineering management team leader are contin-
gency theories that take into consideration both the characteristics of the team member and the charac-
teristics of the situation. These theories, developed in the early 1970s focus on understanding the level
of structure of the task and the team members’ skill with regard to the task as well as their motivation
88
Leading Individuals and Engineering Project Teams
toward completing the task. The most well known of these theories is Hersey and Blanchard’s Situational
Leadership Theory (Blanchard, Zigarmi and Zigarmi, 1985). This theory requires that the leader first
understand both the task requirements and the development level of his or her team members and then,
taking these into consideration apply the appropriate amount of task and relationship behaviors. Leader
behaviors that are high on task direction and low on building relationships are appropriate for team mem-
bers who are low in competence but high in their commitment to task completion. As team members
become more competent and perhaps begin to waiver in their commitment to the task, the leader must
begin to ease off on providing direction and begin to focus more on building supportive relationships. At
the far extreme, team members who are extremely competent and highly motivated need little direction or
external motivation.
While the tenants of Situational Leadership Theory might seem simplistic and intuitive, many of us
can recall a leader who failed to recognize that we were at either extreme and insisted on providing inap-
propriate leadership at the critical moment. Either the leader continued to be very direct despite your
skill development or the leader took a delegating approach when you really did not have all of the re-
quired skills. Either mismatch can have serious negative repercussions for both the team member and the
team. According to Situational Leadership Theory, as the team members’ progress from low skill with high
motivation through varying skill with varying motivation to high skill with high motivation, the leader
should at first be directive, then take on a coaching role, move into a fading supportive role and finally
realize that it is time to delegate.
Until this point in the chapter we have been concerned primarily with the first part of the definition
of leadership – namely providing purpose, direction and motivation in order to accomplish the mission.
While certainly required of a good leader, your job is not yet complete. We must now turn our attention
to the last end state of that definition: improving the organization. While you personally might have felt
unprepared for your first leadership position, it does not (and should not) have to be the same for your
team members. Part of your job as a leader should be to develop your replacement.
7.6.1 Assessment
The assessment component calls for leaders to become self-aware. As your team members begin to take on
more responsibility and prepare to become leaders themselves, they should seek out feedback from others
and should begin to assess themselves in terms of their strengths, weaknesses, preferences and predisposi-
tions. The model calls for the same introspection and self-assessment that we looked at in the beginning
of this chapter. As their leader, you will be in a unique position to provide feedback help to identify
89
Engineering Management Handbook
developmental gaps that they should address. If possible, gathering feedback from peers and subordinates
will round out the assessment picture and give the individual a 360-degree assessment.
7.6.2 Challenge
A second key component of leader development is challenging experiences. Your engineers must be
directed or encouraged to undertake experiences that will challenge them and push them out of their
comfort zone, experiences from which they will grow and develop. Runners will never get faster if they
only run at a comfortable pace. They may stay in shape and maintain good cardio fitness, but they will
never get faster if they do not push and challenge their ability by going faster and faster on training runs.
The same principle holds true for leadership. Engineers will never improve their interpersonal, communi-
cation, managerial, etc., skills if they stick to other aspects of the project that they feel comfortable with.
For example, engineers stick to the design and the production, and never accepts the challenge to speak
with the other group members or the customer, they will never grow in that area. Too often, engineers
remain in their technical comfort zone and do not cultivate other elements of the “whole” leader.
Individuals develop by taking on stretch assignments, situations, and experiences that offer them a
challenge outside of their comfort zone. These are not assignments that are completely outside their area
of expertise – a runner does not attempt to be a better runner by learning to scuba dive – nor would we
necessarily want an engineer student to attempt the stretch assignment of public relations. The challeng-
ing experiences should be based on what you or the individual determined to be a gap in their develop-
ment during the assessment phase. Truly challenging experiences make individuals uncomfortable and
create a disequilibrium that they must work to resolve. They are forced to develop and try new skills
when their tried-and-true favorites do not work. This is true for all areas of development and especially
true for leadership development. Leaders in technical organizations and management teams must be
encouraged and rewarded for seeking out challenging leadership experiences.
7.6.3 Support
Support comes in many forms. Universities, corporations, etc., must recognize the need for this develop-
ment and allow their engineers the time and resources required. In academics, this may require restruc-
turing graded requirements in preexisting courses or developing entirely new course goals and objectives.
In corporations, this might involve formal mentoring, rotational training, professional coaching, and
professional development activities.
Another form of support comes from those surrounding the leader. Leaders must have a person
or group of individuals that they can turn to in order to help them make sense of the experiences they
have had and the feedback they have received. Far too often young engineers live through challenging
experiences and simply throw it them into their files, never to be seen or evaluated again. These valuable
experiences can be powerful but without reflection, no growth takes place and, as a result they are not
significant in their development. The real promise for growth and development is in the processing of
that experience, either alone or with the help of a trusted friend, peer or mentor. In these after- action
reviews that look at the engineer’s actions, inactions, decisions and interactions are rich learning oppor-
tunities that will expand their capacity to do the same or better the next time they are presented with a
similar issue. In our fast-paced, just-in-time culture, it is often difficult to take time out to reflect on our
experiences and seize the developmental opportunity. As a team leader you must recognize this tendency
and purposefully set aside time and resources to enable and assist your team members in making the best
of each growth opportunity.
Along with support must come the freedom to fail. Teachers, peers, mentors, coaches, and superiors
must understand that not all challenging experiences will be met with complete success. What truly mat-
ters from a developmental perspective are the lessons that the individual takes away from the experience
and his or her ability to own that experience and the lessons learned. As a team leader, you must set up
learning and developmental opportunities for your team members and provide them the support to make
all of their outcomes opportunities for growth.
90
Leading Individuals and Engineering Project Teams
7.8 References
Adams, J. S., “Inequity in Social Exchange,” In L. Berkowitz, Advances in Experimental and Social Psychol-
ogy (pp. 276-299), New York: Academic Press, 1965.
Blanchard, K. Z., Zigarmi, P., and Zigarmi, D., Leadership and the One Minute Manager: Increasing Effect-
iveness Through Situational Leadership, New York: William Morrow, 1985.
Bass, B. M. and Avolio, B. J., (eds.), Improving Organizational Effectiveness Through Transformational
Leadership, Thousand Oaks, CA: Sage, 1994.
Burns, J. M., Leadership, New York: Harper & Row, 1978.
Deci, E., and Ryan, R. M., Intrinsic Motivation and Self-Determination in Human Behavior, New York:
Plenum Press, 1985.
Goleman, D., Boyatzis, R., and McKee, A., Primal Leadership: Realizing the Power of Emotional Intelli-
gence, Boston: Harvard Business School Press, 2002.
Project Implicit, Implicit Associations Test, 2011, Retrieved September 8, 2015, from Project Implicit:
https://implicit.harvard.edu/implicit/
Markus, H. and Wurf, E., “The Dynamic Self Concept: A Social Psychological Perspective,” Annual Re-
view of Psychology, vol. 38, 1987, pp. 299-337.
McCauley, C. D., and VanVelsor, E. (eds.), Handbook of Leadership Development, San Francisco: Josey
Bass, 2004.
Mitchell, T. ,“Expectancy Models of Job Satisfaction, Occupational Preference and Effort: A Theoretical,
Methodical, and Empirical Appraisal,” Psychological Bulletin, vol. 81, 1974, pp. 1096-1112.
Tuckman, B., “Developmental Sequence in Small Groups.” Psychological Bulletin, vol. 63, 1965, pp. 384-
399.
Tuckman, B. and Jensen, M., “Stages of Small-Group Development Revisited,” Group & Organization
Management, vol. 2, 1977, pp. 419-427.
US Army, Army Doctrinal Publication (ADP) 6-22, Washington, DC: US Army, 2012.
91
92
Managing the Multi-Generational Knowledge Based Workforce
8
Managing the Multi-Generational
Knowledge Based Workforce
Gene Dixon
East Carolina University
93
Engineering Management Handbook
8.1 Introduction
In order to create a productive work environment, generational gaps have to be approached in a way that
benefits employers and employees. To have a positive affect with the differences in behaviors between the three
majority generations currently in the workplace, a general understanding of generational difference is needed.
8.1.1 Overview
Employers and employees of all ages must work proactively across all generations to create an effective
work dynamic. Engineering managers and engineers can benefit from knowing how generational norms
impact the work dynamic. Management’s understanding of the diversity of values and beliefs of genera-
tions will facilitate effective management and create a productive workforce.
Silver (2011) described diversity as a value of different perspectives. For some countries, the
multi-generational workforce reflects a range of employee age that has not previously been experienced, a
demographic remix.
In America, the generational remix means that (Silver, 2011):
• Currently, there may not have enough workers to take care of older Americans
• By 2023, minorities will comprise half of all children; 62% by 2050
• By 2030, 1 in 5 Americans will be over 65
• By 2042, there will no longer a majority race
• By 2050, the Hispanic population is expected to triple
• By 2050 the 18 – 64 age workforce will decline from 63% to 57%
All of these trends are expected to have some impact on emerging generational norms that will also
impact the workplace.
8.2 Generations
Research studies do not draw arbitrary and abrupt lines between generations (Jorgensen, 2003). For
convenience, generational age brackets are identified to support the research agenda. Jorgensen (2003)
marked generations by particular historical events while Shaw and Fairhurst (2008) defined a genera-
tion as starting with an increase in the birth rate and ending with a birth rate decline. Birth rates often
trend with societal or historical shifts. Events are not momentary; history unfolds over periods of time
and therefore the definitions have considerable overlap. In a sense then, a generation is a demographic
cross-section that possesses commonality related to defining social or historical events.
Common life experiences are theorized to create commonalities of perspectives, attitudes, and
assumptions within a generation (Blythe et al., 2008). Generational groups develop distinct values and
workforce patterns according to Blythe et al. (2008). Common generational values are attributed to
generations: Baby Boomers, those born between 1946 and 1964; Generation X, born between 1965 and
1979; and, Generation Y also known as millennials were born after 1980 (Keepnews, Brewer, Kovner and
Shin et al., 2010). As Baby Boomers age and move out of the workplace, Generation X progress through
the work hierarchy, and the Generation Y/millienalists enter into the workforce.
Increasingly, engineering managers find themselves addressing the values and patterns of a multigen-
erational work environment. This environment requires an understanding of generational differences
in order for the workplace to remain attractive to employees. The work environment preferences of the
various generations and the impacts on motivation, productivity, and other basic workplace cultural and
structural pediments must be understood and leveraged. Engineering managers are often responsible for
94
Managing the Multi-Generational Knowledge Based Workforce
creating a productive environment, productive processes, and supporting systems that stimulate employ-
ees of all generations to high performance. The organization’s processes and systems provide a framework
for building loyalty and commitment (Dixon and Knowles, 2013).
Specific generations dominate the workplace. They are the Baby Boomer Generation, Generation X,
and Generation Y. Each of these generations display distinct characteristics and make significant positive
contributions toward a global economic landscape.
95
Engineering Management Handbook
8.3.2 Generation X
Gen X’ers have high value for professionalism (Blythe et al., 2008), yet tend to be cynical and untrusting
(Ansoorian et al., 2003). Gen X’ers entered the workforce during the popularity of workforce reengineer-
ing and organizational restructuring. As a result Generation X does not expect organizational stability
and demonstrate a high tolerance for career risk (Blythe et al., 2008). Generation X may lack a sense of
traditions and demonstrate a sense of individualism (Jurkiewicz and Brown, 1998) tempered with support
from their network of colleagues (Kuperschmidt, 2000; Karp, Sirias, and Arnold, 1999). Gen X’ers have a
96
Managing the Multi-Generational Knowledge Based Workforce
need to be mentored (Jurkiewicz and Brown, 1998) and want immediate feedback. They bring practical
approaches to problem solving and expect employers to listen, provide a facilitating culture, and pay fairly.
Organizations that provide opportunities for improving knowledge, skills and work attitudes enable Gen
X’ers mobility (Ansoorian et al., 2003; Chen and Choi, 2008). McGuire et al. (2007), reported that Gen-
eration X values working for themselves and capitalizing on employment opportunities.
8.3.3 Generation Y
As the most technologically literate of the workforce (Blythe et al., 2008), and want their work to be
meaningful and have opportunity to contribute to a higher purpose. Hira (2007) identified the Y-Gen as
high maintenance needing supervision and feedback. Gen Y are capable multitaskers (Shaw and Fair-
hurst, 2008) seeking employment where they can experience: a fun environment, growth opportunities,
a variety of work projects, chances to learn new skills, and flexible schedules that support of a balanced
work-life (Kuperschmidt, 2000; Carver and Candela, 2008). The Gen Y is accustomed to teamwork and
desires supervision and structure. They have an affinity for sustainability. If not challenged and support-
ed, they will job hop (Carver and Candela, 2008). Retirement benefits are important in their job choices
(McGuire et al., 2007).
Retention is a function of commitment (Dixon, Mecado, and Knowles, 2013). In the next section,
the correlation of commitment and generational influences are discussed. When employees are commit-
ted, turnover is reduced.
organization. Commitment has been positively correlated to higher organizational learning and develop-
mental feedback from supervisors (Joo and Park, 2009).
Allen and Meyer (1990) identified three constructs that describe commitment: affective, continuance,
and normative. Affective commitment refers to an employee’s emotional attachment to, involvement in,
and identification with, an organization. Watsi (2005) stated that stronger affective commitment results
from positive work-related experiences. Continuance commitment is related to the costs an employee asso-
ciates with leaving an employer. Employees with strong continuance commitment remain because they feel
they have to do so (Meyer and Herscovitch, 2001). Tenure and benefits (accrued vacation, etc.) represent a
“sunk cost” of employment (Sinclair, Leo and Wright, 2005) that induces loyalty. Normative commitment
describes an employee’s feeling of obligation to remain with an organization as a general sense of obligation
to fellow employees. Normative commitment develops from experiences that emphasizing loyalty to an
employer (Wiener, 1982), what Kondratuk et al. (2004) refered to as “corporate loyalty.”
Work by Meyer et al. (2010) demonstrated that how an employee behaves on the job is influenced
jointly by commitment to the organization and to the occupation. Table 8.1 summarizes the relationship
of the three commitment categories and generally recognized factors of workplace impacts; e.g., higher
levels of commitment result in lower turnover rates.
responsibilities associated with their work group(s) resulting in high measures of affective commitment.
They expect to be managed well and challenged in their work assignments as a rite-of-passage. Gen Y’ers
seemingly demonstrate high performance when properly challenged. Lacking work challenges, the Gen
Y’ers are expected to insist on work conditions that meet their requirements and expectations and not
vice versa.
8.6.2 Bias
According to Karp (2012) managing generational bias is an issue all managers face. Generational biases
certainly exist and are manageable only when the will and the means are available. Hiding bias is not a
viable solution. Leveraging generational-difference bias as a source of and for energy, drive, and determi-
nation that is useful in harnessing the differences that reflect personal bias. The struggle is harnessing the
differences for the good of the organization and the competitive posture of the business’ strategic focus.
1. The first consideration would be the engineering manager’s ability to manage personal bias with
respect to generational diversity. Engineering managers can struggle with their bias throughout their
career and life-stages. According to Karp (2012) as the manager matures focus changes from personal
achievement, to career development, and culminates with contributing to society on some level. This
latter career stage is the time when senior engineer managers are best able to lead the integration of
multigenerational collections into a cohesive teams. These mature engineering managers can spur
inter-generational cohesiveness when they bring the focus on the performance of the team using their
wisdom, courage, justice and temperance that has moved past their own advancement (Peterson and
Seligman, 2004).
2. Xu and Thomas (2011) conjectured leadership overlaps the construct, engagement. Engagement is de-
fined as the degree to which employees make full use of their cognitive, emotional, and physical resourc-
es to perform role-related work (May, Gibson, and Harter, 2004). Engaged employees is the goal of ev-
ery engineering manager who is responsible for performance measures tend to be highly subjective and
99
Engineering Management Handbook
prone to diverse interpretations; e.g., engineers and engineering. Engineering managers work to create
an environment where engineers feel psychologically safe in the face of generational diversity. This is an
acute need for inexperienced engineers. Two objectives compound the influences of a multigenerational
workforce. (1) Developing new engineers into productive employees and (2) maintaining the morale
and performance of experienced engineers, typically Baby Boomers and Gen X employees. Satisfying
these objectives requires the engineering manager to address the norms and values of the generations in
the context of the workplace environment. This environment requires younger engineers to recognize
that work-place wisdom is held by the older engineers and must be mined or it will have to be recreated.
Networking across the generations will develop respect within the younger engineers for the experienced
engineers and will enable their recognition for engaging as team players.
An understanding of engagement allows the engineering manager from any generation to place
emphasis on the classic team-development methods such as development of the individual and
rewarding work group successes. Enhancing engagement also will require goals and metrics associ-
ated with monitoring task-oriented behaviors. Engineering mangers must also provide appropriate
resources and facilities, challenging tasks, effective task management, displaying integrity and open,
honest communications along with mentoring all engineers (Xu and Thomas, 2011). Engineering
managers must reflect work habits and related attitudes that they expect from their engineers. This is
sets the example that each work activity is part of the organization’s strategic mission, a classic exam-
ple of leading by example.
3. All engineering managers recognize that beyond satisfying regulatory requirements, there is limited
return for mandated training. “Engaged” training–training that enhances satisfies the employees’
need for education and skill development consistent with organizational objectives–will recognize the
differences in generations (Hotho and Dowling, 2010). Engineers interpret training based on their
personal orientations, norms, values and situational context including the influences represented in
the generations. Training is interpreted based on individual and group bias. A classic training failure
is when a one-size-fits-all training intervention is required of employees without recognition of the
individual trainees’ motivation, ability, personality, and work context (Hotho and Dowling, 2010).
Training for development should be developed through discussions with the engineering manager, the
candidate and the training designers (Haskins and Shaffer, 2010) and should focus on the individuals
attributes, capabilities, needs, potential, and return for the organization. The design for developmen-
tal training should focus on desired strategic behaviors, self-awareness, change and change barriers,
within organizational and professional contexts.
4. Any cross-generational integration initiatives should be augmented with dispersion tactics to lever-
age any training initiative across the organization. The diffusion of learning is best accomplished by
applied team activities or learning projects (Atwood, Mora and Kaplan, 2010). This requires that
integration initiatives be permeated with communicating the knowledge, skills, and abilities (KSA)
gained and facilitating an environment where the generations can adapt the new KSAs into both their
social and work groups. This is often called organizational learning where training includes a process
of KSA transference or supporting learning in others. As part of the organization learns and shares
the need for additional training interventions is reduced. As the organizational learning spreads, indi-
viduals in each generation will begin developing their own supportive behaviors.
8.7 References
Adams, S. J., “Generation X: How understanding this population leads to better safety programs,” Profes-
sional Safety, 45, 2000, pp. 26-29.
Allen, N. J., and Meyer, J. P., “The measurement and antecedents of affective, continuance and normative
commitment,” Journal of Occupational Psychology, 63, 1990, pp. 1-18.
Allen, N. J., and John P. M., “The Measurement and Antecedents of Affective, Continuance and Normative
Commitment to the Organization,” Journal Of Occupational Psychology, vol. 63, no. 1, 1990, pp. 1-18.
Anderson, Jamie, “Customized executive learning: a business model for the twenty-first century”, Journal
of Management Development, vol. 29, no. 6, 2010, pp. 545-555.
100
Managing the Multi-Generational Knowledge Based Workforce
Ansoorian, Andrew, Good, Pamela, and Samuelson, Dave,“Managing Generational Differences,” Leader-
ship, vol. 32, no. 5, 2003, p. 34.
Atwood, Meredith A., Mora, Jordan W. and Kaplan, Abram W., “Learning to Lead: Evaluating Leader-
ship and Organizational Learning,” Leadership & Organization Development Journal, vol. 31, no. 7,
2010, pp. 576-595.
Beutell, Nicholas J., and Wittig-Berman, Ursula, “Work-Family Conflict and Work-Family Synergy for
Generation X, Baby Boomers, and Matures: Generational Differences, Predictors, and Satisfaction
Outcomes,” Journal of Managerial Psychology, vol. 23, no.5, 2008, pp. 507-523.
Blau, Gary J., The measurement and prediction of career commitment, Journal of Occupational Psychology,
vol. 58, 1985, pp. 277-288.
Blythe, Jennifer, Baumann, Andrea, Zeytinoglu, Isik U., Denton, Margaret, Akhtar-Danesh, Noori,
Davies, Sharon, and Kolotylo, Camille. “Nursing Generations in the Contemporary Workplace,”
Public Personnel Management, vol. 37, no. 2, 2008, pp. 137-159.
Bova, Breda and Kroth, Michael. “Workplace Learning and Generation X,” Journal of Workplace Learn-
ing, vol. 13, no. 2, 2001, pp. 57-65.
Brown, Patrick, “Reaching out to Generation Y,” Nuclear Engineering International, vol. 56, no. 680,
2011, p. 42.
Carver, Lara and Candela, Lori. Attaining organizational commitment across different generations of
nurses, Journal of Nursing Management, vol. 16, 2008,pp. 984-991.
Chaleff, Ira, The Courageous Follower, Third Edition, Berrett-Koehler, 2009.
Chen, Po-Ju and Choi, Youngsoo. “Generational Differences in Work Values: A Study of Hospitality
Management,” International Journal of Contemporary Hospitality, vol. 20, no. 6, 2008, pp. 595-615.
Coley, D. C., “Leading Generation Y,” Education Digest, vol. 74, no. 9, 2009, pp. 20-23.
Dalakoura, Afroditi, “Differentiating Leader and Leadership Development,” Journal of Management De-
velopment, vol. 29, no. 5, 2010, pp. 432-441.
Dixon, Eugene N. An Exploration of the Relationship of Organizational Level and Measures of Follower Be-
haviors, A Dissertation. Huntsville AL: The University of Alabama in Huntsville, 2003.
Dixon, Gene and Westbrook, Jerry. “Followers Revealed,” Engineering Management Journal, vol. 15, no. 1,
2003, pp. 19-25.
Dixon, Gene. Emotions and Follower Behaviors in a Time of Crisis, Society of Automotive Engineers,
Proceedings of the 2009 World Congress, Detroit MI, 2009a.
Dixon, Gene. “Followers: The Rest of the Leadership Process,” SAE International Journal of Materials and
Manufacturing, vol. 1, no. 1, April, 2009b, pp. 255-263.
Dixon, Gene, and Mercado, Ashley. “Followers and Commitment in the Workplace,” Society of Auto-
motive Engineering Conference Proceedings, 2011.
Dixon, Gene, and Westbrook, Jerry D., “Followers Revealed,” Engineering Management Journal, vol. 15,
no. 1, 2003, pp. 19-25.
Dixon, Gene and Knowles, Brady. “A Study of the Correlation of Follower Behaviors and Levels of Com-
mitment Across Generations,” 2013 Proceedings of the ASEM International Annual Conference,
October 2013.
Downing, K., “Next Generation: What Leaders Need to Know About the Millennials,” Leadership in
Action, vol. 26, no. 3, 2006, pp. 3-6.
Ferguson, Karen L., and Reio Jr., Thomas G. “Human Resource Management Systems and Firm Perform-
ance,” Journal of Management Development, vol. 29, no. 5, 2010, pp. 471-494.
Gibson, Jane Whitney, Jones, J. Preston, Celia, Jennifer, Clark, Cory, Epstein, Alexandra, and Haselber-
ger, Jennifer,“Ageism and the Baby Boomers: Issues, Challenges and the TEAM Approach,” Contem-
porary Issues In Education Research, January vol. 3, no. 1, 2010, pp. 53-59.
Hira, N. ,“You Raised Them, Now Manage Them,” Fortune, vol. 155, no. 9, 2007, pp. 38-48.
Hoerr, T. R., “Supervising Generation X,” Educational Leadership, vol. 65, no, 2 , 2007, pp. 85-86.
Hotho, Sabine and Dowling, Martin, “Revisiting Leadership Development: the Participant Perspective,”
Leadership & Organization Development Journal, vol. 31, no 7, 2010, pp. 609-629.
101
Engineering Management Handbook
Johnson, James P., Korsgaard, M. Audrey, and Sapienza, Harry J. “Perceived Fairness, Decision Control,
and Commitment in International Joint Venture Management Teams,” Strategic Management Journal,
vol. 23, no. 12, 2002, pp. 1141-1160.
Joo, Baek-Kyoo and Park, Sunyoung, “Career Satisfaction, Organizational Commitment, and Turnover
Intention,” Leadership and Development Journal, vol. 31, no. 6, 2009, pp. 482-495.
Jorgensen, Bradley, “Baby Boomers, Generation X, and Generation Y?: Policy Implications for Defense
Forces in the Modern Era,” Foresight, vol. 5, no. 4, pp. 41-49, 2003.
Jurkiewicz, C. E., and Brown, R. G. “GenXers vs. Boomers vs Matures: Generational Comparisons of
Public Employee Motivation,” Review of Public Personnel Administration, vol. 18, 1998, pp. 18-37.
Karp, H., Sirias, D., Arnold, K. “Teams: Why Generation X Marks the Spot. The Journal for Quality and
Participation, vol. 22, 1999, pp. 30-33.
Karp, Tom, “Develop Oneself as a Leader,” Journal of Management Development, vol. 32, no. 1, 2012.
Keepnews, David M., Brewer, Carol S., Kovner, Christine T., and Shin, Juh Hyun, “Generational Differ-
ences Among Newly Licensed Registered Nurses,” Nursing Outlook, vol. 58, 2010, pp. 155-163.
Kelley, R. E., “Power of Followership: How to Create Leaders People Want to Follow and Followers Who Lead
Themselves, New York: Double Currency, 1991.
Kondratuk, Tammy B., Hausdorf, Peter A., Korabik, Karen, and Rosin, Hazel M., “Linking career Mobil-
ity with Corporate Loyalty: How Does Job Change Relate to Organizational Commitment?” Journal
of Vocational Behavior¸ vol. 65, 2004, pp. 332-349.
Kuperschmidt, B. R., “Multigeneration Employees: Strategies for Effective Management,” The Health
Care Manager, vol. 19, 2000, pp. 65-76.
Loomis, J., “Generation X,” Rough Notes, vol. 143, no. 9, 2000, pp. 52-54.
Martin, Harry J., “Improving Training Impact Through Effective Follow-Up: Techniques and Their Ap-
plication,” Journal of Management Development, vol. 29, no. 6, 2010, pp. 520-534.
May, D. R., Gilson, R. L. and Harter, L. M., “The Psychological Conditions of Meaningfulness, Safety
and Availability and the Engagement of the Human Spirit at Work,” Journal of Occupational and
Organizational Psychology, vol. 77, no. 1, 2004, pp. 11-37.
McGuire, David, By, Rune Todnem, and Hutchings, Kate, “Towards a Model of Human Solutions for
Achieving Intergenerational Interaction in Organisations,” Journal of European Industrial Training,
vol. 31, no. 8, 2007, pp. 592-608.
Merritt, Stephen R., and Neville, Shelley, “Generation Y,” The Serials Librarian, vol. 42, no. 1-2, 2003, pp.
41-50.
Meyer, J. P. and Allen, N. J., “A Three Component Conceptualization of Organization Commitment,”
Human Resource Management Review, vol. 1, no. 1, 1991, pp. 61-89.
Meyer, J. P., and Herscovitch, L., “Commitment in the Workplace: Toward a General Model.” Human
Resource Management Review, vol. 11, 2001, pp. 299-326.
Meyer, J. P., Stanley, D. J., Herscovitch, L., and Topolnytsky, L., “Affective, Continuance, and Normative
Commitment to the Organization: A Meta-analysis of Antecedents, Correlates, and Consequences,”
Journal of Vocational Behavior, vol. 61, 2002, pp. 20-52.
Silver, Mitchell, Changing Demographics of Eastern NC in 2050, November 3, 2011, ECU-TV.
Mraz, Stephen, J., “Changes in the Engineering Profession Over 80 Years,” Machine Design.com, 2009.
Peterson, Christopher and Seligman, Martin, Character, Strengths and Virtues. A Handbook and Classifica-
tion, Oxford University Press, 2004.
Ray, Linda Keith. Follow the Leader: An Investigation of the Relationship Between Hierarchical Levels and
Measures of Follower Behaviors of Selected NC Community College Employees, A Dissertation, Greenville,
NC, East Carolina University, 2006.
Rich, Theresa A., Becoming the boss whisperer: An Examination of the Relationship Between Employee Follow-
er Behaviors and Supervisor Satisfaction With Employee Performance, A Dissertation. Minneapolis MN:
Capella University, 2008.
102
Managing the Multi-Generational Knowledge Based Workforce
Ricketson, Rushton S., An exploration of the relationship of leadership styles and dimensions of courageous
followership, A Dissertation, Virginia Beach, VA, Regents University, 2008.
Riggio, Ronald E., Chaleff, Ira, and Lipman-Blumen, Jean, The Art of Followership, Jossey-Bass, 2008.
Shaw, Sue and Fairhurst, David, “Engaging a New Generation of Graduates,” Education + Training, vol.
50, no. 5, 2008, pp. 366-378.
Sinclair, Robert R., Leo, Michael C., and Wright, Chris, “Benefit System Effects on Employees’ Benefit
Knowledge, Use, and Organizational Commitment,” Journal of Business and Psychology, vol. 20, no. 1,
2005, pp. 3-29.
Smola, Karen Wey and Sutton, Charlotte D., “Generational Differences: Revisiting Generational Work
Values for the New Millennium,” Journal of Organizational Behavior, vol. 23, no, 4, Special Issue:
Brave New Workplace: Organizational Behavior in the Electronic Age, 2002, pp. 363-382.
Tomkiewicz, Jospeh and Bass, Kenneth, “Attitudes of Business Students Toward Management Generation
Cohorts,” North American Journal of Psychology, vol. 10, no. 2, 2008, pp. 435-444.
Watsi, S. Arzu, “Commitment Profiles: Combinations of Organizational Commitment Forms and Job
Outcomes,” Journal of Vocational Behavior, vol. 67, 2005, pp. 290-308.
Wiener, Y. “Commitment in organizations: A normative view.” Academy of Management Review, vol. 7,
1982, pp. 418-428.
Xu, Jessica and Thomas, Helena Cooper, “How Can Leaders Achieve High Employee Engagement?,”
Leadership & Organization Development Journal, vol. 32, no. 4, 2011, pp. 399-416.
Zemke, Ron, Raines, Claire, and Filipczak, Bob, Generations at Work, AMACOM Books, 1999.
103
104
Operations Research
9
Operations Research
Scott E. Grasman
Rochester Institute of Technology
Abhijit Gosavi
Missouri University of Science and Technology
Katie McConky
Rochester Institute of Technology
105
Engineering Management Handbook
106
Operations Research
2. Data Collection specifies the data collection, processing, analysis, and management requirements.
3. Model Formulation translates the problem definition into mathematical form by stating decision
variables, objective and constraint functions.
4. Model Verification checks to make sure the model is working as intended. This is especially import-
ant with the implementation of technology based solutions.
5. Solution is generating an answer to your defined problem using the verified model. The solution
method is dependent on the model formulation.
6. Validation ensures that the model developed accurately represents the real system.
7. Presentation of Results combines the quantitative analysis and results with other factors such as com-
pany objectives.
8. Implementation applies the solution and recommendation to achieve the desired outcomes.
Operations Research has lead to a variety of deterministic and stochastic models that are appropriate
for use by engineering managers. Applications include traditional engineering disciplines such as man-
ufacturing and technology management, but have also lead to process improvement in sectors such as
health care, financial services, and entertainment. Specific models and applications are discussed in the
following sections. It is noted here, that these models often involve the designation, “program.” Although
computer programming has been instrumental in the implementation of solution algorithms for these
models, the term originate from the concept of “order of operations.” Mathematical programs were re-
searched and applied long before the invention of computers.
Define
Problem
Collect
Data
Formulate
Model
No
Verify?
Yes
Solve
Model
Present No
Valid?
Results
Yes
Implement
Solution
107
Engineering Management Handbook
Although many practical problems are essentially linear, linear programming can also be used to ad-
dress more complex problems. These techniques will be described in later sections.
n n
maximize Z = ∑c jxj minimize Z = ∑c
j =1
j xj
j =1
subject to : subject to :
n n
108
Operations Research
The linear matrix nature of the formulation is evident from Figure 9.2. These characteristics are lever-
aged to obtain optimal solutions.
Solution Techniques
The main technique for solving linear programs is the Simplex Method (Dantzig), or a variation on the
Simplex Method. Other methods, e.g., Interior Point Methods (Karmarkar’s Algorithm), have also been
successfully applied to linear programs or special cases of linear programs. While the details of these
methods will not be provided here (see Hillier and Lieberman, 2010), small linear programs can be solved
graphically, along with linear algebra, to provide insight into the solution techniques.
Consider the following linear program.
maximize Z = 2 x1 + 3 x 2
subject to
2 x1 + x 2 ≤ 4
x1 + 2 x 2 ≤ 5
x1 , x 2 ≥ 0
The problem may be solved by graphing all constraints in order to establish the feasible region, i.e., the
points that satisfy all constraints, and by plotting iso-objective lines that are used to find an optimal solution.
The shaded region in Figure 9.3 is the feasible region, while the dotted lines represent the iso-objective lines.
x2
x1
x1 , x2 ≥ 0
x1 + 2x2 ≤ 5000
2x1 + x2 ≤ 4000
109
Engineering Management Handbook
As the iso-lines in Figure 9.4 are moved “up and to the right”, the objective value increases, thus the
optimal solution is obtained by moving an iso-line to the extreme of the feasible region.
x2
Intersection of:
2x1 + x2 = 4000
x1 + 2x2 = 5000
x1 = 1000, x2 = 2000
Z = $8000
x1
x1 , x2 ≥ 0
x1 + 2x2 ≤ 5000
2x1 + x2 ≤ 4000
Once the corner point is identified, as in Figure 9.4, linear algebra can be used to solve for the optimal
solution.
The main observation is that an optimal solution will be at one of the corners or extreme points of the
feasible region. More specifically, an optimal solution will exist at, at least one corner point solution; if
the optimal iso-line is parallel to a constraint, then there are multiple optimal solutions. In other cases, it
is possible that no feasible solutions exist, i.e., the combination of constraints is too restrictive, or that the
objective function is unbounded, i.e., the combination of constraints is too relaxed. In these situations
the model should be reformulated and validated.
The main observation, that optimal solutions occur at extreme points of the feasible region, is the
basis for most LP solution algorithms, including the Simplex Method. For more information on solution
theory, the reader is referred to Hillier and Lieberman (2010). Of course, linear programs may be solved
using algorithms implemented in computer software applications. These range from simple spreadsheet
applications to advance commercial software packages.
Range of Optimality—How much coefficients can change without changing optimal solution.
Graphically, the range of optimality is found by changing the slope of the objective function line
within the limits of the slopes of the binding constraint lines. At this point, the iso-lines will last intersect
at two corners, causing multiple solutions; beyond this, the original optimal solution will no longer be
optimal.
110
Operations Research
For a two variable example with objective function c1x1 + c2x2, and binding constraints, a11x1 + a21x2 =
b1 and a12x1 + a22x2 = b2, the range of optimality is given by:
a11 c1 a12
– ≤ – ≤ – .
a21 c2 a22
Changes to a single objective value coefficient are fairly straightforward to handle, while multiple
changes require further analysis. When changes are made to multiple objective coefficients, the percent-
age change relative to the range of optimality of each changing coefficient is calculated. If the sum of the
percentage changes does not exceed 100%, then the original optimal solution will remain optimal. If the
sum exceeds 100%, then the optimal solution may or may not change. The key is the relative change of
the coefficients and their effect on the slope of the objective function. For example, multiplying all coeffi-
cients by a constant will not change the slope of the objective function, regardless of the magnitude.
In most cases, computer software applications are used to solve and provide this information, though
the same logic applies to higher dimension problems.
Reduced Costs—How much a coefficient must change in order to enter the optimal solution.
If an activity is relatively too costly, or does not generate enough revenue, then this activity will not
be included in the optimal solution. The reduced cost indicates the change (reduction) in cost required
to make the activity desirable. Conversely, if an activity is not relatively profitable, then the reduced cost
indicates the required change (increase) in profit/revenue. The engineering manager can use this informa-
tion for pricing decisions, as well as identification of cost reduction strategies.
Reduced costs may be found in the same manner as the range of optimality. By leaving the other ob-
jective coefficients unchanged, the range of optimality of the coefficient of interest indicates the reduced
cost.
Shadow Prices—How much the optimal objective value changes with changes in a constraint (within
limits).
Shadow prices are perhaps the most useful sensitivity information because they indicate the linear
change in objective value due to increases or decreases in available resources or requirements. The engi-
neering manager can use this information to determine if additional resources should be obtained or if
requirements should be adjusted.
Shadow prices are determined by obtaining the slope/gradient of binding constraints. Again, this may
be done mathematically, but is normally done using commercial software applications.
Allowable ranges indicate how much the constraint, resource, or requirement, can change without
invalidating the shadow prices. Beyond the allowable range, the objective value may continue to improve;
however, the rate of change will be different. The allowable ranges are determined by obtaining the point
at which a binding constraint no longer becomes binding, or a nonbinding constraint becomes binding.
The 100% Rule also applies in that shadow prices will remain valid as long as the sum of the percentage
changes does not exceed 100%. Additional analysis is required if the change exceeds 100%.
111
Engineering Management Handbook
For the standard form linear programs shown in Figure 9.2, the dual linear programs are shown in
Figure 9.5.
Once the dual has been formulated, complementary slackness may be used to obtain the solution and
sensitivity analysis for both models. Generically, the solution to the dual problem provides the shadow
prices for the primal constraints and can be used in decision-making as previously described. The dual
solution can also be used to determine the range of optimality, but this process is a bit less transparent.
For more information on this duality, see Hillier and Lieberman (2010).
9.2.5 Applications
For application purposes, linear programs are often classified into one of four categories based on the
objective function and the set of constraints. These classifications include resource-allocation, cost-tradeoff,
fixed-requirement, and mixed problems (see Hillier and Hillier, 2008).
Cost-Tradeoff—Linear programming problems where the various activities are chosen to satisfy require-
ments, typically at minimum cost. Constraints are requirement constraints, in that the amount allocated
must be greater than or equal to the requirement. Typical examples include activity-mix problems, per-
sonnel scheduling problems, and others.
Fixed-Requirement—Linear programming problems involving allocation of activities such that the amount
provided is equal to the amount required. Functional constraints are fixed requirement constraints. Many
common applications relate to network optimization models, such as transportation/assignment prob-
lems, shortest/longest path problems, maximum flow problems, and spanning trees.
The engineering manager can address these applications through the implementation of standard
procedures presented earlier, of course, with the assistance of software applications. A common example is
the use of fixed-requirement models for critical paths in project networks.
9.2.9 Applications
Though integer programming relates to any mathematical model with integer variables, there is much
overlap with network optimization problems (transportation/assignment problems, shortest/longest path
problems, maximum flow problems, and spanning trees). Facility location, inventory modeling, schedul-
ing, and investment are additional popular application areas.
113
Engineering Management Handbook
The quality of approximation depends on the number of piecewise functions used in the approximation.
Hewitt et al. (2015) provide a methodology to overcome this challenge by adapting a reformulation
technique from non-convex optimization to model non-linear functions with a discrete domain using sets of
binary and continuous variables and linear constraints.
9.3.3 Applications
Some high profile applications of interest to the engineering manager include marketing and inventory
management. In these areas, non-proportional relationships commonly exist among various profit/revenue
or cost parameters. In some cases, these relationships may be made linear by using auxiliary binary vari-
ables (as described earlier). Other common non-linear relationships are prevalent in financial management
and risk management due to compound interest, variance and co-variance.
9.4.2 Applications
Due to the network nature of dynamic programming models, the network models discussed earlier are
prime candidates for dynamic programming formulations. Additionally, inventory modeling and invest-
114
Operations Research
ment decisions are popular applications. Dynamic programming may also be used to solve integer and
non-linear models; however, the curse of dimensionality often hinders practical application due to long
solution times.
the probability that the system will transition to a given value of the next state (i.e., the state of the system
at time t+1) should depend only on what the current state is and what the next state is. This means that
the probability that the system will transition to a new state depends entirely on what the current state
and the new state are; further, it is independent of where the system has been in the past. This is called the
Markovian property, or the memoryless property.
A number of system parameters can be easily measured for a system that can be modeled as a Markov
Chain. This is because the Markov Chain lends itself to some straightforward mathematical analysis. We
will discuss one simple aspect of the Markov Chain that is almost invariably of special interest to man-
agers: calculation of the limiting probabilities, also called the invariant or steady-state probabilities, of the
Markov Chain.
Limiting Probabilities
The proportion of time spent by the Markov Chain in any given state in the long run is called the limit-
ing probability of the state. This concept is best illustrated with an example.
Consider a two-state Markov Chain. The transitions of the Markov Chain are defined by the so-called
one-step transition probabilities. Here, P(i,j) will denote the one-step transition probability or simply the
transition probability of going from state i to state j in one step. The transition probabilities can be conve-
niently stored in a square matrix, such that P(i,j) is the element in the ith row and the jth column in the
matrix. This matrix is called the transition probability matrix (TPM).
In a so-called regular Markov Chain, for every value of i and j, P n (i,j) > 0 for some finite value of n,
where Pn(i,j) denotes the element in the ith row and jth column of the TPM of the Markov Chain raised
to the nth power. For a regular Markov Chain, limn→∞P n (i,j) can be shown to exist and is independent of
i, i.e., it only depends on j; we will use the notation to denote limn→∞P n (i,j). This limit is called the limit-
ing (or steady-state) probability of the state j. The limiting probability of a state represents the proportion
of transitions the chain makes to that state in the long run (in other words, if we observe the system for a
long time). For the Markov Chain, it is usual to assume that the system spends the same amount of time
in every state and that the transitions are instantaneous; hence the limiting probability of a state also rep-
resents the proportion of time the chain spends in that state. It is thus clear that the limiting probability
provides us with useful information about the system.
The limiting probability can be easily computed from the TPM via the solution of the following
system of linear equations:
Assume that the Markov Chain models a machine that can either be “up” (working) or “down”
(under repair because of failure); state 1 stands for the up state and state 2 for the down state. Solving the
linear system of equations provided above, we obtain that π (1) = 0.7273 and π (2) = 0.2727. This solu-
116
Operations Research
tion provides the manager with a critical piece of information: the machine is down 27.27% of the time.
Analysis of this nature can lead to downtime reduction and process improvement.
Much of the work in building a Markov-chain model is in computing elements of the TPM. Once
the TPM is computed, it can be used elegantly to derive a number of system measures of interest to the
manager. Also, if the manager has access to the costs associated with spending time in a system, these
measures can also be useful for measuring the costs of operating a system under a given strategy. The
computations needed for these measures can be easily performed with the help of commonly available
software such as MS EXCEL or more sophisticated software programs such as MATLAB.
The above was a very simplified example (with a small 2-state Markov Chain) presented only for il-
lustrative purposes. However, we note that the principles of computing limiting probabilities can be easily
extended to scenarios with a larger number of states. In practice, it is common to see large Markov-chain
models with hundreds of states used by managers in production systems for inventory control, quality
control, and preventive maintenance. Markov Chains are also very useful in analyzing queues, which is a
topic that we will discuss in more detail next. Applications of Markov-chain-based models can be found
in a very large number of other domains, including wireless communication, analysis of banks, airports,
and amusement parks, robotics, speech recognition, forecasting, and biological modeling to name a few.
In the above, the third state is the absorbing state. Examples of systems that can be modeled with absorb-
ing Markov chains are a production process that moves through gradually deteriorating acceptable states
but eventually enters an absorbing state from where it cannot return to an acceptable state and the process
must be halted.
Interesting questions that are relevant in absorbing Markov Chains are: (1) If there are multiple
absorbing states, what is the probability that the system is absorbed by a given absorbing state? (2) What
is the expected number of transitions that occur before a system is absorbed in a given absorbing state?
Answers to these questions depend on the initial state of the system and the TPM. Some straightforward
mathematical analysis can be used to answer the questions posed above. Absorbing Markov Chains are
useful in analyzing biological processes and quality control processes. We refer the interested reader to
Ross (2006).
ance equations. It is easy to determine the rates from the underlying distributions. Note that use of these
balance equations works only for CTMCs and should not be used for other types of Markov Chains.
Let qij denote the rate of transition from state i to state j, and let vi denote the total rate of transition
from state i to all the other states. Thus, vi = Σqim, where the summation is over all values of m. Then,
the limiting probabilities can be determined by solving the following system of linear equations (balance
equations): For i=1,2, … , k,
and
Countless examples of CTMCs can be found in EM and social sciences, including the analysis of cer-
tain types of queues, inventory control, and studying biological processes (cancer cells, HIV, and flu virus
propagation). An attractive feature of the CTMC is that it can be analyzed very easily for its steady-state
properties via the balance equations provided above. However, a major criticism of the CMTC model is
that it works only if all the random variables for the sojourn times are exponentially distributed; this is
not usually the case in real-world applications.
General SMPs
The generalized model of the SMP in which the sojourn times do not have the exponential distribution
exploits properties of the embedded Markov Chain. In particular, to determine the proportion of time
spent by the SMP in any given state, one must first compute the limiting probabilities of the underlying
Markov Chain. Let L(i) denote the proportion of time spent in state i by the system. Then, if s(i) denotes
the mean sojourn time in state i, we have that:
for i=1,2, … , k and denotes the limiting probability of the ith state in the embedded Markov Chain.
More interestingly from the standpoint of the engineering manager, if there are costs involved in operating
the system, one can determine the average cost per unit time (ρ) of operating the SMP as follows:
where R(i) denotes the total cost of being in state i. The above is a very useful expression for quantifying
the performance of a semi-Markov process (and hence any CTMC and any Markov Chain) in terms of
dollars. Note that the expression developed above for the average cost of operating the system also works
for the Markov Chain by setting s(i) =1 for all values of i. The above formulation has been widely used
in the literature to develop objective functions of production systems (Tomasevicz and Asgarpoor, 2009;
Solo, Kharoufeh, and Ulukus, 2010; Nodem, Kenne, and Gharbi, 2011).
formed when there are one or more servers and a number of entities that need service from the server.
Examples of queues that are observed in real-world systems are: queues of jobs in front of machines in
a production shop, virtual queues of customers on telephones that form in call-centers, and queues of
passengers that form in the security checkpoint in an airport.
Long waiting lines generally imply long waits that typically result in frustration for those waiting.
On the other hand, ensuring short waits oftentimes requires a large number of servers or highly efficient
servers, who may charge higher salaries. Queuing systems are often studied for the mean (and higher
moments) of the waiting time and queue length, average utilization of the server, and the probability that
a customer reneges. Designing a queuing system appropriately is usually an important problem from the
standpoint of managing the system efficiently. Under-staffed servers can lead to longer than expected waits
driving customers away, while overstaffed servers can be expensive and can increase operating costs. We
will discuss some basic notions related to queues in what follows.
𝐿𝐿 = 𝜆𝜆 𝑊𝑊
where L denotes the average length, W denotes the average wait, and λ denotes the rate of arrival of
customers into the system. In other words, if one knows the arrival rate, then knowledge of the mean wait
in the system can be computed from the mean length and vice-versa. This is a very useful principle widely
used in analysis of queuing systems. A simple application is as follows. Let the mean length in a queue,
usually denoted by Lq, be 25 and the mean rate of arrival be 5 persons per minute, the mean waiting time
in the queue will be: Wq = 25/5 = 5 minutes. This kind of analysis can be applied to any queue or even a
queue, which is a part of a queuing network (which has several interconnected queues).
If the server is a machine in a production shop, the mean length in the system usually denotes the
work-in-progress (WIP) inventory associated with the machine. It turns out that Little’s rule has been
extensively used in analyzing lean manufacturing systems (e.g., Askin and Goldberg, 2002).
where μ denotes the mean rate of service by the server. It can be shown that ρ also equals the proportion
of time the server is busy, i.e., the utilization of the server.
119
Engineering Management Handbook
We will discuss four types of single-server queuing models. We will assume that the server is available
at all times and that the queue is stable. To describe these models, we will first introduce some commonly
used queuing notation, the Kendall-Lee notation. A queue is often described with the symbolic: X/Y/n/s,
where X denotes the distribution of the inter-arrival time, Y denotes the same for the service time, n
denotes the number of servers, and s denotes the capacity of the waiting line in the queue. When s is
omitted, it implies that there is infinite waiting capacity in the queue. M is commonly used to represent
the exponential distribution and G is used to stand for general, i.e., any given arbitrary distribution. Thus,
an M/G/1 queue is a single-server queue whose inter-arrival time is exponentially distributed and service
time is generally distributed (has any arbitrary distribution).
M/M/1 Queues
The continuous-time Markov Chain model discussed above can be used to generate the following expres-
sion for the mean length of an M/M/1 queue:
where ρ denotes the utilization of the server (as defined previously). Via Little’s rule, one can compute the
mean wait in the queue. The mean wait in the system, W, for this queue is given by:
which follows from the fact that the mean wait in the system is a sum of the mean wait in the queue, Wq,
and the mean time in service at the server which is 1/μ. From W, via Little’s rule, it is easy to compute the
value of L, the mean number in the system.
M/G/1 Queues
This queue has been studied extensively over the years, but the most useful result related to this queue was
developed by Pollaczek and Khintchine in the 1930s. Their result, usually called the Pollaczek-Khintchine
formula, produced the following exact expression for the queue length:
where σS2 denotes the variance of the service time. Little’s rule (Equation 1) and Equation 2 can then be
used to determine the mean wait in the queue and the system. This formula is very useful in production
systems and in telecommunication systems.
G/G/1 Queues
This is the most general model that has the greatest applicability. Unfortunately, no closed-form formula
exists for its basic performance measures (queue length or wait). Marchal (1976) developed a very use-
ful approximation that works extremely well in practice. We present it next, along with some additional
quantities needed for this model. Let:
• C2: coefficient of variation of a random variable, i.e., C2 = variance /(mean)2
• : variance of the inter-arrival time
• C : coefficient of variation of the service time
s
2
120
Operations Research
The previous equation is used in measuring waits in telecommunication systems, analysis of waiting
times in amusement parks, and in measurement of inventory in Kanban-controlled systems.
It is to be noted that Little’s rule and Equation 2 can be used in the context of this queue as well.
Under heavy traffic, i.e., roughly speaking when:
a much superior approximation, called the heavy traffic result, exists for the G/G/1 queue (see Medhi, 2002);
this result makes use of a stochastic process called Brownian motion (discussed later in the chapter).
9.6.1 Meta-heuristics
Meta-heuristics are relatively new heuristic techniques that attempt to solve those problems arising in
discrete and combinatorial optimization which cannot be solved via exact methods such as branch and
bound or dynamic programming. The field of discrete optimization is well-known for problems that
do not have any nice structure. Methods that produce global optimal solutions usually break down on
these problems due to their size or the structure. Another characteristic of these problems is that there are
usually multiple optima and derivative-based techniques can get trapped in local optima, which are not
necessarily the global optima. On such problems, a class of methods called meta-heuristics has emerged in
recent times. Because a very large number of real-world problems share these characteristics, this remains
an important challenge in the field of OR.
The meta-heuristic solutions in general tend to start at any arbitrary solution and “move” to bet-
ter solutions in their neighborhood. Hence, meta-heuristics are also sometimes called neighborhood
search methods or local search methods. Some meta-heuristics, however, tend to search over domains of
the objective function that are not in the neighborhood of the current solution. The three best-known
meta-heuristics are: genetic algorithms (Holland, 1975), simulated annealing (Kirkpatrick, Gelatt, and
121
Engineering Management Handbook
Vecchi, 1983), and Tabu Search (Glover, 1986; Hansen, 1986). This list is not exhaustive, however, and
other options include ant colony optimization, greedy randomized adaptive search procedure (GRASP),
variable neighborhood search, and iterated local search to name only a few (Blum and Roli, 2003).
Genetic algorithms tend to rely on a stochastic search in which the move from the current solution
to the next is guided by a random process that uses ideas from evolution. Simulated annealing is also a
stochastic search algorithm in which the move from the current solution to the next is inspired by a met-
allurgical process. Tabu search is a so-called “recency-based” search technique in which the move from the
current solution to the next is based on the moves that have actually occurred in the recent history of the
algorithm. All of these algorithms have their advantages and drawbacks. See Pham and Karaboga (2000)
for a discussion of their details and applications in engineering.
The genetic algorithm uses a strategy of cross-over that occurs in chromosomes during reproduction.
The strategy for selecting an improved solution mimics that of the evolutionary processes such as muta-
tion. Typically, in a genetic algorithm, one moves from a population of solutions to another. This is one of
the first biologically inspired meta-heuristics.
Simulated annealing as stated above relies on a technique used in metallurgy for strengthening metals to
obtain high quality solutions. In the annealing technique in metallurgy, the temperature of the liquid metal
is lowered at a sufficiently high rate so that it acquires some desirable properties, e.g., mechanical strength,
as it solidifies. In simulated annealing, the role of temperature is played by the probability of moving to a
solution that is not better than the current solution. As the algorithm progresses, this probability is reduced;
in other words, the temperature is reduced. It is hoped that during the initial stages of the search process,
the algorithm avoids all the local optima and escapes out of them, but after searching the solution space for a
sufficiently long time period, eventually gets trapped in a local optima that is also a global optimum.
Tabu search is different from the two techniques described above in that it is not usually a stochastic
search. However, in tabu search moving from one solution to a better solution is quite flexible. The strat-
egy to move from one solution to another can exploit the structure of the problem if it is known. What is
important in tabu search is that a list is maintained of recent moves. If a move has been made recently and
is in the list, also called tabu list, it is not permitted. This ensures that the algorithm does not repeatedly
traverse the same set of solutions.
We would like to note that meta-heuristics are very widely applied in industry for solving large-scale
and complex combinatorial optimization problems. Some of the noteworthy applications of meta-heu-
ristics have occurred in the area of machine scheduling, transportation routing of large supply chains,
logistics management, layout designing, VLSI circuit design, and airline scheduling.
Mathematical Model
We will explain the mathematical model underlying an MDP with a simple example. Consider a 2-state
Markov Chain in which two actions are permitted in each state. For instance, in the example considered
in the Limiting Probabilities section in this chapter, the two actions could be “Repair the Machine” and
“Do Nothing.” Usually, a unique TPM is associated with every action. Also, in the MDP model, one has
a so-called Transition Reward Matrix (TRM), which contains data for the immediate reward gained in
going from one state to another. Consider the following MDP:
122
Operations Research
where TPMa and TRMa denote the TPM and TRM, respectively, associated with action a. The element in
the ith row and jth column of the matrix TRMa denotes the reward gained from selecting action a in state
i and transitioning to state j as a result. Like the TPM, a unique TRM is associated with each action.
A typical goal of the MDP is to consider the evolution of the system over the long-run, i.e., an
infinite time horizon. A policy is a map from the state space to the action space. A deterministic policy
specifies a unique action for each state in the system. Using optimization techniques, it is possible to
determine the “best” deterministic policy that optimizes some performance measure, provided an optimal
deterministic policy exists.
Using the TPMs and the TRMs, it is possible to develop expressions for the long-run average reward
per unit time or the total discounted reward earned over the long run. We will present an expression for
the first measure, average reward. Let p(i,a,j) denote the term in the ith row and jth column of TPMa and
r(i,a,j) denote the corresponding term in TRMa. Then, the average reward, ρ, of a policy in which action
a is chosen in every state is given by:
where denotes the limiting probability of state i when action a is chosen in every state. Clearly, ρ
depends on the policy, and the optimal policy is one for which ρ is maximized.
One way to determine the optimal policy is to evaluate the objective function of every policy, which
can make the problem very difficult to solve because typically there is a very large number of policies; for-
tunately methods based on linear programming and dynamic programming have been devised, which are
more efficient for solving these problems (Bertsekas, 1995). Dynamic programming methods originated
from the work of Bellman (1957) and Howard (1960). Recent developments in the field of reinforcement
learning (Bertsekas and Tsitsiklis (1996); Sutton and Barto (1998); Szepesvari (2010); Gosavi (2014) have
allowed managers to solve an MDP within a simulator of the system without access to the TPMs, which
may be notoriously hard to find for complex and large-scale systems.
Applications
MDPs have been used widely in a variety of domains. A critical difficulty in applying the MDP model
in the real world has always been the task of generating the transition probabilities. If this can be over-
come or circumvented (possibly via simulation-based methods such as reinforcement learning), the MDP
provides high-quality solutions that can outperform industrial heuristics. We will now discuss some key
applications of MDPs in the industry.
Inventory Control: Many of the fundamental inventory control models such as (S,s) strategies have been
analyzed via MDPs. In the area of supply chains MDPs continue to provide useful insights that often
lead to reduction of costs and increase of profits. The interested reader is referred to Fox, Barbueanu, and
Teigen (2000) for a tutorial on how the MDP framework forms the underlying basis for agent-based
architectures in modern supply chain management software.
Communication Networks: Management of cell-phone networks and asynchronous transfer mode (ATM)
networks requires the solution of routing problems and so-called admissions control problems. Many of
these problems are usually set up as MDPs and solved via the techniques enumerated above (Altman, 2002).
123
Engineering Management Handbook
Revenue Management: Revenue management is a broad field that encompasses study of pricing problems
in the context of resource allocation. The problem of allocating seats to “fare classes” is a central one for
the airline industries and hotels that use revenue management extensively in their operations. The revenue
management can be set up as a finite horizon MDP (Subramaniam, Stidham, and Lautenbacher, 1999).
A related infinite horizon MDP has also been solved by reinforcement learning (Gosavi, 2004; Gosavi,
Bandla, and Das, 2002).
Financial Engineering: Black and Scholes (1973) developed the famous Black-Scholes formula that uses
a Brownian motion model to describe the fluctuation of stock prices. (This work, in combination with
parallel work completed by Merton (1973) has been awarded a Nobel Prize in economics.) These ideas
have been subsequently extended to numerous other topics in the study of stock markets, options, and
other monetary instruments offered by banks and financial institutions. It is the case that almost all the
mathematical models in financial engineering rely on some sort of stochastic process. This is an area of
ongoing research.
Queuing Networks: A queuing network is a system in which customers from one queue join another
queue(s) in the system. Usually the queues are inter-connected. Queuing networks are notoriously hard
to analyze. Queuing networks are very common in manufacturing systems with serial or forked transfer
lines. Queuing networks are common in particular in semi-conductor manufacturing. Starting with the
work of Kingman (1962), Brownian motion has been used to study the single-server single channel queue
under the so-called heavy traffic conditions. This body of work has now been significantly expanded
and provides some very powerful results in the analysis of queuing systems including queuing networks
(Chen and Yao, 2001). This is also an area of active research that holds tremendous promise of generating
closed-form models for performance analysis of complex queuing systems and scheduling of workloads in
queuing networks.
Inventory Control: Brownian motion has been used to model inventory (Sethi and Thompson, 2000) in
production systems. Brownian motion has also been used to model the behavior of a deteriorating quality
control process. Although it is unclear how many of these models have been actually used by practicing
engineering managers, because many of these works are still in the early stages of research and develop-
ment, it is well-known that many operations research models in the stochastic area that started out as
theoretical concepts are now widely applied and used in the industry, examples being the news vendor in
124
Operations Research
supply chain management (Wong, Qi, and Leung, 2009) and Littlewood’s equation (Littlewood, 1972) in
revenue management.
function value. Hence, combining simulation with optimization techniques can be challenging. However,
recent breakthroughs in continuous optimization, e.g., simultaneous perturbation (Spall, 1992) and in
control theory, e.g., reinforcement learning (Watkins, 1984) has made it possible to combine simulation
with optimization (see Gosavi, 2003 for an overview of this topic).
Applications
Simulation is very widely used in the military for planning their operations, by health-care service pro-
viders such as hospitals and ambulance services, for analyzing electrical communication networks, for
analyzing the operations of an amusement park, and of course in production systems. In production
systems, the uses of simulation are many: measuring the throughput of a system, measuring the inventory
in a system and the lead time of a new product, analyzing the throughput and inventory of a system with
automated guided vehicles (AGVs), and detecting the bottleneck in a system.
Oftentimes, the analysis in the systems described above revolves around measuring the time taken
to perform an activity, waiting times in queues involved in these systems, and the utilization of servers in
the queues. Very importantly, simulation can provide critical answers to what-if questions that can lead to
improvements in the design of the system.
within the premise in order to change their settings to accommodate the new price of electricity. Mean-
while, the Smart Meters are reporting back to the utility usage data at frequencies of up to every 5 minutes.
Data is collected and analyzed by the utility on these usage patterns. Optimal pricing strategies are developed
in order to reduce peak demand on the electric grid. Smart Meters also relay outage information back to the
utility. The utility can then use that information to optimize restoration efforts. Notice, even in this Smart
Grid example, that despite the large amount of data, the data is still being used for traditional OR tasks:
optimizing a restoration plan, optimizing price signals to produce a desired demand pattern, and optimizing
appliance function to minimize electricity cost.
Despite the large volume of data generated by the Internet of Things and enterprise Big Data systems,
the same OR questions still apply to the system as a whole. The ORer still wants to maximize profits,
minimize waste, and generally use resources most efficiently as possible. The connection to Big Data is
that there is now more data to work with and with that comes more areas for optimization. Big Data
frameworks have significant impact on Step 2: Data Collection of the OR Methodology presented in
Section 1.3. Here the Operations Researcher can aid in identifying data collection requirements, and can
benefit significantly from the data collected. The additional data available to Operations Researchers in a
Big Data enterprise promises to improve the model validity and the value add for OR based analyses.
127
Engineering Management Handbook
Once data is generated, acquired, and transmitted the next phase is data storage. Storing Big Data
requires the use of new information technology infrastructure that may or may not exist in your current
enterprise. Due to the size of Big Data, storage systems require data be distributed across multiple inter-
connected servers, and consideration needs to be given to consistency, availability and partition tolerance
(Brewer, 2000). Distributed file systems are fairly mature and include open source options such as HDFS
and Kosmosfs. Depending on the type of data being stored, you may want to have a key-value database
such as Dynamo, a Column-Oriented Database such as HBase or Google’s BigTable, a document database
such as MongoDB or CouchDB, or a combination of two or more of the above.
Finally, after the data have been generated, acquired and stored comes the analysis phase. It is in the
data analysis phase that OR resides. While common data analysis tools such as R or CPLEX can still be
used on subsets of big data datasets, significant progress has been made in exploiting Big Data distributed
frameworks, such as Map Reduce, to solve complex integer programs (Chandu, 2014).
Electricity Theft Detection: TROVE, a predictive data science company, in partnership with Teradata
(2015), a commercial big data information management and analytics platform, provide details on the use
of big data to identify incidences of electricity theft for a large west coast US utility. Like many progressive
utilities, when this utility transitioned to Smart Meters, they lost their eyes in the field as meter readers
no longer needed to visit meters. Prior to using a Big Data strategy, the utility’s primary theft detection
system was focused on leads generated by customers calling in to report suspicious activity. In a single
year, 15,000 such leads were investigated, generating a hit rate of only 30% true incidence of theft. By
instead focusing on their many internal data sources, the utility was able to improve their performance.
TROVE was able to increase the lead hit rate from 30% to 86% by fusing smart meter data with custom-
er demographic information, premise data, and other available sources, and then applying segmentation
and optimization algorithms.
Emergency Management: Wamba et al. (2015) provided details of a longitudinal case study on the use of
Big Data by New South Wales State Emergency Service (NSW SES), which integrated both structured
and unstructured data to form a comprehensive picture of the state of their 17 regions. The data integrat-
ed information sources including real-time volunteer staff availability, GIS, equipment availability and
location, weather services, police service data, fire and rescue readiness, rural fire readiness, public infor-
mation services, public welfare services, health services, energy and utility services, and environmental
services. By integrating all these systems, the NSW SES was able to enhance their situational awareness
enabling them to evaluate and assess mission readiness. The system allowed for the improved coordina-
tion of emergency response by coordinating 17 regional headquarters, including current staffing and GIS
systems, to track and monitor mission completion. Furthermore, the system allowed visibility into “who
and where,” which allowed for the reallocation of assets across the region in order to maximize emergency
readiness. Finally, with visibility into the entire system, NSW SES was able to optimize future invest-
ments by minimizing current vulnerabilities. Cited as crucial for the system to work was active engage-
ment from both the implementation team and top management.
9.8 References
Altman, E., “Applications of Markov Decision Processes in Communication Networks,” In Handbook of
Markov Decision Processes, edited by E. Feinberg and A. Schwartz, Chapter 15, 2002, pp. 489-536.
Askin, R., and Goldberg, J., Design and analysis of lean production systems. New York: Wiley, 2002.
128
Operations Research
Banks, J, Carson, J, Nelson, D, and Nicol, D., Discrete-Event System Simulation, 4th edition, Prentice
Hall, 2006.
Bellman, R. E., Dynamic Programming. Princeton, NJ: Princeton University Press, 1957.
Bertsekas, D. P., Dynamic programming and optimal control. Belmont, MA: Athena Scientific, 1995.
Black, F. and Scholes, M., “The Pricing of Options and Corporate Liabilities.” The Journal of Political
Economy, vol. 81, no. 3, 1973, pp. 637-654.
Blum, C., and Roli, A., Metaheuristics in Combinatorial Optimization: Overview and Conceptual Com-
parison. ACM Computing Surveys, vol. 35, no. 3, 2003, pp. 268-308.
Brewer, E., Towards Robust Distributed Systems. In PODC, pg 7, 2000.
Chandu, D., “A Parallel Genetic Algorithm for Three Dimensional Bin Packing with Heterogeneous
Bins,” International Journal of Computer Trends and Technology, vol. 17, no. 1, 2014, pp. 33-38.
Chen, H. and Yao, D., Fundamentals of Queueing Networks: Performance, Asymptotics, and Optimization,
New York: Springer, 2001.
Chen, M., Mao, S., Zhang, Y., and Leung, V. Big Data: Related Technologies, Challenges and Future
Prospects. New York: Springer, 2014.
Das, T.K. and Sarkar, S., “Optimal Maintenance in a Single Machine Production Inventory Systems,” IIE
Transactions on Quality and Reliability Engineering, vol. 31, no. 6, 1999, pp. 537-551.
Denardo, E. V., Dynamic Programming: Models and Applications, New York: Dover Publishers, 2003.
Einstein, A., Investigations on the Theory of Brownian Movement. New York: Dover Publishers, 1956.
Fox, M., Barbueanu, M., and Teigen, R., Agent-Oriented Supply-Chain Management, International Jour-
nal of Flexible Manufacturing Systems, vol. 12, 2000, pp. 165–188.
Gass, S. I. and Arjang, A., An Annotated Timeline of Operations Research: An Informal History, Robert H.
Smith School of Business, University of Maryland, 2004.
Glover, F., “Future paths for integer programming and links to artificial intelligence.” Computers and
Operations Research, vol. 13, 1986, pp. 533-549.
Gosavi, A., “A reinforcement learning algorithm based on policy iteration for average reward: empirical re-
sults with yield management and convergence analysis.” Mach Learning, vol. 55, no. 1, 2004, pp. 5-29.
Gosavi, A., Simulation-Based Optimization: Parametric Optimization and Reinforcement Learning. Kluwer
Academic Publishers (now Springer), 2003.
Gosavi, A., Bandla, N., & Das, T., “Airline seat allocation among multiple fare classes with overbooking,”
IIE Transactions, vol. 34, no. 9, 2002, pp. 729-742.
Gross, D. and Harris, C. M., Fundamentals of Queueing Theory, Wiley Inter-science, 3rd edition, 1998.
Hansen, P. “The steepest ascent mildest descent heuristic for combinatorial programming,” In Conference
on Numerical Methods in Combinatorial Optimisation, Capri, Italy, 1986.
Hewiit, M.R., Chacosky, A., Grasman, S. E., and Thomas, B. W., “Integer Programming Techniques for
Solving Non-Linear Workforce Planning Models with Learning.” European Journal of Operational
Research, vol. 242, no. 3, 2015, pp. 942-950.
Hillier, F. S. and Hillier, M. S., Introduction to Management Science, 3rd edition, McGraw-Hill, 2008.
Hillier, F. H. and Lieberman, G. J., Introduction to Operations Research, 9th edition, McGraw-Hill, 2010.
Hillier, F. S. and Hillier, M. S., Introduction to Management Science, 4th edition, McGraw-Hill, 2010.
Holland, J. H., Adaptation in Natural and Artificial Systems. Ann Arbor, MI: University of Michigan Press,
1975.
Howard, R. A. Dynamic Programming and Markov Processes, The M.I.T. Press, 1960.
Kharoufeh, J., Solo, C., and Ulukus, M. Semi-Markov models for Degradation-Based Reliability. IIE
Transactions, vol. 42, 2010, pp. 599-612.
Kingman, J. F. C., “On Queues in Heavy Traffic.” Journal of the Royal Statistical Society. Series B (Methodo-
logical), vol. 24, no. 2, 1962, pp. 383-392.
Kirkpatrick, S., Gelatt, C. D. and Vecchi, M. P., “Optimization by simulated annealing.” Science, vol.
220, no. 4598, 1983, pp. 671-680.
Law, A. M. and Kelton, W. D., Simulation Modeling and Analysis, Third Edition, McGraw Hill, 2000.
Littlewood, K., “Forecasting and control of passenger bookings.” In Proceedings of the 12th AGIFORS (Air-
line Group of the International Federation of Operational Research Societies) Symposium, pp. 95-117, 1972.
129
Engineering Management Handbook
Marchal, W. G., “An approximate formula for waiting time in single server queues,” AIIE Trans, vol. 8,
1976, p. 473.
Medhi, J., Stochastic Models in Queueing Theory, 2nd edition, Academic Press, 2002.
Merton, R., “Theory of Rational Option Pricing,” Bell Journal of Economics and Management Science, vol.
4, 1973, pp. 141-183.
Nodem, F., Kenne, J., and Gharbi, A. “Simultaneous Control of Production, Repair/Replacement and
Preventive Maintenance of Deteriorating Manufacturing Systems.” Int. J. Production Economics, vol.
134, 2011, pp. 271-282.
Pham, D. T. and Karaboga, D., Intelligent optimisation techniques. Springer, 2000.
Ross, S. M., Introduction to Probability Models, Ninth Edition. Academic Press, 2006.
Sethi, S. P., and Thompson, G. L., Optimal Control Theory. Kluwer Academic Publishers (now Springer),
2000.
Smoluchowski, M. Zur kinetischen Theorie der Brownschen Molekularbewegung und der Suspensionen,
Annalen der Physik, 21, 1906, pp. 756-780.
Spall J. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation.
IEEE Trans. Automat. Contr., vol. 37, no. 3, 1992, pp. 332-34.
Subramaniam, J. Stidham, S., and Lautenbacher, C., “Airline yield management with overbooking, can-
cellations and no-shows,” Transportation Science, vol. 33, no. 2, 1999, pp. 147–167.
Sutton, R. and Barto, A., Reinforcement Learning: An Introduction, Cambridge MA: MIT Press, 1998.
Szepesvari, C., Synthesis Lectures on Artificial Intelligence and Machine Learning: Algorithms for Reinforce-
ment Learning. Morgan & Claypool Publishers, 2010.
Teradata. TROVE Predictive Data Science - Revenue Protection Application. http://www.teradata.com/
brochures/TROVE-Predictive-Data-Science-Revenue-Protection-Application. Accessed August 19,
2015.
Tomasevicz, C. and Asgarpoor, S., “Optimum Maintenance Policy Using Semi-Markov Decision Process-
es,” Electric Power Systems Research, vol. 79, 2009, pp. 1286-1291.
The Institute for Operations Research and the Management Sciences (INFORMS) Website: http://www.
informs.org/
The International Federation of Operational Research Societies (IFORS) Website: http://www.ifors.org/
Van der Duyn Schouten, F. A., and Vanneste, S. G., “Maintenance optimization of a production system
with buffer capacity.” European Journal of Operational Research, vol. 82, 1995, pp. 323-338.
Watkins, C. J. C. H. Learning from Delayed Rewards. PhD Thesis, Cambridge University, Cambridge,
England, 1989.
Wamba, S., Akter, S., Edwards, A., and Chopin, G. “How ‘Big Data’ Can Make Big Impact: Findings
From a Systematic Review and a Longitudinal Case Study.” International Journal Production Econom-
ics, vol. 165, 2015, pp. 234-246.
White, M., Digital Workplaces: Vision and Reality. Bus. Inf. Rev. vol. 29, no. 4, pp. 205-214, 2012.
Wong, W. K., Qi, J. and Leung, S. Y. S., “Coordinating supply chains with sales rebate contracts and
vendor-managed inventory,” International Journal of Production Economics, 2009.
130
Simulation
10
Simulation
Andreas Tolk
The MITRE Corporation
131
Engineering Management Handbook
10.1 Introduction
10.1.1 Importance of Simulation
Engineering Management bridges the gap between technical engineering processes and necessary
administration and management processes. As such, engineering managers should be aware of devel-
opments that are happening in the technical domain as well as of possible support on the management
side. Modeling and architecture methods have been in the scope of the body of knowledge for EM
from its beginning, as models and architectures belong to the main tools of communication adminis-
trative and management needs in order to support technical solutions. With simulation, another logical
element is added to the toolbox of engineering managers: models executed over time! Modeling, archi-
tecture, and simulation are connected in this chapter to support EM twofold. First, they are interpreted
as a new category of quantitative tools and methods supporting EM. Second, they are increasingly the
object of EM knowledge when applied as methods and tools in projects. Both aspects are important for
EM, as the engineering manager needs to understand the formalisms, methodologies, and technology
applied in order to utilize simulation in projects for which he or she is responsible. He or she needs to
understand the technical engineering process of simulation as well as the administrative and manage-
ment processes required for simulation.
The general importance of simulation for engineering was featured among other publications in the
2006 NSF Report on “Simulation-based Engineering Science.” This report showed the potential of using
simulation technology and methods to revolutionize the engineering science. Among the reasons for the
steadily increasing interest in simulation applications are the following:
• Using simulations is—as a rule—cheaper and safer than conducting experiments with a prototype of
the real thing. One of the biggest computers worldwide is currently designed in order to simulate the
detonation of nuclear devices and their effects in order to support better preparedness in the event of
a nuclear explosion. Similar efforts are conducted to simulate hurricanes and other natural catastro-
phes.
• Simulations can often be even more realistic than traditional experiments, as they allow the free con-
figuration of environment parameters found in the operational application field of the final product.
Examples are supporting deep water operation of the NAVY or the simulating the surface of neigh-
bored planets in preparation of NASA missions.
• Simulations can often be conducted faster than real time. This allows using them for efficient if-then-
else analyses of different alternatives, in particular when the necessary data to initialize the simulation
can easily be obtained from operational data. This use of simulation adds decision support simulation
systems to the tool box of traditional decision support systems.
• Simulations allow setting up a coherent synthetic environment that allows for integration of simulat-
ed systems in the early analysis phase via mixed virtual systems with first prototypical components to
a virtual test environment for the final system. If managed correctly, the environment can be migrated
from the development and test domain to the training and education domain in follow-on life-cycle
phases for the systems (including the option to train and optimize a virtual twin of the real system
under realistic constraints even before first components are being built).
Especially for the engineering manager it is of particular interest that simulation starts to replace
traditional experiments on a significant scale. The trend is most obvious in the military domain, but is also
deeply rooted in industry traditionally using computer aided design, such as the automobile industry.
Model-based design using virtual prototypes in realistic synthetic environments starts to emerge as a new
engineering method.
Another domain of interest is executable architectures. System architectures, as blueprint standards for
complex systems, are an excepted tool. However, most of the current system architecture frameworks do
not fully support the evaluation of the dynamic behavior of a system, as the artifacts used in these frame-
works deliver more or less snapshots of the systems. However, software tools increasingly offer the option
to “execute” a blueprint. This execution of a system’s architecture is a special case of applying the princi-
ples of simulation, as the execution of an architecture de facto simulates is functionality. This application
132
Simulation
requires EM knowledge in the disciplines of system architecture and modeling as well as in simulation.
The tight connection between systems engineering processes, support system architecture artifacts, and
simulation methods has been dealt with in detail by Tolk and Hughes (2014).
As a result, simulation systems will be increasingly applied as tools in more and more engineering
domains and require to be managed. Although the general domain of information systems is supported
by good practices including those, documented in textbooks, such as Fuller, Valacich, and George (2008),
simulation systems are more than just huge information systems requiring special knowledge by those
who have to manage them over their complete life cycle. As models are purposeful abstractions of reality,
and simulation systems are executed models via information systems, an additional layer of complexity is
added to the information system challenge. In other words, Modeling & Simulation (M&S) opens a new
challenging field for EM.
In summary, M&S is a new way of understanding the interaction among parts of a system and the
systems as a whole. Simulations allow engineers to dynamically change design decisions and immediately
see the consequences. They can evaluate alternatives and options without creating risks or expensive pro-
totypes. The level of understanding of complex systems supported by M&S surpasses most other disci-
plines. The U.S. Congress recognized the contribution of M&S technology to the security and prosperity
of the United States and recognized M&S as a National Critical Technology in its House Resolution 487 in
July 2007. All these points motivate the inclusion of simulation as a chapter into this book.
business, manufacturing, social sciences, and more. Whenever the term complex system can be applied, it is
likely that simulation applications are used to understand the behavior of this complex system better.
134
Simulation
EM is the art and science of planning, organizing, allocating resources, and directing and controlling
activities that have a technological component. As engineering managers are responsible for recommend-
ing the best available engineering solutions, they have to understand this new technology and the under-
lying epistemological foundations of simulation.
135
Engineering Management Handbook
To be able to do this, a sufficient knowledge in the domain of modeling and simulation is needed.
Kossiakoff and Sweet (2002) defined the role of a systems engineer in major system development projects
as bringing specialist together that are characterized by different fields and disciplines with his or her own
languages, experiences, and knowledge bases. The systems engineer needs to ensure that these diverse track
converge in support of developing and producing a new system. Similarly, the role of the engineering
manager dealing with simulation is to bridge the virtual worlds of simulation and the engineering world
to allow successful application of modeling approaches and simulation systems to minimize negative en-
vironmental effects, either by avoiding unnecessary experiments and prototypes that could be supported
by virtual systems, or by decision supports for the real system under development by clearly analyzing and
communicating environmental challenges.
Axiom 1: 0 ≤ P( A) ≤ 1
Axiom 2: P( S ) = 1
These axioms can be used to proof a variety of results about probabilities and are the basis for stochas-
tic modeling.
Of particular interest for simulation applications are furthermore conditional probability and indepen-
dence. Conditional probability is defined as the probability that event A is observed under the condition that
event B occurs. As we know that B occurred, B becomes the new sample space for the conditional probabil-
136
Simulation
ity. The events comprised in the conditional probability value must furthermore satisfy A and B, hence we
need the probability of AB relative to the probability of B, so that the conditional probability is denoted by
P( AB)
P( A | B) = .
P( B)
Following similar ideas, we define that two events A and B are independent if P ( AB ) = P ( A) P ( B ) .
It can be seen that formulas for independent events are much easier to compute and preferred for simula-
tion, but not for the sake of correctness and accuracy. The engineer must therefore know which events are
independent and which events were assumed to be independent when the model for the simulation was
developed.
Within simulation, the probability is often only a means used to specify the value of some numerical
quantity determined by the result of an experiment. Such numerical quantities are defined as random vari-
ables. Random variables can be discrete or continuous. If they are discrete, the overall probability can be
determined by adding the single probability values. If they are continuous, intervals are needed that define
the probability density function.
Three of the most useful concepts in probability often used for simulation are the expectation of a
random variable, the variance of a random variable, and the covariance of two random variables. The
expected value is the weighted average of the possible values a random variable can take on weighted by the
probability that the random variable assumes this value (or the integral over the random variable interval
weighted by the probability density function). The variance measures the variation around the expected
value by considering the average value of the square of the difference between the expected value and the
observed value. The covariance measures the degree of similarity between two random variables by con-
sidering the expected value of the difference between the observed value and the expected value of the
first random variable multiplied by the difference between the observed value and the expected value of
the first random variable. The correlation is a very similar measure to the covariance, but the correlation
has no dimension, as the covariance is divided by the square root of the product of the variances of both
random variables.
Ross (2006) introduced some selected discrete random variables that are useful for many simulation
applications, such as
• Binomial random variables: n independent events with two possible outcomes (yes/no, success/no
success, etc.) with equal probability. If we are interested in one successful outcome (n=1), we are
talking about Bernoulli random variables. This category of random variables is important for statisti-
cal significance testing.
• Poisson random variables: They are used to approximate the distribution of successes in a large num-
ber of trials. They are also used to count the number of events that occur in a certain time interval.
• Geometric random variables: If a series of n independent trials with the same probability p is con-
n −1
ducted, these variables can be used to compute the overall success probability by p (1 − p ) . Many
simulation applications make use of these variables.
Most software development environments provide the user with a function called random or similar
that returns a pseudorandom number. One of the most common approaches to generate pseudorandom
numbers is to start with an initial value, called the seed, and then computing successive values by letting
where mod is the modulo function and a and m are positive integers. This procedure generates values
within the interval [0, 1, …, m-1] and is an approximation to the value of a uniform (0, 1) random
variable. It is obvious that this is not a real random number, as the next upcoming number is completely
determined by the formula and the series of numbers will repeat itself as soon as one number is repeated
(which must happen at least after m executions).
137
Engineering Management Handbook
Once the user is able to generate uniform random variables, he or she can apply well-established meth-
ods to transform them into other random variables with known distributions (defined by the probability
mass function for discrete random variables and the probability density function for continuous random
variables). For discrete random variables, the inverse transform method is often used. For continuous
random variables, the inverse transform algorithm is used. Both methods follow the same basic idea that
can be explained best using the following figure. The graph shows the probability mass/density function
of the targeted distribution. Both methods use a uniform (0, 1) random variable to generate a random
number (1), determine where this event “hits” the desired accumulated probability mass/density function
(2), and than determine which value corresponds this value on the desired random value scale (3) as shown
in Figure 10.2.
Desired
Probability
Mass/density
function
Uniform (0,1) random variable
1 2
0
min 3 max
Ross (2006) describes both, the inverse transform method and algorithm, in detail and gives more
established methods for special distributions. The interested engineering manager is referred to the refer-
ences for more detailed introductions.
For engineering managers, the current work on establishing a common general understanding of sim-
ulation theory based on common principles formulated in mathematical model theory can be of addition-
al interest (Diallo, Padilla, Gore, Herencia-Zapana and Tolk, 2014).
138
Simulation
The list of instructions is normally executed in sequential order, if this order is not modified using
control flow statements that exist in all programming languages in one form or another. There are five
categories of control flow statements: halt, choice, loop, jump, and subroutines that are defined as follows:
• Halt statements stop the execution flow immediately and prevent any additional actions.
• Choice statements execute a set of statements only if certain criteria are met. The most common
choice statement is the conditional statement of the form
IF condition THEN instruction.
• Loop statements allow to repeat a set of statements for a given number or as long as a condition is
true. Some of the most common loop statements are
REPEAT instruction UNTIL condition;
WHILE condition DO instruction;
FOR enumerator DO instruction.
• Jump or go-to statements go directly to a specified instruction in the program. This instruction is
often labeled to make the reference easier. One of the most common jump statements is
GOTO label.
• Subroutines execute a set of instructions after which they potentially return to the calling instruction.
Subroutines are normally called with a set of input parameters, such as
SubroutineName (InputParameterList).
Beside these control structures, a certain commonality of data structures can be found in all program-
ming languages as well. The basic or primitive data item types are integer numbers, real or float numbers,
and characters or strings. Often, the numbers are distinguished in long and short primitives, where long
primitives require more storage space within the computer but also have a higher accuracy or bigger
range. When two or more primitive data item types are composed into a new data item, they build a com-
posite type. Primitive and composite types can be stored in ordered form, e.g., in lists and trees. Lists and
trees are ordered collections of data items. Lists can be indexed allowing to access a certain element (these
lists are often called array or vector), or they may only allow access to the first and/or last element of the
list. When data structures and procedures working on these data are combined into a common construct,
this is called an object (and the procedures are called methods). Many books have been published in the
domain of data structures and algorithms that are normally used in undergraduate programs of computer
sciences education. It is good practice to search for collaboration with a local college offering education in
this domain.
The EM body of knowledge enumerates the introduction to basic of Java or C++ as an important
component. This topic alone fills books and each attempt to introduce these languages in a handful
of sentences must be futile. Instead, the interested reader is referred to standard computer science
literature as well as web sites offering introduction tutorials and overviews. In particular Java is
supported by an active and competent online user community, such as http://java.sun.com and other
websites.
time. In particular for distributed simulation system, where events can be produced in remote procedures,
the synchronization of several event lists is an issue requiring time management.
There are two principle approaches for time advance: fixed time steps and variable time steps. Figure
10.3 exemplifies both approaches. It shows discrete time steps tn, tn+1, and tn+2 that occur at predefined
fixed points on the time scale, and the time stamps of three events te1, te2, and te3.
If a next-event time advance method is used, the time advance starts with the first event in the event
list (event 1) and uses the time stamp of this event to set the simulated time (te1). The system state con-
nected with event 1 occurs, and the next event is request from the event list.
If a fixed time advanced method is used, the time advance goes from time tn straight to tn+1. It the
requests all events with a time stamp smaller or equal to tn+1; in the example, this are the events 1 and 2.
When all events that fulfill this criterion are computed, the next time step is made to tn+2. In what order
the events are computed is due to the implementing details, as the events principally are aggregated into
one event composite that comprises all events that are happening in the interval within the current fixed
time step.
In both cases, an event may lead to the creation of a new event in the future. In this case, a new event
is created, the parameters of the event are calculated, the timestamp for this event is calculated, and the
event is handed over to the event list manager to be included at the right place. Challenges the simulation
developer faces are those cases where the timestamp of the new event potentially lies in the past of the
current simulated time. If in the example above a fixed time step approach is chosen, and event 1 creates
a new event with a timestamp smaller then that of event 2, this may cause problems if the resulting state
change caused by the new event is important for the computation of the correct effect of event 2.
If the simulation systems are distributed, the necessity for time management arises, as the different
simulation clocks must be synchronized. One possibility is to use real-time, but this creates two challeng-
es: (a) when a simulation is computation intensive, it may be too slow to be able to run in real time; (b)
when a simulation is very fast, the computation resources are idle most of the time. The same problem
occurs when two simulation systems have to be synchronized, as the faster simulation has to wait for the
slower simulation. Therefore, several different time management approaches have been designed, such
as conservative synchronization—only continue simulation when all simulation systems reached the same
time point—and optimistic synchronization—faster simulation may continue their work, but must be
prepared to roll back in case of need.
A good introduction to discrete event simulation in comparison to the alternative simulation para-
digm of continuous simulation is given in Sokolowski and Banks (2008), chapter 3. For advanced simula-
tion engineers it is recommended to evaluate the Discrete Event System Specification (DEVS) by Zeigler,
Praehofer, and Kim (2000). DEVS one of the most rigorous simulation formalism and well rooted in
engineering principles. It has been applied in many engineering contexts and is internationally applied on
a broad basis.
140
Simulation
• Monte-Carlo simulation uses a deterministic simulation model that maps input parameters to output
parameters. In the standard case, time is not modeled. The simulation model is then used to iterative-
ly evaluate the model by feeding random variables and evaluate the resulting outputs. The statistical
analysis means shall be applied here.
• Continuous simulation models system changes over time, but in contrast to discrete simulation the
system is described for continuous simulation by state variables that change continuously with respect
to time: state changes are not instant events.
Before going into further explanations and examples, some additional simulation foundations need
to be explained. The first is the difference between deterministic and stochastic models. In both cases, a
simulation model is interpreted to map input parameters to output parameters.
• In deterministic models, the same input will always produce the same output. Only if input parameters
are varied, the output parameter will vary.
• In stochastic models, the results when computing the output parameters are determined by using one or
more random variable to represent uncertainty about a process in which a given input will produce an out-
put according to some statistical distribution. Therefore, the same input may result in different outcomes.
Another fundamental concept resulting from stochastic processes is the Markov chain, which is
known to engineering managers from other applications. The characteristic of a Markov chain is that it
operates without memory: the conditional probability of any future event given any past events and the
present state is independent from any past events and only depends on the current state. This makes them
of interest to simulation developers, as it reduces the implementation efforts tremendously as past states
do not need to be tracked in order to compute the possible follow-on events.
Following similar ideas, the Poisson distribution is of particular interest for developers of stochastic
models as well. The basic idea and mathematical foundation was introduced earlier in this chapter: the
Poisson distribution expresses the probability of a number of events occurring in a fixed period of time if
these events occur with a known average rate and independently of the time since the last event. As before
with Markov chains, this insight can facilitate the implementation: if a stochastic process can be approx-
imated by this distribution, the likelihood for an event to happen in the next time step is independent
from its history, so no past states need to be tracked.
The use of Monte-Carlo simulation is quite obvious. It should be pointed out that a Monte-Carlo
model can be part of a discrete event simulation system: whenever a procedure operates on random vari-
ables without advancing the simulation time—such as producing new events, calculating the system state
change, etc.—all techniques supporting Monte-Carlo simulation can be applied. In particular when simu-
lation systems need to be evaluated, or even validated and verified, this can be beneficial. The engineering
manager responsible for such a project needs to be aware of these relations.
Continuous simulation is often used to simulate physical systems or systems that involve mechanical,
electrical, thermal, or hydraulic components. Such systems are most precisely described by differentials
equations. When computed using digital computers, these differential equations need to be transformed
into difference equations, or numerical approximation methods like the Euler method or Runge-Kutta
method need to be applied. This automatically introduces a numerical error, contributing to artificial
variances in the results of the system. It is of critical importance for the engineering manager to be aware
of these approximations and how they are dealt with in the data analysis.
In summary, this section on simulation theory shows that the engineering manager responsible for a
simulation project—be it development or application of a simulation in the engineering context—needs
a solid foundation to align the work of professional in the domains of statistic, computer science, numer-
ic, and M&S. In practice, the engineering manager is often the first of these experts that has access to all
these contributing elements, so he is the experts with the “big picture” of what is going on. The ability to
understand the nature of challenges that can occur in all these contributing domains is therefore essential
to successfully bridge the gap between these contributing experts as well as between technical experts,
management, and the user community.
142
Simulation
“Simulation-Based Engineering Science (SBES) is defined as the discipline that provides the
scientific and mathematical basis for the simulation of engineered systems. Such systems
range from microelectronic devices to automobiles, aircraft, and even the infrastructures of
oil fields and cities. In a word, SBES fuses the knowledge and techniques of the traditional
engineering fields—electrical, mechanical, civil, chemical, aerospace, nuclear, biomedical,
and materials science—with the knowledge and techniques of fields like computer science,
mathematics, and the physical and social sciences.”
The American Society for Engineering Management definition of EM shows that this is a task in their
realm: “Engineering management is the art and science of planning, organizing, allocating resources, and
directing and controlling activities that have a technological component.” This can be mapped directly
to the tasks identified for SBES in the NSF report. To fill this generic task description with applicable
recommendations, best practices are needed.
Simulation systems have a long and successful history in the military domain. They are used in
analysis, procurement, acquisition, training, education, and in some instances even for support of oper-
ations. The North Atlantic Treaty Organizations (NATO) published the NATO Code of Best Practice
(COBP) for Command and Control Assessment in 2002. This code represents over a decade of work
by many of the best analysts from the NATO countries, conducted under the guidance of NATO’s
Research and Technology Organization (RTO). While the original application domain of the COBP
is military command and control, the code was written to give broad guidance on the assessment of
complex systems in complex environments for a wide variety of decision-makers. As such, it comprises
best practices and guidance on how to conduct a scientific study rooted in operations research ideas
on complex systems in complex environments. The COBP is mandated for operations research studies
conducted for the US Department of Defense (DoD) Assistant Secretary Defense (ASD) Networks and
Information Integration (NII).
Recent research work has shown that many traditional project management artifacts can be
mapped to the recommended processes and products documented in the COBP. It has also been
proven to be a valuable guide when conducting simulation-based studies, in particular for the US
Joint Forces Command, in particular when supporting new research requiring increasingly the incor-
poration of geopolitics, culture, religion, and political economy to better understand how Diplomatic,
Intelligence, Military, and Economic (DIME) factors affect military decision-making. A growing area of
research for the Department of Defense is centered on related Political, Military, Economic, Security,
Information, and Infrastructure (PMESII) aspects (for example, see Sokolowski and Banks (2008), chap-
ter 1). To ensure that all relevant information is captured, the NATO COBP recommends an iterative
approach captured in Figure 10.4.
143
Engineering Management Handbook
Figure 10.4. Phases for Conducting a Study as Recommended in the NATO COBP
Problem
Formulation
Solution
Strategy
Sponsor’s
Problem Human &
Organizational
Issues
Measures Methods
Scenarios
of Merit & Tools
Data
Assess
Products Risk
This COBP is organized into four phases. The first phase deals with study dynamics, problem for-
mulation, and the development of a solution strategy. This phase is the initialization phase, in which the
objectives and requirements are analyzed and it is ensured that the sponsor’s problem is understood and
a simulation-based solution is possible. The second phase identifies and discusses in depth the essential
elements of assessment: measures of merit, scenarios, and human and organizational issues. In this prepa-
ration phase, applicable solutions are identified and the selection of best tools is prepared by in-depth
analysis of systems and their environment. This leads to the definition of necessary data and selection of
the best tools. The third phase addresses issues related to risk and uncertainty while the final phase de-
scribes the range of assessment products.
As it is the case in all engineering task, the success starts with understanding the real needs of the
sponsor and the environment in which the support has to be delivered. There may be political, economic,
or even cultural constraints. Once this is understood, the problem formulation activities lead to specifica-
tions on what needs to be solved, and the solution strategy captures how these problems will be solved. The
results are captured in a study plan as well as in a study management plan. These documents can be aug-
mented by additional documents and artifacts supporting better project management, cost management,
and risk management.
Capturing the relevant system information regarding human and organizational issues becomes
increasingly relevant. A system is commonly defined to be a collection of hardware and software,
people, facilities, resources, and procedures organized to accomplish some common objectives. These
aspects must be managed for real systems and modeled in virtual systems. An exhaustive variation of
all parameters defining a solution space is normally not feasible for large and complex challenges. This
can normally only be done for small problems that can be solved by closed mathematical solutions and
not for the type of problems that are addressed by simulation-based solutions. It is therefore essential
to capture operationally relevant scenarios to ensure that relevant parameter combinations are evaluat-
ed. A scenario can be defined as a description of the geospatial constraints, the environment, available
resources, given objectives, past and current relevant events, and all other factors being related to the
system to be evaluated during a specified time frame suited for satisfactory study objectives and the
problem analysis directives. Quite often, the use of smaller vignettes is good practice, in particular for
smaller scenarios and as excursions from the main scenario. Measures of merit have already been dealt
144
Simulation
with in the theory section. They should be directly linked to the elements of the scenarios and reflect
the solution strategy. It should be pointed out that up to this point all decisions and evaluations have
been made tool independent.
Selection the methods and tools to be applied in the project, including selecting the best simulation
tool, should always be based on these tool independent analysis. It is bad practice to build a study or a
project around a preselected simulation tool, as this automatically limits the focus to “what can the tool
do” instead of answering “what is the sponsor’s problem.” As a rule, the engineering manager should be
able to select an orchestrated set of tools that are able to generate the required MOM and for which the
necessary data can be obtained. It is good practice to include the management of tools selection—in-
cluding simulation systems—and data engineering for obtaining the necessary input data and produce
the required MOM in the management artifacts mandatory for simulation-based projects. Finally, risk
assessment is recommended. Sensitivity analysis, as described earlier in this chapter, is recommended but
not sufficient.
In summary, simulation-based studies and projects require rigorous EM to be successful. Best practic-
es exist that can be of help. However, it is still true that success comes from wisdom, wisdom comes from
experience, and experience comes from making mistakes. Simulation as an engineering method
can give guidelines and avoid obvious traps; but as so often in engineering, there is no golden rule
that ensures success.
As shown in the screenshot, building a simulation in ARENA is pretty straightforward: users select
constructs representing the necessary processes or process steps (and users can define such constructs,
145
Engineering Management Handbook
including their graphical representation) and connects the input of following activities with the output of
producing activities. In addition, users can define data collection and visualization capabilities that can be
used to produce statistical data and their display. In addition, ARENA supports several probability distri-
butions. ARENA supports all three simulation paradigms, but the emphasis clearly lies on discrete event
simulation. Trying to give a more detailed introduction in form of a short section would be futile, so the
interested reader is referred the Kelton et al. (2007) for further reading.
Another aspect in the focus of simulation applications for engineers is the statistical experimentation
design. Some simulation frameworks are supporting their users with integrated tools for the definition
of MOM or with predefined procedures supporting data analysis as defined in the theory part of this
chapter. Nonetheless, the overview compiled by Kleijnen (2004) should be known by every engineer that
applies simulations in his or her project. This journal article comprises best practices and theoretic foun-
dations critical for simulation experiment design and completes the recommendations given in Kelton et
al. (2007), chapter 12.
The architectural frame shown in Figure 6.5 was proposed in support of discussing how the agent
characteristics enumerated above can be realized. It is kept simple on purpose, as it is not intended to
prescribe a solution but to make developers aware of domains that need to be taken into account.
146
Simulation
Information
Exchange
with other Agents
Communications
Situated Environment
at objects in the
Input from the
Action directed
Environment
Perception
Sense Decision
Situated
Action
Making Making
Memory
Adaptation
There are three external and four internal architectural domains identified. The external domains
comprise those functions needed by the agent to interact with and to act within his environment. The
internal domains categorize the functions needed for the agent to act and adapt as an autonomous object.
• Perception: The agent has to receive input from the situated environment and map it to his or her
internal structures.
• Communications: The agent needs to exchange information with other agents based on an agreed
protocol.
• Action: The agent need to move and act in the situated environment.
• Sense making: The agent needs to base his or her decision on a fused awareness of what he or she
perceives, what he or she communicates, and what he or she knows. To enable autonomy, the agent
needs a sense-making domain.
• Memory: The knowledge of the agent must be accessible to the agent. It may have several compart-
ments, such as short- and long-term memory, earlier decisions, pattern, etc.
• Adaption: Flexibility requires that rules and memories can be changed to reflect new recognized cir-
cumstances.
• Decision-making: Situational awareness leads to a desired outcome and related steps. These steps can
be decided on one at a time or in form of a complex plan. The decision-making domain enables this.
When such agents are used to populate a simulation, in particular when these agents do not all sup-
port the same view but are heterogeneous regarding the way they perceive, make sense, communicate, and
decide, the result is a multi-agent system. These systems have been successfully applied in many domains.
In particular the characteristics of autonomy and flexibility make them of interest to engineers, as they
enable to add human-like behavior to simulations (life sciences and political sciences have been among
the pioneers of agent-based simulation applications) as well as system’s learning and adaption of systems
to new environments (e.g., it has been discussed if systems’ functionality cannot be provided by system
agents that observe and adapt continuously to new situations). Again, this is a topic of current research.
Figure 10.7 summarizes the characteristics.
147
Engineering Management Handbook
Agent System
Discrete vs.
Continuous
Similar to compiling the characteristics of agents into architectural domains, the characteristics of
contributing agents, the situated environment, and the agent society can be compiled into taxonomical
domains. The overview is neither complete nor exclusive, but it summarizes the core domains the engi-
neering manager must be aware of when applying multi-agent systems.
Of particular interest is furthermore the support of systems engineering and system of systems engi-
neering by simulation applications. The observation of emergence in such systems has been the topic of
148
Simulation
concern, as engineered systems should not expose unspecified behavior that may defeat the system’s pur-
pose, as discussed by Osmundson et al. (2008). Emergence can be reproduced in particular in agent-based
simulations. Looking into agent-based methods to better understand emergence and potentially becoming
able to engineer positive emergence into systems is a topic high on current research agendas. The increas-
ing number of autonomous systems in various application domains of interest to the engineering manager
also requires a better understanding of potential and limits of simulation, as the intelligent behavior of
autonomous systems is constrained by the same epistemological and computational frontiers as simulation
systems. The engineering manager must know these limitations. A good overview of such limits has been
compiled by Oberkampf et al. (2002). A view on simulation from the perspective of philosophy of science
has been provided by Tolk (2015).
To summarize this chapter on simulation it should be obvious that applying simulation in and for
engineering projects is challenging and requires a solid education. It showed M&S within the supporting
disciplines including probability and statistics, computer science, systems modeling and architecture, and
operations research. It introduced discrete event simulation, Monte-Carlo simulation, and continuous
simulation as the simulation paradigms, and it mentioned M&S methodologies and application domains.
The sections of this chapter cannot replace the referenced literature—which needs to be completed with
experience to lead at the end to good decisions. However, the core knowledge references in this chapter
will enable engineering managers to have a good start and will prepare them with tools and methods for
solving real-world problems and challenges when using simulation for and in engineering.
10.4 References
Diallo, Saikou Y., Padilla, Jose J., Gore, Ross, Herencia-Zapana, Heber, and Tolk, Andreas, “Toward a for-
malism of modeling and simulation using model theory,” Complexity, vol. 19, no. 4, 2014, pp. 56-63.
Fuller, Mark, Valacich, Joe, and George, Joey, Information Systems Project Management – A Process and
Team Approach. Pearson Prentice Hall, 2008.
Kelton, David, Sadowski, Randall, and Sturrock, David, Simulation with Arena, McGraw-Hill Science/
Engineering/Math, 2007.
Kleijnen, Jack, An overview of the design and analysis of simulation experiments for sensitivity analysis.
European Journal of Operational Research, vol. 164, no. 2, July 2004, pp. 287-300.
Kossiakoff, Alexander, and Sweet, William N., Systems Engineering Principles and Practice. John Wiley &
Sons, 2002.
National Science Foundation (NSF) Blue Ribbon Panel, Report on Simulation-Based Engineering Science:
Revolutionizing Engineering Science through Simulation, NSF Press, May 2006.
NATO Research and Technology Organization (RTO), NATO Code of Best practice for C2 Assessment,
Command and Control Research Program (CCRP) Press, 2002.
Oberkampf, William. L., DeLand, Sharon M., Rutherford, Brian M., Diegert, Kathleen V., and Alvin,
Kenneth F., “Error and uncertainty in modeling and simulation.” Reliability Engineering & System
Safety, vol. 75, no. 3, 2002, pp. 333-357.
Osmundson, John S., Huynh, Thomas V., and Langford, Gary O., “Emergent Behavior in Systems of
Systems,” INCOSE International Symposium, vol. 18, no. 1, 2008, pp. 1557-1568.
Padilla, Jose J., Diallo, Saikou Y., and Tolk, Andreas, “Do We Need M&S Science?” SCS M&S Magazine,
vol. 2, no. 4, 2011, pp. 161-166.
Robinson, Steward, Conceptual modelling for simulation Part I: definition and requirements. Journal of
the Operational Research Society, vol. 59, 2008, pp. 278-290.
Ross, Sheldon, Simulation (4th edition). Academic Press, 2006.
Sokolowski, John and Banks, Catherine (Editors), Principles of Modeling and Simulation: A Multidisciplin-
ary Approach. John Wiley & Sons, 2008.
Sokolowski, John and Banks, Catherine (Editors), Modeling and Simulation Fundamentals: Theoretical
Underpinnings and Practical Domains. John Wiley & Sons, 2010.
Tolk, Andreas, Simulation. Engineering Management Body of Knowledge. American Society of Engineering
Management, vol. 1.1, Nov. 2007.
149
Engineering Management Handbook
Tolk, Andreas, Learning Something Right from Models That Are Wrong: Epistemology of Simulation. In
Concepts and Methodologies for Modeling and Simulation, Springer International Publishing, 2015,
pp. 87-106.
Tolk, Andreas, and Hughes, Taylor K., Systems engineering, architecture, and simulation. Modeling and
Simulation-Based Systems Engineering Handbook, CRC Press, 2014, pp. 11-41.
Yilmaz, Levent, and Oren, Tuncer (Editors), Agent-Directed Simulation and Systems Engineering, John
Wiley & Sons, 2008.
Zeigler, Bernard, Praehofer, Herbert, and Kim, Tag Gon, Theory of modeling and simulation: Integrating
discrete event and continuous complex dynamic systems - second edition, Academic Press, 2000.
150
Decision Analysis
11
Decision Analysis
Gregory S. Parnell
University of Arkansas
and Innovative Decisions Inc.
151
Engineering Management Handbook
11.1 Introduction
11.1.1 What is Decision Analysis?
Decision analysis is an operations research technique for analyzing complex decisions with multiple
(and usually conflicting) objectives and uncertainty. One of the founders of the field, Ronald Howard,
first coined the name in 1964. Decision analysis uses the axioms of probability and utility theory and
the philosophy of systems analysis (Howard, 1966). The first decision analysis book (Raiffa, 1968),
used probability and a single objective, net present value. The first multiple objective decision analy-
sis book was published in 1976 (Keeney & Raiffa). Decision analysts use probability to model their
belief in the likelihood of each outcome of an event based on our state of information. They use Bayes
law to update beliefs as they learn new information. In addition to the mathematical foundations of
decision theory, decision analysts have adopted lessons from behavioral decision theory research about
the heuristics and biases people use to reason with uncertain information and make decisions (Clemen
and Reilly, 2013; Kirkwood, 1997). Decision analysts have used behavioral decision research to develop
effective problem structure, uncertainty, and preference elicitation protocols.
152
Decision Analysis
grams. Many decision analysts belong to the Society for Decision Professionals1 and the Decision Analysis
Society2 of the Institute for Operations Research and Management Science.
The Handbook of Decision Analysis provides more details of the decision analysis process. Three de-
cision analysis processes have been successfully used in organizations: the analytical process, the decision
conference process, and the dialogue decision process.
Prepare
- objectives Build
- participants Model
- announcement
Explore
results
Decision Makers
Decision
Frame Values Alternatives
Evaluation
Decision Team
4. Modified from Spetzler, C., “Building decision competency,” Advances in Decision Analysis – From Foundations to Applica-
tions, Edwards, W., Miles, R., and von Winterfeldt, D., Cambridge Press, 2007.
154
Decision Analysis
High confidence you are solving the High confidence you are solving
right problem the right problem
May be appropriate for
well-framed problems All participants develop common un- Planned involvement of key de-
derstanding and shared commitment cision-makers and stakeholders
Detailed analytical models
Advantages developed Develop and use requisite decision at major decision points
models that use the essential infor- More analytical models of val-
Least time demand on mation to distinguish between the
decision-makers and alternatives ues and uncertainty
stakeholders Less time demand (several
Multiple conferences can support short meetings)
hierarchical decision-making
Analysts can lose focus
on the evolving views Must schedule all key players for same
of decision-makers and time Requires scheduling periodic
stakeholders meetings with key players
Disadvantages Time commitment of managers and
Models may become stakeholders (days) Key stakeholder availability
overly complex and data collection challenges
If needed, complex models must be between dialog points
Lack of stakeholder par- developed before the conference
ticipation and data
11.3.2 Uncertainty
Engineering managers make decisions about products and services for future consumers and customers.
There are many uncertainties involved in EM. Four of the most common are technical (how well with the
technologies work), cost (how much will it cost), schedule (when will it be delivered), and market (what
will be the future demand). However, sources of uncertainty can include all elements of the decision en-
vironment including safety, economic, organizational, environmental, and emotional factors. In addition,
major decisions sometimes involve important political, historical, cultural, and social uncertainties.
155
Engineering Management Handbook
11.3.3 Decisions
Engineering managers make decisions about the best products and services to develop and market to cus-
tomers and consumers. The most difficult decisions involve decision strategies that combine many decision
elements including partnerships, technologies, production plans, supply chain, marketing, and logistics.
Market
Success
5. DPL is decision and risk analysis software developed by Syncopation Software. http://www.syncopation.com/ accessed August
22, 2015.
156
Decision Analysis
Low [-30]
Market Success 30% -20
Produce New Product Yes [34] Nominal [40]
Develop New Product Yes [34] 40% 50
[35] -10 High [90]
30% [100]
No [25]
35
No [35]
35
The decision tree uses the following steps. First, all the values are calculated for the end nodes of the tree
(triangles) for each path through the decision tree. There are five paths in Figure 11.4. Starting at the bottom
and working up, the first path is not to develop and the NPV is $35M. The second path is to develop but
not produce for NPV of $25M (35 minus the development cost of 10). The third path has NPV of 90
(100-10). Likewise, the fourth and fifth paths are $40M and -$30M, respectively. The second step is to start
at the end nodes and solve the decision tree using the “Average Out-Roll Back” Algorithm, which calculates
expected values at uncertain nodes and selects the highest NPV at decision nodes. For example, the expected
value at market success of 34 (0.3*(-30) + 0.4*(40)+0.3*(90)) and at the produce new product node, the best
decision is Yes since 34 > 25. Finally, the develop new product decision is No since 35>34.
So far, this seems like an easy decision, select the highest expected value and the lowest risk.
157
Engineering Management Handbook
Market
Success
Development
Test
We assume the test can be a success (0.9) or fail (0.1). If the test succeeds the market success will be as
modeled in section 11.4.2. However, if the test fails the NPV will be 0.
Figure 11.7 shows our new decision tree with the test. Information has value only if the decision chang-
es. The test changed the decision and increased the expected value from $35M to $36M in spite of the
$1M cost of the test. The highest expected value is to develop the new product and produce the product
if the test is a success and not produce if the test fails. The cost of the test is an important factor, if the test
cost $3M, the expected value of the develop option would have been $34M and it would have been better
to not develop the new product. If the test has been free, our expected value would have been $37M.
Because our expected value without the test was $35M, we would pay up to $2M for the test.
In addition to the $1M increase in expected value, the test has reduced the risk from a 0.3 probability
of losing $30M to a 0.09 probability (0.9*0.1) of losing $31M. This can be seen by calculating the prob-
ability of the top path through the decision tree in Figure 11.7. Of course, it would also be easy to see in
the cumulative risk profile.
158
Decision Analysis
Market
Market Success
Survey
Development
Test
Suppose we have a market survey with the following data on the left side of Figure 11.9. We are given
the prior probability distribution on the market success and the likelihood distributions on the on the
probability of the survey prediction given the market success outcome. The likelihood distribution is a
quantitative statement about the ability of the market survey to predict the true market outcome. In the
decision tree, we need the preposterior distribution (the probability of the prediction) and the posterior
distribution (the probability of market success given the market survey prediction). Figure 11.9 shows
the standard probability calculations on the middle and right side. We enter the prior and likelihood into
DPL and the software calculates the preposterior and posterior distributions.
159
Engineering Management Handbook
Figure 11.10 shows the decision tree with the test and the market survey. We have assumed that the
development test and the market survey are done concurrently. The expected value has increased signifi-
cantly from 36 to 49M. The market survey changes the best decision strategy. If the test is a success, we
only produce the new product if the market survey predicts nominal or high.
Low [-22]
Market Success
66% -20
Produce New Product Yes [7] Nominal [48]
Predict Low [33] 25% 50
32% -1 High [98]
9% [100]
No [33]
35
Low [-22]
Market Success
17% -20
Market Survey Produce New Product Yes [45] [48]
Nominal
Success [50] Predict Nominal [45] 67% 50
90% -1 36% -1 High [98]
17% [100]
No [33]
35
Low [-22]
Development Test Market Success
Produce New Product 9% -20
Yes [49] Yes [74] Nominal [48]
Develop New Product Predict High [74] 25% 50
[49] High [98]
32% -1
66% [100]
No [33]
Market Success
Produce New Product Yes [-2]
Predict Low [33]
No [33]
32% -1
35
Market Success
Market Survey Produce New Product Yes [-2]
Failure [33] Predict Nominal [33]
36% -1 No [33]
10% -1
35
Market Success
Produce New Product Yes [-2]
Predict High [33]
32% No [33]
-1
35
No [35]
35
Another interesting benefit of the market survey is the reduction in risk. With the market survey, the
worst case risk is now -22M (versus -30M), which occurs with a probability of 0.08 (versus 0.09).
We know from this analysis that the market survey costing $1M resulted in an expected value of
$49M. Had the test been free, our expected value with the market survey would have been $50M. There-
fore, we know that the maximum we should pay for this market survey would be $13M (50 – 37).
160
Decision Analysis
In addition to an increased expected value, perfect information would significantly reduce the risk to
a worst case outcome of 33M (35 – 2 for the test and survey). However, this outcome would occur with
probability 0.37.
161
Engineering Management Handbook
1
0.9 Risk Adverse
Risk Neutral
0.8
Risk Seeking
0.7
0.6
Utility u(x)
0.5
0.4
0.3
0.2
0.1
0
0 1 2 3 4 5 6 7 8 9 10
X
n
where v ( x ) = ∑ wi v i ( xi )
i =1
and ∑w
i =1
i = 1 (all weights sum to one)
The additive value model has no index for the alternatives we’re evaluating because our values do not
depend on the alternative. We use the same equations to evaluate every alternative.
0.9 Linear
Concave
0.8
Convex
0.7 S-Curve
0.6
V(x) [Value]
0.5
0.4
0.3
0.2
0.1
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
x [ Value Measure]
most common mistake in MODA is assessing weights based on importance only (Parnell et al., 2013).
The weights depend on the value measure scales’ importance and range. If we hold constant all other value
measure ranges and reduce the range of one of the measure scales, the measure’s relative weight decreases,
and the weight assigned to the others increases since the weights add to 1.0.
Factor to
Critical Important
Consider
Range of Large A B2 C3
variation of the
value measures Medium B1 C2 D2
Small C1 D1 E
Consistency Rules
Because many individuals may participate in the assessment of weights, it is important to ensure consis-
tency of the weights assigned. It is easy to understand that a very important measure with a high variation
in its range (A) should be weighted more than a very important measure with a medium variation in its
range (B1). It is harder to trade off the weights between a very important measure with a low variation in
its range (C1) and an important measure with a high variation in its range (B2). Weights should descend
in magnitude as we move on the diagonal from the top left to the bottom right of the swing weight
matrix. Multiple measures can be placed in the same cell with the same or different weights. If we let the
letters represent the diagonals in the matrix A, B, C, D, and E, A is the highest weighted cell, B is the next
highest weighted diagonal, then C, then D, and then E. For the swing weights in the cells in Figure 7.1 to
be consistent, they need to meet the following relationships:
• Any measure in cell A must be weighted greater than measures in all other cells.
• Any measure in cell B1 must be weighted greater than measures in cells C1, C2, D1, D2, and E.
• Any measure in cell B2 must be weighted greater than measures in cells C2, C3, D1, D2, and E.
• Any measure in cell C1 must be weighted greater than measures in cells D1 and E.
• Any measure in cell C2 must be weighted greater than measures in cells D1, D2, and E.
• Any measure in cell C3 must be weighted greater than measures in cells D2 and E.
• Any measure in cell D1 must be weighted greater than measures in cell E.
• Any measure in cell D2 must be weighted greater than measures in cell E.
• No other strict relationships hold.
164
Decision Analysis
If we denote i to be the label of the cell in the swing weight matrix and fi to be the unnormalized
swing weight of the value measures in each cell, then the following strict inequalities relationships of
non-normalized swing weights must hold:
fA > fi for all i in all other cells
fB1 > fC1, fC2, fD1, fD2, fE
fB2 > fC2, fC3, fD1, fD2, fE
fC1 > fD1, fE
fC2 > fD1, fD2, fE
fC3 > fD2, fE
fD1 > fE
fD2 > fE
where fi is the un-normalized swing weight assessed for the ith value measure, i = 1 to n for the number of
value measures, and wi are the normalized swing weights from Equation 1.
MODA examples can be found in Kirkwood, 1997, Parnell, Driscoll, & Henderson, 2011, Parnell et
al., 2013, and Clemen and Reilly, 2013.
zation, and the leadership styles of organizational decision-makers. Second, the engineering manager must
ensure that all key stakeholders participate in the process. Third, innovative alternatives are considered
that have the potential to create high value for the organization. Fourth, the engineering manager must
ensure that all relevant uncertainties and risks have been considered. Finally, the engineering manager and
the leadership team must ensure that the solutions are implementable. Having early stakeholder participa-
tion in the decision analysis helps to ensure the solutions are implementable.
11.9 References
Clemen, R., Making Hard Decisions, 2nd Edition, Duxbury Press, 1996.1
Corner J. L. and Kirkwood, C. W., “Decision Analysis Applications in the Operations Research Literature,
1970-1989,” Operations Research, vol. 39, no. 2, pp. 206-219, March-April 1991.
Howard, R. A., & Abbas, A. E., Foundations of Decision Analysis. Prentice Hall, 2015.
Howard, R. A. and Matheson, J. E., Editors, The Principles & Applications of Decision Analysis, 1983, Vol-
umes I & II, Strategic Decisions Group.
Keefer, D. L., Kirkwood, C. W., and Corner, J. L. Perspective on Decision Analysis Applications, 1990–
2001, Decision Analysis, vol. 1, no. 1, pp. 5-24, March 2004.
Keeney, R. L. Value-Focused Thinking: A Path to Creative Decision Making. Cambridge, Massachusetts:
Harvard University Press, 1992.
Keeney, R. L. and Raiffa H. Decision Making with Multiple Objectives Preferences and Value Tradeoffs. New
York: Wiley, 1976.
Kirkwood, C. W., Strategic Decision Making: Multiobjective Decision Analysis with Spreadsheets, Belmont,
California: Duxbury Press, 1997.2
Matheson, D. & Matheson, J., The Smart Organization: Creating Value Through Strategic R&D, Harvard
Business School Press, 1998.
Patchak, William, M., “Decision Analysis Software Survey,” OR/MS Today, October 2014 [Biannu-
al survey of DA software] https://www.informs.org/ORMS-Today/Public-Articles/October-Vol-
ume-41-Number-5/Decision-Analysis-Software-Survey, Accessed August 22, 2015.
Parnell, G. S., Driscoll, P. J., and Henderson D. L., Editors, Decision Making for Systems Engineering and
Management, Wiley Series in Systems Engineering, Andrew P. Sage, Editor, Wiley & Sons Inc., 2008.
Parnell, G. S., Value-Focused Thinking Using Multiple Objective Decision Analysis, Methods for Conducting
Military Operational Analysis: Best Practices in Use Throughout the Department of Defense, Military
Operations Research Society, Editors, A. Loerch & L. Rainey, pp. 619-656, 2007.
Parnell, G. S., Bresnick, T. A., Tani, S. N., and Johnson, E. R. Handbook of Decision Analysis, John Wiley
& Sons, 2013.
Phillips, L. D., “Chapter 19: Decision Conferencing,” Advances in Decision Analysis – From Foundations to
Applications, Edwards, W., Miles, R., and von Winterfeldt, D., Cambridge Press, 2007.
Raiffa, H. Decision Analysis: Introductory Lectures on Choices Under Uncertainty, Addison-Wesley Publish-
ing Co., 1968.
Spetzler, C., “Building decision competency,” Advances in Decision Analysis – From Foundations to Applica-
tions, Edwards, W., Miles, R., and von Winterfeldt, D., Cambridge Press, 2007.
166
Decision Analysis
The following are two standard references in this field. The following table maps the topics in this chapter
to these references.
1. Clemen, Robert T. and Reilly, T., Making Hard Decisions: An Introduction to Decision Analysis, 2nd
Edition, Duxbury Press, 2013.
2. Kirkwood, Craig W., Strategic Decision Making: Multi-objective Decision Analysis with Spreadsheets,
Duxbury Press: Belmont, CA, 1997.
Advanced
References 1 2
Material
Authors C&R K
I Introduction X X
II Elements of Decision Analysis X X
A Decision Context X X
B Values and Consequences X X
C Decisions X X
D Uncertain Events X X
E Alternative-Focused Thinking and Value-Focused Thinking X
III Structuring Decisions X X
A Value Hierarchies X X
B Means Objectives X X
C Influence Diagram X
C Decision Trees X X
E Comparison of Influence Diagrams and Decision Trees X
F Sequential Decisions X
G Time Value of Money X
H Cash Flows and Probabilities X
IV Decisions with Single Objectives - Value X X
A Decision Tree Example with Expected Monetary Value X X
B Influence Diagram Example with Expected Monetary Value X
C Risk Profiles X
D Dominance X
V Decisions with Multiple Objectives - Value X X
A Objectives, Attributes,Value Measures, and Scores X X
B Types of Value Measures X
C Value Functions X X
D Importance Weights and Swing Weights X X
E Additive Value Model X X
F Decisions with Uncertain Scores X
G Decision with Uncertain Events and Uncertain Scores X X
H Mathematical Foundations of Multiattribute Value X A
VI Sensitivity Analysis X X
A One Way Sensitivity X X
B Two Way Sensitivity X X
C Tornado Diagram X
D Probability Sensitivity X
E Weight Sensitivity X X
167
Engineering Management Handbook
168
Multi-Criteria Analysis
12
Multi-Criteria Analysis
Anirban Ganguly
Stevens Institute of Technology
Donald N. Merino
Stevens Institute of Technology
169
Engineering Management Handbook
Analytic Hierarchy Process (AHP) increases. The insight of the techniques gained from this chapter can
aid the engineering managers’ knowledge about techniques and practical applications of decision-making.
This, in turn, could lead to a more effective decision-making process and hence a better selection of EM
projects. Additionally, using non-economic decision-making tools like MCA in tandem with economic
tools like sensitivity analysis and after-tax analysis could provide any engineering manager with the knowl-
edge of how to combine economic as well as non-economic tools to arrive at a more accurate decision
regarding the choice of an engineering project.
The proper selection of any engineering/manufacturing project is a complicated process that requires
detailed analysis before committing huge capital investments. Hence, a proper selection among competing
alternatives is a key to effectively managing engineering/technology projects. This is a typical problem for
engineering managers. This chapter illustrates how to use various techniques to choose among alternative
engineering projects, and, in turn, increase the profitability of the organization.
Objective /
Goal / Focus
Alternative A Alternative B
because Attribute 1 is “a little more” preferred to Attribute 2, cell i12 is “3” and consequently, its reciprocal,
that is, cell i21, is “1/3.” Furthermore, for a set of “n” elements (or attributes) the number of pair-wise compari-
sons should be “n (n-1)/2”. Saaty (1994) provides a rationale for this. According to him, because there are n
1’s on the diagonal for comparing the attributes with themselves and of the remaining judgments, half are
reciprocals. Therefore, there are “(n2- n)/ 2”, i.e., n (n-1)/2 judgments for a set of “n” attributes. Thus, for
a set of five attributes, the number of pair-wise judgments should be 10 (i.e., “(5*4)/2 = 10”).
Composite Score
After the pair-wise comparison has been completed, the results are combined into a composite score,
which shows how well each of the alternatives to be chosen fits the overall objective (focus) of the deci-
sion-making process. Finally, the last step of the AHP is that of making the actual decision based on the
overall values of the alternatives in question.
Summary of AHP
1. Choose the goal or objective to be evaluated
2. Choose the attributes (KISS)
3. Establish a rating system for pair-wise comparisons
4. Use the rating system to choose among the attributes
5. Normalize the attributes to determine their weights
6. Chose the alternatives
7. Use the same process as in Steps 3 and 4 for each attribute/alternate combo
173
Engineering Management Handbook
174
Multi-Criteria Analysis
ever, Saaty (1994) argues that using the “ideal mode” of AHP synthesis, rather than the distributive mode,
would aid any decision-maker to preserve the original rank.
12.2.4 Conclusion
We can conclude from the above that an AHP analysis aids the decision-maker in gaining valuable insight
into his or her values and the relative merits of the available decision options. AHP is a structured method
that can elicit more information from target respondents (usually experts or decision-makers) (Cheng and
Li, 2001). According to Dolan (2000), AHP reduces a complex problem into smaller, simple parts and
thus makes solving not only easier, but also much less error prone. Additionally, AHP provides a method
of applying multiple viewpoints into a decision-making process in an explicit and unbiased manner—
thereby making the decision-making process not only very practical, but also very complete. Several
available techniques of sensitivity analysis allow how changes in the pair-wise comparisons of the criteria
weights might affect the result. Finally, AHP, which is a multiple criteria decision-making process, has all
the potential for overcoming many of the cognitive and practical problems associated with most other
decision-making models. AHP also ensures that all-important considerations, even the ones that are very
unique, are addressed while selecting the best alternative (Saaty, 1990).
ANP Structure
ANP takes into consideration the inner as well as outer dependence among the elements (Saaty, 2001).
Although inner dependence signifies the relationship between the attributes of any particular level of
hierarchy (or cluster, in the case of ANP), the outer dependence indicates the relationship among various
levels. This relationship is illustrated by a Supermatrix, which is a two-dimensional matrix that represents
the relationship among all the clusters available in the ANP analysis and is column stochastic in nature,
which is a matrix whose columns sums up to unity (Saaty, 2001). The overall decision regarding the
choice of the final alternative in ANP is based on the Supermatrix.
175
Engineering Management Handbook
• Brand A
• Brand B
• Brand C
Alternatives
(Car Brand)
As seen in Figure 12.2, the basic ANP structure, unlike AHP, consists of a network where every node
is connected with each other.
Table 12.5. Pair-Wise Comparison Between Brands with respect to Maintenance Cost
176
Multi-Criteria Analysis
Table 12.6 depicts a simple ANP Supermatrix. As seen from the matrix, each cell in the Supermatrix
denotes the relationship of a sub-element with respect to a parent element, with the sub-elements present-
ed in rows and the parent elements in columns. Thus, the intersection cell of the fifth column and the first
row shows the normalized value of Brand A with respect to the Maintenance Cost (Table 12.5) and so on.
The “zero” values denotes the absence of relationship between the row and the column element.
The next stage consists of normalizing the Supermatrix in order to make it column stochastic in na-
ture. The new Super matrix is called Weighted Supermatrix and is provided in Table 12.7.
177
Engineering Management Handbook
The weighted Supermatrix converges until the third decimal place when raised to the 18th power. Al-
though this might sound very difficult, there are mathematical software programs (Scientific Notebook®,
Mathematica®, Matlab®, etc.) that solve these problems with considerable ease.
12.3.3 Conclusion
One of the fundamental advantages of ANP lies in the fact that it stretches well beyond the tradition-
al boundaries of linear decision-making tactics. In a world that is guided by complex decision-making
processes, the business and engineering managers often have to indulge in decision-making processes that
can be far more well represented through a non-linear multidirectional networked approach. This type of
an approach enables the decision-makers to consider consequences that not only affects the alternatives,
but also derive its importance from the alternatives themselves—thereby resulting in a networked frame-
work for decision-making. The networked structure used in ANP allows the users to identify, classify, and
arrange all the factors that influence the outcome of a decision (Saaty and Vargas, 2006), enabling, in the
process, the decision-maker to arrive at more robust and practical solutions regarding the project selection
and evaluation.
178
Multi-Criteria Analysis
provides the decision-maker with a true reflection of the attributes’ relative weights. The normalized val-
ues of the weights serve as a cornerstone for determining the overall rank of alternatives.
Ai = ∑ ni = 1 Xi * Yij (12.1)
where,
Ai = The final value of alternative i
Xi = The normalized weights of the attributes and
Yij = Rating of attribute i for alternative j.
In context of Equation 12.1, the alternative with the highest value of “A” should be the preferred one. If
the decision is based on the viewpoint of several decision-makers, the standard procedure it to determine
the mean of the final overall value for any particular alternative.
subsequently be combined to develop the overall value of the utility function. The selection of the attri-
butes can be based on group discussions, interviews, surveys, and experts’ opinions, among others.
Utility
0.8
Reliability
0 85% 95% 100%
As seen in Figure 12.3, the perceived utility of the attribute starts rising only after it passes the 85%
mark. A 100% reliability assumes a utility value of 1 (the best outcome) while any value below the 85%
level assumes a value of 0 (worst outcome). However, it should be mentioned here that the Utility func-
tion shown in Figure 11.4 is just one of many shapes it can assume. It can be either linear or non-linear
in nature depending on the attribute and the scale assigned by the decision-makers. For example, the
shape of the utility function for “cost” is generally linear and negatively sloped in nature, i.e., the higher
the cost, the lower the utility while that of the profit function is positively sloped. In addition, the same
decision-making project can comprise of multiple utility function depending on how many attributes the
decision is evaluated upon.
12.4.4 Conclusion
The utility and value analysis allows a decision-maker to take into account a set of subjective judgments and
convert them into a numerical scale. This technique is highly useful when it comes to solving decision-mak-
181
Engineering Management Handbook
ing problems with multiple objectives, as it effectively incorporates the perceived utilities derived from a
variety of attributes, and combines them to form a composite overall utility value. The approach is also use-
ful when money is not the sole criterion but other non-economic criteria are used in tandem with monitory
aspects in the overall decision-making process. Utility theory brings structure and method to what is often an
ad-hoc decision-making process, providing the decision-maker with a more rational and concrete decision.
12.5 References
Blank, Leland and Tarquin, Anthony, Engineering Economy, McGraw-Hill, 2005.
Canada, John R., and Sullivan, William G., Economic and Multiattribute Evaluation of Advanced Manufac-
turing Systems, Prentice Hall, 1988.
Cheng, Eddie W. L., and Heng Li, “Information priority-setting for better resource allocation using ana-
lytic hierarchy process (AHP),” Information Management & Computer Security, vol. 9, no. 2-3,
2001, pp. 61-70.
Dolan, James G., “Involving patients in decisions regarding preventive health interventions using the
analytic hierarchy process,” Health Expectations, vol. 3, no. 1, March 2000, pp. 37-45.
Environmental Resources Management (ERM), “Multi Criteria Analysis,” Anex 4D,.4 for Strategic Plan-
ning Guide for Municipal Solid Waste Management by Wilson, Whiteman & Tormin, Accessed online
on 7th July 2008 from http://www.worldbank.org/urban/solid_wm/erm/Annexes/US%20Sizes/
New%20Annex%204D.4.pdf
Evaluating Socio Economic development (Evalsed), “Multicriteria Analysis,” Sourcebook 2: Methods and
Techniques (2003), Available online at http://ec.europa.eu/regional_policy/sources/docgener/evalua-
tion/evalsed/downloads/sb2_multicriteria_analysis.doc
Ganguly, Anirban and Merino,Donald N., “Economic and Non-Economic Analysis of Emerging Micro-
wave Technology,” 27th American Society of Engineering Management (ASEM) National Conference
Proceedings, Huntsville, Alabama, October 2006.
Ganguly, Anirban and Merino, Donald N., “Applying Analytical Hierarchy Processing in Selection
among Alternative Chemical Process,” 28th American Society of Engineering Management (ASEM) Na-
tional Conference Proceedings, Chattanooga, Tennessee, November 2007.
Keeney, Ralph L., “An Illustrated Procedure for Assessing Multiattributed Utility Functions,” Sloan
Management Review, vol. 14, no. 1, Fall 1972, pp. 37-50.
Kotnour, Timothy and Farr, John V., “Engineering Management: Past Present and Future,” Engineering
Management Journal, vol. 17, no. 1, March 2005, pp. 15-26.
Lang, Hans J. and Merino, Donald N., The Selection Process for Capital Projects, John Wiley & Sons Inc., 1993.
Liberatore, Matthew J. and Robert L. Nydick, Decision Technology: Modeling, Software, and Applications,
John Wiley & Sons, Inc., 2003.
Roper-Lowe, G. C. and Sharp, J. A., “The Analytical Hierarchy Process and its Application to an Infor-
mation Technology Decision,” Journal of Operational Research Society, vol. 41, no. 1, 1990, pp. 49-59.
Roth, Richard, Field, Frank, and Clarke, Joel P., “Material Selection and Multi-Attribute Utility Analysis,”
Journal of Computer Aided Material Design, vol. 1, no. 3, October 1994, pp. 325-342.
Saaty, Thomas L., Analytic Hierarchy Process, New York: The McGraw-Hill Companies, 1980.
Saaty, Thomas L., “How to Make Decisions: The Analytic Hierarchy Process,” European Journal of Oper-
ation Research, vol. 48, no. 1, Sept. 1990, pp. 9-26.
Saaty, Thomas L., “How to Make a Decision: The Analytic Hierarchy Process,” Interfaces, vol. 24, no. 6,
November / December 1994, pp. 19-43.
Saaty, Thomas L., Multicriteria Decision Making—The Analytical Hierarchy Process: Planning, Priority Set-
ting, Resource Allocation, RWS Publications, 2001.
Saaty, Thomas L., Decision Making with Independence and Feedback: The Analytic Network Process, Pitts-
burgh: RWS Publications, 2001.
182
Engineering Informatics – State of the Art and Future Trends
13
Engineering Informatics – State of the Art
and Future Trends
Li Da Xu
Old Dominion University
183
Engineering Management Handbook
13.1 Introduction
Engineering informatics is an emerging engineering discipline combining information technology or
informatics with a variety of engineering disciplines. It is an interdisciplinary scientific subject focusing
on the application of advanced computing, information, and communication technologies to a variety of
engineering disciplines.
Computer-aided design (CAD), computer-aided engineering (CAE), computer-aided manufacturing
(CAM) are the terms that have appeared over the last four decades in the area of computing technology
in engineering. Computing technology has had significant impacts on a variety of engineering disci-
plines. Meanwhile, computing technology in engineering has also continuously promoted the advances in
computing technology. In this evolution process, computing technology, computational methods, and a
variety of engineering disciplines have increasingly intertwined as the development of the theory and prac-
tice in both disciplines (computing technology and engineering) influences each other.
Since 1990, the need for a scientific subject called engineering informatics has been recognized,
although the subject has not yet been formally recognized as a scientific and engineering discipline. The
following are excerpted from reports from either the National Science Foundation or the National
Academies:
“The structuring of design information and data integration are critical requirements for data shar-
ing between designers separated physically and in time, as well as between companies, vendors and
customers. Standards do not yet exist for modeling many engineering and organizational param-
eters that are essential for design specification and analysis, nor are there standards for structuring
rational for decisions and design procedures used” (National Research Council, 1991). “Data
communication in a heterogeneous system, validation, and consistency of data, representation of
textual and geometrical data, …, analytical models of manufacturing processes are all risky areas
of research, requiring multiyear, cooperative efforts. Solutions to these problems are needed…”
(National Research Council, 1995). “Interdisciplinary collaborations will be especially important
for implementing comprehensive processes that can integrate the design of mechanical systems
with the design of electrical systems and software. Successful collaborations, however, will first
require overcoming incompatibilities between emerging technologies and the existing technological
infrastructure and organizational cultures” (National Science Foundation, 2004). “For many orga-
nizations, a fundamental change in the engineering culture will be necessary to take advantage of
breakthroughs in advanced computing, human-machine interactions, virtual reality, computational
intelligence, and knowledge-based engineering…” (National Academy of Engineering, 2005).
In 2008, Subrahmanian and Rachuri first proposed to use the term “engineering informatics” to cover
the theory and practice in which computing technology and engineering are interfacing (Subrahmanian
and Rachuri, 2008). “Informatics, with origins in the German word Informatik referring to automated
information processing, has evolved to its current broad definition. The rise of the term informatics can
be attributed to the breadth of disciplines that are now accepted and envisioned as contributing to the
field of computing and information sciences. A common definition of informatics adopted by many
departments/schools of informatics comes from the University of Edinburgh: “the study of the structure,
behavior, and interactions of natural and artificial computational systems that store, process and commu-
nicate information.” Informatics includes the science of information, the practice of information process-
ing, and the engineering of information systems” (Subrahmanian and Rachuri, 2008). Informatics has an
engineering aspect, which addresses the engineering and operation of information processing systems that
compute, store, communicate, and visualize information (Broy, 2006).
Subrahmanian and Rachuri (2008) further indicated that the history of computing technology and
engineering shows a trend of increasing sophistication in the type of engineering problems being solved.
Early CAD was primarily based on computational algorithms and models. Then came the engineering use
of artificial intelligence (AI), driven by theories of cognitive science and computational models of cogni-
tion. More recently, models of collaboration, and the acquisition and representation of collective knowl-
edge have been introduced. Following this trend, engineering informatics can be defined as “the study
184
Engineering Informatics – State of the Art and Future Trends
of use of information and the design of information structures that facilitate the practice of engineering
and of designed artifacts that embody and embed information technology and science to achieve social,
economic and environmental goals” (Subrahmanian and Rachuri, 2008). Subrahmanian and Rachuri
identified several strands of concepts that support the proposing of engineering informatics as a distinct
discipline that interfacing engineering and informatics (Subrahmanian and Rachuri, 2008). As comput-
er scientists or engineers cannot solve engineering informatics problems in the context of engineering
systems alone, engineering informatics is an interdisciplinary and collaborative effort. In other words,
the lack of required backgrounds among computer scientists in engineering and engineers in computing
technology has led to develop a new interdisciplinary subject—engineering informatics.
Engineering informatics is an interdisciplinary subject. For example, constructing an embedded soft-
ware system for engineering purpose requires interdisciplinary efforts in mechanics, the domain, software,
hardware, human-machine interfaces, and other disciplines. Engineering informatics is to use the knowl-
edge from both informatics and engineering for forming engineering informatics knowledge framework
and base.
Similar movements have been seen in individual engineering disciplines. In the construction engi-
neering discipline, initially, several names have been used for the interdisciplinary field related to both
construction engineering and computing technology such as “computer integrated construction,” “com-
puting in civil engineering,” and “information technology in construction.” The most commonly used
terms are “information technology in construction” or “construction IT.” They were coined in the middle
1990s (Turk, 2006). According to Turk (2006), “years later more sober voices claim that many of the
problems in the construction industry, that could have been solved by information technology, are not
solved, however not only due to technical issues. It seems appropriate, therefore, to remove the word
technology and leave just ‘construction informatics’ (CI), construction taken in the broadest sense of the
word to include building, civil engineering, and structural engineering, AEC (architecture, engineering,
construction) and other disciplines…” (Turk, 2006).
As informatics is applicable in multiple engineering disciplines or span multiple engineering disci-
plines, as such, the term “engineering informatics” was proposed, coined, and started to be used. It is
natural that the informatics for a specific engineering subject start expanding to cover a variety of engi-
neering disciplines, and eventually, a more general term called engineering informatics was proposed and
coined. Engineering informatics is considered as a distinct discipline, at the interface between engineering
and informatics, in the same vein as bioinformatics and medical informatics (Subrahmanian and Rachuri,
2008).
Subrahmanian and Rachuri proposed their view of the field of engineering informatics (for fully rep-
resent the original contents, Figure 1 was reproduced from (Subrahmanian and Rachuri, 2008). In Figure
13.1, the inner set of circles marked as informatics covers the fundamental activities associated with infor-
matics in general. The next circle, denoted by Product and Process, identifies the multilevel, multi-scale
modeling activities of products and processes. The role that informatics plays in engineering products and
processes has been becoming significant in past decades. The outer circles show the inputs to engineering
informatics from a number of disciplines that provide the domain knowledge and methods and tools.
185
Engineering Management Handbook
Although Subrahmanian and Rachuri proposed their view of the field of engineering informatics, the
scope of engineering informatics, can be further refined. As indicated by Broy (2006), software and systems
engineering is the key for constructing information processing systems. In particular, software and systems
engineering addresses issues such as requirements engineering and reliability engineering (Broy, 2006).
Regli (2007) indicated that, in the information technology in engineering, although there have been
great strides made by academic and commercial entities in the past decades, the fundamental problems
of information integration remain the same. In 2008, Subrahmanian and Rachuri indicate the numerous
incompatibilities in information exchange and coordination. The delays that occurred in Airbus 380 and
Boeing 787 are examples of the problems of this nature (Subrahmanian and Rachuri, 2008). The infor-
mation integration within or across industrial sectors is still a dream. Regli and other researchers have
indicated the key technological issue of engineering informatics is “the apparent lack of fundamental
progress in areas of information integration” (Regli, 2007).
Before the need for engineering informatics was formally presented in 2007 and term “engineering
informatics” was coined in 2007 and 2008 (Subrahmanian and Rachuri, 2008; Regli, 2007), a scientific
and engineering discipline called Industrial Information Integration Engineering was formerly proposed
and recognized by international organizations International Federation for Information Processing (IFIP)
and the Industrial Information Integration Engineering (IEEE) in 2005.
In June 2005, at a meeting of the IFIP Technical Committee for Information Systems (TC8) held at
Guimarães, Portugal, the committee members intensively discussed and formally recognized the import-
ant role played by industrial information integration and the innovative and unique characteristics of IIIE
as a scientific sub-discipline (Roode, 2005; Raffai, 2007). IIIE is a set of foundational concepts and tech-
niques that facilitate the industrial information integration process; specifically speaking, IIIE comprises
methods for solving complex problems when developing IT infrastructure for industrial sectors, especially
in the aspect of information integration. It was decided at this meeting that the IFIP First International
Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS, 2006)
would be held in Vienna, Austria. In August 2006, at the IFIP 2006 World Computer Congress held
in Santiago, Chile, the IFIP TC8 WG8.9 Enterprise Information Systems was established. In 2007, the
Enterprise Information Systems Technical Committee was established within the IEEE SMC Society. To
further respond to the needs of both academicians and practitioners for communicating and publishing
their research outcomes, the science and engineering journal entitled Enterprise Information Systems, was
launched in 2007 (Figure 13.2). In 2016, the science and engineering journal entitled Journal of Industrial
Information Integration, exclusively devoting itself to the topics of IIIE, will be launched (Elsevier, 2016).
186
Engineering Informatics – State of the Art and Future Trends
The concept of IIIE emphasizes multiple aspects, including one of the major aspects that completely
overlaps with the scope of engineering informatics: engineering information integration.
This chapter is focused on one of the major aspects of IIIE that completely overlaps with the scope
of engineering informatics: engineering information integration. The objective of this article is to intro-
duce to the communities of engineering and engineering informatics the current development and future
opportunities that exist in engineering information integration, but it is by no means meant to be exhaus-
tive. In Section II, we briefly discuss the relationship between engineering integration and engineering
information integration. Section III describes major techniques or technologies in engineering informa-
tion integration applicable to engineering informatics, while Section IV concludes this paper.
ical layer, IIIE interacts with computer science and engineering, industrial systems engineering, informa-
tion systems engineering, and interdisciplinary engineering. In terms of developing and implementing
enterprise systems in different industrial sectors, at the application layer, IIIE interacts with aerospace
engineering, bioengineering, civil engineering, energy engineering, communication engineering, material
engineering, and earth resources engineering. In addition to the scientific and engineering disciplines, IIIE
also interacts with management and social sciences. For example, any effective engineering process relies
on effective management. As a result, the perspectives for the workflows that are commonly modeled and
represented include managerial perspective. Based on the definition of management defined (Xu and Xu,
2011), in a broad sense, management is the most comprehensive science that covers all the disciplines.
Judging from these, IIIE is defined as a complex giant system that can advance and integrate the concepts,
theory, and methods in each relevant discipline and opens up a new discipline for the industry informa-
tion integration purposes, which is characterized by its interdisciplinary nature. Figure 13.3 shows IIIE
at the top level; relevant scientific, engineering, management, and social science disciplines at the second
level; and application engineering fields at the third level. At the fourth level and the levels below, many
relevant frameworks, theories, and models can be listed.
Figure 13.3 can be huge in size in order to cover all of the details involved. For example, enterprise
interoperability is involved with frameworks such as the ATHENA Interoperability Framework, Business
Interoperability Parameters, the CEN/ISSS eBusiness Roadmap, C4 Interoperability Framework (C4IF),
the IDEAS Interoperability Framework, the European Interoperability Framework, Levels of Conceptual
Interoperability, Levels of Information System Interoperability (LISI) C4ISR, NATO C3 Technical Archi-
tecture (NC3TA), and the Organizational Interoperability Maturity Model.
188
Engineering Informatics – State of the Art and Future Trends
technological evolution. In 1980s, traditionally, MRP II systems interface with engineering design systems
to receive BOM and routing information. However, the interface is not always advanced, as it is unable to
pass critical information back to the engineering design system. In 2000, engineering integration became
one of the main components of enterprise systems (Langenwalter, 2000). Figure 13.4 shows the relation-
ship between engineering integration, manufacturing integration, customer integration, and enterprise
integration.
Figure 13.4. The Relationship Between Engineering Integration, Manufacturing Integration, Customer Inte-
gration, and Enterprise Integration
In general, about 90% of a product’s cost is determined during its design cycle; its quality charac-
teristics are also determined during the product design stage. In a typical product development process
(such as in plastic injection mold design), the design information flow may not be well supported by the
existing systems. If associative relations among engineering features were not available through the system,
data consistency and design changes would be difficult to manage. At different stages of a product’s life
cycle, from its requirement specifications to its conceptual design to its more detailed structure design
and finally to its production, engineering knowledge must be integrated. A complete integration includes
the design process, product data management, integration with customers, integration with suppliers,
integration with the rest of the organization, and project management. The ways in which the engineering
division integrates with the rest of divisions in an enterprise have been intensively researched.
According to Kulvatunyou and Wysk (2000), integration can be classified into three types:
1. Data-oriented integration, which integrates CAD, CAPP, CAM, and CIM;
2. Structure-oriented integration, which is an implementation of team-oriented concepts, such as the
use of a simultaneous engineering team, a concurrent engineering team, and an integrated product
and process development team;
3. Procedure-oriented integration, which refers to concurrent engineering-enabling technologies include
QFD, the Taguchi method, axiomatic design, and design for manufacturing and assembly.
In concurrent engineering, all of the engineering processes should be supported by integrated com-
puter-aided tools, and should be based on a consistent set of data with different application views. Such
applications include conceptual design, structural design, detailed design, design analysis for certain spe-
cific engineering aspects, computer-aided process planning (CAPP), and computer-aided manufacturing
(CAM) tool path generation, etc. However, this desirable scenario has not been fully realized due to the
interoperability limitations of different software packages.
189
Engineering Management Handbook
A concurrent design process consists of many design activities that are interrelated with each other.
Concurrent design has become increasingly important in designing complex products. When it is imple-
mented in manufacturing enterprise systems along with engineering integration, it is likely to generate
better design. Numerous concurrent design techniques have been developed, such as PERT (Project
Evaluation and Review Technique), ISM (Interpretative Structure Modeling), DSM (Design Structure
Matrix), Petri nets, and polychromatic sets. Each of these methods has some weakness. For example,
PERT is useful for the design processes in which activities have a clear sequential relationship. However,
it is inflexible and therefore unable to include feedback information and the iterative characteristics of the
concurrent design. Using the adjacent matrix, ISM and DSM can apply partitioning algorithms and other
algorithms in the concurrent design process. Although the Petri net is suitable for modeling concurrent
processes, it does not have sufficient capacity to represent data flow or handle computational complexity.
UML is a graphical and visual modeling language. Integrating UML with polychromatic sets provides a
powerful tool for modeling and analyzing concurrent design processes. UML has been applied in concur-
rent design such that a UML model of concurrent design process has been developed and mapped into a
polychromatic sets contour matrix model. Using this novel modeling and analysis method for a concur-
rent design process based on UML and polychromatic sets, the concurrent design process can be modeled
formally and analyzed quantitatively, and the major factors that affect the concurrent design process can
be considered.
In the CAD/CAM field, the comprehensive design of dimensional and geometric tolerances for
mechanical products using computers is called Computer Aided Tolerancing (CAT). This is a focal point
of research in CAD/CAM. In the process of product design and manufacturing, the tolerance values of
a mechanical part are closely related to its manufacturing process, which not only influences the quality
of product but also affects the manufacturing cost. So far, considerable research has been conducted on
CAT analysis and synthesis, tolerance information modeling and representation, concurrent tolerance
design, dynamic tolerance control, and tolerance information verification. The research covers: (1) the
concept for determining the geometric shape and the dimensional and geometric tolerance of a part using
a computer. Based on this, designed dimensions and tolerances of the part with a geometric shape can
be described using mathematical formulae; (2) the method to control the tolerance of design and man-
ufacturing using computerized dimension chain; (3) the theory of tolerance, which defines the concept
of tolerance according to the offset values of the real entity of a part and provides a theoretical basis for
its CAT design; (4) the concept of virtual boundary requirements (VBRs), which describe tolerance and
conditional tolerance; (5) TTRS (Topologically and Technologically Related Surfaces) theory, which
establishes the important theoretical foundation for dimensional tolerance and geometric modeling in the
CAD system; (6) and the theory based on wavelet and fractal technology with application in designing
the tolerance.
With the continuous development of CAT technology, a number of tolerance models have been
proposed, such as attribute models, parametric models, kinematic, and DOF models. In attribute models,
a tolerance can be directly stored as an attribute of either geometric entities or metric relations. Offset
models can obtain the maximal and minimal object volumes by offsetting the object by corresponding
amounts on either side of the nominal boundary. However, they cannot distinguish the interactions of
different tolerance types. Parametric models represent tolerances as ± variations of dimensional or shape
parameters. In current CAD systems, the modeling method for parametric models has been widely
applied. Kinematic models use vector additions to analyze tolerances. A kinematic link is used between a
tolerance zone and its datum features. TTRS models have many similarities to DOF models.
With the development of three-dimensional (3D) CAD system, it has become urgent to construct a 3D
dimension chain and to comprehensively design dimensional and geometric tolerances. Researchers have put
forward the Variational Geometric Constraint (VGC) theory, which can effectively handle the comprehen-
sive design of dimensional and geometric tolerance, although with some difficulties in computation.
In CAD/CAM technology, the importance of CAT research has been emphasized by researchers.
Consequently, CAT research is becoming more and more popular. The polychromatic sets theory has been
applied in CAT. Based on the VGC theory and TTRS theory, a hierarchical reasoning model of toler-
190
Engineering Informatics – State of the Art and Future Trends
ance information is developed that applies the polychromatic sets theory to describe the model, optimizes
computer-aided generation of tolerance types, and provides a basis for developing tolerance network and
designing tolerance. The research introduces the application of the hierarchical reasoning model as well
as its reasoning method, based on assembly-oriented tolerance generation. Polychromatic sets theory is
a mathematical theory tool that is regarded as a promising approach for many applications. Due to the
idea and the theory that were developed, namely to use a standardized mathematical model to simulate
different objects, the techniques of polychromatic sets have been widely applied to areas such as product
life-cycle simulation, product conceptual design, concurrent engineering, and virtual manufacturing for
product modeling, process modeling, and process optimization.
In recent years, engineering design has required more and more multidisciplinary design activities.
Engineering designers from a number of different disciplinary areas may interact and exchange in the de-
sign process. Therefore, seamless integration and efficient processing of engineering data among numerous
heterogeneous data sources plays an important role in engineering design. Hence, engineering integration
is assumed to support multidisciplinary engineering design activities throughout product development
cycles. The ubiquitous characteristics of data diversity, irregularity, and heterogeneity will distinctively
differentiate engineering information integration from information integration in other domains in IIIE.
This poses a challenge to effective engineering integration. There has been much ongoing research in this
area. The topics cover: (1) the methodology for developing a virtualization-based simulation platform in
support of multidisciplinary design of complex products; (2) approaches for engineering software inte-
gration and product data exchange to support interoperability among different engineering phases; (3)
mathematical formulation and optimization method for engineering problems; (4) autogenetic design
theory and distributed computing approaches and their applications to multidisciplinary design optimi-
zation; and (5) web services-based multidisciplinary design optimization frameworks, which provide data
exchange services and integration.
The research on engineering integration is becoming more prevalent now. Research has recently been
conducted on the methods and models for large-scale engineering projects.
such processes. Manufacturing process modeling is a typical example. All process details in a manufactur-
ing process that relate to the desired outputs of the process need to be understood. In general, a precise
process model that relates processes is required. As such, modeling manufacturing processes is important
as it enables manufacturers to understand the process and to optimize the process operation. Modeling
industrial control is an example also. Such modeling draws the domain expertise of multiple disciplines/
subjects including ICT, process technology, and factory automation, and industrial communication sys-
tems. Process modeling results can be applied to process automation and factory automation. The control
and predictive capability of business process management also offers useful insights into quite a few engi-
neering fields covered in Figure 13.3. As previously mentioned, IIIE is interdisciplinary. Industrial process
modeling can be listed in Figure 13.3 at a level below Level 3; as such, the industrial process control
itself is a complex interdisciplinary subject. To track process-related information and the status of each
instance of the process as it moves through an organization, the concept of workflow becomes important.
Workflow systems have been considered as efficient tools that enable the business process management,
the business process reengineering, and eventually the automation of organizational business processes.
Workflow management provides increased process efficiency through improved information availability,
process standardization, task assignment on an automatic basis, and process monitoring using specific
management tools (i.e., WfMS). Although workflow monitoring and management spans a broad continu-
um, the key idea of workflow management is to track process-related information.
When the first prototype of a workflow system was developed, the early idea of automation of
business processes was initiated. Workflow management allows managing workflows for different types
of processes, facilitating process automation and providing predictive capabilities, and it enables organiza-
tions to maintain control over their processes. Business processes and their related workflow systems have
gained greater interest since the early 1990s; research about enterprise business processes and workflows
has become a prominent area that attracts attention both from academia and industry.
A workflow consists of a number of tasks that need to be carried out and a set of conditions that
determine the order of the tasks. The Workflow Management Coalition (WMC) defines a workflow as
a computerized facilitation for the automation of a business process, in whole or in part. Three types of
workflows are generally recognized in literature. A production workflow is associated with routine process-
es, and is characterized by a fixed definition of tasks and an order of execution. An ad hoc workflow is asso-
ciated with non-routine processes, which could result in a novel situation. In an administrative workflow,
cases follow a well-defined procedure, but alternative routing of a case is possible. Compared with the
other two types, production workflows correspond to critical business processes and possess high potential
to add value to the organization. Hence, the administrative workflow is usually the focus of most studies
on workflow modeling.
Workflow management has been considered to be an efficient way of monitoring, controlling, and
optimizing business processes through information technology support and is playing an important role
in improving an organization’s performance through the automation of its business processes. Process
modeling is not only expected to automate business processes within the organization, but also to auto-
mate inter-organizational business processes. As such, more efforts have been focused on the integration
of inter-organizational systems to form inter-organizational architecture. For this purpose, it is necessary
to study both intra- and inter-organizational business processes with a scientific approach. IIIE is required
for addressing complex business processes taking place within and beyond the enterprise. Not only does
the intra-organizational business process need to be addressed, but also so does the inter-organizational
process.
Today, workflow systems are increasingly applied to cooperative business domains including coop-
erative engineering design, and they are inter-organizational. As such, workflow management needs to
be completed on an inter-organizational basis. Inter-organizational business process management also pro-
vides enterprises the opportunity to reshape their business processes beyond their organizational bound-
aries. A changing business environment requires an organization to dynamically and frequently adjust
and integrate both its intra- and inter-organizational processes. Additional benefits of interconnecting
business processes across systems and organizations include higher degrees of integration and the facilita-
tion of the information and material flows.
192
Engineering Informatics – State of the Art and Future Trends
trary services in a workflow to formally and uniformly impose requirements. System flexibility has been
considered to be a major functionality of workflow systems. More research is needed for such functional-
ity in order to provide sufficient flexibility for coping with complex business processes. Other topics for
research include the communication among multi-workflows in complicated business process, simplifying
the workflow modeling process, and automating workflows, among other topics. Existing techniques in
process modeling still have limitations as they attempt to address only some of the modeling aspects. For
example, business process models may contain numerous elements with complex intricate interrelation-
ships. Efforts are needed to address how to properly capture such complexities.
195
Engineering Management Handbook
ganizational systems can be integrated seamlessly to ensure that different divisions or even enterprises can
cooperate to each other, even using different systems. A complete EAI offers functions such as business
process integration and information integration, since the core of the EAI technology is business process
management. Through the coordination of the business processes of multiple enterprise applications and
the combination of software, hardware, and standards together, enterprise systems can exchange and share
data seamlessly in a supply chain environment.
In general, those enterprise applications that were not designed as interoperable need to be integrat-
ed on an intra- and/or inter-organizational basis. As such, legacy and newer systems are expected to be
integrated to provide greater competitive advantages. The constantly changing business requirements and
the need for adapting to the rapid changes in the supply chain may require help from service-oriented
architecture (SOA).
EAI provides the integration of both intra- and inter-organizational systems and databases and is
moving toward integrating ES with both intra- and inter-organizational applications. The objective of
EAI is to facilitate information exchange among business enterprises in a timely, accurate, and consistent
fashion, in order to support business operations in a manner that appears to be seamless.
the rapid technological developments. For engineering informatics, there exists a gap between the level
of complexity inherent and the rich set of formal methods that could potentially contribute. Despite
advancements in the field of IIIE and engineering informatics, both in academia and industry, significant
challenges still remain. Both IIIE and engineering informatics will continue to embrace cutting-edge tech-
nology and techniques, and will open up new applications that will impact industrial sectors. IIIE and
engineering informatics can and will contribute to the success of this endeavor.
13.5 References
Broy, M., “The ‘Grand Challenge’ in Informatics: Engineering Software-Intensive Systems,” IEEE Com-
puter, October 2006, pp. 72-80.
Elsevier, Journal of Industrial Information Integration, vol. 1, no. 1, 2016.
Fox, M., Chionglo, J., and Barbuceanu, M., The Integrated Supply Chain Management System, University
of Toronto, 1993.
Giachetti, R., “A Framework to Review the Information Integration of the Enterprise,” International Jour-
nal of Production Research, vol. 42, no. 6, 2004, pp. 1147-1166.
Hasselbring, W., “Information System Integration,” Communications of ACM, vol. 43, no. 4, 2000,
pp. 32-38.
Kulvatunyou, B., and Wysk, R., “A Functional Approach to Enterprise-based Engineering Integration,”
Journal of Manufacturing Systems, vol. 19, no. 3, 2000, pp. 156-171.
Langenwalter, G., Enterprise Resource Planning and Beyond. Boca Raton, FL: St. Lucie Press, 2000.
National Academy of Engineering, “Educating the Engineers of 2020: Adapting Engineering Education
to the New Century,” 2005, p. 10.
National Research Council, “Improving Engineering Design: Designing for Competitive Advantage,”
1991, p. 55.
National Research Council, “Information Technology for Manufacturing: A Research Agenda,” 1995,
p. 81.
National Science Foundation, “ED2030: A Strategic Plan for Engineering Design,” 2004, p. 10.
Puschmann, T., and Alt, R., “Enterprise Application Integration Systems and Architecture-the Case of the
Robert Bosch Group,” Journal of Enterprise Information Management, vol. 17, no. 2, 2004, pp. 105-
116.
Raffai, M., “New Working Group in IFIP TC8 Information Systems Committee: WG8.9 Working
Group on Enterprise Information Systems,” SEFBIS Journal, vol. 2, 2007, pp. 4-8.
Regli, W., “The Need for a Science of Engineering Informatics,” Artificial Intelligence for Engineering De-
sign, Analysis and Manufacturing, vol. 21, 2007, pp. 23-26.
Roode, R., “IFIP General Assembly September 2005. Report from Technical Committee 8 (Information
Systems),” Gaborone, Botswana, August 27, 2005.
Srinivasan, V., Lammer, L., and Vettermann, S., “On Architecting and Implementing a Product Informa-
tion Sharing Service,” Journal of Computing and Information Science in Engineering, vol. 8, 2008.
Subrahmanian, E., and Rachuri, S., “Guest Editorial Special Issue on Engineering Informatics,” Journal of
Computing and Information Science in Engineering, vol. 8, 2008.
Theiben, M., Hai, R., and Marquardt, W., “Design Process Modeling in Chemical Engineering,” Journal
of Computing and Information Science in Engineering, vol. 8, 2008.
Turk, Z., “Construction Informatics: Definition and Ontology,” Advanced Engineering Informatics, vol.
20, 2006, pp. 187-199.
Wolfert, J., et al., “Organizing Information Integration in Agri-Food-a Method based on a Service-ori-
ented Architecture and Living Lab Approach,” Computers and Electronics in Agriculture, vol. 70, no. 2,
2010, pp. 389-405.
Xu, L., Enterprise Integration and Information Architecture, New York: CRC Press, 2015.
Xu, S., and Xu, L., “Management: A Scientific Discipline for Humanity,” Information Technology and
Management, vol. 12, no. 2, 2011, pp. 51-54.
197
198
Basic Accounting and Finance
14
Basic Accounting and Finance
Donald N. Merino
Stevens Institute of Technology
199
Engineering Management Handbook
14.1 Introduction
14.1.1 Importance of Accounting to Engineers
Why is accounting important to engineers? One reason was that engineers needed to know the cost and
profitability of the products they design. For example, look at the ever-changing technology of your PC.
What drives these changes? The continual increase in the cost performance of new chips, printed circuit
boards, disc drives, etc. all result in new and improved products being offered every year.
For companies and governments involved in research and engineering, Design for Cost (DFC) and
Cost as an Independent Variable (Systems Engineering, Concurrent Engineering) are the most recent con-
cepts that help define the synergy between economics and engineering. Knowledge of basic accounting
and finance are essential to understand this concept.
ing economics, but also give you insights and knowledge to help you read and interpret financial reports,
such as SEC filings and personal or corporate tax information.
Entities
Entities are the bounded systems whose financial records may be examined to determine their state of
financial health. There are two types of entities, for-profit and not-for-profit. A convenient classification
follows:
• For-profit (business) entities
• Sole proprietorships
• Partnerships
• Corporations
• Not-for-profit entities
• Private-sector organizations (usually charitable or religious)
• Public-sector organizations (government)
The above classification does not include you, the individual consumer, but when an accountant helps
you prepare your income tax return, you are an economic entity.
The capital selection process applies to both for-profit and not-for-profit entities. Business entities
are found in the private sector of the economy. However, there are public sector entities that compete and
function much like their private counterparts. Utility companies which are owned by national or local
governments are one of many examples. For these and other not-for-profit entities, the terms “profit” and
“loss” are replaced with “surplus” and “deficit” respectively.
For profit economic entities include sole proprietorships, which are owned by one individual; part-
nerships, which are owned by two or more individuals; and corporations, which are owned by a few or
many shareholders. The sole proprietorship is the most common form of business entity, but corporations
are dominant in terms of revenues and profits. Table 14.1 compares the three forms for the year 2000.
Ref: U.S. Bureau of the Census, Statistical Abstract of the United States, 2004
201
Engineering Management Handbook
Proprietorships and partnerships are not “legal entities” in the eyes of the law. That is, they do not
have an independent identity under the law. Therefore, their owners are fully responsible for their acts and
obligations, and creditors can, if necessary, go beyond the assets of the business to seek the personal assets
of the owners in order to satisfy their claims.
Corporations, on the other hand, are “legal entities.” Their shareholders have limited liability, which
means that corporations are responsible for their own acts and obligations. Creditors can rely only on
corporate assets for the satisfaction of their claims, not those of shareholders, employees or members of
the board of directors.
Proprietorships and partnerships are generally managed by their owners; corporations are not. The
shareholders elect a board of directors, which appoints executives to serve as managers. In short, owner-
ship and management are divorced (and, as a result, the interests of the managers may conflict with those
of the shareholders!).
Examples of not-for-profit entities in the private sector include universities, schools, hospitals, muse-
ums, and charitable organizations. Examples are also found in the public sector, but these function under
the aegis of federal, state, and local governments, which are economic entities, along with school districts,
water sanitary districts, public utility and transit authorities, and all other governmental bodies subject to
financial review.
Thus, economic entities can be as large as a global corporation or as small as the corner newsstand.
They can be an entire organization or one of its parts, and, as mentioned, they can also include you and
the author of this tutorial.
Next, our attention will be focused on corporations and governmental entities because these are the
major disbursers of money for capital outlays.
14.2.3 Transactions
A transaction is a piece of business—a sale, a purchase, a borrowing, the repayment of a loan, the pay-
ment for a service, the issuance of stock, the repurchase of stock, and so on. Transactions allow entities
to function. Transactions, when properly recorded, analyzed, and reported give us the financial condition
and the financial performance of economic entities.
Account
The “account” is the basic unit for recording information of a firm’s financial database. Accounts are
grouped into three basic types—assets, liabilities and owner’s equity. An account is a detailed record of
the transactions affecting one or more of these three types. Under the present, widely-used system, each
transaction affects at least two accounts, hence the name “double entry accounting system.”
202
Basic Accounting and Finance
Asset
An asset is a resource that an entity owns or controls in order to achieve a future benefit (profit, share of
market, and competitive advantage). Some examples of assets are cash, inventory, accounts receivable,
equipment, furniture, land, and buildings.
• Cash: This account shows the amount of money that a company holds in currency or in its bank
account.
• Inventory: This account reflects the cost (and possibly the quantity) of goods, held for use or
intended for sale, that a company owns. Merchandise (goods intended for sale to customers) is
recorded as an asset when it is purchased or when it is produced. In addition, raw materials (in-
tended for use in production) are also considered to be inventory. The inventory account increases
when inventory is purchased or produced and, conversely, decreases when the goods are sold or the
materials are used.
• Accounts Receivable: This account shows the amount of credit sales the firm has made, that is deliv-
ery of goods or services to customers who then say “Charge it!” or “Bill me…I’ll pay you later.” It is
the amount of money that customers owe to the company and have promised to pay in the future for
goods and services that they have already received. When the customers do pay, accounts receivable
decreases and cash increases.
• Notes Receivable: A promissory note that says that the customer is going to pay an agreed upon
amount in the future.
• Equipment and Furniture: The original (historical) cost of each item of equipment and furniture
is entered (written into, keyed into) an asset account. This account, then, shows the original cost of
individual items and the total cost (investment) for all of the items.
• Land: This account records the cost of the land that is owned by a business.
• Buildings: This account records the initial cost of buildings owned by the business. Some examples
are factories, office buildings, distribution centers, etc.
Land and buildings deliberately purchased for resale are entered into a different account called an
“investment account.”
Liability
A liability is an obligation or debt that is payable to a creditor. Some examples of liabilities include ac-
counts payable and notes payable.
• Accounts Payable: This account is the opposite of accounts receivable; it is the amount that the busi-
ness owes to its suppliers as a result of credit purchases.
• Notes Payable: This account is the opposite of notes receivable. It is a promissory note stating that
the business will pay in the future for goods or services (previously) acquired on credit.
Owner’s Equity
Imagine that all of the assets of a firm were sold and the cash received was used to pay all of the firm’s
liabilities. The remaining cash (value) is called “owner’s equity.” Equity represents the value of the invest-
ment in a business by its owners. Following are accounts that affect owner’s equity:
• Revenues: For proprietorships, partnerships and corporations, revenue is the total of prices for goods
and services that customers agree to pay; revenue is earned through the sale of goods or services. Rev-
enues increase equity.
• Expenses: For proprietorships, partnerships and corporations, expenses are the cost of resources used
for producing and delivering goods or services to customers, e.g., rent, salaries, electricity, gas, etc.
Expenses decrease equity.
• Retained Earnings: For corporations the retained earnings account holds the value of the accumu-
lative profits and losses of the firm since its inception. These retained earnings (profits) are a major
source of the firm’s investment capital.
203
Engineering Management Handbook
• Capital: For proprietorships, partnerships and corporations, capital is the amount of the owner’s
investments over the lifetime of the business. Usually this investment takes the form of cash payments
for shares of the firm’s stock.
• Dividends and Withdrawals: For a proprietorship or partnership, cash amounts withdrawn (for-
mally) by the owner from the business to be used to pay personal expenses is called “withdrawals”
or “draw.” After making a withdrawal, the asset cash and the owner’s equity both decrease. For a
corporation, cash amounts paid to stockholders (not all corporations do this) is called “dividends.”
Interestingly, corporations cannot deduct dividends paid for income tax purposes. However, as with
withdrawals, dividends paid reduce both the cash account and equity.
If the accounting statements do not result in the above equation being in balance, an accounting error has
taken place (or a fraud in as occurred!). CPA firms catch errors like unbalanced balance sheets.
204
Basic Accounting and Finance
Letting R stand for revenue, C for costs and expenses and ∆E for increase in equity over the period (be-
fore any distribution to owners) gives us
R-C=∆E
The above equation is the model for statements of income. A typical example is given in Table 14.2
For our example, the revenues for the period are $800,000 (1). The total expenses before taxes are $
710,000 (CoGS of $500,000 (2) + G&A of $200,000 (4) + interest of $10,000 (6)), and the earnings be-
fore taxes, often referred to as the net income before taxes, would be the difference, or $ 90,000 (7). The
“net earnings” or income after taxes would be $75,000 (9). The total expenses of $710,000 are broken
down into three categories: the cost of goods and services sold (CoGS), which total $500,000 (2); the
Operating Expenses (includes General and Administrative expenses (G&A)), which total $200,000 (4);
and the miscellaneous expenses, such as interest payments on borrowed funds which total $10,000 (6).
205
Engineering Management Handbook
XYZ Company
Income Statement for the Year Ending December 31, 200X
(1) Revenues $800,000
(2) Less cost of goods and services $500,000
(3) Gross profit $300,000
Less operating expenses
(4.1) Sales and marketing expenses $100,000
(4.2) General and administrative expenses $100,000
(4) Total operating expenses $200,000
(5) Income before taxes $100,000
(6) Less: Miscellaneous revenue and expenses (interest) $10,000
(7) Net income before income taxes (NIBT) $90,000
(8) Less: Income taxes $15,000
(9) Net income after income taxes (NIAT) $75,000
Earnings Before (After) Income Taxes are synonymous with Net Income Before (After) Income
Taxes. There may be depreciation expenses included in either or both cost of goods sold (for production
facilities and equipment) and operating expenses (for administrative facilities and equipment).
In general, Income Statements cover a one-year period, with the period or “fiscal year” ending at a
specified date, often December 31 of the corresponding calendar year. Many firms for various reasons
operate on a fiscal year that ends at a time other than December 31. Annual reports for public firms must
be audited by a certified public accounting (CPA) firm, and, if approved, carry the certification of the
auditors as well as of the firm’s top managers.
206
Basic Accounting and Finance
You can see and touch tangible assets. You can see and touch the pieces of paper that document
liabilities. However, you can’t touch equity, because it is nothing more than the difference that brings
balance sheets into balance. (That occurs when the two sides of the fundamental equation are, in fact,
equal.) Consider the house that you might have bought for $200,000 with a $175,000 mortgage. The
house is an asset; the mortgage is a liability. Your equity is the difference: $25,000. You can’t see, hear,
smell, or touch this difference, but you can see the house and you can touch the mortgage note in your
desk drawer.
Assets may be broken down into three categories, current, fixed and other. Current assets consist of
cash and items that can be quickly (usually within a year) converted into cash. Fixed assets (often called
“non-current” or “long term”) consist of land (property, which cannot be depreciated), plant (buildings)
and equipment (which are depreciable, if owned). Other assets include such intangibles as patents, copy-
rights and any other asset that is not classified as current or fixed. Sometimes these intangible assets are
considered long term because they have long expected useful lives.
Usually assets are listed beginning with the most liquid asset at the top and the least liquid at the
bottom. Therefore, current assets would precede fixed assets. Marketable securities such as U.S. Treasury
bills or certificates of deposit represent very liquid and short-term investments. Hence, they are frequently
viewed as a form of cash. Accounts receivable represent the total money owed to the firm by its customers.
Inventories include raw materials, work in process (partially finished goods), and finished goods held by
the firm. All of these would be considered to be current assets.
All assets are entered into the financial data base at their actual (“historical”) cost, which includes
transportation and installation costs, if applicable. The term “Net Fixed” means that the value displayed is
the difference between total fixed asset costs and the accumulated depreciation related to those assets. The
net value of fixed assets is called their “Book Value.”
Liabilities are broken down into two major categories, current and long-term (non-current). Current
liabilities are amounts due in one year or less. Long-term liabilities are due more than one year into the
future. Like assets, the liabilities and equity accounts are listed on the balance sheet from short-term to
long-term. Current liabilities include Accounts Payable (amounts owed for credit purchases by the firm),
Notes Payable, outstanding short-term loans (typically from commercial banks) and accruals, amounts
not yet paid, but owed for which a bill may not yet have been received. (Examples of accruals include tax-
es due to the government and wages due to employees.) Long-term debt represents that part of any debt
for which payment is not due in the next twelve months.
One important Balance Sheet term you should be familiar with is “Working Capital.” This is tech-
nically the difference between the values of the current assets and the current liabilities. Estimates of the
investment required for (the “infusion of ”) working capital enter into the capital project selection process.
A General Ledger is a summary of all of the organization’s accounts. An adjusted Trial Balance is pre-
pared from the General Ledger. It is used to organize the information from the general ledger to create the
Balance Sheet and Income Statement.
Equity is usually broken down into at least two major accounts. The first, paid-in capital (also called
Capital, Common Stock) is that portion of the difference between the assets and liabilities that was
contributed by owners both initially and whenever additional capital was needed. The second, retained
earnings, is that portion of the difference between assets and liabilities coming from Net Income, earned
from the production and sale of goods and services, that is, from earnings that were retained in the
business and not distributed as dividends to shareholders or as withdrawals to sole proprietors or partners.
Managers strive to make the difference between the assets and liabilities at the end of an account-
ing period larger than it was at the beginning of the accounting period by increasing retained earnings
207
Engineering Management Handbook
by earning profits for the firm. When achieved, this means that the value of the firm for the owners has
increased. We can formulate this objective very simply, as follows:
Let A1, L1 and E1 be the assets, liabilities, and equity at the beginning of the period and A2, L2 and
E2, the assets, liabilities and equity at the end of the period. By the balance sheet equation,
A1 –L1 = E1 and A2 – L2 = E2
If ∆ E is positive, management has succeeded in increasing the difference between assets and liabilities
over the time period under study.
The assets total $ 550,000 (9) and the liabilities $200,000(14). The difference of $350,000((9)-(14))
is the equity. As shown in Table 14.3, ASEM LLC had the following items on its December 31, 200X
balance sheet:
Dates 200X
Cash and equivalents $73,000 31-Dec
Notes payable $33,000 31-Dec
Long-term debt $175,000 31-Dec
Accounts receivable, net $55,600 31-Dec
Non-depreciable assets $196,000 31-Dec
Deferred income tax liability $19,500 31-Dec
Accumulated retained earnings $180,000 1-Jan
Income taxes payable $23,000 31-Dec
Inventories $24,000 31-Dec
Prepaid expenses $9,000 31-Dec
Accumulated Net Worth $35,600 1-Jan
Property, plant and equipment, at initial cost $418,000 31-Dec
Accounts payable $33,700 31-Dec
Goodwill, patents and trademarks $12,300 31-Dec
Short-term Debt $21,200 31-Dec
Accumulated depreciation $178,000 31-Dec
Retained Earnings $19,900 31-Dec
Additional paid-in capital $69,000 31-Dec
208
Basic Accounting and Finance
Table 14.4 contains the Balance Sheet for ASEM LLC, as of Dec 31, 200X.
209
Engineering Management Handbook
Creditors can sue the entity if the amounts due to them are not paid. Owners (Equity Investors)
have only a residual claim; that is, if the entity is dissolved, they are entitled to whatever is left after the
liabilities have been paid. Therefore, liabilities are the primary claim against the assets and equity is the
secondary claim.
We can describe the right-hand side of the balance sheet in two distinct, but correct ways:
1. As the amount of funds supplied by creditors and owners
2. As the claims of these parties against the firm’s assets
The equity section is often labeled “Shareholder’s Equity” or “Owner’s Equity.” Equity consists of
capital obtained from sources that are not liabilities. Table 14.3 shows the two sources of equity capital:
1. $275,000, which is labeled “Paid-in Capital”; and
2. $75,000, which is labeled “Retained Earnings”
Assume that a company’s retained earnings in the fiscal year 200X + 1 is $100,000 (Paid-In Capital is
held constant). Then, the Stockholder’s equity for the following year is shown in Table 14.6:
Table 14.6. Stockholder’s Equity Based Upon Two Sources of Equity Capital
Retained Earnings for 200X + 1 = Retained Earnings for 200X + Net Income after Taxes (less dividends, if any)
for 200X + 1.
amount of Paid-In Capital reported on the Microsoft balance sheet is not affected by these changes. This
is consistent with the entity concept: that is, transactions between individual shareholders do not affect
the Balance Sheet of the entity (the economic entity “Microsoft” is distinct from the economic entities
“individual stockholders”).
Retained Earnings are additions to equity that have accumulated since the entity began, not those of a
single year. The amount of Retained Earnings shows the amount of capital generated by operating activi-
ties and retained in the entity. It is important to note that retained earnings are not cash. Cash is an asset.
Table 14.7. ASEM Corporations Stockholder’s Equity Statement on December 31, 200X
Dates 200X
Accumulated Retained Earnings $273,500 1-Jan
Retained Earnings ($29,600) Jan 1 - Dec 31
Accumulated Net Worth $320,000 1-Jan
Additional Paid-In Capital $71,000 31-Dec
Using the given data, prepare the Stockholder’s Equity Statement for ASEM Corp., as of December 31,
200X is shown in Table 14.8.
Table 14.8. Stockholders’ Equity Statement for ASEM Corp as of December 31, 200X
211
Engineering Management Handbook
The Cash Flow Statement essentially converts the accrual basis of accounting that is used to create the
Income Statement and Balance Sheet into a cash basis. Although the accrual style is helpful in analyzing
revenues and expenses, organizations also find it useful to have an understanding about the amount of
cash the organization has at its disposal.
XYZ Company
Statement of Cash Flows, 200X
Cash Flow from Operating Activities
Net Income………………………………………………………………$75,000
Adjustments:
Depreciation Expense… …………………$100,000
Changes in working capital accounts:
Decrease in accounts receivable……..…$20,000
Increase in Inventory……………………..$(40,000)*
Decrease in accounts payable…………..$(30,000)*
Increase in accrued wages………..…… $40,000
Change in working capital……………………..$(10,000)*
Total adjustments to net income……………................................$90,000
Note: Cash Flow statements can be prepared using two different methods, each of which determines the same, correct end-
ing balance of cash; the methods are the direct method and the indirect method. Differences in the two methods lie only in the
212
Basic Accounting and Finance
Operating Activities section. The description below uses the indirect method to prepare the Cash Flow statement.
The first section of the cash flow statement (Table 9.4) reports how much cash was generated by the
operating activities of the period; that is, from the day-to-day activities that bring cash in from customers
and pay cash out to employees and suppliers. To do this, we must first convert net income—the bottom
line of the net income statement—from an accrual basis to a cash basis. “Cash flow from operating activ-
ities” is the difference between operating cash inflows and operating cash outflows.
The second part of the cash flow statement reports cash flows from investing activities: acquisition
of new fixed assets and cash inflows from sale of existing assets. The acquisition amount may not be an
immediate net decrease in cash because the payment of cash may have been partially or completely offset
by borrowing an equal amount (loans). Nevertheless, whatever amount of cash was paid is recorded as a
cash outflow, and the amount of the borrowing is recorded separately as a financing activity.
Companies may obtain cash by issuing debt securities, such as bonds or stock. These are called
financing activities. Cash flows from financing activities include cash receipts or disbursements from
one or all of the following: the sale of stock by a corporation to provide paid-in capital, entering into a
long-term loan, repaying the loan, and distributing dividends or drawings. However, Interest payments on
borrowed funds are not treated as financial activities but as operating activities.
In the selection process, we usually start with the assumption that the first cost and the working cap-
ital (the funds needed to “set up shop” before cash flows in from sales) for a new venture are supplied by
equity financing, that is, by investors rather than creditors. If the results are favorable, we then examine a
mixture of equity and creditor financing or even consider leasing to conserve cash.
The three groups of activities that affect cash flow—operating, financing, and investing—are all
involved in the cash flow patterns to help analyze capital investment opportunities. The above discussion
shows the cash flow statement for a company.
Dates 200X
Revenues $334,000 Jan 1 - Dec 31
Interest expense $14,600 Jan 1 - Dec 31
Cost of sales (Cost of Goods Sold) $197,400 Jan 1 - Dec 31
Administrative Salary Expense $23,400 Jan 1 - Dec 31
Insurance Expense $12,300 Jan 1 - Dec 31
Depreciation Expense $27,700 Jan 1 - Dec 31
Dividends paid $3,200 Jan 1 - Dec 31
Interest income $6,500 Jan 1 - Dec 31
Selling and administrative expenses $58,000 Jan 1 - Dec 31
213
Engineering Management Handbook
Using previously given information, Table 14.11 is the Cash Flow from the Income Statement.
14.7 Depreciation
14.7.1 Introduction
Depreciation is a methodology used by organizations to distribute the cost of a capital asset over a long
period of time. For example, if a company invests in an expensive super computer, the company is
required by tax law in the U.S. to allocate the cost of that computer over a span of a few years, using the
depreciation technique. If the company did not do this, the year in which the company bought the super-
computer would probably result in financial statements that are significantly worse than the year before. It
is important to note that depreciation is considered a non-cash expense.
Depreciation is often a difficult subject to grasp for students. You may need to review this tutorial
two or more times before you fully grasp the concept, or you can review the textbook.
14.7.2 Depreciation
Depreciation is the expense associated with allocating the cost of a capital asset (except land) over its
useful life. Land, being appreciable, is not depreciated. All other capital assets that a company buys are
depreciated. The portion of the first cost of an asset that is consumed through use over a period of time is
called depreciation (depreciation expense).
214
Basic Accounting and Finance
Accumulated Depreciation
This account is used to show the cumulative sum of all depreciation expense for an asset from the date
on which the asset is acquired. The balance of this account increases over the life of the asset that is being
depreciated.
Book Value
It is the first cost of a depreciable asset, less its accumulated depreciation.
Depreciable Cost
Depreciable cost can be defined as:
Straight-Line Method
Straight Line Depreciation Per Year = First Cost - Salvage Value
Useful Life in Years
An equal amount of depreciation expense is assigned to each year of the asset’s useful life. The depre-
ciable cost is divided by the useful life in years to determine the annual depreciation expense.
SL Example: A computer is purchased for $2,200 on January 2001. The salvage value of the comput-
er is $200 and its useful life is four years.
Calculate, using Straight Line method,
• Depreciation expense
• Accumulated depreciation at end of each year
• Book value at the end of the year for each year of useful life of the asset
215
Engineering Management Handbook
Thus, Annual Depreciation Amount = Depreciation Rate X Depreciable Cost = (.25 X 2000) = $500 / yr
MACRS Example
Stevens acquired, for an installed cost of $40,000, a machine having a recovery period of five years. Using
the applicable MACRS rates, the depreciation expense each year is shown in Table 14.13.
216
Basic Accounting and Finance
Example: (Gains and Losses)—The car bought for $30,000 is sold for a cash payment of $20,000 at
the end of two years, at which time its book value is $18,000 ($30,000 less two years of accumulated de-
preciation at $6,000 per year). Its market value on the day of sales is therefore $2,000 more than its book
value. The tax rate is 40%.
FMV-BV = Taxable
Capital Gains: $20,000 – $18,000 = $2,000
Taxes: $2,000 * 0.4 = $800
After Tax Cash Flow: $20,000 - $800 = $19,200
This completes our overview of accounting. The concepts presented here can be understood by one
more example given later in the tutorial. We hope you have found this discipline a more conceptual and
stimulating subject than its image as “bookkeeping” usually conveys.
The tax code is very complicated for individuals and corporation in the United States. You probably,
at some point in your life, have filled a tax return with the Internal Revenue Service (IRS). Organizations
have an even more daunting task with more complicated rules.
Operating cash flows can be determined from the Income Statement. Note that an operating cash
flow is Net Income after Tax plus depreciation. Remember that depreciation is a non-cash (accrual) ex-
pense. Operating cash flows are periodic over a number of years.
Capital Cash Flows can be determined from the Balance Sheet. There are a number of activities that
impact the Capital Cash Flows. Change in inventory levels, financing activities and capital expenditure
are some of these activities. For engineering economics we are interested in investments for depreciable
(plant, equipment, etc.) and non-depreciable (land) capital. For capital projects we are also interested in
loans (to finance capital) and the after tax sale/disposal of capital at the end of the project.
In the following sections we will provide the calculations and format for
• Net Cash Flow from Operating Activity
• Net Cash Flow from Capital Activity
218
Basic Accounting and Finance
219
Engineering Management Handbook
The process begins with the journal or daily record of transactions. We know that every transaction
must be recorded in at least two accounts; otherwise, balance sheets would not balance. One of these ac-
counts is debited (entered on the left or “debit” side of the T-account), and the other is credited (entered
on the right of “credit” side of the T-account).
The words debit and credit refer to the left and right side of the T-account respectively for the purpos-
es below. Their abbreviations are dr. (debit) and cr. (credit). Each “simple” journal entry (a simple entry is
one that affects just two accounts) is therefore recorded as shown in Table 14.15.
Debit Credit
Note that accounting requires that the sum of all the debits pertaining to a transaction must equal the
sum of all the credit for those same transactions. Not shown, but part of the journal record of the transac-
tion, are the date, the amounts to be “posted” in the affected accounts and, if needed, a brief description
of the transaction.
Table 14.16 shows how assets, liabilities, and equity should be recorded.
Units sold * Selling Price per Unit = Fixed Costs + (Variable Cost per Unit * Units Sold) + Profits
220
Basic Accounting and Finance
Total Cost
Profit
Breakeven Sales
(In Units)
Variable Cost
Fixed Cost
Loss
Dollars
As you can see, the net income is zero at the breakeven point.
This equation can be rewritten in terms of the Contribution Margin if the equation is divided by
Sales on both sides.
Hence, Contribution
Margin Ratio = Fixed Costs + Profits
Sales
To calculate the breakeven sales, the profits are set at zero, and it gives us the following equation:
Selling Price per Unit * Units Sold = Fixed Costs + (Variable Cost per Unit*Units Sold) +
Target Net Profit
Units * (Selling price per unit - Variable Cost per Unit) = Fixed costs + Target Net Profit
Units * Unit Contribution Margin = Fixed Costs + Target Net Profit
Units to Earn Target Net Profit = (Fixed Costs + Target Net Profit) / Unit Contribution Margin
I. Basic Accounting—Fundamentals
A. Asset & Inventory: LIFO; FIFO
II. Basic Financial Accounting
A. Financial Ratios
B. Capital Structure of Firm
C. Stocks, Bonds and Financial Instruments
III. Advanced Cost Accounting—Fundamentals
G. Activity Based Costing (ABC)
H. Flexible & Master Budgets
I. Performance Assessments
J. Ethical Considerations—SoX
IV. Advanced Cost Estimation
A. Statistical Cost Estimation
B. Use of Cost Indices and Cost Factors
C. Design for Cost / Affordability / Target Costing
222
Basic Accounting and Finance
14.12 Summary
One chapter can hardly cover the basics of accounting and finance other than a cursory presentation of
the subject matter. Yet, few subjects are more important in modern business than the understanding of
the finances of a corporation or an individual project. Engineering managers must understand the financ-
es of a business to provide value.
14.13 References
The following are two standard references in this field. The following table maps the topics in this chapter
to these references.
Merino, Donald N., Accounting for Engineers, Engineering Management Body of Knowledge, American
Society of Engineering Management, vol 1.1, Nov. 2007.
Riggs, Henry E., Financial and Cost Analysis for Engineering and Technology Management, John Wiley
& Sons, Inc., 1994, ISBN: 0-471-57415-5; ISBN (13): 978-0471574156.
Easton, Peter, Halsey, Robert, McAnally, Mary, and Hartgraves, Al, Financial & Managerial Accounting for
MBAs, 1st edition, Cambridge Business Publishers, 2008, ISBN: 0-9787279-1-6.
223
224
Engineering Economics
15
Engineering Economics
Donald N. Merino
Stevens Institute of Technology
225
Engineering Management Handbook
Simple Interest
You earn interest only on the principle, which is the money that was initially invested. For example, if you
invested USD $1,000 (P) with 10% (i) simple interest for five years (N), you would earn USD 100, 10%
of USD 1,000, the first year, USD 100, 10% of USD 1,000, the second year, and so on for as long as
your money remained in the bank.
In five years, you will receive USD $500 as an interest and your USD $1,000 as the principal.
Therefore, your future bank balance from leaving your money at bank for 5 years will be USD $1,500
(F). As you can see the interest on your money is P x i for each period and the total interest amount is
P x i x N.
226
Engineering Economics
The equation for simple interest for any combination of F, P, i, and N is;
F = P (1 + i x N)
where F= Future Value; P = Present Value; I = interest rate; N = no. of years
Compound Interest
You earn interest on the principle, which is the money that was initially invested and on the interest that
you earn in previous periods. For example, if you invested USD $1,000 (P) with 10% (i) compound
interest, compounding yearly, for 5 years (N), your earnings on this USD $1,000 would be:
At the end of the year five, you will receive USD $610.51 as an interest and your USD $1,000 as the
principal. Therefore, your future bank balance from leaving you money at bank for 5 years will be USD
$1,610.51 (F). As you can see the total interest amount on your money is
P x ((1+ i)n- 1)
The equation for compound interest for any combination of F, P, i, and N is;
F = P (1 + i) ^ N
Principal (P)
Let us assume that the available fund to be invested is doubled to USD $2,000 from USD $1,000 for
both simple and compound interest examples above. Let us calculate the future balances (values) for both
methods.
Simple Interest: FNEW = $3,000
Compound Interest: FNEW = $3,221.20
We can easily notice that when we doubled the investment amount, the future balance, value, is dou-
bled for both methods. Note: USD $1,000 is the initial principle.
In simple interest, the total interest earned doubled from USD $500 (USD $1,500 -USD $1,000) to
USD $1,000 (USD $2,000 – USD $1,000) while the total interest earned increased more than double for
227
Engineering Management Handbook
compound interest from USD $610,51 (USD $1,610,51 - USD $1,000) to USD $1488 (USD $2,488 -
USD $1,000). Note: USD $1,000 is the initial principle.
In simple interest, the total interest doubled from USD $500 (USD $1,500 - USD $1,000) to USD
$1,000 (USD $2,000 – USD $1,000) while it increases more than double for compound interest from
USD $610,51 (USD $1,610,51 - USD $1,000) to USD $1,594 (USD $2,594 - USD $1,000). Note:
USD $1,000 is the initial principle.
Compounding Period
Compounding period is the length of the time period that elapses before interest compounds. Therefore,
at the end of each compounding period you receive interest. Because simple interest does not pay interest
on interest, the length of compounding period does not have any effect on calculations. Therefore, we will
analyze the effect of compounding for compound interest only.
We are about to invest USD $1,000 with 12% nominal interest rate, which is the periodic rate multi-
plied by the number of compounding periods per year. Moreover, we have four compounding options: (1)
yearly compounding, (2) semiannually compounding, (3) quarterly (every three months) compounding,
and (4) continuous compounding. The future balances and interest earned at the end of first and tenth
year are shown in Table 15.1.
Future Value of F
The shorter the compounding cycle the higher is its effect. The table above illustrates this phenomenon.
The interest rate is 12% annually, but in case A it is applied as simple interest, in cases B through E we
are shortening the compound cycle from one year to quarterly to monthly to continuously.
The last column shows the balance at the end of 10 years. As you can see the balance increases as the
cycle is shorten, but eventually levels off to $3320 by considering continuous compounding.
Our future balance at the end of first year is USD $1123.60 and USD $123.60 is our interest.
From the results, it is obvious that our future balance at the end of first year is USD $1125.51 and
USD $125.51 is our interest.
We have learnt about the definition and calculation steps of both simple and compound interest. We
know that formulas of simple and compound interest calculations include P, i, and N to determine future
value (balance). Let us compare those two interest techniques.
Payback is the length of time, usually expressed in years, needed to recover initial cost of a capital
investment. It can also be defined as the number of years it takes for the sum of the annual net cash flows
to equal zero.
For a capital project, yearly cash flows can be either equal or unequal. We can segregate payback peri-
od calculations into these two classes.
Nominal Rate: The nominal rate is the periodic rate scaled to an annual basis. If the rate is 1% per
month, then its nominal rate is 12% / year. In other words, what is the rate per year in terms of straight
extrapolation of rate of the year? To go from periodic rate to the nominal rate we must drive the rate by
the number of periods that happens within the span of a year.
Effective Rate: The effective rate is the equivalent of the periodic rate compounded for the number of
periods per year.
In the effective rate, of periodic rate is 1% per month, then at the end of the year we will get more
than 12%. The 1% monthly has been compounded 12 times. So the effective rate is (1+0.01)^12 – 1.
Table 15.2 illustrates the effect if compounding if the compounding cycles change. The nominal rate
is 10%. The periodic rate for semiannual, quarterly or daily is calculated by dividing the nominal rate by
the number if compounding in a year. The last column shows that the effective rate increases with shorter
compounding cycle and levels off at 10.52% by increasing the number of cycles to infinity.
229
Engineering Management Handbook
Note, that as the compounding period decreases (example from yearly to daily to continuously), the
effective rate increases.
Compounding
F = P (F/P, i, N)
- F = P (1 + i)^N
- money grows into the
future
P = F (P/F, i, N)
Discounting
- F = P (1 + i)^-N
- in today’s dollars
Shorthand Notation
For compounding we are looking for a future sum F. This is given by multiplying the current value P
by a factor that given P yields P at a given I and N... Hence, one can calculate the value of these factors
for any combinations of i’s and N’s. This has been done for the factors we normally use and values are
presented in a set of tables at the back of the Lang and Merino (1993).
The inverse of F/P is the discounting factor and is shown by P/F.
Knowing this notation, we can calculate a future sum, by multiplying the present worth by its factor
that we look up at the back of the text, for the given i and N.
The above list identifies almost all of the important cash flows except the “initial cost,” “working capi-
tal,” and the “imputed cash flows from benefits and disbenefits.”
The initial cost is the first cost of a project and includes both depreciable and non-depreciable assets.
It can be called by different names such as “investment cost,” “initial investment,” “capital investment”
and “capital expenditure.” Then come the “working capital,” which are the funds needed to operate a cap-
ital facility before revenue becomes available for covering expenses. Working capital is not a depreciable
item.
“Imputed cash flows” are the benefits and disbenefits produced by non-profit entities. For example,
in a highway project, if the new highway will reduce the travel expenses for the highway users, this is an
imputed cash flow for this project. Figure 15.2 illustrates how a cash flow diagram should be drawn.
S = Salvage
Value
1
2 3 4 5
To draw the cash flow diagram, you start from the current time, time 0. In this diagram we can see
that P is the first cost plus working capital, which is what the company invests in the project and is shown
downward (negative side). At the end of the first year we have to make an additional investment, F.
In the first year there is not enough revenue (or no revenue) to cover the cost. From the second year
we can see positive net cash flow each year and the amount increasing.
At the end of the project, there is also the salvage value of the plant and equipment from the initial
investment. Salvage value is an inflow, so it is shown as positive. This diagram typifies the cash flow for a
simple startup business. Note that salvage value can be negative or positive. Examples of negative salvage
value include cleaning up toxic water and nuclear power disbanding.
231
Engineering Management Handbook
0 1 2 3 4 5
The advantage of the model is the fixed payments, which help people with relatively fixed income
(like salary) to better plan and manage their budgets.
Up until the end of WWII, loans were mostly interest payment only. The result was that most people
could not accrue equity in their home. After WWII, with VA and FHA loans, the amortized loans (mort-
gages) became the norm—and with it equity for millions in their homes, firms, and businesses.
The three worths—present, annual and future—are directly linked through the rate of return factors
derived before. AW is FOM used in retirement or replacement problems. FW is FOM used for insurance,
pension, and bond analysis. Any worth can be converted to any other worth because of equivalence.
• Present Worth—most commonly used
• Annual Worth—used where annual comparisons are appropriate
• Future Worth—used in insurance, pensions, etc.
PW = A (P/A, i, N) + S (P/F, i, N) - P
where: PW = Present Worth; A = Uniform Series of Annuities, i = Interest Rate per period; N = Number
of periods; S = Salvage Value; P = Present Value.
S = $10,000
A = $40,000
0
1 5
i = 20%
$115,000
where: AW = Annual Worth; A = Uniform Series of Annuities, i = Interest Rate per period; N = Number of
periods; S = Salvage Value; P = Present Value; (A/F) = Sinking Fund Factor; (A/P) = Capital Recovery Factor.
• To Convert AW to PW: Multiply by P / A factor = A (P / A) = P
• To Convert AW to FW: Multiply by F / A factor = A (F / A) = F
FW = A (F/A, i, N) – P (F/P, i, N) + S
233
Engineering Management Handbook
where: FW = Future Worth; A = Uniform Series of Annuities; i = Interest Rate per period; N = Number
of periods; S = Salvage Value; P = Present Value; (F/A) = Compound Amount Factor for Equal Payment
Series; (F/P) = Compound Amount Factor for Single Payment.
CR = P (A/P, i, N) – S (A/F, i, N)
where: CR = Capital Recovery; P = First Cost; S = Salvage Value at the end of the time period.
Now, let us move on to the CR for an infinite horizon. In the case of an infinite time horizon, the
A/P factor equals i and the A/F factor equals zero.
This means that we do not consider salvage value in situations like this. So, in other words, for a project
with infinite time horizon, S = 0. Therefore, the formula for CR over an infinite time horizon is given by:
CR = Pi
0 1
A to infinity
MARR = i
P
Now, in a situation like this, where the planning horizon is infinity, the Capitalized Cost is given by:
CC = P + A/i
This is because, as N approaches infinity, A/P factor for any interest rate i, approaches i. P/A, which is the
inverse of A/P, approaches 1/i. Therefore, we get the formula of CC given above.
234
Engineering Economics
When calculating IRR, we set the PW equal to zero. Then using the provided information and the above
equation we solve for the IRR.
PW = A (P/A, i, N) – P + S (P/F, i, N)
Using a calculator, Goal Seek in Excel, interpretation it is easy to solve for the IRR thus producing i = 15.27%.
Present Worth and IRR are often used to determine the best course of action to follow. First, the Pres-
ent Worth is calculated using the MARR. If the present worth is positive, IRR is then determined to find
out what rate of return the cash flow estimates might produce.
The IRR methodology is also applied to incremental cash flow patterns to determine the return on
incremental investments due to lower expenses or higher revenues, or both. However, there are several
shortcomings when calculating IRR. The first shortcoming is “Multiple Solutions.” This occurs when the
cumulative cash flow crosses the x-axis and changes signs. In cases where additional capital is invested
after year 0, the added capital may cause multiple changes in signs and result in multiple solutions. The
second shortcoming is the ‘Reinvestment Fallacy.” Can the funds from a particular project be invested at
the IRR rate?
Introduction to BCA
The last figure of merit to be discussed in this course is the benefit cost ratio (BCR). For projects aiming
to improve the welfare of the public, BCR is often the preferred figure of merit. This is because it does not
solely focus on the financial return of a project, but measures if the benefits of a project outweigh its costs.
This is the figure of merit often used by government entities to justify their selection of projects from the
large pool of projects placed before them.
Cash Flows
A key difference between the BCR and other figures of merit is noted in the cash flows. Cash inflows in
relation to the benefit-cost analysis consist of the benefits to the public. Whereas cash outflows in relation
to the benefit-cost analysis consist of the costs to the government for providing those benefits.
235
Engineering Management Handbook
For example, let us consider the cash flows in relation to the Mississippi Levee; the cash inflows in this
case include the initial capital investment and periodic maintenance costs. The cash outflows include benefits
like flood control and recreation, besides protecting the economic well-being of cities like New Orleans.
Cash flows in relation to the benefit-cost analysis can also be further divided into the following five groups:
• Positive Benefits (B)
• Disbenefits (D)
• Initial Cost (I)
• Cash Costs (C)
• Cash Receipts (R)
As mentioned earlier a project is deemed worthwhile only if the benefits derived from it exceed the
costs of the project. The benefit cost ratio (BCR) can thus be expressed as either B – C or B/C.
BCR = (B – D) / (I + (C – R))
B/C = ( (B – D) – (C – R)) / I
where: B = Benefits derived from the project; D = Disbenefits derived from the project; I = Initial invest-
ment in the project; C = Operating and maintenance cost involved with the project; R= Revenue earned
from the project.
The key difference between the two formulas is in the treatment of the term (C – R). In the conven-
tional BCR formula the term (C – R) is part of the denominator, while in the modified BCR formula it
is in the numerator, leaving Initial cost as the sole term in the denominator. In the conventional formula,
all costs are taken as cash outflows while the net benefit is taken as the cash inflow. In the modified BCR
formula only the initial cost is taken as a cash outflow, while the net benefit minus the O&M costs is tak-
en as the cash inflow. It should be noted that while calculating BCR in either formula, one should ensure
that all cash flows are brought back to their present worths or annualized.
Conventional BCR
B/C = (B - D) / (I + (C – R))
= 2,000,000 / (1,000,000 + 500,000)
= 1.333
Modified BCR
B/C = ((B – D) – (C- R)) / I
= (2,000,000 – 500,000) / 1,000,000
= 1.500
236
Engineering Economics
237
Engineering Management Handbook
EUAC
Total Costs
O&M Costs
Capital Costs
N Time
Figure 15.6 shows the optimal economic life of a machine. The total cost reaches a minimum when the
Operating and Maintenance (O&M) costs equal the capital cost. The corresponding N value to this point is
the optimal economic life. This is point is also considered to be the best time to replace or retire the asset.
Step 1
The first thing is to calculate the salvage values and O&M costs for each year as shown in Table 15.3.
Rio
EOY Salvage Value O&M Costs
1 $8,000,000 $1,500,000
2 $6,400,000 $1,875,000
3 $6,120,000 $2,343,750
4 $4,096,000 $13,929,688
Initial Cost $40,000,000
238
Engineering Economics
Step 2
We calculate the capitalized cost for each year as shown in Table 15.4.
1 2 3 4 = 2x3 5 6 7 = 5 x6
EOY O&M (P/F,8%, j) PW of O&M Cum. PW (A/P,8%, j) O&M EUAC
1 $1,500,000 0.9259 $1,388,850 $1,388,850 1.0800 $1,499,958
2 $1,875,000 0.8573 $1,607,438 $2,996,288 0.5607 $1,680,018
3 $2,343,750 0.7938 $1,860,469 $4,856,756 0.3880 $1,884,421
4 $13,929,688 0.7350 $10,238,321 $15,095,077 0.3019 $4,557,204
The total EUAC is calculated by adding the capitalized recovery costs and the O&M costs. The optimal
economic life is determined by finding the year with the lowest EUAC figure. The asset in question should
be replaced after this point. Table 15.6 shows the calculation for total EUC for an O&M example.
From Table 15.6 it is seen that the lowest EUAC occurs at the end of year 3. Hence, the facility should
be replaced at the end of year 3.
239
Engineering Management Handbook
15.5 Inflation
Inflation can be defined as an increase in the general price level of goods and services. It can also be de-
fined as a decrease in the purchasing power of the dollar. Inflation is an important part of life and business
for both individual consumers and corporations.
The common method of measuring inflation is through the use of price indices. “Price indices for
measuring price level effects are dimensionless ratios that compare prices of a specified set or combination
of goods and services in a selected base period to the prices of the same or functionally equivalent set at
any other period.” Increasing price indices indicate inflation, while falling price indices indicate defla-
tion. These price indices are based on models constructed through surveys, definitions, examinations of
published prices, etc. The base year is assigned a cost of 100 and following years are measured against this
level. Thus, future years may have lower or higher price levels.
240
Engineering Economics
Thus, we can see that the i (MARR with inflation) is approximately equal to ieq (MARR) plus f (inflation).
On the other hand, that ieq (MARR without inflation) is approximately equal to i (MARR with infla-
tion) minus f (the inflation).
241
Engineering Management Handbook
Operating cash flows can be determined from the Income Statement. Note that an operating cash
flow is Net Income after Tax plus depreciation. Remember that depreciation is a non-cash (accrual) ex-
pense. Operating cash flows are periodic over a number of years.
Capital Cash Flows can be determined from the Balance Sheet. There are a number of activities that
impact the Capital Cash Flows. Change in inventory levels, financing activities and capital expenditure
are some of these activities. For engineering economics we are interested in investments for depreciable
(plant, equipment, etc.) and non-depreciable (land) capital. For capital projects we are also interested in
loans (to finance capital) and the after tax sale/disposal of capital at the end of the project.
In the following sections we will provide the calculations and format for:
• Net Cash Flow from Operating Activity
• Net Cash Flow from Capital Activity
As well as the After Tax Cash flows for:
• Depreciation
• Loans/borrowings
• Salvage/disposal of capital items
242
Engineering Economics
Note that the format is very similar to the income statement format in Chapter 3. The format in
Chapter 3 was expanded to include separate items for:
• Line: 4:- Depreciation
• Line: 6:- Interest Expenses from Loans
• Line: 9:- Investment Tax Credit
Depreciation was added back to the Net Income after Tax to yield the operating cash flow. Note that
the $ amounts in this format are for N years where N = Project Life.
Note that the format of Table 15.8 is similar to the Balance Sheet and Cash Flow Statement discussed
in Chapter 14 (Basic Accounting).
You will note that there are other items that will impact on balance sheet cash flows. For the selection
of Capital Projects these include:
• Principal Repayment of Loans used to purchase capital goods
• Depreciable and non depreciable capital
• Loans proceeds
243
Engineering Management Handbook
You should know the definition of these items and how they differ. Consult Chapter 14 (Basic Ac-
counting).
15.6.4 After Tax Cash Flow from Investment Tax Credit (ITC)
From time to time government/agencies (U.S., State, and sometime local) give incentive for business to
make capital Investments. This is usually during a recession or natural disaster (like Hurricane Katrina)
and is designed to increase capital spending.
Why Capital Spending? The concept is that for every dollar spent on capital goods, the Gross Na-
tional Product and Gross Domestic Product (GNP and GDP) will increase many folds (6 to 8 times). In
macroeconomics, this is called the “Multiplier Effect.”
The Investment Tax Credit (ITC) allows a company to subtract some part of the Capital purchase
price from the Income Tax it pays. For example, if the ITC is 10% and the company makes a $200,000
capital investment then the company can deduct $20,000 from its taxes (usually in year 0 or 1).
It is assumed that the company will keep the Capital asset in service for a certain number of years.
If it does not, it may have to give back some of the ITC. This is called re-capture. You need to seek Tax
Counsel on this matter because the rules are complex. ITC for solar panels or energy saving items like
Hybrids cars are examples that apply to consumers.
244
Engineering Economics
Annual
Beginning-of- Annual Annual End-of-Year
Year Principal
Year Balance Payment* Interest Balance
Repayment
(1) (2) (3) (4) (5) (6)
10% of (2) (3) - (4) (2) – (5)
01 $80,000 $25,240 $8,000 $17,240 $62,760
02 $62,760 $25,240 $6,276 $18,964 $43,796
03 $43,796 $25,240 $4,380 $20,860 $22,936
04 $22,936 $25,240 $2,294 $22,936 0
Total 80,000
As you are shown in Table 15.7 the interest is a periodic expense that reduces operating income before
taxes. From Table 15.4 notice that the principal repayment is a capital related item (return of capital). To
summarize:
• Table 15.9 Interest (Column 4) goes to Table 15.7 Line 6
• Table 15.9 Principal Repayment (Column 5) goes to Table 15.84 Line 13
Line 1: is truly the “bottom line” in all Economic Analyses. This is used for choosing among capital
projects, mergers and acquisitions, long-term corporate planning and in all sorts of financial decisions.
Because Engineering Economics is built on the Time Value of Money we use the Discounted Cash
Flow (DCF). This is line 20 and 21 (accumulated).
To calculate the DCF you need to use a MARR (Minimum Attractive Rate of Return) and apply this
to the project cash flows.
The cumulative DCF is the Net Present Value (NPV) for the project and is a widely used Figure of
Merit.
245
Engineering Management Handbook
This system qualifies a special two-year MACRS Depreciation (with factors 0.55 and 0.45). Assume
working capital is returned in year 2. Also assume that the company has income from other projects and
this system is sold at the end of year 2. ITC is $150 and being given at the end of year 0.
0
1 $1,200.00 $691.43 $120.00 $571.43 $628.57
2 $628.57 $691.43 $62.86 $628.57 $0.00
Total $182.86 $1,200.00
The second step is shown in Table 15.13 in which we find the depreciation expenses and accumulated
depreciation expenses (using the special MACRS rate) for this system.
246
Engineering Economics
Next we determine the after tax cash flows from salvage of depreciable and non-depreciable capital:
Depreciable:
Taxes = (FMV - BV) * TR
= ($900 – 0) * 40%
= $360
After tax cash flows FMV – salvage = $900 - $360
= $540
Non - depreciable:
Taxes = (FMV - BV) * TR
= ($750 - $500) * 40%
= $100
After tax cash flows FMV - salvage = $750 - $100
= $650
We then calculate the Net Cash Flow from operating income as shown in Table 15.14.
0 1 2 Total
1 Operating Revenue 0 9500 9500 19000
2 Cash Expenses 0 120 120 240
3 Operating Income 0 9380 9380 18760
4 Depreciation 0 1100 900 2000
5 Operating Income 0 8280 8480 16760
6 Interest Expense 0 120 62.86 182.86
7 Pretax Net Income 0 8160 8417.14 16577.14
8 Income taxes 0 3264 3366.86 6630.86
9 Investment Tax Credit 150 0 0 150
10 Net Income AT 150 4896 5050.29 10096.29
11 Depreciation 0 1100 900 2000
12 Net C.F. from Operations 150 5996 5950.29 12096.29
247
Engineering Management Handbook
248
Engineering Economics
4. Economic Analysis
- Establish Economic Critiera (MARR, FoM, Tax Rate, etc.)
- Use After Tax Analysis (ATA Model)
- Calculate Life Cycle Costs (EUAC)
6. Decision Analysis
A. Conduct Economic Analysis
B. Conduct Sensitivity Analysis & Determine Vital Few
C. Conduct Non-Economic Analysis
D. Combine A, B, C into Decision Model
Yes
8. Final Decision
Step 1 develops feasible alternatives that are mutually exclusive. In this case alternatives are various bus
fleet sizes. In addition to alternatives, scenarios can be constructed which could combine alternatives
along with other factors such as potential breakdowns or disaster scenarios.
Step 2 estimates the capital and operating costs. The appendix explains the estimates for the case under
consideration.
Step 3 is the most critical step because of the need to estimate the benefits. Benefits can be savings in operat-
ing cost compared to a base case. This could be caused by a more fuel-efficient design than the base case.
Step 4 is the economic analysis. The first part is to establish economic criteria like Minimum Attractive
Rate of Return or MARR. The MARR reflects the opportunity cost for the investor’s capital. Risk plays a
role because some investments may be more risky than others may.
The time horizon needs to be determined. The owners need to decide to use full equity (% of loans)
or some sort of financial leverage (10% to 90% of loans). Generally, most companies conduct the eco-
nomic analysis using full equity and then, after choosing the most economical alternative, look at financ-
249
Engineering Management Handbook
ing options. Because this is an after tax analysis an applicable tax rate needs to be estimated for the chosen
time horizon.
The last criteria are the Figure of Merit (FoMs). Given that the ATA model is run on an Excel spread-
sheet it is relatively easy to report on more than one FoM. FoMs include the Net Present Value (NPV)
and the Equivalent Uniform Annual Cost or EUAC. EUAC is Life Cycle Costs (LCC).
Step 5 involves evaluation of the intangibles and non-economic factors impacting the decision. There
are a number of multi-attribute tools that can be used. Analytical Hierarchy Process (AHP) and Utility
Analysis are two common techniques.
Step 6 involves the decision process. Sensitivity analysis should be employed to determine the most sensi-
tive attributes that impacts / influences the decision. This helps to separate the “vital few” from the “trivial
many.” It is an aid in decision-making because it focuses the effort on the most important variables. Next,
a decision needs to be made whether an economic or non-economic analysis is to be employed. If all the
attributes can be monetized and converted into dollars then the standard ATA with a FoM such as NPV
or EUAC can be used to either maximize benefits or minimize costs. However, if the downtime cannot be
monetized then some form of non-economic analysis must be employed. There are at least three different
process flows depending upon the downtime values and costs. This will be discussed in the next section.
Step 7 involves the decision whether the analysis yields an alternative that meets the economic and/or
not-economic criteria. If it does than a decision is made. If it does not, the process needs to be repeated
starting with step number 1. This process needs to continue until a mutually exclusive feasible solution is
reached.
Step 8 is the final decision. If all the economic and non-economic criteria are met then a decision can be
made to accept the alternative under review.
15.8 References
Newman, Donald, Eschenbach, Ted and Lavelle, Jerome, Engineering Economic Analysis, Oxford Univer-
sity Press, 2004, ISBN: 0195168070; Library Number: TA177.4 N48 2004.
Merino, Donald and Lang, Hans, The Selection Process for Capital Projects, John Wiley & Sons, Inc., 1993,
ISBN: 0471634255; Library Number: TA177.4.L42.
Eschenbach, Ted, Engineering Economy – Applying Theory to Practice, Oxford University Press, 2002,
ISBN: 0195161521; Library Number: TA177.4.E833 2003.
250
Project Management’s Role in Engineering Management
16
Project Management’s Role in
Engineering Management
Kenneth W. McDonald
United States Military Academy
251
Engineering Management Handbook
16.1 Introduction
Engineering management (EM) is a unique and specialized form of management that is focused on the
application of engineering principles to business practice. The EM discipline relates to management and
engineering by bridging the gap between the disciplines. As stated in Chapter 1, EM has undergone
tremendous adjustments to the discipline as trends in business and education have changed. This meta-
morphosis of EM is important to understanding how EM remains a very relevant and applicable disci-
pline in today’s world. As different areas of engineering have emerged, EM has adjusted to offer courses
in those disciplines and to produce quality EM engineers. As well, EM has ebbed and flowed with the
adjustments to the management career field. If one looks the EM profession, you will see a dynamic,
relevant and exciting field that embraces the changes associated with the professions of engineering and
management. It is through this open embrace of change that the EM profession maintains a tremendous
edge over other engineering disciplines. The EM professional becomes an expert in the field of engineer-
ing as well as management. In the engineering profession, the Accreditation Board for Engineering and
Technology (ABET) accredits EM programs and in doing so, EM majors can achieve the Professional
Engineering (PE) license and thus become recognized as an expert in the EM profession. Likewise, with
an EM degree, EM majors can also earn the Project Management Professional (PMP) certification, which
society recognizes those earning the PMP as experts in the field of project management. How is this pos-
sible? A degree in EM can produce experts in both fields of study (PE and PMP). What a tremendous
recognition of the value of the EM profession. This chapter focuses on the management aspect of the EM
profession. Specifically, project management.
When we look at project management’s (PM) role in EM, we need to understand where PM and EM
intersect in the real world. As stated before, EM is the bridging of disciplines of engineering and manage-
ment (Hicks, Utley, and Westbrook, 1999). In this context, the application of engineering principles to
an industrial challenge will in some way apply PM principles, tools and techniques. In industry, there are
constantly projects cropping up that fall in the realm of EM. Just from perspective of the realm of EM,
one can see that there is a natural tendency for engineer managers to run and participate in projects. From
developing improvements to production lines, bringing new technology online, etc., the engineer man-
ager will inevitably have to work in the realm of PM. Most everything becomes a project. It is what one
could consider a natural “tool set” that most engineer managers will need to master. In Figure 16.1, PM
encompasses the intersections of EM and engineering and management. It is in this realm that PM inte-
grates directly to EM. All engineer managers will run projects sooner or later throughout their careers.
Engineering
Engineering Management
Management
Project Management
again. A project has a definite beginning and end and therefore temporary; however, it is does not mean
it is necessarily short in duration. Many projects can last for years and keep the EM professional engaged
throughout. Properly moving a project to completion requires knowledge and experience in PM. By
definition, PM encompasses the knowledge, skills, tools and techniques applied to tasks so that project
objectives can be met (Kerzner, 2006). PM is a discipline that requires study and experience to master.
Entire academic programs and books are devoted to PM and the tools and techniques used to implement
proper PM. As a profession, PM is well-known through the Project Management Institute, Inc. (PMI).
PMI developed the Project Management Book of Knowledge (PMBOK®) as a repository for up-to-date
PM processes, tools and techniques as approved by the PM profession.
PM integrates the PM processes known as initiating, planning, executing, monitoring and con-
trolling, and closing. In Figure 16.2, these processes are laid out as they are encountered in the PM
process. There is more than one way to manage a project to successful completion, and one could argue
that PM is more of an art than a strict science. One enters into the PM process by starting a project. The
project charter and scope are delivered during this phase. It provides the launching point from which the
project begins. After the project is started, the project moves into the monitoring and controlling aspect
of PM. The monitoring and controlling aspect of PM is critical. Failure to properly monitor and control
a project leads directly to cost over runs for a number of reasons the biggest of which is improper PM.
The monitoring and controlling processes observe project execution so that any potential problems and
challenges to successful completion may be identified as early as possible. Once challenges/issues are iden-
tified, corrective action is taken to avoid schedule slippage, cost overruns, and other detrimental effects
imposed by deviations from the plan. Monitoring and controlling must be performed frequently enough
to allow the PM sufficient cognizance of the health of the project so that any corrective action required
may be taken prior to events having an adverse impact on the project’s cost, schedule, or performance
(Parnell, Driscoll, and Henderson, 2010). These processes required to track, review and regulate the prog-
ress and performance of the project and identify any areas in which changes to the plan are required and
initiated the applicable changes. Making up the monitoring and controlling processes include initiating,
planning, executing and closing. The initiation process requires those items for initiating the project are
those required to define a new project by obtaining authorization to start the project (PMI, 2013).
Monitoring &
Controlling Processes
Planning
Processes
Executing
Processes
The planning process is critical for ensuring the project is completed on time, on budget and on
schedule. Poor planning is the number one contributor of project failure. Planning defines scope, ob-
jectives and the course of action required to attain the project objectives. Following the planning process
253
Engineering Management Handbook
is the execution. Execution is the processes required to perform and complete the work defined in the
plan. Planning and executing are represented by arrows forming a circular pattern. This pattern rep-
resents the iterative process of these two areas. The circular pattern indicates that planning and executing
both impact the other and that the two should be updated continuously through the project and adjusted
accordingly (PMI, 2013).
Nearing the completion of the project, closing the project becomes of great importance. The closing
processes are those performed to finalize any activity not completed across all aspects of the project to for-
mally close the project. Projects can continue on for extended periods of time if this phase is overlooked.
It is quite important to ensure that close-out procedures are executed with vigor similar to the beginning
of the project. In some cases, the end of the project seems to be given a less than enthusiastic effort be-
cause the team is tired and ready to move on. Indeed, most team members will be released (depending on
the project team structure) prior to the end of the project so that workforce becomes an issue. Finally the
project enters the exit phase the project is completed (PMI, 2013).
Obviously, there is more than one way to manage a project and bring it to successful completion.
The key is understanding how to apply the proper PM techniques associated with the six PM processes to
ensure success. PM becomes more of an art than a science.
Hopefully, the results of these inputs will produce an effective project document that will lay the
foundation of a successful project. The project charter is a senior-level document that defines the scope
of project. It formally authorizes the project and gives the project manager authority to begin the project
and to employ company/firm resources toward the project. It includes, but is not limited to the following
(PMI, 2013; Meredith et al., 2015):
a. Purpose: A short and concise statement which includes the general goals of the project and their
relationship to the company/firm’s objectives.
b. Project objectives: More detailed statements of the goals, their priorities, defining success and how
the project is terminated.
c. Project overview: This is a higher level description of the project. A discussion of the management
and technical aspects of the project is included.
d. Project schedule: The project schedule is outlined to include major milestones and “phase gates.”
Major tasks are listed with associated time.
e. Project resources: Project budget is discussed in this section. There is detailing of capital and
expense requirements. All contractual items are listed in detail. The cost monitoring the control
procedures are addressed here as well.
f. Stakeholders: All key stakeholders are listed with appropriate insights and analysis accompanying
the list. The expected personnel requirements of the project are listed here as well. Additionally, any
special personnel requirements and training are addressed. Essentially, all unique requirements associ-
ated with personnel should be addressed.
g. Risk management plan: The risk management plan addresses mainly the high level risks that are
anticipated against the project. The risks are spelled out in detail so that they are clearly understood
to include the potential impacts to the project and company/firm. This section is quite critical and
requires tremendous effort. Although the effort is placed into this section, it cannot cover all poten-
tial catastrophes. However, if done correctly, the major anticipated risks can be identified and proper
mitigation measures taken to lessen their impact.
h. Evaluation methods: How a project performs is a matter of properly evaluating it against standards
and methods that are spelled out initially. The evaluation methods lay out a description of the proce-
dures used during the monitoring controlling of the project.
These are the basic elements of the project charter and constitute the foundation from which the proj-
ect management plan is developed. It should at a minimum set the high-level boundaries of the project.
The size and detail of the project charter depends on the size and complexity of the project.
The first step in the planning process is analyzing the preliminary project charter and project management
processes in order to develop a project management plan. The project management plan uses all the nec-
essary subordinate plans and integrates them into a cohesive effort directed toward achieving the project
goals. The project management plan encompasses the activities needed to identify, define, combine,
unify and coordinate the various processes to successfully accomplish the project. The subordinate plans
include, but are not limited to, (Kerzner, 2006; PMI, 2013; Meredith et al., 2015; Parnell et al., 2010):
• Scope management plan
• Requirements management plan
• Schedule management plan
• Cost management plan
• Quality management plan
• Process improvement plan
• Human resource management plan
• Communication management plan
• Risk management plan
• Procurement management plan
• Stakeholder management plan
These subordinate plans include project management techniques that allow the specific plans to be
implemented, monitored and controlled. For example, the project schedule management plan is used to
ensure that the project schedule is followed and maintained to ensure the project time and performance
objectives are achieved. The schedule management plan is a major input to the planning schedule man-
agement, defining activities, estimation of activity resources and durations and schedule development.
These plans become integral pieces to an overall complex planning process and require special attention
in order to achieve overall project success. For the purposes of this chapter, the specific management
plans listed will not be detailed. Suffice it to say, the project management plan takes tremendous effort to
pull off correctly; however, it is effort well spent if there are minimal instances of “changes” to the project
further into the project schedule. Changes that occur further into the schedule can have a tremendous
impact the overall cost of a project (PMI, 2013).
There are a number of project management methods and techniques that assist in developing the
project management plan. Understanding and mastery of these techniques are critical to the success of
the project manager and the project. Table 16.1 lists a number of the project management techniques.
For example, the work breakdown structure (WBS) is an effective technique to assist in the project scop-
ing process. The WBS is prepared to help determine the tasks required to complete a specific project.
The WBS is not limited to one particular format or structure. What is important is the process of break-
ing down larger tasks into smaller tasks. This becomes a hierarchical process – starting with an overall
project objective followed by successive smaller tasks until all tasks are identified. A WBS can appear as
a tree diagram (Figure 16.3) with level one tasks directly below the overall project objective followed by
level two tasks. In the case of a university cafeteria improvement project example, Figure 16.3 illustrates a
simplistic WBS (Meredith et al., 2015).
256
Project Management’s Role in Engineering Management
University Cafeteria
Operations
Inprovement
Project
Defrost
Food
Prep Food
Cook Food
The overall objective of this project is to increase the efficiency of the university cafeteria operations.
Under the level one task #2—food preparation—the three listed subtasks include defrost food, prepare
food and cook food. This logical breakdown allows planners working the project scope management
plan to accurately identify the requirements associated with every task supporting the objective of im-
proving cafeteria operations. Although this example may seem simplistic, the WBS is a highly effective
tool in supporting the project scope management plan. Other effective tools and techniques identified
during the planning process to include, but are not limited to, those identified in Table 16.1 (PMI, 2013;
Kerzner, 2006; Meredith et al., 2015; van Gigch, 1991; Forsberg, Mooz and Cotterman, 2000; Smith and
Reinertsen, 1998; Parnell et al., 2010).
Following work with the WBS the linear responsibility chart (LRC) is used in conjunction with
the WBS. When larger tasks are broken down to the basic tasks, a LRC can take those tasks and assign
proper personnel responsibility. The LRC shows the critical interfaces between tasks and individuals
and highlights areas that require special management attention (Meredith et al., 2015). Such a chart is
illustrated in Figure 16.4, which takes the cafeteria WBS in Figure 16.3 and assigns a number of tasks to
different individuals and teams. Note: a number of implied tasks are not listed on the WBS and include
project plan and budget.
257
Engineering Management Handbook
Engineering Manager
Operations Manager
Resource Manager
Logistics Manager
Program Manager
Engineering Team
Operations Team
Project Manager
Resource Team
Planning Team
Logistics Team
Budget Team
Lead Planner
Programs
Establish Project Plan 5 6 2,4 1,2 1 3 4 3 4 3 4 3 4 3 4
Establish Project Budget 5 6 2,4 4 4 3 4 3 4 3 4 1,2 3 3 4
Plan Efficient Cafeteria Layout 5 6 1,2 3 4 1,2 1 3 4 3 4 3 4 3 4
• Identify Planning Factors 5 6 6,2 3 3 4 3 4 3 4 3 4 3 4
• Determine Cost Factors 6 6 3 3 3 3 3 3 3 3 1,2 3 3 3
Plan Food Distribution Layout 6 6,2 3 4 1,2 3 3 3 4 4 4 4 3 3
Plan Resource Requirements 5 6,2 3 3 4 4 3 3 3 4 4 4 1,2 3
• Identify Material Requirements 5 6 3 4 4 4 3 3 3 4 4 4 1,2 3
• Identify Inventory Requirements 5 6 3 4 4 4 3 3 3 4 4 4 1,2 3
Acquire Kitchen Equipment 6 6,2 3 4 3 3 3 3 1,2 3
Plan Personnel Training 5 6,2 3 4 3 3 3 3 3 4 1,2 3
The associated generic managers and teams are included to demonstrate the complexity of the overall
organization and the interfaces between departments. As you move from left to right in the chart, you
will notice relationships with particular individuals and teams. The project management plan is import-
ant because it is the foundation for executing the project. Indeed, formal approval is most likely to occur
all the way through the chain of command from the project manager, through the program manager, to
senior vice president for programs. The LRC illustrates the relationships between the lead planner, his or
her team and the other departments. For planning purposes, it is important to consult each department
because they have valuable information that the planner uses. At a minimum, the lead planner needs to
consult with each department manager. As would be expected, a 3 is used to identify a mandatory con-
sultation requirement on the part of the lead planner. You can argue that the lead planner has a mandato-
ry requirement to consult with the team as well but may not be how the organization is set up. In
this case, it is assumed that the department managers are the “gatekeepers” to their departments and
that the lead planner needs to consult with them versus going directly to the department team (Parnell
et al., 2010).
Solid work must be part of planning process to ensure success of the project. Many projects fail,
regardless of size, when left to planners or individuals who have limited practical experience. Therefore,
experienced project managers must be part of the planning team for the plan to be a success. Their expert
advice brings a level of practical experience that equates to time and money savings when the final project
management plan moves to execution. As Figure 16.2 illustrates, the planning process is an iterative
process that includes the executing and monitoring and controlling processes. As execution begins, there
are inevitable changes (information updates, challenges with resource allocation, scheduling delays, value
engineering ...), which are identified in either the executing or monitoring and controlling processes.
Once identified, the change/information is fed back into the planning phase to allow for project manage-
ment plan updating. No one can predict the changes that occur and therefore the close integration of the
258
Project Management’s Role in Engineering Management
planning, execution and monitoring and controlling processes is essential for success. The project man-
ager must constantly seek this type of feedback in order to adjust the plan and execute accordingly. The
only certainty is change so the project manager must be ready to adjust (Parnell, 2010).
It is in the best interest of the project manager and the company/firm to ensure information that
affects the project management plan be updated as quickly as possible to ensure appropriate corrective/
improvement action is implemented in a timely manner. Most deliverables take the form of tangible
items such as a road, building, etc., but intangible deliverables such as training, information, etc. are also
provided. The executing process is complex and requires integration of many areas (PMI, 2015).
One of the first steps to proper monitoring is identifying those essential elements requiring control.
The first item for consideration for a project manager is control of performance, time and cost. The proj-
ect manager must establish clear boundaries for control and identify the level of importance for each cat-
egory. It is safe to say that the boundaries and level of importance are not the same for each project and
are driven by the project’s overall project charter (Meredith et al., 2015; Fisk et al., 2004; Palmer, 2006).
Continuous monitoring in each of the subordinate plans allows the PM team to keep current with the
changing dynamics of the project and to register the project’s health through the prism of performance,
time and cost.
In Figure 16.5, the three main project concerns are scope, time and cost. A project manager is always
concerned with these three and they are referred to as the golden triangle. Figure 16.5 demonstrates
how continuous monitoring of a project motivates confidence for a project manager that the project is
on-track or that it requires action to restore it to the proper status. Figure 16.5 is a three-dimensional
“snapshot” of the project status at a specific time and compares the cost and required results. The project
manager can see where the actual project is in relation to the “performance target.” For example, if the
actual results right of the performance target, the project manager can see that for the given performance,
the cost is too high, which means that the project is exceeding the budgeted amount for a given value.
Therefore, corrective action by the project manager is required.
The actions of the project manager are varied depending on his/her level of authority. The project
manager can either, increase resources (money, equipment or personnel) or shorten the time. An exam-
ple of shortening time is called “crashing the schedule.” Crashing the schedule is a technique used in the
critical path method to bring a project back on schedule if a particular task is going over the scheduled
time allowed. This technique requires placing resources against the task in order to reduce its duration.
The obvious outcome of using this technique is increasing the cost of the project. The project manager
and the team understands the importance of these monitoring and controlling techniques and will ensure
analysis of the results provide an accurate picture of the project’s status (Parnell et al., 2010).
There is also earned value (EV), which is also a method for monitoring a project. EV analysis is a
commonly used method for measuring the overall performance of a project (PMI, 2013, Meredith et al.,
2015, Parnell et al., 2010). It is a comparative analysis of the projected budget, actual costs and the work
accomplished (value). Figure 16.6 illustrates an EV graph representing the facility layout portion of the
university cafeteria facility renovation in Figure 16.3. In this example the EV is lagging behind the bud-
geted amount and the actual expenditures. The project manager will conclude that the project is behind
schedule. The project cost to-date exceeds the value accumulated for the work performed.
260
Project Management’s Role in Engineering Management
The chart also tells another story beyond a summary of goals being achieved or not. The contractor is
surging as indicated by the stair stepping pattern of the EV line. This pattern normally indicates chal-
lenges with the contractor. At the 25 February date, the contractor is stagnant (EV does not increase) as
expected with most project start dates. The project manager responds with an increase in actual budget
expenditure. Cash flow is extremely important for the contractor as well as the project manager. Both
have expectations (project manager—value for the money expected and the contractor—money necessary
to create value) and these expectations must be balanced by both parties. Even though the EV is below
what the project manager would want, there are situations where paying the contractor ahead of the EV
is the best course-of-action for project success. This occurs most often when a good working relationship
is established between the project manager and contractor. In this case, continuing to work with the
contractor to keep progress going instead of, for example, dismissing him from the project and pursuing
litigation is probably the best course of action for the PM in this case. The data past the 11 March date
shows that the contractor responded with an upsurge in the EV. However, on 25 March, the contractor
slows down again and EV begins to plateau. In this instance, the PM reacted differently and lowers the
payment to the contractor in order to get him to respond. Of note is near the end of the project, there
is great gain in EV for the overall project. This is a very typical pattern for a renovation project. Engi-
neers have a tendency to estimate a concave shape over the project, indicating optimism in terms of how
quickly value (functionality, performance) can be developed. In reality, the EV curve assumes a convex
shape because of rework imposed by test failures, delayed schedules and response surges in activity, and
cost-conserving measures put in-place to mitigate the threat of running out of budget before the expected
(or required) value has been delivered. Although it is not what a project manager would like to see, this
is not uncommon for a project that was behind schedule as depicted in this example (Parnell et al., 2010;
Meredith et al., 2015).
The monitoring and controlling process uses (PMI, 2013):
a. Expert judgment: Use of the judgment of the project manager and the PM team. They interpret the
information provided and develop appropriate actions.
b. Analytical techniques: These techniques help forecast budget and value outcomes. These include but
are not limited to:
• Regression analysis
• Grouping methods
261
Engineering Management Handbook
• Causal analysis
• Root cause analysis
• Forecasting methods
• Failure mode and effect analysis
• Fault tree analysis
• Decision tree analysis
• Reserve analysis
• Trend analysis
• Earned value management
• Variance analysis
c. Project management information system: This is part of enterprise environmental factors and encom-
passes a host of information systems and are limited only by the company/firms commitment to these
systems.
d. Meetings: Meetings are critical if done efficiently and effectively. Effort must be placed into proper
meeting management. If not done correctly time and resources are wasted.
The outputs from the monitoring and controlling process establish guidance for change to the proj-
ect. A number of products are produced from the tools and techniques mentioned earlier. These include,
but are not limited to, (PMI, 2013):
e. Change requests: Change requests are the result of the comparison of planned results and actual
results. Change requests can impact project scope (expand, adjust, and/or reduce). Impact from
change requests must be followed through by the project manager and PM team. Attention to the
secondary and tertiary effects of any change cannot be understated. Therefore, it is understood that
policies and procedures should be developed by the company/firm. Several changes can occur and
listed below are a few more common ones (PMI, 2013).
• Corrective action
• Preventive action
• Defect repair
f. Work performance reports: Work performance reports are essentially documentation of actual work
performed. It is important that a physical or electronic copy of the work performed be cataloged and
stored for the duration of the project. Although not mentioned earlier, document control is critical
here. In most companies/firms, document control is a full-time job, requiring a certain skill level.
g. Project management plan updates: These updates are focused on all the project management plans
used to keep the project tracking on time, on budget and at performance. Each of these management
plans are listed (PMI, 2013):
• Scope management plan
• Requirements management plan
• Schedule management plan
• Cost management plan
• Quality management plan
• Scope baseline
• Schedule baseline
• Cost baseline
h. Project documents update: This is the process of updating all project documents required to manage
the project. These documents include, but are not limited to (PMI, 2013):
• Schedules
• Cost forecasts
• Work performance reports
• Field changes
• Challenge logs
262
Project Management’s Role in Engineering Management
One important process is ensuring proper contractor documentation completion. Near the end
of most projects, the daily progress reports will tend to get overlooked in the last few weeks, especially
if a contractor is near 100% paid. If a project manager fails to hold the contractor to full compliance
for contractual requirements such as progress reporting, the project manager is liable. It is imperative
that the PM team ensures all aspects of close out procedures are adhered too and followed (Parnell
et al., 2010).
16.3 Summary
Engineering management is a tremendously relevant and important discipline. It bridges the gap between
management and engineering. This bridge is supported by a number of difference disciplines. Of most
import is PM. PM as it relates to EM is nestled in an arching way to assist the EM professional in being
able to manage projects. Many of those skills found in EM are found in PM. Proper PM consists of
initiating, planning, executing, monitoring and control and closing processes.
The initiating processes are those processes that define the project and gain authorization to start. It
is not limited to starting new projects but it includes a new phase of an existing project, which is separate
and distinct. For in phase changes, the project is normally very large or complex. The initiating process
may be performed at different levels (project, organizational, program, or portfolio). Likewise, the initiat-
ing process can take on different approaches depending on the company/firm. A major deliverable coming
out of the initiating processes is the project charter. Several inputs occur during this initial process phase,
which include expert judgment, statement of work, business case, agreements, enterprise environmental
factors and organizational process assets.
The planning process is critical to setting the conditions for overall success of the project. Poor
planning makes achieving project schedule, cost and performance objectives almost impossible. In in the
project planning process, the project management plan is the deliverable. The project management plan
allows for project scope and objectives to be clearly defined and established. There are several techniques
and approaches to assist in this planning effort. The major inputs that assist in developing the project
263
Engineering Management Handbook
management plan include the project charter, outputs from other processes, enterprise environmental
factors and organizational process assets.
The executing processes consist of those processes that are executed to complete the scope of work
identified in the project management plan. Very concisely, the executing process involves tremendous
coordination of personnel and resources, stakeholder expectation management, and executing all directed
and implied tasks associated with the project management plan. It is complete project integration man-
agement. The executing processes integrates the management areas of quality assurance, human resources,
communications, procurement and stakeholder. The executing process requires the PM team to perform
a myriad of actions to execute the project management plan. These requirements include but are not lim-
ited to direct and manage project work, perform quality assurance, acquire project team, develop project
team, manage project team, manage communications and conduct procurements.
The monitoring and controlling processes consists of those processes whose function is to track
and manage the progress and performance of the project. The monitoring and controlling process is an
iterative process that ebbs and flows accordingly. It is through these processes that adjustments are made
throughout the project in response to heartbeat of the project. The monitoring and controlling never
stops but continues to progress and adjust accordingly. The fundamental purpose of the monitoring and
controlling process is to monitor the other processes so that effective control measures be directed to keep
the project performing to expected performance expectations, on time, and below cost. The monitoring
and controlling process uses expert judgment, analytical techniques, project management information
system and meetings.
The closing process is the most difficult of the process groups for a number of reasons. A good proj-
ect manager will ensure that closeout procedures are closely adhered to so that the project can be properly
turned over to the client and that anything required legally is completed correctly. The closing process
involves all the necessary administrative and contractual closing procedures to ensure proper project close-
out. The closing process requires formal acceptance by the customer, post-project review, record impacts,
document all lessons learned, apply appropriate updates, archive all relevant documentation, close out
procurement activities and termination of all applicable agreements, perform team members’ assessments
and release project resources.
16.4 References
Forsberg, K., Mooz, H., and Cotterman, H., Visualizing Project Management. 2nd Ed. New York: John
Wiley & Sons, Inc., 2000.
Hicks, P., Utely, D., and Westbrook, J., “What are we teaching our engineering managers?” Engineering
Management Journal, vol. 11, no. 1, March 1999, pp. 29-34.
Kerzner, H., Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 9th ed.,
Hoboken, NJ: John Wiley & Sons, Inc., 2006.
Palmer, D., Maintenance Planning and Scheduling Handbook. 2nd ed. New York: McGraw-Hill, 2006.
Parnell, G., Driscoll, P., and Henderson, D., Decision Making in Systems Engineering and Management.
2nd Ed., New York: John Wiley and Sons, 2010.
PMI, A Guide to the Project Management Body of Knowledge (PMBOK Guide), 5th ed., Newtown Square,
PA: Project Management Institute, Inc., 2013.
Smith, P. G. and Reinertsen, D. G., Developing Products in Half the Time. 2nd ed. New York: John Wiley
& Sons, Inc., 1998.
van Gigch, J. P., System Design Modeling and Metamodeling. New York: Plenum Press, 1991.
264
Systems Engineering
17
Systems Engineering
Robert Cloutier
Stevens Institute of Technology
Mary Bone
Stevens Institute of Technology
265
Engineering Management Handbook
17.1 Introduction
17.1.1 What is Systems Engineering?
Although the discipline called systems engineering (SE) may seem self-descriptive, the concept is de-
ceptively difficult to define. One must begin with an understanding of what constitutes a system. The
International Council on Systems Engineering (INCOSE), which is the largest professional organization
dedicated to the practice and advancement of SE, defines a system as “a combination of interacting ele-
ments organized to achieve one or more stated purposes” (INCOSE, 2011).
Possibly a more descriptive definition was provided by Rechtin (1991) who said a system is “a set of differ-
ent elements so connected or related as to perform a unique function not performable by the elements alone.”
Rechtin went on to explain that one could disassemble an automobile (which can be defined as a
system that has the function of transportation) and spread the parts out on the ground. While all the parts
are there, no single part is able to transport a person from one place to another. It takes the assemblage of
those parts, in a specific manner, for the system to be able to provide the unique function of transporta-
tion not found in any individual part, nor in a partial collection of the parts—it takes the whole set.
Therefore, if a system is a collection of parts, which when assembled in a specific manner, are able to
perform a purpose, then SE must be the practice of designing such a system. However, going back to our
automobile, many different engineering disciplines are required for that design to be accomplished. Ex-
pertise in internal combustion engines is required, as is in automobile body design, human controls, and
even electrical wiring. Knowledge from all of these domains (and many others) is necessary to design this
system called an automobile. INCOSE (2004) defined SE as “an interdisciplinary approach and means to
enable the realization of successful systems.” However, this definition was been expanded by INCOSE in
Version 3.2.2 of their handbook (INCOSE, 2011):
Systems Engineering is an interdisciplinary approach and means to enable the realization of
successful systems. It focuses on defining customer needs and required functionality early in the
development cycle, documenting requirements, and then proceeding with design synthesis and
system validation while considering the complete problem. Systems Engineering considers both the
business and the technical needs of all customers with the goal of providing a quality product that
meets the user needs.
It becomes clear from this definition that SE is an approach to creating a system that will satisfy
the desired functionality goals of the system. The approach includes defining the system, designing the
system, and validating the system—ensuring the right system was built. SE is a collection of tasks that are
necessary to provide a quality system to a customer.
Figure 17.1 represents a mind map of key SE concepts. The major branches are perspectives, manage-
ment, technical and focus. The branches flowing out of those key concepts further describe those con-
cepts. These key concepts will be further discussed throughout this chapter.
Figure 17.1. Mind Map of SE Key Concepts (Cloutier, Baldwin, and Bone, 2015)
266
Systems Engineering
Stevens Institute of Technology has put forth the following definition for SE:
Systems engineering is the translation of a need/deficiency into a system architecture through
the iterative process of functional analysis, allocation, implementation, optimization, test, and
evaluation. It incorporates all technical parameters to assure compatibility between physical and
functional interfaces, hardware and software interfaces, in a manner that optimizes system defini-
tion and design; and the integration of performance, manufacturing, reliability, maintainability,
supportability, global flexibility, scaleability, upgradeability and other specialties into the overall
engineering effort.
In this chapter we will also look at the steps necessary to provide such a quality system, and what
processes are involved when someone performs SE. But first, let us look into the history of SE to better
understand how the discipline has arrived at where it is today.
SE began to emerge in a number of companies in the late 1940s and early 1950s that were attempting
to solve complex problems. AT&T Bell Labs needed an approach to provide in transmission designs, as
well as a way to provide consistent communications with Western Electric; JPL was developing the U.S.
Army Corporal sounding rocket in 1945 as shown in Figure 17.2 and found they lacked any consistency
in the engineering processes, and that the rocket was very unreliable. Both efforts needed a process to
transition new ideas from research concepts into engineering designs.
Later, NASA was in need of an approach to meet President Kennedy’s challenge – take a man to the
moon and back by the end of the decade.
The common denominator in each of these needs was an interdisciplinary approach to integrate com-
plex ideas and concepts into a system that would allow a complex idea to become a reality.
Arthur Hall wrote an early textbook detailing the practice of SE at that time. Figure 17.3 is the cover
of Hall’s book published in 1962 . He noted in the Preface that “the growing recognition of the need for
SE over the past decade has been attended by the need for philosophical foundations.” He stated that his
267
Engineering Management Handbook
book was intended “to increase awareness and understanding of SE as a process, and to sharpen defini-
tions and approaches to the main recurring problems of the process-problem definition, goal setting,
systems synthesis, systems analysis and choice among alternative systems.”
ISO/IEC 15288
Utilization Stage
Concept Stage Development Production Retirement
Stage Stage Stage
Support Stage
Typical
Decision New Initiative Concept Development Production Operations Deactivation
Gates Approval Approval Approval Approval Approval Approval
Although each of the lifecycles accomplishes the same work, the order or naming conventions used may
differ. In Figure 17.4, one of the lifecycles is that documented by ISO/IEC 15288 Systems Engineering—
System Life Cycle Processes (ISO/IEC 15288, 2015). The remainder of this chapter will use that lifecycle to
discuss SE. There are a number of supporting processes that also occur, and are shown in Figure 17.5.
Figure 17.5. ISO/IEC 15288 SE Processes – Gray indicates changes in 2015 revision
SE is concerned with all aspects of the systems lifecycle, and must consider each part of the lifecycle
during the design and development of a new system. As can be seen by studying Figure 17.5, many of
these processes are very specialized, and can take some time to master. This is an important aspect of SE.
Although a systems engineer must be aware of, and knowledgeable about each process, on large and/or
complex projects, the execution of each process may be conducted by a systems engineer that has become
an expert in that particular process.
The purpose of this chapter is not to explore each process, but to introduce the reader to the more
significant processes and let the reader explore the remaining processes by reading ISO/IEC 15288. This
chapter will further explore the following phases that can be mapped to 15288:
• Stakeholder Requirements Definition
• Requirements Analysis
269
Engineering Management Handbook
• Architecture Design
• Implementation
• Integration
• Verification
• Transition
• Validation
• Operation and Maintenance
• Disposal
The driver will be able to listen to the radio while driving the car.
270
Systems Engineering
HybridSUV
«extend»
«include»
Steer
«include»
Brake
Park «include»
INPUTS OUTPUTS
Electromagnetic
Surge voltages Voltage, current,
Electrical Nominal voltage interference,
and timing frequency, stability
electrical shock
Temperature
Normal Particle density, air
Environmental and humidity Heat, effluents
temperature range flow
extremes
17.2.4 Conclusions
The key during this phase is to listen to the customers, and gather as many requirements as you can. Try
to understand what the customer is asking for, and what they are not saying—capture everything possible
using dedicated note takers, audio, video—anything that will help recall the conversations. It is also im-
portant to understand that mistakes, including poorly communicated or wrong information, at this phase
can lead to expensive and time consuming fixes later. This is best demonstrated by the diagram shown in
Figure 17.7. It shows that the cost to extract defects goes up exponentially the later in the program they
are discovered.
272
Systems Engineering
It is also likely that during the interviews and discussions with the stakeholders, conflicting require-
ments were discovered—one stakeholder wants it to be ecologically responsible, and the other wants it
to have very high horsepower. The systems engineer will work to resolve or balance these two apparently
conflicting requirements. It is important that the systems engineer create a requirements traceability ma-
trix to track the source of each requirement and how each requirement will be verified to ensure it is satis-
fied. This becomes important as the system evolves—sometimes requirements must be modified, or even
deleted. One must know the source of the requirement to gain approval/concurrence with the change or
deletion. Table 17.2 contains a requirements traceability matrix that is used to track requirements.
Once the requirements are captured, documented, and understood, they must be translated into
system objectives and specifications to guide the engineering process moving forward. A common tool for
this is Quality Function Deployment or QFD for short. QFD is a design practice used to facilitate trans-
lation of stakeholder characteristics into system objectives and specifications at each stage of the system
design and development process. According to an Industry Week (1993) survey, organizations applying
QFD for the identification and analysis of product requirements realized:
• 30% to 50% reduction in engineering charges;
• 30% to 50% reduction in design cycle time;
• 20% to 60% reduction in start-up costs; and
• 30% to 50% reduction in time to market.
Later in the article, they cited Du Pont’s Beech Street Engineering Center Group, Wilmington, DE
reporting a 75% reduction in product design cycle time after making QFD an integral part of a newly
revamped design structure. Another success story was Ford Motor Company that adopted it in 1984,
and by 1988 it was being implemented on 50 different applications. It is beyond the scope of this chap-
ter, however, see Guinta and Praizler (1993) and King (1989), which are two excellent references on this
subject.
The totality of all the gathered requirements—whether they come from the stakeholders, are derived
as the system is understood, or come from a government agency or standard—are then compiled into
the system specification. This system specification should represent all the capability and limitations of the
system of interest, and will be the governing document for the rest of the design by which all work is
measured by asking—is this needed to satisfy the system of interest.
273
Engineering Management Handbook
To summarize this, a system architecture defines the major parts of a system, and how those parts will
interact with each other to satisfy the overall system requirements as defined by the stakeholders. For large
systems, this work is normally performed by an experience system architect. Architects normally produce a
number of products to document the architecture. A number of frameworks exist that provide guidance on
what architecture products should be produced. Some of the better known architecture frameworks include:
• ZEAF—Zachman Enterprise Architecture Framework
• DoDAF—Department of Defense Architecture Framework (US)
• MoDAF—Military of Defense Architecture Framework (UK)
• FEAF—Federal Enterprise Architecture Framework
None of the frameworks provide an architecting methodology; however, the DoDAF does provide
some high level architecting guidance. Figure 17.8 represents that guidance, and is provided as one ap-
proach to a methodology.
During this phase, the system requirements are allocated to each of the major parts of the system of
interest, to be assigned to domain engineers to perform final design and fabrication.
Finally, in the world of reuse, agility and service based architecture, the architecture design process
must result in an architecture that can be changed, updated, extended, and be resilient to threats of any
kind such as threats from competing products, economic threat, or even hostile threat.
17.5 Implementation
This phase is where the system of interest and its constituent parts are designed and built. As mentioned
in the previous phase, once the architecture is specified and the system requirements are allocated in
the architecture design phase, domain engineers gather up the allocated requirements and are treated as
system requirements for the specific major part of the system being addressed. Thinking of this iteratively,
the specific major part of the system being addressed becomes the system of interest, and on to the lowest
level components.
While the domain engineers in this phase will certainly be systems engineers for larger systems, they
will also involve software engineers, electrical engineers, mechanical engineers, and etc. Also brought into
this phase will be specialty engineers in the fields such as reliability, maintainability, human factors, etc.
to help ensure the system of interest not only meets the stakeholders requirements, but also ensures that
the system can be produced in the most cost effective manner. These teams that are made up of multi-
disciplinary people to achieve this phase are called Integrated Product Teams (IPT). The IPT must work
together to create their piece of the system while using the requirements and architecture of the system set
forth prior to this phase.
274
Systems Engineering
1
Determine the
intended use of
the architecture
Purpose
Target objectives
Key tradeoffs
Probable analysis methods
2 4 5 6
3 Determine the
Determine the Determine the Build the Use architecture
architecture characteristics views and requisite
to be for intended
scope products to be products purpose
captured built
Then Then Then Then
During the early stages of implementation, larger systems are decomposed into smaller subsystems.
Each subsystem will have a set of specifications and an IPT assigned to it. Therefore, the IPT not only has
to work together among their team but they must also work with other IPTs that their subsystem interfac-
es with so that the interfaces are created properly. This communication between IPTs is imperative to the
success of a project and will be discussed more in the integration phase.
During the implementation phase development of training material for the users and maintainers of
the system of interest should be created. This material can include instruction manuals, drawings, simula-
tions, or any other type of media that may be required to convey to the users and maintainers the infor-
mation they require to perform their functions.
17.6 Integration
The purpose of the integration phase is to bring all the pieces or elements of the system of interest to-
gether to assemble into a whole. This purpose is accomplished by taking each piece and building up the
system. The order in which systems pieces are integrated into the systems should be carefully planned
out and considerations such as schedule and interfaces should be made. The warning at this phase is to
not put all or too many elements together at one time. The integration plan should include a bottom-up
approach where the elements are added from a hierarchal point of view and the interfaces checked for
compatibility before adding additional elements. During this phase overlap with the Verification and
Validation Phases may take place.
The IPT should still be involved in the integration phase and understand the order in which elements
will be integrated. This coordination between IPTs is needed so that elements are available when needed
and to ensure compatibility of the elements. On many programs the coordination for integration will be
a well-choreographed dance, where items not only have to be completed on time to integrate with one
another but their integration must be completed to integrate with another element or subsystem of the
system. Sommerville (1998) said this about the integration phase:
“Integration is one of the most costly and time-consuming activities in the systems engineer-
ing process. For large and complex systems, up to 40% of the development effort may be
used in this activity, mostly in system testing.”
To achieve system integration there are two approaches: (1) big bang approach and (2) bottom-up
approach. Both will be discussed in the following section although as mentioned before the preferred
approach is the bottom-up approach.
Integrate
Subsystem 1...n
System
276
Systems Engineering
System
INTEGRATED SUBSYSTEMS
Component
Component Component Component Component 5...(n-1) Component
1 2 3 4 n
1 2
17.7 Verification
The purpose of the verification phase is to confirm that the system of interest meets the system require-
ments or another way to state the purpose is that the system is built right. In this phase each element of
the system is verified that it meets the requirements that came out of the requirements analysis phase. The
verification method for each requirement should begin to form during the requirements analysis phase.
It is important to identify how each requirement will be verified early so that any verification equipment
or simulations that need to be built will be available in time for the verification phase. It is also important
that stakeholders (both internal and external) agree to the verification strategy of the requirements.
Verification plans should be generated and reviewed as early as possible. These plans detail the verifi-
cation procedure and the setup. The verification plans should be reviewed by stakeholders of the require-
ment being verified. Having the stakeholders of the requirement agree to the verification plan helps ensure
the requirement is being understood consistently between stakeholders and designers. It helps to ensure
that the stakeholders are satisfied with the level of verification a requirement will have.
There are different methods used to verify a system requirement. The four most recognized are in-
spection, demonstration, analysis, and test. The cost of the verification method is important to take into
account as each verification method may vary greatly in cost but achieve the same goal.
17.7.1 Inspection
The inspection method uses examination and observation to determine if a requirement is met. An
example of this is if a requirement states: “There shall be two USB ports on the front panel.” This can be
verified through a visual examination of the front panel that there are two USB ports. This requirement
does not ask for functionality of the ports just that they are available on the front panel so a visual inspec-
tion is sufficient.
277
Engineering Management Handbook
17.7.2 Demonstration
The demonstration method shows the operation of functional performance. This can be in a live or sim-
ulated environment. An example of this would be “The system shall average at least 50 mph.” The system
would be observed over a period of time that it averaged 50 mph. During the demonstration, one observ-
able must be that the system averages 50 mph over a specific period of time and distance.
17.7.3 Analysis
The analysis method uses simulations, algorithms, or other scientific methods to prove that the system or
system element meets a requirement. This method can be expensive and time consuming. Data may still
be required from the system of interest and the method of collecting that would need to be determined.
The algorithm or other scientific method may also have to be justified in that it is proving the require-
ment to a satisfactory level.
17.7.4 Test
The test method uses real or simulated stimuli to verify a requirement. Test should be quantitative so that
results (i.e., pass/fail) are easy to determine. An example of a test would be “The output voltage shall be
at least 5V.” Here, the system conditions, documented in the verfication plan, would be applied and the
output voltage would be measured to ensure that the voltage was at least 5V.
17.8 Transition
The purpose of the transition phase is to take the verified system and place it into the operational environ-
ment. In this phase, the system is handed from the development team to the final operator. This phase can
be short but it is an important phase to plan for. The planning should consider all deliverables, logistics,
and support of delivering the system to the user. The idea behind this phase is make sure the product
can be successfully implemented into its final environment. This includes making sure that the users are
trained so that they can operate the system and that maintenance is able to be performed by the user. As
stated in the implementation phase the training material should have been developed during that phase.
The users and maintainers would require the training material prior to the transition phase so that they
have time to prepare for the arrival of the system. Some training could even be part of the transition phase
depending on the intensity and time constraints.
17.9 Validation
The purpose of the validation phase is to guarantee the system meets the stakeholder requirements or in
other terms was the right system built. In this phase, the system is exercised through all its operational modes
and/or scenarios. As in the verification phase the validation phase must be planned for well in advance. The
logistics, training, special equipment, etc., that are needed for validation should be identified as early as pos-
sible. Validation plans should also be developed early and agreed upon by the stakeholders so that everyone
is aware of the approach and level of validation that will be taken. The reason for early validation plans is to
ensure the final validation sign off of a system by stakeholders once the validation phase is complete.
maintenance is many times overlooked. The designer must remember to make sure the ability to effective-
ly maintain the system is designed into the system. This can be ensuring that certain panels on the prod-
uct are accessible and can be removed. Items that may need to be changed often such has batteries should
also be accessible. If a product requires software updates then how those updates are made to the product
(USB port, internet connection, RS-232, etc.) must be taken into consideration during the requirements
analysis phase. The thought process for maintenance also needs to take into consideration the type of
tools that the maintainer will have available. If the product requires a special tool then that tool should be
designed and offered with the product.
An example of operation and maintenance phase that anyone using a Microsoft Windows® operat-
ing system would be familiar with is the Windows® updates. These updates help enhance the product,
correct issues found after release of the product, and helps maintain the life of the product. Many times
these updates are required by the end customer or the product life would be ended. One example of this
required update is any security features with the Windows® product. One can imagine how dissatisfied the
customers of Windows would be if these imperative security updates were needed but did not take place.
Therefore, it shows that the operation and maintenance phase cannot be taken lightly by the developer of
the system. The developer needs to stay engaged with the product and guarantee that its intended life is
achieved.
17.11 Disposal
The purpose of the disposal phase is to terminate the system and the deal with any waste disposal issues;
such as hazardous waste. This phase is to ensure that the system is disassembled and disposed of properly.
Any hazardous substances in the product should be identified and disposed of according to local laws
and regulations. The disposal phase should be considered in the requirements analysis phase. The type
of considerations that should be made are as follows: (1) How will the system be disposed of (landfill,
recycle, etc.)? (2) If there is hazardous waste who will dispose of it and how? (3) What is the environmen-
tal impact regarding the disposal of this system? And (4) how much will it cost to dispose of the system?
These are just a few considerations but are ones that are many times not addressed during the require-
ments phase. The cost of disposal also plays into the overall Life Cycle Cost and therefore the success of
the product.
A current example of a disposal issue is the new Compact Florescent Light (CFL) bulbs that many
people are using to replace all their incandescent light bulbs. With this increase in use of CFL bulbs,
which contain small levels of mercury, a concern was raised that disposal of all those CFL bulbs in land-
fills will containment the ground water. To address this concern manufactures and stores offer free recy-
cling of the CFL bulbs. These stores and manufactures understand that environmentally friendly disposal
of the CFL bulbs is important to the consumers and they also know it will keep agencies like the EPA
from mandating special disposal requirements that could impact the selling of their CFLs. Would anyone
want to buy such a common product if they could not easily dispose of it?
17.12 Conclusions
Hopefully by now, it is clear that SE is about managing the development of a system. ISO/IEC 15288
defines a number of processes that should be followed during a system lifecycle, and SE is about exer-
cising and executing those processes. That is not to say that systems engineers perform each of those
tasks, but they are responsible to ensure the processes are performed, and that the necessary system level
documentation is created as part of the input to the next process. Because the field of SE is so broad,
specialization has occurred within the field. For instance, there are systems engineers who have become
experts in eliciting, writing, and managing requirements. Others have become systems architects, and
are highly proficient in understanding requirements and taking an abstract view of the system to envi-
sion structure of the major parts of the system. Still others have specialized in integrating and testing
the system as the components parts are brought together and the overall system takes shape. However,
even with these specializations, it is important for a systems engineer to understand their role in the
overall SE process; understanding how their role in the process affects the remaining processes. While
279
Engineering Management Handbook
the intent of this chapter was not to make the reader a systems engineer, one should now have enough
information to learn more about the SE process.
17.13 References
System Architecture
Grady Booch, The Complexity of Programming Models, IBM Rational Users Conference, 2005.
Cloutier, Robert, Fickle, Clay, Watson, John, and Winkler, Andrew, “Modeling a System of Systems
Using UML,” Conference on Systems Engineering Research (CSER), Hoboken, NJ: Stevens Institute
of Technology, 2003.
Rechtin, Eberhardt, Systems Architecting, Creating & Building Complex Systems, Upper Saddle River, NJ:
Prentice-Hall PTR, 1991.
Sommerville, Ian, Accessed from http://www.comp.lancs.ac.uk/computing/resources/IanS/SE5/syseng/
sise/integration.ppt#4, 1998.
Systems Engineering
Cloutier, R., Baldwin, C., and Bone, M. Systems Engineering Simplified. Boca Raton, FL: CRC Press,
Taylor & Francis Group, 2015.
Hall, A.D., A Methodology for Systems Engineering, Van Nostrand, 1962, p. 139.
Systems Engineering Handbook, Version 3.1, Technical Board, International Council of Systems Engineer-
ing (INCOSE), 2004, Document Number: INCOSE-TP-2003-016-02.
Systems Engineering Handbook, Version 3.2.2, Technical Board, International Council of Systems Engin-
eering (INCOSE), 2011, Document Number: INCOSE-TP-2003-016-02.
Wasson, Charles, System Analysis, Design, and Development, Hoboken, NJ: Wiley-InterScience, John Wil-
ey & Sons, 2006.
ISO/IEC 15288 Systems Engineering – System Life Cycle Processes, First Edition, 2002-11-1.
280
Systems Thinking
18
Systems Thinking
Charles Keating
National Centers for System of Systems Engineering, Old Dominion University
Behnido Calida
Virginia Tech Transportation Institute
Ra’ed Jaradat
Mississippi State University
Polinpapilinho Katina
National Centers for System of Systems Engineering, Old Dominion University
281
Engineering Management Handbook
18.1 Introduction
The landscape for the engineering manager of the 21st century has changed drastically in the decades since
the inception of the discipline of Engineering Management (EM). The American Society for Engineering
Management was founded in 1979 and defines engineering management as “the art and science of plan-
ning, organizing, allocating resources, and directing and controlling activities which have a technological
component.” In the ensuing three decades since the establishment of a formal society to foster the disci-
pline, the discipline of engineering management and the environment that engineering managers must
operate in has evolved significantly.
Although today’s engineering managers must still accomplish the same set of activities mentioned
above, they are faced with a very different set of circumstances than those encountered by their prede-
cessors three decades ago. The current engineering management environment requires a constant strug-
gle with: (1) proliferation of information intensive systems and technologies, (2) multiple stakeholders
with potentially divergent viewpoints and politically driven agendas, (2) scarce and dynamically shifting
resources available for mission support, (3) constantly shifting requirements and context for execution,
(4) technology advancements that outpace the capabilities, and potential compatibility, of infrastructures
necessary to support their development, (5) urgency for immediate and responsive reconfiguration to deal
with shifts in operating assumptions, (6) surrender of long-term perspectives to deal with emerging cri-
ses—rendering traditional forms of planning virtually innocuous, (7) increasing complexities and uncer-
tainties that are a rule rather than exception, and (8) emergent circumstances and factors that make stable
planning and operations tenuous at best. These characteristics are not likely to subside in the near future
and are more likely to escalate in severity. The success of future generations of engineering managers will
be directly tied to their ability to effectively deal with this new world.
In short, the world of the engineering manager is a “complex systems world”—an increasingly am-
biguous, complex, emergent world of interdependent systems fraught with instability and uncertainty
(Keating and Katina, 2011, 2012, 2015). There is a need to arm future engineering managers with the
mindset, capabilities, and skills that will increase the probability of success in managing future technolo-
gy-based enterprises.
Systems thinking can provide a valuable capability for engineering managers to more effectively deal
with the complex problem domains described above. Although systems thinking is not the “silver bullet”
or “magic solution,” it can add to the arsenal of the engineering manager as he or she struggles to effec-
tively cope with the new realities of the technical enterprise.
The purpose of this chapter is to acquaint EM practitioners with the essential knowledge necessary to
use systems thinking to more effectively deal with increasingly complex systems and their problems. In
general, systems thinking has been captured by Haines (1998, p. vi) as “A new way to view and mentally
frame what we see in the world; a worldview and way of thinking whereby we see the entity or unit first
as a whole, with its fit and relationship to its environment as primary concerns; the parts secondary.” Our
treatment of systems thinking will expand on this perspective to accomplish three primary objectives:
1. Establish the role and unique contribution systems thinking can provide to enhance performance of
EM practitioners.
2. Provide a set of foundation systems principles to guide engineering managers in more effective think-
ing, decision, action, and interpretations for better understanding and dealing with complex problem
domains.
3. Examine some common methodologies and tools that can help engineering managers in the applica-
tion of systems thinking to increase professional effectiveness.
To achieve our objectives, we have organized the chapter to present a rigorous development of
systems thinking for engineering managers. First, our introduction provides a systems-based perspective
for the EM domain, the systems challenges, and specific role that systems thinking can play to enhance
EM capability. Second, we provide an overview of systems thinking to establish the essential background
that engineering managers should be aware for application of systems thinking. Our focus here is to set
the challenges and specific responsive role that systems thinking can play in addressing those challeng-
282
Systems Thinking
es. We develop a perspective as well as the nature of systems thinking. Finally, the remaining sections of
the chapter will present the underlying philosophical (informing worldview, based in fundamental values
and beliefs that guides decision, action, and interpretation), methodological basis (general frameworks
that guide deployment), and application (methods, tools, and techniques to enhance practice) related to
systems thinking. We close the chapter with a recognition of the limitations, role, and implications that
systems thinking holds for engineering managers.
2008). The operating landscape for today’s engineering managers includes elements of non-ergodicity,
where systems are subject to inherent difficulties in understanding and provoking continuous transi-
tion to identified goals is tenuous.
16. Non-monotonicity—The reality for engineering managers is such that increases in knowledge are not
reciprocated by increases in understanding. Actions and decisions are always tentative (Sousa-Poza et
al., 2008). This suggests that engineering managers have to realize that knowledge is necessarily provi-
sional, incomplete, and fallible.
The attributes above suggest that the problem domain faced by engineering managers is a signifi-
cant departure from that faced in the past. Unfortunately, the struggle continues as our current arsenal is
insufficient to adequately arm engineering managers to most effectively perform in this emerging domain.
Although there are emerging technologies and methods to assist engineering managers, they are lagging
the shifts in the problem domain. However, irrespective of technologies and tools/methods, engineering
managers armed with sound philosophy and principles that ground their thinking will increase effec-
tiveness in these environments. Systems thinking represents such a philosophical and principled way of
dealing with new complexities being faced by engineering managers.
New tools, methods, and technologies will continue to be developed to assist engineering managers.
Although they may be useful, none will have the prolonged continuity provided by thinking that is philo-
sophically grounded and principle driven. This is the challenge faced by engineering managers: To develop
a sound philosophy, principles, and values that inform consistent decision, action, and interpretation in the face
of increasing complexity. Systems thinking offers a significant path forward to meet this challenge.
In the remainder of this section we will briefly develop each of these challenges and their implications.
Systemic framing involves taking into account the holistic nature of a complex systems problem. This
holistic perspective involves not only the technological dimensions, but also the human/social, organi-
zational/managerial, and political/policy dimensions. Systems thinking assists engineering managers in
this holistic understanding of the problem domain and is an essential skill set for increased effectiveness.
Complex system problem framing offers a “front-end” toward increased effectiveness in dealing with
increasingly complex systems. There are four important aspects of framing that we have singled out with
respect to systems thinking as an enabling capability for engineering managers: (1) skills in systems think-
ing provide a way of thinking and organizing complex systems problems—informed by a philosophy and
guiding principles that are grounded in systems theory, (2) framing is likely to be the initial phase of any
effort to deal with complex system problems—performing this activity from a “systemic” perspective will
serve to enhance the capabilities for future engineering managers, and (3) systemic framing involves a way
of thinking—with reliance on the foundational systems philosophy and principles that inform a more
sophisticated perspective of the problem domain.
The concept of holism lies at the heart of systems thinking. Holism suggests that understanding of
a complex system/situation requires that understanding must be at the level of the whole system. Simply
285
Engineering Management Handbook
breaking the system into constituent “parts” does not provide an adequate understanding of how the
system functions as a whole. There are behavioral, structural, and performance characteristics of a systems
that are simply not capable of being ascertained at a level lower than that of the system. In effect, there is a
point where a system is “irreducible” and understanding cannot be attained below the level of the whole.
Capability for dealing with the age of complexity faced by present and future engineering managers
can be enhanced by full spectrum systems thinking. We introduce the modifier of “full spectrum” to ex-
pand an overly narrow viewpoint of systems thinking. A scan of the literature for systems thinking quickly
identifies many works (Senge, 1990; Kim, 1995) that to closely associate systems thinking to the field
of system dynamics. There is no escaping the popularity of system dynamics as a field that enables—as a
tool—engagement of systems thinking. However, the notion of “full spectrum” suggests that the power of
systems thinking is not contained within a technique. Instead, we suggest that systems thinking’s power is
more effectively realized through the study of the philosophic (underlying paradigm/worldview), axiom-
atic (supporting principles), axiological (corresponding values), methodological (broad execution guiding
frameworks), methods (supporting processes, tools, and techniques), and applications (using knowledge).
We feel that Mitroff’s (1998) issues provide an effective starting point for issues in complex system
problem framing. To this initial listing we would add three additional issues:
• Misalignment of Conceptual Perspective—Those constituents involved in the complex system problem
framing must have sufficient overlap in their perspective of problem definition, plausible approaches,
and frame for interpretation of system solution. This includes background, experiences, and “world-
view.” This also supports consistency in decision, actions, and interpretations necessary to engage the
problem domain.
• Expertise in Problem System and Approach—Closeness to the problem system may preclude diversity of
perspectives that may be essential to a wider view of the problem system. In addition, the approach to
resolution of the problem might require expertise or experience that is beyond the grasps of the unit
286
Systems Thinking
investigating the problem. Successfully addressing systems problems requires that engineering man-
agers invoke both system (source of problems emanating from a specific system) and systems (field of
systems knowledge) expertise to address the problem—both levels of expertise are required.
• Contextual Capacity for Reframing—It is possible that a problem system, once reframed will not
resemble the “original” problem. If the resources, managerial support, and problem solving culture are
not consistent with reframing, it is doubtful that reframing will meet with success.
287
Engineering Management Handbook
Author Perspective
Flood and Carson (1993, “A framework of thought that helps us to deal with complex things in a holistic way.”
p. 4)
Checkland (1999, p. 4, p. 318) “Makes conscious use of the particular concept of wholeness captured in the word
‘system’, to order our thoughts.”
“An epistemology which, when applied to human activity is based upon the four basic
ideas: emergence, hierarchy, communication, and control as characteristics of systems.
When applied to natural or designed systems the crucial characteristic is the emergent
properties of the whole.”
Gharajedaghi (1999, p. 15) “Puts the system in the context of the larger environment of which it is a part and
studies the role it plays in the larger whole.”
O’Connor and McDermott “Seeing beyond what appear to be isolated in independent incidents to deeper
(1997, p. 1) patterns.”
Haines (1998, p. vi) “A new way to view and mentally frame what we see in the world; a worldview and
way of thinking whereby we see the entity or unit first as a whole, with its fit and
relationship to its environment as primary concerns; the parts secondary.”
Senge (1990, p. 89) “A discipline for seeing wholes. It is a framework for seeing interrelationships rather
than things, for seeing patterns of change rather than static “snapshots.”
“Encompasses a large and fairly amorphous body of methods, tools, and principles,
all oriented to looking at the interrelatedness of forces, and seeing them as part of a
common process” (Senge et al, 1994, p. 89).
Capra (1996, p. 29) “A new way of thinking … in terms of connectedness, relationships, context.”
von Bertalanffy (1972, p. 410) “Since the fundamental character of the living thing is its organization, the customary
investigation of the single parts and processes cannot provide a complete explanation
of the vital phenomena. This investigation gives us no information about the
coordination or parts and processes.”
http://www.opbf.org/open- “A system cannot be understood by an analysis of its parts. Systems thinking concerns
plant-breeding/glossary/so-sz the organisation of those parts, as a single system, and the emergent properties that
emanate from that organisation.”
Richmond (1993, p. 139) “The art and science of making reliable inferences about behavior by developing an
increasingly deep understanding of underlying structure.”
ESD Symposium Committee “Includes holism, an ability to think about the system as a whole; focus, an ability to
(ESD 2002, p. 8) address the important system level issues; emergence (see below), recognition that
there are latent properties in systems; and trade-offs, judgment and balance, which
enable one to juggle all the various considerations and make a proper choice.”
Davidz (2006, p. 44) “Analysis, synthesis and understanding of interconnections, interactions, and
interdependencies that are technical, social, temporal and multi-level.”
Ackoff (2010, p.6) “Looks at relationships (rather than unrelated objects), connectedness, process (rather
than structure), the whole (rather than just its parts), the patterns (rather than the
contents) of a system, and context.”
While not exhaustive, the distinctions above provide insight into the critical distinctions between
“hard” and “soft” system thinking. The primary implication for engineering managers is to appreciate
the nature of the problem/problem domain and what this means for thinking that leads to appropriate
decision, action, and interpretation in response to systems problems. In actuality, complex systems can
have attributes of soft, hard, and mixed characterization—which may shift over the life cycle of a system
or situation. Misclassification, or failure to reclassify based on new or shifting knowledge, can result in
mistreatment of a system/problem.
289
Engineering Management Handbook
Systems
Thinking
A Language
to Guide Approach
Thinking & for Dealing
Action with
A Philosophy
or worldview Increasing
Complexity
Disciplined Structure and Order for Inquiry—The application of systems thinking can be helpful in provid-
ing approaches, grounded in underlying systems principles/concepts, to conduct more effective inquiry.
The very nature of systems thinking suggest a more structured and orderly progression for understanding
and holistic framing of complex interrelationships. This is important for engineering managers who must
develop effective understanding of complex problems.
Approach for Dealing with Complexity—Dealing with increasing complexity is perhaps the greatest future
challenge facing engineering managers. Systems thinking offers multiple approaches, based in underly-
ing systems foundations, to more effectively address complex problems. Complexity is a fact of life for
engineering managers. The approaches to deal with complexity, rooted in a differentiated systems thinking
frame of mind, can provide engineering managers increased effectiveness in increasingly complex problem
domains.
A Philosophy or Worldview—Philosophy provides the basis for making sense of what we perceive in the
world. It is the root of decision, action, and interpretation of what transpires in the engineering man-
ager’s world. Systems thinking can provide a paradigm that broadens the engineering manager’s world
view. This can increase the possible decision space, generate an expanded set of actions, and broaden the
interpretative framework for understanding. In effect, systems thinking can provide engineering managers
with increased capacity to “make sense” of their circumstances and enhance the capability to mount more
effective responses.
A Language to Guide Thinking and Action—We think through language. Therefore, new language provides
the avenue for new thinking to more effectively deal with the problem domain faced by engineering man-
agers. The language of systems thinking can be instrumental in coming to new understanding of familiar
issues. Thus, new courses of action to address complex problems can be established.
290
Systems Thinking
Methods and Techniques—Systems thinking provides the basis for a host of implementing methods and
techniques that can enable higher levels of inquiry for engineering managers. Ultimately, language alone is
not sufficient to provide more informed approaches to deal with increasing complexity. However, meth-
ods and tools can provide enabling capacity for “doing” systems thinking.
Engineering managers must realize that systems thinking operates on many levels, including the five
levels identified above. It can provide enhanced effectiveness on any or all of these levels. It is a misnomer
to think of systems thinking as simply a set of tools to be used by engineering managers. To truly engage
the full spectrum of systems thinking capability, an engineering manager must seek the contributions
across these levels.
2. Incompatibility of worldviews can render the best intentioned effort impotent. Without taking this
into consideration, engineering managers are risking the potential for doing more harm than good in
addressing complex problems.
3. Worldviews underlie all decisions, actions, and interpretations engaged in an enterprise. They may
be tacit, not discussable, or assumed, but they are always there and represent a potential source of
integration/disintegration for an engineering manager.
Epistemological Spectrum
Positivism Antipositivism
Ontological Spectrum
Realism Nominalism
Divergence at the philosophic level, Type IV error, can result in conflict with respect to approaching a
complex system problem. For example, from a Positivist/Realist worldview, there would be little tolerance
of engaging systems thinking as an approach not based in the production of tangible products in an ob-
jective manner. On the contrary, from an Antipositivist/Nominalist worldview, a systems thinking effort
without inclusion of subjective knowledge, as a function of individuals, would be inconsistent. The point
is not whether or not the ends of the spectrums are “correct” or “incorrect.” Instead, it is important to
understand where, at the philosophic level, we are placing our worldview in relation to the use of systems
thinking. A disparity in worldview placement invites divergence at the philosophic level and potential
conflict regardless of the “appropriateness” of systems thinking intended by an astute engineering manag-
er. Engineering managers would be well served by questioning the level of compatibility of theirs, as well
as their participants, worldview with systems thinking prior to engagement.
292
Systems Thinking
293
Engineering Management Handbook
Representation (Keating, 2005) The representation of a complex Care must be taken not to confuse
system is not the system; it is only the abstraction from reality (system
one of many possible articulations of representation) with the actual
the system. The representation both system. The representation will always
constrains and enables understanding, be incomplete, fallible, and lacking
action, and decision spaces concerning significant detail of the system. The
the system problem. representation will be more or less
useful depending on the purposes of
the use.
System Learning (Argyris & System learning results from the Understanding the ways in which
Schön, 1978, 1996) detection and correction of error. a system manages error (detects,
Correction may occur staying within analyzes, and corrects) reveals
the current system structure (single- underlying patterns of feedback.
loop), or may shift structure based on System adjustments based on this
question the fundamental assumptions, feedback is necessary to continue to
objectives, and norms of the system produce performance (expected level
(double-loop). Both forms of system outputs and outcomes) in the midst
learning are necessary. of external turbulence and internal
flux. Consideration should be made
of the appropriate learning modality
(single or double loop) in response to
variance.
System Identity (Beer, 1979, Every complex system is unique, having System identity provides a basis
1981) a set of attributes, structure, and for consistent decision, action, and
relationships that produce the system interpretation. It must be actively
identity. maintained and represents a minimum
information set that can define the
essence of a system of interest. A
strong system identity creates clarity
and permits the system to act as a
unity in the midst of turbulence.
Value Free Production A system accords no value judgments The complex interactions and
(Keating et al., 2001) to outputs or outcomes that it relationships in a system, coupled
produces. Although system outputs/ with emergence sure to be
outcomes may be externally experienced, suggest our inability
interpreted as good or bad, a system to completely know a system. If we
produces what it produces from have unanticipated performance/
execution. Therefore, there are no bad behavior, we should first question
systems, just systems that disappoint our understanding of the producing
the interpretation of the products they system. By focus on the underlying
generate. system that is producing aberrant
behavior/performance inquiry can
proceed without value judgments,
irrespective of the performance
disappointment. A system produces
what it produces, nothing more and
nothing less.
Equifinality (Clemson, 1984; There are multiple paths, from different This implies there is no one “best”
Skyttner, 1996) initial conditions, that can result in the solution to a complex system
same output/outcomes for a complex problem, only different solutions that
system. may or may not produce different
results.
294
Systems Thinking
Holism (Jackson, 2003) We cannot understand a complex Limitations based on holism are
system through reduction to the amplified, since: (1) the system
component or entity level, approaches cannot be disassembled, analyzed,
based on reduction to perform analysis and ‘put back together’ with any
at increasingly finer levels of detail, level of confidence in system level
are questionable for complex systems understanding, and (2) all system
whose behavior exist beyond that of level properties cannot be known,
the constituent parts. deduced, or predicted in advance of
their manifestation during system
operation. Reduction requires
abstraction that always invokes
abstraction error.
System Purpose (Beer, 1979) The purpose of a system is “what Purpose must be ascertained through
it does” (POSIWID). In considering the examination of what the system
the purpose of a system, the output is producing (behavior, performance,
(tangible patterns, products, and outputs/outcomes), not what it was
services) and outcomes (impacts) of intended to produce. Care must
the system must be considered. This is be taken not to confuse intention
beyond what is intended, designed, or with results. Regardless of the well-
desired to be produced or achieved by meaning intentions for a system
a system. design, purpose must be based on
“actual” outcomes, not those that
were “intended.” It is a fundamental
error to analyze a system based on
design intentions or desires.
Relaxation Time A system in dynamic equilibrium Intervention into a system that
(Clemson, 1984) requires a time period (relaxation invokes multiple changes suggests
time) to return to a state of dynamic that: (1) the system may be placed
equilibrium following a perturbation into oscillation without the chance
(change) from internal or external to return to a state of dynamic
forces. Multiple simultaneous changes equilibrium, and (2) the “impact”
(perturbations) in a complex system, of a single change might not be
if additional perturbations occur at a understood in the face of multiple
that occur at a frequency that does not simultaneous changes. Care must be
permit settling into a state of dynamic taken to question the nature, depth,
equilibrium, will put the system into and interrelationship among changes
oscillation and quite possibly on initiatives invoked in a complex
a trajectory from which dynamic system.
equilibrium is no longer achievable.
Basins of Stability (Clemson, A system will seek a level of stability In attempting to make enduring
1984) (lowest energy state) unless acted on change in a system, there must be an
by external forces. The system will understanding that the change will be
move to a new basin of stability (past a temporary if sufficient energy (e.g.,
threshold) only when sufficient energy resources, processes, constraint) is
(resources) are applied to provide not provided to carry the system
“momentum” necessary to shift to the to a new level. The energy must
new basin of stability. be in correspondence with the
new stability sought, with sufficient
indicators to recognize achievement
of the new basin (performance/
behavior measurement).
295
Engineering Management Handbook
Viability (Beer, 1979; Keating, Viability is the ability of a system to A system must be questioned with
2009) maintain existence. There are three respect to how it is “appropriately”
primary axes for which a system must fit to the environment within which it
have a suitable fit to the environment must exist (remain viable). Does the
to maintain viability: change (ranging capability for change correspond to
from stability to adaptation), design rate of change of the environment?
(ranging from total self-organization to Is the design sufficiently loose/
purposeful), and control (ranging from tight to allow responsiveness to
integration to autonomy). environmental flux? Is the system
minimally constrained to permit
system level performance, while
permitting constituents the greatest
latitude in decision and action?
Sub-optimization For complex systems, the system is In the design of integrated systems,
(Skyttner, 1996) incapable of performing optimally if all the balance between autonomy
the subsystems are performing at an (freedom and independence of
optimal level. For system performance action, decision, and interpretation)
(integration), subsystems must of subsystems must be balanced with
“surrender” a level of autonomy that integration (linkage that permits
lessens their ability to perform at an system level performance). Total
optimal level. autonomy of subsystems will result
in less than optimal system level
performance.
Compatibility (Cherns, 1976, The objectives sought in a system The selection of approach should
1987; Taylor and Felten, 1996) redesign must be achieved through be assessed against the particular
an approach compatible with those objectives sought from a systems
objectives. Inconsistency between thinking effort. Misalignment of
redesign approach and objectives will objectives to approach is likely to
not yield the desired effectiveness. This result in failure to meet expectations.
also extends to compatibility between The supporting infrastructure
the system and the supporting (reward, operations, decision,
infrastructure. training, etc.) should be designed to
facilitate the processes necessary
to enable generation of the desired
system behaviors and performance.
Incompatibility can result in less than
desirable results.
Minimum Critical Specify only the essential constraints In the design of a system, minimal
Specification (Cherns, 1976; to achieve the performance level constraints should be deployed.
Taylor and Felten, 1996) required by a system. Overspecification Focus must remain on only
unnecessarily limits the flexibility in the implementing the constraints that
operation of the system to respond are minimally essential to ensure the
to varying conditions. However, performance levels of the system are
minimum specification is required to met. Overspecification beyond this
permit integration of the system of minimum wastes resources, limits
systems to produce consistent levels of overall system performance, and
metasystem performance. comes with human costs.
System Control (Beer, 1979) System control is best established Control for a system is achieved
as close as possible to the point at by maximizing the autonomy of
which decisive decision and action can elements within the system. Systems
be taken in response to variances to thinking must appreciate target
system performance. This encourages designs that provide for the highest
maximum autonomy (freedom and levels of autonomy within the system.
independence of decision, action, and Control is achieved by establishment
interpretation) for system constituents of performance expectations that
in the best position to make timely maximize independence of elements
decisions that can reduce variances at within the system (maximum
the point that they occur. autonomy). Constraint should only
be invoked as necessary to ensure
continuing system performance.
296
Systems Thinking
System Context The set of relevant circumstances, Complex system problems and
(Keating et. al, 2003) factors, conditions, and patterns that solutions are not independent of
both constrain and enable the system contextual issues such as power,
solution development, deployment, responsibility, accountability, and
operation, and transformation. authority. Failure to take these
dimensions into consideration in the
framing of problem systems is naïve
and will result in an incomplete, and
possibly inadequate, framing of the
problem system.
Dynamic Stability (Skyttner, Achievement of dynamic stability All complex systems are subject to
1996) is a function of the system’s ability perturbances generated external
to respond to fluctuations and to the system. It is a function of
environmental turbulence in ways that systems thinking to design system
ensure continued levels of required relationships such that a system is
performance. capable of maintaining desired levels
of performance under conditions
of external stress. Systems Thinking
must ensure that system designs
include sufficient feedback and
feedforward mechanisms consistent
with the level of noise/turbulence
expected to be generated from the
environment.
Boundary Establishment Every complex system has boundaries, Complex systems must have
established with respect to the boundaries established initially,
prevailing organizing logic external to understanding that they will change
the system. These boundaries must be throughout the analysis, design,
explicit such that it can be determined, and transformation as system
at a point in time, what is included and knowledge increases and conditions
what is excluded from the system. They change. Boundaries may form
are ambiguous, fluid, and negotiable. around geographic, time, spatial, or
conceptual delineations. Boundary
changes must be processed for
impact on the system. Boundary
shifts are expected and should
be embraced as symbolic of our
advancing understanding of the
problem domain and recognized
emergence in the system.
System Outcome Achievement Complex systems have both outputs Establishment of measures for
(patterns, products, information, or system performance should not
services which are tangible, directly focus exclusively on output measures.
measurable, and close in time/proximity Consideration must also be directed
to system deployment) and outcomes to understanding the expectations for
(impacts of the system solution outcomes for the system solutions
deployment that are not necessarily and how they can be measured.
measurable or close in time/proximity Achievement of output expectations
to system deployment). Systems that does not assure that outcomes
only focus on and achieve outputs will (expectations related to addressing
meet requirements. However, to solve the particular problem/need) will be
a complex system problem and meet met. A well balanced approach to
expectations, achievement of outcomes systems must consider both outputs
as well as outputs is necessary. as well as outcomes.
297
Engineering Management Handbook
298
Systems Thinking
Complementarity (Clemson, There are multiple perspectives of Multiple views and perspectives are
1984) any given system. Each perspective is essential, particularly in the formative
both correct and incorrect, dependent stages for a system of systems effort,
upon the particular vantage point from to ensure a robust approach and
which the system is viewed. Multiple design. Failure to include multiple
perspectives are neither entirely perspectives can be limiting to the
independent nor entirely inclusive. eventual system of system solution
that is generated.
Omnivory principle (Katina, Stability in a complex system is It is erroneous to develop a system
2016; Watt and Craig, 1988) achieved by having a greater number that can only use a limited set of
of different pathways for their flow resources in the environment. An
to the main system components (i.e., engineering manager should always
modification of internal structures to endeavor to design a system that has
enable intake of different resources. In structures that could use different
other words, “don’t put all your eggs in resources from the environment.
one basket.”)
These systems concepts, although they do not exhaust the systems thinking field, provide a founda-
tion into the particular type of thinking that embodies systems based approaches. Consideration of these
concepts provides engineering managers a foundation for more effective thinking, decision, action, and
interpretation related to complex system problems.
from one perspective. There are multiple perspectives, problem system configurations, and representations
that may emerge to depict the problem system. The need for inclusion of multiple perspectives (Jackson,
1991) has long been recognized, as an important element is systems-based methodologies. From systems
theory (Skyttner, 1996), the term “complementarity” has been used to suggest that each depiction of a
system is correct from a particular vantage point, but may also be incorrect from another vantage point.
The arbitrary nature of problem framing is also influenced by language, worldview, perceptions on
framing, and making interpretations of problematic situations (Fairhurst and Sarr, 1996; Weick 1996). This
supports the notion that a problem system is dynamic and subject to reformulation over time and across in-
dividual perspectives. Based on new knowledge, shifts in perceptions, changing conditions, or dialogue, the
potential exist for problem system reframing. Therefore, it is inappropriate to consider that a problem (sys-
tem) can be truly static and closed to influences that may change initial formulations. There is no absolutely
“correct” depiction of a problem system. This echo’s the importance of dialog, interpretation, and shared
understanding in the systems literature (Senge, 1990; Argyris and Schön, 1996; Isaacs, 1999). The notion of
a fuzzy and shifting problem is certainly in stark contrast to the traditional systems engineering deterministic
approaches rooted in “absolute” and “unmoving” definition of the problem once analysis commences.
The third assumption of the systemic view is that actions taken to modify a problem system will pro-
duce intended as well as unintended consequences. Because problem system formulation is not precise,
the consequences of making modifications to the problem system (structure, relationships, and patterns)
will produce effects that cannot be predicted in advance. In systems, this embodies the concept of emer-
gence— the structural and behavioral patterns in a complex system will be exhibited over time as the
system operates. Therefore, the design for effective problem resolution must include the provision for con-
tinuing modification of the system “representation” based on initial or latent unintended consequences.
A fourth assumption suggests that all representations of a complex system exist as abstract reduc-
tions of the actual system. Therefore, they are always incomplete and may require modification based on
new knowledge and information about the system of interest. The problem system is changing and the
representation of that system must also be changing. Again, this assumption is quite unsettling to more
traditional perspectives built on assumptions of stability in definition of systems and the relatively static
nature of their representations.
Given the four systems view assumptions we can move forward to systems thinking as an essential
capability to enable engineering managers to more effectively deal with increasing complexity.
should be viewed as a spectrum ranging along a continuum of the four levels. The four levels are instruc-
tive in providing an engineering manager with a more informed perspective concerning the nature of
complexity in a system or problem with which they might be confronted.
Level 1: Organized Simplicity—This represents a low level of complexity. In effect, deterministic ap-
proaches are successful. The mathematics of optimization is appropriate for establishing solutions to well
bounded problems. An example would be a scheduling problem for minimizing overtime costs.
Level 3: Dynamic Complexity—Dynamic complexity exists where there is not sufficient bounding of the
problem domain, the language of mathematics/statistics is not capable of simplifying the problem space,
and extreme uncertainty (unquantifiable). An example of this form of complexity is the building of a high
performance engineering team.
Level 4: Relativistic Organized Complexity—This complexity level appreciates that individuals may
have varying perspectives of similar circumstances/events. The particular worldviews and their derivative
interpretations are a function of the individual “observer.” They are neither right nor wrong, but exist as
“different” based on potentially conflicting assumptions and logic upon which they are predicated. An
example is the assessment of managerial performance in crises.
The importance of these levels of complexity is twofold. First, as the levels increase, there is concur-
rent increase in complexity of the problem domain. This requires that the complexity and sophistication
of thinking also increase to match that of the problem domain. Second, that Systems Thinking becomes
increasingly important as the level of complexity increases. The domain of the modern engineering man-
ager is certainly characterized by higher levels of complexity. This suggests the increasing importance of
developing and applying more effective systems thinking to deal with this complexity.
Systems thinking begins at the individual level. However, we might ask, what are the particular attri-
butes that would serve to distinguish “systems thinking” from “non-systems thinking”? In the following
section we provide a set of attributes that can help classify the particular level of systems thinking that a
manager might be capable of engaging.
301
Engineering Management Handbook
The thrust of Jaradat’s (2015) instrument is to provide a “baseline” snapshot that profiles the level
of systems thinking for an individual. Determining individual capacity for systems thinking has several
important implications for engineering managers. First, the individual capacity to engage in systems
thinking is critical to the proper deployment of any of the systems based methods, tool, or techniques
developed in the following section of this chapter. Ultimately, understanding and appreciating the level of
individual capacity for systems thinking can help determine what can realistically be pursued (e.g., initia-
tives) by an engineering manager related to addressing complex system problems. Take for instance a case
were an engineering manager wishes to pursue an initiative requires a “high” level of systems thinking to
increase the feasibility of success. Further, that the “high” level is not held by individuals who will assume
responsibility for execution of the initiative. It follows that the probability for success in the execution
of the initiative is suspect. The engineering manager must make the determination as to whether or not
sufficient systems thinking exist in the unit that will assume responsibilities for the initiative. Otherwise,
the risk of failure in the initiative will be heightened.
The purposeful consideration and assessment of systems thinking can assist engineering managers by:
(1) determining the compatibility of individuals level of systems thinking with the degree of complexity
that exist in the initiative, (2) appropriately arranging a variety of individuals with different proclivities for
systems thinking, such that there is a systemic diversity in thinking available to the initiative—as all sys-
temic thinkers or all non-systemic thinkers can limit progression, and (3) advancing the state of systems
thinking must be commensurate with the environment and systems under the purview of the engineering
manager. Thus, a fundamental responsibility of the engineering manager is to be knowledgeable of both
the complexity in the situations for which they are responsible as well as the capacity of their units and
individuals to engage in a level of systems thinking that can “match” that required of the situation.
302
Systems Thinking
Systems thinking is not a cure-all that can address all problems faced by engineering managers who
must deal with increasing complex systems and problems. However, it invites engineering managers to
engage this complex problem domain from a different level of thinking. In the end, systems thinking may
open an entirely different range of alternative decisions, actions, and interpretations in pursuit of increas-
ing effectiveness for EM.
While the methods and tools for systems thinking are numerous, they can be classified in a way to
permit engineering managers greater access. In the following section we have identified existing methods
303
Engineering Management Handbook
and tools to facilitate systems thinking for engineering managers. This listing is presented as “all inclusive”
of systems thinking methods and tools. However, it is representative of that which is available to EM
practitioners. We can be certain that it will expand in the future.
304
Systems Thinking
Comprehensive
understanding
Theory-generation
& testing
Sense-making
Problem-structuring
Problem …to intervention
or Framing
Boundary/value
judgements
From observing/conceptualizing…
For systems thinking the distinction and interrelationship between methodology, methods, and tools
is important. Figure 18.4 depicts this relationship and three important points for past, present, and future
development and use of the appropriate methodologies, methods, and tools. First, as systems thinking has
evolved over time, there still ensues an ongoing cumulative effect of evolving earlier efforts. For example,
multimethodologies are built upon previously developed limited focus methodologies. Second, the land-
scape for methodologies, methods, and tools continues to evolve. Finally, although implicit, the basis for
systems-based approaches is to be found in the underlying systems paradigm upon which they have been
built, deployed, and evolved.
305
Engineering Management Handbook
New developments
Methodologies
Methods (Complex adaptive conceptual systems,complexity and chaos
Tools theory)
Methodologies Multimethodologies
Level Recursions
Methods
Tools (exclusively systems-based
based such as creative holism, critical
realism and creative design of methods)
306
Systems Thinking
307
Engineering Management Handbook
At the highest level of understanding for systems thinking, there exist methodologies. Perhaps one of
the most comprehensive categorizations of methodologies that reflect this comes from the work of Jackson
(1991).
We begin with “Creative Holism,” which is actually a term coined by Jackson to culminate in fact his
studies about system of systems methodologies and different system approaches in the past decade (Jack-
son, 1990, 2000). Concerning creative holism, Jackson (2003) emphasizes an approach to maximize the
advantages of combining different holistic approaches/methodologies creatively. He suggests the informed
use of methodologies/methods/tools to help thrive with “the complexity, turbulence, and diversity” of
current real world problems (p. 275). He presents his taxonomy for methods/tools by using four sociolog-
ical paradigms and several organizational metaphors that imagines an organization as machines, organ-
isms, brains, cultures, and political systems among others. With insights by using metaphorical lenses in
conjunction with paradigmatic lenses consisting of four sociological paradigms (functional, interpretative,
emancipatory and postmodern), he argues that each of the different holistic system approaches can be
broadly matched under the ones he suggested in Table 18.5.
Type A, B, C, D Taxonomy
Examples
Systems approaches…
Hard Systems thinking
System dynamics
For improving, goal seeking and viability (Type A)
Organizational Cybernetics
Complexity Theory
Strategic Assumption Surfacing Testing (SAST)
For exploring purposes (Type B)
Interactive Planning
Soft Systems Methodology
Critical Systems Heuristics
For ensuring fairness (Type C)
Team Syntegrity
The primary implication for engineering managers is to carefully consider the primary objective being
pursued as an indicator of the appropriate methodology to be engaged.
are possible. Each is correct from a particular vantage point. This taxonomy offers a start to make the
tools/methods to support systems thinking more approachable for engineering managers.
For our purposes we have selected a framework of Cabrera et al. (2008), referring to it as the
DSRP framework, to organize around: (1) Distinctions—making distinctions between elements, (2)
Systems—forming a system based on impacts of elements with one another, (3) Relationships—linkage
or coupling between entities, and (4) Perspectives—recognition of viewpoints that exist in understanding.
Because engineering managers can easily grasp the aspects Distinctions, Systems, Relationships, and Per-
spectives in their daily activities, we felt this framework would make the systems thinking tools/methods
more approachable for practitioners.
cessful in different contexts and problem domains. Systems thinking can be beneficial in understand-
ing the problem as a system, from which the undesirable behavior, structure, or performance exist as
the product of the system. Thus, the first focus is on the “problem system,” not the output/outcome
of that system (performance/behavior).
2. Uniqueness of the Problem Context—Every problem system is embedded in a unique context. This
context is the unique set of circumstances, factors, conditions, or patterns that will enable/constrain
the problem system and potential solutions. Context will also influence the range of “acceptable”
approaches, decision, actions, interpretations, solution design, and solution deployment. A major role
of systems thinking is to better appreciate and account for problem system context.
3. Uniqueness of the Methodology for Deployment—To use systems thinking for complex systems prob-
lems requires construction of a specific methodology. This methodology must be compatible and
appropriate for the unique problem and context. There is no methodology that is universal and can
be applied with the confidence that the results will be repeatable. On the contrary, every complex
problem requires a methodology that is appreciative of the uniqueness of the circumstances.
4. Compatibility—Engineering managers deploying systems thinking based approaches to complex
system problems must minimally take into account the degree of compatibility between the problem,
context, and methodology. In addition, systems thinking is based on a particular “worldview.” It is
inherent that the dominant worldviews are compatible with systems thinking if an effort is to have a
probability of success. Without this compatibility, more harm than good might be generated from a
systems based effort.
5. Systemic Framing—The power of systems thinking is in the capability to develop more holistic
perspectives of the situation. This relies on thinking in terms of systems, drawing on the underlying
systemic frame through language, concepts, and perspectives to develop more robust understanding
of the situation. By developing multiple plausible frames, engineering managers can establish more
informed understanding and knowledge of the situation. This in turn opens the potential decision
space that might have been obscured from singular perspectives. Framing, from a systemic perspec-
tive, is an ongoing activity. This is essential as the complexity of a problem increases.
6. Anticipating Emergence—Emergence is simply a fact of life for complex system problem domains—it
will happen. We must also realize that the very nature of emergence suggests that we cannot know
when, where, in what form, or how emergence is going to occur. What we do know, and how systems
thinking can be helpful, is that our system solutions must be resilient across a spectrum of potential
emergent perturbations. For systems thinking based design, this suggests a focus on systems that can
identify, analyze, classify, respond, and evaluate effectively to address emergent conditions.
This set of guidelines will not assure success for engineering managers deploying systems thinking.
However, they can be helpful in avoiding potential pitfalls in applications of systems thinking.
such perspectives as holistic understanding, relationships, and boundaries (Hall, 1989), consistent
with the foundations we have established in this document. Working within any systems-based
methodology or framework requires that individuals have a perspective compatible with the systems
paradigm. The implication for engineering management practice is that compatibility of the systems
thinking perspective should be explored prior to engaging in a systems thinking based excursion. In-
compatibility of the systems perspective with the dominant logic/worldviews increases the probability
for failure.
2. Fundamental systems knowledge—There must be a base level of system knowledge to effectively engage
in a systems-based initiative. At a minimum, basic systems knowledge must be appreciative of the
language (boundaries, output, input, relationships, environment, etc.), concepts, and methods as they
are used in support of the systems-based initiative. Simply having a “systems” perspective is insuf-
ficient to effectively engage in systems thinking based initiatives. Instead, participants must have a
grounding in the essential systems knowledge that transcends any methodology, method, or tool used
in support of systems thinking based efforts. The implication for engineering managers is to ensure
that the individuals and the collective group examine the level of system knowledge maturity prior
to engaging in a systems-based effort. Maturity development activities can be accomplished prior to
analysis, concurrent with analysis, or post analysis to increase the effectiveness of the inquiry.
3. Systems methods accessibility—There is a wide array of systems methodologies and methods available
to support resolution of complex issues (Jackson, 1991). Many of those methodologies, methods, and
tools have been referenced in this document. However, most engineering managers have had little
exposure to these. Therefore, engagement in a systems thinking-based effort will require understand-
ing of the methodology, methods, or tools as well as grounding in the underlying systems paradigm.
A criticism of systems based approaches is the potential reliance on “experts” to facilitate movement
through the effort. The implication for systems thinking based efforts is to balance exposure to
systems methods with the individual/collective understanding of the applicability, limitations, and
appropriateness of particular systems methods.
4. Intrusion of Power and Politics—System based approaches, particularly hard systems approaches, have
not been designed to deal with the politics/power dimensions inherent in efforts to improve com-
plex systems. There is recognition in some approaches (e.g., Checkland’s Soft Systems Methodology,
Argyris and Schön’s Organizational Learning Systems) that acknowledges the influence of power
and politics. However, engineering managers must be cautioned that, when dealing with problem
domains that involve divisive context with unfavorable politics/power dynamics, systems based ap-
proaches may fall short of expectations.
Systems thinking, as any approach in engineering management, has limitations. However, engineer-
ing managers may find that the benefits of system thinking application far outweigh these limitations,
Systems thinking can be extremely powerful, applied to the right problem domain under the right cir-
cumstances and with the appropriate expectations.
18.9 Conclusion
Systems thinking can provide a valuable capability for engineering managers to more effectively deal with
complex problems. In this chapter we have provided a foundation for systems thinking. It is crucial for
engineering managers wishing to get the most out of systems thinking in practice to recognize that effec-
tive applications of systems thinking operates on five interrelated levels. Mastery and realization of the
potential of systems thinking requires understanding, capabilities, and application across the spectrum of
these levels (Figure 18.5).
For engineering managers systems thinking can seem somewhat daunting at best and unapproach-
able at worst. However, in this exploration we have attempted to provide engineering managers with an
appreciation of systems thinking and how it might be approached to provide utility for practice. Our
approach has shied away from providing a prescriptive method or tool that, for some, might be imme-
diately satisfying, but in the long view unremarkable. Instead, we have provided an exploration of the
311
Engineering Management Handbook
subject of systems thinking in a way to gives a broad coverage of the topic and invites engineering manag-
ers to appreciate the full spectrum of systems thinking, ranging from philosophical roots through available
implementing tools.
We conclude by identifying several implications for engineering managers seeking to use systems
thinking in practice:
1. Principles First—Engineering managers seeking to get the most utility from systems thinking should
lead with the foundational principles. There will always be new tools and techniques that emerge
to support systems thinking, as well as those that disappear. However, systems thinking, rooted in
systems philosophy and principles, will provide a sustainable foundation that will withstand the tests
of time.
2. Uniqueness, not Prescriptive Application—As the term suggests, systems thinking is largely about think-
ing in order to support alternative decision, actions, and interpretations. There is not a systems think-
ing prescriptive formula, approach, or universal method that can assure repeatable results for dealing
with complex system problems. Engineering managers must appreciate that every complex problem is
unique and exists in a unique context. Systems thinking can be helpful in exploring this uniqueness,
and perhaps, finding a path forward that might not have been recognized at other levels of thinking.
3. Framing to See Differently—Systems thinking invites engineering managers to explore complex situ-
ations in a way that allows for framing and reframing from a different perspective. Asking the most
fundamental systems questions about boundaries, relationships, and behavior serve to gain the ad-
vantages that different perspectives cannot bring to complex problems. Systems-based methodologies,
methods, and tools are simply devices to assist in seeing a complex problem domain differently.
4. Representations—Ultimately, systems based endeavors generate representations (models) of a situation.
Engineering managers must exercise caution in the construction and use of representations of sys-
tems. All representations are abstractions and can never fully capture the entirety of a complex system
(system darkness principle). Therefore, in the practice of systems thinking, engineering managers
should question limitations of a singular representation. The question becomes, why is this represen-
tation the most appropriate representation and what might alternative representations offer?
5. Problem Systems—Systems thinking invites engineering managers to engage a fundamental shift in
thinking about complex problems. The systems thinking assumption that a deficient behavior or per-
formance is produced by a system forces engagement at a different (systems) level of thinking. If we
312
Systems Thinking
Systems thinking is not a cure-all that can address all problems faced by engineering managers. How-
ever, it invites engineering managers to engage complex problems from a different level of thinking. In the
end, systems thinking may open a range of alternative decisions, actions, and interpretations.
18.10 References
Ackoff, R. L., Creating the Corporate Future, New York: Wiley, 1981.
Ackoff, R. L., Ackoff’s Best: His Classic writings on Management, New York: Wiley & Sons, 1999.
Ackoff, R., The Democratic Corporation, New York: Oxford University Press, 1994.
Ackoff, R., Re-creating the Corporation, New York: Oxford University Press, 2000.
Adams, K. M., Hester, P. T., Bradley, J. M., Meyers, T. J., and Keating, C. B., Systems theory as the foun-
dation for understanding systems. Systems Engineering, vol. 17, no. 1, 2014, pp. 112–123.
Argyris, C., and Schön, D. A., Organizational Learning: A Theory of Action Perspective, Reading, MA:
Addison-Wesley, 1978.
Argyris, C. and Schön, D., Strategy, Change and Defensive Routines, Cambridge, MA: Ballinger, 1985.
Argyris, C. and Schön, D., Organizational Learning II, New York: Addison-Wesley, 1996.
Bagni, G., “Sets, Symbols and Pictures: A Reflection on Euler Diagrams in Leonard Euler’s Tercentary,”
Mediterranean Journal for Research in Mathematics Education, vol. 5, no. 2, 2007, pp. 77-82.
Beer, S., Heart of Enterprise, Chichester: Wiley, 1979.
Beer, S., Brain of the Firm, Chichester: Wiley, 1981.
Beer, S., Diagnosing the System for Organizations, Oxford: Oxford University Press, 1985.
Bell, P. C., and O’Keefe, R. M., “Visual Interactive Simulation -- History, recent developments, and ma-
jor issues.” SIMULATION, vol. 49, no. 3, 1987, pp. 109-116.
Bertalanffy, L. V. General System Theory: Foundations, Development, Applications. New York: George Bra-
ziller, 1968.
Blanchard, B. and Fabrycky, W., Systems Engineering and Analysis. New York: Wiley, 1998.
Boardman, J. and Sauser, B., Systems Thinking: Coping with 21st Century Problems. Boca Raton, FL: CRC
Press, 2008.
Cabrera, D., Colosi, L., and Lobdell, C., “Systems thinking.” Evaluation and Program Planning, vol. 31,
no. 3, 2008, pp. 299-310.
Capra, F., The Web of Life, New York: Doubleday, 1996.
Checkland, P., Systems Thinking, Systems Practice, Chichester: Wiley, 1981.
Checkland, P., “Soft systems methodology,” in Rosenhead, J. (Ed.), Rational Analysis for a Problematic
World, Chichester: Wiley, 1989, pp. 71-100.
Checkland, P., “Soft systems methodology: A 30-year retrospective.” SystemsThinking, Systems Practice
(2nd ed.). Chichester: Wiley, 1999, A1–A66.
Checkland, P., “Soft Systems Methodology: A Thirty Year Retrospective,” Systems Research and Behavioral
Science, 17, 2000, pp. 11-58.
Chen, D. and Stroup, W., “General system theory: toward a conceptual framework for science and tech-
nology education for all.” Journal of Science Education and Technology, vol. 2, 1993, pp. 447-59.
Cherns, A. “The principles of sociotechnical design,” Human Relations, vol. 29, no. 8, pp. 783-92, 1976.
Cleland, D. and King, W., Management: A System Approach, New York: McGraw-Hill, 1972.
Clemson, B., Cybernetics: A New Management Tool. Abacus, Tunbridge Wells, 1984.
Daellenbach, H. G. and McNickle, D. C., Management Science: Decision Making through Systems Think-
ing, New York: Palgrave, 2005.
De Weck, O. L., Roos, D., and Magee, C. L., Engineering systems: Meeting human needs in a complex
technological world, Cambridge: MA: MIT Press, 2011.
313
Engineering Management Handbook
Eden, C. and Ackermann, F., SODA—The principles. Rational Analysis for a Problematic World Revisited:
Problem Structuring Methods for Complexity, Uncertainty and Conflict. J. Rosenhead and J. Mingers
(eds). Chichester: Wiley, 2001, pp. 21-42.
Edwards, A. W. F., Cogwheels of the Mind: The Story of Venn Diagrams, Baltimore, MD: The Johns Hop-
kins University Press, 2004.
Espejo, R., and Reyes, A., Organizational Systems: Managing Complexity with the Viable System Model,
Heidelberg, Germany: Springer Berlin / Heidelberg, 2011.
Fairhurst, G. and Star, R., The Art of Framing, San Francisco: Jossey-Bass, 1996.
Flood, R., Rethinking the Fifth Discipline, New York: Routledge, 1999.
Flood, R. and Carson, E., Dealing with Complexity: An Introduction to the Theory and Application of Sys-
tems Science, New York: Plenum, 1993.
Flood, R. and Jackson, M., Creative Problem Solving: Total Systems Intervention, London: Wiley, 1991.
Forrester, J., Industrial Dynamics, Cambridge, MA: MIT Press, 1961.
Forrester, J., Collected Papers of Jay W. Forrester, Portland, OR: Productivity Press, 1975.
Friend, J. and Hickling, A., Planning Under Pressure: The Strategic Choice Approach, Oxford, Pergamon,
1987.
Gharajedaghi, J., Systems Thinking: Managing Chaos and Complexity, Boston, MA: Butterworth-Heinemann,
1999.
Gibbons, M., Limoges, C., Nowotny, H., Schwartzman, S., Scott, P., and Trow, M., The New Production
of Knowledge, London: Sage, 1994.
Gibson, J., Scherer, W., and Gibson, J., How to do Systems Analysis, Hoboken: Wiley, 2007.
Graczyk, S. L., “Get with the system: general systems theory for business officials,” School Business Affairs,
59, 1993, pp. 16-20.
Haines, S. G., The Managers Pocket Guide to Systems Thinking, Amherst, MA: HRD Press, 1998.
Hammond, D., Exploring the genealogy of systems thinking. Systems Research and Behavioral Science, vol.
19, no. 5, 2002, pp. 429-439.
Hillier, F. and Lieberman, G., Introduction to Operations Research, 8th ed., New York: McGraw-Hill, 2003.
Hitchkins, D. K., Advanced Systems Thinking, Engineering and Management, Norwood, MA: Artech House, 2003.
Hoefler, B. G., and Mar, B. W., “Systems engineering methodology for engineering planning applica-
tions,” The Journal of Professional Issues in Engineering Education and Practice, 118, 1992, pp. 113-28.
Isaacs, W., Dialogue and the art of thinking, New York: Doubleday, 1999.
Jackson, M., “Beyond a system of systems methodologies,” Journal of the Operational Research Society, vol.
41, no. 8, 1990, pp. 657-668.
Jackson, M., Systems methodology for the management sciences, New York: Plenum Press, 1991.
Jackson, M., Systems Approaches to Management, New York: Kluwer/Plenum, 2000.
Jackson, M., Systems thinking: Creative Holism for Managers, Chichester: Wiley, 2003.
Jaradat, R. M., “Complex system governance requires systems thinking – how to find systems thinkers,”
International Journal of System of Systems Engineering, vol. 6, no. 1/2, 2015, pp. 53-70.
Katina, P. F., “Emerging systems theory–based pathologies for governance of complex systems.” Inter-
national Journal of System of Systems Engineering, vol. 6, no. 1/2, 2015, pp. 144-159.
Katina, P. F., “Systems Theory as a Foundation for Discovery of Pathologies for Complex System Problem
Formulation.” In A. J. Masys (Ed.), Applications of Systems Thinking and Soft Operations Research in
Managing Complexity (pp. 227-267). Geneva, Switzerland: Springer International Publishing, 2016.
Katz, D. and Kahn, R. L., The Social Psychology of Organizations, New York Wiley, 1978.
Keating, C., “Emergence in System of Systems.” In Jamshidi, M. ed. System of Systems Engineering –
Innovations for the 21st Century, Wiley, 2009, pp. 169-190.
Keating, C. B., and Katina, P. F., Systems of systems engineering: prospects and challenges for the emer-
ging field. International Journal of System of Systems Engineering, vol. 2, no. 2/3, 2011, pp. 234-256.
Keating, C. B., and Katina, P. F., Prevalence of pathologies in systems of systems. International Journal of
System of Systems Engineering, vol. 3, no. 3/4, 2012, pp. 243-267.
Keating, C. B., and Katina, P. F., Editorial: Foundational perspectives for the emerging complex system gov-
ernance field. International Journal of System of Systems Engineering, vol. 6, no. 1/2, 2015, pp. 1-14.
314
Systems Thinking
Keating, C., Peterson, W., and Rabadi, G. “Framing of Complex System of Systems Engineering Prob-
lems,” Proceedings of the American Society for Engineering Management. St. Louis, MO, 15-18 October
2003, 2003, pp. 8-15.
Keating, C., Jacobs, D., Sousa-Poza, A., and Pyne, J., “Advancing Sociotechnical Systems Theory,” Pro-
ceedings of the American Society for Engineering Management, 2001, October 11-13, 2001, Huntsville,
AL, 2001, pp. 336-341.
Keating, C., “Research Foundations for System of Systems Engineering,” Proceedings of the IEEE Inter-
national Conference on Systems, Man, and Cybernetics, Waikoloa, Hawaii, October 10-12, 2005,
pp. 2720-2725.
Keating, C., Rogers, R., Unal, R., Dryer, D., Sousa-Poza, A., Safford, R., Peterson, W. and Rabadi, G.,
“System of Systems Engineering,” Engineering Management Journal: Special Issue on Systems Engineer-
ing, vol. 15, no. 3, 2003, pp. 36-45.
Kerzner, H., Project Management: A Systems Approach to Planning, Scheduling and Controlling (10th ed.),
Hoboken, NJ: John Wiley and Sons, 2009.
Kim, D. H., Systems Thinking Tools, Cambridge: Pegasus Communications, 1995.
Klir, G. J., Architecture of Systems Problem Solving, New York:Plenum Press, 1985.
Lane, D. C. and Jackson, M. C., “Only Connect! An annotated bibliography reflecting the breadth and
diversity of Systems Thinking,” Systems Research, vol. 12, no. 3, 1995, pp. 217-228.
Maani, K. and Cavana, R., Systems Thinking and Modelling: Understanding Change and Complexity, Auck-
land: Prentice Hall, 2000.
Mason, R. and I. Mitroff., Challenging Strategic Planning Assumptions. New York, Wiley, 1981.
Maturana, H. R. and Varela, F. J., The Tree of Knowledge: The Biological Roots of Human Understanding.
Boston: Shambhala, 1992.
Meredith, J. and Mantel, S., Project Management – A Managerial Approach, New York: John Wiley &
Sons, 2000.
Midgley, G. Systemic Intervention: Philosophy, Methodology, and Practice. New York: Kluwer/Plenum,
2000.
Midgley, G., Response to paper “Systems thinking” by D. Cabrera et al., “The unification of systems
thinking: Is there gold at the end of the rainbow?” Evaluation and Program Planning, vol. 31, no. 3,
2008, pp. 317-321.
Miller, J. G. Living Systems. New York: McGraw-Hill, 1978.
Mingers, J. and Brocklesby, J., “Multimethodology: Towards a Framework for Mixing Methodologies,”
Omega, vol. 25, no. 5, 1997, pp. 489-509.
Mingers, J., Realising Systems Thinking: Knowledge and Action in Management Science. Canterbury, UK:
Springer, 2006.
Mitroff, I., Smart Thinking for Crazy Times: The Art of Solving the Right Problems. San Francisco, CA:
Berrett-Koehler, 1998.
O’Connor, J., and McDermott, I., The Art of Systems Thinking: Essential Skills for Creativity and Problem
Solving (illustrated edition.), Hammersmith, London: Thorsons, 1997.
Pasmore, W. A., Designing Effective Organizations: The Sociotechnical Systems Perspective. New York: Wiley, 1988.
Pollack, J. “Pyramids or Silos: Alternative Representations of the Systems Thinking Paradigms.” Systemic
Practice and Action Research, vol. 19, no. 4, 2006, pp. 383-398.
Richmond, B., “Systems thinking: critical thinking skills for the 1990s and beyond.” System Dynamics
Review, vol. 9, no. 2, 1993, pp. 113-133.
Richmond, B. The Thinking in Systems Thinking: Seven Essential Skills. Waltham: Pegasus, 2000.
Rittel, H. and Webber, M., “Dilemmas in a General Theory of Planning.” Policy Science, vol. 4, 1973,
pp. 155-169.
Sage, A. Systems Engineering. New York: Wiley, 1992.
Senge, P. M., The Fifth Discipline: The Art and Practices of the Learning Organization. London: Random
House, 1990.
Senge, P. M., Roberts, C., Ross, R. B., Smith, B. J. and Kleinter, A., The Fifth Discipline Fieldbook: Strat-
egies and Tools for Building a Learning Organization. New York: Doubleday, 1994.
315
Engineering Management Handbook
Simon, H., The Sciences of the Artificial. Cambridge, MA: MIT Press, 1969.
Skyttner, L., General Systems Theory: An Introduction. Philadelphia, PA: Trans-Atlantic, 1996.
Sousa-Poza, A., Kovacic, S. and Keating, C., “System of systems engineering: an emerging multidisci-
pline,” Int. J. System of Systems Engineering, vol. 1, no. 1/2, 2008, pp. 1–17.
Taylor, J. C., and Felten, D. F., Performance by Design: Sociotechnical Systems in North America. Englewood
Cliffs, NJ: Prentice-Hall, 1993.
Tracy, L. Leading the Living Organization: Growth Strategies for Management. London: Quorom Books,
1994.
Trist, E. L., and Bamforth, K. W., Some Social and Psychological Consequences of the Longwall Method
of Coal-Getting: An Examination of the Psychological Situation and Defences of a Work Group in
Relation to the Social Structure and Technological Content of the Work System. Human Relations,
vol. 4, no. 1, 1951, pp. 3-38.
Ulrich, W., Critical Heuristics of Social Planning: A New Approach to Practical Philosophy. Berne: Haupt,
1983.
Ulrich, W., Critical Heuristics of Social Systems Design. Critical Systems Thinking: Directed Readings. R.
Flood and M. Jackson. Chichester: Wiley, 1991, pp. 103-115.
von Bertalanffy, L., “The history and status of general systems theory.” Academy of Management Journal,
vol. 15, no. 4, 1972, pp. 407-426.
Waring, A., Practical Systems Thinking. London: Thompson, 1996.
Weick, K., Sensemaking in Organizations. Thousand Oaks, CA: Sage, 1996.
Williams, G., Chaos Theory Tamed. Washington, DC: Joseph Henry Press, 1997.
316
Risk Management
19
Risk Management
C. Ariel Pinto
Old Dominion University
Luna M. Magpili
Washington State University
317
Engineering Management Handbook
19.1 Introduction
- George S. Patton
US Army General (1885 - 1945)
Engineering managers are the leaders toward successful research, development, and engineering activi-
ties. And monuments of these successes abounds—discoveries of drugs that saves millions of lives, taming
and harnessing nuclear power for energy, design and execution of space exploration programs, and count-
less other feats. But within these same realms exist monuments of apparent failures—disastrous chemical
spills, deadly space shuttle launch, catastrophic flood levee failures, and so on. Would have Gen. Patton
considered these failures the result of calculated risks? Or are these failures remnants of human rashness?
At the heart of this section is the science and art of managing risks in engineering systems. Critical to
managing risk is in knowing what it is. Some have described risk as…
“…probability of the occurrence of (the risky) event multiplied by the consequence of the event, given
that it has occurred”
“…are events that if they occur can jeopardize the successful completion of the projects”
– INCOSE
As the preceding descriptions of risk show, an engineering manager must recognize that risk can be
expressed as a number (i.e. quantitative) and also may reside in the minds or feelings of humans (i.e.,
qualitative). Whatever description of risk is adopted by the engineering manager, one thing that is gener-
ally agreed upon is that risk, in itself, is undesirable.
Two distinct terms related to risk are accidents and hazards. Accidents commonly refer to events that
are not intended to happen. As an example, a fender bender between motor vehicles is an accident be-
cause it is generally unintended. In contrast, a fender bender during a demolition derby is not an accident
because it occurs with intent. Hazards usually refer to objects, actions, processes, or condi¬tions that
may contribute toward the occurrence of an accident. A motorist texting while driving is an example of
a hazard. This specific condition of the motorist may contribute toward the occurrence of an accident, a
fender bender. However, note that the existence of the hazard itself does not automatically cause an acci-
dent. Still, the presence of hazards increases the likelihood of an accident occurring. Risk relates these two
concepts together, as characterizing risk is often done in terms of likelihood and consequence.
318
Risk Management
Catastrophic events can be capable of premature and unplanned retirement of a system. In the case of
a levy that was planned to be in operation for 50 years, a catastrophic flood on the first year can prema-
turely cut its affectivity, and the resources put into building the levy would not be recouped. In essence, if
much of the decisions that went into building the system were based only on long-term projections (e.g.,
averages), then the early retirement of a system voids much of these decisions.
(1) Scenario identification starts out by identifying the system of concern, which elements are within our
control and which are not. We then draw a description of the ideal picture when everything about the
system works and operates as planned (what should go right). Correspondingly, we conceptualize the risk
scenarios- what can happen that will prevent the system to work and operate as planned (what can go
wrong). It is important that we consider the system from various points of views (one who owns it, one
who uses it, one who is affected by it, etc.).
We then identify the causes of each possible risk scenario. This is done by looking into events and
conditions that transpire prior to the occurrence of a scenario and their potential role to the occurrence of
the scenario. Establishing what causes accidents, risk scenarios/ risk events, or any type of events in gener-
al can be termed as establishing the causal chain of events. The use of the notion of a chain is a metaphor
for how events form distinct links that together form a continuous span.
The scenario identification activity is meant to answer three primary risk questions:
• What should go right?
• What can go wrong (i.e. risk scenario/ events)?
• What causes the risk scenario/ events?
(2) Consequence estimation and likelihood estimation are based on the risk scenarios that were previously
identified. Also extending the concept of the causal chain of events, we estimate the consequences of each
scenario by looking into other events that may transpire in the aftermath of the identified risk scenario.
Ideally we seek to assess as much of the impact of the many possible outcomes and cascading effects that
can happen.
Likelihood estimation is also based on the scenarios previously identified. Ideally, the frequencies of
the occurrence of each scenario and their causes are estimated, possibly based on the known causal chain
of events. This can be done by looking into the mechanism of the scenarios and the factors that contrib-
ute to their occurrence. Here we can go back to the concepts of hazards and accidents as potential causal
chains. A driver texting (hazard/ causal event) increases the likelihood of a fender bender (risk event). This
activity is meant to answer two primary risk questions:
• What are the consequences of the risk events?
• What is the likelihood of occurrence?
(3) Ranking. At this point, we have a good description of the risks in terms of the risk scenarios, their causes,
consequences and frequency of occurrence. We may decide to take a second look into the list of these scenar-
ios and make distinctions between the more important and less important ones based on their consequence
and frequency, as well as possibilities for their detection, control, and management. The purpose of such
ranking of scenarios is to concentrate our resources on the more important ones that are achievable. It is
320
Risk Management
worth noting that many of these risks are not independent of each other. That addressing one risk may have
a positive (or negative) impact on another risk. This activity is meant to answer the risk question:
• What can be done to detect, control, and manage the risk events?
(4) Generation and tradeoff of alternatives identifies ways and costs to mitigate each of the risk scenarios.
Responses to address risk can be in the form of affecting the causes of a scenario (e.g. safeguard), minimiz-
ing consequences of a scenario, transferring the risks, or a combination of these. In essence, this activity
answers the risk question:
• What are the alternatives to manage the risk events?
(5) Potential problem analysis evaluates the effects of the mitigation alternatives to other elements of the
system. Alternatives are analyzed according to their effects to the functionalities of the system, the man-
ner by which they alter interaction between elements of the system, and their potential to affect future
decisions. This is also the point where the acceptable level of risk is determined, comparing the costs and
benefits of each alternative by answering the risk question:
• What are the effects beyond this particular time?
(6) Implementation, monitoring, and documentation is putting into place recommended actions based on
the perceived acceptable level of risk. There is no clear terminal activity in risk management as it is an
iterative process. As stated in the previous section, it is difficult to totally eliminate risk as new sets of
scenarios come up every time there are changes in the system, the environment, or in the presence of new
information. This activity answers the risk question:
• How well are the risks being managed?
This framework, illustrated in Figure 19.1, was formulated with engineering managers in mind and
with consideration toward perceivable trends in risk management tools and techniques. The following
sections discuss these steps in details.
These desirable scenarios are obviously oversimplified but are representative of various types of objec-
tives for an automotive engine engineering activity representing cost, performance, and schedule goals.
The list of possible causes for cost overrun will be much longer in reality, but for the purpose of ex-
ample, let us assume for now that the list of three causes is an exhaustive list. Several tools and techniques
can be used in establishing causalities of risk scenarios: Preliminary Hazard Analysis (PHA), Job Safety
Analysis (JSA), Failure Mode and Effects Analysis (FMEA), and Fault Tree Analysis (FTA). It should be
noted that the tools below also extend beyond scenario identification and cover the other activities of risk
management namely, consequence and likelihood estimation, ranking, and generation of recommenda-
tions.
322
Risk Management
An example of a PHA worksheet is shown in Table 19.1. The following are the descriptions of col-
umns that correspond to the PHA worksheet shown in Table 19.1.
323
Engineering Management Handbook
(1) Sequence of basic job (2) Potential accident or (3) Control or prevention (4) Person responsible
steps hazards measures
<List the tasks that required <Per task, list the hazards <Per hazard, list the control <Per control measure, identify
to perform the activity in the that could cause injury when measures required to the person responsible to
sequence they are carried the task is performed> eliminate or reduce the risk implement the control or
out> of injury arising from the prevention measures>
hazard>
Shown in Table 19.4 are the common symbols used in FTA. This includes symbols for events and for
Boolean operators or gates.
Consider as an example, the possible causes for the scenario described as Total cost of developing a new
engine exceeds $3M from the previous section. The identified causes can be illustrated using FTA as shown
in Figure 19.2.
325
Engineering Management Handbook
Figure 19.2. Simplified FTA Showing How Causalities of Risk Scenarios Can Be Represented by Events and
Gate Symbols
Total cost of
developing a new
engine exceeds
$3M
OR
data for the frequency of occurrences of fire and manufacturer information on the fire detection, alarm,
and sprinkler system.
P (A) P (B |A )
P ( A|B ) = (19.1)
P (B )
327
Engineering Management Handbook
In this analysis, carefully selected information that helps draw conclusions or evidences are of primary
interest.
The ranking among several scenarios can then be based on this calculated risk measure where high-
er number denotes higher risk. However, it is important to note that there has been counter argument
against this method because of the equivalence that may result from scenario of low likelihood and great
consequence with that of one with great likelihood and low consequence.
A related approach is the use of a risk matrix or risk cube where each scenario is placed on a two-di-
mensional matrix where the axes represent likelihood and consequence, as shown in Table 19.5. In this
example, the estimated consequences are expressed as Severity, which ranges from Negligible to Cata-
strophic, while the likelihood is expressed as Probability, which ranges from Improbable to Frequent. This
example also shows how the ranking can be made, from the lowest, moderate to high risk.
Table 19.5. Example of Risk Matrix to Rank Risk Scenarios Based on Consequence and Likelihood
SEVERITY
Catastrophic Critical Marginal Negligible
Frequent
PROBABILITY
Probable High
Occasional Low Low Medium Medium
Remote
Improbable
328
Risk Management
Table 19.6. Exploratory Questions That Can Be Used to Describe Risk Scenarios
Properties Exploratory questions, and why the property is important in risk ranking.
These concepts are the building blocks of almost any risk mitigation alternatives. Based on these
building blocks, the following questions can be asked to facilitate the generation of alternatives.
• How can vulnerabilities be removed or reduced?
• How can threats be removed or reduced?
• How can consequences be reduced?
• How can consequences be transferred?
Most likely, a risk mitigation alternative will address combinations of the above questions at varying
degrees. It is worth to note that by addressing the vulnerabilities and threats, the likelihood of the risk
scenario is essentially reduced. At this point, one is confronted with the decision to select between the
alternatives. The principle of As Low as Reasonably Practicable (ALARP) is discussed next.
329
Engineering Management Handbook
330
Risk Management
Figure 19.4. Example of Risk Matrix to Rank Risk Scenarios Based on Consequence and Likelihood
If the costs are clearly very high and the reduction in risk is only marginal, then it is likely that the
situation is already ALARP and further improvements are not required. For example, is it worth to spend
$1 million to prevent 1 person in 500 getting a small bruise per year? If the answer is no, then the risk of
injury (bruise) of 1 person in 500 is deemed already low as reasonably practicable (at a level ALARP). The
benefit is not worth the cost and effort. The risk event of the bruise is tolerated. This risk falls in the low
risk acceptable region.
In other circumstances, the improvements may be relatively easy to implement and the risk reduction
is significant: Here, the existing situation is unlikely to be ALARP prior to the improvement, and thus
the improvement is performed (such is the case with the bicycle helmet example). In many of these cases,
a decision can be reached without further analysis. The difficulty is when the risk falls between the upper
and lower limits, the tolerable region, when the difference between the risk and the benefit are not grossly
disproportionate.
Comparative analysis tools such as those identified in the next section have been used to sup-
port these types of ALARP decisions. Decision-making models are also useful for supporting ALARP.
Multi-criteria decision making (MCDM) or multi-criteria decision analysis (MCDA) considers multiple
criteria other than cost. MCDM and MCDA are able to integrate factors that need not be assigned cost
valuations such as human life or environmental degradation. It allows criteria to preserve its intrinsic unit
of measure (e.g., mortality rate, pollution level). Nonetheless, even if cost conversion is circumvented, the
exercise of valuation (e.g., quantifying life) still exists in many decision-making models.
• Health-health analysis (HHA) (also known as wealth-health analysis) attempts to capture the complex
relationship between induced changes in personal disposable income that result from regulation or
policy and their public health consequences.
• Benefit-cost analysis (BCA) attempts to measure both benefits and costs connected to all consequences of
decision alternatives. Usually, monetary values are used as common metrics for both costs and benefits.
• Cost-effectiveness analysis (CEA) is similar in scope to BCA but measures nonmonetary consequences
in physical indicators.
The following table adapted from Hofstetter et al. (2002) shows when one tool may be more appro-
priate over the other.
A particularly useful concept in risk management built into AHP is the marginal rate of substitu-
tion—essentially showed by the old adage “How much apple is an orange worth for you?” Through the
compensatory natures of AHP, engineering managers are compelled to express utility or preference and
enable them to adopt the otherwise extrinsic objectives, essentially confronting the conflict in the choice
situation by allowing them to trade off a low value dimension for a high value dimension.
332
Risk Management
Aside from the original risk scenario, which prompts the whole decision process (aka target risk) often
reflected by the main objective (e.g., minimize public risks to WNV), there maybe two other types of
unintended risk scenarios:
1. Countervailing risk—The risk (i.e., undesirable effect) that arises from the action of managing the
target risk (e.g., increase in health risks due to traffic accidents and pollution).
2. Synergistic effect—Desirable consequence of managing risk other than reducing the target risk (e.g.,
reduction in crime rate at certain hours).
3. Sensitivity and accuracy of quantitative results—Many quantitative tools in risk assessment (e.g.,
statistical analyses packages) may express numerical to a level of accuracy that is not expressive of the
inherent uncertainty of a particular risk scenario.
4. Intersection of knowledge domains and RM—Because the ripple effect of decision in risk manage-
ment transcends time and system boundaries, effective risk mitigation actions usually involves a
multi- and cross-disciplinary approaches.
5. Stove-piped RM processes—Engineering managers must be concerned not to perform risk man-
agement subject to the artificial constraints placed by organizational, cultural, political, or technical
boundaries; e.g., managing what is initially viewed as purely technical risk will most likely involve
some financial and socio-political risk.
6. Proper use of ordinal and cardinal values; many tools and techniques in risk assessment commits the
sin of adding and comparing ordinal numbers (e.g., adding ranks). Even though this sin is usually
acceptable to some degree of analysis, the engineering manager needs to be aware of the limitation
and possible pitfalls of these actions.
7. Symmetry between measures of probability and consequence—In the simplest form of expressing
risk as a direct mathematical product of consequence and probability resulting to a unit-less number,
the engineering manager should keep in mind the apparent lack of symmetry between the two, e.g.,
probability ranges from 0 to 1 while consequence ranges from $0 to theoretically $∞.
8. Other (elusive) properties of risk aside from probability and consequence—Related to the previous is-
sue, risk has properties that can be difficult to express quantitatively, much less be contained in either
probability and monetary consequences, e.g., social and cultural properties.
9. RM results are only as good as the analyst—Many risk assessment results may be expressed in
numbers particularly in quantitative risk assessment. However, the high degree of uncertainty and
cross-disciplinary nature of risk places considerable importance on the analyst as much as on the tools
and techniques that may have been used.
10. Choice of model and procedures—Similar to the previous issue, the proliferation of tools and meth-
ods in managing risks results to a lack of de facto standards. Thus, the engineering manager needs to
be aware of the chosen models and procedure and their suitability for the risk scenario at hand.
11. Multiple Stakeholders—Because risk transcends time and system boundaries, there are likely more
than one significant stakeholder who most likely equates to differences in their respective risk concep-
tion, objectives and behavior. These differences have to be recognized in generating alternatives and
tradeoff analysis and the potential for a suboptimal solution.
12. Multiple risk management processes—One very important purpose of monitoring and documenta-
tion in risk management is to be able to review the process at each step of managing risk. The wide
choice of tools and techniques in risk management, each with their own strengths and weaknesses,
may result to an after-the-fact realization of the omission or exaggeration of some risks. Good mon-
itoring and documentation hopefully will result to an early diagnosis of such cases and enabling the
engineering manager to avoid its recurrence.
334
Risk Management
Importance to Engineering
Topic References
Managers
Risk-based For cases where financial Pinto, A.C., Arora, A., Hall, D., Schmitz, E., Challenges
economic and economic evaluation of to Sustainable Risk Management: Case Example in
evaluation alternatives are critical to Information Network Security. Engineering Management
decisions Journal, vol. 18, no. 1, March 2006.
19.9 References
Castillo, E., Extreme Value Theory in Engineering, San Diego: Academic Press, 1988.
Conrow, Edmund H., “Risk Management for Systems of Systems,” Journal of Defense Risk-Software Engin-
eering, Feb. 2005.
Conrow, Edmund H., “Risk Rant: The top 10 risk analysis issues and why they are important to you,”
Risk Management Intelligence Network, June 2, 2004.
Haimes, Y. Y., Kaplan, S., and Lambert, J. H., Risk filtering, ranking, and management framework using
hierarchical holographic modeling. Risk Analysis, vol. 22, no. 2, 2002, pp. 381-395.
Haimes, Yacov, Risk Assessment, Modeling, and Management, Second Edition, Hoboken, NJ: Wiley—Inter-
science, 2004.
Hofstetter, P. et al., “Tools for Comparative Analysis of Alternatives: Competing or Complementary Per-
spectives?” Risk Analysis, vol. 22, no. 5, 2002, pp. 833-851.
Pinto, C. A., and Garvey, P. R., Advanced Topics in Risk Analysis for Engineering Complex and Enterprise
Systems (Series: Complex and Enterprise Systems Engineering), Taylor & Francis LLC, 2012.
Pinto C. A., Magpili, L. M., Jaradat, R., Operational Risk Management: A Systems Approach, Momentum
Press, 2015.
335
336
What is Quality Management?
20
What is Quality Management?
T. Steven Cotter
Old Dominion University
Brian J. Galli
Long Island University
Patrick Kush
Metropolitan State University
337
Engineering Management Handbook
To address these deficiencies, organizations created quality control departments with separate quality
management and engineering functions. In turn, creation of Quality Control departments led to the ne-
cessity for establishment of quality standards and procedures, engineering planning of sampling systems,
training quality inspectors and auditors on required sampling practices, gathering and analyzing quality
data, and calibration and control of measuring equipment. For W. Edwards Deming (1982), Armand
338
What is Quality Management?
Feigenbaum (1951, 1961), Joseph Juran and Frank Gryna (1970) and other quality leaders the focus now
turned to the effective management of the quality system.
Armand Feigenbaum, manager of worldwide manufacturing operations and quality control for the
General Electric Company, published his approach to total quality control in his 1951 book Quality Con-
trol: Principles, Practice, and Administration (later retitled Total Quality Control). For Feigenbaum, total
quality control meant that quality was used as a strategic business tool, which required participation by
the whole organization. He emphasized continuous quality leadership with planning, maintenance, and
improvement of customer-oriented quality activities. His book was the first to characterize quality costs
as the costs of prevention, appraisal, and internal and external failure.
Whereas Feigenbaum focused on manufacturing operations, Deming (1982) viewed quality as the
primary driver for business success and broader societal improvement. Deming advocated his 14 Points
for Management as the basis for transforming the competitiveness of American industry.
1. Create constancy of purpose toward improvement.
2. Adopt a new philosophy; recognize that we are in a time of change, a new economic age.
3. Cease reliance on mass inspection to improve quality.
4. End the practice of awarding business on the basis of price alone.
5. Improve constantly and forever the system of production and service.
6. Institute training.
7. Improve leadership, recognize that the aim of supervision is help people and equipment to do a better
job.
8. Drive out fear.
9. Break down barriers between departments.
10. Eliminate slogans and targets for the workforce such as zero defects.
11. Eliminate work standards.
12. Remove barriers that rob workers of the right to pride in the quality of their work.
13. Institute a vigorous program of education and self-improvement.
14. Put everyone to work to accomplish the transformation.
Deming set forth a “System of Profound Knowledge” as the theory of effective management thought
and action that can be applied by any leader seeking to transform and create a thriving organization.
• Appreciation of a system—Managers must have an understanding of the overall interrelated processes
involving suppliers, producers, and customers of goods and services.
• Knowledge of variation—The set of attribute causes, range of variation in measurable quality, and the
use of statistical sampling in measurements. Actions must be based on the source of variation: special
and assignable causes versus common or random causes.
• Theory of knowledge—The concepts underlying the current state of knowledge and the limits of that
knowledge. If no learning has occurred, there can be no theories for prediction.
• Knowledge of psychology—Understanding the variation in human capabilities and needs and the
bounds of human nature.
Juran and Gryna (1970) focused on quality training and education for management and defined
quality in terms of the tradeoff between:
• Income—Product features that produce income by meeting customer needs. Under this view, higher
quality yields higher prices.
• Cost—Product performance deficiencies and failures that result in not meeting customer needs. Un-
der this view, higher quality costs less.
Juran and Gryna defined three basic quality management processes required to balance the Income/
Cost tradeoff; quality planning, quality control, and quality improvement. Juran’s quality planning
roadmap for new product or revisions consists of (1) establishing quality goals, (2) determining those
goals that impact customers, (3) identifying customer needs, (4) designing product features, (5) devel-
oping process capabilities, and (6) establishing and transferring process controls to operations. Quality
339
Engineering Management Handbook
control is implemented at all organizational levels to (1) measure process performance, (2) compare
performance to goal, and (3) take action on gaps between actual performance and goals. Quality
improvement is implemented on a project-by-project basis through (1) identifying the quality improve-
ment need, (2) specifying projects to address needs, and (3) organizing and managing project teams.
Quality improvement is accomplished through project teams by (1) verifying the project need and
mission, (2) diagnosing root causes of failure, (3) developing remedies and proving their effectiveness,
(4) dealing with organization resistance to change, and (5) instituting controls to hold gains. Quality
planning, control, and improvement occurs recursively at the strategic, operational, and workforce
levels through the following management responsibilities:
• Creating awareness of the need and opportunity for improvement
• Making quality improvement part of every job description
• Creating an organizational quality infrastructure
• Providing training in quality improvement methods
• Regularly reviewing improvement progress
• Giving recognition to improvement teams
• Publicizing results to reinforce efforts
• Revising the reward system to reinforce improvement
• Maintaining momentum by including quality improvement goals in business plans
The quality management principles of Feigenbaum (1951), Deming (1982), and Juran and Gryna
(1970) (as well as Philip B. Crosby, Kaoru Ishikawa, and other quality management researchers) were
first integrated into an organization-wide effort through Total Quality Management (TQM). In the
spring of 1984, the Navy Material Command tasked the Navy Personnel Research and Development
Center to assess the application of statistical process control and the works of prominent quality
management researchers with the objective of making recommendations as to how to apply their
approaches to improve the Navy’s operational effectiveness. The recommendation was to adopt the
teachings of W. Edwards Deming. After significant quality improvements on first tests, the approach
was extended to other Navy operations. In 1985, the approach was labeled as Total Quality Manage-
ment. In 1990, the Chief of Naval Operations renamed the approach to Total Quality Leadership to
emphasize the importance of leadership in quality improvement. TQM is a customer-focused man-
agement system that involves all employees in continual improvement. It integrates quality discipline
into the organizational culture through strategy, data, and effective communications. The primary
elements of TQM are:
• Customer focus—Customer expectations, needs, and requirements ultimately determine the required
quality levels
• Total employee involvement—Participation of all employees toward common quality goals
• Process-centered—The process activities and performance measures needed to continuously monitor
for and detect unexpected variation
• Integrated system—Linking the interconnecting horizontal productive functions within the function-
al hierarchy
• Strategic and systematic approach—Continually defining and redefining the organization’s quality
vision, mission, and goals
• Continual improvement—Drives analytical and creative ways to become more competitive and more
effective at meeting customer requirements and stakeholder expectations
• Fact-based decision making—Continually collecting and analyzing data in order to improve decision
making accuracy, achieve consensus, and allow prediction based on past history
• Communications—Use communications to maintain morale and motivate employees toward the
quality vision during organizational change
TQM spread from the Navy throughout the United States Federal Government, to the United States
commercial and industrial sectors, and to Western Europe. Commercial and industrial businesses used
TQM principles for competitive leverage in bids for contracts with the United States Federal Government
340
What is Quality Management?
and as a means of recapturing market share from Japanese companies. In the United States, TQM was
used widely in the 1980s and 1990s until the ISO 9001 and Lean Six Sigma quality movements replaced
it. European governments and businesses continued to apply TQM widely until about 2010. TQM is
still supported through the non-profit organization European Foundation for Quality Management.
Prior to 1987, there was no accepted international quality management standard. Each country de-
veloped its own standard. The United States had no national quality management standard. Depending
on contractual requirements, suppliers to the Department of Defense may have been required to conform
to MIL-Q-9858A, Quality Program Requirements, or MIL-I-45208A, Inspection System Requirements.
Likewise, depending on contractual requirements and industry sectors, large corporations developed
and required supplier conformance to their respective quality program requirements. MIL-Q-9858 was
the basis for the NATO Allied Quality Assurance Publications (AQAP) series issued in 1969 and for the
United Kingdom BS 5179, Guide to the Operation and Evaluation of Quality Assurance Systems, released in
1974. BS 5179 was revised into BS 5750, Quality Systems, and released in 1979.
In 1982, the British government produced a white paper entitled “Standards, Quality and Interna-
tional Competitiveness,” proposing the concept of international certification to a single quality man-
agement standard. This led to work within the International Organization for Standardization to the
development of ISO 9000:1987, Quality management systems, which had the same structure as BS 5750.
ISO 9000:1987 set forth three quality management system models based on the organizational scope of
activities to be certified: (1) 9001 model for quality assurance in design, development, production, instal-
lation, and servicing; (2) 9002 model for production, installation, and servicing; and (3) model for quality
assurance in final inspection and test. ISO 9001:1987 was composed of 20 clauses (evolved from BS
5750) oriented toward documenting the quality manual and the processes of typical manufacturing orga-
nizations and on conformity to those procedures rather than the overall process of quality management.
This structure made the 1987 version difficult to implement by governmental, health, service and software
organizations. ISO 9000:1994 attempted to correct this difficulty by emphasizing quality assurance, but
it continued to require evidence of conformance to documented procedures.
This difficulty with its manufacturing orientation led to the establishment of ISO Working Group 18
that was responsible for revising and drafting ISO 9000:2000 series of standard. The 2000 series focused
on process quality management with goals of assessing (1) management system effectiveness through
process performance metrics and (2) customer satisfaction through external feedback metrics. It was
comprised of three standards:
1. ISO 9000:2000, Quality management systems – Fundamentals and vocabulary
2. ISO 9001:2000, Quality management systems – Requirements
3. ISO 9004:2000, Quality management systems – Guidelines for performance improvements
The ISO 9000 standard set forth eight quality management principles designed to be a foundation for
quality management systems across diverse organizations.
• Customer focus—Understands current and future customer needs, meets customer requirements, and
strives to exceed customer expectations
• Leadership—Provides unity of purpose and direction
• Involvement of people—Enables employee’s abilities for the organization’s benefit
• Process approach—Manage activities and related resources as process
• System approach to management—Identifies, understands, and manage interrelated processes as a
system
• Continual improvement—Improves the organization’s overall performance as a permanent objective
• Factual approaches to decision-making—Bases effective decisions on analysis of data and information
• Mutually beneficial supplier relationships—Enhances the ability of interdependent suppliers and
organizations to create value
The following roles are specified for top management within the quality management system:
• Establish and maintain the quality policy and quality objectives
• Promote the quality policy and objectives to increase awareness, motivation, and involvement
341
Engineering Management Handbook
ISO 9001-2000 is the requirements standard to which organizations may seek certification. It sets for
the quality management systems requirements in the following sections:
0 Introduction
1 Scope
2 Normative reference
3 Terms and definitions
4 Quality management system
4.1 General requirements
4.2 Documentation
5 Management responsibility
5.1 Management commitment
5.2 Customer focus
5.3 Quality policy
5.4 Planning
5.5 Responsibility, authority and communication
5.6 Management review
6 Resource management
6.1 Provision for resources
6.2 Human resources
6.3 Infrastructure
6.4 Work environment
7 Product realization
7.1 Planning of product realization
7.2 Customer-related processes
7.3 Design and development
7.4 Purchasing
7.5 Production and service provision
7.6 Control and monitoring of measuring devices
8 Measurement, analysis, and improvement
8.1 General
8.2 Monitoring and measuring
8.3 Control of nonconforming product
8.4 Analysis of data
8.5 Improvement
Under ISO 9001:2000 clause 1.2, Application, an organization with no design and development
activities may seek exclusion from section 7.3 with it registrar.
The fourth edition of ISO 9001:2008 specified only minor amendments and clarified existing re-
quirements to improve consistency of approach with other management standards, like ISO 14001:2004,
Environmental management systems. ISO 9001:2008 added the following three notes clarifying the
requirements for control of outsourced processes.
342
What is Quality Management?
NOTE 1: Processes needed for the quality management system referred to above include processes for
management activities, provision of resources, product realization, measurement, analysis and improve-
ment.
NOTE 2: an “outsourced process” is a process that the organization needs for its quality management
system and which the organization chooses to have performed by an external party.
NOTE 3: Ensuring control over outsourced processes does not absolve the organization of the respon-
sibility of conformity to all customers, statutory and regulatory requirements. The type and extent of
control to be applied to the outsourced process can be influenced by factors such as:
a. The potential impact of the outsourced process on the organization’s capability to provide product
that conforms to requirements,
b. The degree to which the control for the process is shared,
c. The capability of achieving the necessary control through the application of 7.4.
The ISO 9001:2015 revision was intended to update the standard to the common management
system framework required by Appendix 3 of ISO/IEC Directives, Part 1 Annex SL and to increase its
relevance to service industries and office environments. Its quality management system requirements were
revised into the following sections.
0 Introduction
1 Scope
2 Normative reference
3 Terms and definitions
4 Context of the organization
4.1 Understanding the organization and its context
4.2 Needs and expectations
4.3 Scope
4.4 Management system
5 Leadership
5.1 Management commitment
5.2 Commitment
5.3 Roles, responsibility, and authority
6 Planning
6.1 Actions to address risks and opportunities
6.2 Objectives and plans to achieve them
7 Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communications
7.5 Documented information
8 Operations
8.1 Operational planning and control
9 Performance evaluations
9.1 Monitoring, measurement, analysis, and evaluation
9.2 Internal audit
9.3 Management review
10 Improvement
10.1 Nonconformity and corrective action
10.2 Improvement
Key changes include an emphasis on preventive action through risk-based management, achieving
value for the organization and its customers, responsiveness to the business environment, and enhanced
leadership requirements. There is a decreased emphasis on documents and records, but the standard
343
Engineering Management Handbook
expands the concept of documentation. Outsourcing was respecified as “external provision,” and the
requirements for a quality manual and management representative were deleted.
Because the ISO 9000 series of standards are very general in their language, its sections must be
carefully interpreted within each organization’s business context. As a result, various industry sectors have
created their own standardized quality management systems standards to ensure critical industry-specific
issues were addressed and to ensure assessment and certification by appropriately trained and experienced
auditors.
• AS9100 – Aerospace Basic Quality System Standard is an interpretation developed by major aerospace
manufacturers. AS9100 replaces the earlier AS9000 and fully incorporates the entirety of the current
version of ISO 9000. It adds quality and safety requirements unique to the aerospace industry.
• HS1-A2 Quality System Model for Healthcare establishes standards for policies and procedures for the
care of patients in clinics and hospitals.
• ISO 13485:2003 Medical Devices – Quality Management Systems – Requirements for Regulatory Pur-
poses. The primary objective of ISO 13485:2003 is to harmonize medical device regulatory require-
ments for quality management systems. As such, it includes some particular requirements for medical
devices and excludes some of the requirements of ISO 9001 that are not appropriate as regulatory
requirements.
• ISO/IEC 90003:2004 Software Engineering – Guidelines for the Application of ISO 9001:2000 to
Computer Software. ISO/IEC 90003:2004 sets forth guidelines for organizations in the application
of ISO 9001:2000 to the acquisition, supply, development, operation and maintenance of comput-
er software and related support services. These guidelines are not intended to be used as assessment
criteria in software quality management system registration or certification. The application of ISO/
IEC 90003:2004 is appropriate to software that is:
• Part of a commercial contract with another organization
• An independent product available for a market sector
• A product that is used to support organizational processes
• Embedded in a hardware productDelivery of software services
Additional software management guidance is found in the ISO/IEC JTC 1/SC 7 software engineer-
ing standards.
• ISO 15189 Medical Laboratories – Particular Requirements for Quality and Competence specifies the
quality management system for medical laboratories. The standard sets forth requirements for labora-
tory service, the collection of patient samples, the interpretation of test results, acceptable turnaround
times, how testing is to be provided in a medical emergency and the lab’s role in the education and
training of health care staff.
• ISO/TS 16949:2009 Quality Management Systems – Particular Requirements for the Application of ISO
9001:2008 for Automotive Production and Relevant Service Part Organizations. ISO/TS 16949:2009
replaced the QS9000 series of standards. Its primary focus in on managing the automotive supply
chain to identify problems and risks, eliminate root causes, and assess effectiveness of preventive and
corrective actions.
• IWA-1:2005 Quality Management Systems – Guidelines for Process Improvements in Health Service Or-
ganizations. This standard sets forth additional guidance for health service organizations involved in
the management, delivery, or administration of health service products or services, including training
and research in the life continuum process for human beings.
• TL 9000: Quality Management System Requirements for Telecommunications. TL 9000 encompasses
the ISO 9001 standard verbatim, plus additional telecommunications industry-specific requirements.
TL 9000 specifications are set forth in two documents:
• TL 9000 Requirements Handbook, release 5.5, which includes the full text of ISO 9001:2008
• TL 9000 Measurements Handbook, release 5.0
Whereas the above quality management systems standards specify minimum requirements, the
Malcolm Baldrige National Quality Award (MVNQA) for private-sector organizations and the Baldrige
National Quality Program (BNQP) for governmental and military organizations specify standards for
344
What is Quality Management?
organizational excellence. The MBNQA was established by the U.S. Congress in 1987 to raise awareness
of quality management and recognize U.S. companies that have implemented successful quality man-
agement systems. Awards can be given annually in six categories: manufacturing, service, small business,
education, healthcare and nonprofit. As a quality management system model, the MBNQA criteria are
specified in seven sections.
1. Leadership—Examines how effectively an organization’s management guides and sustains the organi-
zation and how it addresses ethical, legal, and community stakeholder responsibilities
2. Strategic planning—Examines how the organization develops competitive strategy, sets strategic objec-
tives, and implements action plans to achieve those objectives
3. Customer and market focus—Examines how the organization determines customer expectations, pref-
erences, and requirements and how the organization builds customer relationships
4. Measurement, analysis, and knowledge management—Examines how the organization identifies, gath-
ers, selects, analyzes, manages, and improves its data, information, and knowledge assets
5. Human resource focus—Examines how the organization promotes employee learning and motivation
and establishes work systems to enable employees to utilize their full potential in alignment with the
organization’s strategic objectives
6. Process management—Examines the organization’s product, service, and business processes ability to
generate value
7. Business results—Examines the organization’s performance and improvement outcomes in leadership
and social responsibility, human resource results, operational performance, product and service quali-
ty, customer satisfaction, and financial and marketplace performance
Similar national quality awards that can be used as quality management system models include the
European Quality Award and the Deming Prize and the Shingo Prize for Excellence in Manufacturing, the
latter two in Japan.
Identify Customer Information. The first step in quality planning is to identify the customers of the
product, service, or project. A “customer” is any person, who or organization that, is affected or impact-
ed by the product, service, or project’s benefits or costs. In this broader sense, customers include end
users, retailers and wholesalers, logistics personnel, service personnel, production personnel, and support
personnel, the latter three of which may belong to the organization and participate in production and
delivery of the product, service, or project. Where customers are numerous, it is often helpful to apply
the Pareto principle to classify customers into the categories of the vital few and the useful many. The
vital few customers experience the majority of the benefits or incur the majority of the cost. Conversely,
the useful many are affected only marginally by benefits or costs.
Once customers are identified, an information base must be established for each customer. The
information base should be designed to collect solicited and unsolicited, qualitative and quantitative,
and structured and random customer information. Structured information may include prior internal
sales and complaint or warranty reports, customer tests production reports, quality reports, or external
surveys, trade reports, standards organizations reports, governmental reports, and public legal documents.
Random information may include trade visit reports, customer contact reports, consultant reports, con-
vention proceedings, trade journal articles, trade show lists, vendor and supplier surveys, and employee
training files.
345
Engineering Management Handbook
Determine Customer Needs. Step two is to solicit customer expectations, needs, and requirements and
combine these with acquired customer information to develop a complete view of how customer will in-
teract with the product or service and the benefits they expect to attain. The fundamental problem is that
customers state their needs in their language from their viewpoint. Real quality needs (the eight value
dimensions) most usually differs from stated needs, and actual customer use (and misuse) of products and
services may differ from suppliers’ intended use. Typical methods of discovering customer needs include:
• Communicating with customers
• Interacting with designs from the customer’s perspectives
• Cause and effect matrix
• Quality function deployment
• Simulating customers’ needs
Some customers (especially internal customers) may resist the introduction of new product, process,
or service features, because they feel those features carry undesirable social or physical consequences or
require additional learning or effort on their part. Overcoming resistance to change may involve any
combination of these tactics: (1) Get customers to participate in making the change. (2) Understand and
address personal concerns behind the resistance to change. (3) Link the change to positive benefits valued
by customers. (4) Demonstrate how the new benefits offset current or potential loss or inefficiencies. (5)
Understand the “blind spots” in supplier understanding of customer needs. (6) Tailor information about
new product or service features to customers’ expectations. (7) Sell the change to an influential group
within the customer base and help them spread the change. (8) Communicate the benefits of change in
concrete and local terms. (9) Appeal to the whole brain—provide emotional as well as technical informa-
tion about the change. (10) Provide only relevant information to help customers accept the change; do
not overload customers with too much change information. (11) Most important, be fully knowledgeable
about the pros and cons of the proposed change.
Translate Customer Needs into the Supplier’s Language. The language used by customers to express
expectations, needs, and requirements is usually vague and often expressed in terms of multiple dialects;
performance, dependability, purchasing, managerial, industry standards, legal, etc. It is essential to
translate multiple customer dialects into the supplier’s design language. The following tools assist in this
translation:
• A design glossary of key terms and their agreed definitions for each
• A samples library for product sensory features
• Internal or external standards
• Standard measurement systems that specify units of measure, valid range of measurement, and the
means of measurement
• Design specialists with expertise in translating customer requirements
Product Development. Determine the product features and functions necessary to meet translated
customer expectations, needs, and requirements given constraints of customer abilities, suppliers and
internal production capabilities and capacities, technical, socio-technical, political, and legal/regulatory
environments. Quality planning is initiated in parallel to establish quality goals for each of the eight qual-
ity dimensions and specify sampling points in the process, inspection and test methods, sampling plans,
statistical quality controls, quality training and certification requirements, and product handling controls.
Multiple tools are applied to guide quality planning. Criticality analysis is applied to identify the “vital
few” product functions and features along the eight quality dimensions that determine the core product
benefits. Competitive analysis compares proposed design features and functions to those in existing and
expected future competitors’ products. Stability analysis attempts to establish the relationships between
product features and functions and actual performance in satisfying customer expectations, needs, and
requirements. Customer behavior analysis studies which current similar products customers purchase and
do not purchase and the reasons behind their purchase decisions. Marketing research seeks to understand
customer perceptions and opinions of proposed product features and functions. Value analysis summariz-
346
What is Quality Management?
es the prior information in the form benefit/cost ratios that measure the per-unit cost of various combina-
tions of product features and functions.
Optimize Product Design. The set of optimum designs is determined by each design’s benefit/cost ratio.
That is, the efficient benefit/cost design frontier is identified by those designs that maximize benefits of
varying levels of feature-functionality combinations per varying units of costs of delivering those features
and functionality. Suboptimal benefit/cost designs are eliminated. The design question then becomes
where along the efficient design frontier to select the combination of product features and functionality
that meet or exceed customer expectations, needs, and requirements versus the price (cost + profit) that
the customer is willing pay. For some products, there may be benefit/cost break points that define differ-
ent product categories (economy, standard, deluxe; low, medium, high performance; etc.). Quality plan-
ning adjusts quality goals for each of the eight quality dimensions, inspection and test methods, sampling
plans, statistical process controls, quality training and certification requirements, and product handling
controls to align with the selected optimized benefit/cost ratio design(s).
Process Development. Process development is the set of activities required to provide production ac-
tivities with the means of delivering the selected benefit/cost optimized product design(s). For process
engineering, the end result of process development includes:
1. The process design of (a) physical production facilities, (b) associated computer information and con-
trol hardware and software, and (c) configuration controlled information on the procedures needed to
operate, control, and maintain the physical facilities.
2. Identification and acquisition of the technologies necessary to realize the physical production facili-
ties, control systems, and information systems.
In this phase, quality planning refocuses to process control—the means of establishing and maintain-
ing the process in a planned stable and capable state. Critical process steps are identified first. A process
step is critical if it poses large risks to human safety, environmental impacts, or suboptimization the se-
lected product design(s) benefit/cost ratio(s). The following features may be built into the process control
systems to minimize identified risks:
• Selection, training, and qualification of control personnel
• Redundancy in various elements of process control feedback loops
• Independent audits to assure compliance with procedures and specifications
• Critical incident analyses with a focus on identifying and eliminating root causes of failures
For each inspection or sampling point in the process, control planning involves:
• Identifying the product characteristic (feature or functionality) to be controlled
• Setting the unit of measure
• Establishing the target, variance, stability, and capability goals
• Specifying the measurement sensor with sufficient capability of evaluating actual performance in the
specified unit of measure
• Specifying the standard for actual performance
• Specifying interpretation(s) and action(s) for observed difference(s) between actual and goal
Transfer to Operations. Transfer to operations, the final step in quality planning, involves validating
quality control and process control plans, finalizing quality procedures, and shifting responsibility to pro-
duction personnel. Three major activities must be completed:
• Proof of process control and stability under standard operating conditions including measurement
system repeatability and reproducibility, validation of functional relationships between process vari-
ables and product features and functionality, verification of type I and type II sampling and control
chart risks, and maintainability
• Proof of process stability and capability under standard operating conditions starting with small-scale
pilot runs and concluding with full-scale production
347
Engineering Management Handbook
• Transfer of quality knowledge in the form of training verification on process specifications and proce-
dures, control procedures, and accuracy of quality information
Quality process audits are independent evaluations of an individual process or set of processes for
adherence to specifications and procedures and the effectiveness of process controls. Process audit scope
and activities include:
• Effectiveness of the selection, training, and qualification of control personnel
• Estimating process quality levels achieved
• Evaluating the effectiveness of process control information and process control decisions to maintain
process stability and capability
• Evaluating the robustness of redundant feedback control loops
• Evaluating the effectiveness of critical incident analysis in mitigating or eliminating the root causes of
process and product failures
Quality product audits are independent evaluations of product quality to determine conformance to
specification and fitness for use. Product audits are conducted after inspection points in the process and
from finished goods. Product audit scope and activities include:
• Effectiveness of the selection, training, and qualification of production and inspection personnel
• Estimating in-process product quality conformance to specifications
• Estimating finished goods fitness for use to customer expectations, needs, and requirements and
maintenance of efficient benefit/cost designs
• Effectiveness of material handling procedures in preventing handling damage and storage environ-
ments in preventing deterioration
348
What is Quality Management?
Quality surveys collect information on customers, employees, and stakeholders’ perceptions of organi-
zational quality standing, opportunities for improvement, and unexpected threats to its quality standing.
Quality surveys may assess:
• The quality standing in the marketplace relative to competitors
• End users’ fit for use experience with respect to product performance and cost over the life of the product
• Opportunities for reducing costs of poor quality, improving the product performance/cost ratio, or
developing new product quality attributes and characteristics
• Future product design and development quality issues
• Challenges to top management with respect to quality policies, goals, objectives, premises, and axi-
omatic beliefs
• Employee perceptions of training, quality of work life, process performance, and product quality
Quality surveys can be developed by outside professional survey organizations or from published cri-
teria such as the Malcolm Baldrige National Quality Award or other national quality award criteria, or ISO
or other international or national quality management standards.
Statistical quality control (SQC) and statistical process control (SPC) are the application of statistical
methods to collect, analyze, and mathematically determine product quality levels and process stability and
capability. SQC and SPC involve data collection, summary into statistics, analysis relative to statistical
limits, and the reporting of product and process attributes and characteristics quality levels, aggregate
product quality levels, and aggregate process stability and capability.
Benchmarking, Lean, and Six Sigma are specific methodologies for implementing CQI.
• FADE – Focus, Analyze, Develop, Execute/Evaluate is a quality improvement cycle that is part of the
Organizational Dynamics’ Quality Action Team approach to total quality management. FADE was
based on the PDCA and has much in common with Six Sigma DMAIC. The FADE improvement
cycle is as follows:
• Focus—Define the process to be improved or the process to be addressed
• Analyze—Collect and analyze data to establish baselines, identify root causes, and point toward
possible solutions
• Develop—Develop action plans for improvement, including implementation, communication,
and measuring/monitoring
• Execute/Evaluate—Implement the action plans and ongoing measuring/monitoring of the system
to ensure success
• TQM – Total Quality Management, discussed under A Brief History of Quality Management, was a
quality management philosophy that attempted to install organization-wide efforts to make perma-
nent a climate in which an organization continuously improved its ability to deliver high-quality
products and services to customers. The TQM improvement model, largely based on the PDCA
cycle, was implemented in the following steps.
• Customer focus—Customers exist both outside and within the organization. Understand cus-
tomer expectations and needs as well as stated requirements. Focus on delivering combinations
of expectation-needs-requirements fulfillment that translates into customer satisfaction.
• Planning process—TQM requires the organization to analyze and evaluate customers’
expectation, needs, and requirements to determine the best approach to meet them. TQM
strategic planning prioritizes and focuses process planning around customers’ expectations,
needs, and requirements and puts plans into place to fulfill them, to predict business envi-
ronment changes that impact customers, and position the organization to develop an edge
that differentiates it from its competitors. The final product and goal of the organization is
creating value for consumers.
• Process management—TQM views an organization as a collection of processes and maintains
that organizations must strive to continuously improve these processes by incorporating the
knowledge and experiences of workers.
• Process improvement—Continuous process improvement must be based on analysis of data
and facts but allow human creativity to find more effective and competitive products that
fulfill customers’ expectations, needs, and requirements.
• Total participation—Customer satisfaction requires total employee involvement with all
employees working toward common quality goals.
• Lean Six Sigma—Six Sigma is a set of techniques and tools embedded in the process
improvement model. It was developed by Motorola in 1986 to address increasing defect rates
with continued microchip circuitry miniaturization. Six Sigma seeks to improve process and product
quality by identifying and removing the causes of defects and by minimizing variability
in manufacturing and business processes through application of empirical statistical methods.
Six Sigma seeks to create deep process improvement knowledge through a special infrastructure of
experts within the organization known as Champions, Black Belts, and Green Belts. The Lean
process improvement methodology was added to Six Sigma to address short- to medium-term proj-
ects not requiring empirical statistical methods. Lean Six Sigma quality improvement is achieved by a
sequence of projects that follow the Define, Measure, Analyze, Improve, and Control (DMAIC) steps.
• Define customers and their requirements, organizational requirements needed to fulfill customers’
requirements, the organizational system processes needed to achieve requirements, the problem to
be addressed, and the project improvement goals.
351
Engineering Management Handbook
• Measure key aspects of the current process capability by collecting relevant data and calculating
the “as-is” process capability.
• Analyze process data to investigate and verify cause-and-effect relationships. Determine the criti-
cal few relationships while ensuring that all factors have been considered. Seek out root cause of
the defect(s) under investigation.
• Improve or optimize the current process based upon data analysis using techniques such as design
of experiments, poka-yoke or mistake-proofing, and standard work to create a new, future state
process. Set up pilot runs to establish new process capability.
• Control the future state process to ensure that the new process is robust to deviations or that any
deviations from the target are corrected before they result in defects. Implement control systems
such as statistical process control, production boards, and visual workplaces. Establish continu-
ous monitoring of the improved process.
Raw/Source Raw/Source
Materials Materials
Prepare
Materials
Transformation Process
Distribution
352
What is Quality Management?
20.7.2 Checklists
Checklists are a basic tool to compile data into valuable information. Checklists are used to quickly gath-
er, compile and analyze the data. This data can be in the form of either variable or attribute data. Variable
data, also known as continuous data, is used when managers need to use all the data that is collected,
counted and used, sometimes continuously. Attribute data is used in complex situations by counting
the number of defective items or the number of defects per unit (Schroeder, 2008). It is important for
managers to know the type of data they are collecting so that they can use the information wisely. Once a
checklist is developed, it can be a useful guide for evaluation that can encourage discussion into identify-
ing areas of improvement (Dennis & Componation, 2004).
20.7.3 Histograms
Histograms can serve as a comparison tool between data sets. A manager can quickly assess whether the
introduction of new conditions align with expectations. On the most basic level, a histogram should con-
vey the success and/or failure rates due to the introduction of process enhancements. In an ideal situation
for the charts shown in Figure 20.2, you can see that the goal should be improved while variations of the
goal were eliminated.
significant feature of the Pareto chart is the addition of a cumulative percentage line. The total number of
each type of variation is divided by the total number of variations in the sample set to determine the per-
centage for that specific type of variation. The cumulative percentage line adds each percentage of varia-
tions beginning from the largest variation on the left. The cumulative percentage line is commonly labeled
on the right vertical axis. Figure 20.3 is an example of a Pareto chart.
The Pareto chart gives the manager a quick look to see what can be addressed in a process. Vilfredo
Pareto (1848-1923) was an Italian economist who was curious where the wealth existed in Milan. Pareto
determined that 85% of the wealth was from 15% of the population. Joseph Juran identified this rela-
tionship and summarized it as the Pareto principle in 1950 (Collier & Evans, 2013). The Pareto principle
focuses on the few variations that occur most frequently. This is also called the 80/20 principle.
The Pareto principle can be applied to many situations. Banasik and Beruvides (2012) applied the
Pareto principle to identify the largest cost to quality by identifying the largest expenses. In their analy-
sis, the authors found that a small increase in a large category will have significantly more impact than a
large charge in a negligible expense category (Banasik and Beruvides, 2012). The Pareto results for El Paso
Water Utility is shown in Table 20.1.
354
What is Quality Management?
355
Engineering Management Handbook
For a sample:
In the chart in Figure 20.5, processes that are in control are only influenced by common variations.
The control limits are calculated as follows.
A manager needs to address the special variations when the process becomes out of control (see Figure
20.6). The manager can use a Pareto analysis in conjunction with an Ishikawa diagram to determine the
improvements necessary to regain control of the process. After the improvements have been implemented, the
process can then be evaluated to determine success. In Figure. 20.6, there is a visible shift in the mean from X1
356
What is Quality Management?
to X2 after improvements were implemented from the Pareto analysis. The standard deviations have reduced
and the range of control limits has narrowed. These are indicators that the improvements were successful.
In addition to the control charts, there are a number of other statistical charts that could help the
engineering manager to ascertain the integrity of the process. A chart (or X-bar) is a tool to examine the
centering of the process. An R-chart measures the variations in the process. To determine the proportion
of nonconforming units, a P-chart can be utilized.
357
Engineering Management Handbook
The scatter chart can also show when the correlations between the variables are not related. In these
circumstances, the chart trend line would either be a vertical or horizontal line. The scatter chart can also
visually indicate when there are negative correlations between the variables. Figure 20.8 shows an example
of negative correlations between two variables.
Good quality leaders challenge the status quo, set an example of professionalism, and recognize and
celebrate team successes.
Quality improvement is accomplished through teams. A team is a group of people who perform in-
terrelated tasks toward accomplishment of a common vision or mission. There are seven basic team types
that can be involved in direct or indirect support of quality improvement.
• Process Improvement Teams—A project team that focuses on developing a new process or improving
an existing process through a breakthrough. These teams have a management sponsor who char-
ters the team and ensures that it has sufficient resources to accomplish its goal(s). The team has an
independent leader who meets with the team on a regular basis and a facilitator who works with the
organization to assist in successful project completion.
• Self-managed Teams—Groups of employees involved in directly managing the daily operations of
their process. They are authorized to make basic operational management decisions such as setting
objectives, assigning resources, and conflict resolution. The team members typically select their lead-
358
What is Quality Management?
20.9 References
Banasik, M., & Beruvides, M., “A Case Study of the costs of Quality: Water Utilities,” Engineering
Management Journal, vol. 24, no. 2, 2012, pp. 3-14.
Besterfield, Dale H., Quality Control. Upper Saddle River, NJ: Prentice Hall, 2001.
Bossert, James L., Quality Function Deployment: A Practitioner’s Approach. Milwaukee: ASQ Quality Press,
1991.
British Standards Institute, BS 5179, Guide to the Operation and Evaluation of Quality Assurance Systems,
1974.
British Standards Institute, BS 5750, Quality Systems, 1979.
Clinical and Laboratory Standards Institute, HS1-A2 Quality System Model for Healthcare, 2004.
Collier, D., and Evans, J., Quality Management. In South-Western Cengage Learning (5 ed.). Operations
Management (p. 334) Mason, OH, 2013.Defeo, Joseph, and Juran, Joseph M. Juran’s Quality Hand-
book: The Complete Guide to Performance Excellence. New York: McGraw-Hill, 2010.
Deming, W. Edwards., Out of the Crisis. Cambridge, MA: MIT Center for Advanced Engineering Study,
1982.
Dennis, H., Componation, P., An Examination of the Trade Study Process at NASA. Engineering Manage-
ment Journal, vol. 16, no. 4, 2004, pp. 10-18.
Department of Defense, MIL-I-45208A, Inspection System Requirements, 1963.
Department of Defense, MIL-Q-9858, Quality Program Requirements, 1959.
Dodge, Harold F. and Romig, Harry G., A Method of Sampling Inspection. The Bell System Technical
Journal, vol. III, no. 4, October 1929.
Dodge, Harold F. and Romig, Harry G., Single and Double Sampling Inspection Tables. The Bell System
Technical Journal, no. 1, January 1941.
European Foundation for Quality Management, European Quality Award, 1992.
Evans, J., Foundations of Quality and Performance Excellence. In South-Western Cengage Learning (7
ed.). Quality and Performance Excellence (p. 11) Mason, Ohio, 2011.
Evans, J., and Lindsay, W., Statistical Methods in Quality Management. In South-Western Cengage
Learning (9 ed.). Managing for Quality and Performance Excellence (p. 272) Mason, Ohio, 2011.
Feigenbaum, Armand V., Quality Control: Principles, Practice and Administration. New York: Mc-
Graw-Hill, 1951.
Feigenbaum, Armand V., Total Quality Control. New York: McGraw-Hill, 1961.
359
Engineering Management Handbook
International Organization for Standardization, ISO 8402:1994 Quality management and quality assur-
ance – Vocabulary. http://www.iso.org/iso/catalogue_detail.htm?csnumber=20115.
International Organization for Standardization, ISO 9000:1987 Quality management systems, 1987.
International Organization for Standardization, ISO 9000:2000 Quality management systems, 2000.
International Organization for Standardization, ISO 9000:2015 Quality management systems, 2015.
International Organization for Standardization, ISO 13485:2003 Medical Devices – Quality Management
Systems – Requirements for Regulatory Purposes, 2003.
International Organization for Standardization, ISO 14001:2004 Environmental management systems,
2004.
International Organization for Standardization, ISO 15189:2003 Medical Laboratories – Particular Re-
quirements for Quality and Competence, 2003.
International Organization for Standardization, ISO/IEC 90003:2004 Software Engineering – Guidelines
for the Application of ISO 9001:2000 to Computer Software, 2004.
International Organization for Standardization, ISO/IWA-1:2005 Quality Management Systems – Guide-
lines for Process Improvements in Health Service Organizations, 2005.
International Organization for Standardization, ISO/TS 16949:2009 Quality Management Systems –
Particular Requirements for the Application of ISO 9001:2008 for Automotive Production and Relevant
Service Part Organizations, 2009.
Japanese Union of Scientists and Engineers, Deming Prize, 1951.
Juran, Joseph M. and Gryna, Frank M., Quality Planning and Analysis. New York: McGraw Hill, 1970.
Kotter, John P., What Leaders Really Do. Harvard Business Review, vol. 68, no. 3, 1990, pp. 103-111.
National Institute of Standards and Technology, Malcolm Baldrige National Quality Award, 1987.
Pande, P., Neuman, R., Cavanagh, R., Analyzing Data and Investigating Causes. In McGraw-Hill (1 ed.),
The Six Sigma Way (pp. 219-220) New York, 2002.
QuEST Forum, TL 9000: Quality Management System Requirements for Telecommunications. 1998.
Schroeder, R., Quality Control and Improvement. In McGraw-Hill Irwin (4 ed.), Operations Manage-
ment. (pp. 169-190), New York, 2008.
Shewhart, Walter A., Economic Control of Quality of Manufactured Product. New York: D. Van Nostrand
Company, 1931.
Shingo Institute at Utah State University, Shingo Prize for Excellence in Manufacturing, 1988.
Society of Automotive Engineers, AS9100 – Aerospace Basic Quality System Standard, 1999.
Westcott, Russell T. (ed.), The Certified Manager of Quality/Organizational Excellence Handbook. Milwau-
kee: ASQ Quality Press, 2006.
360
Strategic Management
21
Strategic Management
Timothy G. Kotnour
University of Central Florida
361
Engineering Management Handbook
21.1 Introduction
21.1.1 Importance of Strategic Management to Engineering Managers
Why is strategic management important to engineering managers? Strategic management is important
to the engineering manager because the engineering manager needs to make decisions and take actions
consistent with the organization’s strategies. As a leader, the engineering manager will need to build
strategy for his or her group that is consistent with the organization’s overall strategy. Also, the engineering
manager will also contribute to the development of the organization’s strategy.
These functions can take place across many levels of the organization (e.g., the corporation, business
unit, division, or office). These eight steps provide the structured process for the management team to lead
and manage the strategic transformation path (i.e., continuously set strategy and make the strategy real).
Before we discuss each of these functions, we’ll explore the core of the process.
362
Strategic Management
1.
Set
Strategic 2.
8. Intent Deploy
Deploy
the Strategic
Learnings
Intent
7. open, honest 3.
Review conversations Set
Performance Strategy & Strategy
Measures
6. 4.
Deploy Deploy
Results 5. Resources
Execute
the Strategy
Taken together, these three elements are what a transformation requires. A transformation requires a
management team holding conversations to develop a strategy for change. Measures translate the strategy
to concrete quantifiable outcomes. These measures help determine where the organization needs to go.
The management team uses the measures during conversations to help refine the strategy.
that get to core issues will be held in the halls and small groups, not in the larger management team where
actions need to be taken. Open, honest conversations are needed to raise and answer the fundamental issues
facing the organization. Without open, honest conversations, strategy is destined to fail—commitment and
involvement in the strategy will decrease. The specific conversations for each of the eight functions of strate-
gic management will be highlighted when we discuss each function in the next eight sections.
One challenge in holding continuous strategic conversations is finding the time to devote to them.
Annual management strategic offsites are one tool to hold these conversations, but the problem with stra-
tegic offsites is that they are held usually just once a year. Once the strategic offsite is over, people go back
to work on the daily, routine issues. The organization needs to find a way to hold strategic conversations
on a routine basis.
Using the work of Minztberg (1994), we can define strategy as the strategic intent of the organization
(e.g., mission, vision, goals) and the plan or pattern of decisions to implement the strategic intent on a
daily basis. Mintzberg (1994) defined strategy using four concepts:
• Strategy as a plan: A direction, guide, or course of action into the future, a path to get from here to
there
• Strategy as a pattern: Consistency in behavior over time
• Strategy as position: The determination of particular products in particular markets
• Strategy as perspective: An organization’s way of doing things—its concept of the business
Mintzberg (1994) further defined the strategy concept by focusing on strategy that is implemented or
realized. Realized strategy is a function of four components:
• Intended Strategy (IS): the strategy we planned and intend to follow
• Deliberate Strategy (DS): the intended strategy implemented
• Unrealized Strategy (US): the intended strategy we abandoned
• Emergent Strategy (ES): the unplanned strategy that emerged over time
Using Mintzberg’s concepts, we define strategy to be of two types: strategic intent and daily strategy.
Strategic intent is the macro view to the organization’s position and perspective. The strategic intent is
typically defined by items such as a mission statement, vision statement, goals, and guiding principles.
This strategic intent provides the overarching theme to drive change in the organization. This strategic in-
tent is translated into everyday actions by what we call daily strategy. Daily strategy as a pattern or plan is
the use of planning tools to connect the strategic intent to a specific action. How well we align and imple-
ment both strategic intent and daily strategy is important. Daily strategy can be thought of as the projects
used to move the organization forward. Strategy (strategic intent and daily strategy) is made quantifiable
through the use of measures.
364
Strategic Management
This format provides a clear link to the measurable performance that is important to the organization.
These types of objectives drive both the daily work and improvement efforts. Figure 21.2 provides further
definition of how goals, objectives, measures, and strategies are related. Objectives translate the desired
outcomes into measurable performance criteria. The current versus desired performance is analyzed for
performance gaps. The root cause of the gap is used to define and select the improvement strategies.
Why does
the Goal Goal Goal Goal
organization
exist?
Conversations, strategies, and measures are the core of the strategic management process. We’ll next
explore the eight steps or functions of the strategic management process.
From this understanding, a leader can set an agenda on how to implement strategic management to
help transform an organization.
365
Engineering Management Handbook
Overview
Strategic planning is a group process by which the organization defines or refines the organization’s strate-
gic context and intent. The process involves understanding both internal and external environments (e.g.,
strengths, weaknesses, opportunities, threats). Strategic planning through this disciplined process estab-
lishes the vision of the future, mission, and a specific set of goals, objectives, and policies developed in
response to customer requirements and the external and internal environment. In this section we explore
the aim, questions, products, focus areas, and methods for strategic planning.
Strategic planning answers fundamental questions about the environment and organization. These
questions and answers are more complex than they appear. The challenge is having the senior manage-
ment team (and later the entire organization) answer these questions in open, honest, and meaningful
conversations. The products associated with strategic planning are used to answer these questions.
Answering these questions helps the organization pinpoint the changes it needs to make in its stra-
tegic intent, and the specific objectives and strategies it needs to pursue. The challenge is answering these
questions openly and honestly with the right data.
The intent of this section was to describe the strategic planning function. The strategic planning
function was described using its aim, questions, products, and focus areas. Once the strategic in-
tent is set through strategic planning, the strategic intent needs to be shared with the organization.
Overview
Deploying the strategic intent is the process of sharing the strategic intent with the organization and its
stakeholders. Deploying the strategic intent helps the rest of the organization understand the organiza-
tion’s strategic context and intent. This understanding creates a foundation for the organization to make
plans to implement the strategic intent. In this section we explore the aim, questions, products, and focus
areas for deploying the strategic intent.
To answer these questions and deploy the strategic intent, the management team creates a set of prod-
ucts. To help management answer the questions above, the management team needs to answer another set
of questions:
• Who are the intended audiences for our strategic intent message?
• What is the purpose of our message?
• What is the message?
• What are the different approaches for sharing our message?
Answers to these questions help the organization design the methods to deploy the strategic intent.
Overview
Setting strategy, or implementation planning, is the process by which the organization develops specific
strategies or actions to implement the strategic intent, and defines specific performance measures of the
progress of the planned actions. Implementation planning develops detailed plans and proposed resource
allocation to implement the goals, objectives, and strategies. In this section we explore the aim, questions,
products, and focus areas for implementation planning.
• How do we get our employees to see their roles in the strategic intent?
• How do we get our employees to set specific performance expectations?
These initiatives need to be evaluated, selected, and resourced. The organization does not have enough
resources to invest in all of these areas, so it must focus on aligning these efforts to the strategic plan.
By working with employees, the management team aligns employee roles to the strategic intent of
transforming the organization.
Overview
Deploying resources is the process of allocating the organization’s limited resources to the strategy. This
allocation is made against the four types of activities defined in the implementation planning function. In
this chapter we explore the aim, questions, products, and focus areas for deploying resources. Deploying
resources is important because:
• The organization’s resources are limited
• Not all activities can be funded
• Any expected outcome to be achieved must have resourced activities to deliver the outcome. That is,
an outcome cannot be expected to be achieved unless resources are assigned or deployed to it.
Selecting Efforts
The first focus area of deploying resources is selecting the right efforts to fund and deploy resources to.
We can look at deploying resources from a funnel perspective. Coming into the funnel are the potential
efforts from the implementation function. The size of the top of the funnel is driven by the number of
projects or efforts. The size of the bottom of the funnel, and thus, how many of the proposed initiatives
get through the funnel, is based on the amount of resources that can be applied to the organization’s
strategy. The organization faces the challenge of balancing multiple responsibilities with limited resourc-
es. Deploying resources is where this challenge comes to a head. The challenge in deploying resources is
selecting the right portfolio of efforts across four areas:
1. Meeting the requirements of today’s mission.
2. Building the business—investing in areas to improve and change the business.
3. Meeting the requirements of the evolving or new mission.
4. Catering to crisis.
As part of the selection process, the organization needs to find the resources to allocate to the efforts
the organization chooses to implement.
Overview
Execution is carrying out the strategy and implementation plan. Execution is the process of producing the
outputs and outcomes for the organization customers. Execution is where the “rubber meets the road”—
meeting accountabilities for the strategy. One challenge is that everyday business activities will overrun
372
Strategic Management
efforts to execute the strategy of transforming the organization. In this section we explore the aim, ques-
tions, products, and focus areas for executing the strategy.
Overview
Deploying results is the process of gathering performance measurements from across the organization for
an organization-wide performance evaluation. In deploying results, the organization is getting the results
from the execution so that the management team can understand how well they are making the strategy
real. In this section we explore the aim, questions, products, and focus areas for deploying results.
374
Strategic Management
Measuring Performance
Measuring performance is about collecting the performance data and converting it into information. The
challenge is first determining what to measure and then how to get the measures. As we discussed earlier,
measures are at the core of strategic management. When we translate the strategy into operational terms
we are defining the desired outcomes we want with the objectives and measures. In deploying the results
we are collecting the data to develop the measures. The challenge is ensuring that the measures are collect-
ed and analyzed for performance evaluation.
Rolling Up Results
Once individual efforts have been measured, the second focus area is to roll the results up from individ-
ual efforts into overall organizational performance. The organization’s performance and outcomes are a
function of the integration of many actions. The organization needs to roll these individual outcomes into
a higher-level perspective to gauge overall performance.
The intent of this section was to describe the deploy resources function. The deploy resources func-
tion was described using its aim, questions, products, and focus areas. Once the efforts are being mea-
sured, the results need to be evaluated.
Overview
Performance evaluation is how the organization measures and evaluates whether the organization achieved
intended results. Performance measurement and evaluation produces tangible results that can be stud-
ied to produce lessons learned and recommendations for improving the organization and adjusting the
strategic plan. In this chapter we explore the aim, questions, products, and focus areas for performance
evaluation.
Reviewing Performance
This first focus area is an obvious one, but the one most often forgotten. The strategy and results need to
be evaluated. The organization must make the time, energy, and environment available to conduct the
reviews. The reviews are a meeting in which basic questions are asked and answered using the measures
developed and shared in the deploying results stage. However, the right environment for conducting the
performance evaluations must be created.
Overview
Deploying learnings is the process of sharing the results (i.e., decisions) from performance evaluation to
continue to drive the strategy throughout the organization. In this section we explore the aim, questions,
products, and focus areas for deploying learnings.
377
Engineering Management Handbook
Hahn, D., “Strategic management—Tasks and challenges in the 1990s,” Long Range Planning, vol. 24,
no. 1, 1991, pp. 26-39.
Kaplan, Robert and Norton, David, Balanced Scorecard, Harvard Business School Press, 1996.
Mintzberg, Henry, Rise and Fall of Strategic Planning. Free Press, 1994.
National Aeronautics and Space Administration, 1996, NASA Strategic Management Handbook, Washing-
ton, DC.
Pekar, P., and Abraham, S., “Is strategic management living up to its promise?” Long Range Planning,
vol. 28, no. 5, 1995, pp. 32-44.
Royer, Isabelle, Why Bad Projects Are So Hard to Kill, Harvard Business Review, February 2003.
Rumelt, Richard P., Good Strategy, Bad Strategy: The Difference and Why It Matters. New York: Crown
Business, 2011.
Sandy, W., “Avoid the breakdowns between planning and implementation,” The Journal of Business Strat-
egy Sept./Oct., 1991, pp. 30-33.
Sink, D. Scott and Tuttle, Thomas, Planning and Measurement in Your Organization of the Future, Insti-
tute of Industrial Engineers, 1989.
Taylor, B., “Strategic planning—which style do you need?” Long Range Planning, vol. 17, no. 3, 1984,
pp. 51-62.
Waalewijn, P., and Segaar, P., “Strategic management: The key to profitability in small companies,” Long
Range Planning, vol. 26, no. 2, 1993, pp. 24-30.
Wilson, I., “Strategic planning isn’t dead—It changed,” Long Range Planning, vol. 27, no. 4, 1994,
pp. 12-24.
378
Innovation and Entrepreneurship
22
Innovation and Entrepreneurship
Nakul Sharma
California State University – Northridge
379
Engineering Management Handbook
22.1 Introduction
There has been a great deal of attention paid to the subject of entrepreneurship over the past few years,
stemming primarily from the discovery by economic analysts that small- and large-scale enterprises con-
tribute considerably to economic growth and vitality. Moreover, many people have chosen entrepreneurial
careers because doing so seems to offer greater economic and psychological rewards as compared to doing
a 9-to-5 job. To understand entrepreneurship, we need to first understand what it means to be an entre-
preneur and also understand the term “intrapreneurship.” Most people think being an entrepreneur is all
about coming up with a marketable idea. But what’s more important than coming up with an idea is how
to reach interested sets of customers in an effective and affordable way to provide value to the customer.
An entrepreneur is someone who can take an idea, whether it is a product or service, have the will, skill
and courage to take extreme risks to do whatever it takes to turn that concept into reality and not only
bring it to market, but also make it a viable product or service that people want or need. In a similar role
to that of entrepreneurs, intrapreneurs are the drivers of innovation within larger firms as they seek to
provide new products/solutions to unique market driven demands/problems by taking risks within their
scope of work. In fact, it is often taking on intrapreneurial tasks that allow someone to build the skill
needed to eventually become an entrepreneur. Entrepreneurship is the willingness to take risks, develop,
organize and manage a business venture in a competitive global marketplace that is constantly evolving
(Di-Masi, 2015). Simply put, entrepreneurship is the art of turning a unique idea into a business. A good
entrepreneur must have the ability to recognize talented intrapreneurs.
380
Innovation and Entrepreneurship
Marketing
opportunities To gain
perceptions, Obtain command Human Upgradation
marketing of financing for over scarce
Purchasing relationship of procedures
product & a new raw material
imputs development & production
response to venture and inventory (HRD) quality
competition control
Some of the major functions of an entrepreneur can classified into three broad categories:
1. Managerial Functions
An entrepreneur performs a variety of managerial functions like determination of business objectives,
formulation of production plans, product analysis and market research, competitor analysis, organization
of sales procuring machine and material, recruitment of personnel and the undertaking of business oper-
ations. He or she also undertakes the basic managerial functions of planning, organizing, coordinating,
staffing, directing, relationship management, motivating and controlling in the enterprise (Kumar, 2015).
Though in large establishments, these managerial functions of the entrepreneur are delegated to managers
for more effective and efficient execution.
management. An entrepreneur is an organizer who alone determines the lines of business to expand and
capital to employ more judiciously. He or she is the ultimate judge in the conduct of the business.
Whenever a new idea occurs, entrepreneurial efforts are essential to convert the idea into practical
product or service to fulfill the customers’ needs. The entrepreneur/intrapreneur assumes all possible risks
of business that emerges due to the possibility of changes in the tastes of consumers, modern techniques
of production and new inventions. Such risks are not insurable and are incalculable. In simple terms such
risks are known as uncertainty concerning a loss. Risk tolerance or uncertainty bearing remains one of the
most important functions of an entrepreneur/intrapreneur, which he or she tries to minimize by initiative,
skill and good judgment. An engineering manager is also very likely to need these skills when the team is
embarking on creating a new product or service, offered by their organization.
22.4 Intrapreneur
An intrapreneur is a relatively recent concept that focuses on employees of a company that have many of the
attributes of an entrepreneur. Obviously there have always been go-getters in companies who try to move the
needle forward and push the status quo, but never before has there been such a push for employees to take
ownership of their own corner of a company. This means creating a new division or launching a new initia-
tive within the company. An intrapreneur is someone within a company that takes risks in an effort to solve
a given problem or create something new from scratch (Newlands, 2015). These are those highly valuable
executives and team members who have learned to apply the essential principles of entrepreneurship to the
roles they fill within the company. These aren’t employees trying to do better at their existing jobs or move
up the ladder; this is them wanting to create something new that does not currently exist. Intrapreneurs are
not afraid to change course, nor fear failure. It is not outward bravado that drives them but an inner con-
fidence and courage that every step takes them closer to their ultimate goal. Intrapreneurship is the act of
behaving like an entrepreneur while working within a large organization.
One should really understand how intrapreneurship and entrepreneurship are linked. In fact, it is
often taking on intrapreneurial tasks that allows someone to build the skill needed to eventually become
an entrepreneur. Basically, intrapreneurship is the first step on the ladder to becoming an entrepreneur.
Successful intrapreneurs understand trends; they see where the company needs to go before anyone else.
Any successful company must have a number of intrapreneurs to see future trends and meet them before
their competitors do. As Intrapreneurs build the aptitude to recognize and solve important problems they
build the skills necessary to one day start a company (Newlands, 2015). A company must be aware of its
most successful intrapreneurs, it must recognize and promote them as soon as possible. It is through this
recognition that a company will succeed and grow. Intrapreneurs are the most fundamental component
of an innovative and growing company as they require intrapreneurs at each level to solve problems and
integrate each process into the greater whole. Intrapreneurs see the ability to grow personally along with
the company and in this sense, should be seen as investors in a company, rather than just employees. An
intrapreneur is someone who grows with the company. A company grows when they find a balance be-
tween in the virtuous cycle of entrepreneurs hiring intrapreneurs. A good entrepreneur recognizes talented
intrapreneurs and as they are promoted they in turn recognize good intrapreneurs below them. As this
cycle continues, the company is bound to become a true leader in innovation.
their specific needs, as to what they would like to have as their reward for being innovative. A desired
outcome/reward can have a huge impact on employee’s orientation toward implementing innovation
and ultimately meeting the company’s goals.
3. Tolerance toward failure is another contributor to the success of major companies. Failure is not an
end point, but can be thought of as a source of learning and continuous improvement. Incremental
innovation is the process of taking small steps over a period of time toward a large breakthrough.
Incremental innovation cannot happen without incurring failures. Discouraging failure within the
organization could have catastrophic outcomes for the growth of the company. An organizational cul-
ture that values creativity, provides space for dialogue and can leverage lessons learned from failures, is
well on its way to building a culture that is innovative in nature.
Research has shown that two countries namely United States and China have the highest number
of new startups every year and also have most number of companies doing breakthrough innovations as
compared to any other region in the world. The reason behind the success of startups in these two coun-
tries is that these countries nurture innovative culture within their organizations and they give autonomy
to their employees for being innovative and take steps accordingly. They encourage people to think out of
the box and take risk at the stake of failure. By establishing easy and accessible communication opportuni-
ties, such as employee newsletters and suggestion boxes, leadership can gain access to important feedback,
and the better your organization can articulate what is and what is not working, the quicker it can work
toward reaching innovative solutions and move forward.
Figure 22.2 presents the six stages of innovation process that takes ideas from inception to impact. It
may vary from industry to industry.
384
Innovation and Entrepreneurship
(Brooks, 2013). When developing a complex product that involves many sub-technologies, such as an
automobile, this kind of innovation occurs frequently.
a. Consumer Expectation
Consumer expectations drive the amount of innovation in the market to a major extent. Customers are
used to products that continually improve and make their life easier. Modern consumers are more in-
formed and have more options in terms of what they buy and who they buy it from. Essentially, cus-
tomers will not accept mediocrity because they know they can always go somewhere else. This keeps
companies under mounting pressure to continuously innovate and introduce new products and services
ever faster. Being late to the market is simply not acceptable by the customers as by the time an identical
product reaches the market consumers expect the next thing to be the next big thing—and when it is not,
they do not hide their disappointment.
2. Rising Competition
Innovation can be a key differentiator between market leaders and their rivals. Innovation is also driven
by the amount of innovation your competitors are doing. Being first to market with a new product can
provide you with a significant advantage in terms of building a customer base. It is difficult to compete if
your products are seen as obsolete or out of date. Also, it is difficult to compete with the innovation levels
of a large multinational as they have surplus fund that they can pour into innovation process as compared
to a startup or a mid-size industry. Innovation is the key to differentiate your product from the compe-
tition. If you can’t compete on price, you’ll need innovative products and ideas to make your business
stand out from the crowd. Your customers may be willing to pay more for your well-designed, novel and
innovative product or service, rather than choosing a cheaper, but less exciting rival.
Assessing your organization’s level of innovation means looking at your past successes and failures. Try
to work out what made one project a success, and where other similar projects did not work out. Look
for areas that your company can improve upon and try to learn from past mistakes. Looking at ideas that
did not work previously might give an insight for trying new methods this time around, and it might also
provide you with ideas that did not work in the past because of situations like technology vacuum or not
having the right people for the task, but may have a sound future potential now. Sometimes an idea will
fail simply because of mismanagement or poor timing. Some of these ideas could be updated or adapted
and given a second chance.
When assessing your organization’s level of innovation, also consider the amount of innovation
coming from your competition, as well as what is happening in the market. This will help you to decide
whether or not you are being innovative enough to remain competitive. Consider whether or not your
organization is focusing a sufficient amount of time and resources into developing new ideas. How many
employee ideas are actually followed up on after they are initially brought forward? Many organizations
miss out on opportunities because they do not put enough effort into developing good ideas. An innova-
tion audit takes into account the opinions of your customers and your employees. Work out how much
you have invested in innovation over a period of time and compare that to the amount of return you have
received from your investment. A thorough understanding of your organizations level of innovation can
help you achieve the title of market leader.
EMPATHIZE: In this step you try to understand your customers, within the context of your design chal-
lenge. It is your effort to understand the way they do things and why they do it, understand their physical
and emotional needs, understand how they think about world, and what is meaningful to them. Work to
387
Engineering Management Handbook
fully understand the experience of the user for whom you are designing. Observing what people do and
how they interact with their environment gives you clues about what they think and feel. It also helps
you learn about what they need. By watching people, you can capture physical manifestations of their
experiences—what they do and say (Stanford Design Thinking Process, 2012). Engaging with people
directly reveals a tremendous amount about the way they think and the values they hold. Sometimes these
thoughts and values are not obvious to the people who hold them, and a good conversation can surprise
both the designer and the subject by the unanticipated insights that are revealed.
DEFINE: In this step of the design process is all about bringing clarity and focus to the design space.
Process and synthesize the findings from your empathy work in order to form a user point of view that
you will address with your design. The goal of the define mode is to craft a meaningful and actionable
problem statement. This statement should be a guiding statement that focuses on insights and needs of a
particular user, or composite character. The define mode is critical to the design process because it presents
your point of view regarding the problem you are striving to address (Stanford Design Thinking Process,
2012). More importantly, your point of view defines the right challenge to address. If not defined clearly,
you may end up addressing a noncritical problem rather than a critical one.
IDEATE: Ideate is the mode of the design process in which you concentrate on idea generation. Ideation
provides both the fuel and the source material for building prototypes and getting innovative solutions
into the hands of your users. Explore a wide variety of possible solutions through generating a large quan-
tity of diverse possible solutions, allowing you to step beyond the obvious and explore a range of ideas. In
ideation you combine the understanding you have of the problem space and people you are designing for
with your imagination to generate a possible solution concept. Particularly early in a design project, ide-
ation is about pushing for a widest possible range of ideas from which you can select, not simply finding
a single, best solution (Stanford Design Thinking Process, 2012). The determination of the best solution
will be discovered later, through user testing and feedback.
PROTOTYPE: The prototype mode is the iterative generation of artifacts intended to answer questions
that get you closer to your final solution. A prototype can be anything that a user can interact with.
Transform your ideas into a physical form so that you can experience and interact with them and, in the
process, learn and develop more empathy.
TEST: The test mode is when you solicit feedback about the prototypes you have created from your users
and have another opportunity to gain empathy for the people you are designing for. Testing is another
opportunity to understand your user, but unlike your initial empathy mode, you have now likely done
more framing of the problem and created prototypes to test (Stanford Design Thinking Process, 2012).
Try out products and use observations and feedback to refine prototypes, learn more about the user, and
refine your original point of view.
388
Innovation and Entrepreneurship
Figure 22.4. Stages of Entrepreneurial Process (modified from Entrepreneurship: Successfully Launching New
Ventures by Bruce R. Barringer/R. Duane Ireland, 2012)
small business (Templeman, 2014). Big corporations are constantly on the hunt for smaller startups that
can fill a void.
The biggest advantage small businesses have over larger counterparts is their agility to change their oper-
ating processes and thus meeting changing customer needs in a relatively short period of time. A large man-
ufacturing unit that does mass production cannot quickly change their operations but a small manufacturing
unit can, which puts them in a position of advantage over large businesses while taking new or surprise
orders. Small businesses can improve their customer experience in a multitude of ways, but the best innova-
tion delivers value to the market as soon as humanly possible. As a small business owner, one has immediate
access to the customer experience and can focus on innovative efforts in their direction right away.
Cross-fertilization is critical to delivering successful innovation, as great ideas generally come from
unique and sometimes unrelated combination of sources (Marshall, 2013). Big companies might struggle
to gather outside ideas or have trouble sharing knowledge due to departmental silos. A small business does
not suffer these impediments. Owners and managers of small businesses can easily reach beyond their
operations and involve customers, friends, and external experts.
Small businesses cannot win against the big ones if they do not have big resources to back them up—
but they can win in a niche to which they are willing to dedicate all of their attention. Big companies
trying to juggle tons of products and services often tend to give them all “some” attention, but never as
much as they probably deserve (Roberge, 2012). Small businesses can win the niche market while the big
companies are distracted because of their multiple points of focus. Once a small business is established as
subject matter expert on that niche, it will have the audience and credibility to expand on from there into
more product or service offerings.
390
Innovation and Entrepreneurship
22.13 References
Di-Masi, Paul, http://www.gdrc.org/icm/micro/define-micro.html (Accessed on August 12, 2015).
Duggan, Tara, “Continuous Improvement Process Definition” Demand Media, http://smallbusiness.
chron.com/continuous-improvement-process-definition-4534.html (Accessed on October 12, 2015).
Elkhodary, Mohamed, “12 Tips to Delegate Tasks Effectively,” https://www.linkedin.com/pulse/12-tips-
delegate-tasks-effectively-mohamed-elkhodary (Accessed on September 21, 2015).
Emerson, Melinda, “How to Cultivate an Entrepreneurial Mindset” -http://succeedasyourownboss.com/
cultivate-entrepreneurial-mindset/, (Accessed on August 14, 2015).
“Innovation: Key to Successful Business,” http://www.businessnewsdaily.com/5167-innovation.html (Ac-
cessed on August 20, 2015).
“Introduction To Design Thinking Process Guide,” https://dschool.stanford.edu/sandbox/groups/dresour-
ces/wiki/welcome/attachments/8e447/d.school’s%20Design%20Thinking%20Process%20Mode%20
Guide.pdf?sessionID=925299ef8e28277a661b9d9ea530db2e1490a68b (Accessed on September 22,
2015).
Johnston, Kevin, “How to Incorporate Creativity into Your Business Practice,” Demand Media, http://
smallbusiness.chron.com/incorporate-creativity-business-practice-56286.html (Accessed on Septem-
ber 29, 2015).
Kulkarni, Madhura, “Drab to Exciting: Easy tips for success at work,” https://www.linkedin.com/pulse/
391
Engineering Management Handbook
drab-exciting-simple-guide-corporate-success-madhura-kulkarni?articleId=5992224708714651648
(Accessed on September 12, 2015).
Kumar, Chinmoy, http://www.preservearticles.com/201101143322/functions-of-an-entrepreneur.html
(Accessed on August 14, 2015).
Marshall, Drew, “How Small Businesses Can Drive Big Innovation”, https://www.washingtonpost.com/
blogs/on-small-business/post/how-to-breed-big-innovation-inside-a-small-business/2013/03/26/
b1a8953e-962a-11e2-9e23-09dce87f75a1_blog.html (Accessed on October 1, 2015).
Newlands, Murray, “10 Things Entrepreneurs Need to Know about Intrapreneurship” - http://www.inc.
com/murray-newlands/10-things-entrepreneurs-need-to-know-about-intrapreneurship.html (Ac-
cessed on August 12, 2015).
Roberge, Mark, “7 Ways Small Businesses Can Compete With the Big Guys,” https://www.salesforce.
com/blog/2012/12/7-steps-for-small-businesses-to-compete-with-the-big-guys.html (Accessed on
October 1, 2015).
Templeman, Mike, “Innovation: Small Businesses Live It, Big Businesses Buy It,” http://www.entrepre-
neur.com/article/231962 (Accessed on October 1, 2015).
“The Design Thinking Process,” http://dschool.stanford.edu/redesigningtheater/the-design-thinking-pro-
cess/ (Accessed on September 22, 2015).
Tracy, Brian, “The Role of the Entrepreneur,” http://www.entrepreneur.com/article/78478 (Accessed on
August 20, 2015).
“Why business innovation is important,” https://www.business.qld.gov.au/business/business-improve-
ment/becoming-innovative-business/why-business-innovation-important (Accessed on August 29,
2015).
392
Supply Chain Management for Engineering Managers
23
Supply Chain Management for
Engineering Managers
393
Engineering Management Handbook
23.1 Introduction
23.1.1 Definition of a Supply Chain
Supply chain involves all parts of the product manufacturing or providing of a service until it gets to con-
sumers, including the raw material from suppliers, the manufacturing process, distribution including to
wholesalers, retailers and consumers. As reported by Beamon B. (1998), a supply chain is “a structured
manufacturing process where raw materials are transformed into finished goods, then delivered to the
end customers.” In order for this to be achieved, all the parts, from raw material suppliers to distribution,
retailers and consumers, must be connected and have good communication among them because each one
depends on one another to achieve their end goal of providing the customer a quality product. Providing the
customer with a “quality product” could include providing the customer with the quantity of goods/services
needed, in the time required and simultaneously reduce costs associated with the product/service to provide
the customer the best value. A supply chain is the network among all companies that have influence on the
product; this includes suppliers, manufacturers, distributors and retailers. Most products are not produced
entirely by one organization, so every company that has contact with the product or service provided is
included in the supply chain. A number of supply chain definitions are provided in Table 23.1.
As an engineering manager, you can see that even though there is a universal understanding of what a
supply chain is, there are different definitions of a supply chain and hence you have to pick the definition
that is most applicable to your organization.
Figure 23.1, as adopted from John Gattorna (2013), depicts the functions that could be included in
a supply chain:
Figure 23.1. Supply Chain Organizational Pyramid (Adapted from Gattorna, 2013)
Value
Perceived
Skills,
Information Capabilities and Process and Great
Technology Organization Procedures Performance
394
Supply Chain Management for Engineering Managers
From an engineering management perspective, from Figure 23.1 it can be seen that functionally, a
supply chain, if used correctly, can contribute toward supporting an organization as well as make a positive
impact on the operational, structural and strategic aspects of the organization. An engineering manager has
to be aware of this big picture and the impacts that a supply chain could have, to implement it correctly and
help the project or department that he or she is in charge of, to add value to the organization.
the supply chain, which are the objectives of each of the constituents of the chain (improve quality for
example), need to meet the company objectives and it is important to analyze and define in which sector
of the whole chain each strategy would be applied. Some of the objectives of the chain are having con-
stant demand volume, full truckload and flexibility in customer services. Those objectives sometimes are
opposites among the companies that composes the chain, so that they need to analyze strategically the
sourcing, manufacturing area, logistics and sales role of the business.
One of the points to implement a lean supply chain and lower costs is that all companies involved need to
have a holistic perspective of the whole chain. In a holistic view, the company can see an extended supply chain,
which contains the suppliers of its suppliers and the customers of its customers. Figure 23.2 shows the use of a
suppliers, inputs, process, outputs, and customers (SIPOC) diagram, which is an overview of the process.
By virtue of obtaining an extended supply chain and the SIPOC diagram, it is possible to create a
value chain. According to Andrew Feller, Dan Shunk, and Tom Callarman (2006), “…the primary focus
in value chains is on the benefits that accrue to customers, the interdependent processes that generate
value, and the resulting demand and the flow of funds that are created.” Companies in a value chain have
their focus in the customer’s customer and is worried about their requirements and in what they see value.
The authors also stated that, “the customer is the source of value, and value flows from the customer, in
the form of demand, to the supplier.”
According to John Hatton (2013), in order to reduce costs “high-tech companies such as Apple,
grocery retailers including Tesco and online distributors such as Amazon have emulated these achieve-
ments and become highly respected exemplars of lean supply.” The SIPOC diagram can be useful to build
a holistic view of the whole chain that the company is involved. With this view an engineering manager
could clarify the understanding of what the value chain is, how he or she is managing it and what needs
his or her attention. It is an important way to be focus on what really brings value to the customer.
2. Identify all steps in the process, eliminating those steps that do not create value.
3. Run the “value steps” in tight sequence, so the product flows smoothly toward the customer.
4. As part of continuous improvement, reiterate and continue the process until value is created with
minimal waste.
5. Involve people: engage the companies to improve continuously through waste elimination and prob-
lem solving.
6. Build in quality: engineer processes by using concepts such as poka-yoke, to make them mis-
take-proof; thus preventing errors before they happen.
7. Reduce lead times: establish a continuous flow of materials, equipment and process such that prod-
ucts are pulled through the supply chain at the right place, the right time and in the right quantity.
8. Standardize: document the best practices and make sure they are followed.
Manrodt et al. (2008) also stated some additional points that could enhance lean supply chain success:
1. Use success stories to promote a better understanding of the value of lean within the supply chain to
get better buy-in from your suppliers.
2. Lean education and training must be expanded outside your organizational boundaries and should
include your suppliers as well.
3. Management and practitioners must step up efforts to improve collaboration and partnership
throughout the supply chain.
4. There must be a set of metrics and benchmarks for validating the benefits of lean. This is key because
if the benefits cannot be measured and portrayed, it is challenging to keep the suppliers involved.
5. All firms involved must monitor and report on performance.
Figure 23.3 summarizes the key components necessary to build and maintain a lean supply.
Figure 23.3. Attributes of Lean Supply Chain (Adapted from Mandrot et al., 2008)
Demand
Management
Collaboration
Reduce Waste
Besides
and Cost
Companies
Lean
Supply
Chain
Industry Standardization
Standardization of the Process
Transformation
of Culture
in less time, lesser cost and reduces risks. Using software and tools to decrease complexity of the supply
chain is important. A good example is how communication can be improved by using cloud computing.
Another important way to optimize is collaboration between manufacturer and supplier. Ravi Shankar
(2011) stated that, “This will help organizations reduce inventory, improve fulfillment rates and product
availability at point of purchase and ensure a lean supply chain improving margins and profitability.” Ac-
cording to Stan Mack (2015), the company can increase its competitive advantage by delivering a product
“as fast and as cheaply as possible without sacrificing quality.” He also claims that it is not easy and “top
companies accomplish this by using complicated logistics tools, such as computer algorithms that choose
optimal routes for product shipping and large company databases that allow distant employees to pool
order information and coordinate their efforts in real time.”
Another important point of an efficient supply chain management is that the company gains power
to negotiate with other organizations, including suppliers and retailers. In order to negotiate with sup-
pliers and retailers, companies can make agreements around large quantities of products in exchange for
more competitive unit pricing. The companies involved in the partnership should establish the expecta-
tions it has with each one of its supply chain members. For example, if a company needs to buy a huge
amount of raw material from a supplier, both organizations can negotiate a better price and establish a
contract to purchase a certain quantity at a fixed price for the duration of the contract. It can also lead to
exclusivity if it is beneficial for both businesses.
23.5.2 Risks
According to Manuj and Mentzer (2008), there are four categories of risks: “supply, demand, operational,
and security risks.” The risk of operations is related with the results of distributions of events that are not
expected and affect the internal capacity to produce. Demand risk is variation of quantity the costumer
could order affecting distribution in the outbound flow. Risk of security is the outcomes that can “threat-
en human resources, operations integrity, and information systems.” Furthermore, all of these risks can
affect each other and increase the damage in supply chain management and “it is also important to note
that an outcome for one firm in the supply chain may be a ‘risk event’ for another firm” (Manuj and
Mentzer, 2008).
The risks in a global supply chain occur because of its complexity resulted by the huge number of
products manufactured and stored in different locations. A good practice to prevent risk is minimizing
this complexity designing a supply chain system. Segmenting or regionalizing the supply chain will limit
the damage caused by a disruption risk. Thus, the loss of the disruption that could happen in a segment
of the supply chain will not impact in another part of the system. The globalization of the supply chain
398
Supply Chain Management for Engineering Managers
permits the companies to site facilities in different locations in the world, which makes the segmentation
easier and more cost effective. An excellent example is Zara, when the company started producing in low-
cost locations like Asia and Turkey minimizing the economic impact of a risk and reducing the chances of
a potential disruption to affect products from a different geographical area (Bosman, 2006; Chopra and
Sodhi, 2014).
According to Dittmann (2014) there is a simple three-step process to prevent organizations from
facing risks of a supply chain system. Going step by step, the first is the identification of the risk. Iden-
tifying the risk is important because many companies start a risk management process facing the wrong
threats because they do not know which risks the company really needs to mitigate (Supply Chain Risk
Leadership Council, 2011). The Council states that, “Risk identification might begin with brainstorming
sessions, previous risk assessments, surveys, or still other efforts to identify and list potential risks with-
in supply chain processes.” The second step is analysis and prioritize the risks according to the damage
that they can cause the company. Dittmann (2014) claimed that a good strategy to prioritize risks is the
failure mode and effect analysis (FMEA) that is based on “Seriousness of consequences; Likelihood of the
problem ever occurring or frequency of occurrence; Likelihood of early detection of the problem.” This
method will help to identify the most important risks that should be treated first. After identifying and
prioritizing the risks that organizations could face, it is necessary to design strategy plans to mitigate those
risks with high priority (Dittmann, 2014). The supply chain risk management needs to be implemented
with all partners of the company, which includes the suppliers, carriers, and the logistics providers (Supply
Chain Risk Leadership Council, 2011).
According to Gandhi, Gorod and Sauser (2012), “The process of risk management usually begins
with a study to identify the potential risks that a project could generate or to which it could be exposed.
The authors list in Table 23.3 the risks of an outsourcing project, which could also be considered potential
supply chain risks.
Table 23.2. Outsourcing Risks (Adapted from Gandhi, Gorod, and Sauser (2012)
All of the these risks should be managed from a systemic perspective, i.e., the engineering manager
should not just consider the individual risks listed in Table 23.2, but also speculate about how they could
affect one another and the outcome of that interaction on the organization. This is important as a supply
chain is a complex network and the effects of risks could be felt both up and down the supply chain.
An example of a huge risk that a supply chain can suffer is the need to rapidly change its strategy.
Supply chain agility is a crucial characteristic that companies should have.
Figure 23.4 shows that companies have different concepts about what is agility in supply chain.
Supply chain agility is a constant problem that plagues companies due to a fast changing business envi-
ronment. According to Lora Cecere (2012), companies have lean programs and powerful systems, but
they are not flexible in the global supply chain. Cecere also defined agility as “…the design of the supply
chain to have the same cost, quality and customer service given the level of demand and supply volatil-
ity.” There are many occasions when supply chain agility is important. One of them is when there is a
crisis in the economy or some sector involved in the supply chain. An example of this is what is currently
happening in Brazil. Logistics companies in Brazil, which generally specialize in transporting minerals
and steel, are being affected because of decreasing minerals and steel products that they have to transport
and deliver due to a weak economy, which is directly affecting their revenue. As a result, these companies
that are affected need to change their strategy in and are looking to transport general products like sugar,
corn, and salt. This may not seem like a huge change but they have to start dealing with completely new
partners and are giving rise to unforeseen risks in the supply chain. According to Pierre Mercier, Harold
Sirkin, and Jennifer Bratton (2010), “Uncertainty and unpredictability are facts of life in today’s business
environment. Nobody can truly predict the future, no matter how complex or accurate a company’s
forecasting model is.” Also, “it becomes increasingly clear that greater flexibility and thus the ability to
react to rapidly to changing market conditions are just as important as forecasting skills when it comes
to optimizing end-to-end operations.” Changes in the supply chain could occur when the demand of the
market changes and companies are required to respond to this change. Figure 23.5 shows constituents of
an agile supply chain.
Figure 23.4. Definitions of Supply Chain Agility by Executives (Adapted from Cecere, 2012)
400
Supply Chain Management for Engineering Managers
Information
Technology
Market Agile
Process
Research Supply
Integration
Chain
Network
link supply management (manufacturing, logistics, and sourcing), demand management (marketing, sales,
and service), and product management (R&D, engineering, and product development). When these three
areas work functionally and together, the company can meet the market demand as quickly as possible,
while fulfilling quality demands from the customer.
One of the companies that have achieved excellence in supply chain management is Walmart.
Walmart is in the top 20 of Gartner’s rank (a ranking of the world’s leading supply chains) since 2010.
According to the Supply Chain Digest (2012), “Walmart stocks products made in more than 70 countries,
operate more than 11,000 stores in 27 countries around the world, and manage an average of $32 billion
in inventory.” Walmart establishes partnerships with suppliers that can offer the best price and can meet
demand. Those strategic partnerships allow Walmart to offer long-term contracts with high volume and
for the lowest price. The communication between Walmart and its partners is what helps it achieve this
supply chain excellence, so that it can improve material flow with less inventory and thus at the lowest
possible cost. A strategy used by Walmart is cross docking; this system gives the advantage of lesser inven-
tory in their warehouses and fast fulfillment in Walmart stores around the country.
Apple is another leader in supply chain and number one at Gartner’s rank for three years in a row.
Apple has around 156 primary suppliers in the world and only one warehouse located in California. Ap-
ple’s supply chain is relatively simple and this makes its processes easier to manage and thus saves on costs
related to managing the supply chain. Apple constructed relationships with their suppliers, listing the
expectations that the company have in the partnerships moving forward to exclusivity in return of high
volume of guarantees. According to University Alliance (2015), “the company has used its deep pockets
to ensure adequate production capacity by placing high volume pre-orders with suppliers,” which prevent
competitors to achieve access to the same products manufactured by the same suppliers as Apple.
402
Supply Chain Management for Engineering Managers
• Adopting supply chain finance: In order to reduce costs, a practice that many companies are using
is supply chain finance. According to Beth Enslow (2015), it “is a combination of trade financing
services provided by an enterprise or a financial institution and a technology platform that unites the
trading partners electronically. It can involve early payment discount programs, inventory financing,
and other programs to help improve payment predictability and cash flow for suppliers while helping
buyers extend payment times and lower unit costs.”
• Managing supply chain complexity: It is important to not have too complex of a supply chain be-
cause managing it becomes very resource intensive. The key is to be able to come up with clear suppli-
er qualification criteria and then optimize the number of tier 1 suppliers.
23.9 Conclusion
Since no company operates in isolation, supply chain management plays a significant role in almost all
companies nowadays. Although there are leaders in the field of supply chain management, it is an im-
portant challenge for all companies to address since it is the foundation and infrastructure of successful
businesses. Companies, big or small, need to be aware of and understand the complexities of their supply
chain, without which they will not be able to prosper in the 21st century’s interconnected business envi-
ronment. The need for good engineers in the supply chain domain is clear and hence companies as well
as universities should work together in order to produce engineers and engineering managers who have a
level of awareness and understanding of their product as well as organization’s supply chain. This would
not only help an organization boost customer satisfaction by delivering products and services on time, but
also help create better overall value for the customer; thus increasing quality.
403
Engineering Management Handbook
23.10 References
“Apple’s SCM Make It a Global Supply Chain Leader,” University of San Francisco Online. University
Alliance. Accessed 6 June 2015.
Balaji, L. N., “How to Reduce Costs through Supply Chain Network Optimization.” Industry Week, 8
July 2013.
Bosman, R., The New Supply Chain Challenge: Risk Management in a Global Economy, 2006. Accessed
from http://www.fmglobal.com/pdfs/ChainSupply.pdf.
Cecere, Lora., “Preparing to Run the Race: Supply Chain 2020.” Supply Chain Shaman, 25 Apr. 2012.
Chopra, S. and Sodhi, M. S., “Reducing Risk of Supply Chain Disruption,” MIT Sloan Management
Review, 2014.
Corbett, Meryle, “SIPOC - An Amazing Way to Reduce Waste and Streamline Workload.” BC Biz-
CoachOnline, 30 Apr. 2012.
“CSCMP Supply Chain Management,” CSCMP Supply Chain Management. Council of Supply Chain
Management Professionals. Accessed 4 June 2015.
Engel, Robert and Wesoky, Jon, “10 Best Practices for Supply Management Organizations.” Institute for
Supply Management. 95nd Annual International Supply Management Conference, 1 Apr. 2010.
Enslow, Beth, “Global Supply Chain Excellence: New Best Practices to Master.” Supply Chain Brain.
Accessed 18 Dec. 2015.
Gandhi, Shereazad Jimmy, Gorod, Alex, and Sauser, Brian, “Prioritization of Outsourcing Risks from a
Systemic Perspective.” Emerald Insight 5.1, pp. 39-71, 2012.
Gattorna, John, Dynamic Supply Chains. 3rd Edition ed., 2015.
Handfield, Robert, “What Is Supply Chain Management?” Supply Chain Management, SCM, SCRC Sup-
ply Chain Resource Cooperative, Poole College of Management, North Carolina State University. 11 Jan.
2011.
Harrison, A., Christopher, M. and van Hoek, R., Creating the Agile Supply Chain, Institute of Logistics
& Transport, UK, 1999.
Hatton, John, “Lessons in Lean.” Supply Management | The Procurement and Supply Website. 14 Mar.
2013. NEED URL.
Hofman, Debra, “The Top 25 Supply Chains: Leadership in Action.” Supply Chain Management Review,
10 Oct. 2011.
Kauffman, Ralph, and Thomas Crimi, “Supply Chain Cost Reduction Strategies.” Institute for Supply
Management. Institute for Supply Management, 1998.
Lu, Clara, “Incredibly Successful Supply Chain Management: How Does Walmart Do It?” Tradegecko, 8
May 2014.
Mack, Stan, “Explain the Term “Supply Chain” and Its Importance to Cost Management.” Small Business.
Demand Media. Accessed 5 June 2015.
Manrodt, Karl, Thompson, Richard and Vitasek, Kate, “Benchmarking Your Lean Journey.” Logistics
Management. Jones Lang LaSalle, 2008.
Manuj, I. and Mentzer, J. T., “Global supply chain risk management strategies,” International Journal of
Physical Distribution & Logistics Management, vol. 38, no. 3, pp.192-223, 2008.
Mercier, Pierre, Sirkin, Harold and Bratton, Jennifer, “Eight Ways to Boost Supply Chain Agility.” Supply
Chain Management Review, 7 Jan. 2010.
O’Keeffe, P., Understanding supply chain risk areas, solutions, and plan, 2004. Accessed from http://
www.protiviti.com/en-US/Documents/Surveys/SupplyChainRiskAreas.pdf.
Sankar, Ravi, “Five Ways to Optimize Supply Chain Management.” Industry Week, 31 Oct. 2011.
Strong, James, “Customer Focused Supply Chain Management.” The ACA Group, 2011.
“The 2015 MHI Annual Industry Report Supply Chain Innovation—Making the Impossible Possible,”
2015.
“Timeline of 50 Years of Supply Chain at Walmart,” Supply Chain Digest. 26 July 2012.
Veinott, Arthur, “Lectures in Supply-Chain Optimization.” Department of Management Science and
Engineering Stanford University. Stanford University, Stanford, CA, 1 Jan. 2005. Lecture.
404
Supply Chain Management for Engineering Managers
Werling, Chris, “Top 10 Supply Chain Best Practices.” Cornerstone Solutions, Inc., 2007.
“What Is the Importance of Supply Chain Management?” University of San Francisco Online. University
Alliance. Accessed 6 June 2015.
Zsidisin, G., “A grounded definition of supply risk.” Journal of Purchasing and Supply Management, vol. 9,
no. 5-6, pp. 217-224, 2003. DOI: 10.1016/j.pursup.2003.07.002.
405
406
AUTHOR BIOGRAPHIES
407
Labs, Lockheed Martin, Technical University of Munich, Baker Hughes, Nokia, IBM, INCOSE (International Council
on Systems Engineering), and many others. Dr. Cloutier received Product Development Management Association
Visions Award, 2010, the Stevens Provost Award in Recognition of Outstanding Achievements in Research and
Scholarship, 2010-2011, and the 2009-2010 Alexander Crombie Humphreys Distinguished Associate Professor
Teaching Award at Stevens. Dr. Cloutier is a member of INCOSE and an active member in their Architecture Working
Group, and in the INCOSE Model Based Systems Engineering Working Group. He served as Chapter President of
the Delaware Valley Chapter of INCOSE. Dr. Cloutier holds a Ph.D. in Systems Engineering from Stevens Institute of
Technology, an MBA from Eastern University, and a BS from the United States Naval Academy. He served in the US
Navy as a Machinery Officer, and an Anti-submarine Officer.
Chris Edmonds, CEO, Roddie’s Code, LLC and Roddie Edmonds Foundation
Mr. Edmonds is the son of WWII hero Master Sergeant Roddie Edmonds who’s fearless bravery saved the lives
of more than 200 Jewish soldiers in a prisoner of war camp in Germany in January 1945. In January 2016,
408
Mr. Edmonds received the Righteous Among the Nations award on behalf of his father from the Nation of Israel.
He is an inspirational speaker and executive leader with twenty-five years of success in developing people
that supports business values and objectives. He has been a member and instructor for American Society for
Engineering Management since 2011. He has an undergraduate degree in Human Resources Management from
the University of Tennessee and a Masters in Religion and Counseling from Liberty University. He is also certified
as a Senior Professional in Human Resources (SPHR) and serves as Pastor of Piney Grove Baptist Church in
Maryville, Tennessee.
414
Index
A
Accounting xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Asset xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Balance Sheet xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Cash Flow Statement xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Income Statement xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Owner’s Equity xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Stakeholder’s Equity xiii, 199, 200, 201, 204, 205, 219, 220, 222, 223, 243, 244
Advanced Stochastic Models 122
After Tax Analysis 217, 218, 242, 248
American Society of Engineering Management i, 149, 182, 223
Analytical Hierarchy Process 171, 182, 250
Architectural Design 274
B
Balance Sheet xxiii, 202, 205, 206, 207, 209, 210, 211, 212, 217, 218, 223, 242, 243
Benefit Cost Analysis 168, 232, 235
Bottom-Up Approach xxi, 277
Brownian Motion 124
C
Cash Flow Patterns 230
Complexity 280, 290, 300, 301, 308, 314, 315, 329
Consequence Estimation 326
Consumer Price Index 240
Contribution Margin 221, 222
Contribution Margin Ratio 221, 222
Copyrights 24
Culture 22
D
Decision Analysis xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Additive Value Model xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Advantages xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Dialog Decision Process xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Disadvantages xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Imperfect Information xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Influence Diagram xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Multiple Objective Decision Analysis xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Perfect Information xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Risk Profile xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Single Attribute Utility xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Swing Weights xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Uncertainty xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Value Functions xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Value of a Test xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Values and Outcomes xi, 8, 151, 152, 153, 162, 165, 166, 167, 248
Decision Theory School 34, 35
Depreciation xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
Book Value xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
Depreciable Cost xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
Depreciation xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
415
Double Declining Balance Method xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
First Cost xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
Modified Accelerated Cost Recovery Systems xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247,
248
Straight Line Depreciation xxiv, 212, 213, 214, 215, 216, 217, 218, 242, 243, 244, 246, 247, 248
Disposal 215, 217, 218, 245, 270, 279
E
Empirical School 30, 34, 35
Engineering Management i, ii, vii, xix, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 132, 143, 149, 170, 182, 223,
282, 286, 290, 309, 315, 335, 414
Definition of Engineering Management i, ii, vii, xix, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 132, 143, 149,
170, 182, 223, 282, 286, 290, 309, 315, 335, 414
Knowledge Roles i, ii, vii, xix, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 132, 143, 149, 170, 182, 223, 282,
286, 290, 309, 315, 335, 414
Related Conferences i, ii, vii, xix, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 132, 143, 149, 170, 182, 223, 282,
286, 290, 309, 315, 335, 414
Related Journals i, ii, vii, xix, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 132, 143, 149, 170, 182, 223, 282, 286,
290, 309, 315, 335, 414
Ethical Decision-Making 20
Ethics vii, 17, 18, 24
External Environment 36, 367
F
Figures of Merit 232
Annual Worth 232
Capitalized Cost 232
Capital Recovery 232
Future Worth 232
Present Worth 232
Financial Accounting 201, 222, 223
Financial Condition 202, 206
Foreign Corrupt Practices Act 22
H
Hard and Soft Systems Thinking xxiv, 288, 289
Herzberg’s Motivators and Hygienes 40, 44
Holism xxiv, 285, 289, 295, 308, 314
Human Behavioral School 35
I
Income Statement xxiii, 202, 204, 205, 206, 207, 209, 211, 212, 214, 217, 218, 223, 242, 243
Intellectual Property 18, 23, 24
Interest xx, xxiv, 213, 214, 219, 226, 227, 228, 229, 230, 232, 233, 234, 243, 244, 245, 246, 247, 289
Compounding xx, xxiv, 213, 214, 219, 226, 227, 228, 229, 230, 232, 233, 234, 243, 244, 245, 246, 247, 289
Effective Interest Rate xx, xxiv, 213, 214, 219, 226, 227, 228, 229, 230, 232, 233, 234, 243, 244, 245, 246, 247,
289
Simple xx, xxiv, 213, 214, 219, 226, 227, 228, 229, 230, 232, 233, 234, 243, 244, 245, 246, 247, 289
Internal Environment 37
Internal Rate of Return 232, 235, 248
International Council on Systems Engineering 266
Invention Disclosure 23
Investment Tax Credit 218, 243, 244, 247
ISO/IEC 15288 xx, 269, 270, 279, 280
416
J
Justice Rule 20, 21
L
Likelihood Estimation 326
M
Markov Chains 115, 117, 118, 122, 124
Absorbing 115, 117, 118, 122, 124
Continuous Time 115, 117, 118, 122, 124
Discrete-time 115, 117, 118, 122, 124
Maslow’s Hierarchy 39, 40, 44
Mathematical School 30, 34, 35
McClelland’s Need to Achieve 41
McGregor’s Theory X and Theory Y 39, 44
Minimum Attractive Rate of Return 226, 245, 249
Moral Rights Rule 20
Multi-Attribute Analysis 170, 179
Multi-Criteria Analysis xii, 169, 170
Analytical Hierarchy Process xii, 169, 170
Analytic Network Process xii, 169, 170
Multi Attribute Analysis xii, 169, 170
Utility Theory xii, 169, 170
N
National Society of Professional Engineers 18
O
Operation Research 182
P
Patents 23
Practical Rule 20, 21
Price Indices 241
Project Management xv, 7, 8, 9, 149, 307, 315
Q
Queuing Theory 118
Little’s Rule 118
Single Server - Single Channel 118
R
Requirements xxiv, 269, 270, 273, 280
Requirements Analysis 269, 273
Risk xvi, xx, xxi, xxiv, 157, 162, 167, 168, 249, 317, 318, 319, 320, 321, 322, 326, 327, 328, 331, 332, 333, 335
Risk Management xvi, xxi, 317, 319, 320, 321, 335
Risk Ranking 328
Risk Scenarios xxi, xxiv, 322, 326, 328
S
Sarbanes-Oxley Act 23
Scenario Identification 321
Simulation xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150, 270, 313, 414
417
Agent Based Modeling xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150,
270, 313, 414
ARENA xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150, 270, 313, 414
Continuous Simulation xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150,
270, 313, 414
Discrete Event Simulation xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149,
150, 270, 313, 414
Monte Carlo Simulation xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149,
150, 270, 313, 414
Optimization xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150, 270, 313,
414
Simulation Applications xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149,
150, 270, 313, 414
Simulation Engineering xi, xix, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 140, 141, 143, 145, 149, 150,
270, 313, 414
Social Systems School 34, 35
Stakeholders xix, 20, 270, 284, 286, 334, 335
Stochastic Models 122, 130
Stockholder’s Equity xxiii, 209, 210, 211
Strategic Intent 362, 366, 368, 370
Strategic Management xvii, xxi, 8, 14, 15, 38, 361, 362, 363, 364, 365, 378
Strategic Management Process xxi, 363, 365
Deploying Resources xxi, 363, 365
Deploying the Strategic Intent xxi, 363, 365
Performance Evaluation xxi, 363, 365
Systemic Framing 310
Systems Thinking xv, xvi, xxi, xxiv, 281, 285, 286, 287, 288, 289, 290, 291, 292, 293, 297, 299, 300, 301, 304,
305, 308, 309, 310, 312, 313, 314, 315, 316
T
Target Net Profit 222
U
Use Cases 271
Utilitarian Rule 20
Utility Theory 168, 174, 180
V
Validation 270, 276, 278
Verification 270, 276, 277
418
419
420