Knowledge

Event chain methodology

Source 📝

246:
example, event “structural defect is discovered” can cause one or many activities “Repair”. Events can cause other events to occur either immediately or with a delay. The delay is a property of the event subscription. The delay can be deterministic, but in most cases, it is probabilistic. Also risks can be transferred from one activity to another. To define event chains, we need to identify a "sender", the event that initiates the chain of events. The sender event can cause one or more events that effect multiple activities. These are called "receiver" events. In turn, the receiver events can also act as sender events.
71:
is a risk adjusted project schedule, crucial tasks, and probabilities that project will be completed on time and on budget. Defining uncertainties using statistical distribution provide accurate results if there is a reliable historical data about duration and cost of similar tasks in previous projects. Another approach is to define uncertainties using risk events or risk drivers, which can be assigned to different tasks or resources. Information about probabilities and impact of such events is easier to elicit, which improves accuracy of analysis. Risks can be recorded in the
155: 478:
cost if an activity is partially completed and certain events are assigned to the activity. Event chain methodology reduces the risk probability and impact automatically based on the percent of work completed. Advanced analysis can be performed using a Bayesian approach. It is possible to monitor the chance that a project will meet a specific deadline. This chance is constantly updated as a result of the Monte Carlo analysis. Critical events and event chains can be different at the various phases of the project
255: 303: 167:. The original state is called a ground state, other states are called excited states. For example, if the team completes their job on activity, they can move to other activities. The notion of an activity's state is important because certain events can or cannot occur when activity is in certain state. It means that the state of an activity is subscribed to the events. Events can be local, affecting particular tasks or resources, or global affecting all tasks or resources. 403:“critical events” or “critical chains of events”. By identifying critical events or critical chains of events, we can identify strategies to minimize their negative effects: Avoid, Transfer, Mitigate, or Accept. Event and event chain ranking is performed for all risk categories (schedule-related and non-schedule) as part of one process. Integrated risk probability, impact and score can be calculated using weights for each risk category. 666: 580: 497: 417: 342: 181: 94: 558: 641: 20: 565:
Sometimes events can cause the start of an activity that has already been completed. This is a very common scenario for real life projects; sometimes a previous activity must be repeated based on the results of a succeeding activity. Event chain methodology simplifies modeling of these scenarios. The
245:
Events can be correlated with each other without one triggering another one. In this case if one risk has occurred, another one will occur and vice versa. One event assigned in one activity can execute another activity or group of activities. In many cases it the execution of risk response plans. For
162:
Activities (tasks) are not a continuous uniform procedure. Tasks are affected by external events, which transform an activity from one state to another. One of the important properties of an event is the moment when an event occurs during the course of an activity. This moment, when an event occurs,
70:
Event chain methodology is an extension of traditional Monte Carlo simulation of project schedules where uncertainties in task duration and costs are defined by statistical distribution. For example, task duration can be defined by three point estimates: low, base, and high. The results of analysis
477:
Monitoring the activity's progress ensures that updated information is used to perform the analysis. During the course of the project, the probability and time of the events can be recalculated based on actual data. The main reason for performance tracking is forecasting an activity's duration and
402:
Monte Carlo simulation provides the capability, through sensitivity analysis, to identify single or chains of events. These chains of events can be identified by analyzing the correlations between the main project parameters, such as project duration or cost, and the event chains. These are called
310:
Another tool that can be used to simplify the definition of events is a state table. Columns in the state table represent events; rows represent the states of an activity. Information for each event in each state includes four properties of event subscription: probability, moment of event, excited
327:
In Event chain methodology, risk can not only affect schedule and cost, but also other parameters such as safety, security, performance, technology, quality, and other objectives. In other words, one event can belong to different categories. The result of the analysis would show risk exposure for
651:
Risk response plans execution are triggered by events, which occur if an activity is in an excited state. Risk response events may attempt to transform the activity from the excited state to the ground state. Response plans are an activity or group of activities (small schedule) that augment the
241:
Events can be related to other events, which will create event chains. These event chains can significantly affect the course of the project. For example, requirement changes can cause an activity to be delayed. To accelerate the activity, the project manager allocates a resource from another
726:
One potential event is the reassignment of a resource from one activity to another, which can occur under certain conditions. For example, if an activity requires more resources to complete it within a fixed period, this will trigger an event to reallocate the resource from another activity.
323:
can be performed to quantify the cumulative effect of the events. Probabilities and impacts of risks assigned to activities are used as input data for Monte Carlo simulation of the project schedule. In most projects it is necessary to supplement the event based variance with uncertainties as
265:
is a visualization that shows the relationships between events and tasks and how the events affect each other. The simplest way to represent these chains is to depict them as arrows associated with certain tasks or time intervals on the Gantt chart. Here are a few important rules:
566:
original project schedule does not need to be updated, all that is required is to define the event and assign it to an activity that points to the previous activity. In addition, a limit to the number of times an activity can be repeated must be defined.
727:
Reallocation of resources can also occur when activity duration reaches a certain deadline or the cost exceeds a certain value. Events can be used to model different situations with resources, e.g. temporary leave, illness, vacations, etc.
75:. Event chain methodology was first proposed in the period of 2002–2004. It is fully or partially implemented in a number of software application. Event Chain Methodology is based on six principles and has a number of outcomes. 294:
Event chains may trigger a group of activities. In this case this group of activities will be surrounded by the box or frame and event chain line will be connected to the corner of the box or first activity within a
1049:
Agarwal, Ruchi. and Virine, Lev. (2017). Monte Carlo Project Risk Analysis. In Raydugin, Y. (ed) Handbook of Research on Leveraging Risk and Uncertainties for Effective Project Management. IGI Global; 1
242:
activity, which then leads to a missed deadline. Eventually, this can lead to the failure of the project. It could be different relationship between events. One event can trigger one or multiple events.
38:
schedules. It is an uncertainty modeling schedule technique. Event chain methodology is an extension of quantitative project risk analysis with Monte Carlo simulations. It is the next advance beyond
829:
Virine, Lev (2013). Integrated Qualitative and Quantitative Risk Analysis of Project Portfolios. In Proceedings of Enterprise Risk Management Symposium. April 22–23, 2013, Chicago, IL
963:
Virine, Lev (2013). Integrated Qualitative and Quantitative Risk Analysis of Project Portfolios. In Proceedings of 2013 Enterprise Risk Management Symposium, April 22–24, Chicago, IL
328:
different categories as well as integrated project risk score for all categories. This integrated project risk score is calculated based on relative weights for each risk category.
285:
Colors represent the calculated impact of the risk. Higher impacts are red or darker shade. Low impacts are green or lighter shade. The size of the arrow represents probability.
652:
project schedule if a certain event occurs. The solution is to assign the response plan to an event or event chain. The same response plan can be used for one or more events.
981:
Virine, Lev & McVean, Jason. (2004). Visual Modeling of Business Problems: Workflow and Patterns, In Proceedings of 2004 Winter Simulation Conference, Washington DC.
990:
Virine, Lev & Rapley, Lisa. (2003). Visualization of Probabilistic Business Models, In Proceedings of 2003 Winter Simulation Conference, New Orleans, LA.
972:
Virine, Lev. and Trumper, Michael. (2015). Predicting the unpredictable: how to analyze project risks using event chain methodology. PM Network, 29(9), 28–29
299:
By using event chain diagrams to visualize events and event chains, the modeling and analysis of risks and uncertainties can be significantly simplified.
47: 279:
Closed or transferred risks are shown using dashed lines. Color of arrow is white. Closed issue is shown in the circle with dashed border line.
291:
Event chains may trigger another activity. In this case event chain line will be connected with the beginning of activity with optional arrow.
1040:
Williams, T. "Why Monte Carlo simulations of project networks can mislead". Project Management Journal, Vol 35. Issue 3, (2004): 53-61
687: 601: 518: 438: 363: 202: 115: 751: 1258: 848: 820:
Robyn M. Dawes and Bernard Corrigan, ‘‘Linear Models in Decision Making’’ Psychological Bulletin 81, no. 2 (1974): 93–106.
1234:
Project Decisions: How to make better project decisions, analyze and manage project risks, and manage successful projects
736: 1206: 1192: 948: 923: 898: 873: 805: 771: 34:
technique that is focused on identifying and managing events and relationships between them (event chains) that affect
1178: 1164: 1150: 1140: 1126: 1112: 1098: 1076: 741: 713: 627: 544: 464: 389: 228: 141: 59: 695: 609: 526: 446: 371: 210: 123: 258:
Example of event chain diagram: local and global threats and opportunities with different probabilities and impacts
1145:
Robert C.P. and G. Casella. "Monte Carlo Statistical Methods" (second edition). New York: Springer-Verlag, 2004,
62:. It improves accuracy of risk assessment and helps to generate more realistic risk adjusted project schedules. 1278: 691: 605: 522: 442: 367: 206: 119: 648:
If an event or event chain occurs during the course of a project, it may require some risk response effort.
1288: 1218: 1243: 1273: 1263: 1228: 776: 676: 590: 507: 427: 352: 191: 164: 104: 1268: 1223: 680: 594: 511: 431: 356: 282:
Excited states are represented by elevating the associated section of the bar on the Gantt chart.
195: 108: 1293: 746: 320: 1283: 39: 1006:
Management: Journal of Sustainable Business and Management Solutions in Emerging Economies
8: 262: 306:
Example of event chain diagram with critical event chain and activity triggered by event
1023: 761: 1202: 1188: 1174: 1160: 1146: 1136: 1122: 1108: 1094: 1072: 1018: 1001: 944: 919: 894: 869: 844: 801: 276:
Issues are shown as an arrow within a circle. Color of the issue arrow is red (dark).
1027: 1064: 1013: 766: 51: 154: 43: 31: 1252: 72: 254: 46:
project management. Event chain methodology tries to mitigate the effect of
1002:"Examining the Value of Monte Carlo Simulation for Project Time Management" 324:
distributions related to duration, start time, cost, and other parameters.
302: 1238: 273:
Arrows pointing down are threats. Arrows pointing up are opportunities.
55: 319:
Once events and event chains are defined, quantitative analysis using
1133:
Decision Analysis: Introductory Readings on Choices Under Uncertainty
1224:
Risk Management Guide for Information Technology Systems (July 2002)
665: 579: 496: 416: 341: 180: 93: 557: 288:
Event chains are shown as lines connecting arrows depicting events.
270:
Event chains diagrams present events as arrows on the Gantt charts.
1233: 1119:
The Smart Organization: Creating Value through Strategic R&D
756: 640: 35: 891:
Managing Risk in Projects (Fundamentals of Project Management)
406: 19: 1084:
Smart Choices: A Practical Guide to Making Better Decisions
1185:
ProjectThink: Why Good Managers Make Poor Project Choices
1105:
Value-focused thinking: A Path to Creative Decisionmaking
163:
in most cases is probabilistic and can be defined using
1239:
Petri Nets for Project Management and Resource Leveling
83: 655: 1091:Judgement under Uncertainty: Heuristics and Biases 569: 1250: 1229:Project Management Using Event Chain Methodology 1082:Hammond, J.S. and Keeney, R.L. and Raiffa, H., 866:Practical Risk Management: The ATOM Methodology 1199:Project Risk Analysis Made Ridiculously Simple 1244:NASA Risk Management Handbook (November 2011) 795: 868:(2nd ed.). Berrett-Koehler Publishers. 694:. Unsourced material may be challenged and 608:. Unsourced material may be challenged and 525:. Unsourced material may be challenged and 445:. Unsourced material may be challenged and 407:Project control with event and event chains 370:. Unsourced material may be challenged and 209:. Unsourced material may be challenged and 122:. Unsourced material may be challenged and 1069:Sequential Monte Carlo methods in Practice 1089:D. Kahneman and A. Tversky (ed.) (1982). 1017: 714:Learn how and when to remove this message 628:Learn how and when to remove this message 545:Learn how and when to remove this message 465:Learn how and when to remove this message 390:Learn how and when to remove this message 314: 229:Learn how and when to remove this message 142:Learn how and when to remove this message 1159:(second edition) (1999). Probabilistic. 639: 556: 331: 301: 253: 153: 18: 1121:(1998). Harvard Business School Press. 999: 888: 863: 752:Program Evaluation and Review Technique 249: 1251: 1171:Decision Analysis: A Bayesian Approach 941:Integrated Cost-Schedule Risk Analysis 938: 913: 843:(3rd ed.). Great Britain: Wiley. 798:Project Decisions: The Art and Science 796:Virine, Lev; Trumper, Michael (2007). 486: 1201:(2017), World Scientific Publishing. 1086:(1999). Harvard Business School Press 1117:Matheson, David, and Matheson, Jim, 838: 692:adding citations to reliable sources 659: 606:adding citations to reliable sources 573: 523:adding citations to reliable sources 490: 443:adding citations to reliable sources 410: 368:adding citations to reliable sources 335: 207:adding citations to reliable sources 174: 158:Event chain diagram for one activity 120:adding citations to reliable sources 87: 84:Moment of risk and state of activity 841:Risk Analysis: A Quantitative Guide 737:List of project management software 656:Resource allocation based on events 13: 1219:Event Chain Methodology in Details 1157:Introduction to Decision Analysis 1107:(1992). Harvard University Press. 1057: 772:Virtuous circle and vicious circle 14: 1305: 1212: 742:List of project management topics 1019:10.7595/management.fon.2018.0004 916:Practical Schedule Risk Analysis 664: 578: 495: 415: 340: 311:state, and impact of the event. 179: 92: 1043: 1034: 993: 984: 975: 966: 170: 1093:. Cambridge University Press. 957: 932: 907: 882: 857: 832: 823: 814: 800:. Berrett-Koehler Publishers. 789: 570:Event chains and risk response 1: 1259:Project management techniques 782: 78: 481: 7: 1197:Virine, L. and Trumper M., 1183:Virine, L. and Trumper M., 730: 10: 1310: 1173:(1988), Chapman and Hall. 65: 16:Network analysis technique 777:Work breakdown structure 165:statistical distribution 1000:Avlijas, Goran (2018). 889:Hillson, David (2009). 864:Hillson, David (2012). 28:Event chain methodology 1187:(2013), Gower Pub Co. 939:Hulett, David (2011). 914:Hulett, David (2009). 747:Monte Carlo simulation 645: 562: 321:Monte Carlo simulation 315:Monte Carlo simulation 307: 259: 159: 24: 1279:Scheduling algorithms 1135:(1997). McGraw Hill. 643: 560: 332:Critical event chains 305: 257: 157: 22: 839:Vose, David (2008). 688:improve this section 602:improve this section 519:improve this section 439:improve this section 364:improve this section 250:Event chain diagrams 203:improve this section 116:improve this section 40:critical path method 487:Repeated activities 263:Event chain diagram 23:Event chain diagram 1289:Events (computing) 762:Project management 646: 563: 308: 260: 160: 25: 1067:and Neil Gordon, 850:978-0-470-51284-5 724: 723: 716: 638: 637: 630: 561:Repeated Activity 555: 554: 547: 475: 474: 467: 400: 399: 392: 239: 238: 231: 152: 151: 144: 1301: 1274:Network analysis 1264:Event management 1155:Skinner, David, 1131:Raiffa, Howard, 1065:Nando de Freitas 1051: 1047: 1041: 1038: 1032: 1031: 1021: 997: 991: 988: 982: 979: 973: 970: 964: 961: 955: 954: 936: 930: 929: 911: 905: 904: 886: 880: 879: 861: 855: 854: 836: 830: 827: 821: 818: 812: 811: 793: 767:Project planning 719: 712: 708: 705: 699: 668: 660: 633: 626: 622: 619: 613: 582: 574: 550: 543: 539: 536: 530: 499: 491: 470: 463: 459: 456: 450: 419: 411: 395: 388: 384: 381: 375: 344: 336: 234: 227: 223: 220: 214: 183: 175: 147: 140: 136: 133: 127: 96: 88: 52:cognitive biases 32:network analysis 1309: 1308: 1304: 1303: 1302: 1300: 1299: 1298: 1249: 1248: 1215: 1063:Arnaud Doucet, 1060: 1058:Further reading 1055: 1054: 1048: 1044: 1039: 1035: 998: 994: 989: 985: 980: 976: 971: 967: 962: 958: 951: 937: 933: 926: 912: 908: 901: 887: 883: 876: 862: 858: 851: 837: 833: 828: 824: 819: 815: 808: 794: 790: 785: 733: 720: 709: 703: 700: 685: 669: 658: 644:Mitigation plan 634: 623: 617: 614: 599: 583: 572: 551: 540: 534: 531: 516: 500: 489: 484: 471: 460: 454: 451: 436: 420: 409: 396: 385: 379: 376: 361: 345: 334: 317: 252: 235: 224: 218: 215: 200: 184: 173: 148: 137: 131: 128: 113: 97: 86: 81: 68: 17: 12: 11: 5: 1307: 1297: 1296: 1291: 1286: 1281: 1276: 1271: 1269:Business terms 1266: 1261: 1247: 1246: 1241: 1236: 1231: 1226: 1221: 1214: 1213:External links 1211: 1210: 1209: 1207:978-9814759373 1195: 1193:978-1409454984 1181: 1167: 1153: 1143: 1129: 1115: 1103:Keeney, R.L., 1101: 1087: 1080: 1059: 1056: 1053: 1052: 1042: 1033: 992: 983: 974: 965: 956: 950:978-0566091667 949: 931: 925:978-0566087905 924: 906: 900:978-0566088674 899: 881: 875:978-1567263664 874: 856: 849: 831: 822: 813: 807:978-1567262179 806: 787: 786: 784: 781: 780: 779: 774: 769: 764: 759: 754: 749: 744: 739: 732: 729: 722: 721: 672: 670: 663: 657: 654: 636: 635: 586: 584: 577: 571: 568: 553: 552: 503: 501: 494: 488: 485: 483: 480: 473: 472: 423: 421: 414: 408: 405: 398: 397: 348: 346: 339: 333: 330: 316: 313: 297: 296: 292: 289: 286: 283: 280: 277: 274: 271: 251: 248: 237: 236: 187: 185: 178: 172: 169: 150: 149: 100: 98: 91: 85: 82: 80: 77: 67: 64: 44:critical chain 15: 9: 6: 4: 3: 2: 1306: 1295: 1294:Risk analysis 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1256: 1254: 1245: 1242: 1240: 1237: 1235: 1232: 1230: 1227: 1225: 1222: 1220: 1217: 1216: 1208: 1204: 1200: 1196: 1194: 1190: 1186: 1182: 1180: 1179:0-412-27520-1 1176: 1172: 1169:Smith, J.Q., 1168: 1166: 1165:0-9647938-3-0 1162: 1158: 1154: 1152: 1151:0-387-21239-6 1148: 1144: 1142: 1141:0-07-052579-X 1138: 1134: 1130: 1128: 1127:0-87584-765-X 1124: 1120: 1116: 1114: 1113:0-674-93197-1 1110: 1106: 1102: 1100: 1099:0-521-28414-7 1096: 1092: 1088: 1085: 1081: 1078: 1077:0-387-95146-6 1074: 1070: 1066: 1062: 1061: 1046: 1037: 1029: 1025: 1020: 1015: 1011: 1007: 1003: 996: 987: 978: 969: 960: 952: 946: 943:. Routledge. 942: 935: 927: 921: 918:. Routledge. 917: 910: 902: 896: 893:. Routledge. 892: 885: 877: 871: 867: 860: 852: 846: 842: 835: 826: 817: 809: 803: 799: 792: 788: 778: 775: 773: 770: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 734: 728: 718: 715: 707: 697: 693: 689: 683: 682: 678: 673:This section 671: 667: 662: 661: 653: 649: 642: 632: 629: 621: 611: 607: 603: 597: 596: 592: 587:This section 585: 581: 576: 575: 567: 559: 549: 546: 538: 528: 524: 520: 514: 513: 509: 504:This section 502: 498: 493: 492: 479: 469: 466: 458: 448: 444: 440: 434: 433: 429: 424:This section 422: 418: 413: 412: 404: 394: 391: 383: 373: 369: 365: 359: 358: 354: 349:This section 347: 343: 338: 337: 329: 325: 322: 312: 304: 300: 293: 290: 287: 284: 281: 278: 275: 272: 269: 268: 267: 264: 256: 247: 243: 233: 230: 222: 212: 208: 204: 198: 197: 193: 188:This section 186: 182: 177: 176: 168: 166: 156: 146: 143: 135: 125: 121: 117: 111: 110: 106: 101:This section 99: 95: 90: 89: 76: 74: 73:Risk register 63: 61: 57: 53: 49: 45: 41: 37: 33: 29: 21: 1198: 1184: 1170: 1156: 1132: 1118: 1104: 1090: 1083: 1068: 1045: 1036: 1009: 1005: 995: 986: 977: 968: 959: 940: 934: 915: 909: 890: 884: 865: 859: 840: 834: 825: 816: 797: 791: 725: 710: 701: 686:Please help 674: 650: 647: 624: 615: 600:Please help 588: 564: 541: 532: 517:Please help 505: 476: 461: 452: 437:Please help 425: 401: 386: 377: 362:Please help 350: 326: 318: 309: 298: 261: 244: 240: 225: 216: 201:Please help 189: 171:Event chains 161: 138: 129: 114:Please help 102: 69: 48:motivational 27: 26: 1284:Methodology 1253:Categories 783:References 79:Principles 60:scheduling 56:estimating 704:June 2023 675:does not 618:June 2023 589:does not 535:June 2023 506:does not 482:Phenomena 455:June 2023 426:does not 380:June 2023 351:does not 219:June 2023 190:does not 132:June 2023 103:does not 1071:, 2001, 1028:67095960 731:See also 1050:edition 757:Project 696:removed 681:sources 610:removed 595:sources 527:removed 512:sources 447:removed 432:sources 372:removed 357:sources 211:removed 196:sources 124:removed 109:sources 66:History 36:project 1205:  1191:  1177:  1163:  1149:  1139:  1125:  1111:  1097:  1075:  1026:  1012:: 11. 947:  922:  897:  872:  847:  804:  295:frame. 30:is a 1024:S2CID 1203:ISBN 1189:ISBN 1175:ISBN 1161:ISBN 1147:ISBN 1137:ISBN 1123:ISBN 1109:ISBN 1095:ISBN 1073:ISBN 945:ISBN 920:ISBN 895:ISBN 870:ISBN 845:ISBN 802:ISBN 679:any 677:cite 593:any 591:cite 510:any 508:cite 430:any 428:cite 355:any 353:cite 194:any 192:cite 107:any 105:cite 58:and 50:and 42:and 1014:doi 690:by 604:by 521:by 441:by 366:by 205:by 118:by 54:in 1255:: 1022:. 1010:24 1008:. 1004:. 1079:. 1030:. 1016:: 953:. 928:. 903:. 878:. 853:. 810:. 717:) 711:( 706:) 702:( 698:. 684:. 631:) 625:( 620:) 616:( 612:. 598:. 548:) 542:( 537:) 533:( 529:. 515:. 468:) 462:( 457:) 453:( 449:. 435:. 393:) 387:( 382:) 378:( 374:. 360:. 232:) 226:( 221:) 217:( 213:. 199:. 145:) 139:( 134:) 130:( 126:. 112:.

Index


network analysis
project
critical path method
critical chain
motivational
cognitive biases
estimating
scheduling
Risk register

cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message

statistical distribution

cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message

Event chain diagram

Monte Carlo simulation

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.