246:
example, event “structural defect is discovered” can cause one or many activities “Repair”. Events can cause other events to occur either immediately or with a delay. The delay is a property of the event subscription. The delay can be deterministic, but in most cases, it is probabilistic. Also risks can be transferred from one activity to another. To define event chains, we need to identify a "sender", the event that initiates the chain of events. The sender event can cause one or more events that effect multiple activities. These are called "receiver" events. In turn, the receiver events can also act as sender events.
71:
is a risk adjusted project schedule, crucial tasks, and probabilities that project will be completed on time and on budget. Defining uncertainties using statistical distribution provide accurate results if there is a reliable historical data about duration and cost of similar tasks in previous projects. Another approach is to define uncertainties using risk events or risk drivers, which can be assigned to different tasks or resources. Information about probabilities and impact of such events is easier to elicit, which improves accuracy of analysis. Risks can be recorded in the
155:
478:
cost if an activity is partially completed and certain events are assigned to the activity. Event chain methodology reduces the risk probability and impact automatically based on the percent of work completed. Advanced analysis can be performed using a
Bayesian approach. It is possible to monitor the chance that a project will meet a specific deadline. This chance is constantly updated as a result of the Monte Carlo analysis. Critical events and event chains can be different at the various phases of the project
255:
303:
167:. The original state is called a ground state, other states are called excited states. For example, if the team completes their job on activity, they can move to other activities. The notion of an activity's state is important because certain events can or cannot occur when activity is in certain state. It means that the state of an activity is subscribed to the events. Events can be local, affecting particular tasks or resources, or global affecting all tasks or resources.
403:“critical events” or “critical chains of events”. By identifying critical events or critical chains of events, we can identify strategies to minimize their negative effects: Avoid, Transfer, Mitigate, or Accept. Event and event chain ranking is performed for all risk categories (schedule-related and non-schedule) as part of one process. Integrated risk probability, impact and score can be calculated using weights for each risk category.
666:
580:
497:
417:
342:
181:
94:
558:
641:
20:
565:
Sometimes events can cause the start of an activity that has already been completed. This is a very common scenario for real life projects; sometimes a previous activity must be repeated based on the results of a succeeding activity. Event chain methodology simplifies modeling of these scenarios. The
245:
Events can be correlated with each other without one triggering another one. In this case if one risk has occurred, another one will occur and vice versa. One event assigned in one activity can execute another activity or group of activities. In many cases it the execution of risk response plans. For
162:
Activities (tasks) are not a continuous uniform procedure. Tasks are affected by external events, which transform an activity from one state to another. One of the important properties of an event is the moment when an event occurs during the course of an activity. This moment, when an event occurs,
70:
Event chain methodology is an extension of traditional Monte Carlo simulation of project schedules where uncertainties in task duration and costs are defined by statistical distribution. For example, task duration can be defined by three point estimates: low, base, and high. The results of analysis
477:
Monitoring the activity's progress ensures that updated information is used to perform the analysis. During the course of the project, the probability and time of the events can be recalculated based on actual data. The main reason for performance tracking is forecasting an activity's duration and
402:
Monte Carlo simulation provides the capability, through sensitivity analysis, to identify single or chains of events. These chains of events can be identified by analyzing the correlations between the main project parameters, such as project duration or cost, and the event chains. These are called
310:
Another tool that can be used to simplify the definition of events is a state table. Columns in the state table represent events; rows represent the states of an activity. Information for each event in each state includes four properties of event subscription: probability, moment of event, excited
327:
In Event chain methodology, risk can not only affect schedule and cost, but also other parameters such as safety, security, performance, technology, quality, and other objectives. In other words, one event can belong to different categories. The result of the analysis would show risk exposure for
651:
Risk response plans execution are triggered by events, which occur if an activity is in an excited state. Risk response events may attempt to transform the activity from the excited state to the ground state. Response plans are an activity or group of activities (small schedule) that augment the
241:
Events can be related to other events, which will create event chains. These event chains can significantly affect the course of the project. For example, requirement changes can cause an activity to be delayed. To accelerate the activity, the project manager allocates a resource from another
726:
One potential event is the reassignment of a resource from one activity to another, which can occur under certain conditions. For example, if an activity requires more resources to complete it within a fixed period, this will trigger an event to reallocate the resource from another activity.
323:
can be performed to quantify the cumulative effect of the events. Probabilities and impacts of risks assigned to activities are used as input data for Monte Carlo simulation of the project schedule. In most projects it is necessary to supplement the event based variance with uncertainties as
265:
is a visualization that shows the relationships between events and tasks and how the events affect each other. The simplest way to represent these chains is to depict them as arrows associated with certain tasks or time intervals on the Gantt chart. Here are a few important rules:
566:
original project schedule does not need to be updated, all that is required is to define the event and assign it to an activity that points to the previous activity. In addition, a limit to the number of times an activity can be repeated must be defined.
727:
Reallocation of resources can also occur when activity duration reaches a certain deadline or the cost exceeds a certain value. Events can be used to model different situations with resources, e.g. temporary leave, illness, vacations, etc.
75:. Event chain methodology was first proposed in the period of 2002–2004. It is fully or partially implemented in a number of software application. Event Chain Methodology is based on six principles and has a number of outcomes.
294:
Event chains may trigger a group of activities. In this case this group of activities will be surrounded by the box or frame and event chain line will be connected to the corner of the box or first activity within a
1049:
Agarwal, Ruchi. and Virine, Lev. (2017). Monte Carlo
Project Risk Analysis. In Raydugin, Y. (ed) Handbook of Research on Leveraging Risk and Uncertainties for Effective Project Management. IGI Global; 1
242:
activity, which then leads to a missed deadline. Eventually, this can lead to the failure of the project. It could be different relationship between events. One event can trigger one or multiple events.
38:
schedules. It is an uncertainty modeling schedule technique. Event chain methodology is an extension of quantitative project risk analysis with Monte Carlo simulations. It is the next advance beyond
829:
Virine, Lev (2013). Integrated
Qualitative and Quantitative Risk Analysis of Project Portfolios. In Proceedings of Enterprise Risk Management Symposium. April 22–23, 2013, Chicago, IL
963:
Virine, Lev (2013). Integrated
Qualitative and Quantitative Risk Analysis of Project Portfolios. In Proceedings of 2013 Enterprise Risk Management Symposium, April 22–24, Chicago, IL
328:
different categories as well as integrated project risk score for all categories. This integrated project risk score is calculated based on relative weights for each risk category.
285:
Colors represent the calculated impact of the risk. Higher impacts are red or darker shade. Low impacts are green or lighter shade. The size of the arrow represents probability.
652:
project schedule if a certain event occurs. The solution is to assign the response plan to an event or event chain. The same response plan can be used for one or more events.
981:
Virine, Lev & McVean, Jason. (2004). Visual
Modeling of Business Problems: Workflow and Patterns, In Proceedings of 2004 Winter Simulation Conference, Washington DC.
990:
Virine, Lev & Rapley, Lisa. (2003). Visualization of
Probabilistic Business Models, In Proceedings of 2003 Winter Simulation Conference, New Orleans, LA.
972:
Virine, Lev. and
Trumper, Michael. (2015). Predicting the unpredictable: how to analyze project risks using event chain methodology. PM Network, 29(9), 28–29
299:
By using event chain diagrams to visualize events and event chains, the modeling and analysis of risks and uncertainties can be significantly simplified.
47:
279:
Closed or transferred risks are shown using dashed lines. Color of arrow is white. Closed issue is shown in the circle with dashed border line.
291:
Event chains may trigger another activity. In this case event chain line will be connected with the beginning of activity with optional arrow.
1040:
Williams, T. "Why Monte Carlo simulations of project networks can mislead". Project
Management Journal, Vol 35. Issue 3, (2004): 53-61
687:
601:
518:
438:
363:
202:
115:
751:
1258:
848:
820:
Robyn M. Dawes and
Bernard Corrigan, ‘‘Linear Models in Decision Making’’ Psychological Bulletin 81, no. 2 (1974): 93–106.
1234:
Project
Decisions: How to make better project decisions, analyze and manage project risks, and manage successful projects
736:
1206:
1192:
948:
923:
898:
873:
805:
771:
34:
technique that is focused on identifying and managing events and relationships between them (event chains) that affect
1178:
1164:
1150:
1140:
1126:
1112:
1098:
1076:
741:
713:
627:
544:
464:
389:
228:
141:
59:
695:
609:
526:
446:
371:
210:
123:
258:
Example of event chain diagram: local and global threats and opportunities with different probabilities and impacts
1145:
Robert C.P. and G. Casella. "Monte Carlo Statistical Methods" (second edition). New York: Springer-Verlag, 2004,
62:. It improves accuracy of risk assessment and helps to generate more realistic risk adjusted project schedules.
1278:
691:
605:
522:
442:
367:
206:
119:
648:
If an event or event chain occurs during the course of a project, it may require some risk response effort.
1288:
1218:
1243:
1273:
1263:
1228:
776:
676:
590:
507:
427:
352:
191:
164:
104:
1268:
1223:
680:
594:
511:
431:
356:
282:
Excited states are represented by elevating the associated section of the bar on the Gantt chart.
195:
108:
1293:
746:
320:
1283:
39:
1006:
Management: Journal of Sustainable Business and Management Solutions in Emerging Economies
8:
262:
306:
Example of event chain diagram with critical event chain and activity triggered by event
1023:
761:
1202:
1188:
1174:
1160:
1146:
1136:
1122:
1108:
1094:
1072:
1018:
1001:
944:
919:
894:
869:
844:
801:
276:
Issues are shown as an arrow within a circle. Color of the issue arrow is red (dark).
1027:
1064:
1013:
766:
51:
154:
43:
31:
1252:
72:
254:
46:
project management. Event chain methodology tries to mitigate the effect of
1002:"Examining the Value of Monte Carlo Simulation for Project Time Management"
324:
distributions related to duration, start time, cost, and other parameters.
302:
1238:
273:
Arrows pointing down are threats. Arrows pointing up are opportunities.
55:
319:
Once events and event chains are defined, quantitative analysis using
1133:
Decision Analysis: Introductory Readings on Choices Under Uncertainty
1224:
Risk Management Guide for Information Technology Systems (July 2002)
665:
579:
496:
416:
341:
180:
93:
557:
288:
Event chains are shown as lines connecting arrows depicting events.
270:
Event chains diagrams present events as arrows on the Gantt charts.
1233:
1119:
The Smart Organization: Creating Value through Strategic R&D
756:
640:
35:
891:
Managing Risk in Projects (Fundamentals of Project Management)
406:
19:
1084:
Smart Choices: A Practical Guide to Making Better Decisions
1185:
ProjectThink: Why Good Managers Make Poor Project Choices
1105:
Value-focused thinking: A Path to Creative Decisionmaking
163:
in most cases is probabilistic and can be defined using
1239:
Petri Nets for Project Management and Resource Leveling
83:
655:
1091:Judgement under Uncertainty: Heuristics and Biases
569:
1250:
1229:Project Management Using Event Chain Methodology
1082:Hammond, J.S. and Keeney, R.L. and Raiffa, H.,
866:Practical Risk Management: The ATOM Methodology
1199:Project Risk Analysis Made Ridiculously Simple
1244:NASA Risk Management Handbook (November 2011)
795:
868:(2nd ed.). Berrett-Koehler Publishers.
694:. Unsourced material may be challenged and
608:. Unsourced material may be challenged and
525:. Unsourced material may be challenged and
445:. Unsourced material may be challenged and
407:Project control with event and event chains
370:. Unsourced material may be challenged and
209:. Unsourced material may be challenged and
122:. Unsourced material may be challenged and
1069:Sequential Monte Carlo methods in Practice
1089:D. Kahneman and A. Tversky (ed.) (1982).
1017:
714:Learn how and when to remove this message
628:Learn how and when to remove this message
545:Learn how and when to remove this message
465:Learn how and when to remove this message
390:Learn how and when to remove this message
314:
229:Learn how and when to remove this message
142:Learn how and when to remove this message
1159:(second edition) (1999). Probabilistic.
639:
556:
331:
301:
253:
153:
18:
1121:(1998). Harvard Business School Press.
999:
888:
863:
752:Program Evaluation and Review Technique
249:
1251:
1171:Decision Analysis: A Bayesian Approach
941:Integrated Cost-Schedule Risk Analysis
938:
913:
843:(3rd ed.). Great Britain: Wiley.
798:Project Decisions: The Art and Science
796:Virine, Lev; Trumper, Michael (2007).
486:
1201:(2017), World Scientific Publishing.
1086:(1999). Harvard Business School Press
1117:Matheson, David, and Matheson, Jim,
838:
692:adding citations to reliable sources
659:
606:adding citations to reliable sources
573:
523:adding citations to reliable sources
490:
443:adding citations to reliable sources
410:
368:adding citations to reliable sources
335:
207:adding citations to reliable sources
174:
158:Event chain diagram for one activity
120:adding citations to reliable sources
87:
84:Moment of risk and state of activity
841:Risk Analysis: A Quantitative Guide
737:List of project management software
656:Resource allocation based on events
13:
1219:Event Chain Methodology in Details
1157:Introduction to Decision Analysis
1107:(1992). Harvard University Press.
1057:
772:Virtuous circle and vicious circle
14:
1305:
1212:
742:List of project management topics
1019:10.7595/management.fon.2018.0004
916:Practical Schedule Risk Analysis
664:
578:
495:
415:
340:
311:state, and impact of the event.
179:
92:
1043:
1034:
993:
984:
975:
966:
170:
1093:. Cambridge University Press.
957:
932:
907:
882:
857:
832:
823:
814:
800:. Berrett-Koehler Publishers.
789:
570:Event chains and risk response
1:
1259:Project management techniques
782:
78:
481:
7:
1197:Virine, L. and Trumper M.,
1183:Virine, L. and Trumper M.,
730:
10:
1310:
1173:(1988), Chapman and Hall.
65:
16:Network analysis technique
777:Work breakdown structure
165:statistical distribution
1000:Avlijas, Goran (2018).
889:Hillson, David (2009).
864:Hillson, David (2012).
28:Event chain methodology
1187:(2013), Gower Pub Co.
939:Hulett, David (2011).
914:Hulett, David (2009).
747:Monte Carlo simulation
645:
562:
321:Monte Carlo simulation
315:Monte Carlo simulation
307:
259:
159:
24:
1279:Scheduling algorithms
1135:(1997). McGraw Hill.
643:
560:
332:Critical event chains
305:
257:
157:
22:
839:Vose, David (2008).
688:improve this section
602:improve this section
519:improve this section
439:improve this section
364:improve this section
250:Event chain diagrams
203:improve this section
116:improve this section
40:critical path method
487:Repeated activities
263:Event chain diagram
23:Event chain diagram
1289:Events (computing)
762:Project management
646:
563:
308:
260:
160:
25:
1067:and Neil Gordon,
850:978-0-470-51284-5
724:
723:
716:
638:
637:
630:
561:Repeated Activity
555:
554:
547:
475:
474:
467:
400:
399:
392:
239:
238:
231:
152:
151:
144:
1301:
1274:Network analysis
1264:Event management
1155:Skinner, David,
1131:Raiffa, Howard,
1065:Nando de Freitas
1051:
1047:
1041:
1038:
1032:
1031:
1021:
997:
991:
988:
982:
979:
973:
970:
964:
961:
955:
954:
936:
930:
929:
911:
905:
904:
886:
880:
879:
861:
855:
854:
836:
830:
827:
821:
818:
812:
811:
793:
767:Project planning
719:
712:
708:
705:
699:
668:
660:
633:
626:
622:
619:
613:
582:
574:
550:
543:
539:
536:
530:
499:
491:
470:
463:
459:
456:
450:
419:
411:
395:
388:
384:
381:
375:
344:
336:
234:
227:
223:
220:
214:
183:
175:
147:
140:
136:
133:
127:
96:
88:
52:cognitive biases
32:network analysis
1309:
1308:
1304:
1303:
1302:
1300:
1299:
1298:
1249:
1248:
1215:
1063:Arnaud Doucet,
1060:
1058:Further reading
1055:
1054:
1048:
1044:
1039:
1035:
998:
994:
989:
985:
980:
976:
971:
967:
962:
958:
951:
937:
933:
926:
912:
908:
901:
887:
883:
876:
862:
858:
851:
837:
833:
828:
824:
819:
815:
808:
794:
790:
785:
733:
720:
709:
703:
700:
685:
669:
658:
644:Mitigation plan
634:
623:
617:
614:
599:
583:
572:
551:
540:
534:
531:
516:
500:
489:
484:
471:
460:
454:
451:
436:
420:
409:
396:
385:
379:
376:
361:
345:
334:
317:
252:
235:
224:
218:
215:
200:
184:
173:
148:
137:
131:
128:
113:
97:
86:
81:
68:
17:
12:
11:
5:
1307:
1297:
1296:
1291:
1286:
1281:
1276:
1271:
1269:Business terms
1266:
1261:
1247:
1246:
1241:
1236:
1231:
1226:
1221:
1214:
1213:External links
1211:
1210:
1209:
1207:978-9814759373
1195:
1193:978-1409454984
1181:
1167:
1153:
1143:
1129:
1115:
1103:Keeney, R.L.,
1101:
1087:
1080:
1059:
1056:
1053:
1052:
1042:
1033:
992:
983:
974:
965:
956:
950:978-0566091667
949:
931:
925:978-0566087905
924:
906:
900:978-0566088674
899:
881:
875:978-1567263664
874:
856:
849:
831:
822:
813:
807:978-1567262179
806:
787:
786:
784:
781:
780:
779:
774:
769:
764:
759:
754:
749:
744:
739:
732:
729:
722:
721:
672:
670:
663:
657:
654:
636:
635:
586:
584:
577:
571:
568:
553:
552:
503:
501:
494:
488:
485:
483:
480:
473:
472:
423:
421:
414:
408:
405:
398:
397:
348:
346:
339:
333:
330:
316:
313:
297:
296:
292:
289:
286:
283:
280:
277:
274:
271:
251:
248:
237:
236:
187:
185:
178:
172:
169:
150:
149:
100:
98:
91:
85:
82:
80:
77:
67:
64:
44:critical chain
15:
9:
6:
4:
3:
2:
1306:
1295:
1294:Risk analysis
1292:
1290:
1287:
1285:
1282:
1280:
1277:
1275:
1272:
1270:
1267:
1265:
1262:
1260:
1257:
1256:
1254:
1245:
1242:
1240:
1237:
1235:
1232:
1230:
1227:
1225:
1222:
1220:
1217:
1216:
1208:
1204:
1200:
1196:
1194:
1190:
1186:
1182:
1180:
1179:0-412-27520-1
1176:
1172:
1169:Smith, J.Q.,
1168:
1166:
1165:0-9647938-3-0
1162:
1158:
1154:
1152:
1151:0-387-21239-6
1148:
1144:
1142:
1141:0-07-052579-X
1138:
1134:
1130:
1128:
1127:0-87584-765-X
1124:
1120:
1116:
1114:
1113:0-674-93197-1
1110:
1106:
1102:
1100:
1099:0-521-28414-7
1096:
1092:
1088:
1085:
1081:
1078:
1077:0-387-95146-6
1074:
1070:
1066:
1062:
1061:
1046:
1037:
1029:
1025:
1020:
1015:
1011:
1007:
1003:
996:
987:
978:
969:
960:
952:
946:
943:. Routledge.
942:
935:
927:
921:
918:. Routledge.
917:
910:
902:
896:
893:. Routledge.
892:
885:
877:
871:
867:
860:
852:
846:
842:
835:
826:
817:
809:
803:
799:
792:
788:
778:
775:
773:
770:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
734:
728:
718:
715:
707:
697:
693:
689:
683:
682:
678:
673:This section
671:
667:
662:
661:
653:
649:
642:
632:
629:
621:
611:
607:
603:
597:
596:
592:
587:This section
585:
581:
576:
575:
567:
559:
549:
546:
538:
528:
524:
520:
514:
513:
509:
504:This section
502:
498:
493:
492:
479:
469:
466:
458:
448:
444:
440:
434:
433:
429:
424:This section
422:
418:
413:
412:
404:
394:
391:
383:
373:
369:
365:
359:
358:
354:
349:This section
347:
343:
338:
337:
329:
325:
322:
312:
304:
300:
293:
290:
287:
284:
281:
278:
275:
272:
269:
268:
267:
264:
256:
247:
243:
233:
230:
222:
212:
208:
204:
198:
197:
193:
188:This section
186:
182:
177:
176:
168:
166:
156:
146:
143:
135:
125:
121:
117:
111:
110:
106:
101:This section
99:
95:
90:
89:
76:
74:
73:Risk register
63:
61:
57:
53:
49:
45:
41:
37:
33:
29:
21:
1198:
1184:
1170:
1156:
1132:
1118:
1104:
1090:
1083:
1068:
1045:
1036:
1009:
1005:
995:
986:
977:
968:
959:
940:
934:
915:
909:
890:
884:
865:
859:
840:
834:
825:
816:
797:
791:
725:
710:
701:
686:Please help
674:
650:
647:
624:
615:
600:Please help
588:
564:
541:
532:
517:Please help
505:
476:
461:
452:
437:Please help
425:
401:
386:
377:
362:Please help
350:
326:
318:
309:
298:
261:
244:
240:
225:
216:
201:Please help
189:
171:Event chains
161:
138:
129:
114:Please help
102:
69:
48:motivational
27:
26:
1284:Methodology
1253:Categories
783:References
79:Principles
60:scheduling
56:estimating
704:June 2023
675:does not
618:June 2023
589:does not
535:June 2023
506:does not
482:Phenomena
455:June 2023
426:does not
380:June 2023
351:does not
219:June 2023
190:does not
132:June 2023
103:does not
1071:, 2001,
1028:67095960
731:See also
1050:edition
757:Project
696:removed
681:sources
610:removed
595:sources
527:removed
512:sources
447:removed
432:sources
372:removed
357:sources
211:removed
196:sources
124:removed
109:sources
66:History
36:project
1205:
1191:
1177:
1163:
1149:
1139:
1125:
1111:
1097:
1075:
1026:
1012:: 11.
947:
922:
897:
872:
847:
804:
295:frame.
30:is a
1024:S2CID
1203:ISBN
1189:ISBN
1175:ISBN
1161:ISBN
1147:ISBN
1137:ISBN
1123:ISBN
1109:ISBN
1095:ISBN
1073:ISBN
945:ISBN
920:ISBN
895:ISBN
870:ISBN
845:ISBN
802:ISBN
679:any
677:cite
593:any
591:cite
510:any
508:cite
430:any
428:cite
355:any
353:cite
194:any
192:cite
107:any
105:cite
58:and
50:and
42:and
1014:doi
690:by
604:by
521:by
441:by
366:by
205:by
118:by
54:in
1255::
1022:.
1010:24
1008:.
1004:.
1079:.
1030:.
1016::
953:.
928:.
903:.
878:.
853:.
810:.
717:)
711:(
706:)
702:(
698:.
684:.
631:)
625:(
620:)
616:(
612:.
598:.
548:)
542:(
537:)
533:(
529:.
515:.
468:)
462:(
457:)
453:(
449:.
435:.
393:)
387:(
382:)
378:(
374:.
360:.
232:)
226:(
221:)
217:(
213:.
199:.
145:)
139:(
134:)
130:(
126:.
112:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.