SlideShare a Scribd company logo
1 of 3
Download to read offline
cover story
By Leon A. Kappelman, Ph.D.

The

Four Horsemen
of

IT Project Doom:
Identify Early Earning Signs
to Avoid Failure

William Shedd, a noted American
Presbyterian Theologian in the
1800s, once said, “A ship is safe
in harbor, but that’s not what ships
are for.” Almost 150 years later,
modern businesses are finding the
principles behind this saying still
hold true. In fact, this same line of
thinking can effectively be applied
to many information technology
(IT) projects today.

I

T investments comprise over half the
capital budgets of U.S. organizations,
but in spite of the obvious importance
placed on IT, many projects are cancelled
outright, completed late, over budget,
or fail to deliver the promised business
capabilities and financial ROI. Given the
magnitude of the resources utilized, the
opportunity costs, and the risks involved,
IT projects are clearly an issue that deserves
executive-level attention in addition to that
afforded it by the chief information officer at
your company.
The planning and management of IT
project investments is a material concern
for those dealing with requirements of the
Sarbanes-Oxley Act of 2002 (SOX), the
Statement on Auditing Standards No. 70:
Service Organizations (SAS 70), financial
forecasts, SEC reports, and other regulatory
and reporting requirements. Such concerns
are not limited to U.S. companies and their
foreign subsidiaries since these laws and
standards potentially affect companies outside
the U.S. as well.
The management of risk underpins the
insurance industry, but it is the mastery of
continued on page 12

10 Spring 2010	

theInterpreter x www.iasa.org
Cover Story
continued from page 10

risk that distinguishes modern times from
the past. IT project management, despite the
fact that it deals with “modern” technologies,
is embarrassingly immature in the mastery of
risks. Today, about 20 percent of IT projects
are cancelled before completion, nearly half
have cost or time overruns or fail to fully
meet requirements, and only about a third
are finished on-time, within budget, and
with expected functionality. If the discussion
is limited to larger and therefore riskier
projects, the total failure or cancellation rate
approaches 50 percent. Obviously, more
effective risk management is needed to avoid
troubled IT projects and make desirable risk
taking possible.
IT spending is materially significant in the
insurance industry, especially given its lowmargin nature. Deloitte estimates insurance
company margins to be only about 5 percent.
Estimates indicate IT spending accounts for
about 4 percent of insurance company annual
revenues, or nearly 30 percent of operating
expenses, notwithstanding annual, sector,

and individual company variations. About
40 percent of that IT spending, or about 1.6
percent of insurance revenues, is investments
in projects aimed at cutting costs, meeting

“Estimates indicate IT spending
accounts for about 4 percent of
insurance company annual revenues,
or nearly 30 percent of operating
expenses, notwithstanding
annual, sector, and individual
company variations.”
regulatory requirements, improving customer
services, delivering new products, improving
security, and reducing fraud.
It is estimated that in 2010 global GDP
will approach $65 trillion USD and insurance
premiums will reach nearly $5 trillion, or
about 7.7 percent of global GDP. Using

							
The Early Warning Signs of IT Project Failure

The Deadly Dozen EWSs				

premiums as a surrogate for revenues, IT
spending by insurance companies in 2010
may reach $200 billion and total IT project
budgets should be in the $80 billion range
(even higher by some estimates).
IT projects are often material and yet
the nature and magnitude of their risks
unnoticed. However, signs of trouble come in
many shapes and sizes, including restatements
of financial reports, bankruptcies, failure
to deliver new or promised products, or
products produced quickly that do not meet
current customer needs. As noted previously,
the insurance industry is certainly not exempt
from such problems. The industry has had
its fair share of troubled IT project too, often
with dire consequences, including situations
like these:
• Ongoing computer problems caused denial
of coverage, overcharges, and cancellation of
benefits so regulators banned a large health
insurer from selling certain policies.
• Improperly tested software caused a
privacy breach of the personal information of

The Four Horseman of IT Project Doom
Stakeholders

Requirements

Processes

Team

People-Related Risks
1. Lack of top management support.				

X

2. Weak project manager.											
3. No stakeholder involvement.					

X

X

4. Weak commitment of project team.									

X

5. Team members lack requisite knowledge and/or skills.							

X

6. Subject matter experts overscheduled.				

X

Process-Related Risks
7. Lack of documented requirements and/or success criteria.				

X

8. No change control process or change management.					

X

9. Ineffective schedule planning and/or management.						

X

10. Communication breakdown among stakeholders.						

X

11. Resources assigned to higher priority project.					

X

12. No business case for the project.						

X

12 Spring 2010	

theInterpreter x www.iasa.org
several hundred thousand insurance company
customers.
• The stock of an insurer dropped 60% due
to billing system failures reportedly resulting
in receivables write offs of more than
$100,000,000 and multi-million dollar fines
levied by government agencies.

Seek and You Shall Find
Warren Buffet once said, “Risk comes from
not knowing what you’re doing.” It’s not
surprising to find that Buffet is right as usual.
The post-mortem examination of failed IT
projects reveals that long before the failure
there were early warning signs (EWSs).
Fortunately these signs are easily identified if
you are paying attention. Further, once EWSs
are identified, appropriate action can be taken
to mitigate their impact.
To qualify as an EWS, the indicator must
be identifiable in the first 20 percent of the
project’s original timeline. By focusing on
EWSs instead of general IT project risks,
CFOs, CIOs, project managers, and other
stakeholders could potentially still take
action while the project can be saved at a
reasonable cost. Alternatively, a risk-reward
determination may indicate the project
is no longer needed or unlikely to deliver
a sufficient ROI and should therefore be
cancelled before further resources are wasted.
In order to identify the most important
EWSs, a preliminary list was developed and
then assessed by a panel of 19 IT project
management experts who added and
modified items. This process resulted in a
list of 53 EWSs which were then ranked on
a scale of 1 (extremely unimportant) to 7
(extremely important) by 138 experienced
IT project managers. The results can provide
much-needed insights to insurance company
executives. By identifying the most important
EWSs, CEOs, CFOs and CIOs gain the ability
to take action.

The Four Horseman of
IT Project Doom: The Deadly
Dozen EWSs
IT project risks can be grouped into the
three general categories of social, project
management, and technical risks – or simply
People, Process, and Product risks respectively.
Interestingly, the 17 EWSs with average
ratings above a 6 (on the aforementioned
7-point scale) belong only to the People and
theInterpreter x www.iasa.org	

Process categories. This is not surprising since
technology is almost never the root cause
of IT project failure. Nevertheless, these
technical risks can be mitigated with proper
People and Process practices, just like genetic
propensities to certain diseases can be
mitigated with proper behaviors, nutrition,
and medications. Risks cannot be eliminated,
but they can be managed.
For the purpose of this discussion, the 17
highest-rated risks have been distilled into the
12 most dangerous EWSs of IT project failure,
a.k.a. the Deadly Dozen. The Deadly Dozen
can also be grouped into the four categories
of the project’s Stakeholders, Requirements,
Management Processes, and Team, a.k.a. the
Four Horsemen of IT Project Doom.

“IT project success is critical to
enterprise success, and to the career
growth and success of CFOs, CIOs,
CEOs, business unit executives,
IT project managers, and project
team members. Failed IT projects
not only damage organizations
they can also harm careers.”
What is interesting about the Deadly
Dozen is that most relate to the governance,
leadership, and management of IT investment
activities. CFOs, CIOs, and CEOs should be
deeply involved in leadership, governance,
and risk management before and during the
life of any significant IT investment. The basic
questions of what, why, when, who, where,
how, and how much should be addressed in
the IT investment governance process before
the investment is approved, and those answers
refined and monitored during the on-going
governance process over the life of the project.
While weak project teams are definitely an
EWS, even a strong project team may not be
able to overcome shortcomings in leadership
and governance at the enterprise level.
The six people-related EWSs of IT project
failure center on five not altogether mutually
exclusive groups of people: top management,
project management, project team members,
subject matter experts (SMEs), and
stakeholders. The six process-related EWSs
center on five project management processes

and their associated deliverables that are
essential to success: requirements (including
a business case), change control, schedule,
communications, and resources.

Takeaways for CFOS and CIOs
Successful management of IT projects is
material to the accuracy of financial forecasts
and regulatory reports, as well as for predicting
enterprise capabilities in order to make viable
plans and commitments. IT project success is
critical to enterprise success, and to the career
growth and success of CFOs, CIOs, CEOs,
business unit executives, IT project managers,
and project team members. Failed IT projects
not only damage organizations they can also
harm careers.
The Deadly Dozen risk indicators were
found to be the most important, and most
actionable, during the first 20 percent of an
IT project’s timeline. However, every project
is unique, and so is every organization, so
the relative importance of each EWS will be
somewhat unique for every project. The three
general risk categories, the Deadly Dozen and
the Four Horseman of IT project risks do
provide a valuable, quick, and easy starting
point for knowing the risks of an IT project.
Knowing about and paying attention
to these EWSs – the earlier in the life cycle
of an IT project the better – increases the
probability of a successful project outcome.
Some IT projects should be stopped because
circumstances have changed, it was a bad
idea to start with, or it has become highly
unlikely it will provide the promised business
or financial benefits. Much like the warning
lights and gauges on the dashboard of an
automobile, paying attention to these warning
signs in the beginning phases of an IT
project can help avoid problems and help the
enterprise and its leadership successfully reach
the desired destination.
Leon A. Kappelman is a professor of
information systems, director emeritus of the
IS Research Center, and a fellow of the Texas
Center for Digital Knowledge at the University
of North Texas. He will be presenting an
educational session during the 2010 IASA
Annual Educational Conference & Business
Show on “Reaching the Next Generation of
Insureds.” To learn more about Dr. Kappelman,
his work and his writings, please visit http://
courses.unt.edu/kappelman/.
Spring 2010 13

More Related Content

What's hot

Third-party governance and risk management: 2018 Global Survey
Third-party governance and risk management: 2018 Global SurveyThird-party governance and risk management: 2018 Global Survey
Third-party governance and risk management: 2018 Global SurveyDeloitte United States
 
The Economist Intelligence Unit
The Economist Intelligence UnitThe Economist Intelligence Unit
The Economist Intelligence Unitdallamas73
 
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...Deloitte United States
 
2018 Human Capital Trends: A government perspective
2018 Human Capital Trends: A government perspective2018 Human Capital Trends: A government perspective
2018 Human Capital Trends: A government perspectiveDeloitte United States
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerLexisNexis Software Division
 
8 Tactics to Minimize Law Firm Risk of Malpractice
8 Tactics to Minimize Law Firm Risk of Malpractice8 Tactics to Minimize Law Firm Risk of Malpractice
8 Tactics to Minimize Law Firm Risk of MalpracticeLexisNexis Software Division
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLexisNexis Software Division
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatImperva
 
CIO Roles and Responsibilities
CIO Roles and ResponsibilitiesCIO Roles and Responsibilities
CIO Roles and ResponsibilitiesArtit Ungkanont
 
The CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT ExecutiveThe CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT ExecutiveAmazon Web Services
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
For Boards and their accidental sponsors
For Boards and their accidental sponsorsFor Boards and their accidental sponsors
For Boards and their accidental sponsorsUNSW Canberra
 
Six IT decisions should not be taken by IT people
Six IT decisions should not be taken by IT peopleSix IT decisions should not be taken by IT people
Six IT decisions should not be taken by IT peopleTanaya Bose
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
The State of the CFO - Brainyard Research
The State of the CFO - Brainyard ResearchThe State of the CFO - Brainyard Research
The State of the CFO - Brainyard ResearchRick Buijserd
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 

What's hot (20)

Third-party governance and risk management: 2018 Global Survey
Third-party governance and risk management: 2018 Global SurveyThird-party governance and risk management: 2018 Global Survey
Third-party governance and risk management: 2018 Global Survey
 
The Economist Intelligence Unit
The Economist Intelligence UnitThe Economist Intelligence Unit
The Economist Intelligence Unit
 
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...
AI Use Expected to Increase in Risk and Compliance Efforts, But Few Have Ethi...
 
2018 Human Capital Trends: A government perspective
2018 Human Capital Trends: A government perspective2018 Human Capital Trends: A government perspective
2018 Human Capital Trends: A government perspective
 
Independent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm ManagerIndependent Attorney Survival Guide by LexisNexis Firm Manager
Independent Attorney Survival Guide by LexisNexis Firm Manager
 
8 Tactics to Minimize Law Firm Risk of Malpractice
8 Tactics to Minimize Law Firm Risk of Malpractice8 Tactics to Minimize Law Firm Risk of Malpractice
8 Tactics to Minimize Law Firm Risk of Malpractice
 
Legally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operationsLegally Optimistic: A study on legal departments and legal department operations
Legally Optimistic: A study on legal departments and legal department operations
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
CIO Roles and Responsibilities
CIO Roles and ResponsibilitiesCIO Roles and Responsibilities
CIO Roles and Responsibilities
 
The CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT ExecutiveThe CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT Executive
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
For Boards and their accidental sponsors
For Boards and their accidental sponsorsFor Boards and their accidental sponsors
For Boards and their accidental sponsors
 
Six IT decisions should not be taken by IT people
Six IT decisions should not be taken by IT peopleSix IT decisions should not be taken by IT people
Six IT decisions should not be taken by IT people
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
The State of the CFO - Brainyard Research
The State of the CFO - Brainyard ResearchThe State of the CFO - Brainyard Research
The State of the CFO - Brainyard Research
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 

Similar to The four horsemen of IT project doom -- kappelman

IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingITPSB Pty Ltd
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsITPSB Pty Ltd
 
The picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxThe picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxssusera34210
 
IT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityIT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityOmar Toor
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_itKamalakar Yadav
 
AMTakesOn_ExecBrief-DPICARD_FNL2
AMTakesOn_ExecBrief-DPICARD_FNL2AMTakesOn_ExecBrief-DPICARD_FNL2
AMTakesOn_ExecBrief-DPICARD_FNL2Denis Picard
 
8 Strategies for IT Transformation
8 Strategies for IT Transformation8 Strategies for IT Transformation
8 Strategies for IT Transformationkenaibarbosa
 
IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28curtherge
 
The Strategic CIO
The Strategic CIOThe Strategic CIO
The Strategic CIOEMC
 
Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Vivekin
 
Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Thierry Labro
 
erp-x3-five-quick-wins-to-help-cios-drive-growth
erp-x3-five-quick-wins-to-help-cios-drive-growtherp-x3-five-quick-wins-to-help-cios-drive-growth
erp-x3-five-quick-wins-to-help-cios-drive-growthEdward Vaughan
 
Five quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthFive quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthBurCom Consulting Ltd.
 
IT Governance
IT GovernanceIT Governance
IT GovernanceKNOLSKAPE
 

Similar to The four horsemen of IT project doom -- kappelman (20)

A Guide to CIO Advisory Services
A Guide to CIO Advisory ServicesA Guide to CIO Advisory Services
A Guide to CIO Advisory Services
 
Getting it right
Getting it right Getting it right
Getting it right
 
IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate Profiling
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT Projects
 
The picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxThe picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docx
 
IT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal AusterityIT Optimization: Navigation Fiscal Austerity
IT Optimization: Navigation Fiscal Austerity
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_it
 
AMTakesOn_ExecBrief-DPICARD_FNL2
AMTakesOn_ExecBrief-DPICARD_FNL2AMTakesOn_ExecBrief-DPICARD_FNL2
AMTakesOn_ExecBrief-DPICARD_FNL2
 
8 Strategies for IT Transformation
8 Strategies for IT Transformation8 Strategies for IT Transformation
8 Strategies for IT Transformation
 
IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28
 
The Strategic CIO
The Strategic CIOThe Strategic CIO
The Strategic CIO
 
Executive Overview - Dale A Bondanza - vCIO
Executive Overview - Dale A Bondanza - vCIOExecutive Overview - Dale A Bondanza - vCIO
Executive Overview - Dale A Bondanza - vCIO
 
Deloitte University Press Tech Trends 2014
Deloitte University Press Tech Trends 2014Deloitte University Press Tech Trends 2014
Deloitte University Press Tech Trends 2014
 
Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24
 
Tech trends-2014 final-electronic-single.2.11
Tech trends-2014 final-electronic-single.2.11Tech trends-2014 final-electronic-single.2.11
Tech trends-2014 final-electronic-single.2.11
 
Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014
 
erp-x3-five-quick-wins-to-help-cios-drive-growth
erp-x3-five-quick-wins-to-help-cios-drive-growtherp-x3-five-quick-wins-to-help-cios-drive-growth
erp-x3-five-quick-wins-to-help-cios-drive-growth
 
Five quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthFive quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growth
 
IT Governance
IT GovernanceIT Governance
IT Governance
 

More from Leon Kappelman

A Peek @ Trends'15 - SIMposium'14 FINAL 2post
A Peek @ Trends'15 - SIMposium'14 FINAL 2postA Peek @ Trends'15 - SIMposium'14 FINAL 2post
A Peek @ Trends'15 - SIMposium'14 FINAL 2postLeon Kappelman
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Leon Kappelman
 
SIM IT Trends Study 2013 - SIMposium Session
SIM IT Trends Study 2013 - SIMposium SessionSIM IT Trends Study 2013 - SIMposium Session
SIM IT Trends Study 2013 - SIMposium SessionLeon Kappelman
 
Business-IT Alignment: Getting IT AND Keeping IT - Kappelman & Pettit
Business-IT Alignment:Getting IT AND Keeping IT - Kappelman & PettitBusiness-IT Alignment:Getting IT AND Keeping IT - Kappelman & Pettit
Business-IT Alignment: Getting IT AND Keeping IT - Kappelman & PettitLeon Kappelman
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hLeon Kappelman
 
Kappelman - Becoming a 21st Century Enterprise
Kappelman - Becoming a 21st Century EnterpriseKappelman - Becoming a 21st Century Enterprise
Kappelman - Becoming a 21st Century EnterpriseLeon Kappelman
 
Kappelman it strategy, governance, & value ho
Kappelman   it strategy, governance, & value hoKappelman   it strategy, governance, & value ho
Kappelman it strategy, governance, & value hoLeon Kappelman
 
Enterprise Architecture 202: Bridging Strategy & Execution
Enterprise Architecture 202: Bridging Strategy & ExecutionEnterprise Architecture 202: Bridging Strategy & Execution
Enterprise Architecture 202: Bridging Strategy & ExecutionLeon Kappelman
 
Enterprise Architecture 101: Who, What, Where, When, Why, How?
Enterprise Architecture 101: Who, What, Where, When, Why, How?Enterprise Architecture 101: Who, What, Where, When, Why, How?
Enterprise Architecture 101: Who, What, Where, When, Why, How?Leon Kappelman
 
Kappelman itmpi - ea 102 - modeling organizations
Kappelman   itmpi - ea 102 - modeling organizationsKappelman   itmpi - ea 102 - modeling organizations
Kappelman itmpi - ea 102 - modeling organizationsLeon Kappelman
 
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010 "Enterprise Architecture and the Information Age Enterprise" @ CSDM2010
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010 Leon Kappelman
 
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...Leon Kappelman
 
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)Leon Kappelman
 

More from Leon Kappelman (13)

A Peek @ Trends'15 - SIMposium'14 FINAL 2post
A Peek @ Trends'15 - SIMposium'14 FINAL 2postA Peek @ Trends'15 - SIMposium'14 FINAL 2post
A Peek @ Trends'15 - SIMposium'14 FINAL 2post
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
 
SIM IT Trends Study 2013 - SIMposium Session
SIM IT Trends Study 2013 - SIMposium SessionSIM IT Trends Study 2013 - SIMposium Session
SIM IT Trends Study 2013 - SIMposium Session
 
Business-IT Alignment: Getting IT AND Keeping IT - Kappelman & Pettit
Business-IT Alignment:Getting IT AND Keeping IT - Kappelman & PettitBusiness-IT Alignment:Getting IT AND Keeping IT - Kappelman & Pettit
Business-IT Alignment: Getting IT AND Keeping IT - Kappelman & Pettit
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
 
Kappelman - Becoming a 21st Century Enterprise
Kappelman - Becoming a 21st Century EnterpriseKappelman - Becoming a 21st Century Enterprise
Kappelman - Becoming a 21st Century Enterprise
 
Kappelman it strategy, governance, & value ho
Kappelman   it strategy, governance, & value hoKappelman   it strategy, governance, & value ho
Kappelman it strategy, governance, & value ho
 
Enterprise Architecture 202: Bridging Strategy & Execution
Enterprise Architecture 202: Bridging Strategy & ExecutionEnterprise Architecture 202: Bridging Strategy & Execution
Enterprise Architecture 202: Bridging Strategy & Execution
 
Enterprise Architecture 101: Who, What, Where, When, Why, How?
Enterprise Architecture 101: Who, What, Where, When, Why, How?Enterprise Architecture 101: Who, What, Where, When, Why, How?
Enterprise Architecture 101: Who, What, Where, When, Why, How?
 
Kappelman itmpi - ea 102 - modeling organizations
Kappelman   itmpi - ea 102 - modeling organizationsKappelman   itmpi - ea 102 - modeling organizations
Kappelman itmpi - ea 102 - modeling organizations
 
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010 "Enterprise Architecture and the Information Age Enterprise" @ CSDM2010
"Enterprise Architecture and the Information Age Enterprise" @ CSDM2010
 
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...
Early Warning Signs of IT Project Failure -- The Deadly Dozen and the Four Ho...
 
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)
Enterprise Architecture 201: Creating the Information Age Enterprise (handouts)
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

The four horsemen of IT project doom -- kappelman

  • 1. cover story By Leon A. Kappelman, Ph.D. The Four Horsemen of IT Project Doom: Identify Early Earning Signs to Avoid Failure William Shedd, a noted American Presbyterian Theologian in the 1800s, once said, “A ship is safe in harbor, but that’s not what ships are for.” Almost 150 years later, modern businesses are finding the principles behind this saying still hold true. In fact, this same line of thinking can effectively be applied to many information technology (IT) projects today. I T investments comprise over half the capital budgets of U.S. organizations, but in spite of the obvious importance placed on IT, many projects are cancelled outright, completed late, over budget, or fail to deliver the promised business capabilities and financial ROI. Given the magnitude of the resources utilized, the opportunity costs, and the risks involved, IT projects are clearly an issue that deserves executive-level attention in addition to that afforded it by the chief information officer at your company. The planning and management of IT project investments is a material concern for those dealing with requirements of the Sarbanes-Oxley Act of 2002 (SOX), the Statement on Auditing Standards No. 70: Service Organizations (SAS 70), financial forecasts, SEC reports, and other regulatory and reporting requirements. Such concerns are not limited to U.S. companies and their foreign subsidiaries since these laws and standards potentially affect companies outside the U.S. as well. The management of risk underpins the insurance industry, but it is the mastery of continued on page 12 10 Spring 2010 theInterpreter x www.iasa.org
  • 2. Cover Story continued from page 10 risk that distinguishes modern times from the past. IT project management, despite the fact that it deals with “modern” technologies, is embarrassingly immature in the mastery of risks. Today, about 20 percent of IT projects are cancelled before completion, nearly half have cost or time overruns or fail to fully meet requirements, and only about a third are finished on-time, within budget, and with expected functionality. If the discussion is limited to larger and therefore riskier projects, the total failure or cancellation rate approaches 50 percent. Obviously, more effective risk management is needed to avoid troubled IT projects and make desirable risk taking possible. IT spending is materially significant in the insurance industry, especially given its lowmargin nature. Deloitte estimates insurance company margins to be only about 5 percent. Estimates indicate IT spending accounts for about 4 percent of insurance company annual revenues, or nearly 30 percent of operating expenses, notwithstanding annual, sector, and individual company variations. About 40 percent of that IT spending, or about 1.6 percent of insurance revenues, is investments in projects aimed at cutting costs, meeting “Estimates indicate IT spending accounts for about 4 percent of insurance company annual revenues, or nearly 30 percent of operating expenses, notwithstanding annual, sector, and individual company variations.” regulatory requirements, improving customer services, delivering new products, improving security, and reducing fraud. It is estimated that in 2010 global GDP will approach $65 trillion USD and insurance premiums will reach nearly $5 trillion, or about 7.7 percent of global GDP. Using The Early Warning Signs of IT Project Failure The Deadly Dozen EWSs premiums as a surrogate for revenues, IT spending by insurance companies in 2010 may reach $200 billion and total IT project budgets should be in the $80 billion range (even higher by some estimates). IT projects are often material and yet the nature and magnitude of their risks unnoticed. However, signs of trouble come in many shapes and sizes, including restatements of financial reports, bankruptcies, failure to deliver new or promised products, or products produced quickly that do not meet current customer needs. As noted previously, the insurance industry is certainly not exempt from such problems. The industry has had its fair share of troubled IT project too, often with dire consequences, including situations like these: • Ongoing computer problems caused denial of coverage, overcharges, and cancellation of benefits so regulators banned a large health insurer from selling certain policies. • Improperly tested software caused a privacy breach of the personal information of The Four Horseman of IT Project Doom Stakeholders Requirements Processes Team People-Related Risks 1. Lack of top management support. X 2. Weak project manager. 3. No stakeholder involvement. X X 4. Weak commitment of project team. X 5. Team members lack requisite knowledge and/or skills. X 6. Subject matter experts overscheduled. X Process-Related Risks 7. Lack of documented requirements and/or success criteria. X 8. No change control process or change management. X 9. Ineffective schedule planning and/or management. X 10. Communication breakdown among stakeholders. X 11. Resources assigned to higher priority project. X 12. No business case for the project. X 12 Spring 2010 theInterpreter x www.iasa.org
  • 3. several hundred thousand insurance company customers. • The stock of an insurer dropped 60% due to billing system failures reportedly resulting in receivables write offs of more than $100,000,000 and multi-million dollar fines levied by government agencies. Seek and You Shall Find Warren Buffet once said, “Risk comes from not knowing what you’re doing.” It’s not surprising to find that Buffet is right as usual. The post-mortem examination of failed IT projects reveals that long before the failure there were early warning signs (EWSs). Fortunately these signs are easily identified if you are paying attention. Further, once EWSs are identified, appropriate action can be taken to mitigate their impact. To qualify as an EWS, the indicator must be identifiable in the first 20 percent of the project’s original timeline. By focusing on EWSs instead of general IT project risks, CFOs, CIOs, project managers, and other stakeholders could potentially still take action while the project can be saved at a reasonable cost. Alternatively, a risk-reward determination may indicate the project is no longer needed or unlikely to deliver a sufficient ROI and should therefore be cancelled before further resources are wasted. In order to identify the most important EWSs, a preliminary list was developed and then assessed by a panel of 19 IT project management experts who added and modified items. This process resulted in a list of 53 EWSs which were then ranked on a scale of 1 (extremely unimportant) to 7 (extremely important) by 138 experienced IT project managers. The results can provide much-needed insights to insurance company executives. By identifying the most important EWSs, CEOs, CFOs and CIOs gain the ability to take action. The Four Horseman of IT Project Doom: The Deadly Dozen EWSs IT project risks can be grouped into the three general categories of social, project management, and technical risks – or simply People, Process, and Product risks respectively. Interestingly, the 17 EWSs with average ratings above a 6 (on the aforementioned 7-point scale) belong only to the People and theInterpreter x www.iasa.org Process categories. This is not surprising since technology is almost never the root cause of IT project failure. Nevertheless, these technical risks can be mitigated with proper People and Process practices, just like genetic propensities to certain diseases can be mitigated with proper behaviors, nutrition, and medications. Risks cannot be eliminated, but they can be managed. For the purpose of this discussion, the 17 highest-rated risks have been distilled into the 12 most dangerous EWSs of IT project failure, a.k.a. the Deadly Dozen. The Deadly Dozen can also be grouped into the four categories of the project’s Stakeholders, Requirements, Management Processes, and Team, a.k.a. the Four Horsemen of IT Project Doom. “IT project success is critical to enterprise success, and to the career growth and success of CFOs, CIOs, CEOs, business unit executives, IT project managers, and project team members. Failed IT projects not only damage organizations they can also harm careers.” What is interesting about the Deadly Dozen is that most relate to the governance, leadership, and management of IT investment activities. CFOs, CIOs, and CEOs should be deeply involved in leadership, governance, and risk management before and during the life of any significant IT investment. The basic questions of what, why, when, who, where, how, and how much should be addressed in the IT investment governance process before the investment is approved, and those answers refined and monitored during the on-going governance process over the life of the project. While weak project teams are definitely an EWS, even a strong project team may not be able to overcome shortcomings in leadership and governance at the enterprise level. The six people-related EWSs of IT project failure center on five not altogether mutually exclusive groups of people: top management, project management, project team members, subject matter experts (SMEs), and stakeholders. The six process-related EWSs center on five project management processes and their associated deliverables that are essential to success: requirements (including a business case), change control, schedule, communications, and resources. Takeaways for CFOS and CIOs Successful management of IT projects is material to the accuracy of financial forecasts and regulatory reports, as well as for predicting enterprise capabilities in order to make viable plans and commitments. IT project success is critical to enterprise success, and to the career growth and success of CFOs, CIOs, CEOs, business unit executives, IT project managers, and project team members. Failed IT projects not only damage organizations they can also harm careers. The Deadly Dozen risk indicators were found to be the most important, and most actionable, during the first 20 percent of an IT project’s timeline. However, every project is unique, and so is every organization, so the relative importance of each EWS will be somewhat unique for every project. The three general risk categories, the Deadly Dozen and the Four Horseman of IT project risks do provide a valuable, quick, and easy starting point for knowing the risks of an IT project. Knowing about and paying attention to these EWSs – the earlier in the life cycle of an IT project the better – increases the probability of a successful project outcome. Some IT projects should be stopped because circumstances have changed, it was a bad idea to start with, or it has become highly unlikely it will provide the promised business or financial benefits. Much like the warning lights and gauges on the dashboard of an automobile, paying attention to these warning signs in the beginning phases of an IT project can help avoid problems and help the enterprise and its leadership successfully reach the desired destination. Leon A. Kappelman is a professor of information systems, director emeritus of the IS Research Center, and a fellow of the Texas Center for Digital Knowledge at the University of North Texas. He will be presenting an educational session during the 2010 IASA Annual Educational Conference & Business Show on “Reaching the Next Generation of Insureds.” To learn more about Dr. Kappelman, his work and his writings, please visit http:// courses.unt.edu/kappelman/. Spring 2010 13