[en] IT project portfolios, consisting of IT projects, also interact with the entire IT landscape. In case of a failure of only one element, existing dependencies can lead to a cascade failure, which can cause high losses. Despite the present effects of systemic risk, research into IT portfolio management lacks suitable methods to quantitatively assess systemic risk. We follow the design science research paradigm to develop and evaluate our ‘on track’ or ‘in difficulty’ (TD) method by applying the SI model, representing a recognized network diffusion model in epidemiology, in an IT portfolio context. We evaluate our method using a real-world dataset. We introduce a criticality measure for diffusion models in IT portfolios and compare the TD method’s results and the alpha centrality to human judgment as a benchmark. From our evaluation, we conclude that the TD method outperforms alpha centrality and is a suitable risk measure in IT portfolio management.
Disciplines :
Computer science
Author, co-author :
Guggenmos, Florian
Hofmann, Peter
FRIDGEN, Gilbert ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
How ill is your IT Portfolio? : Measuring Criticality in IT Portfolios Using Epidemiology
Publication date :
2019
Event name :
40th International Conference on Information Systems
Event date :
15-12-19 to 18-12-19
Main work title :
40th International Conference on Information Systems, Munich, Germany, 2019
Aron, J. L., and Schwartz, I. B. 1984. “Seasonality and period-doubling bifurcations in an epidemic model,” Journal of Theoretical Biology (110:4), pp. 665-679.
Barabási, A.-L., and Albert, R. 1999. “Emergence of Scaling in Random Networks,” science (286:5439), pp. 509-512.
Barabási, A.-L., and Bonabeau, E. 2003. “Scale-free networks,” Scientific american (288:5), pp. 60-69.
Battiston, S., Gatti, D. D., Gallegati, M., Greenwald, B., and Stiglitz, J. E. 2012. “Liaisons dangereuses: Increasing connectivity, risk sharing, and systemic risk,” Journal of economic dynamics and control (36:8), pp. 1121-1141.
Beer, M., Wolf, T., and Zare Garizy, T. 2015. Systemic Risk in IT Portfolios - An Integrated Quantification Approach. presented at: 36th International Conference on Information Systems (ICIS), Fort Worth, USA.
Bonacich, P., and Lloyd, P. 2001. “Eigenvector-like measures of centrality for asymmetric relations,” Social networks (23:3), pp. 191-201.
Brockmann, D., and Helbing, D. 2013. “The hidden geometry of complex, network-driven contagion phenomena,” science (342:6164), pp. 1337-1342.
Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E., and Havlin, S. 2010. “Catastrophic cascade of failures in interdependent networks,” Nature (464:7291), p. 1025.
Castellano, C., Muñoz, M. A., and Pastor-Satorras, R. 2009. “Nonlinear q-voter model,” Physical review. E, Statistical, nonlinear, and soft matter physics (80:4 Pt 1), p. 41129.
Crucitti, P., Latora, V., and Marchiori, M. 2004. “Model for cascading failures in complex networks,” Physical Review E (69:4), p. 45104.
Ellinas, C. 2018. “Modelling indirect interactions during failure spreading in a project activity network,” Scientific reports (8:1), p. 4373.
Ellinas, C. 2019. “The domino effect: an empirical exposition of systemic risk across project networks,” Production and Operations Management (28:1), pp. 63-81.
Ellinas, C., Allan, N., Durugbo, C., and Johansson, A. 2015. “How Robust Is Your Project? From Local Failures to Global Catastrophes: A Complex Networks Approach to Project Systemic Risk,” PloS one (10:11), e0142469.
Ellinas, C., Allan, N., and Johansson, A. 2016. “Project systemic risk: Application examples of a network model,” International Journal of Production Economics (182), pp. 50-62.
Flyvbjerg, B., and Budzier, A. 2011. “Why Your IT Project May Be Riskier Than You Think,” Harvard Business Review (89), pp. 23-25.
Fridgen, G., Stepanek, C., and Wolf, T. 2015. “Investigation of exogenous shocks in complex supply networks - a modular Petri Net approach,” International Journal of Production Research (53:5), pp. 1387-1408.
Galam, S. 2002. “Minority opinion spreading in random geometry,” The European Physical Journal B (25:4), pp. 403-406.
Gao, J., Buldyrev, S. V., Havlin, S., and Stanley, H. E. 2011. “Robustness of a network of networks,” Physical review letters (107:19), p. 195701.
Gao, J., Buldyrev, S. V., Stanley, H. E., and Havlin, S. 2012. “Networks formed from interdependent networks,” Nature physics (8:1), p. 40.
Gilbert Fridgen, Christian Stepanek, Thomas Wolf 2012. Simulating Exogenous Shocks in Complex Supply Networks Using Modular Stochastic Petri Nets. Proceeding of the 20th European Conference on Information System (ECIS), Barcelona, Spain.
Goh, K.-I., Kahng, B., and Kim, D. 2001. “Universal behavior of load distribution in scale-free networks,” Physical review letters (87:27), p. 278701.
Gregor, S., and Hevner, A. R. 2013. “Positioning and presenting design science research for maximum impact,” MIS Quarterly, pp. 337-355.
Guo, N., Guo, P., Dong, H., Zhao, J., and Han, Q. 2019. “Modeling and analysis of cascading failures in projects: A complex network approach,” Computers & Industrial Engineering (127), pp. 1-7.
Hagberg, A., Swart, P., and Chult, D. S. 2008. “Exploring Network Structure, Dynamics, and Function using NetworkX,” in 7th Python in Science Conference (SciPy2008), G. Varoquaux, T. Vaught and J. Millman (eds.), Pasadena, CA, USA. August 21, pp. 11-15.
Haldane, A. G., and May, R. M. 2011. “Systemic risk in banking ecosystems,” Nature (469:7330), p. 351.
Helbing, D. 2013. “Globally networked risks and how to respond,” Nature (497:7447), p. 51.
Hevner, A. R. 2007. “A three cycle view of design science research,” Scandinavian journal of information systems (19:2), p. 4.
Holley, R. A., and Ligget, T. M. 1975. “Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model,” The Annals of Probability (3:4), pp. 643-663.
Kempe, D., Kleinberg, J., and Tardos, É. 2003. “Maximizing the spread of influence through a social network,” Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, p. 137.
Kendall, M. G., and Smith, B. B. 1939. “The problem of m rankings,” Annals of mathematical statistics.
Kendall, M. G., and Stuart, A. 1945. “The advanced theory of statistics,”.
Kermack, W. O., and McKendrick, A. G. 1927. “A Contribution to the Mathematical Theory of Epidemics,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences (115:772), pp. 700-721.
Lee, D., Choi, W., Kertész, J., and Kahng, B. 2017. “Universal mechanism for hybrid percolation transitions,” Scientific reports (7:1), p. 5723.
Lee, J. W., and Kim, S. H. 2001. “An integrated approach for interdependent information system project selection,” International Journal of Project Management (19:2), pp. 111-118.
March, S. T., and Smith, G. F. 1995. “Design and natural science research on information technology,” Decision Support Systems (15:4), pp. 251-266.
Motter, A. E., and Lai, Y.-C. 2002. “Cascade-based attacks on complex networks,” Physical Review E (66:6), p. 65102.
Neumeier, A., Radszuwill, S., and Garizy, T. Z. 2018. “Modeling project criticality in IT project portfolios,” International Journal of Project Management (36:6), pp. 833-844.
Neumeier, A., and Wolf, T. 2017. “Getting a Grip on IT Project Complexity - Concluding to Underlying Causes,” 38th International Conference on Information Systems (ICIS), Seoul, South Korea.
Pastor-Satorras, R., and Vespignani, A. 2001. “Epidemic spreading in scale-free networks,” Physical review letters (86:14), p. 3200.
Radar Group 2012. “The Impact of Data Silos in IT Planning (White Paper),”.
Radszuwill, S., and Fridgen, G. 2017. “Forging a Double-Edged Sword: Resource Synergies and Dependencies in Complex IT Project Portfolios,” 38th International Conference on Information Systems (ICIS), Seoul, South Korea.
Rossetti, G., Milli, L., Rinzivillo, S., Sîrbu, A., Pedreschi, D., and Giannotti, F. 2018. “NDlib: a python library to model and analyze diffusion processes over complex networks,” International Journal of Data Science and Analytics (5:1), pp. 61-79.
Santhanam, R., and Kyparisis, G. J. 1996. “A decision model for interdependent information system project selection,” European Journal of Operational Research (89:2), pp. 380-399.
Standish Group 2015. Chaos Report 2015. https://www.standishgroup.com/sample_research_files/CHAOSReport2015-Final.pdf.
Strogatz, S. H. 2001. “Exploring complex networks,” Nature (410:6825), p. 268.
Sznjad-Weron, K., and Sznajd, J. 2000. “Opinion evolution in closed community,” International Journal of Modern Physics C (11:06), pp. 1157-1165.
Taleb, N. N. 2007. The black swan: The impact of the highly improbable: Random house.
Tang, L., Jing, K., He, J., and Stanley, H. E. 2016. “Complex interdependent supply chain networks: Cascading failure and robustness,” Physica A: Statistical Mechanics and its Applications (443), pp. 58-69.
Tillquist, J., King, J. L., and Woo, C. 2002. “A representational scheme for analyzing information technology and organizational dependency,” MIS Quarterly, pp. 91-118.
Wang, J.-W., and Rong, L.-L. 2009. “Cascade-based attack vulnerability on the US power grid,” Safety science (47:10), pp. 1332-1336.
Watts, D. J., and Dodds, P. S. 2007. “Influentials, networks, and public opinion formation,” Journal of consumer research (34:4), pp. 441-458.
Watts, D. J., and Strogatz, S. H. 1998. “Collective dynamics of 'small-world'networks,” Nature (393:6684), p. 440.
Webster, J., and Watson, R. T. 2002. “Analyzing the past to prepare for the future: Writing a literature review,” MIS Quarterly (26:2), pp. xiii-xxiii.
Wehrmann, A., Heinrich, B., and Seifert, F. 2006. “Quantitatives IT-Portfoliomanagement: Risiken von IT-Investitionen wertorientiert steuern,” WIRTSCHAFTSINFORMATIK (48).
Wolf, T. 2015. Assessing the Criticality of IT Projects in a Portfolio Context using Centrality Measures. 12th International Conference on Wirtschaftsinformatik (WI), Osnabrück, Germany.
Zimmermann, S. 2008. “IT-Portfoliomanagement-Ein Konzept zur Bewertung und Gestaltung von IT,” Informatik-Spektrum (31:5), pp. 460-468.
Zuluaga, A., Sefair, J. A., and Medaglia, A. L. (eds.) 2007. Model for the selection and scheduling of interdependent projects, IEEE.