Browse Definitions :
Definition

operating model

An operating model is a visual representation of how an organization delivers value to its internal and external customers. Operating models, which may also be called value-chain maps, are created to help employees visualize and understand the role each part of an organization plays in meeting the needs of other components.

Operating models are useful tools for helping managers understand how changes to one part of the organization might impact the value other parts are tasked with delivering. They are usually organized from the top down and can be very high level or very granular. A large organization may find it necessary to create dozens of operating models to accurately capture the steps each department must go through to successfully meet the needs of other parts of the business and customers.

Operational models are typically documented by internal design teams with visualization expertise in large organizations, but are often simply created with flowcharts in smaller companies. It can take a few days or a few months to document an operational model, depending on the complexity of the organization’s goals and the amount of detail required.

Although operating models often evolve ad hoc, they can also be designed using frameworks such as the Operating Model Canvas (OMC) developed by Andrew Campbell. OMCs capture six elements that play an important role in delivering value: processes, organization, location, information, suppliers and management system (POLISM).

This was last updated in October 2017

Continue Reading About operating model

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close