Browse Definitions :
Definition

operating model

An operating model is a visual representation of how an organization delivers value to its internal and external customers. Operating models, which may also be called value-chain maps, are created to help employees visualize and understand the role each part of an organization plays in meeting the needs of other components.

Operating models are useful tools for helping managers understand how changes to one part of the organization might impact the value other parts are tasked with delivering. They are usually organized from the top down and can be very high level or very granular. A large organization may find it necessary to create dozens of operating models to accurately capture the steps each department must go through to successfully meet the needs of other parts of the business and customers.

Operational models are typically documented by internal design teams with visualization expertise in large organizations, but are often simply created with flowcharts in smaller companies. It can take a few days or a few months to document an operational model, depending on the complexity of the organization’s goals and the amount of detail required.

Although operating models often evolve ad hoc, they can also be designed using frameworks such as the Operating Model Canvas (OMC) developed by Andrew Campbell. OMCs capture six elements that play an important role in delivering value: processes, organization, location, information, suppliers and management system (POLISM).

This was last updated in October 2017

Continue Reading About operating model

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Does your organization have a visual representation of its operating model?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close