CN116307720A - Project management method and device - Google Patents
Project management method and device Download PDFInfo
- Publication number
- CN116307720A CN116307720A CN202310270307.2A CN202310270307A CN116307720A CN 116307720 A CN116307720 A CN 116307720A CN 202310270307 A CN202310270307 A CN 202310270307A CN 116307720 A CN116307720 A CN 116307720A
- Authority
- CN
- China
- Prior art keywords
- risk
- project
- target
- risk event
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a project management method and device. Wherein the method comprises the following steps: establishing a target project group, wherein the target project group comprises at least one project related to a target financial information system in the research and development process; recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following steps: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events; analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system; and determining to execute corresponding management operation on the target project group based on the risk assessment result and the research and development rhythm analysis result. The method and the device solve the technical problem that the project group cannot be effectively managed under the condition that the project number is large due to the fact that the scientific and technological personnel lack mature analysis technology and management experience.
Description
Technical Field
The present application relates to the field of project management technologies, and in particular, to a project management method and apparatus.
Background
In order to better manage each project link, a batch of project management platforms are developed, but due to different industries, the project management links are different, and the project management platforms are mostly used for recording related data of projects, but assistance in project planning and execution is lacking.
At present, the absolute number of talents of a scientific team of a part of commercial banks is small, so that most research and development projects are managed in an outsourcing mode, and therefore, the progress, technology and quality of the research and development projects lack of identification and sustained release mechanisms, the process of controlling and delivering cannot be strictly performed, and problems of project progress lag, quality defects and the like are caused.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides a project management method and device, which at least solve the technical problem that under the condition of a large number of projects, effective management cannot be performed on project groups due to lack of mature analysis technology and management experience of science and technology personnel.
According to an aspect of the embodiments of the present application, there is provided a project management method, including: establishing a target project group, wherein the target project group comprises at least one project related to a target financial information system in the research and development process; recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following steps: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events; analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system; and determining to execute corresponding management operation on the target project group based on the risk assessment result and the research and development rhythm analysis result.
Optionally, establishing the target item group includes: responding to a management request of a target financial information system, establishing a target project group corresponding to the management request, and determining project information of each project in the target project group, wherein the project information comprises the following components: project period, project type, project scale, project plan, and project index.
Optionally, recording risk events occurring in the execution process of the target item group includes: acquiring an abnormal event of the target project group in the execution process; identifying the abnormal event according to a preset risk event identification rule to obtain a corresponding type of risk event, wherein the risk event identification rule comprises at least one of the following steps: technical risk event recognition rules, progress risk event recognition rules, quality risk event recognition rules, demand risk event recognition rules, and personnel risk event recognition rules.
Optionally, identifying the abnormal event according to a preset risk event identification rule to obtain a corresponding type of risk event, including: determining a technical risk event according to a preset technical risk event identification rule, wherein the technical risk event identification rule comprises at least one of the following steps: whether the project design is missing or not, and whether the key function is not developed successfully or not; determining a progress risk event according to a preset progress risk event identification rule, wherein the progress risk event identification rule comprises at least one of the following steps: whether the project overtime in any execution stage, whether the progress of the planned construction period deviates from the progress of the actual construction period, whether the execution rate deviates from the planned construction period, and whether the passing rate deviates from the planned construction period; determining a quality risk event according to a preset quality risk event identification rule, wherein the quality risk event identification rule comprises at least one of the following steps: whether the execution rate is lower than a first threshold, whether the passing rate is lower than a second threshold, whether the critical function test is insufficient, and whether the problem closed loop aging exceeds a third threshold; determining a demand risk event according to a demand risk event identification rule, wherein the demand risk event identification rule comprises at least one of the following: whether the key function business is confirmed or not, and whether the key function business passes the review or not; determining a personal risk event according to a personal risk event identification rule, wherein the personal risk event identification rule comprises at least one of the following steps: whether the key developer is below the fourth threshold, whether the business requirement personnel is below the fifth threshold, and whether the number of personnel of the tester is below the sixth threshold.
Optionally, the determining the schedule of the planned time period includes: determining an expected reference construction period for each item in the target group of items based on the annual production calendar and the association relationship, and the item type and the item scale, wherein the expected reference construction period comprises: a first reference construction period corresponding to the current term, a second reference construction period corresponding to the middle term and a third reference construction period corresponding to the later term; determining an item execution flow of each item in the target item group according to the item type, wherein the item execution flow comprises at least one of the following steps: stand, business requirements, software requirements, programming, integration testing, system testing, and acceptance testing; a planned project period for each project in the target project group is determined based on the expected reference project period and the project execution flow.
Optionally, determining a risk assessment result of the target item group according to the risk event includes: determining a risk assessment value for each risk event; and determining a risk assessment result of the target item group based on the risk assessment value.
Optionally, determining a risk assessment value for each risk event includes: clustering each risk event by adopting a clustering algorithm to obtain a multi-class clustering set; setting a first evaluation rule of each type of cluster set and a second evaluation rule of each risk event in each type of cluster set, wherein the first evaluation rule is used for representing the priority order of processing each type of cluster set, and the second evaluation rule is used for representing the priority order of processing each risk event; a risk assessment value for each risk event is determined based on the first assessment rule and the second assessment rule.
Optionally, analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system includes: acquiring system data of a target financial information system in a preset period; and analyzing the research and development rhythm of the target financial information system according to the system data to obtain a research and development rhythm analysis result.
According to another aspect of the embodiments of the present application, there is also provided an item management apparatus, including: the system comprises a building module, a target project group and a development module, wherein the building module is used for building a target project group, and the target project group comprises at least one project related to a target financial information system in the development process; the recording module is used for recording risk events of the target project group in the execution process and determining a risk evaluation result of the target project group according to the risk events, wherein the risk events comprise at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events; the analysis module is used for analyzing the research and development rhythm of the target financial information system and obtaining a research and development rhythm analysis result of the target financial information system; and the determining module is used for determining to execute corresponding management operation on the target project group based on the risk assessment result and the research and development rhythm analysis result.
According to another aspect of the embodiments of the present application, there is also provided an electronic device including: a memory, and a processor, wherein the memory stores a computer program, and the processor is configured to execute the project management method described above by the computer program.
In the embodiment of the application, a target project group is established, wherein the target project group comprises at least one project related to a target financial information system in the research and development process; recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following steps: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events; analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system; based on the risk assessment result and the research and development rhythm analysis result, corresponding management operation is determined to be executed on the target project group, so that research and development projects of the banking system can be managed in a unified mode, compensation and rectification are respectively carried out according to two aspects of project dimension and system dimension, management on the research and development projects of the banking system is effectively improved, the technical effect of cost reduction and efficiency improvement is achieved, and the technical problem that under the condition that the project number is large due to the lack of mature analysis technology and management experience of technological personnel, effective management cannot be carried out on the project group is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a hardware block diagram of a computer terminal for implementing a project management method according to an embodiment of the present application;
FIG. 2 is a flow chart of an alternative project management according to an embodiment of the present application;
FIG. 3 is a flow chart of an alternative determination of a planned construction period according to an embodiment of the present application;
FIG. 4 is a flow chart of an alternative risk assessment value for determining a risk event according to an embodiment of the present application;
fig. 5 is a schematic structural view of an alternative project management apparatus according to an embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and the accompanying drawings are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The method embodiments provided by the embodiments of the present application may be performed in a mobile terminal, a computer terminal, or similar computing device. Fig. 1 is a block diagram of a hardware structure of a computer terminal for implementing a project management method according to an embodiment of the present application. As shown in fig. 1, the computer terminal 10 may include one or more processors 102 (shown as 102a, 102b, … …,102 n) 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA), a memory 104 for storing data, and a transmission module 106 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial BUS (USB) port (which may be included as one of the ports of the BUS), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuits described above may be referred to generally herein as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Furthermore, the data processing circuitry may be a single stand-alone processing module, or incorporated, in whole or in part, into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the present application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination to interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the project management method in the embodiments of the present application, and the processor 102 executes the software programs and modules stored in the memory 104, thereby executing various functional applications and data processing, that is, implementing the vulnerability detection method of the application program. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 106 is arranged to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
In the above-described operating environment, the embodiments of the present application provide a project management method, it being noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system, such as a set of computer executable instructions, and, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order other than that illustrated herein.
FIG. 2 is a flowchart of an alternative project management, as shown in FIG. 2, according to an embodiment of the present application, the method includes at least steps S202-S208, wherein:
Step S202, a target project group is established, wherein the target project group comprises at least one project related to a target financial information system in the research and development process.
Along with the continuous development of bank digitization, the bank needs to adapt to industry development trend, so the bank needs to continuously conduct function research and development on the financial information system, and can complete the functions of product service, marketing, resource management, business support and the like. However, due to the fact that the absolute number of research and development technicians is insufficient, most of research and development projects of the financial information system are subjected to outsourcing management, and related technicians in banks cannot strictly manage and control project technical risks, progress risks and quality risks.
Step S204, recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events.
Specifically, risk events, such as incapability of realizing key functions of a system, overtime of any stage of project research and development, and the like, of any project in the target project group are recorded in the execution process, and a risk evaluation result of the target project group is determined by determining a risk evaluation value of the risk event, wherein the risk evaluation result can reflect risk evaluation of the target project group caused by progress lag, technical omission, quality defect, fewer personnel or unsatisfied requirement and the like.
For example, it is possible to calculate a risk evaluation value of the target item group from the risk evaluation value of the risk event, and determine a corresponding evaluation result from the classification level of the risk evaluation value. As shown in table 1.
TABLE 1
Risk assessment value for a group of items | Risk assessment results |
50 minutes or less | Poor quality |
Between 50 minutes and 75 minutes (including 50 minutes) | Good quality |
More than 75 minutes (including 75 minutes) | Excellent and excellent properties |
Each risk assessment result has a corresponding compensation measure, and the compensation measure can be set according to the preset, such as adding technicians, overtime overtaking, prolonging delivery time, updating a test plan, and the like.
Optionally, the risk events of the target item group in the execution process are recorded and counted, so that a risk event list corresponding to the target item group is obtained, and related risk events are conveniently and directly searched from the risk event list in subsequent analysis, wherein the occurrence time, the occurrence type and the items of the risk events can be recorded in the risk event list.
Step S206, analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system.
Specifically, since the financial information system in the bank comprises a plurality of types such as channel types, product service types, internal management types, data analysis types and the like, the research and development content of each type of information system is different; in addition, the version of the financial information system is continuously updated and iterated along with the development of the digitizing technology, and each version of the financial information system supports at least one service, so that in the project research and development process, the research and development rhythm analysis result of the target financial information system is obtained by analyzing the research and development rhythm of the financial information system, the aspect that the construction of the financial information system needs to be enhanced is conveniently obtained according to the research and development rhythm analysis result, and the delivery efficiency of the financial information system is improved.
The research and development rhythm can be understood as aspects of the construction of the financial information system, such as research and development period, research and development quality and the like, which need to be enhanced.
Step S208, corresponding management operation is determined to be executed on the target project group based on the risk assessment result and the research and development rhythm analysis result.
The management operation may be understood as executing corresponding compensation measures on the target management group according to the risk assessment result, and executing corresponding research and development suggestions on the target financial information system according to the research and development rhythm analysis.
Specifically, when the risk assessment result is poor and the research and development rhythm analysis result is that the research and development period is lagged, measures such as technicians, overtime overtaking, delivery time prolonging, test plan updating and the like can be added to the research and development flow of the target project group; if the risk assessment result is excellent and the research and development rhythm analysis result is poor in research and development quality, the test plan can be updated for the research and development flow of the target project group.
In the embodiment of the application, a target project group is established, wherein the target project group comprises at least one project related to a target financial information system in the research and development process; recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following steps: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events; analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system; based on the risk assessment result and the research and development rhythm analysis result, corresponding management operation is determined to be executed on the target project group, so that research and development projects of the banking system can be managed in a unified mode, compensation and rectification are respectively carried out according to two aspects of project dimension and system dimension, management on the research and development projects of the banking system is effectively improved, the technical effect of cost reduction and efficiency improvement is achieved, and the technical problem that under the condition that the project number is large due to the lack of mature analysis technology and management experience of technological personnel, effective management cannot be carried out on the project group is solved.
Steps S202 to S208 in the embodiment of the present application will be further described below.
As an alternative embodiment, in the step S202, the establishing the target item group includes: responding to a management request of a target financial information system, establishing a target project group corresponding to the management request, and determining project information of each project in the target project group, wherein the project information comprises the following components: project period, project type, project scale, project plan, and project index.
In this embodiment, the management request may be understood as managing a development project of a certain financial information system, and the project management platform may establish all projects involved in the development process of the target financial information system by corresponding management requests for the target financial information system. In addition, project information for each project needs to be determined, wherein the project information includes, but is not limited to, project period, project type, project scale, project scheme, and project index.
As an optional implementation manner, in the step S204, recording a risk event that occurs in the execution process of the target item group includes: acquiring an abnormal event of the target project group in the execution process; identifying the abnormal event according to a preset risk event identification rule to obtain a corresponding type of risk event, wherein the risk event identification rule comprises at least one of the following steps: technical risk event recognition rules, progress risk event recognition rules, quality risk event recognition rules, demand risk event recognition rules, and personnel risk event recognition rules.
The abnormal event may be understood as an event that the target project group does not match with the project information of each project in the execution process, that is, an event that does not match with the project type and project scheme, an event that cannot be completed in the project period, an event that cannot reach the project index, and the like, which are not listed herein.
Specifically, the method for identifying the abnormal event according to the preset risk event identification rule can be implemented in the following manner to obtain a corresponding type of risk event, which comprises the following steps:
determining a technical risk event according to a preset technical risk event identification rule, wherein the technical risk event identification rule comprises but is not limited to: whether the project design is missing or not, and whether the key function is not developed successfully or not; determining a progress risk event according to a preset progress risk event identification rule, wherein the progress risk event identification rule comprises but is not limited to: whether the project overtime in any execution stage, whether the progress of the planned construction period deviates from the progress of the actual construction period, whether the execution rate deviates from the planned construction period, and whether the passing rate deviates from the planned construction period; determining a quality risk event according to a preset quality risk event identification rule, wherein the quality risk event identification rule comprises but is not limited to: whether the execution rate is lower than a first threshold, whether the passing rate is lower than a second threshold, whether the critical function test is insufficient, and whether the problem closed loop aging exceeds a third threshold; determining a demand risk event according to a demand risk event identification rule, wherein the demand risk event identification rule comprises but is not limited to: whether the key function business is confirmed or not, and whether the key function business passes the review or not; determining a personal risk event according to a personal risk event identification rule, wherein the personal risk event identification rule comprises but is not limited to: whether the key developer is below the fourth threshold, whether the business requirement personnel is below the fifth threshold, and whether the number of personnel of the tester is below the sixth threshold.
Optionally, after various risk events occurring in the execution process of the target project group are acquired, corresponding early warning prompt information can be sent out in a corresponding management window in the project management platform.
For example, if a target project group has a schedule risk event that a first project overtime in a programming stage in the execution process, pop-up window information corresponding to the first project overtime in a programming stage in a technical management window in a project management platform can be popped up to remind relevant internal personnel to manage and control in time. If a quality risk event that the execution rate of the second item is lower than a first threshold value occurs in the execution process of the target item group, popup window information, corresponding to the second item, in a quality management window corresponding to the item management platform so as to remind relevant internal personnel of timely management and control.
In addition, the progress of each item in the target item group can be displayed in real time in a corresponding management window in the item management platform, so that the visual perspective progress is realized. Further, fig. 3 is a flowchart of an alternative method for determining a planned construction period according to an embodiment of the present application, where determining the planned construction period of each item in the target item group through steps S11-S13 includes:
Step S11, determining expected reference construction periods of each item in the target item group based on the annual production calendar and the association relation, and the item types and the item scales, wherein the expected reference construction periods comprise: the first reference construction period corresponding to the current term, the second reference construction period corresponding to the middle term and the third reference construction period corresponding to the later term.
Wherein, the incidence relation is the incidence relation (difficulty coefficient) between the financial information systems; the item type of each item in the target item group includes at least one of: business class, technical optimization class, and demand change class; the item size may be expressed in terms of an amount or a month.
Alternatively, the expected reference time period for each project may also be determined by increasing the project system scope.
Step S12, determining an item execution flow of each item in the target item group according to the item type, wherein the item execution flow comprises at least one of the following steps: stand-off, business requirements, software requirements, programming, integration testing, system testing, and acceptance testing.
Specifically, taking a business project as an example, if the business project is 50 months old, the necessary stages of the research and development process include: standing, business requirements, software requirements, overall schemes, system design, programming, coding, integration testing, system testing, acceptance testing, online; if the time is less than 50 months, the optional stages, such as overall scheme, programming and the like, are correspondingly added.
Taking a technical optimization class project as an example, if the technology optimization class project is 50 months old, the necessary stages of the research and development process comprise: standing, software requirements, overall scheme, programming, coding, integration testing, system testing, acceptance testing, and online; if the time is less than 50 months, the optional stages such as business requirements, system design and the like are correspondingly increased.
Taking a requirement change project as an example, if the requirement change project is 50 months old, the necessary stages of the research and development process include: service demand, coding and system testing; if the time is less than 50 months, the optional stages such as programming, acceptance testing, online and the like are correspondingly added.
It should be noted that, the project execution flow of each project may be set in a customized manner according to the actual situation, and the foregoing is merely illustrative and not limiting.
Step S13, determining the planned construction period of each project in the target project group based on the expected reference construction period and the project execution flow.
The project management platform is used for creating projects, and the planned construction period of each project is automatically calculated according to the expected reference construction period and the project execution flow, so that the production time is matched. In addition, the construction period can be adjusted according to the required technical component parameters; the planned time period can also be scaled by manual adjustment.
Optionally, multiple projects with consistent production time can be combined and managed.
Wherein, the time of production can be confirmed through annual production calendar, and above-mentioned a plurality of items that the time of production is unanimous can understand as: when the time of the programming stages corresponding to the items of the technical optimization class is consistent, the items of the technical optimization class can be combined and managed; or when the system testing time corresponding to the plurality of items of the requirement change class is consistent, the requirement change class items can be combined and managed, so that the item management efficiency is improved.
As an optional implementation manner, in the step S204, determining the risk assessment result of the target item group according to the risk event includes: determining a risk assessment value for each risk event; and determining a risk assessment result of the target item group based on the risk assessment value.
The risk evaluation value of the risk event can be determined according to the risk type corresponding to the risk event, and indexes of the risk evaluation value determined by the risk event of various types are different.
Optionally, fig. 4 is a flowchart of an alternative risk assessment method for determining risk assessment values of risk events according to an embodiment of the present application, where determining risk assessment values of each risk event in a target item group through steps S21-S23 includes:
Step S21, clustering operation is carried out on each risk event by adopting a clustering algorithm, and a multi-class clustering set is obtained;
step S22, setting a first evaluation rule of each type of cluster set and a second evaluation rule of each risk event in each type of cluster set, wherein the first evaluation rule is used for representing the priority order of processing each type of cluster set, and the second evaluation rule is used for representing the priority order of processing each risk event;
step S23, determining a risk assessment value for each risk event based on the first assessment rule and the second assessment rule.
Specifically, when a certain financial information system is researched and developed, a target project group corresponding to the financial information system can be established first, and a risk event of each project in the target project group in the execution process is recorded; then, clustering each risk event into a corresponding type of clustering set, such as clustering technical risk events into technical risk sets, clustering progress risk events into progress risk sets, and clustering quality risk events into quality risk sets, so as to divide risk events occurring in each item in a target item group; then, a first evaluation rule of each type of cluster set and a second evaluation rule of each risk event in each type of cluster set can be set according to actual application conditions, wherein the first evaluation rule corresponding to each type of cluster set is different, and the second evaluation rule corresponding to each risk event in each type of cluster set is also different; and finally, determining a risk evaluation value of each risk event according to the first evaluation rule and the second evaluation rule, wherein the larger the risk evaluation value is, the larger the influence of the risk event on the development flow of the financial information system is, and correspondingly, the risk event should be preferentially processed so as to reduce the implementation influence on the system.
The execution order of the step S21 and the step S22 may be interchanged, that is, the content of the step S22 may be executed first and then the content of the step S21 may be executed. In addition, in practical application, the first evaluation rule corresponding to each type of cluster set and the second evaluation rule corresponding to each risk event in each type of cluster set can be set according to practical situations.
Alternatively, the risk degree of each risk event may be reflected by a traffic light or a dashboard, etc. For example, when the risk level of each risk event is displayed using a traffic light, once the red light is continuously lighted, it is explained that the risk level of the risk event is serious, and accordingly, the risk evaluation value of each risk event is determined to be greater based on the first evaluation rule and the second evaluation rule. So that the accuracy of the calculated risk assessment value for each risk event can be checked.
As an optional implementation manner, in the step S206, the analyzing the research and development rhythm of the target financial information system to obtain the analysis result of the research and development rhythm of the target financial information system includes: acquiring system data of a target financial information system in a preset period; and analyzing the research and development rhythm of the target financial information system according to the system data to obtain a research and development rhythm analysis result.
The preset period may be one quarter, one month or two weeks. The method can be specifically set according to practical application conditions, and is not limited herein.
For example, first, system data of each quarter version of a certain financial information system in one year is recorded, wherein the financial information system is continuously updated, so that the version of the financial information system is continuously updated and iterated; and analyzing the research and development period of the financial information system by means of comparing the system data with each other, recording abnormality, exceptional situation and the like, and obtaining corresponding research and development rhythm analysis results, such as research and development period lag and the like. The project management method provided by the embodiment of the application can automatically analyze the research and development flow of a certain financial information system according to the same ratio, the ring ratio and other modes or abnormal conditions and exceptional conditions, realize comprehensive evaluation of the research and development process, improve the project management transparency, and simultaneously reduce the implementation risk caused by the progress lag, technical point omission and quality defect of the research and development project by recording and processing various risk events in the research and development process.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the embodiments of the present application.
According to an embodiment of the present application, there is further provided an item management apparatus for implementing the above item management method, and fig. 5 is a schematic structural diagram of an alternative item management apparatus according to an embodiment of the present application, where, as shown in fig. 5, the item management apparatus at least includes a building module 51, a recording module 52, an analyzing module 53, and a determining module 54, where:
the establishing module 51 is configured to establish a target project group, where the target project group includes at least one project related to the target financial information system in the developing process;
the recording module 52 is configured to record a risk event that occurs in the execution process of the target item group, and determine a risk evaluation result of the target item group according to the risk event, where the risk event includes at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events;
the analysis module 53 is configured to analyze a research and development rhythm of the target financial information system, and obtain a research and development rhythm analysis result of the target financial information system;
the determining module 54 is configured to determine to perform a corresponding management operation on the target project group based on the risk assessment result and the development rhythm analysis result.
Optionally, the establishing module 51 is further configured to, in response to a management request for the target financial information system, establish a target item group corresponding to the management request, and determine item information of each item in the target item group, where the item information includes: project period, project type, project scale, project plan, and project index.
Optionally, the recording module 52 is further configured to record risk events occurring in the execution process of the target item group, including: acquiring an abnormal event of the target project group in the execution process; identifying the abnormal event according to a preset risk event identification rule to obtain a corresponding type of risk event, wherein the risk event identification rule comprises at least one of the following steps: technical risk event recognition rules, progress risk event recognition rules, quality risk event recognition rules, demand risk event recognition rules, and personnel risk event recognition rules.
The abnormal event may be understood as an event that the target project group does not match with the project information of each project in the execution process, that is, an event that does not match with the project type and project scheme, an event that cannot be completed in the project period, an event that cannot reach the project index, and the like, which are not listed herein.
Specifically, the method for identifying the abnormal event according to the preset risk event identification rule can be implemented in the following manner to obtain a corresponding type of risk event, which comprises the following steps:
determining a technical risk event according to a preset technical risk event identification rule, wherein the technical risk event identification rule comprises but is not limited to: whether the project design is missing or not, and whether the key function is not developed successfully or not; determining a progress risk event according to a preset progress risk event identification rule, wherein the progress risk event identification rule comprises but is not limited to: whether the project overtime in any execution stage, whether the progress of the planned construction period deviates from the progress of the actual construction period, whether the execution rate deviates from the planned construction period, and whether the passing rate deviates from the planned construction period; determining a quality risk event according to a preset quality risk event identification rule, wherein the quality risk event identification rule comprises but is not limited to: whether the execution rate is lower than a first threshold, whether the passing rate is lower than a second threshold, whether the critical function test is insufficient, and whether the problem closed loop aging exceeds a third threshold; determining a demand risk event according to a demand risk event identification rule, wherein the demand risk event identification rule comprises but is not limited to: whether the key function business is confirmed or not, and whether the key function business passes the review or not; determining a personal risk event according to a personal risk event identification rule, wherein the personal risk event identification rule comprises but is not limited to: whether the key developer is below the fourth threshold, whether the business requirement personnel is below the fifth threshold, and whether the number of personnel of the tester is below the sixth threshold.
Optionally, the recording module 52 is further configured to determine a risk assessment value for each risk event; and determining a risk assessment result of the target item group based on the risk assessment value.
Optionally, clustering each risk event by adopting a clustering algorithm to obtain a multi-class clustering set; setting a first evaluation rule of each type of cluster set and a second evaluation rule of each risk event in each type of cluster set, wherein the first evaluation rule is used for representing the priority order of processing each type of cluster set, and the second evaluation rule is used for representing the priority order of processing each risk event; a risk assessment value for each risk event is determined based on the first assessment rule and the second assessment rule.
Optionally, the analysis module 53 is further configured to acquire system data of the target financial information system in a preset period; and analyzing the research and development rhythm of the target financial information system according to the system data to obtain a research and development rhythm analysis result.
It should be noted that, each module in the project management apparatus in the embodiment of the present application corresponds to each implementation step of the project management method in embodiment 1 one by one, and since embodiment 1 has been described in detail, details not shown in the embodiment may refer to embodiment 1, and will not be described in detail here.
In addition, each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; alternatively, the above modules may be located in different processors in any combination.
According to an embodiment of the present application, there is further provided a processor, where the processor is configured to execute a program, and when the program is executed, perform the steps in any of the foregoing method embodiments.
Optionally, in this embodiment, the program runtime execution implements the following steps:
step S202, a target project group is established, wherein the target project group comprises at least one project related to a target financial information system in the research and development process;
step S204, recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events;
step S206, analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system;
Step S208, corresponding management operation is determined to be executed on the target project group based on the risk assessment result and the research and development rhythm analysis result.
According to an embodiment of the present application, there is also provided an electronic device including: a memory and a processor, wherein the memory stores a computer program, the processor being configured to perform the steps of any of the method embodiments described above by the computer program.
Optionally, in this embodiment, the processor is configured to implement the following steps by computer program execution:
step S202, a target project group is established, wherein the target project group comprises at least one project related to a target financial information system in the research and development process;
step S204, recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events;
step S206, analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system;
Step S208, corresponding management operation is determined to be executed on the target project group based on the risk assessment result and the research and development rhythm analysis result.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of units may be a logic function division, and there may be another division manner in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution, in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.
Claims (10)
1. A method for project management, applied to a project management platform, comprising:
establishing a target project group, wherein the target project group comprises at least one project related to a target financial information system in the research and development process;
recording a risk event of the target item group in the execution process, and determining a risk evaluation result of the target item group according to the risk event, wherein the risk event comprises at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events;
analyzing the research and development rhythm of the target financial information system to obtain a research and development rhythm analysis result of the target financial information system;
and determining to execute corresponding management operation on the target project group based on the risk assessment result and the research and development rhythm analysis result.
2. The method of claim 1, wherein establishing the target group of items comprises:
responding to a management request of the target financial information system, establishing a target project group corresponding to the management request, and determining project information of each project in the target project group, wherein the project information comprises the following components: project period, project type, project scale, project plan, and project index.
3. The method of claim 2, wherein recording risk events that occur during execution of the target population of items comprises:
acquiring an abnormal event occurring in the execution process of the target project group;
identifying the abnormal event according to a preset risk event identification rule to obtain the risk event of a corresponding type, wherein the risk event identification rule comprises at least one of the following steps: technical risk event recognition rules, progress risk event recognition rules, quality risk event recognition rules, demand risk event recognition rules, and personnel risk event recognition rules.
4. A method according to claim 3, wherein identifying the abnormal event according to a preset risk event identification rule to obtain the risk event of the corresponding type comprises:
Determining the technical risk event according to the technical risk event identification rule, wherein the technical risk event identification rule comprises at least one of the following steps: whether the project design is missing or not, and whether the key function is successfully developed or not;
determining the progress risk event according to the progress risk event identification rule, wherein the progress risk event identification rule comprises at least one of the following steps: whether a project overtime in any execution stage, whether deviation exists between the progress of a planned construction period and the progress of an actual construction period, whether deviation exists between the execution rate and the planned construction period, and whether deviation exists between the passing rate and the planned construction period;
determining the quality risk event according to the quality risk event identification rule, wherein the quality risk event identification rule comprises at least one of the following steps: whether the execution rate is lower than a first threshold, whether the passing rate is lower than a second threshold, whether the critical function test is sufficient, and whether the problem closed loop aging exceeds a third threshold;
determining the demand risk event according to the demand risk event identification rule, wherein the demand risk event identification rule comprises at least one of the following: whether the key function business is confirmed or not, and whether the key function business passes the review or not;
Determining the personnel risk event according to the personnel risk event identification rule, wherein the personnel risk event identification rule comprises at least one of the following steps: whether the key developer is below the fourth threshold, whether the business requirement personnel is below the fifth threshold, and whether the number of personnel of the tester is below the sixth threshold.
5. The method of claim 4, wherein the determining a flow of the planned time period comprises:
determining an expected reference time period for each of the items in the target group of items based on an annual production calendar and an association, and the item type and the item size, wherein the expected reference time period comprises: a first reference construction period corresponding to the current term, a second reference construction period corresponding to the middle term and a third reference construction period corresponding to the later term;
determining an item execution flow of each item in the target item group according to the item type, wherein the item execution flow comprises at least one of the following steps: stand, business requirements, software requirements, programming, integration testing, system testing, and acceptance testing;
the planned time period for each item in the target group of items is determined based on the expected reference time period and the item execution flow.
6. The method of claim 1, wherein determining a risk assessment result for the target group of items from the risk event comprises:
determining a risk assessment value of each risk event;
and determining a risk assessment result of the target item group based on the risk assessment value.
7. The method of claim 6, wherein determining a risk assessment value for each of the risk events comprises:
clustering each risk event by adopting a clustering algorithm to obtain a multi-class clustering set;
setting a first evaluation rule of each type of cluster set and a second evaluation rule of each risk event in each type of cluster set, wherein the first evaluation rule is used for representing the priority order of processing each type of cluster set, and the second evaluation rule is used for representing the priority order of processing each risk event;
a risk assessment value for each of the risk events is determined based on the first assessment rule and the second assessment rule.
8. The method of claim 1, wherein analyzing the development rhythm of the target financial information system to obtain a development rhythm analysis result of the target financial information system comprises:
Acquiring system data of the target financial information system in a preset period;
and analyzing the research and development rhythm of the target financial information system according to the system data to obtain a research and development rhythm analysis result.
9. An item management apparatus, comprising:
the system comprises a building module, a target project group and a storage module, wherein the building module is used for building a target project group, and the target project group comprises at least one project related to a target financial information system in the research and development process;
the recording module is used for recording risk events occurring in the execution process of the target item group and determining a risk evaluation result of the target item group according to the risk events, wherein the risk events comprise at least one of the following: technical risk events, progress risk events, quality risk events, demand risk events, and personnel risk events;
the analysis module is used for analyzing the research and development rhythm of the target financial information system and obtaining a research and development rhythm analysis result of the target financial information system;
and the determining module is used for determining to execute corresponding management operation on the target project group based on the risk assessment result and the research and development rhythm analysis result.
10. An electronic device, comprising: a memory and a processor, wherein the memory has stored therein a computer program, the processor being configured to execute the project management method of any one of claims 1 to 8 by the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310270307.2A CN116307720A (en) | 2023-03-15 | 2023-03-15 | Project management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310270307.2A CN116307720A (en) | 2023-03-15 | 2023-03-15 | Project management method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116307720A true CN116307720A (en) | 2023-06-23 |
Family
ID=86792129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310270307.2A Pending CN116307720A (en) | 2023-03-15 | 2023-03-15 | Project management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116307720A (en) |
-
2023
- 2023-03-15 CN CN202310270307.2A patent/CN116307720A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108564286B (en) | Artificial intelligent financial wind-control credit assessment method and system based on big data credit investigation | |
US10592811B1 (en) | Analytics scripting systems and methods | |
CN110162566B (en) | Correlation analysis method and device for business data, computer equipment and storage medium | |
CN112734559B (en) | Enterprise credit risk evaluation method and device and electronic equipment | |
US8219440B2 (en) | System for enhancing business performance | |
US20150227869A1 (en) | Risk self-assessment tool | |
US20150227868A1 (en) | Risk self-assessment process configuration using a risk self-assessment tool | |
CN110349039B (en) | Complaint risk assessment method, system, computer device and readable storage medium | |
US9230211B1 (en) | Analytics scripting systems and methods | |
US20190122268A1 (en) | Assessing probability of winning an in-flight deal for different price points | |
CN113342939B (en) | Data quality monitoring method and device and related equipment | |
WO2020024270A1 (en) | Supply chain management system and method | |
CN112907356A (en) | Overdue collection method, device and system and computer readable storage medium | |
CN106408325A (en) | User consumption behavior prediction analysis method based on user payment information and system | |
US20150227878A1 (en) | Interactive Marketing Simulation System and Method | |
US20110137714A1 (en) | System for managing business performance using industry business architecture models | |
CN110503567A (en) | Data verification method, equipment, storage medium and device | |
CN114187119A (en) | Data processing method and device applied to insurance | |
US20120209644A1 (en) | Computer-implemented system and method for facilitating creation of business plans and reports | |
CN116307720A (en) | Project management method and device | |
CN112085344A (en) | Equipment health analysis method and device and electronic equipment | |
CN113450208A (en) | Loan risk change early warning and model training method and device | |
CN115345640A (en) | Product demand prediction method, product demand prediction device, computer equipment and storage medium | |
CN111738818A (en) | Method, equipment and storage medium for re-examination of post-lending credit | |
CN114723570B (en) | Agricultural risk monitoring method and device, storage medium and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |