Want project success? Engage stakeholders
- 31 July, 2012 13:25
Situation: You know how important stakeholder engagement is in ensuring project success so you have made a genuine effort and have spent a lot of time trying to get stakeholders involved only to find that they are disinterested, or even worse, against the project altogether. You ask: ‘What am I doing wrong?’
The key to engaging stakeholders in any project is to have a good understanding of their priorities, Kaylene O’Brien, a technology partner at Deloitte Consulting, said. As much as you may want your project to be at the top of their minds, show that you understand they have other business demands and priorities.
“Quite often there is push back from the business units and the stakeholders because often that expectation comes from very little notice and the stakeholders continue to have their business-as-usual demands.
“It fundamentally demonstrates that quite often IT project managers don’t understand the priority of the project that they are running in comparison to some of the other demands and the business-as-usual activities that the business stakeholders have.”
While having a good understanding of each of the stakeholders’ business demands and priorities is important, you still need to be clear early on about what is required of them in the project and the implications of not having their participation, O’Brien said.
Grouping your stakeholders into broad categories is a sign that you may not properly understand their different needs and priorities, O’Brien said, making it difficult to know how to engage each stakeholder into the project.
“Most projects group their stakeholders into too few and too broader categories,” she said. “Segment your stakeholders and have a targeted strategy for each of the stakeholder groups. There will be more groups than you really think there is and they will all have different priorities.”
O’Brien also pointed out the importance of building and maintaining trust and respect in relationships with business unit peers to ensure that your stakeholders positively engage and that they approve of the project in its final stages.
“Build a trust relationship where you have the credibility and reputation that you can deliver and honest, transparent communication throughout the project will put you in good stead for the pre go live period which can potentially go very chaotic.
“If you’ve gone through your project putting an overly good spin on your project the whole way through, then that’s the point where you risk not having the trust of your stakeholders.
“But if you’ve built the trust of your stakeholders and you’ve been very clear about what the benefits are, you’ve been very clear about the risks, their role in mitigating those risks and extracting the benefits, then you’ll much more likely progress through the pre go live jitters much more smoothly than if you hadn’t built that trust relationship throughout the project.”
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Customer Success - Slater & Gordon Lawyers
Lawyers work hard, and they work fast. Any activity that takes their focus away from the task at hand represents lost productivity and lost revenue. Slater & Gordon Lawyers needed to filter spam and email-borne malware and provide high availability for email. Results from the business solution they chose include 250 hours of IT staff time reclaimed annually for other tasks, long delays in email delivery alleviated, reduced email-related storage costs, and email failover to the cloud in minutes, avoiding hours-long outages. Find out how they got these results.
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.