Browse Definitions :
Definition

driver-based planning

Driver-based planning is an approach to management that identifies an organization's key business drivers and creates a series of business plans that mathematically model how those things most necessary for the organization's success would be affected by different variables.

The goal of driver-based planning is to focus business plans upon the criteria that are most capable of driving success. Identifying those key business drivers can be tricky if done in a subjective manner, however, and individuals within the same organization may have very different perceptions about what the key drivers for success are. This is why forecasting business drivers objectively through a mathematical model can be helpful. The models may be created with spreadsheets or with more advanced data modeling software applications. 

The concept of driver-based planning was used to great effect in the movie MoneyBall. The film, which was based on a book by Michael Lewis, illustrated how a Major League Baseball team's assistant general manager used statistical analysis to identify the organization's key drivers for success. The analysis, which clearly showed that on-base percentage should be a key driver for player selection, changed the way the team's general manager approached planning and allowed his team to successfully compete against other teams with more financial resources.

See also: corporate performance management, Cognos, descriptive modeling, predictive modeling

This was last updated in April 2014

Continue Reading About driver-based planning

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close