Browse Definitions :
Definition

operating model

An operating model is a visual representation of how an organization delivers value to its internal and external customers. Operating models, which may also be called value-chain maps, are created to help employees visualize and understand the role each part of an organization plays in meeting the needs of other components.

Operating models are useful tools for helping managers understand how changes to one part of the organization might impact the value other parts are tasked with delivering. They are usually organized from the top down and can be very high level or very granular. A large organization may find it necessary to create dozens of operating models to accurately capture the steps each department must go through to successfully meet the needs of other parts of the business and customers.

Operational models are typically documented by internal design teams with visualization expertise in large organizations, but are often simply created with flowcharts in smaller companies. It can take a few days or a few months to document an operational model, depending on the complexity of the organization’s goals and the amount of detail required.

Although operating models often evolve ad hoc, they can also be designed using frameworks such as the Operating Model Canvas (OMC) developed by Andrew Campbell. OMCs capture six elements that play an important role in delivering value: processes, organization, location, information, suppliers and management system (POLISM).

This was last updated in October 2017

Continue Reading About operating model

Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close