An empirical analysis of risk components and performance on software projects

Size: px
Start display at page:

Download "An empirical analysis of risk components and performance on software projects"

Transcription

1 The Journal of Systems and Software 80 (2007) An empirical analysis of risk components and on software projects Wen-Ming Han, Sun-Jen Huang * Department of Information Management, National Taiwan University of Science and Technology, 43, Sec. 4, Keelung Road, Taipei, Taiwan Received 1 October 2005; received in revised form 18 April 2006; accepted 29 April 2006 Available online 14 June 2006 Abstract Risk management and enhancement have always been the focus of software project management studies. The present paper shows the findings from an empirical study based on 115 software projects on analyzing the probability of occurrence and impact of the six dimensions comprising 27 software risks on project. The MANOVA analysis revealed that the probability of occurrence and composite impact have significant differences on six risk dimensions. Moreover, it indicated that no association between the probability of occurrence and composite impact among the six risk dimensions exists and hence, it is a crucial consideration for project managers when deciding the suitable risk management strategy. A pattern analysis of risks across high, medium, and low- software projects also showed that (1) the requirement risk dimension is the primary area among the six risk dimensions regardless of whether the project belongs to high, medium, or low; (2) for medium- software projects, project managers, aside from giving importance to requirement risk, must also continually monitor and control the planning and control and the project complexity risks so that the project can be improved; and, (3) improper management of the team, requirement, and planning and control risks are the primary factors contributing to a low- project. Ó 2006 Elsevier Inc. All rights reserved. Keywords: Software project management; Software risk management; Risk exposure; Project 1. Introduction Software development is a highly complex and unpredictable activity. The Standish Group CHAOS Report in 2004 indicated that 53% of software projects were unable to deliver on schedule, within budget, and with the required functions, while 18% of the software projects were cancelled (Standish Group International, 2004). This stresses the fact that software projects pose various risks and daunting tasks for many organizations (Charette, 2005; Chris and Christine, 2003; Hoffman, 1999; McConnell, 1996). Now, as organizations invest substantial resources and effort on software development, controlling the risks associated with software projects becomes crucial (Kumar, * Corresponding author. Tel.: ; fax: address: huang@cs.ntust.edu.tw (S.-J. Huang). 2002). Hence, understanding the nature of the various software risks and their relationship with project has become increasingly important since the risk management strategy and plan depends on it. Developing an efficient and suitable risk management strategy depends on understanding two basic components probability of occurrence and impact on project (Boehm, 1991). The probability of occurrence of each software risk is different and its degree of impact on project cost, schedule and quality is also different. Hence, these two software risk components must be taken into consideration to develop a good software risk management strategy and plan. If not, the real benefits of the risk management activity may be lower than the resources invested (Boehm, 1991; Longstaff et al., 2000; Kumar, 2002; DeMarco and Lister, 2003). Although several articles have already identified various software risks, we currently lack an understanding of the /$ - see front matter Ó 2006 Elsevier Inc. All rights reserved. doi: /j.jss

2 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) relative probability of occurrence and the various impacts of different software risks across projects in general. If project managers do not realize the natures of the different kinds of software risks and their relationship to project, they cannot develop an effective and appropriate strategy to mitigate or control them. Many studies have proven that proper management of software risks affects the success of software development projects (Jiang and Klein, 2000; Wallace and Keil, 2004). However, previous studies on software risk management failed to analyze the gap or pattern between software risks and project. For example, we can identify the software risks that negatively affect the project and thus, should be well-controlled in order to improve the project. Such insights regarding the patterns between software risks and project can assist project managers in developing a software risk management strategy that can mitigate the risks associated with software development projects. The present paper explores the relationships between software risks and their impact on project. The term project is defined as the degree to which the software project achieves success in the perspective of process and product (Nidumolu, 1996). In the present study, we began to address this issue by analyzing the probability of occurrence and impact on project of 27 software risks. These risks are classified into six dimensions namely, user, requirement, project complexity, planning and control, team, and organizational environment. A dataset from 115 historical software projects were analyzed using the MANOVA and Two-Step Cluster Analysis methods. These analyses addressed the following questions: (1) What are the different patterns for both the probability of occurrence and the impact in six software risk dimensions? (2) What relationships exist among the software risks in the three project clusters (high, medium, and low)? (3) What are the top 10 software risks and what are their associated probability of occurrence and impact? risk profile for a software project. Boehm (1991) surveyed several experienced project managers and developed a top 10 risk identification checklist for TRW. Barki et al. (1993) conducted a comprehensive review of software risk related studies from 120 projects in 75 organizations, then proposed 35 measures for software risks which were further classified into five dimensions: technological newness, application size, expertise, application complexity and organizational environment. Sumner (2000) used a structured interview to compare the differences between software risks within MIS and ERP projects, and proposed nine risks that were unique in ERP projects. Longstaff et al. (2000) proposed a framework named Hierarchically Holographic Modeling (HHM) and identified seven visions in systems integration that included 32 risks. Kliem (2001) identified 38 risks in BPR projects which were classified into four categories: people, management, business, and technical Addison (2003) used a Delphi technique to collect the opinion of 32 experts and proposed 28 risks for E-commerce projects. Meanwhile, Carney et al. (2003) designed a tool called COTS Usage Risk Evaluation (CURE) to predict the risk areas of COTS products in which he identified four categories comprising 21 risk areas. A summary of the software risks identified in the literature is shown in Table 1. Wallace et al. s work (2004) defined 27 software risks which were classified into six dimensions as shown in Table 2. This structure was utilized in this study to investigate the effects of risks on project Risk assessment method A risk assessment method is used to quantify the degree of importance of software risks to project. The importance of software risks usually is expressed as both the probability of occurrence and the impact on project. Three well-known software risk assessment methods in the literature are SRE, SERIM and DoD Guide. 2. Background This section discusses the various risks affecting the of software projects. Next, three of the wellknown risk assessment methods in the literature are introduced and compared. The Department of Defense (DoD) Risk Management Guide that was adopted to perform this empirical study is illustrated in this section Software risks Software risks are multifaceted and thus difficult to measure even though several studies have already been conducted since McFarlan (1981) identified three dimensions of software risks namely, project size, technology experience, and project structure. He suggested that project managers need to develop an aggregated software Table 1 Summary of risks in software development Author (year) Research area Dimensions Software risks McFarlan (1981) Common 3 54 Boehm (1991) Common 0 10 Barki et al. (1993) Common 5 35 Sumner (2000) ERP 6 19 Longstaff et al. (2000) Systems integration 7 32 Cule et al. (2000) Common 4 55 Kliem (2001) BPR 4 38 Schmidt et al. (2001) Common Houston et al. (2001) Common 0 29 Murthi (2002) Common 0 12 Addison (2003) E-commerce Carney et al. (2003) COTS 4 21 Wallace et al. (2004) Common 6 27

3 44 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Table 2 Software risks considered in this study Risk dimension Abbreviation Software risk User User1 Users resistant to change User2 Conflict between users User3 Users with negative attitudes toward the project User4 Users not committed to the project User5 Lack of cooperation from users Requirement Reqm1 Continually changing system requirements Reqm2 System requirements not adequately identified Reqm3 Unclear system requirements Reqm4 Incorrect system requirements Project complexity Comp1 Project involved the use of new technology Comp2 High level of technical complexity Comp3 Immature technology Comp4 Project involves use of technology that has not been used in prior projects Planning & Control P & C1 Lack of an effective project management methodology P & C2 Project progress not monitored closely enough P & C3 Inadequate estimation of required resources P & C4 Poor project planning P & C5 Project milestones not clearly defined P & C6 Inexperienced project manager P & C7 Ineffective communication Team Team1 Inexperienced team members Team2 Inadequately trained development team members Team3 Team members lack specialized skills required by the project Organizational environment Org1 Change in organizational management during the project Org2 Corporate politics with negative effect on project Org3 Unstable organizational environment Org4 Organization undergoing restructuring during the project Table 3 Various impacts of the risk assessment Impact SRE SERIM DoD Guide Cost X X X Schedule X X X Technical X X X Team X Support X The Software Risk Evaluation (SRE) method was developed by the Software Engineering Institute (SEI) to identify, analyze, and develop mitigation strategies for controlling risks (Williams et al., 1999). Version 2.0 of the SRE Method, released in 1999, describes the rating of the probability of occurrence on a scale of one to three, while the impact was defined by four components: cost, schedule, support and technical. The SRE impact components, however, did not consider the team issue which in turn, has become a critical factor in modern software projects (Jiang et al., 2000). Karolak (1997) proposed a method called Software Engineering Risk Management (SERIM) to predict risks and to provide corrective action in the software development phase. The SERIM identified 10 software risks and came up with 81 related questions that contained metrics to measure the software risks. The relationship between software risks were identified using three of the risk elements: cost, schedule and technical. However, as in the case of the SRE Method, SERIM did not include the team issue. The Risk Management Guide for DOD Acquisition (2003), released by the Secretary of Defense and the Defense Acquisition University (DAU), proposed a risk process model for how an organization identifies, assesses, and manages risks during software development. In this method, five levels were identified to assess the probability of occurrence of software risks namely, Remote, Unlikely, Likely, Highly likely and Near certainty. The impact of software risks represents the degree of influence on project. The types of impact of software risks on project in the DoD Guide includes technical, cost, schedule and team. A comparison of the various impacts for the above-mentioned software risk assessment methods is shown in Table 3. Since the DoD method contains diverse types of impact as well as the clear assessment criteria and description for each probability scale of occurrence and impacts, the method was adopted in the present study. Hence, the four types of impact defined by the DoD Risk Management Guide were adopted in this study. The assessment of the probability of occurrence and impact of software risks based on the DoD Risk Management Guide is shown in Table Data collection This study is based on data collected via a web-based survey. To increase the friendliness and usability of the survey, the 11 design principles proposed by Dillman et al. (2002) were adopted. For example, Use a scrolling design that allows respondents to see all questions unless skip patterns are important is one of them. The survey contained four sections. The first section explained the purpose of this study and encouraged project managers to participate in it. The second section requested the respondents to provide general information on their most recently completed software project. The third section listed 27 software risks and asked the respondents to assess the probability of occurrence and impact for each risk according to the DoD Risk Assessment Method in Table 4. Finally, the fourth section listed seven measures used to evaluate the project. There are organized into process

4 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Table 4 DoD risk assessment method Level Probability of Impact occurrence Technical Cost Schedule Team 1 Remote Minimal or no impact Minimal or Minimal or no impact None no impact 2 Unlikely Acceptable with some reduction <5% Additional resources required. Able to meet Some impact in margin need dates 3 Likely Acceptable with significant 5 7% Minor slip in key milestone. Not able to meet Moderate impact reduction in margin need dates 4 Highly likely Acceptable; no remaining margin 7 10% Major slip in key milestone or critical path impacted Major impact 5 Near certainty Unacceptable >10% Cannot achieve key team or major program milestone Unacceptable and product dimensions (Nidumolu, 1996; Rai and Al-Hindi, 2000). Due to space limitations, the whole questionnaire could not be included in the present paper. However, selected parts of the questionnaire are presented in Appendix A. The whole questionnaire can be made available upon request. A pretest was conducted to verify content validity and readability through personal interviews with five domain experts from academia and the software industry. Based on their feedback, the initial questionnaire was modified to improve the wording. A total of 300 project managers were invited and 135 surveys were returned within a span of two weeks. After checking the data received, 20 incomplete questionnaires were discarded. As a result, only 115 became valid survey questionnaires yielding a response rate of 38.33%. The number of years of work experience of the respondents ranged from 1 to 29 years, and the average was 10 years. To test the potential bias of the responses, the t-test method was used to compare the demographics of the early respondents versus the late ones (Armstrong and Overton, 1997). No significant difference was found (p = 0.983). Thus, the result indicated that the collected software projects can be combined for further analysis. Table 5 summarizes the 115 collected software projects. 4. Data analysis and results 4.1. The relationship of the probability of occurrence and impact in six risk dimensions It is important for project managers to explore patterns in the probability of occurrence and impact among risk dimensions. For example, do different risk dimensions Table 5 Profile of the collected 115 software projects Project attribute Mean Standard deviation Minimum Maximum Project duration (months) Delay time (percentage) Cost overlay (percentage) Staff turnover (percentage) N = 115 projects Table 6 The probability of occurrence and composite impact among risk dimensions Risk dimension Probability of occurrence Composite impact Risk exposure User Requirement Project complexity Planning and control Team Organization environment Baseline threshold show similar probability of occurrence? If not, what risk dimensions have a higher probability of occurrence? The MANOVA method is a widely-used statistical technique for verifying if the samples from two or more populations have equal means. This method was adopted to test whether or not the means of the risk components (probability of occurrence and composite impact) of the six risk dimensions are statistically different. The value of the composite impact of software risks was computed by averaging the impacts of software risks on the technical, cost, schedule and team. The verification for the assumptions of the MANOVA method (i.e., normality and homogeneity) was also performed and no violation of the assumptions was found in this empirical study. The results of the MANOVA indicated that the probability of occurrence and composite impact of the software risks of the six risk dimensions were significantly different. 1 The means of the probability of occurrence and composite impact among the six risk dimensions are shown in Table 6. A higher mean for a risk dimension indicates a higher possibility of occurrence or degree of influence. The baseline threshold, which was computed by averaging the six risk dimensions for each risk component, is a measure of the comparison criterion. Risk exposure was computed by multiplying the probability of occurrence with the composite impact (Boehm, 1991). Project managers are often asked to indicate what type of software risks frequently occur. As shown in Table 6, the baseline threshold of the probability of occurrence is 1 The MANOVA analysis results can be provided upon request.

5 46 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Only the two risk dimensions of requirement and project complexity exceeded the baseline threshold. This indicates that these two dimensions of software risks occur more frequently than the others. They are followed by the dimensions of team, planning and control and user risk dimensions. The organizational environment risk dimension does not occur as often as the other dimensions. In contrast to the probability of occurrence of software risks, the information about composite impact can assist the project managers in understanding the degree of negative effects on the project when these risks occur. When the composite impact of each risk dimension was compared with the baseline threshold (2.42) in Table 6, the requirement and planning and control risk dimensions showed a higher impact on the project. The risk dimensions of team, organizational environment, project complexity and user posed a lesser degree of impact on the project. Further analysis of Table 6 reveals that the orderings of the probability of occurrence and composite impact among the six risk dimensions were inconsistent. To confirm this point, Kendall s W rank test was used to verify whether these two orderings were significantly different. The result (p = 0.191) indicated that there is no significant association between the probability of occurrence and composite impact among the six risk dimensions. Risk exposure represents the overall importance of software risks and thus, helps the project managers to prioritize them and to develop an appropriate risk mitigation plan accordingly. Table 6 indicates that the requirement risk dimension has the highest probability of occurrence and composite impact and hence, is the principal source of software risks. The planning and control risk dimension has the second highest composite impact but has a lower probability of occurrence. In third place are the project complexity and team risk dimensions, both of which have the same value of risk exposure. However, the degrees of their probability of occurrence and composite impact are different. The Project complexity risk dimension has a higher probability of occurrence but a lesser composite impact as compared to the team risk dimension. This implies that the project risk managers need to employ different risk mitigation plans or strategies for these two risk dimensions accordingly. The remaining risk dimensions user and organizational environment exhibit even lesser probability of occurrence and composite impact. An organization or project manager cannot avoid all software risks since the resources of an organization or a project are limited. Hence, project managers must concentrate on those software risks with a higher risk exposure, and adopt a cost effective risk management strategy. An understanding of the nature of software risks the probability of occurrence and composite impact on project, can assist the project managers in adopting appropriate risk mitigation strategies for each of the different dimensions of software risk. Take the Project complexity risk dimension as an example. It has a higher probability of occurrence but a lower composite impact. Hence, it would be better for the project managers to adopt a strategy that reduces its probability of occurrence rather than lowers its degree of impact on the project The relationship between risk dimensions and impact The second topic of the present investigation focuses on examining the relationship between each risk dimension and its impact on the project. This addresses the question of whether or not there is a difference among the four types of impact caused by each risk dimension. Such information can assist the project managers in creating an appropriate risk management strategy. The MAN- OVA method was used to analyze the differences in the degree of impact of each risk dimension. The results show that the five risk dimensions have statistically significant differences (p < 0.05) with the four types of impact, except for the organizational environment (p = 0.550). The probable reason is that the concept of organizational environment is more abstract and broader and hence, the project managers had difficulty in distinguishing the degree of differences from the various impacts. Table 7 shows that the degrees of influence of requirement and planning and control risk dimensions are above the baseline threshold for all of the various impacts, while the rest are all below the baseline threshold. This reveals that if the project managers do not employ the appropriate risk management strategy for each of the risk dimensions, the efficiency or possible benefits from the software risk management will be negatively affected. Table 8 depicts the detailed information regarding the probability of occurrence and impact among the 27 software risks. This can be used as baselines to assist an organization in triggering risk-handling activities and to understand the strengths and weaknesses of its software development capability Patterns in risk dimensions across the levels of project The third topic of the present investigation concerns the relationship between risk dimension and project perfor- Table 7 The composite impact of four types among risk dimensions Risk dimension Technical Cost Schedule Team User Requirement Project complexity Planning and control Team Organization environment Baseline threshold

6 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Table 8 The probability of occurrence and impact among software risks Software risk Probability of occurrence Impact Technical Cost Schedule Team User risk dimension Users1 a Users Users Users Users Requirement risk dimension Reqm Reqm Reqm Reqm Project complexity risk dimension Comp Comp Comp Comp Planning & Control risk dimension P & C P & C P & C P & C P & C P & C P & C Team risk dimension Team Team Team Organization environment risk dimension Org Org Org Org a Please refer to Table 2 for the meaning of the abbreviations in the column of this table. mance. Project is determined by averaging the five product measures and two process measures. In order to have an objective classification of the levels of project, the Two-Step Cluster Analysis, a tree-based technique in SPSS package, was used (SPSS, 2003) in this study. The optimal number of clusters was decided through Schwarz s Bayesian Criterion. It resulted in three clusters which were divided into low (n = 16), medium (n = 45) and high (n = 54) project as shown in Table 9. The values in Table 9 represent the risk exposure of a specific project cluster by averaging the risk exposures of all the projects within this cluster. Several interesting findings could be observed from two points of view namely, the pattern of the software risk dimensions and the individual project cluster. For the pattern of the software risk dimensions, the radar chart, as shown in Fig. 1, provides a clear graphical Table 9 Cluster means for the six risk dimensions Risk dimension High (n = 54) Medium (n = 45) Low (n = 16) User Requirement Project complexity Planning and control Team Organization environment Baseline threshold Project Organization Environment Team User Planning & Control Requirement Project Complexity Low Medium High Fig. 1. Risk radar chart. description showing that all risk dimensions obviously increased from the low to high- clusters. This finding provides empirical evidence that software risks decrease the degree of project (Jiang and Klein, 2000; Wallace and Keil, 2004). The area enclosed in the radar chart represents the risk exposure in six risk dimensions for one of three software project clusters. The radar chart shows that the difference between the regions of low- and medium- software projects is much larger than the difference between the medium- and the high- software projects. This suggests that there is an inverse and nonlinear relation between software risks and project. In the high- cluster of the software projects, the requirement risk dimension is the primary factor for lowering the project since the values of the other five risk dimensions do not exceed the baseline threshold (5.34). The result suggests that managing the requirement risks is critical to achieving the best project because even the high- projects still have a high degree of the requirement risk dimension. For the medium- project, the requirement, project complexity and planning and control risk

7 48 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Table 10 The top 10 software risks Rank Software risk Probability of occurrence Technical Cost Schedule Team Risk exposure 1 Continually changing system requirements (Reqm1) System requirements not adequately identified (Reqm2) Unclear system requirements (Reqm3) Lack of an effective project management methodology (P & C1) Incorrect system requirements (Reqm4) Poor project planning (P & C4) Inadequate estimation of required resources (P & C3) Project involved the use of new technology (Comp1) Project progress not monitored closely enough (P & C2) Corporate politics with negative effect on project (Org2) dimensions are the factors that decrease the project because all of their values are above the baseline threshold (6.51). Hence, controlling these risks will help to improve the project. For the low- project, the major risk dimensions are the requirement, planning and control, and team because all their values are above the baseline threshold (9.22). Thus, continually monitoring these risk dimensions is a basic requirement for an effective software risk management. Further analysis of the data in Table 9 yields four important findings. Firstly, the requirement risk dimension of all the three project clusters exceeds the baseline threshold. This means that successfully managing the requirement risk is a basic requirement for achieving the desired software project. Secondly, the project complexity risk dimension exceeds the baseline threshold only for the medium- projects. Other clusters, however, do not have the same situation. Thirdly, only the planning and control risk dimension in the high- project does not exceed the baseline threshold. This suggests that the medium and low- projects need to carefully manage the planning and control risk so that they can have chances of improving their project. Lastly, only the team risk dimension in the low- project exceeds the baseline threshold. This suggests that not addressing well the risks associated with the development team can negatively affect project A list of the top 10 risks To determine the top 10 risks which lead to failure in software projects, the risk exposure of all the risks within the six dimensions were computed by multiplying the value of probability of occurrence with the various degrees of composite impact. Table 10 presents a list of the top 10 software risks and their associated probability of occurrence, degrees of the four various impacts, and risk exposure. The past studies (Boehm, 1991; Mursu et al., 2003; Wallace and Keil, 2004) emphasized the top 10 risks by simply listing them. The present study not only presents the top 10 software risks but also includes the information about their probability of occurrence and degree of impact. In this way, the project managers can have a better idea of how to manage these software risks. 5. Conclusion Achieving effective software risk management requires project managers to understand the nature of software risks. Thus, information about the probability of occurrence and impact of software risks on project can help the project managers to develop a better risk management strategy. This empirical study considered risk information on 115 software projects. The results indicate that a positive correlation does not exist between the probability of occurrence and impact among the six risk dimensions. The relationship between software risks and project was also examined in the high, medium, and low- projects. The results show that the requirement risk dimension is the principal factor affecting the project. Aside from this, one of the ways to improve project is by properly planning the development activities and reducing the project complexity. Likewise, if the project manager is unable to effectively manage the requirements of the whole project life cycle, and does not well-plan nor monitor the software risk management plan, the software projects is likely to perform poorly. The of the software projects could also benefit from exploring the relationship between risk components and some important attributes of software projects such as the type of software systems and project duration. These are the possible research topics for the future. Appendix A Selected parts of the questionnaire To what degree do you believe the probability of occurrence and four impacts of Team risks exist in your most recently completed software project? Please circle the response that best represents your judgment on the following scales based on the DoD Risk Management Assessment Method which is provided in the attached sheet.

8 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) Inexperienced team members (Team1) Probability of occurrence Remote Near certainty Technical Minimal or no impact Unacceptable Cost Minimal or no impact >10% Schedule Minimal or no impact Cannot achieve key team or major program milestone Team None Unacceptable Inadequately trained development team members (Team2) Probability of occurrence Remote Near certainty Technical Minimal or no impact Unacceptable Cost Minimal or no impact >10% Schedule Minimal or no impact Cannot achieve key team or major program milestone Team None Unacceptable Team members lack specialized skills required by the project (Team3) Probability of occurrence Remote Near certainty Technical Minimal or no impact Unacceptable Cost Minimal or no impact >10% Schedule Minimal or no impact Cannot achieve key team or major program milestone Team None Unacceptable To what degree do you believe the product and process measures exist in your most recently completed software project? Please circle the response that best represents your judgment on the following scales. Strongly Strongly agree disagree The application developed is reliable The application is easy to maintain The users perceive that the system meets intended functional requirements The system meets user expectations with respect to response time The overall quality of the developed application is high The system is completed within budget The system is completed within schedule References Addison, T., E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management 23 (1), Armstrong, J., Overton, T., Estimating non-response bias in mail survey. Journal of Marketing Research 15, Barki, H., Rivard, S., Talbot, J., Toward an assessment of software development risk. Journal of Management Information Systems 10 (2), Boehm, B., Software risk management: principles and practices. IEEE Software 8 (1), Carney, D., Morris, E., Patrick, R., Identifying commercial off-theshelf (COTS) product risks: the COTS usage risk evaluation. Technical Report, CMU/SEI-2003-TR-023. Charette, R., Why software fails. IEEE Spectrum 42 (9), Chris, S., Christine, C., The State of IT Project Management in the UK University of Oxford, Templeton College. Cule, P. et al., Strategies for heading off IS project failure. Information Systems Management 17 (2), DeMarco, T., Lister, T., Waltzing with Bears: Managing Risk on Software Projects. Dorset House Publishing Company. Dillman, D. et al., Influence of plain vs. fancy design on response rates for web surveys. Joint Statistical Meetings. Available from: < Hoffman, T., % of IT departments fail to meet business needs. Computerworld 33 (41), 24. Houston, D., Mackulak, G., Collofello, J., Stochastic simulation of risk factor potential effects for software development risk management. Journal of Systems and Software 59 (3), Jiang, J., Klein, G., Software development risks to project effectiveness. The Journal of Systems and Software 52, Jiang, J., Klein, G., Means, T., Project risk impact on software development team. Project Management Journal 31 (4), Karolak, D., Software Engineering Risk Management. IEEE Computer Society. Kliem, R., Risk management for business process reengineering projects. Information Systems Management 17 (4), Kumar, R., Managing risks in IT projects: an options perspective. Information and Management 40, Longstaff, T. et al., Are we forgetting the risks of information technology? IEEE Computer 33 (12), McConnell, S., Rapid Development: Taming Wild Software Schedules. Microsoft Press.

9 50 W.-M. Han, S.-J. Huang / The Journal of Systems and Software 80 (2007) McFarlan, F., Portfolio approach to information systems. Harvard Business Review 59 (5), Mursu, A. et al., Identifying software project risks in Nigeria: an international comparative study. European Journal of Information Systems 12 (3), Murthi, S., Preventive risk management for software projects. IT Professional 4 (5), Nidumolu, S.R., Standardization, requirements uncertainty and software project. Information and Management 31 (3), Rai, A., Al-Hindi, H., The effects of development process modeling and task uncertainty on development quality. Information and Management 37 (6), Schmidt, R. et al., Identifying software project risks: an international Delphi study. Journal of Management Information Systems 17 (4), SPSS Inc., SPSS 12.0 User Guide and Tutorial. Standish Group International, Inc., Third Quarter Research Report. Sumner, M., Risk factors in enterprise-wide/erp projects. Journal of Information Technology 15 (4), US Department of Defense, Risk management guide for DOD acquisition fifth edition. Defense Acquisition University, Defense Systems Management College. Wallace, L., Keil, M., Software project risks and their effect on outcomes. Communications of the ACM 47 (4), Wallace, L., Keil, M., Arun, R., How software project risk affects project : an investigation of the dimensions of risk and an exploratory model. Decision Sciences 35 (2), Williams, R. et al., SRE Method Description & SRE Team Members Notebook Version 2.0. Software Engineering Institute, Carnegie Mellon University CMU/SEI-99-TR-029.

Risk Factors in Software Development Projects

Risk Factors in Software Development Projects Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 51 Risk Factors in Software Development s NOOR HABIBAH ARSHAD,

More information

The Relationship between Team Risk Factors and IT Governance under ERP Environment

The Relationship between Team Risk Factors and IT Governance under ERP Environment The Relationship between Team Risk Factors and IT Governance under ERP Environment Wen-Hsien Tsai (Corresponding author) Department of Business Administration, National Central University Jhongli, Taoyuan

More information

RISK MANAGEMENT APPROACHES AND PRACTICES IN IT PROJECTS

RISK MANAGEMENT APPROACHES AND PRACTICES IN IT PROJECTS RISK MANAGEMENT APPROACHES AND PRACTICES IN IT PROJECTS Didraga Otniel West University of Timisoara, Faculty of Economics and Business Administration Bibu Nicolae West University of Timisoara, Faculty

More information

Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk

Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk Mohammad Ahmad Ibraigheeth 1, Syed Abdullah Fadzli 2 Faculty of Informatics and Computing, Universiti Sultan ZainalAbidin,

More information

THE ROLE OF MANGER EXPERIENCE AND FORMAL METHODOLOGY IN SOFTWARE DEVELOPMENT

THE ROLE OF MANGER EXPERIENCE AND FORMAL METHODOLOGY IN SOFTWARE DEVELOPMENT THE ROLE OF MANGER EXPERIENCE AND FORMAL METHODOLOGY IN SOFTWARE DEVELOPMENT MOHAMMAD MAHMOUD AL_TARAWNEH Balqa Applied Uinversity / Karak University Collage E-mail: Moh_8877@yahoo.com ABSTRACT This research

More information

I. INTRODUCTION LITERATURE REVIEW

I. INTRODUCTION LITERATURE REVIEW Volume-3, Issue-12, December 2016 ISSN: 2349-7637 (Online) RESEARCH HUB International Multidisciplinary Research Journal (RHIMRJ) Research Paper Available online at: www.rhimrj.com A Survey on Effectiveness

More information

Applying Evaluate Marketing Processes Corporation Marketing Capability Maturity Model Evidence from Bursa Malaysia Market

Applying Evaluate Marketing Processes Corporation Marketing Capability Maturity Model Evidence from Bursa Malaysia Market Applying Evaluate Marketing Processes Corporation Marketing Capability Maturity Model Evidence from Bursa Malaysia Market Suseela Devi Chandran Phd Candidate, Institute of Malaysia & International Studies,

More information

An Empirical Analysis of Requirements Uncertainty, Task Uncertainty and Software Project Performance

An Empirical Analysis of Requirements Uncertainty, Task Uncertainty and Software Project Performance Journal of Emerging Trends in Economics and Management Sciences (JETEMS) 3(5): 559-564 Scholarlink Research Institute Journals, 2012 (ISSN: 2141-7024 jetems.scholarlinkresearch.org Journal of Emerging

More information

Evaluating CSIRT Operations

Evaluating CSIRT Operations Evaluating CSIRT Operations FIRST 2006 CERT Training and Education Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 CERT, CERT Coordination Center, and Carnegie Mellon

More information

MEASURES FOR EXCELLENCE. Measures. For. Software. Acquisition

MEASURES FOR EXCELLENCE. Measures. For. Software. Acquisition MEASURES FOR EXCELLENCE Measures For Software Acquisition J.W.E Greene 7 rue Fenoux 93 Blythe Road, Paris 75015 London W14 OHP Tel: 33-140-431210 Tel: 44-171-603-9009 Fax: 33-148-286249 Fax: 44-171-602-6008

More information

Software Risk Management and Risk Mitigation Technique

Software Risk Management and Risk Mitigation Technique Software Risk Management and Risk Mitigation Technique Kunal Deswal 1 & Shweta Thakur 2 Student, Dept. of Information Technology. DCE, Gurgaon, Harayana, India ABSTRACT Software Engineering is the craft

More information

SOFTWARE ENGINEERING

SOFTWARE ENGINEERING SOFTWARE ENGINEERING Project planning Once a project is found to be feasible, software project managers undertake project planning. Project planning is undertaken and completed even before any development

More information

The Extent of Risk Management Practices in E-Government Projects

The Extent of Risk Management Practices in E-Government Projects Proceedings of the 5th WSEAS International Conference on E-ACTIVITIES, Venice, Italy, November 20-22, 2006 229 The Extent of Risk Management Practices in E-Government Projects NOOR HABIBAH ARSHAD, AZLINAH

More information

An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality

An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality An Empirical Assessment of the Impact of ERP Task-Technology Fit on Decision Quality Arun Madapusi Department of Decision Sciences LeBow College of Business Drexel University 204 Academic Building Philadelphia,

More information

Available online at ScienceDirect. Procedia CIRP 28 (2015 ) rd CIRP Global Web Conference

Available online at  ScienceDirect. Procedia CIRP 28 (2015 ) rd CIRP Global Web Conference Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 28 (2015 ) 179 184 3rd CIRP Global Web Conference Quantifying risk mitigation strategies for manufacturing and service delivery J.

More information

Gleim CIA Review Updates to Part Edition, 1st Printing June 2018

Gleim CIA Review Updates to Part Edition, 1st Printing June 2018 Page 1 of 15 Gleim CIA Review Updates to Part 1 2018 Edition, 1st Printing June 2018 Study Unit 3 Control Frameworks and Fraud Pages 66 through 69 and 76 through 77, Subunit 3.2: In accordance with the

More information

AN EMPIRICAL INVESTIGATION OF ELECTRONIC COMMERCE TECHNOLOGY IN CORPORATE USE

AN EMPIRICAL INVESTIGATION OF ELECTRONIC COMMERCE TECHNOLOGY IN CORPORATE USE AN EMPIRICAL INVESTIGATION OF ELECTRONIC COMMERCE TECHNOLOGY IN CORPORATE USE Dr. Suhong Li, Bryant College, sli@bryant.edu ABSTRACT This study investigates the usage of five electronic commerce (EC) technologies,

More information

PRACTICAL EXPERIENCES FROM RUNNING A LARGE SCADA/EMS/BMS PROJECT P FORSGREN

PRACTICAL EXPERIENCES FROM RUNNING A LARGE SCADA/EMS/BMS PROJECT P FORSGREN 21, rue d'artois, F-75008 Paris http://www.cigre.org D2-101 Session 2004 CIGRÉ PRACTICAL EXPERIENCES FROM RUNNING A LARGE SCADA/EMS/BMS PROJECT P FORSGREN J-O LUNDBERG * Royal Institute of Technology Svenska

More information

Understanding Model Representations and Levels: What Do They Mean?

Understanding Model Representations and Levels: What Do They Mean? Pittsburgh, PA 15213-3890 Understanding Model Representations and Levels: What Do They Mean? Mary Beth Chrissis Mike Konrad Sandy Shrum Sponsored by the U.S. Department of Defense 2004 by Carnegie Mellon

More information

An Integrative Model Linking Risk, Risk Management and Project Performance: Support from Indian Software Projects

An Integrative Model Linking Risk, Risk Management and Project Performance: Support from Indian Software Projects An Integrative Model Linking Risk, Risk Management and Project Performance: Support from Indian Software Projects Sam Thomas 1 and Bhasi Marath 2 1 School of Management Studies, Cochin University of Science

More information

HOW DO INDIAN SOFTWARE PROJECTS PERFORM? A CROSS SECTIONAL STUDY

HOW DO INDIAN SOFTWARE PROJECTS PERFORM? A CROSS SECTIONAL STUDY HOW DO INDIAN SOFTWARE PROJECTS PERFORM? A CROSS SECTIONAL STUDY Sam THOMAS School of Management Studies, Cochin University of Science and Technology, Cochin, Kerala, India 682022 sam8570@gmail.com M.

More information

Project Planning & Management. Lecture 11 Project Risk Management

Project Planning & Management. Lecture 11 Project Risk Management Lecture 11 Project Risk Management The Importance of Project Risk Management PMBOK definition of Project Risk An uncertain event or condition that, if it occurs, has a positive or negative effect on the

More information

VIEW POINT. Enhancing the Effectiveness of Rolling Forecasts. Abstract

VIEW POINT. Enhancing the Effectiveness of Rolling Forecasts. Abstract VIEW POINT Enhancing the Effectiveness of Rolling Forecasts Abstract An effective rolling forecast is important to estimate long term financial plans. Every organization undertakes this process as a finance

More information

Costing Logistics Services A. Hatzis 1, A. Koulidou 2, D. Folinas 3

Costing Logistics Services A. Hatzis 1, A. Koulidou 2, D. Folinas 3 Costing Logistics Services A. Hatzis 1, A. Koulidou 2, D. Folinas 3 1,2 Department of Accounting, Alexander Technological Educational Institute of Thessaloniki, Greece 3 Department of Logistics, Alexander

More information

Procedia - Social and Behavioral Sciences 147 ( 2014 ) ICININFO

Procedia - Social and Behavioral Sciences 147 ( 2014 ) ICININFO Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 147 ( 2014 ) 64 69 ICININFO The Benefit and Cost Factors of CMDB Implementations: An Investigation of three

More information

Biometrics Enterprise Architecture Systems Engineering Management Plan (BMEA SEMP)

Biometrics Enterprise Architecture Systems Engineering Management Plan (BMEA SEMP) Biometrics Enterprise Architecture Systems Engineering Management Plan (BMEA SEMP) Version 1.0 Prepared by: Date: November 24, 2009 Revision History Purpose Revision Date Level 11/17/2009 First Draft 1.0

More information

Application Research on the Project Management Method in the Development of Tianjin Vocational Training Package

Application Research on the Project Management Method in the Development of Tianjin Vocational Training Package 2017 2 nd International Conference on Sustainable Energy and Environment Protection (ICSEEP 2017) ISBN: 978-1-60595-464-6 Application Research on the Project Management Method in the Development of Tianjin

More information

One-of-a-Kind Production (OKP) planning & control: an empirical framework for the Special Purpose Machines Industry

One-of-a-Kind Production (OKP) planning & control: an empirical framework for the Special Purpose Machines Industry One-of-a-Kind Production (OKP) planning & control: an empirical framework for the Special Purpose Machines Industry Federico Adrodegari 1, Andrea Bacchetti 1, Alessandro Sicco 1, Fabiana Pirola 2, Roberto

More information

Creating a Sustainable PMO for Achieving Effective Business Results By Dennis L. Bolles, PMP DLB Associates, LLC

Creating a Sustainable PMO for Achieving Effective Business Results By Dennis L. Bolles, PMP DLB Associates, LLC Introduction Strategic and tactical planning are actions that the executive and senior management of an enterprise can take to assure the successful implementation of a sustainable PMO. Many enterprises

More information

CMMI for Large-Scale, System of Systems Projects

CMMI for Large-Scale, System of Systems Projects CMMI for Large-Scale, System of Systems Projects 9 th Annual CMMI Technology Conference and User Group National Defense Industrial Association (NDIA) Patrick J. McCusker patrickjmccusker@gmail.com November

More information

FY2001 Customer Satisfaction Survey Report

FY2001 Customer Satisfaction Survey Report FY2001 Customer Satisfaction Survey Report Prepared by: Proactive Customer Advocacy Program Marketing Team Marketing and Registration Division Directorate of User Services June 2001 Report Documentation

More information

RISK ASSESSMENT OF INTERNAL AUDIT OF PUBLIC ENTITY

RISK ASSESSMENT OF INTERNAL AUDIT OF PUBLIC ENTITY 97 RISK ASSESSMENT OF INTERNAL AUDIT OF PUBLIC ENTITY Ph.D. Inga BULAT National Institute for Economic Research of the Academy of Sciences of Moldova and Ministry of Economy, Republic of Moldova Email:

More information

Managing Information System Projects. Railway Staff College, Vadodara November 2011

Managing Information System Projects. Railway Staff College, Vadodara November 2011 Managing Information System Projects Railway Staff College, Vadodara November 2011 Importance of Project Management in IS 1995 survey in USA (Standish group Chaos survey 31% of IT projects cancelled before

More information

Application: All licensed institutions and supervisory personnel

Application: All licensed institutions and supervisory personnel Title: SR-1 Strategic Risk Management Date: FINAL Purpose: To set out the approach which the NBRM will adopt in the supervision of licensed institutions strategic risk, and to provide guidance to licensed

More information

Software Project & Risk Management Courses Offered by The Westfall Team

Software Project & Risk Management Courses Offered by The Westfall Team Software Project & Risk Management is a 5-day course designed to provide a knowledge base and practical skills for anyone interested in implementing or improving Software Project and Risk Management techniques

More information

Chapter 5 TOPVEC: A Critical Success Framework for COTS Based Software Development

Chapter 5 TOPVEC: A Critical Success Framework for COTS Based Software Development Chapter 5 TOPVEC: A Critical Success Framework for COTS Based Software Development CHAPTER 5 TOPVEC: A CRITICAL SUCCESS FRAMEWORK FOR COTS BASED SOFTWARE DEVELOPMENT The face of software industry is changing

More information

Summary of 47 project management processes (PMBOK Guide, 5 th edition, 2013)

Summary of 47 project management processes (PMBOK Guide, 5 th edition, 2013) Summary of 47 project management processes (PMBOK Guide, 5 th edition, 2013) Integration Management: processes & activities needed to properly coordinate all aspects of the project to meet stakeholder

More information

Capability Maturity Model the most extensively used model in the software establishments

Capability Maturity Model the most extensively used model in the software establishments International Journal of Scientific and Research Publications, Volume 6, Issue 5, May 2016 710 Capability Maturity Model the most extensively used model in the software establishments Ajith Sundaram Assistant

More information

Principles of Procurement for High- Technology Systems

Principles of Procurement for High- Technology Systems Principles of Procurement for High- Technology Systems The chances of success for the acquisition of a high-technology project, whether an elaborate traffic management system, a signal system, or the purchase

More information

International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.1, January 2012 RISK MANAGEMENT MEASURES IN CMMI.

International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.1, January 2012 RISK MANAGEMENT MEASURES IN CMMI. RISK MANAGEMENT MEASURES IN CMMI Mahmoud Khraiwesh Faculty of Science and Information Technology Zarqa University Zarqa Jordan mahmoud@pu.edu.jo ABSTRACT Risk management is a continuous process that could

More information

Protests of ) Date: November 23, 1992 ) STANDARD REGISTER; ) MOORE BUSINESS FORMS, INC. ) ) P.S. Protest No Solicitation No A-0002 )

Protests of ) Date: November 23, 1992 ) STANDARD REGISTER; ) MOORE BUSINESS FORMS, INC. ) ) P.S. Protest No Solicitation No A-0002 ) Protests of ) Date: November 23, 1992 ) STANDARD REGISTER; ) MOORE BUSINESS FORMS, INC. ) ) P.S. Protest No. 92-68 Solicitation No. 105603-92-A-0002 ) DECISION Standard Register ("Standard") and Moore

More information

ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING

ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING SOFTWARE DEVELOPMENT ESTIMATION STRATEGIES Manage risk and expectations within your organization with credible, defensible estimates. Learn how

More information

Managing Strategic Initiatives for Effective Strategy Execution

Managing Strategic Initiatives for Effective Strategy Execution Managing Strategic Initiatives for Effective Strategy Execution Process 1: Initiative Rationalization A Balanced Scorecard Collaborative White Paper September 2005 Introduction The proper management of

More information

Lecture 2: Project Management, Part 1: Requirements, WBS, Scheduling, and Risk Management. Prof. Shervin Shirmohammadi SITE, University of Ottawa

Lecture 2: Project Management, Part 1: Requirements, WBS, Scheduling, and Risk Management. Prof. Shervin Shirmohammadi SITE, University of Ottawa Lecture 2: Project Management, Part 1: Requirements, WBS, Scheduling, and Risk Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi ELG 4912 2-1 Goal of Project

More information

Project vs Operation. Project Constraints. Pankaj Sharma, Pankaj Sharma,

Project vs Operation. Project Constraints. Pankaj Sharma, Pankaj Sharma, Project vs Operation PROJECTS OPERATIONS Temporary Ongoing Unique Repetitive Closes after attaining the objectives Objective is to sustain business Prototyping the new car model Assembly line production

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies RESPONSIBILITY OF SOFTWARE PROJECT MANAGER Job responsibility Software project managers take the overall responsibility of project to success. The job responsibility of a project manager ranges from invisible

More information

FMEA Failure Mode Effects Analysis. ASQ/APICS Joint Meeting May 10, 2017

FMEA Failure Mode Effects Analysis. ASQ/APICS Joint Meeting May 10, 2017 FMEA Failure Mode Effects Analysis ASQ/APICS Joint Meeting May 10, 2017 FMEA (Failure Mode and Effects Analysis) Failure Mode and Effects Analysis Agenda What is it? Motivation FMEA Methods Examples What

More information

Chapter 5 RESULTS AND DISCUSSION

Chapter 5 RESULTS AND DISCUSSION Chapter 5 RESULTS AND DISCUSSION 5.0 Introduction This chapter outlines the results of the data analysis and discussion from the questionnaire survey. The detailed results are described in the following

More information

Build Trust in Survey Responses Sample Selection & Sample Size

Build Trust in Survey Responses Sample Selection & Sample Size Build Trust in Survey Responses Sample Selection & Sample Size Endeavor Management 2700 Post Oak Blvd. Suite 1400 Houston, Texas 77056 P + 713.877.8130 F + 713.877.1823 www.endeavormgmt.com Overview One

More information

Assessment of Extension of Time Claims in Hydropower Projects of Pakistan

Assessment of Extension of Time Claims in Hydropower Projects of Pakistan International Journal of Engineering and Advanced Technology (IJEAT) Assessment of Extension of Time Claims in Hydropower Projects of Pakistan Hashim Hanif, Yasar Saleem, Zuhaib Aslam Shahid, Abdullah

More information

Mission Success in Complex Environments (MSCE)

Mission Success in Complex Environments (MSCE) Mission Success in Complex Environments (MSCE) Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Mission Success in Complex Environments (MSCE) Project Part of the SEI Acquisition

More information

Risks management in software development capstone projects

Risks management in software development capstone projects Pekka Mäkiaho Faculty of Natural Sciences University of Tampere Tampere, Finland pekka.makiaho@uta.fi Timo Poranen Faculty of Natural Sciences University of Tampere Tampere, Finland timo.t.poranen@uta.fi

More information

Selecting a Standard Bidding Document for IT Procurement

Selecting a Standard Bidding Document for IT Procurement The World Bank Operational Policy and Country Services Vice Presidency Procurement Unit IT Procurement Guidance Note 8 Selecting a Standard Bidding Document for IT Procurement CONTENTS I. Background on

More information

REQUIREMENTS DOCUMENTATION

REQUIREMENTS DOCUMENTATION REQUIREMENTS DOCUMENTATION Project Title: Date Prepared: Stakeholder Requirement Category Priority Acceptance Criteria REQUIREMENTS DOCUMENTATION Project Title: Date Prepared: Stakeholder Requirement Category

More information

Case Study: Software Product Integration Practices

Case Study: Software Product Integration Practices Case Study: Software Product Integration Practices Stig Larsson 1, Ivica Crnkovic 2 1 ABB AB, Corporate Research, Västerås, Sweden 2 Mälardalen University, Department of Computer Engineering, Västerås,

More information

The Impact of Agile. Quantified.

The Impact of Agile. Quantified. The Impact of Agile. Quantified. Agile and lean are built on a foundation of continuous improvement: You need to inspect, learn from and adapt your performance to keep improving. Enhancing performance

More information

Factors Affecting Construction Cost in the Pakistani Construction Industry

Factors Affecting Construction Cost in the Pakistani Construction Industry Third International Conference on Construction in Developing Countries (ICCIDC III) Advancing Civil, Architectural and Construction Engineering & Management July 4-6, 2012, Bangkok, Thailand Factors Affecting

More information

Risk Management User Guide

Risk Management User Guide Risk Management User Guide Version 17 December 2017 Contents About This Guide... 5 Risk Overview... 5 Creating Projects for Risk Management... 5 Project Templates Overview... 5 Add a Project Template...

More information

Identifying Causality Relation between Software Projects Risk Factors

Identifying Causality Relation between Software Projects Risk Factors , pp.51-58 http://dx.doi.org/10.14257/ijseia.2014.8.2.06 Identifying Causality Relation between Software Projects Risk Factors Haneen Hijazi 1, Shihadeh Alqrainy 2, Hasan Muaidi 2 and Thair Khdour 2 1

More information

Managing Projects through a Corporate Repository

Managing Projects through a Corporate Repository Managing Projects through a Corporate Repository Rick Hefner, Ph.D. TRW rick.hefner@trw.com Abstract TRW s Project Review Online System (PROS) was created in late 1996 to automate the collection and analysis

More information

Development of an OO Energy Management System using the ami Approach

Development of an OO Energy Management System using the ami Approach H. Dobler, A. Mittelmann 3rd EAUG October 1st, 1996; Page 1 Development of an OO Energy Management System using the ami Approach Heinz Dobler CD Laboratory for Software Engineering Linz, Austria Tel: ++43

More information

Continuous Improvement Toolkit. Risk Analysis. Continuous Improvement Toolkit.

Continuous Improvement Toolkit. Risk Analysis. Continuous Improvement Toolkit. Continuous Improvement Toolkit Risk Analysis The Continuous Improvement Map Managing Risk FMEA Understanding Performance Check Sheets Data Collection PDPC RAID Log* Risk Analysis* Fault Tree Analysis Traffic

More information

Advantages and Disadvantages of. Independent Tests. Advantages. Disadvantages

Advantages and Disadvantages of. Independent Tests. Advantages. Disadvantages 8.0 Test Management Outline 8.1 Test organisation 8.2 Test planning and estimation 8.3 Test program monitoring and control 8.4 Configuration management 8.5 Risk and testing 8.6 Summary Independent Testing

More information

A Comprehensive Survey of Risk Sources and Categories

A Comprehensive Survey of Risk Sources and Categories 0 A Comprehensive Survey of Risk Sources and Categories NDIA 4th Annual CMMI Technology Conference & User Group November 17, 2004 Warren Scheinin Systems Engineer Northrop Grumman Corporation 1 Agenda

More information

Gartner Decision Tools for Vendor Selection

Gartner Decision Tools for Vendor Selection Gartner Decision Tools for Vendor Selection Ralph Witcher These materials can be reproduced only with Gartner s written approval. Such approvals must be requested via e-mail quote.requests@gartner.com.

More information

Shewhart, Deming, and Six Sigma

Shewhart, Deming, and Six Sigma Manuscript 248 Shewhart, Deming, and Six Sigma Since neither time nor space will allow me to cover all that the title above encompasses, I have chosen to focus on selected aspects of the work of Shewhart

More information

Performance Management, Balanced Scorecards and Business Intelligence: Alignment for Business Results

Performance Management, Balanced Scorecards and Business Intelligence: Alignment for Business Results Performance Management, Balanced Scorecards and Business Intelligence: Alignment for Business Results Introduction The concept of performance management 1 is not a new one, though modern management constructs

More information

A Taxonomy-Based Model for Identifying Risks

A Taxonomy-Based Model for Identifying Risks A Taxonomy-Based Model for Identifying Risks Sebastian Maniasi, Paola Britos and Ramón García-Martínez Global Software Group (GSG) Argentina Motorola Argentina Centro de Software Software & Knowledge Engineering

More information

Software Metrics & Software Metrology. Alain Abran. Chapter 14 Design of Standard Etalons: The Next Frontier in Software Measurement

Software Metrics & Software Metrology. Alain Abran. Chapter 14 Design of Standard Etalons: The Next Frontier in Software Measurement Software Metrics & Software Metrology Alain Abran Chapter 14 Design of Standard Etalons: The Next Frontier in Software Measurement 1 Agenda This chapter covers: An introduction to the concepts of measurement

More information

Integration Knowledge Area

Integration Knowledge Area Integration Knowledge Area Develop Project Charter Project statement of work Expert judgment Project charter Business case Contract (if third party project) EEF: government/industry standards, organizational

More information

Attributes of Success

Attributes of Success EDM/PDM IMPLEMENTATION Glen B. Alleman Principal Consultant Glen B. Alleman Principal Consultant Kalthoff Kalthoff User User Forum Forum Spring Spring 98 98 Wednesday, March 25, 1998 Wednesday, March 25,

More information

ERP Reference models and module implementation

ERP Reference models and module implementation ERP Reference models and module implementation Based on Supporting the module sequencing decision in the ERP implementation process An application of the ANP method, Petri Hallikainen, Hannu Kivijärvi

More information

Initiation Group Process. Planning Group Process

Initiation Group Process. Planning Group Process Initiation Group Process Develop Project Charter Project statement of work Expert judgment Project charter Business case Contract (if third party project) EEF: government/industry standards, organizational

More information

OPERATIONAL RISK EXAMINATION TECHNIQUES

OPERATIONAL RISK EXAMINATION TECHNIQUES OPERATIONAL RISK EXAMINATION TECHNIQUES 1 OVERVIEW Examination Planning Oversight Policies, Procedures, and Limits Measurement, Monitoring, and MIS Internal Controls and Audit 2 Risk Assessment: Develop

More information

Business-to-Business E-Commerce: A Study of Greater Chinese and U.S. Electronics and Apparel/Textile Firms

Business-to-Business E-Commerce: A Study of Greater Chinese and U.S. Electronics and Apparel/Textile Firms Business-to-Business E-Commerce: A Study of Greater Chinese and U.S. Electronics and Apparel/Textile Firms By Sherry M.B. Thatcher, Ph.D. Assistant Professor of Management Information Systems The Eller

More information

A CASE STUDY ON THE CHALLENGES AND TASKS OF MOVING TO A HIGHER CMMI LEVEL

A CASE STUDY ON THE CHALLENGES AND TASKS OF MOVING TO A HIGHER CMMI LEVEL Journal of Information Technology ISSN #1042-1319 A Publication of the Association of A CASE STUDY ON THE CHALLENGES AND TASKS OF MOVING TO A HIGHER CMMI LEVEL DAN TURK COLORADO STATE UNIVERSITY Dan.Turk@Colostate.Edu

More information

INF 3121 Software Testing - Lecture 05. Test Management

INF 3121 Software Testing - Lecture 05. Test Management INF 3121 Software Testing - Lecture 05 Test Management 1. Test organization (20 min) (25 min) (15 min) (10 min) (10 min) (10 min) INF3121 / 23.02.2016 / Raluca Florea 1 1. Test organization (20 min) LO:

More information

Static Code Analysis A Systematic Literature Review and an Industrial Survey

Static Code Analysis A Systematic Literature Review and an Industrial Survey Thesis no: MSSE-2016-09 Static Code Analysis A Systematic Literature Review and an Industrial Survey Islam Elkhalifa & Bilal Ilyas Faculty of Computing Blekinge Institute of Technology SE 371 79 Karlskrona,

More information

Hybrid Effort Estimation of Changes in Agile Software Development

Hybrid Effort Estimation of Changes in Agile Software Development Hybrid Effort Estimation of Changes in Agile Software Development Binish Tanveer (B) Fraunhofer Institute for Experimental Software Engineering, Fraunhofer Platz-1, 67663 Kaiserslautern, Germany binish.tanveer@iese.fraunhofer.de

More information

How can you select commercial offthe-shelf

How can you select commercial offthe-shelf How can you select commercial offthe-shelf (COTS) software from a market of more than 50 available options? Which option has the best value for your project s features? Should you believe everything the

More information

Proposing an Improved Risk Assessment Model: A Case Study in Saba Tower

Proposing an Improved Risk Assessment Model: A Case Study in Saba Tower Proposing an Improved Risk Assessment Model: A Case Study in Saba Tower Mehraneh Davari, Siamak Haji Yakhchali, and Sirous Shojaie Abstract Effectively managing risk is an essential element of successful

More information

Proposing an Improved Risk Assessment Model: A Case Study in Saba tower

Proposing an Improved Risk Assessment Model: A Case Study in Saba tower Proposing an Improved Risk Assessment Model: A Case Study in Saba tower Mehraneh Davari, Siamak Haji Yakhchali and Sirous Shojaie Abstract Effectively managing risk is an essential element of successful

More information

TSP Performance and Capability Evaluation (PACE): Customer Guide

TSP Performance and Capability Evaluation (PACE): Customer Guide Carnegie Mellon University Research Showcase @ CMU Software Engineering Institute 9-2013 TSP Performance and Capability Evaluation (PACE): Customer Guide William R. Nichols Carnegie Mellon University,

More information

Models in Engineering Glossary

Models in Engineering Glossary Models in Engineering Glossary Anchoring bias is the tendency to use an initial piece of information to make subsequent judgments. Once an anchor is set, there is a bias toward interpreting other information

More information

TIPS PREPARING AN EVALUATION STATEMENT OF WORK ABOUT TIPS

TIPS PREPARING AN EVALUATION STATEMENT OF WORK ABOUT TIPS NUMBER 3 2 ND EDITION, 2010 PERFORMANCE MONITORING & EVALUATION TIPS PREPARING AN EVALUATION STATEMENT OF WORK ABOUT TIPS These TIPS provide practical advice and suggestions to USAID managers on issues

More information

SCORECARDS FOR RISK MANAGEMENT IN TECHNICAL PROCESSES

SCORECARDS FOR RISK MANAGEMENT IN TECHNICAL PROCESSES 2 SCORECARDS FOR RISK MANAGEMENT IN TECHNICAL PROCESSES Product and Technology Portfolio Definition Research and Technology Development Strategic Inbound R&TD and Design Engineering Post-Launch Production

More information

RISK MANAGEMENT STEPS Lecture 2

RISK MANAGEMENT STEPS Lecture 2 RISK MANAGEMENT STEPS Lecture 2 1 RISK MANAGEMENT STEPS Identification Updating Assessment Analysis Mitigation 2 RISK IDENTIFICATION Risk identification is a critical phase The result of this phase will

More information

REQUIREMENTS MANAGEMENT USING POSITIONING REQUIREMENTS IN ENTERPRISE SYSTEM PROJECTS

REQUIREMENTS MANAGEMENT USING POSITIONING REQUIREMENTS IN ENTERPRISE SYSTEM PROJECTS REQUIREMENTS MANAGEMENT USING POSITIONING REQUIREMENTS IN ENTERPRISE SYSTEM PROJECTS Clotilde Rohleder, University of Paris 1 Pantheon Sorbonne, Centre de Recherche en Informatique, clotilde.rohleder@ugs.com

More information

ITIL Intermediate Lifecycle Stream:

ITIL Intermediate Lifecycle Stream: ITIL Intermediate Lifecycle Stream: SERVICE STRATEGY CERTIFICATE Sample Paper 2, version 6.1 Gradient Style, Complex Multiple Choice SCENARIO BOOKLET Instructions This booklet contains the scenarios upon

More information

Applying PSM to Enterprise Measurement

Applying PSM to Enterprise Measurement Applying PSM to Enterprise Measurement Technical Report Prepared for U.S. Army TACOM by David Card and Robert MacIver Software Productivity Consortium March 2003 SOFTWARE PRODUCTIVITY CONSORTIUM Applying

More information

Project Management Auditing Guide

Project Management Auditing Guide Project Management Auditing Guide Index Page 1.0 Objective 4 2.0 Risks 4 3.0 Safeguards and Controls 3.1.Project Characteristics 4 3.2.Quality in Project Management Process 4 3.3.Strategic Processes 5

More information

Risk and Opportunity Management - Overview

Risk and Opportunity Management - Overview Risk and Opportunity Management - Overview Webinar Learning Objectives At the end of this Webinar, you will: Understand the 5 step Risk and Opportunity Management (R&OM) process Recognize R&OM as a tool

More information

A Systems Approach to Risk Management Through Leading Indicators

A Systems Approach to Risk Management Through Leading Indicators A Systems Approach to Risk Management Through Leading Indicators Nancy Leveson MIT Goal To identify potential for an accident before it occurs Underlying assumption: Major accidents not due to a unique

More information

Construction Experts Perception on the Causes and Effects of Cost Overruns in Johannesburg, Gauteng Province, South Africa

Construction Experts Perception on the Causes and Effects of Cost Overruns in Johannesburg, Gauteng Province, South Africa Construction Experts Perception on the Causes and Effects of Cost Overruns in Johannesburg, Gauteng Province, South Africa Abstract Mukuka MJ 1, Clinton Aigbavboa 2, and Wellington Thwala 3 The construction

More information

Chapter 02. Organization Strategy and Project Selection. Multiple Choice Questions

Chapter 02. Organization Strategy and Project Selection. Multiple Choice Questions Chapter 02 Organization Strategy and Project Selection Multiple Choice Questions 1. Which of the following is NOT true about an organization's strategy? A. Strategy determines how an organization will

More information

Knowledge structure maps based on Multiple Domain Matrices

Knowledge structure maps based on Multiple Domain Matrices InImpact: The Journal of Innovation Impact : ISSN 2051-6002 : http://inimpact.innovationkt.org Special Edition on Innovation through Knowledge Transfer : Vol. 5 No.1 : pp.5-16 : inkt13-002 Knowledge structure

More information

Department of Defense Independent Technical Risk Assessment Framework for Risk Categorization

Department of Defense Independent Technical Risk Assessment Framework for Risk Categorization Department of Defense Independent Technical Risk Assessment Framework for Risk Categorization June 08 Office of the Under Secretary of Defense Research and Engineering Washington, D.C. Department of Defense

More information

Adapting the Approach of Management by Projects in the Manufacturing Industry: A Conceptual Framework

Adapting the Approach of Management by Projects in the Manufacturing Industry: A Conceptual Framework Adapting the Approach of Management by Projects in the Manufacturing Industry: A Conceptual Framework Dr. Romil S. Al-Adwan Assistant Professor Department of Mechanical & Industrial Engineering, Applied

More information

AGENCY FOR STATE TECHNOLOGY

AGENCY FOR STATE TECHNOLOGY AGENCY FOR STATE TECHNOLOGY PROJECT RISK & COMPLEXITY ASSESSMENT TOOL Risk & Complexity Assessment Model for State Information Technology Projects Purpose: In order to determine the level of risk associated

More information

CORROSION PROJECT INSTRUCTIONS

CORROSION PROJECT INSTRUCTIONS CORROSION PROJECT INSTRUCTIONS This document includes three sections: instructions for project plan submission, instructions for final project report submission and instructions for two year follow-on

More information