Information systems development for healthcare in Africa: The INDEHELA-Methods project

Size: px
Start display at page:

Download "Information systems development for healthcare in Africa: The INDEHELA-Methods project"

Transcription

1 Paper to be presented in the 3rd International Working Conference on Health Informatics in Africa, HELINA 99, 29 November 1 December 1999, Harare, Zimbabwe. Submitted on 10 October Information systems development for healthcare in Africa: The INDEHELA-Methods project Abstract H. Abimbola Soriyan, Obafemi Awolowo University, Nigeria Mikko J. Korpela, University of Kuopio, Finland Anja S. Mursu, University of Jyväskylä, Finland Kimba Kailou, Obafemi Awolowo University, Nigeria Karen C. Olufokunbi, Obafemi Awolowo University, Nigeria Appropriate software packages for African hospitals and health centres cannot be found off the shelf they must be developed locally. To be properly equipped to provide healthcare institutions in Africa with appropriate information systems, local systems developers need Information Systems Development (ISD) methods and education that is adjusted to the socio-economic and technological context in question. The INDEHELA-Methods project (Methods for Informatics Development for Health in Africa) by the Obafemi Awolowo University, Nigeria, and University of Kuopio, Finland, is to develop in such a Made-in-Nigeria ISD methodology. The research design has three inputs: (1) literature review of relevant ISD methodologies globally; (2) theoretical analysis of the special requirements in Africa and Nigeria; (3) a survey about the existing practice and problems among Nigerian software companies. The inputs are merged together to an adapted methodology which will be tested and further developed in an action research manner. Resulting from the research so far, a methodology Made in Nigeria for Nigeria should be a portfolio of methods addressing the following issues:- 1. Project planning and management 2. Requirements analysis 3. Risk analysis, planning for sustainability and ensuring a positive socio-economic impact 4. Grand design (designing the main functionality of an information system) 5. Technical implementation 6. Organisational implementation (putting IT into use) 7. Long-term support This paper summarises the first outline of the ISD methodology resulting from the project. 1. Background The need for an African Information Society has been widely recognised in recent years by development agencies and governments alike. In pragmatic terms this high-flying slogan means that Information Technology (IT) is now seen as one of the key ingredients in accelerating socio-economic development and in narrowing the gap between Africa and the industrialised countries. Since healthcare is one of the highest-priority sectors for socio-economic development, this implies that the effectiveness and efficiency of African healthcare institutions, too, should be enhanced by introducing appropriate healthcare information systems. However, appropriate software packages for

2 Soriyan et al., Information Systems Development for Health in Africa 2 African hospitals and health centres cannot be found off the shelf. The requirements are too different for an African hospital to be able to benefit from an American or European hospital application without major adjustment, and the situation is even more problematic in primary healthcare. Appropriate information systems for African healthcare must thus be developed locally, even if a foreign package can be used as a starting point (cf. Heeks, 1999 a). However, to be properly equipped to provide healthcare institutions in Africa with appropriate information systems, local systems developers need Information Systems Development (ISD) methods and education that is adjusted to the socioeconomic and technological context in question (Avgerou, 1996; Waema, 1996). A distinction must be made between a software product (application package) and an information system (IS). The latter refers to the information processing activities in an organisation which may or may not be facilitated by modern information technology i.e., an IS is a social system including some technological elements, IT in use. A respective distinction must be made between Software Engineering which deals with the technical construction of software products, and ISD which deals with how to serve organisational purposes by means of software products. During the system lifecycle, the emphasis between ISD (the white parts in Figure 1) and Software Engineering (the grey parts in Figure 1) varies. If organisational purposes can be served by pre-existing software products, ISD can proceed from requirements analysis directly to putting IT into use, but usually some technical implementation work is needed as well. (Korpela et al., forthcoming c) IT in use: maintenance, assessment Early design phase : problem identification, needs analysis, requirements analysis, grand design Late design phase : procurement, deployment, integration, adaptation, introduction, training Software Engineering: Technical construction of software products Figure 1: ISD and Software Engineering in the system lifecycle (Korpela et al., forthcoming c). The more technical tasks in the system lifecycle tend to be more universal between socio-economic and cultural contexts, while the more social tasks of course tend to be effected more by the specific organisational, cultural, infrastructural, economic and political setting in which ISD takes place (Korpela et al., forthcoming a). When searching for ISD methods and education adjusted to the needs of African systems developers, the emphasis must thus be on the most social parts of the work, while C programming is C programming everywhere. 2. Objective The Department of Computer Science and Engineering of the Obafemi Awolowo University, Ile-Ife, Nigeria, and the Computing Centre of the University of Kuopio, Finland, established the INDEHELA- -Methods project (Methods for Informatics Development for Health in Africa) to develop a Made-in- Nigeria ISD methodology for Nigerian systems practitioners, with special emphasis on the requirements of the healthcare sector. The project started in 1998 and is intended to finish by the end

3 Soriyan et al., Information Systems Development for Health in Africa 3 of The resulting ISD methods, techniques, work practices and educational materials should comply with the following criteria.?? The methods must address the actual day-to-day needs of Nigerian systems developers; i.e., the methodological development must not be based on what the researchers think that the practitioners need, but on what the practitioners themselves see as areas of improvement.?? The methods must incorporate the latest results of the international ISD research, to the extent that the findings and recommendations generated in industrialised countries are found relevant or can be adjusted to the requirements of Nigerian systems practitioners. In other words, Made-in-Nigeria ISD methods does not mean second-class or second-hand methods, but the best methods for the specific task in question ISD in Nigeria.?? The methods must pay special attention to issues which are more pronounced in the severely constrained context of Nigerian healthcare than in the more affluent societies for which the existing ISD methodologies are tailored. Such issues may include the sustainability and affordability of the resulting information systems; the socio-economic justification of the resulting systems, which in healthcare means that the systems must have a positive impact on public health; community involvement in primary healthcare information systems design; and so on.?? Although emphasis must be on the more social parts of the system lifecycle, the methodological portfolio must include a sample Rapid Application Development (RAD) toolkit for the efficient technical implementation of the required software products.?? The methods and techniques must not remain theoretical recommendations by researchers, but be tested in practical systems development in healthcare.?? The methods and techniques must be documented as Lecture Notes and technical manuals, so that they can be adopted into university education and on-the-job training of computer professionals in Nigeria, and adapted and adjusted by colleagues in other African countries if found practicable. 3. Research methodology Since there is no prior empirical research on how ISD is practised in Nigeria and what are the problems perceived by the practitioners, the study must proceed from an interpretative, knowledgebuilding research approach to a constructive one (Orlikowski and Baroudi, 1991; Järvinen, 1999). Correspondingly, the research design has three inputs followed by a constructive phase (Figure 2; Korpela et al., forthcoming a): Literature review of relevant methods, techniques and practices (globally) Theoretical analysis of special requirements in Nigeria and Africa Survey and case studies of the existing practice and problems in Nigeria Made-in-Nigeria systems development methodology Action research = experimentation in host projects Diffusion of results to practitioners in Nigeria and Africa Figure 2: The overall research design (Korpela et al., forthcoming a). (1) Relevant ISD methods, techniques and practices developed in other countries must be identified

4 Soriyan et al., Information Systems Development for Health in Africa 4 through a literature review. Relevant methods can also be found in related other fields in addition to ISD for instance, in work research, organisational studies, primary healthcare projects, international development projects, etc. Empirical studies on ISD practice in other countries, although regrettably rare, must be studied to acquire guidance concerning the research methodology (e.g., Kensing et al., 1998). (2) Theoretical analysis must be applied on identifying areas where the requirements for and constraints of ISD in Nigeria and in Africa in general may differ significantly from those of the industrialised countries. The development of adjusted ISD methods and techniques can then be focused mainly on these areas. (3) An overall view of the existing practice and problems in ISD in Nigeria can be achieved through an interview survey among Nigerian software companies. The overall view must be supplemented by descriptive in-depth case studies in a few companies and projects. (4) The three inputs are merged together to an adapted methodology, a portfolio of methods and techniques. Initially the methodology will be just a prototype which must be tested and further developed through action research (Avison et al., 1999) in one or two real life host projects. The most accessible testing ground for the emerging methodology will be the MINPHIS (Made-in- Nigeria Primary Healthcare and Hospital Information System) project of the same universities, presented in other HELINA 99 papers. The methodology will also be tested in Systems Analysis courses and final year projects of Computer Science students in the university. Later on the methodology should be tested in a software company by systems practitioners, and further developed again according to the feedback received. Main research questions: Risk factors? Software development project IT company or department Methods, techniques, practices? Information system development IT user organisation Sustainability? Information technology in use Impact? IT users clients Impact on: Society Organisations Individuals

5 Soriyan et al., Information Systems Development for Health in Africa 5 Figure 3: The research questions in the survey and the case studies (Mursu et al., 1999). By mid-1999 we have conducted the first part of the survey interviews among 36 software project managers in eleven software companies, which can be regarded as a representative sample of the industry since only a minority of the computer companies have software and IS development activities. The first part of the survey deals narrowly with risk factors in software projects (Figure 3; Mursu et al., 1999), while the next parts will expand the scope to ISD practice in the broader sense, the sustainability of IT-in-use in user organisations, and the socio-economic impact of the information systems developed. The survey is complemented by in-depth interviews in three different software companies starting from November Results Initial results from the literature review and the theoretical parts (Korpela et al., forthcoming a; Mursu et al., forthcoming), methodological issues and first results of the survey (Mursu et al., 1999; Korpela et al., forthcoming c), as well as the results of two exploratory action research experiments (Korpela et al., 1998; Korpela et al., forthcoming b) have been published in more detail elsewhere. In this paper we summarise the findings so far into a first outline of the ISD methodology which should result from the project. The outline is not yet an empirically proved end result of the study, but a theoretically and empirically informed report on which issues we currently consider to be required in the methodology. The purpose of the outcome is thus to start an iterative process in which ISD researchers and practitioners in Nigeria, in other African countries and globally can comment on the preliminary results and help us improve them in the future phases. Resulting from the research so far, we think that a methodology Made in Nigeria for Nigeria should be a portfolio of methods addressing the following issues:- 1. Project planning and management 2. Requirements analysis 3. Risk analysis, planning for sustainability and ensuring a positive socio-economic impact 4. Grand design (designing the main functionality of an information system) 5. Technical implementation 6. Organisational implementation (putting IT into use) 7. Long-term support Requirements analysis and risk analysis are the areas in which we have been able to conduct some more profound work so far. In the rest of this section, we will elaborate on these two areas and discuss the other areas more briefly. 4.1 Project planning and management methods In empirical studies, project planning and management has repeatedly been found one of the most important subtasks of ISD work, and one which is not given respective emphasis during the university education of systems developers (e.g., Kensing et al., 1998). The first results of our survey, although not conclusive, suggest that Nigeria is no exception. However, project planning and management is a prime example of a research topic which cannot be

6 Soriyan et al., Information Systems Development for Health in Africa 6 studied in depth by surveys. Statistics on responses to questions of the type How much problem there is with project management in your company (1=very little, 5=very much)? How relevant is the project management education you received during your formal education (1=highly irrelevant, 5=highly relevant? can indicate whether this is a high-priority issue or not. However, to find out what kind of problems there are and whether they are specific to the Nigerian context or not, we need to proceed to more in-depth case studies of actual projects. The methodological portfolio of Nigerian systems developers must no doubt contain some principles, tried practices and techniques of project planning and management. The bulk of them can probably be adopted from western literature. It requires further empirical research to decide if there is a major need for local adaptation or for some additions which have not been sufficiently covered by western literature. 4.2 Methods for requirements analysis Requirements analysis refers to the earliest part of systems development, when the need for systematic information processing and possibly for IT also is studied and assessed. If a need is identified and an IT-based solution found feasible, requirements analysis leads into more or less formal specifications of what kind of hardware and software needs to be purchased or developed to facilitate the need. Although requirements analysis is generally the first action to be taken in an ISD undertaking, it is often necessary to return to re-analysing the requirements again when something changes or some new understanding emerges during ISD. Requirements analysis is a fuzzy task and varies highly according to the setting. When the objective is to develop packaged software for global mass markets, requirements analysis can be quite tedious and its outcome can be quite formal and technical specifications. However, in small and heterogeneous markets typical in Nigeria, systems developers should be able to quickly and flexibly grasp the peculiar stakeholders, objectives, possibilities and constraints etc. in each new setting. Furthermore, the customers in Nigeria are on average relatively less knowledgeable about IT and its potential than in industrialised countries. Early on during the project we therefore started to search for quick and flexible but scientifically sound techniques for systems developers to grasp new work settings. Through literature survey we identified a work development methodology based on Activity Theory, and modified it further to suit our needs. In May 1998 we conducted a small experiment in using Activity Analysis and Development in studying the needs for a primary healthcare information system in a teaching health centre in Ile-Ife, Nigeria. The theoretical basis and the experiment are presented in more detail elsewhere (Korpela et al., forthcoming b). The experiment was highly encouraging and we are including a further modified version of activity analysis as an early requirements analysis technique in our portfolio. Basically, in activity analysis the system developer first tries to identify the collective work activity which the new information system is to directly facilitate (e.g., keeping medical records in a health centre). Then he or she helps representatives of that activity (medical records officers) identify the outcome, process, actors, means, and other main elements of that activity, using a checklist which can be presented as a graphic model. Figure 4 presents an abstract version of the model in practice the model should better be illustrated by replacing circles and boxes by pictures of real people, tools, etc. (Korpela, 1999 b)

7 Soriyan et al., Information Systems Development for Health in Africa 7 Mode of operation Collective actor: group or team Means of coordination and communication: division of work, rules, etc. Actors, subjects Means of work, instruments, facilities Work process: Object Outcome Elements of a work activity Figure 4: The elements of a collective work activity (Korpela et al., forthcoming b). The scope of the analysis is then enlarged by studying for whom are the outcomes of the central activity intended (e.g., to doctors, to managers) and for what kind of an activity by those people. These people should also be involved in the analysis to some extent. Likewise, it is analysed who produces and in what kind of activities the tools, objects, actors, rules, etc. required in the central activity. Another checklist is used in identifying these networks of supporting and supported activities, presented in an abstract form in Figure 5. Besides the activities, it is useful to identify which organisational boundaries exist between them. (Korpela, 1999 b) In the final step, the system developer and the actors of the activities to be facilitated (the would-be users as well as indirect beneficiaries ) move from analysis to activity development by asking where in the central activity or in the network pieces do not fit together well i.e., where there is need for improvement. A historical perspective and the future workshop technique can be used. During this step the participants can identify the need for some new information processing or technology, but also the need for some educational intervention, organisational change, or the like. (Korpela, 1999 b)

8 Soriyan et al., Information Systems Development for Health in Africa 8 Producing or supporting activities > > Supported or object activities Organisation under a common management Management activity Rules, etc. Actors Means Object Outcome Figure 5: Activity networks as an abstract model (Korpela et al., forthcoming b). Requirements analysis in the sense used here results in a vision of the future which is shared by all the stakeholders a common roadmap and an outline of the technical and non-technical tasks ahead, not a detailed specification of a software product yet. It was indicated above that not only the direct users of the would-be system are to be involved, but the indirect beneficiaries also i.e., the users clients who are supposed to be better served by the users when the latter have the new system. In healthcare this ultimately means the communities served by the healthcare facilities in question. Therefore we arranged another exploratory experiment in July 1996 in community involvement in requirements analysis for primary healthcare information management (Korpela et al., 1998). Without going into the details we stress that it is possible, important and highly useful, but not an unproblematic task, to involve representatives of local communities in the design process. 4.3 Methods for risk analysis, sustainability and a positive socio-economic impact Information system development is a complex and difficult task to manage. Many times software projects end in failure (Keil et al., 1998) or the delivered technical system does not have a significant positive impact on the performance of the organisation, or the equipment is under-utilised or even abandoned (Odedra, 1992). Risk management has been found to be an important part of the success of the system development process. Most analyses of software disaster projects have indicated that if the high-risk elements had been identified and resolved in time, the problems would have been avoided or considerably reduced (Boehm, 1989; Charette, 1989; Ropponen et al., 1997). Software project risk can be defined

9 Soriyan et al., Information Systems Development for Health in Africa 9 according to Barki et al. (1993) as a project uncertainty associated with the magnitude of potential loss due to a project failure. In western literature, failures in system development usually refer to cost overruns, project delays, and unmet user needs in software production projects (Barki et al., 1993). However, in Africa the understanding of success or failure in ISD has a broader meaning (Waema, 1996), and the scope of risk analysis should be expanded from software projects only to information systems that is IT in use in a wider and longer-term perspective. The magnitude of constraints in Africa makes the sustainability of information systems a major issue. Besides software project risk factors, the emphasis in system development should be in factors that promote useful, sustainable applications and in such risk factors that threaten the long-term usability of IT. Risk Category Source of Risk, Nature of Risk 0. Socio-Economic Context Broader Context: Condition of the political environment 1. Corporate Environment Immediate Environment: Changes in the business environment or poor alignment of the system with the organisational culture. 2. Sponsorship/Ownership Mandate: Lack of mandate for the project manager to execute the project plan. Lack of trust or poor relationships with the owners of the system. 3. Relationship Management User Relationships : Lack of trust and inadequate user involvement. Unclear roles and expectations among users or other stakeholders. 4. Project Management Management: Poor or inefficient management strategy and execution. 5. Scope System Scope: Unclear, changing or partial understanding of the system scope and mission. 6. Requirements Requirements: Inadequate or poor management of system requirements; poor validation of system requirements. 7. Funding Resource management: Too little or badly estimated resources for system development. 8. Scheduling Resource control: Poor management of resource consumption and needs. Poor timing. 9. Development Process Process: Inappropriate or lacking process approach. 10. Personnel Skills: Inadequate personnel skills in development and process management. 11. Staffing Staffing: Changes in personnel or staffing levels, unavailability of key personnel resources. 12. Technology Technology: Inadequate understanding of the chosen technology. 13. External Dependencies Development environment: Poor management or control over dependencies with external agents. 14. Planning Planning: No interest or inadequate skills to plan the project. Table 1: Risk categories. In order to manage risks in the system development process, one has to know the pertinent risk factors. One popular and easy method for identifying risk factors is the use of checklists. The first phase of our Delphi study among Nigerian software experts resulted in a list of risk factors including 72 items, combining factors identified by experts from Nigeria, Hong Kong, the United States and Finland. It is

10 Soriyan et al., Information Systems Development for Health in Africa 10 an up-to-date checklist that can be used in software project management when assessing project risks. However, this kind of a list is never complete and it can be too cumbersome and complicated to be used in practice because of its size (Schmidt et al., 1997). So the list has been categorised into a more manageable size of 15 risk categories (Table 1) modified from Schmidt et al. (1997). One useful and even more simple categorisation of risks is presented in Figure 6 (Keil et al., 1998). This categorisation is based on studies conducted in Hong Kong, the United States and Finland the picture may change in Nigeria when Nigerian experts will assess the relative importance of risk factors in the future phases of our Delphi study. Anyway, the categories are useful when assessing possible risks in software development projects. Perceived Relative Importance of Risk High Moderate 1 Customer Mandate 4 Environment 2 Scope and Requirements 3 Execution Low High Perceived Level of Control Figure 6: A risk categorisation framework. Quadrant 1 (Customer Mandate) includes the commitment of both senior management and those who will actually use the system. This category requires risk mitigation strategies that create and maintain good relationships with customers and promote customer commitment to project. The risks in this quadrant cannot be fully controlled by a project manager but can be influenced by him or her. (Keil et al., 1998) Quadrant 2 (Scope and Requirements) includes risks involved with the ambiguities and uncertainties that arise in establishing the project s scope and requirements. Risk mitigation strategies in this quadrant should emphasise the management of ambiguity and change. These risks should be controlled by a project manager. (Keil et al., 1998) Quadrant 3 (Execution) concerns the risk factors in the actual execution of the project. The risk mitigation strategy in this area should emphasise internal evaluations coupled with external reviews to keep a project on track. Project managers must follow an established development methodology and proactively anticipate and respond to events that can threaten the development process. (Keil et al., 1998) Quadrant 4 (Environment) means the project environment, both inside and outside the organisation. Usually a project manager has little or no control over these risks, which can however be significant and dangerous. Contingency planning is one sensible strategy for dealing with environmental risks (Keil et al., 1998). In Nigeria, the importance of this category is much higher than in industrialised countries. Methods for risk analysis are quite easy to find and apply. To find or create methods for assuring the

11 Soriyan et al., Information Systems Development for Health in Africa 11 sustainability of IT is more challenging. Currently we don t yet have a checklist of sustainability factors which could be used in assessing the system development process. From the health sector, however, we have found a sustainability analysis method (Reynolds and Stinson, 1993) which is modified into the steps in Table 2 for our purposes. The method has not been tested in any ISD project, so the suitability of this model is still hypothetical. Step 1. Introduction: Who are the users, what is the purpose of the application, what is the scope, what is the level of demand for the technology Step 2. Sustainability objectives: What are the desired outcomes, what are the services, what are the required resources to keep the application in action, what is the appropriateness of the technology to the application environment (cost-effectiveness, affordability, suitability) Step 3. Analyse factors: Factors that could be threats to sustainability of application. Work out a strategy for dealing with each threat. What are the financial implications? The factors include: 1. Target population size (meaning clients and clients clients), composition, and distribution; 2. Target group knowledge, attitudes, practises (users); 3. Service quality; 4. Management support; 5. Organisational capacity; 6. Political commitment; 7. Personnel resources; 8. Programme revenues; 9. Programme expenditures; 10. Environment Step 4. Strategic assessment: Strategic responses to threats and opportunities of each factor. Neutralise threats, take advantages of opportunities. Step 5. Strategy, action plan: Summarise strategy, action plan. Step 6. Financial assessment: Take budget -> do What-If-Analysis -> Adjusted projections -> summarise to the strategy Table 2: A sustainability analysis framework adapted from the health sector. The activity network analysis mentioned under requirements analysis methods fits well with step 2 of Table 2. We intend to now combine these two approaches into a sustainability analysis and design checklist for systems developers, and test the checklist in our action research cases. The involvement of all relevant stakeholders identified through activity network analysis including management and local communities in the healthcare sector provides some assurance that the wouldbe system will have a positive socio-economic impact on those to be served. In turn, if all the stakeholders perceive the system as beneficial and important to them, they will support the system in the long term and thus contribute to its sustainability (Korpela et al., 1998). The impact of IT is difficult to analyse, however (Heeks, 1999 b), and more research is needed on this aspect. It is also very important to safeguard against unintended negative socio-economic impacts, which usually accumulate on the less privileged and less powerful of the stakeholders. To study this issue and to develop practicable methods to manage it, we are focusing on the gender-related impact of IS development and IS use that is, we study if and how the ISD practices and methods have a different impact on male developers, users and clients compared to female developers, users and clients. The ultimate objective is to ensure that ISD methods and education make ISD practitioners aware of the possibility of gender-related impacts, so that for instance potential negative socio-economic impacts of

12 Soriyan et al., Information Systems Development for Health in Africa 12 certain project management methods on female developers are identified and corrected. The affordability of the would-be system is another issue which should receive proper attention already during the requirements analysis phase that is, in outlining the vision of the future, the stakeholders should also consider if they can afford the intended system in the short and long terms. The analytical procedure should guide the stakeholders into searching for the more affordable alternatives. More research and experimentation is needed on this issue as well. 4.4 Grand design methods If the roadmap provided by requirements analysis indicates that it is necessary to develop a new software application, the next step is to move on to draft an outline of the functionality to be included in the application. We call it the grand design. The objective of the grand design is to bridge the gap between the utility-oriented rough vision produced by requirements analysis and the implementationoriented precise specifications needed for programming. In large-scale software engineering today, the Universal Modelling Language (UML) has become the standard notation for specifying software systems, at least in theory (Jacobson, 1994). In the small projects and severely constrained design settings typical in Nigeria, the bulk of UML seems unnecessarily tedious and detailed. However, the use case modelling technique of UML appears appropriate for drafting the functionality in the grand design. Theoretically, we argue that use case modelling deals with the individual actions (Figure 7) that are parts of the collective activity (Figure 3). That is, each use case defines one subtask needed in achieving the outcome of the overall activity, performed by (usually) one actor using some subset of the technological system (usually a few forms, prints and the like). In practical terms the use case model does not need to be more than a narrative script of how the actor performs the action using the wouldbe technical system, starting from a given situation and resulting in a set of specified outcomes. For instance, one use case of a hospital information system would be the recording of a new patient s demographic data on the database by a medical records officer. Actors, subjects Means of work, instruments, facilities Shared object of work Jointly aspired outcome of work Figure 7: Individual actions merging into a joint activity (Korpela et al., forthcoming b). In principle, when all the use cases required in the work activity have been described, we have a complete narrative description of all the functionality that the would-be software system shall have. This set of use case descriptions can be used both as a contract specification, a system documentation,

13 Soriyan et al., Information Systems Development for Health in Africa 13 a work order for programmers, a guideline for testing, and a basis for a user manual. In practice it is not feasible to try to specify all the use cases in detail in beforehand, but to have first just a list of the required use cases and to proceed into implementing the individual use cases in a prototyping manner in parallel with specifying them in collaboration with the users. Further experimentation is required to reveal when it is necessary to actually produce the use case descriptions, and when a rough outline of the grand design together with prototyping is sufficient. This is probably highly dependent on the technical implementation methods used. 4.5 Technical implementation methods Our intention is of course not to prescribe which technologies Nigerian software companies should use. However, it is feasible to recommend high-level Rapid Applications Development (RAD) toolkits which produce more user friendly and more maintainable applications more efficiently than low-level programming. Furthermore, in educating Computer Science students in the Made-in-Nigeria methodology, there needs to be a sample implementation technology to be used in exercises. Therefore we will include in the portfolio technical implementation examples based on the FixIT toolkit used in developing the Made-in-Nigeria Primary Healthcare and Hospital Information System (MINPHIS). The sample RAD toolkit includes the FileMan public-domain database management system of the U.S. Department of Veterans Affairs, running on the Caché programming platform on Windows NT, the Delphi application development technology, and the FixIT high-level building blocks developed for FileMan databases (Korpela, 1999 a). Briefly, modern applications can be developed using the FileMan-Delphi-FixIT toolkit by composing them from prefabricated high-level components, instead of by coding them on a low level. Similar RAD toolkits are available for commercial databases, although they tend to be quite expensive. A RAD as the implementation technology has some profound implications on the technical design and implementation methods. The prototyping and iterative nature of the implementation process increases at the expense of formal specification and rigid designs. With a RAD, the developer should first have the grand functional and architectural design of the system, proceed into designing the main database structure, and then implement the database, forms, functions and reports of each use case at a time. For instance with our sample RAD toolkit, the developer can produce the fully functional forms for one use case in minutes. It is then crucial that these prototypes are presented to a representative group of would-be users very early, to uncover any major design flaws. Early hands-on interaction between the users and the developers on the prototypes of a couple of core use cases also gives the users and managers of the client company a concrete idea of what they are going to have. It is thus useful to implement prototypes of the core use cases even in parallel with requirements analysis, particularly if the client has no prior experience on using the kind of IT considered. The prototype becomes a concrete shared language for the designers and users to express their mutual requirements and questions, and to learn from each other. The completed use cases of the prototype become a product which can be put into use already while some other use cases are still just rough ideas. In this case even the daily use experience of the early parts can inform the design of the late parts.

14 Soriyan et al., Information Systems Development for Health in Africa 14 So far we have technical implementation experience on our own host project only. The survey provides an overview of the state of the art in technical implementation methods and tools in Nigerian software companies, but the view must be backed up by in-depth cases. 4.6 Methods for organisational implementation (putting IT into use) Organisational implementation, or the introduction of an IT application into the user organisation, has two faces. From the software developers viewpoint it is to deploy their product into one or more user sites, depending on whether it is a tailored or a packaged product. From the user organisation s viewpoint it is to purchase a new tool to facilitate their work. In first-time development of packages and in tailoring these aspects merge. According to our survey results, tailoring is much more common in Nigeria than to develop packages, so our portfolio of methods will have an emphasis on such organisational implementation settings which are merged with technical implementation. We wish to re-emphasise that whether technical implementation is included or not, organisational implementation must always include requirements analysis (Figure 1). Our survey results and action research experience are so far not sufficient to indicate whether this area will require major adaptation to either the existing practice or to the methods suggested by western literature. 4.7 Methods for long-term support In the section dealing with sustainability, we already mentioned that it is important to involve all the stakeholders of the activity network into supporting the would-be information system in the long term. However, more detailed guidance is needed on how the long-term support should be organised, so that the users and their clients feedback will reach the IS professionals, bug fixes and functional enhancements will be delivered on time, different software versions and site configurations can be managed, etc. Research on this area is at the final end of our project schedule, so at the moment we have no major empirical results or theoretical propositions yet. 5. Conclusion We argued that one of the prerequisites for appropriate, locally developed information systems for healthcare in Africa is the availability of ISD methods, techniques and education adjusted to the specific constraints and requirements of the everyday work of African systems developers. We also presented the research design for developing a portfolio of ISD methods and techniques Made in Nigeria for Nigeria. Resulting from the first phase of theoretical and empirical research, we presented a preliminary outline of the topics to be included in the portfolio, and discussed in more detail the methods for requirements analysis, risk analysis, sustainability and a positive socio-economic impact. Other topics were covered in a more superficial way. This paper is the first outline of the Lecture Notes and technical manuals which should result from the project. The methods and techniques will be presented in more detail and submitted to the assessment and criticism of colleagues from other countries in a one-day workshop after HELINA 99. The feedback from the workshop will provide us with guidance on how to make the methodology increasingly relevant to other African countries also, besides Nigeria. The final methodology and experience on applying it to ISD practice and education should be available in HELINA 2002.

15 Soriyan et al., Information Systems Development for Health in Africa 15 Acknowledgement This research was funded by the Academy of Finland through the INDEHELA-Methods project. References Avgerou C (1996). Transferability of information technology and organisational practices. In: Odedra- Straub M (ed.), Global Information Technology and Socio-Economic Development. Nashua: Ivy League, pp Avison D, Lau F, Myers M, Nielsen PA (1999). Action research. Communications of the ACM 42(1), pp Barki H, Rivard S, Talbot J (1993). Toward an assessment of software development risk. Journal of Management Information Systems 10:(2), Boehm BW (1989). Software Risk Management Tutorial. Washington, DC: IEEE Computer Society Press. Charette RN (1989). Software Engineering Risk Analysis and Management. New York: McGraw- Hill. Heeks R (1999 a). Software strategies in developing countries. Communications of the ACM 42(6), pp Heeks R (1999 b). Information and Communication Technologies, Poverty and Development. Manchester: University of Manchester, Institute for Development Policy and Management, Working Paper Series no. 5. Jacobson I (1994). Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley. Järvinen P (1999). On Research Methods. Tampere: Opinpaja. Keil M, Cule PE, Lyytinen K, Schmidt R (1998). A framework for identifying software project risks. Communications of the ACM 41(11), Kensing F, Simonsen J, Bødker K (1998). MUST a method for participatory design. Human- Computer Interaction 13(2), Korpela M (1999 a). Moving a valuable heritage to the network computing architecture. In: Proceedings of the 1999 Annual HIMSS Conference, Vol. 3, Chicago: Healthcare Information and Management Systems Society, pp Korpela M (1999 b). Activity Analysis and Development in a Nutshell. Web page. Korpela M, Soriyan HA, Olufokunbi KC, Onayade AA, Davies-Adetugbo A, Adesanmi D (1998). Community participation in health informatics in Africa: An experiment in tripartite partnership in Ile-Ife,

16 Soriyan et al., Information Systems Development for Health in Africa 16 Nigeria. Computer Supported Cooperative Work 7:(3 4), Korpela M, Soriyan HA, Olufokunbi KC, Mursu A (forthcoming a). Made-in-Nigeria systems development methodologies: An action research project in the health sector. In: Avgerou C, Walsham G (eds.), Implementation and evaluation of information systems in developing countries. Korpela M, Olufokunbi KC, Soriyan HA (forthcoming b). Activity analysis as a method for information systems development: General introduction and experiments from Nigeria and Finland. Scandinavian Journal of Information Systems, Special Issue on Activity Theory in the Design of Technology. Korpela M, Mursu A, Soriyan HA, Olufokunbi KC (forthcoming c). Information systems development as an activity. Computer Supported Cooperative Work, Special Issue on Activity Theory and Design. Mursu A, Soriyan HA, Olufokunbi KC, Korpela M (1999). From software risks to sustainable information systems: Setting the stage for a Delphi study in Nigeria. Journal of Global Information Technology Management, 2:(3), Mursu A, Soriyan HA, Olufokunbi K, Korpela M (forthcoming). Information systems development in a developing country: Theoretical analysis of special requirements in Nigeria and Africa. Accepted in the HICSS-33 minitrack on Information Technology in Developing Countries, Hawaii, 4 7 January Odedra M (1992). Much more than human resource development for Africa. In: Bhatnagar S (ed.), Information Technology Manpower: Key Issues for Developing Countries, New Delhi: Tata McGraw-Hill, pp Orlikowski WJ, Baroudi JJ (1991). Studying information technology in organizations: Research approaches and assumptions. Information System Research 2(1), pp Reynolds J, Stinson W (1993). Sustainability analysis. Primary Health Care Management Advancement Programme. Bangkok: Aga Khan Foundation. Ropponen J, Lyytinen K (1997). Can software risk management improve system development: an exploratory study. European Journal of Information Systems 6, Schmidt R, Lyytinen K, Keil M, Cule P (1997). Identifying Software Project Risks: An International Delphi Study. Hong Kong University of Science and Technology Working Paper. Waema TM (1996). Implementation of information technology projects and economic development: Issues, problems and strategies. In: Odedra-Straub M (ed.), Global Information Technology and Socio-Economic Development. Nashua: Ivy League, pp

Information Systems Development in a Developing Country: Theoretical Analysis of Special Requirements in Nigeria and Africa

Information Systems Development in a Developing Country: Theoretical Analysis of Special Requirements in Nigeria and Africa Information Systems Development in a Developing Country: Theoretical Analysis of Special Requirements in Nigeria and Africa Anja Mursu University of Jyväskylä, Finland anjamu@jytko.jyu.fi Karen Olufokunbi

More information

Information Systems Development in Nigerian Software Companies: Research Methodology and Assessment from the Healthcare Sector s Perspective

Information Systems Development in Nigerian Software Companies: Research Methodology and Assessment from the Healthcare Sector s Perspective EJISDC (2001), 5, 4, 1-18 Information Systems Development in Nigerian Software Companies: Research Methodology and Assessment from the Healthcare Sector s Perspective H. Abimbola Soriyan Dept of Computer

More information

Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong

Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong Top Ten Lists of Software Project Risks : Evidence from the Literature Survey Tharwon Arnuphaptrairong Abstract Software risk management is crucial for the software development s. It is used for planning

More information

Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model

Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the

More information

Software Development Under Stringent Hardware Constraints: Do Agile Methods Have a Chance?

Software Development Under Stringent Hardware Constraints: Do Agile Methods Have a Chance? Software Development Under Stringent Hardware Constraints: Do Agile Methods Have a Chance? Jussi Ronkainen, Pekka Abrahamsson VTT Technical Research Centre of Finland P.O. Box 1100 FIN-90570 Oulu, Finland

More information

Software Risk Management Practice: Evidence From Thai Software Firms

Software Risk Management Practice: Evidence From Thai Software Firms , March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced

More information

Mark Keil, Paul E. Cule, Kalle Lyytinen, androy C. Schmidt

Mark Keil, Paul E. Cule, Kalle Lyytinen, androy C. Schmidt We ve all heard tales of multimillion dollar mistakes that somehow ran off course. Are software projects that risky or do managers need to take a fresh approach when preparing for such critical expeditions?

More information

Risk Knowledge Capture in the Riskit Method

Risk Knowledge Capture in the Riskit Method Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili jyrki.kontio@ntc.nokia.com / basili@cs.umd.edu University of Maryland Department of Computer Science A.V.Williams Building

More information

System/Data Requirements Definition Analysis and Design

System/Data Requirements Definition Analysis and Design EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

Towards Better Software Projects and Contracts: Commitment Specifications in Software Development Projects

Towards Better Software Projects and Contracts: Commitment Specifications in Software Development Projects Paper presented at the 20th International Conference on Software Engineering, April 19-25, 1998, Kyoto, JAPAN Towards Better Software Projects and Contracts: Commitment Specifications in Software Development

More information

Software Development Process

Software Development Process Software Development Process A software development process, also known as software development lifecycle, is a structure imposed on the development of a software product. Similar terms include software

More information

THE MASTER S DEGREE IN DESIGN PROGRAMME DESCRIPTION Adopted by the Board of KHiB on 27 October 2011

THE MASTER S DEGREE IN DESIGN PROGRAMME DESCRIPTION Adopted by the Board of KHiB on 27 October 2011 THE MASTER S DEGREE IN DESIGN PROGRAMME DESCRIPTION Adopted by the Board of KHiB on 27 October 2011 1. THE PROFILE AND OBJECTIVES OF THE STUDY PROGRAMME The goal of the Department of Design is to educate

More information

A Survey on Requirement Analysis in the Nigerian Context

A Survey on Requirement Analysis in the Nigerian Context A Survey on Requirement Analysis in the Nigerian Context Olaronke Ganiat Elias 1, Janet Olusola Olaleke 1, Micheal Segun Olajide 1, and Nureni John Ayinla 1 1 Computer Science Department, Adeyemi College

More information

TEC Capital Asset Management Standard January 2011

TEC Capital Asset Management Standard January 2011 TEC Capital Asset Management Standard January 2011 TEC Capital Asset Management Standard Tertiary Education Commission January 2011 0 Table of contents Introduction 2 Capital Asset Management 3 Defining

More information

Introduction to Software Engineering

Introduction to Software Engineering CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study

More information

Selecting a Content Management System

Selecting a Content Management System 9 9 SELECTING A CONTENT MANAGEMENT SYSTEM Selecting a Content Management System Better Practice Checklist Practical guides for effective use of new technologies in Government www.agimo.gov.au/checklists

More information

TOOL D14 Monitoring and evaluation: a framework

TOOL D14 Monitoring and evaluation: a framework TOOL D14 Monitoring and evaluation: a framework 159 TOOL D14 Monitoring and evaluation: a framework TOOL D14 For: About: Purpose: Use: Resource: Commissioners in primary care trusts (PCTs) and local authorities

More information

Software Process for QA

Software Process for QA Software Process for QA Basic approaches & alternatives CIS 610, W98 / M Young 1/7/98 1 This introduction and overview is intended to provide some basic background on software process (sometimes called

More information

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with

More information

Information Technology Security Certification and Accreditation Guidelines

Information Technology Security Certification and Accreditation Guidelines Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS AND EVALUATIONS Department of Veterans Affairs Audit of Office of Information Technology s Strategic Human Capital Management October 29, 2012 11-00324-20

More information

Clinical Risk Management: Agile Development Implementation Guidance

Clinical Risk Management: Agile Development Implementation Guidance Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk

More information

Step 1: Analyze Data. 1.1 Organize

Step 1: Analyze Data. 1.1 Organize A private sector assessment combines quantitative and qualitative methods to increase knowledge about the private health sector. In the analytic phase, the team organizes and examines information amassed

More information

TOGAF usage in outsourcing of software development

TOGAF usage in outsourcing of software development Acta Informatica Pragensia 2(2), 2013, 68 76, DOI: 10.18267/j.aip.25 Section: Online: aip.vse.cz Peer-reviewed papers TOGAF usage in outsourcing of software development Aziz Ahmad Rais 1, Rudolf Pecinovsky

More information

Journal of Information Technology Impact

Journal of Information Technology Impact Journal of Information Technology Impact Vol. 3, No. 2, pp. 69-76, 2003 Information and Communication Technology in Nigeria The Helath Sector Experience Bayo Idowu 1, Eyitope Ogunbodede 2, Bimbo Idowu

More information

2 nd EUA Funding Forum: Strategies for efficient funding of universities

2 nd EUA Funding Forum: Strategies for efficient funding of universities 2 nd EUA Funding Forum: Strategies for efficient funding of universities Bergamo, 9-10 October 2014 Forum report Liviu Matei, General rapporteur Table of contents I. Executive Summary 3 II. What is the

More information

Development Informatics

Development Informatics Development Informatics Working Paper Series The Development Informatics working paper series discusses the broad issues surrounding information, knowledge, information systems, and information and communication

More information

Project Management Step Wise. Sunday, 4 November 12

Project Management Step Wise. Sunday, 4 November 12 Project Management Step Wise An Overview of Project Planning you might have noticed already that it is difficult to track progress with a software project it gets worse as scale and distribution increase

More information

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003

Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 18-19 The Unified Process Static dimension Glossary UP (Unified

More information

How can African healthcare facilities get appropriate software? Sociotechnical research in the INDEHELA-Context project

How can African healthcare facilities get appropriate software? Sociotechnical research in the INDEHELA-Context project How can African healthcare facilities get appropriate software? Sociotechnical research in the INDEHELA-Context project Mikko Korpela a, Lyn Hanmer b, Retha de la Harpe c, Esselina Macome d, Anja Mursu

More information

The PMO as a Project Management Integrator, Innovator and Interventionist

The PMO as a Project Management Integrator, Innovator and Interventionist Article by Peter Mihailidis, Rad Miletich and Adel Khreich: Peter Mihailidis is an Associate Director with bluevisions, a project and program management consultancy based in Milsons Point in Sydney. Peter

More information

Evaluability Assessment Template

Evaluability Assessment Template Evaluability Assessment Template Evaluability Assessment Template An Evaluability Assessment examines the extent to which a project or a programme can be evaluated in a reliable and credible fashion. An

More information

Advancements in the V-Model

Advancements in the V-Model Advancements in the V-Model Sonali Mathur Asst. Professor, CSE Dept. ABES Institute of Technology Ghaziabad, U.P-201009 Shaily Malik Lecturer, CSE Dept. Maharaja Surajmal Institute of Tech. Janakpuri,

More information

Software Development Processes. Software Life-Cycle Models. Process Models in Other Fields. CIS 422/522 Spring 1998 1

Software Development Processes. Software Life-Cycle Models. Process Models in Other Fields. CIS 422/522 Spring 1998 1 1 Software Development Processes Sequential, Prototype-based RAD, Phased, Risk-based Spiral (c) 1998 M Young CIS 422/522 1/10/99 1 Software Life-Cycle Models Breaking projects down into pieces for... Planning

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

Master of Science in Management

Master of Science in Management Programme Syllabus for Master of Science in Management 120 higher education credits Second Cycle Established by the Faculty Board of the School of Business, Economics and Law, University of Gothenburg,

More information

Volunteer Managers National Occupational Standards

Volunteer Managers National Occupational Standards Volunteer Managers National Occupational Standards Contents 00 Forward 00 Section 1 Introduction 00 Who are these standards for? 00 Why should you use them? 00 How can you use them? 00 What s in a Standard?

More information

The Oregon Software Development Process

The Oregon Software Development Process The Oregon Software Development Process Till Schümmer 1 and Robert Slagter 2 1 Computer Science Department, FernUniversität in Hagen, Universitätsstrasse 1, 58084 Hagen, Germany Till.Schuemmer@fernuni-hagen.de

More information

Exploring the directions and methods of business development. A comparative multiple-case study on Ikea and Vodafone

Exploring the directions and methods of business development. A comparative multiple-case study on Ikea and Vodafone Exploring the directions and methods of business development A comparative multiple-case study on Ikea and Vodafone Michal Štefan Aalborg University Master thesis for MSc. in International Business Economics

More information

A Variability Viewpoint for Enterprise Software Systems

A Variability Viewpoint for Enterprise Software Systems 2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,

More information

Science and Engineering Professional Framework

Science and Engineering Professional Framework Contents: Introduction... 2 Who is the professional framework for?... 2 Using the science and engineering professional framework... 2 Summary of the Science and Engineering Professional Framework... 3

More information

Identification. Preparation and formulation. Evaluation. Review and approval. Implementation. A. Phase 1: Project identification

Identification. Preparation and formulation. Evaluation. Review and approval. Implementation. A. Phase 1: Project identification II. Figure 5: 6 The project cycle can be explained in terms of five phases: identification, preparation and formulation, review and approval, implementation, and evaluation. Distinctions among these phases,

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

White Paper. Comparison of ISO/IEC 20000 with ASL and BiSL

White Paper. Comparison of ISO/IEC 20000 with ASL and BiSL White Paper Comparison of ISO/IEC 20000 with ASL and BiSL Both ISO/IEC 20000 and ASL offer guidance for IT Service Providers, ISO/IEC 20000 giving broad guidance for IT Service Management and ASL focusing

More information

Software Development Processes. Software Life-Cycle Models

Software Development Processes. Software Life-Cycle Models 1 Software Development Processes Sequential, Prototype-based RAD, Phased, Risk-based Spiral (c) 1998 M Young CIS 422/522 4/3/98 1 Software Life-Cycle Models Breaking projects down into pieces for... Planning

More information

Integrated Risk Management:

Integrated Risk Management: Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)

More information

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room

More information

FINAL EVALUATION VIE/029. Technical Assistance towards Programme Support, Developing Business with the Rural Poor in Cao Bang

FINAL EVALUATION VIE/029. Technical Assistance towards Programme Support, Developing Business with the Rural Poor in Cao Bang FINAL EVALUATION VIE/029 Technical Assistance towards Programme Support, Developing Business with the Rural Poor in Cao Bang PROJECT SUMMARY DATA Country Long Project Title Short Project Title LuxDev Code

More information

Programme Specifications

Programme Specifications Programme Specifications MASTER OF PHILOSOPHY IN ARCHITECTURE AND URBAN DESIGN (MAUD) 1 Awarding body University of Cambridge 2 Teaching institution Department of Architecture 3 Accreditation details None

More information

Monitoring and Evaluation of. Interventions

Monitoring and Evaluation of. Interventions Monitoring and Evaluation of Sports in Development (SiD) Interventions presented by: Pamela K. Mbabazi, Ph.D. Faculty of Development Studies, Department of Development Studies Mbarara University of Science

More information

Framework Policy for the Governance of Major Public Infrastructure Projects

Framework Policy for the Governance of Major Public Infrastructure Projects Framework Policy for the Governance of Major Public Infrastructure Projects Framework Policy for the Governance of Major Public Infrastructure Projects For further information on the Framework Policy for

More information

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.

More information

Architecture Centric Development in Software Product Lines

Architecture Centric Development in Software Product Lines Architecture Centric Development in Software Product Lines Aurangzeb Khan DCE, College of E & ME National University of Science and Technology (NUST), Pakistan Farooque Azam DCE, College of E & ME National

More information

Chapter 1 Introduction to the Study

Chapter 1 Introduction to the Study ` Chapter 1 Introduction to the Study 1.1. Introduction The convergence of computer and communications technologies of the late 20th century has profoundly affected information creation, distribution,

More information

Information Management Advice 39 Developing an Information Asset Register

Information Management Advice 39 Developing an Information Asset Register Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if

More information

Health Policy and Management Course Descriptions

Health Policy and Management Course Descriptions Health Policy and Management Course Descriptions HPM 500 (2) Introduction to the US Health Care System Fall, spring. Required for all MPH students. Introduces students to the US health care system, both

More information

City Technology Platform Technical Architecture Context

City Technology Platform Technical Architecture Context December 2013 City Technology Platform Technical Architecture Context Intro A major component of the 24m Future City Demonstrator award from the Technology Strategy Board (TSB) has been the design and

More information

1. What is PRINCE2? Projects In a Controlled Environment. Structured project management method. Generic based on proven principles

1. What is PRINCE2? Projects In a Controlled Environment. Structured project management method. Generic based on proven principles 1. What is PRINCE2? Projects In a Controlled Environment Structured project management method Generic based on proven principles Isolates the management from the specialist 2 1.1. What is a Project? Change

More information

A Review of Risk Management in Different Software Development Methodologies

A Review of Risk Management in Different Software Development Methodologies A Review of Risk Management in Different Software Development Methodologies Haneen Hijazi Hashemite University Zarqa, Jordan Thair Khdour Al Balqa Applied University Salt, Jordan Abdulsalam Alarabeyyat

More information

Gateway review guidebook. for project owners and review teams

Gateway review guidebook. for project owners and review teams Gateway review guidebook for project owners and review teams The State of Queensland (Queensland Treasury and Trade) 2013. First published by the Queensland Government, Department of Infrastructure and

More information

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection;

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection; Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Document Driven

More information

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 abb@cs.stir.ac.uk Spring 2014 (elicitation)

More information

TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW

TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Year 2014, Vol. 1, issue 1, pp. 49-56 Available online at: http://journal.iecuniversity.com TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Singh RANDEEP a*, Rathee AMIT b a* Department of

More information

Requirements Engineering for Web Applications

Requirements Engineering for Web Applications Web Engineering Requirements Engineering for Web Applications Copyright 2013 Ioan Toma & Srdjan Komazec 1 What is the course structure? # Date Title 1 5 th March Web Engineering Introduction and Overview

More information

Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance

Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance Ayman Bazhair and Kamaljeet Sandhu Abstract The purpose of this research paper to present the synthesized

More information

The Business Case Justification

The Business Case Justification The Business Case Justification Solutions for Capital Project Delivery Improvement (White Paper) Table of Contents Page Introduction... 3 Business Case Structure... 5 Business Case Process... 6 Detailed

More information

Workforce capacity planning model

Workforce capacity planning model Workforce capacity planning model September 2014 Developed in partnership with 1 Workforce capacity planning helps employers to work out whether or not they have the right mix and numbers of workers with

More information

Evaluation policy and guidelines for evaluations

Evaluation policy and guidelines for evaluations Evaluation policy and guidelines for evaluations IOB October 2009 Policy and Operations Evaluation Department IOB October 2009 Policy and Operations Evaluation Department IOB October 2009 Policy and O

More information

Project Risk Management

Project Risk Management PROJECT ADVISORY Project Risk Management Leadership Series 9 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes, but its content is

More information

Lifecycle Models: Waterfall / Spiral / EVO

Lifecycle Models: Waterfall / Spiral / EVO Lifecycle Models: Waterfall / Spiral / EVO Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 Lifecycle The sequence of actions that must be performed in order to build a software

More information

The Newcastle upon Tyne Hospitals NHS Foundation Trust. IT Change Management Policy and Process

The Newcastle upon Tyne Hospitals NHS Foundation Trust. IT Change Management Policy and Process The Newcastle upon Tyne Hospitals NHS Foundation Trust Version No.: 2.0 Effective From: 16 July 2015 Expiry Date: 16 July 2018 Date Ratified: 5 June 2015 Ratified By: Director of IT 1 Introduction IT Change

More information

CRITICAL ANALYSYS OF THE SCRUM PROJECT MANAGEMENT METHODOLOGY

CRITICAL ANALYSYS OF THE SCRUM PROJECT MANAGEMENT METHODOLOGY N ft n il Ionel CRITICAL ANALYSYS OF THE SCRUM PROJECT MANAGEMENT METHODOLOGY The Academy of Economic Studies Bucharest, Management Faculty, 6 Romana Square, Sector 1, Bucharest, Management Chair, E-mail:

More information

Digital Industries Apprenticeship: Assessment Plan. Infrastructure Technician. March 2016

Digital Industries Apprenticeship: Assessment Plan. Infrastructure Technician. March 2016 Digital Industries Apprenticeship: Assessment Plan Infrastructure Technician March 2016 1 2 Digital Industries Apprenticeships: Infrastructure Technician Assessment Plan 1. General Introduction and Overview

More information

Cambridge International Certificate in Educational Leadership 6247 Cambridge International Diploma in Educational Leadership 6248

Cambridge International Certificate in Educational Leadership 6247 Cambridge International Diploma in Educational Leadership 6248 Cambridge International Certificate in Educational Leadership 6247 Cambridge International Diploma in Educational Leadership 6248 For examination in 2015 Preface This syllabus sets out the details of the

More information

Purpose: Content: Definition: Benefits: outputs outcomes benefits Business Case dis-benefit Key Responsibilities: Approach: Executive Developed

Purpose: Content: Definition: Benefits: outputs outcomes benefits Business Case dis-benefit Key Responsibilities: Approach: Executive Developed Key Learning Points The Swirl Logo is a trade mark of the AXELOS Limited. Is used by the Project Board throughout the project to verify its continued viability:- Is the investment in this project still

More information

Software Risk Management: a Process Model and a Tool

Software Risk Management: a Process Model and a Tool Software Risk Management: a Process Model and a Tool Tereza G. Kirner 1, Lourdes E. Gonçalves 1 1 Graduate Program in Computer Science Methodist University of Piracicaba SP, Brasil tgkirner@unimep.br;

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Technology management in warship acquisition

Technology management in warship acquisition management in warship acquisition A J Shanks B.Eng(Hons) MIET BMT Defence Services Limited SYNOPSIS Today s warship designers and engineers look to technology to provide warships and systems better, cheaper

More information

Introducing Reference Models in ERP Development

Introducing Reference Models in ERP Development Introducing Reference Models in ERP Development Signe Ellegård Borch IT University of Copenhagen elleborch@itu.dk Introduction Business process reference modelling is not a new topic in the ERP software

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Learning & Development Framework for the Civil Service

Learning & Development Framework for the Civil Service Learning & Development Framework for the Civil Service 2011-2014 Table of Contents 1. Introduction & Background... 1 2. Key Objectives and Actions arising... 3 3. Framework Objectives... 4 3.1 Prioritise

More information

Software Risk Management Practice: Evidence From Thai Software Industry

Software Risk Management Practice: Evidence From Thai Software Industry INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon

More information

DG ENLARGEMENT SECTOR BUDGET SUPPORT GUIDELINES

DG ENLARGEMENT SECTOR BUDGET SUPPORT GUIDELINES Ref. Ares(2014)571140-04/03/2014 DG ENLARGEMENT SECTOR BUDGET SUPPORT GUIDELINES EXECUTIVE SUMMARY January 2014 TABLE OF CONTENTS Introduction 1. RATIONALE FOR BUDGET SUPPORT 1.1 What is Budget Support?

More information

Umbrella: A New Component-Based Software Development Model

Umbrella: A New Component-Based Software Development Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Umbrella: A New Component-Based Software Development Model Anurag Dixit and P.C.

More information

SEA AND SIA - TWO PARTICIPATIVE ASSESSMENT TOOLS FOR SUSTAINABILITY

SEA AND SIA - TWO PARTICIPATIVE ASSESSMENT TOOLS FOR SUSTAINABILITY SEA AND SIA - TWO PARTICIPATIVE ASSESSMENT TOOLS FOR SUSTAINABILITY Kerstin Arbter Published in: Conference proceedings of the EASY ECO 2 Conference, May 15-17, 2003, Vienna, p. 175-181 1 Introduction

More information

SCRUM. A Tool from the Software World Can Improve Analytical Project Outcomes. By KyMBER WALTMUNSON

SCRUM. A Tool from the Software World Can Improve Analytical Project Outcomes. By KyMBER WALTMUNSON SCRUM A Tool from the Software World Can Improve Analytical Project Outcomes By KyMBER WALTMUNSON When jurisdictions undertake analytical work such as audits, budget analysis, program evaluation, and special

More information

Product Portfolio Management in Small Software Product Businesses a Tentative Research Agenda

Product Portfolio Management in Small Software Product Businesses a Tentative Research Agenda Product Portfolio Management in Small Software Product Businesses a Tentative Research Agenda Jarno Vähäniitty Software Business and Engineering Institute, Helsinki University of Technology Jarno.Vahaniitty@soberit.hut.fi

More information

Non-Technical Issues in Software Development

Non-Technical Issues in Software Development Non-Technical Issues in Software Development David E. Kieras! University of Michigan 1 Introduction Question: Why isn't software of higher quality?! More useful, more usable, more reliable?! Many large

More information

White Paper. PPP Governance

White Paper. PPP Governance PPP Governance The Governance of Projects, Programs and Portfolios (PPP) (sometimes called project governance for convenience) is the sub-set of corporate and organisational governance 1 focused on assisting

More information

Relationship Manager (Banking) Assessment Plan

Relationship Manager (Banking) Assessment Plan 1. Introduction and Overview Relationship Manager (Banking) Assessment Plan The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It forms a key

More information

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)?

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)? WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)? Due to the often complex and risky nature of projects, many organizations experience pressure for consistency in strategy, communication,

More information

The Role of Agile Methodology in Project Management

The Role of Agile Methodology in Project Management Edith Cowan University Research Online Australian Information Warfare and Security Conference Security Research Institute Conferences 2010 Success of Agile Environment in Complex Projects Abbass Ghanbary

More information

Network Rail Infrastructure Projects Joint Relationship Management Plan

Network Rail Infrastructure Projects Joint Relationship Management Plan Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf

More information

Agile Change: The Key to Successful Cloud/SaaS Deployment

Agile Change: The Key to Successful Cloud/SaaS Deployment WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall

More information

C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering

C. Wohlin and B. Regnell, Achieving Industrial Relevance in Software Engineering Education, Proceedings Conference on Software Engineering C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering Education & Training, pp. 16-25, New Orleans, Lousiana, USA,

More information

SOFTWARE PROJECT MANAGEMENT

SOFTWARE PROJECT MANAGEMENT SOFTWARE PROJECT MANAGEMENT http://www.tutorialspoint.com/software_engineering/software_project_management.htm Copyright tutorialspoint.com The job pattern of an IT company engaged in software development

More information

How To Develop An Enterprise Architecture

How To Develop An Enterprise Architecture OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY

More information

RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT

RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT by Hazel Ann Taylor BSc, MSc A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy

More information

WHO GLOBAL COMPETENCY MODEL

WHO GLOBAL COMPETENCY MODEL 1. Core Competencies WHO GLOBAL COMPETENCY MODEL 1) COMMUNICATING IN A CREDIBLE AND EFFECTIVE WAY Definition: Expresses oneself clearly in conversations and interactions with others; listens actively.

More information