A Risk Model of Requirements Change Impact Analysis
|
|
|
- Rosalind Sutton
- 10 years ago
- Views:
Transcription
1 76 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 A Risk Model of Requirements Change Impact Analysis Marfizah Abdul Rahman, Rozilawati Razali and Dalbir Singh Centre of Software Technology and Management, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600, UKM Bangi, Selangor, Malaysia [email protected], [email protected], [email protected] Abstract Software systems are critical assets to organisations as they support important business processes and workflow. To maintain the value of these assets, the requirements of software systems must evolve whenever there are changes in business needs. A key problem to organisations is implementing requirements change to the existing software systems. Such initiatives need proper analyses so that their effects could be determined before resources are spent. Impact analysis is therefore an important step in requirements change management. As a project, any change implementation involves risks. It is thus necessary for impact analysis to consider risk factors for implementing requirements change. However to date, the risk factors concerning requirement change are not much explored. This paper aims to identify the risk factors for implementing requirements change. The risk factors were identified through two qualitative approaches, namely a review of related work and a focus group study. The former involved fifty published articles and the latter concerned five domain experts. The collected risk factors from both studies were analysed by using content analysis. The risk factors form a risk model for analysing impacts of implementing requirements change. The model helps practitioners to assess the viability of requirements change requests. Index Terms requirements change management, risk factor, impact analysis I. INTRODUCTION Software is dynamic and changes rapidly in order to respond to various business needs. There are many causes of software changes. One of them is due to addition and modification of requirements. Requirements change takes place in both development and maintenance phases [1]. One fourth of requirements change occur during maintenance phase [2]. As compared to development, requirements change that happens during maintenance is more costly since the software has been put into operation and used by its users [3]. Users issue requirements change through change request forms, which information is used during impact analysis. Impact analysis analyses current environment and foresees the possible effects on the existing software when implementing the requested change. The results of impact analysis guide the Change Control Board (CCB) to decide whether the requested change should be implemented. Any approved change request is indeed a software project where its scope, cost and schedule for implementation are defined. Impact analysis therefore needs to be accurate in order to avoid the failure of such projects. As a software project, it is necessary for CCB to assess risks during impact analysis for requirements change [3]. Risk is an event that triggers unwanted conditions that could bring harm and loss to a project. Risks are managed through a set of action plans [4]. Risk assessment in particular involves risk identification, risk analysis and risk prioritisation [5]. Despite its importance, it is uncertain how to incorporate risk assessment during impact analysis for requirements change. The key aspect of risk assessment is the categorisation of risk factors. The aim of this paper is to explore the risk factors that should be analysed during impact analysis concerning projects involving requirements change. The individual risks are collated from theoretical and empirical work as a conceptual model that shows the interrelationships among several categories of risk factors. The model acts as a guide for assessing risks in implementing requirements change. The paper is organised as follows: Section 2 provides the related work on the subject matter. Section 3 briefly explains the methodology used. Section 4 presents and elaborates the proposed model. Finally, Section 5 concludes the paper with a summary that outlines the main findings and future work. II. RELATED WORK Requirements change has been a critical issue in software development projects. One particular issue in requirements change is how to deal with the requirements change before implementing them. A proper process of managing requirements change can ensure the successful implementation of the change. The critical step in managing requirements change is to decide either to accept or reject the requested change [6,7]. Such a difficult decision has to be made by a dedicated technical committee, namely Change Control Board (CCB) through impact analysis [8,9]. During impact analysis, the affected elements will be analysed [10]. To date, it is doi: /jsw
2 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY uncertain how CCB should analyse the impacts of those elements and subsequently decide the way forward [11]. Users issue changes in requirements through change request forms. A change request form contains change attributes such as reasons, types and sources of change, which are necessary for project team to understand the request [12]. Requirements change normally affects software and hardware of the current system. When considering a change request, source code [13,14], documentation [15], tools [16] and architecture [14] of the existing software are examined to assess the impacts. The change in software normally causes some changes in hardware and vice-versa. The changes in hardware include memory usage [17], performance [3] and platform [18]. The change is complex if it involves a new software or hardware technology that has not been used in prior projects [19,20]. Requirements change also concerns human aspects. Project team is responsible to analyse the change request forms received from users. To ensure the feasibility of the change, assessing the project team s capability such as skill, knowledge, experience and motivation during impact analysis is important [21]. On the other hand, user involvement is necessary so that the users are aware of the systems operations after the change [22]. Furthermore, the users can also provide information about the current system and clarify the change that they requested [23]. Although requirements change provides an opportunity for a software system to improve its value, it triggers risk. Improper implementation of requirements change can cause late delivery, cost overrun, low product quality and sometimes failure to the entire software project [24]. Therefore, it is important to analyse the risk factors in implementing the requirements change through impact analysis [3]. The risk factors are indeed the affected and affecting elements of the change. The analysis of the these elements helps to reduce the ripple effects and unforeseen outcomes before the change is implemented [3]. Requirements change initiatives are considered as software projects and thus, risk factors concerning projects also apply to them. Inexperienced, lack of knowledge and skill among project team members are widely known project risks [19]. In addition, lack of commitment from team members towards the project and ineffective communication between team members and users also impede project success [20]. Besides project team and users, a project is also risky if it fails to gain support and commitment from the top management [20]; [25]. Furthermore, the number of third party involved [20] and degree of dependency on them also contribute to project risks [25]. Both technical and non-technical elements mentioned above influence the schedule and cost to implement a requirements change. A study shows that optimising the schedule can result in significant time saving to implement the change [26]. There are four factors related to cost in requirements change, namely the number of project team members and consultants as well as project duration, size and scope [27]. Inaccurate judgment of the affected and affecting elements may cause in inadequate allocation of time and cost for implementing the change [19,20]. The review above indicates that there are various elements that are deemed necessary when managing requirements change. As the elements contribute to the success or failure of a requirements change project, they are considered as risks. The identified risk however are scattered and treated discretely. It is unclear how these risks influence each other and can be classified as risk factors of implementing requirements change. III. METHODOLOGY The purpose of this study was to identify the risk factors of implementing requirements change. The identified risk factors could help CCB to assess the impacts of the requested requirements change and decide whether the project team should implement it. In order to ensure the identified risk factors are holistic and practical, the study employed both theoretical and empirical approaches. The former concerned a review of previous studies whereas the latter involved a focus group interview with practitioners from software industry. Fig. 1 illustrates the research design, which contains the main activities involved in the study. Data Collection (Theoretical) Research Questions Formulation Data Analysis Model Development Figure 1. Research design The following paragraphs explain each activity briefly: Formulate Research Questions Data Collection (Empirical) In general, the study aimed to answer the following research questions. The questions were generated based on a preliminary study made on the subject matter. What are the risk factors involved in implementing requirements change? How do these factors relate to each other during impact analysis of requirements change implementation?
3 78 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 Collect Theoretical Data A Review The objective of the review was to determine the risk elements concerning requirements change implementation as a software development project, which should be analysed during impact analysis. The keywords used in searching the articles therefore included change impact analysis, software change impact analysis, requirements change impact analysis, requirements change, software change, software risk and software development risk. There was about one hundred articles found but only fifty were selected for further analysis. The other fifty articles were rejected, as they are not relevant to the study. The searching was performed on several prominent online databases. The articles were from year 1995 until 2012 that covered both journals and conference proceedings. The findings of the review can be found in the earlier study [28]. Collect Empirical Data A Focus Group Interview In order to confirm the risk elements found in the literature, a focus group interview with several domain experts and practitioners from the industry was conducted. Focus group is a planned discussion to gather information of interest in a permissive and non-threatening environment [29]. The approach was selected because it captures ideas and background regarding process and product through first degree contact and direct access to participants [30]. The focus group employed the approach suggested by [31]. The interview used semi-structured questions, which were constructed based on the risk elements found in the review. The questions also adopted the factors proposed by [32,33]. Prior to the real session, a pilot study was conducted with five software developers. The purpose of the pilot study was to validate the accuracy and completeness of the questions as well as the feasibility of the session. The feedback received from the pilot study was used to improve the planning of the real session. Predefined selection criteria of informants were set in order to ensure the gathered data would be meaningful. The potential informants must possess more than ten years of experience in software development and must be involved in requirements change management process. To fulfill this requirement, the study employed purposive sampling [34]. The study identified and invited eight informants to the session. A formal invitation letter was sent to them, which contains information regarding the focus group session such as purpose, impact of the study, date, time and venue. Only five informants agreed to attend and thus the response rate was 62%. All of them were government servants. Table 1 provides brief background information about the informants. The focus group session took about two hours and was video-recorded. Before the session commenced, the author explained the procedure and acquired participation agreement from the informants through consent forms. TABLE I. INFORMANTS BACKGROUND Agency System Informant Designation A A1 I1 Head of project A2 I2 Head of unit B B1 I3 Head of project B2 I4 Head of unit C C1 I5 Head of unit Analyse Data and Construct the Model The collected data from both theoretical and empirical work were transcribed and analysed by using content analysis. Content analysis is a research technique for making replicable and valid inferences from text to the contexts of their use, in a way of providing knowledge, new insights, a presentation of facts and a practical guide to action [35]. The first step was to identify the significant risk elements based on frequency analysis. The elements were grouped into several distinct risk factors. Table 2 tabulates the significant risk factors concerning requirements change management found in the review and the focus group interview respectively. Each risk factor constitutes the corresponding risk elements. Most elements were present in both work (marked with /). Nine elements (marked with X in Theoretical-Review column) emerged only from the empirical work. Since the experts in the focus group strongly advocated these items, they therefore were included in the model. The numbers in brackets represent the number of informants mentioned about the elements. For example, 4/5 means four out of five informants agreed on the element. In terms of importance, the informants ranked the risk factors from the most important to the least as follows: Project Team, Identification of Change, Software, Hardware, User, Top Management, Planning of Change Implementation, Strategic Planning, Technology Standard and Third Party. The risk factors were categorised into four main components, namely People, Process, Product (Existing) and Organisation. The second step was to connect the risk factors systematically and conceptualise them as a model. The detailed description of the model is included in the next section. IV. THE MODEL Figure 2 below illustrates a risk model of requirements change impact analysis. The model contains four essential components: People, Process, Product (Existing) and Organisation. Each component consists of several risk factors and the corresponding risk elements that need to be considered holistically during impact analysis for implementing requirements change. The risk factors are interconnected during the process. The arrows between the risk factors in the model indicate the relationships that they have on each other.
4 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY TABLE II. RISK ELEMENTS AND FACTORS FOR REQUIREMENTS CHANGE Component People Process Product (Existing) Risk Factors and Elements Theoritical -Review Empirical -Focus Group (Frequency) User Involvement / / (5/5) Knowledge / / (5/5) Commitment / / (4/5) Communication / / (5/5) Readiness X / (3/5) Cooperation / / (3/5) Project Team Skill / / (5/5) Knowledge / / (5/5) Experience / / (2/5) Motivation / / (2/5) Commitment / / (5/5) Communication / / (5/5) Top Management Support / / (5/5) Commitment / / (5/5) Third Party Number of third / / (2/5) party involved Dependency to external agents / / (4/5) Identification of Change Reasons / / (5/5) Type / / (3/5) Source / / (4/5) Planning Effort / / (5/5) Scheduling / / (5/5) Cost / / (3/5) Software Source code / / (3/5) Software / / (5/5) architecture Tools / / (4/5) Documentation / / (2/5) Integration X / (3/5) Interface X / (3/5) Hardware Memory space / / (3/5) CPU / / (2/5) Performance Platform / / (2/5) Integration X / (3/5) Interface X / (3/5) Organisation Technology Standard Software X / (4/5) Hardware X / (4/5) Strategic Planning Policy X / (4/5) Goal X / (4/5) The People component consists of user, project team, top management and third party. Normally, the user issues a change request through a change request form. The project team is responsible to review and analyse the change request and estimate the change. To ensure comprehensive analysis and estimation, the project team should possess appropriate skills, knowledge and experience about the system. In addition, the project team s motivation and commitment during impact analysis are also essential. The project team also needs to communicate effectively with the user. Due to incomplete and ambiguous information in the change request form, the project team often requires further elaboration from the user. User involvement is therefore important. The user must understand the change that he or she raises. He or she also must cooperate and commit when analysing the impacts. Changes normally cause resistance among users. Consequently, it is necessary to measure users readiness before implementing the change. After identifying and understanding the requested change from the user, the project team has to estimate the change. When estimating the effort, cost and schedule of the change, the project team requires commitment and support from the top management. The effort may need to be adjusted based on the approved cost and permitted schedule by the top management. The number of third party involved in the project and the degree of dependency towards them also influence the planning of change implementation. The Process component contains two main activities concerning impact analysis, namely identification of change and planning of change implementation. The identification of change is based on the information included in the change request form. It is important to identify the reason, type and source of the change in order to analyse the urgency and impacts that they would bring to the existing product. On the other hand, the latter concerns the planning of effort, schedule and cost based on the involvement of third party and top management, project team s capability, existing hardware and software capacity as well as organisational settings. The Product component encompasses the existing hardware and software. Software comprises source code, software architecture, tools and documentation. Based on the information stated in the change request form, source code is analysed to determine the possible affected parts by the change. Changes to source code normally require software architecture and current documentation to be updated. Moreover, changes in a particular software component can affect the hardware especially the memory space, CPU performance and platform. Subsequently, changes to hardware may entail certain software configuration. A large system may integrate and interface with other systems. The integration and interface happen at the software and hardware levels. Any changes made to these components require modification to their dependencies. Through the product analysis, the estimation of the affected elements can be determined. The Organisation component contains the organisational technology standards and strategic planning. Technology standards refer to specific hardware and software criterion specified by the organisation, which have to be adhered to in any software development and maintenance projects. Each organisation possesses strategic plans such as policies that outline its roadmap and strategies to be taken in order to fulfil its vision and mission. To ensure software development strategies align with organisational strategies, any change implementation must be checked against both the technology standards and strategic plans set by the organisation. These requirements are considered when planning the effort, cost and schedule of change implementation.
5 80 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 V. CONCLUSION AND FUTURE WORK This paper has discussed the risk factors together with the corresponding risk elements concerning requirements change, which should be considered during impact analysis. They were gathered through a literature review and a focus group interview involving experts. The risk elements and factors form a risk model that could guide practitioners in assessing the risks of implementing requirements change. Rather than relying on conventional wisdom, practitioners could currently execute the impact analysis more guided and systematically. The study was broad-brush and qualitative. The findings should therefore be refined and strengthen further by confirming the risk elements and factors quantitatively through a large scale survey. In addition, the quantitative analysis enables the generation of specific metrics for measuring the risk elements and factors. The model could then be extended as a risk measurement model for requirements change initiatives. ACKNOWLEDGEMENT This work was funded by Universiti Kebangsaan Malaysia (UKM-GUP ). People User (Involvement; Knowledge; Cooperation; Readiness; Commitment) Require Project Team (Skills; Knowledge; Experience; Motivation; Commitment) Top Management (Commitment; Support) Third Party (Number of third party involved; Dependency to external agents) Issue Change Request Analyze Estimate Process Identification of Change (Reason; Type; Source) Planning of Change Implementation (Effort; Schedule; Cost) Refer Product (Existing) Software (Source Code; Software Architecture; Tools; Documentation; Integration; Interface) Affect Hardware (Memory space; CPU Performance; Platform; Integration; Interface) Organization Technology Standards (Software; Hardware) Strategic Planning (Policy; Goal) Figure 2. A Risk Model of Requirements Change Impact Analysis
6 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY REFERENCES [1] M. K. Gungor, E. Elbasi, and J. W. Fawcett, New change impact factor estimation in software, Turk J Elec Eng Comp Sci, vol. 20, no. 1, pp. 1 14, [2] M. W. Bhatti, F. Hayat, and S. Ahmed, An Investigation of Changing Requirements with respect to Development Phases of a Software Project, Inf. Syst., pp , [3] B. J. Williams and P. B. J. Williams, Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements, 2006 Int. Conf. Softw. Eng. Res. Pract., [4] T. Abdullah, A. Mateen, and T. Mustafa, Risk Analysis of Various Phases of Software Development Models, Eur. J. Sci. Res., vol. 40, no. 3, pp , [5] B. W. Boehm, Software Risk Management: Principles and Practices, IEEE Softw., vol. 8, no. 1, pp , [6] J. A. Wickboldt, A. Bianchin, R. C. Lunardi, G. Andreis, W. Luis, C. B. Both, L. Z. Granville, L. P. Gaspary, D. Trastour, and C. Bartolini, Improving IT Change Management Processes with Automated Risk Assessment, Ifip Int. Fed. Inf. Process., pp , [7] H. O. Ali, M. Z. A. Rozan, and A. M. Sharif, Identifying challenges of change impact analysis for software projects, Int. Conf. Innov. Manag. Technol. Res., pp , May [8] M. W. Bhatti, F. Hayat, and S. Ahmed, A Methodology to Manage the Changing Requirements of a Software Project, Inf. Syst., pp , [9] B. B. Chua and J. Verner, Examining Requirements Change Rework Effort: A Study, Int. J. Softw. Eng., vol. 1, no. 3, pp , Jul [10] S. Park and D. Hwan Bae, An Approach to Analyzing the Software Process Change Impact Using Process Slicing and Simulation, J. Syst. Softw., vol. 84, pp , [11] B. Alenljung and A. Persson, Portraying the practice of decision-making in requirements engineering: a case of large scale bespoke development, Requir. Eng., vol. 13, no. 4, pp , Aug [12] N. Nurmuliani, D. Zowghi, and S. P. Williams, Requirements Volatility and Its Impact on Change Effort: Evidence-based Research in Software Development Projects, AWRE 2006, [13] H. Kaiya, K. Hara, K. Kobayashi, A. Osada, and K. Kaijiri, Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques, IEEE 35th Annu. Comput. Softw. Appl. Conf. Work., pp , Jul [14] U. Vora, Change Impact Analysis and Software Evolution Specification for Continually Evolving Systems, 2010 Fifth Int. Conf. Softw. Eng. Adv., pp , [15] T. M. Pigoski, Software Maintenance, in in The Guide to the Software Engineering Body of Knowledge (SWEBOK), no. May, 2001, pp [16] N. F. Schneidewind, Predicting risk as a function of risk factors, Innov. Syst. Softw. Eng., vol. 1, pp , Mar [17] N. F. Schneidewind, Investigation of the Risk to Software Reliability and Maintainability of Requirements Changes, Proceedings. IEEE Int. Conf. Softw. Maint., pp , [18] N. Nurmuliani, D. Zowghi, and S. P. Williams, Using card sorting technique to classify requirements change, Proceedings. 12th IEEE Int. Requir. Eng. Conf , pp , [19] W.-M. Han and S.-J. Huang, An empirical analysis of risk components and performance on software projects, J. Syst. Softw., vol. 80, pp , [20] L. Wallace and M. Keil, Software project risks and their effect on outcomes, Commun. ACM, vol. 47, no. 4, pp , Apr [21] B. B. Chua, Rework Requirement Changes in Software Maintenance, Int. Conf. Softw. Eng. Adv., pp , [22] J. F. Hoorn, E. A. Konijn, H. van Vliet, and G. van der Ver, Requirement Change: Fear Dictate the Must Haves; Desires the Won t Have, J. Def. Softw. Eng., vol. 80, pp , [23] Z. Jiayi, L. Yunjuan, and G. Yuesheng, The Requirements change Analysis for Different level users, Int. Symp. Intell. Inf. Technol. Appl. Work., pp , [24] S. Foo and A. Muruganantham, Software risk assessment model, IEEE, pp , [25] R. Schmidt, K. Lyytinen, M. Keil, and P. Cule, Identifying Software Project Risk: An International Delphi Study, Jounal Manag. Inf. Syst., vol. 17, no. 4, pp. 5 36, [26] R. Reboucas, J. Sauve, A. Moura, C. Bartolini, and D. Trastour, A decision support tool to optimize scheduling of IT changes, 10th IFIP/IEEE Int. Symp. Integr. Netw. Manag., pp , [27] R. Lagerstrom, L. M. von Wurtemberg, H. Holm, and O. Luczak, Identifying factors affecting software development cost and productivity, Softw. Qual. J., pp. 1 23, [28] M. A. Rahman, R. Razali, and D. Singh, A Conceptual Model of Impact Analysis for Requirements Change, AWERProcedia Inf. Technol. Comput. Sci., vol. 03, pp , [29] R. A. Krueger and M. A. Caser, A Practical Guide for Applied Research, Fourth Edi. Thousand Oaks CA: Sage Publications., [30] C. Canada and M. Rd, Studying Software Engineers: Data Collection Techniques for Software Field Studies, Empir. Softw. Eng., vol. 10, pp , [31] J. Kontio, J. Bragge, and L. Lehtola, The Focus Group Method as an Empirical Tool in Software Engineering, Springer, no. 2004, pp , [32] G. Stark, A. Skillicorn, and 1st Lt Ryan Ameele, An Examination of the Effects of Requirements Changes on Software Releases, J. Def. Softw. Eng., no. December, pp , [33] P. Rovegard, L. Angelis, and C. Wohlin, An Empirical Study on Views of Importance of Change Impact Analysis Issues, IEEE Trans. Softw. Eng., vol. 34, no. 4, pp , [34] M. A. Babar, L. Bass, and I. Gorton, Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation, Springer-Verlag Berlin Heidelb., pp , [35] K. H. Krippendorff, Content Analysis: An Introduction to Its Methodology, Second Edi. London: Sage Publications, Inc, 2004.
Strength and Weakness of Software Risk Assessment Tools
, pp.389-398 http://dx.doi.org/10.14257/ijseia.2014.8.3.35 Strength and Weakness of Software Risk Assessment Tools Abdullahi Mohamud Sharif 1, Shuib Basri 2 and Hassan Osman Ali 3 1,2 Universiti Teknologi
Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong
Top Ten Lists of Software Project Risks : Evidence from the Literature Survey Tharwon Arnuphaptrairong Abstract Software risk management is crucial for the software development s. It is used for planning
Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation
www.ijcsi.org 170 Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation Bushra Sharif 1, Dr. Shoab A. Khan 2, Muhammad Wasim Bhatti 3 1&2 Department of Computer
UML-based Conceptual Design Approach for Modeling Complex Processes in Web Application
UML-based Conceptual Design Approach for Modeling Complex Processes in Web Application Siti Azreena Mubin Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 Serdang,
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements Byron J. Williams Jeffrey Carver Ray Vaughn Department of Computer Science and Engineering Mississippi State University
A Case Study on Benefits and Side-Effects of Agile Practices in Large-Scale Requirements Engineering
A Case Study on Benefits and Side-Effects of Agile Practices in Large-Scale Requirements Engineering Elizabeth Bjarnason, Krzysztof Wnuk, Björn Regnell Department of Computer Science, Lund University,
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates
A Framework for Software Product Line Engineering
Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product
Performance Management Systems: Conceptual Modeling
2011 International Conference on Economics and Business Information IPEDR vol.9 (2011) (2011) IACSIT Press, Bangkok, Thailand Performance Management Systems: Conceptual Modeling Dmitry Isaev Business Analytics
Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations
Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations Mennatallah H. Ibrahim Department of Computers and Information Sciences Institute
Requirements Volatility in Software Development Process
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4, September 2012 Requirements Volatility in Software Development Process M.P.Singh, Rajnish Vyas Abstract-
Usability Evaluation of Universities Websites
1 Jabar M. A., 2Usman Abbas Usman, 3Sidi F. Department of Information System, marzanah@ upm.edu.my 2 Department of Information System, [email protected] 3 Department of Computer Science, fatimah@
Modelling Knowledge in Business Processes: a Case Study of Croatian Banks
Modelling Knowledge in Business Processes: a Case Study of Croatian Banks Vesna Bosilj Vuksic University of Zagreb, Graduate School of Economics and Business Department of Information Science and Business
A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider
A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider By Tiago Coelho, Sara Paiva Instituto Politécnico de Viana do Castelo, Viana
Software Engineering Practices in Jordan
Software Engineering Practices in Jordan Nuha El-Khalili Faculty of Information Technology, University of Petra, Amman, Jordan [email protected] Dima Damen Faculty of Information Technology, University
Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase
Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase NAZRI KAMA, MEHRAN HALIMI Advanced Informatics School Universiti Teknologi Malaysia 54100, Jalan
PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS
PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS Martin Tomanek and Jan Juricek Department of Systems Analysis, University of Economics, Prague, Czech Republic ABSTRACT There is a lack
A Variability Viewpoint for Enterprise Software Systems
2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,
Software Risk Management Practice: Evidence From Thai Software Firms
, March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management
International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:
Chapter 2 Climbing the Stairway to Heaven : Evolving From Agile Development to Continuous Deployment of Software
Chapter 2 Climbing the Stairway to Heaven : Evolving From Agile Development to Continuous Deployment of Software Helena Holmström Olsson and Jan Bosch Abstract Software-intensive systems companies need
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
Process-Family-Points
Process-Family-Points Sebastian Kiebusch 1, Bogdan Franczyk 1, and Andreas Speck 2 1 University of Leipzig, Faculty of Economics and Management, Information Systems Institute, Germany [email protected],
ANALYZING THE SIGNIFICANCE OF RE-ENGINEERING THE BUSINESS PROCESS IN CORPORATE STRATEGY
International Journal of Economics, Commerce and Management United Kingdom Vol. III, Issue 2, Feb 2015 http://ijecm.co.uk/ ISSN 2348 0386 ANALYZING THE SIGNIFICANCE OF RE-ENGINEERING THE BUSINESS PROCESS
Intercoder reliability for qualitative research
Intercoder reliability for qualitative research You win some, but do you lose some as well? TRAIL Research School, October 2012 Authors Niek Mouter, MSc and Diana Vonk Noordegraaf, MSc Faculty of Technology,
Measuring Service Supply Chain Management Processes: The Application of the Q-Sort Technique
International Journal of Innovation, and Technology, Vol. 2, No. 3, June 2011 Measuring Service Supply Chain Processes: The Application of the Q-Sort Technique Sakun Boon-itt and Chanida Pongpanarat Abstract
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Project Management Practices: The Criteria for Success or Failure
234 Iman Attarzadeh Siew Hock Ow Department of Software Engineering Faculty of Computer Science & Information Technology University of Malaya, 50603 Kuala Lumpur, MALAYSIA Email: [email protected],
An empirical research to the relationship between software product management and software project management
An empirical research to the relationship between software product management and software project management Christina Manteli 1, Inge van de Weerd 1, Sjaak Brinkkemper 1 1 Department of Information and
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
of Business Process Modelling at Suncorp
Project Report No. 1 A Study of the Use of Business Process Modelling at Suncorp - Initial Insights - Naif Hassan Alzubidi Jan Recker Eike Bernhard A Study of the Use of Business Process Modelling at Suncorp.
Empirical Software Engineering Introduction & Basic Concepts
Empirical Software Engineering Introduction & Basic Concepts Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems [email protected]
AN OVERVIEW OF INDUSTRIAL SOFTWARE DOCUMENTATION PRACTICES
AN OVERVIEW OF INDUSTRIAL SOFTWARE DOCUMENTATION PRACTICES Marcello Visconti 1 Departamento de Informática Universidad Técnica Federico Santa María Valparaíso, CHILE [email protected] Curtis R. Cook
Spreadsheet simulation for industrial application: a case study
Spreadsheet simulation for industrial application: a case study Wan Hasrulnizzam Wan Mahmood a,b,1 a Faculty of Manufacturing Engineering, Universiti Teknikal Malaysia Melaka, Locked Bag 1752, Durian Tunggal
Adapting an Enterprise Architecture for Business Intelligence
Adapting an Enterprise Architecture for Business Intelligence Pascal von Bergen 1, Knut Hinkelmann 2, Hans Friedrich Witschel 2 1 IT-Logix, Schwarzenburgstr. 11, CH-3007 Bern 2 Fachhochschule Nordwestschweiz,
Evaluating the effects of communication in construction project delivery in Nigeria
Global Journal of Environmental Science and Technology: ISSN-2360-7955, Vol. 2(5): pp 048-054, June, 2014. Copyright 2014 Spring Journals Full Length Research Paper Evaluating the effects of communication
The Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2
The Concept of Project Success What 150 Australian project managers think D Baccarini 1, A Collins 2 1 Curtin University of Technology, Perth, Western Australia 2 Broad Construction Services, Perth, Western
Time Error in Project Management: A Case Study in Yanbu, Saudi Arabia
Business and Management Studies Vol. 2, No. 1; March 2016 ISSN 2374-5916 E-ISSN 2374-5924 Published by Redfame Publishing URL: http://bms.redfame.com Time Error in Project Management: A Case Study in Yanbu,
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Different Approaches using Change Impact Analysis of UML Based Design for Software Development
Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro
Investigating Role of Service Knowledge Management System in Integration of ITIL V3 and EA
Investigating Role of Service Knowledge Management System in Integration of ITIL V3 and EA Akbar Nabiollahi, Rose Alinda Alias, Shamsul Sahibuddin Faculty of Computer Science and Information System Universiti
Key Success Factors of elearning in Education: A Professional Development Model to Evaluate and Support elearning
US-China Education Review A 9 (2012) 789-795 Earlier title: US-China Education Review, ISSN 1548-6613 D DAVID PUBLISHING Key Success Factors of elearning in Education: A Professional Development Model
Model of Learning Organizational Development of Primary School Network under the Office of Basic Education Commission
International Education Studies; Vol. 8, No. 7; 2015 ISSN 1913-9020 E-ISSN 1913-9039 Published by Canadian Center of Science and Education Model of Learning Organizational Development of Primary School
Improving Change Management Systems and Processes
Improving Change Management Systems and Processes Marko Jäntti, Juha Niskala School of Computing University of Eastern Finland P.O.B 1627, 70211 Kuopio, Finland Email: [email protected] Abstract IT service
Elite: A New Component-Based Software Development Model
Elite: A New Component-Based Software Development Model Lata Nautiyal Umesh Kumar Tiwari Sushil Chandra Dimri Shivani Bahuguna Assistant Professor- Assistant Professor- Professor- Assistant Professor-
Using Productivity Measure and Function Points to Improve the Software Development Process
Using Productivity Measure and Function Points to Improve the Software Development Process Eduardo Alves de Oliveira and Ricardo Choren Noya Computer Engineering Section, Military Engineering Institute,
Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia
2014 IEEE 6th International Conference on Cloud Computing Technology and Science Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia Nouf Alkhater Gary Wills Robert
COMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES & HASIBUAN METHODOLOGY
COMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES & HASIBUAN METHODOLOGY M. Hilman, F. Setiadi, I. Sarika, J. Budiasto, and R. Alfian Faculty of Computer Science,
Transitioning Towards Continuous Delivery in the B2B Domain: A Case Study
Transitioning Towards Continuous Delivery in the B2B Domain: A Case Study Olli Rissanen 1,2, Jürgen Münch 1 1 Department of Computer Science, University of Helsinki, P.O. Box 68, FI-00014 University of
Rochester Institute of Technology Master's Thesis Guidelines for Students and Faculty
Rochester Institute of Technology Master's Thesis Guidelines for Students and Faculty The objective of this document is to provide guidance for students and faculty committees concerning the planning,
Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results
, pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department
Project Execution Guidelines for SESAR 2020 Exploratory Research
Project Execution Guidelines for SESAR 2020 Exploratory Research 04 June 2015 Edition 01.01.00 This document aims at providing guidance to consortia members on the way they are expected to fulfil the project
Enterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
Managing Requirement Risks in Global Software Development
Managing Requirement Risks in Global Software Development Aurangzeb Khan Dr. Farooque Azam Muhammad Shoaib Zafar ABSTRACT Now a day s trend toward software development is changed and Software organizations
Available online at www.sciencedirect.com. ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 220 226 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) The Benefits of Enterprise
The use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
The Extent of ERP Customization towards User Satisfaction in Daily Operation for Manufacturing Companies
1788 JOURNAL OF COMPUTERS, VOL. 8, NO. 7, JULY 2013 The Extent of ERP Customization towards User Satisfaction in Daily Operation for Manufacturing Companies Kasturi Kanchymalay Faculty of Information and
International group work in software engineering
International group work in software engineering Julian M. Bass Robert Gordon University Aberdeen, UK [email protected] J. T. Lalchandani IIIT-B Bangalore, India [email protected] R. McDermott Robert Gordon
Chapter 1 Introduction to the Study
` Chapter 1 Introduction to the Study 1.1. Introduction The convergence of computer and communications technologies of the late 20th century has profoundly affected information creation, distribution,
Office of the Auditor General of Canada. Internal Audit of Document Management Through PROxI Implementation. July 2014
Office of the Auditor General of Canada Internal Audit of Document Management Through PROxI Implementation July 2014 Practice Review and Internal Audit Her Majesty the Queen in Right of Canada, represented
A Study on Risk Assessment for Small and Medium Software Development Projects
A Study on Risk Assessment for Small and Medium Software Development Projects Abdullahi Mohamud Sharif and Shuib Basri Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia.
Donnellan, Brian Gleasure, Rob Helfert, Markus Kenneally, Jim Rothenberger, Marcus Chiarini Tremblay, Monica VanderMeer, Debra Winter, Robert
Title Author(s) Editor(s) ITSM ProcessGuide a longitudinal and multi-method field study for real-world DSR artifact evaluation Morana, Stefan; Schacht, Silvia; Gerards, Timo; Maedche, Alexander Donnellan,
IT Service Management and Normatively Regulated Activities
IT Service Management and Normatively Regulated Activities DZENANA DONKO, ISMET TRALJIC Faculty of electrical engineering University of Sarajevo, Zmaja od Bosne bb, Kampus Univerziteta, 71000 Sarajevo
The KPI Development Framework for ICTSQ Measurement
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The KPI Development Framework for ICTSQ Measurement Rozi Nor Haizan, Nor 1+,
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
Improving Traceability of Requirements Through Qualitative Data Analysis
Improving Traceability of Requirements Through Qualitative Data Analysis Andreas Kaufmann, Dirk Riehle Open Source Research Group, Computer Science Department Friedrich-Alexander University Erlangen Nürnberg
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
Errors in Operational Spreadsheets: A Review of the State of the Art
Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College [email protected] Kenneth R. Baker Tuck School of Business Dartmouth College
Test-Driven Automation: Adopting Test-First Development to Improve Automation Systems Engineering Processes
Test-Driven Automation: Adopting Test-First Development to Improve Automation Systems Engineering Processes Dietmar Winkler Stefan Biffl Thomas Östreicher Institute of Software Technology and Interactive
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security Thamer Omar Alhussain Bachelor of Computing, Master of ICT School of Information and Communication Technology
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,
BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
