skip to main content
article
Free Access

A framework for identifying software project risks

Published:01 November 1998Publication History
First page image

References

  1. 1 Alter, S. and Ginzberg, M. Managing uncertainty in MIS implementation. Sloan Manage. Rev. 20, 1 (1978), 23-31.]]Google ScholarGoogle Scholar
  2. 2 Barki, H., Rivard, S., and Talbot, J. Toward an Assessment of Software Development Risk.J. Manage. Info. Syst. 10, 2 (1993), 203-225.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Boehm, B. and Ross, R. Theory-W software project management: principles and examples. IEEE Trans. Softw. Eng. 15, 7 (1989), 902-916.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Boehm, B.W. Software Risk Management: Principles and Practices. IEEE Softw. 8, 1 (1991), 32-41.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Charette, R.N. Software Engineering Risk Analysis and Management. Intertext, New York, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Johnson, j. Chaos: The dollar drain of IT project failures. Applic. Den. Trends 2, 1 (1995), 41-47.]]Google ScholarGoogle Scholar
  7. 7 Jones, C. Assessment and Control of Software Risks. Prentice-Hall, Englewood Cliffs, N.J., 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 McFarlan, F.W. Portfolio approach to information systems. Harvard Bus. Rev. 59, 5 (1981), 142-150.]]Google ScholarGoogle Scholar
  9. 9 Newman, M. and Sabherwal, R. Determinants of commitment to information systems development: A longitudinal investigation. MIS Q. 20,1 (1996).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Sauer, C. Understanding support--Lessons from a case study. AustrailianJ. Info. Syst. 1, 1 (1993), 63-74.]]Google ScholarGoogle Scholar
  11. 11 Schmidt, R.C. Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28 3 (Summer 1997), 763-774.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. 12 Schmidt, R.C., Lyytinen, K., Keil, M., and Cule, P. Identifying Software Project Risks: An International Delphi Study. Hong Kong University of Science and Technology Working Paper (1997).]]Google ScholarGoogle Scholar

Index Terms

  1. A framework for identifying software project risks

          Recommendations

          Reviews

          Sumit Sircar

          Software project failures are a critically important problem in industry. Unfortunately, the authors do not clarify what they mean by “failure.” Does it simply refer to canceled software projects, or does it also include projects that do not deliver what the users who commissioned them asked for__?__ Some people may be tempted to define failure as projects that are delivered over budget and after the promised delivery date, but this definition would include most computer systems! The authors conducted an international Delphi study of 40 managers in the US, Finland, and Hong Kong. The most important risk factors in all three locations were remarkably consistent: lack of top management commitment to the project; failure to gain user commitment; and misunderstanding the requirements. The approach uses a 2×2 matrix framework for viewing all risks; that is, it considers four risk categories. This allows all of the risk factors to be categorized according to two factors—perceived level of control <__?__Pub Caret>and perceived relative importance. The authors also provide some strategies for reducing the risk, even though many of the highest risks are in a category considered beyond the manager's control. Interestingly, only one of the final risk factors had to do with the technology itself. Although the topic is not explicitly addressed, the study also provides some insight into the skills project managers need in order to reduce the risk of failure.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 41, Issue 11
            Nov. 1998
            93 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/287831
            Issue’s Table of Contents

            Copyright © 1998 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 November 1998

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader