skip to main content
10.1145/337180.337226acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article
Free Access

Characterization of risky projects based on project managers' evaluation

Authors Info & Claims
Published:01 June 2000Publication History

ABSTRACT

During the process of software development, senior managers often find indications that projects are risky and take appropriate actions to recover them from this dangerous status. If senior managers fail to detect such risks, it is possible that such projects may collapse completely.

In this paper, we propose a new scheme for the characterization of risky projects based on an evaluation by the project manager. In order to acquire the relevant data to make such an assessment, we first designed a questionnaire from five viewpoints within the projects: requirements, estimations, team organization, planning capability and project management activities. Each of these viewpoints consisted of a number of concrete questions. We then analyzed the responses to the questionnaires as provided by project managers by applying a logistic regression analysis. That is, we determined the coefficients of the logistic model from a set of the questionnaire responses. The experimental results using actual project data in Company A showed that 27 projects out of 32 were predicted correctly. Thus we would expect that the proposed characterizing scheme is the first step toward predicting which projects are risky at an early phase of the development.

References

  1. 1.V. R. Basili, L. C. Briand and W. L. Melo, "A validation of object-oriented metrics as quality indicators," IEEE Trans. on Software Eng., vol. 22, no.10, pp.751- 761, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.L. C. Briand, V. R. Basili and C. Hetmanski, "Developing interpretable models with optimized set reduction for identifying high risk software components," IEEE Trans. Software Eng., vol.19, no. 11, pp.1028- 1044, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.E. H. Conrow and P. S. Shishido, "Implementing risk management on software intensive projects," IEEE Software, Vol.14, No.3, pp.83-89, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.R. Fairley and P. Rook, "Risk management for software development," In Software Engineering, IEEE CS Press, pp.387-400, 1997.Google ScholarGoogle Scholar
  5. 5.N. E. Fenton and S. L. Pfleeger, Software Metrics A Rigorous & Practical Approach, PWS Publishing, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.W. S. Humphrey, Managing the Software Process, Addison Wesley, Reading, MA, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.W. S. Humphrey, A Discipline for Software Engineering, Addison Wesley, Reading, MA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.D. W. Karolak, Software Engineering Risk Management, IEEE CS Press, CA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.O. Mizuno, T. Kikuno, K. Inagaki, Y. Takagi and K. Sakamoto, "Analyzing effects of cost estimation accuracy on quality and productivity," In Proc. 20th International Conference on Software Engineer-ing( ICSE'98), pp.410-419, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.O. Mizuno and T. Kikuno, "Empirical evaluation of review process improvement activities with respect to post-release failure," In Summary of Empirical Studies on Software Development Engineering(ICSE'99 Workshop), pp.50-53, 1999.Google ScholarGoogle Scholar
  11. 11.J. Munson and T. Khoshgoftaar, "The detection of fault-prone programs," IEEE Trans. Software Eng., vol.18, no.5, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.F. J. Sisti and S. Joseph, "Software risk evaluation method version 1.0," Technical Report CMU/SEI-94- TR-19, Software Engineering Institute, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.Y. Takagi, T. Tanaka, N. Niihara, K. Sakamoto, S. Kusumoto and T. Kikuno, "Analysis of review's effectiveness based on software metrics," In Proc. 6th International Symposium on Software Reliability Engineering(ISSRE'95), pp.34-39, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14.T. Tanaka, K. Sakamoto, S. Kusumoto and T. Kikuno, "Improvement of software process by process visualization and benefit estimation," In Proc. 17th International Conference on Software Engineer-ing( ICSE'95), pp.123-132, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.E. Yourdon, Death March : The Complete Software Developer's Guide to Surviving 'Mission Impossible' Projects, Prentice Hall Computer Books, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Characterization of risky projects based on project managers' evaluation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICSE '00: Proceedings of the 22nd international conference on Software engineering
            June 2000
            843 pages
            ISBN:1581132069
            DOI:10.1145/337180

            Copyright © 2000 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 2000

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate276of1,856submissions,15%

            Upcoming Conference

            ICSE 2025

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader