WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 109 | 110 || 112 | 113 |   ...   | 156 |

«VOLUM E 1 1, N UM B E R 1 I S SN 2 1 6 8 - 0 6 1 2 F L ASH DR I V E I S SN 1 9 4 1 - 9 5 8 9 ON L I N E T h e In s t it ut e f o r Bu s i n e s s an ...»

-- [ Page 111 ] --

2015) have now developed solutions to manage IS project risk management. This paper provides a review of current literature on information system development that may prove useful for management professionals interested in initiating project risk management efforts within IS projects. An overview is provided of the underlying philosophies and principles of IS development, followed by a brief overview of the literature on risk mature organizations/projects. This body of knowledge may be useful in future efforts to investigate and document current practices in IS development project risk management.

NEED FOR SYSTEMS RISK MANAGEMENT

The role of IT in business activities has been more and more important; besides, the amount of its investment is also increasing. The key of operating businesses more effectively is to base on the operating principles and to play the role of IT systems. The application of IT systems can not only apply to business operations and maintenance, but also to social services and business competition (Zhe, Yunfei, Maosheng, 2010).

With the proliferation of computers and near universal network connectivity, the field of information technology has continued to shift from a focus on standalone personal computing to developing solutions to support people and the systems within which they work in collaboration activities. Network technology and global information systems have provided the opportunity for people to conduct work GCBF ♦ Vol. 11 ♦ No. 1 ♦ 2016 ♦ ISSN 1941-9589 ONLINE & ISSN 2168-0612 USB Flash Drive 464 Global Conference on Business and Finance Proceedings ♦ Volume 11 ♦ Number 1 in a variety of locations continuing to further increase the appeal of IT initiated collaboration and communication. As well, organizational systems have expanded, moving from a localized to an increasingly global presence.

According to Laudon and Laudon (2014) organizations should take actions that produce the least harm or the least potential con (Risk Aversion Principle). Some actions have high failure costs like building a nuclear plant in an urban area. They recommend avoiding high-failure cost actions, paying greater attention to high-failure-cost potential of moderate to high probability.

The unpredictable and nature of software development creates risks to organizations. The Standish Group (2009) reports that only 32 percent of information systems projects are successful base on success criteria

of:

1. Completed on time

2. Completed within budget

3. Completed with the required functionality Laudon and Laudon (2014) state to develop an effective systems development plan an organization must have a clear understanding of both its short and long term information requirements. Companies should look at the portfolio of their projects in terms of benefit verses risk. Certain projects should be developed rapidly while others should be avoided.

According to Turbit (2013) risk need to be quantified in two dimensions. The impact of the risk needs to be assessed. The probability of the risk occurring needs to be assessed. For simplicity, rate each on a 1 to 4 scale. The larger the number, the larger the impact or probability.

The figure below by Laudon and Laudon (2014) show a method of doing Portfolio Analysis.

–  –  –

Laudon and Laudon (2014) also state a scoring model can be useful where many criteria must be evaluated.

The model assigns weights to features of the system then calculates the weighted totals. According to Turbit (2013) risk need to be quantified in two dimensions. The impact of the risk needs to be assessed. The probability of the risk occurring needs to be assessed. For simplicity, rate each on a 1 to 4 scale. The larger the number, the larger the impact or probability.

The current direction of the risk management field is to promote learning and creative ways to conduct project risk management for organizational learning. Project management efforts have led to a growing GCBF ♦ Vol. 11 ♦ No. 1 ♦ 2016 ♦ ISSN 1941-9589 ONLINE & ISSN 2168-0612 USB Flash Drive 465 Global Conference on Business and Finance Proceedings ♦ Volume 11 ♦ Number 1 conceptualization and understanding of the process of assessing and identifying risks to be used in the introduction of experience-based solutions for avoiding and preventing risk damage. According to these authors, the risk knowledge bases are expected to grow as experience about risks and potential risk responses are recorded during project executions. The resulting knowledge base will eventually provide assimilated information to organizations and those engaged in project risk management with access to information and understanding about risks in real time.

DEVELOPMENT PRINCIPLES

According to Achimuga, Babajide, Oluwaranti, Oluwagbemi, Gambo (2010) the outcomes of an IS project are identified as the success of 1) IS implementation, 2) IS investment, and 3) IS functionality. IS Evaluation should not work only as a justification mechanism but as a tool for experience learning. During the IS development process, feedback from the evaluation process should lead to corrective actions if necessary.

These actions might include, for example, a change in the information system development or procurement strategy, or a change in the resources that are given to the project.





As IT has continued to grow rapidly, there has been an increasing demand for IS development innovation to be driven by inter-disciplinary research. This need, according to Rasegard (1997), has been brought about by the desire to achieve higher usability. As such, information systems need to be able to satisfy

requirements in several dimensions, including:

1. Appropriate functionality: the system solves the right problems, communicate its purpose, and performs the work that has to be carried out.

2. Ergonomic: appropriate physical fit, feel, shape and size.

3. Cognitive fit: the product provides functionality, feedback, support for learning, and accessible understanding.

According to IEEE Standard 1540 for software management (2001) to evaluate the risk management process this activity should include the capture of risk management information, have the ability to access and improve the process and create lessons learned.

GCBF ♦ Vol. 11 ♦ No. 1 ♦ 2016 ♦ ISSN 1941-9589 ONLINE & ISSN 2168-0612 USB Flash Drive 466 Global Conference on Business and Finance Proceedings ♦ Volume 11 ♦ Number 1

DEVELOPMENT APPROACHES

According to Laudon and Laudon (2014) information technology can promote various degrees of organizational change. The four types include: automation, rationalization, redesign and paradigm shifts.

“The most common forms of organizational change are automation and rationalization. These are relatively slow moving and slow changing strategies present modest returns but little risk. Faster and more comprehensive change – such as redesign and paradigm shifts – carries high rewards but offers substantial chances of failure.

With the growing recognition that IS plays a major role in insuring the success of virtually all organizations in business, government, and defense, awareness has also increased that such success is dependent on the availability and correct functioning of large-scale networked information systems of astonishing complexity. Consequently, the SDLC model has become the context for further development of IS development requirements that focus on system survivability (i.e., end products that survive).

The Carnegie Mellon Software Engineering Institute (2002) has developed an IS development approach, the Survivable Systems Analysis (SSA) method (formerly the Survivable Network Analysis method), that focuses on the application of requirements in development and implementation to insure an end product capable of survivability. According to the Institute, SSA is a practical engineering process that permits systematic assessment of the survivability properties of proposed systems, existing systems, and modifications to existing systems. As delineated by the Institute, the SSA process is composed of four steps,

as follows:

1. System Definition: developing an understanding of mission objectives, requirements for the current or new system, structure and properties of the system architecture, and risks in the operational environment

2. Essential Capability Definition: identification of (as based on mission objectives and failure consequences) essential services (i.e., services that must be maintained during attack) and essential assets (i.e., assets whose integrity, confidentiality, availability, and other properties must be maintained during attack) as characterized by usage scenarios, which are traced through the architecture to identify essential components whose survivability must be ensured

3. Compromisable Capability Definition: selection of intrusion scenarios based on assessment of environmental risks and intruder capabilities and identification of corresponding compromisable components (components that could be penetrated and damaged by intrusion)

4. Survivability Analysis: analysis of IS components and the supporting architecture for the key survivability properties of resistance, recognition, and recovery; the production of a survivability map that enumerates, for every intrusion scenario and corresponding compromised component effects, the current and recommended IS architecture strategies for resistance, recognition, and recovery.

One such model is that known as the Prototyping model. According to the CTG (1998), the Prototyping model was developed as a means to compensate for some of the problems identified as associated with the SLDC model. The Prototyping model is based on the assumption that it is often difficult to know all IS requirements during the beginning phases of a project. Through the application of the Prototyping model in IS development, the developer builds a framework of the proposed system and presents it to the customer for consideration as part of the development process. The customer in turn provides feedback to the developer, who goes back to refine the prototype to incorporate the additional information. This collaborative process continues until the prototype is developed into a system that can be implemented. As GCBF ♦ Vol. 11 ♦ No. 1 ♦ 2016 ♦ ISSN 1941-9589 ONLINE & ISSN 2168-0612 USB Flash Drive 467 Global Conference on Business and Finance Proceedings ♦ Volume 11 ♦ Number 1 reported by the CTG, the Prototyping model is probably the most imitated IS development. Variations of the model include: Rapid Application Development (RAD) and Joint Application Development (JAD).

According to Jutte (2015) there are 10 golden rules of project risk management. The benefits of risk management in projects are huge. You can gain a lot of money if you deal with uncertain project events in a proactive manner. The result will be that you minimize the impact of project threats and seize the opportunities that occur. This allows you to deliver your project on time, on budget and with the quality results your project sponsor demands. Also your team members will be much happier if they do not enter a "fire fighting" mode needed to repair the failures that could have been prevented.

The 10 golden rules to apply risk management successfully in your project (Jutte, 2015):

–  –  –

Other vendors like Intaver (2015) have solutions for organizations IS project risk management RiskyProject: Project Risk Management and Schedule Risk Analysis that work independently or with

Microsoft Project. Their project risk management software has the following capabilities:

Project scheduling with risks and uncertainties Risk Register: threats, opportunities, and issues Monte Carlo schedule risk analysis Integrated schedule and cost risk analysis Risk probability vs. impact matrix Risk mitigation analysis, waterfall charts Integration with Microsoft® Project and Oracle® Primavera Sensitivity Analysis: critical Risks and crucial Tasks Risk correlations, probabilistic branching, probabilistic calendars

Intaver (2015) RiskyProject schedule risk analysis software has the following capabilities:

Schedule Risk Analysis is a method of analysis of uncertainties in the project schedules.

RiskyProject a comprehensive and easy to use schedule risk analysis software and integrates cost and schedule risk analysis and risk management in one package.

Includes Event Chain Methodology which is a project schedule risk analysis technique. Event chain methodology is the next advance beyond Critical Path Method and Critical Chain Project Management.

KNOWLEDGE AND STANDARDS

Conflict is a pervasive phenomenon during the information systems (IS) development process. The sources of conflict during the IS development process include hostility and jealousy, poor communication, user GCBF ♦ Vol. 11 ♦ No. 1 ♦ 2016 ♦ ISSN 1941-9589 ONLINE & ISSN 2168-0612 USB Flash Drive 468 Global Conference on Business and Finance Proceedings ♦ Volume 11 ♦ Number 1 resistance, frustration and low morale, lack of trust and understanding, personality diversity, and different expectations. The critical role played by conflict in IS development projects is widely acknowledged in the IS. Unfortunately, our understanding of the impact of conflict on IS project outcomes is still limited due to conflicting results reported in the literature (Liu, Chen, Klein Jiang, (2009).

Systems differ in their size, scope and complexity as well as their organizational and technical components (Laudon and Laudon (2014). The level of project risk is influenced by size, structure and technical expertise of the IS staff and project team.



Pages:     | 1 |   ...   | 109 | 110 || 112 | 113 |   ...   | 156 |


Similar works:

«[PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT FILED U.S. COURT OF APPEALS ELEVENTH CIRCUIT No. 07-10348 JAN 07 2008 THOMAS K. KAHN CLERK D.C. Docket No. 05-00133 CV-3-RV-EMT ROBIN DOYLE, Plaintiff-Appellant, versus LIBERTY LIFE ASSURANCE COMPANY OF BOSTON, Defendant-Appellee. Appeal from the United States District Court for the Northern District of Florida (January 7, 2008) Before BIRCH, BARKETT and COX, Circuit Judges. COX, Circuit Judge: I. INTRODUCTION The...»

«GUIDE SPECIFICATIONS FOR TENNIS COURT CONSTRUCTION INDEX Page INTRODUCTION 1 SECTION 1.0 TENNIS COURT CONTRACTORS 1 1.1 Selection Criteria 1 1.1.1 General 1 1.1.2 Developing Working Practices 1 1.1.3 Selection of Tennis Court Contractor 1 SECTION 2.0 CONDITIONS FOR CONSTRUCTION2 2.1 General 2 2.2 Contract Documents 2 2.2.1 Scope of Work 2 2.2.2 Permits 2 2.3 Guidelines for Site Preparation 2 2.3.1 Site Stripping and Clearance 2 2.3.2 Earthworks 2 2.3.3 Inspection and Testing 3 2.3.4 Finished...»

«10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10 14 Oct 2005, WE3A.4-6O (2005) MANAGEMENT SYSTEM BASED ON OPEN SOURCE TOOLS I. Verstovšek1, J. Kamenik1 Cosylab, Teslova 30, 1000 Ljubljana, Slovenia ABSTRACT Can cosiness and project management go together? As a result of the free spirit in research institutions, project management is mostly considered a necessary but awkward task. We present a working solution tailored to academic projects that requires...»

«1 Title: Phonological Differences between Japanese and English: Several Potentially Problematic Areas of Pronunciation for Japanese ESL/EFL Learners Author: Kota Ohata Indiana University of Pennsylvania Bio Statement Kota Ohata earned his B.A. degree from Kyoto University of Foreign Studies in 1994, a M.A. in TESOL from West Virginia University in 1996. After a few years of EFL teaching back in Japan, he returned to the U.S. for the pursuit of doctoral degree in the area of applied linguistics....»

«Handelshögskolan VID GÖTEBORGS UNIVERSITET Institutionen för informatik 2004-02-21 HOW TO SOLVE THE “MILLION USER PROBLEM”? Identity and access management in a global environment Abstract Identity management and Access management are new concepts on the Internet, containing functionality as single-sign on and authentication. The need of those concepts is arising out of an enormous amount of possible users that are reached when companies put their core applications for easy access on the...»

«Special Notice Before using and/or reading any book published by BOOKYARDS.com, you must read and accept the following conditions: By using and reading any book published by BOOKYARDS.com, it is presumed that you have accepted the following conditions: BOOKYARDS goal is to promote and encourage a taste for reading in all people regardless of age. In the pursuit of this goal, BOOKYARDS has created a bank of books from different sources that are intended for people of all ages, including the...»

«Monitoring of Power Transformer Winding Temperature Using Robust Fiber Optic Sensing System ABSTRACT Direct measurement of actual transformer winding temperature using fiber optic thermometry has been increasing since the mid-1980s due to the growing need to accurately monitor the power transformer hot spot, predict load levels, and improve capacity utilization. While early fiber optic instruments and probes were delicate, resulting in unacceptably high failure rates, the development over the...»

«Public Disclosure Authorized No. 0314 Serie de Documentos de Discusión sobre la Protección Social Public Disclosure Authorized Transferencias focalizadas en los países pobres: Examen de las disyuntivas y opciones en materia de políticas Martin Ravallion Mayo 2003 Public Disclosure Authorized Unidad de la Protección Social Red de Desarrollo Humano El Banco Mundial Public Disclosure Authorized Los documentos de discusión sobre la protección social no son publicaciones formales del banco...»

«Using the Salesforce1 Mobile App Salesforce, Summer ’16 @salesforcedocs Last updated: July 28, 2016 © Copyright 2000–2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners.CONTENTS GET STARTED...................................................... 1 Welcome to the Salesforce1 Mobile...»

«The Mutual Housing Association of Hawai`i, Inc. 900 Fort Street Mall Suite 1690 Honolulu, Hawaii 96813 (808) 550-0804 BEST AND FINAL OFFER March 16, 2015 Proposal to Develop an Affordable Micro-Unit Housing Project at TMK 2-1-015: 014 630 Cooke Street, Honolulu, Hawai`i March 16, 2015 Mr. Anthony J. H. Ching, Executive Director Hawai`i Community Development Authority 345 Queen Street Honolulu, Hawai`i 96813 Dear Mr. Ching: Subject: Best and Final Offer No.: HCDA 04-2014 Micro Unit Housing...»

«introdUCtion Charles traub what will come? what will the future bring? i do not know. i have no presentiment. when a spider plunges from a fixed point to its consequences, it always sees before it an empty space where it can never set foot, no matter how it wriggles. it is that way with me: before me always an empty space; what drives me forward is a consequence that lies behind me. søren KierKeGAArd, EiTHER/OR, 1843 The camera is everywhere. Almost nothing in the web of human endeavor goes...»

«TESS COMPONENT LIBRARIES General Descriptions TABLE OF CONTENTS Table of Contents The Applications Component Library TYPE 514: THERMOSTAT CONTROLS TYPE 515: HEATING AND COOLING SEASON SCHEDULER TYPE 516: MULTIPLE DAY SCHEDULER TYPE 517: SINGLE DAY SCHEDULER TYPE 517_Normalized: SINGLE DAY SCHEDULER TYPE 518: MONTHLY SCHEDULER TYPE 519: HOLIDAY SCHEDULER TYPE 520: MULTIPLE THERMOSTAT CONTROLS The Controls Component Library TYPE 658: HUMIDISTAT TYPE 661: DELAYED OUTPUT DEVICE TYPE 698: 5-STAGE...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.