Risk Identification at the Interface between Business Case and Requirements
نویسندگان
چکیده
[Motivation:] The requirements engineering (RE) research community is aware of the importance of performing feasibility studies before starting requirements elicitation. Unfortunately, projects still frequently fail to achieve commercial success, responsibility is often unknown, and requirements engineers may be deemed responsible for mistakes made by others. [Problem:] There is neither empirical evidence available from a post-mortem risk analysis for projects that performed adequate RE but commercially failed nor guidance for requirements engineers on validating a business case analysis to mitigate this risk. [Principal idea:] By performing a post-mortem analysis of software development projects that failed to achieve commercial success, we investigate the root causes for the failures and, in most cases, trace the causes back to business case issues. We identify risk areas and provide practical due diligence guidance to the practitioner. [Contribution:] This exploratory case study performs an in-depth review of a detailed post-mortem analysis of three software development projects performed over a 2.5 year period. Each of the analyzed projects failed to make the expected transition to commercialization despite using appropriate RE techniques and achieving satisfactory deliverables. The analysis identifies risk factors that the RE practitioner should consider and we provide a checklist for RE practitioners to use when checking for these risks in an antecedent business case as part of their due diligence. A low-cost commercial viability assessment technique, employing Fermi approximation, is provided to equip the RE practitioner with a risk mitigation tool in the absence of business analyst resources.
منابع مشابه
پژوهشی در تأثیرگذاری ارزش پیشنهادی حوزه واسط مشتری، جهت طراحی مدل کسب و کار همراه با رویکرد BMO
Mobile commerce business models will be beneficial for customers if the proposed services include service usage at any location, ability to localize/personalize and comfort in using services. The objective of this research is to explain mobile commerce and design business model in customer interface and product using Osterwalder business model anthology. Hence, this research aims to design and ...
متن کاملResolving vulnerability identification errors using security requirements on business process models
Purpose – In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business asse...
متن کاملThe role of Real option in e-business Risk management: The case of E-treasury project
Implementing information technology projects requires a calculated process to prevent failure. At the same time application of information technology in organizations faces various potential risks. Exploring information technology environment in organizations reveals the potential risks and provides a structure for comprehensive risk management. There are various methods available for risk mana...
متن کاملThe role of Real option in e-business Risk management: The case of E-treasury project
Implementing information technology projects requires a calculated process to prevent failure. At the same time application of information technology in organizations faces various potential risks. Exploring information technology environment in organizations reveals the potential risks and provides a structure for comprehensive risk management. There are various methods available for risk mana...
متن کاملConceptual Framework for Business Process Engineering: Case Study
The paper discusses a conceptual framework applied in the requirements engineering process for eschool application, offering a service for information society. The e-school application is considered as a fusion of electronic business and mobile business contexts, containing three dynamic-generated Webinterfaces and SMS-interface. Implementation of this service requires changes in the school bus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013