IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 12, December 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Software Risk Management In Virtual Team Environment

[Full Text]

 

AUTHOR(S)

Salman Afaq, Salman Qadri, Shabir Ahmad, Abu Buker Siddique, Muhammad Perbat Baloch, Anam Ayoub

 

KEYWORDS

Index Terms: Risk Management, Risk Factor, Software Projects, Virtual Environment, Organization.

 

ABSTRACT

Abstract: Research on the major risk factors for traditional projects is abundant; however, despite research citing increased communication and trust issues in virtual environments, research on the major risks for projects conducted in virtual environments is scarce. This paper addresses that void by reporting on a research study of virtual project risk that culminated in a survey of 107 virtual project management practitioners from throughout the United States. Prior literature, in-person interviews and a focus group were used to develop a comprehensive list of fifty-five potential risk factors. Survey participants were asked to rate each of these potential risks, by considering the degree of impact it had on the successful completion of a recent virtual project in which they participated. Similar to past surveys focused on traditional software development projects, the goal of this research was to identify a set of major virtual project risks, those risks most likely to have the greatest impact on the successful completion of a virtual software development project. The results of this study will benefit project management practitioners in managing risk in a virtual project environment.

 

REFERENCES

[1] Powell, Anne, Gabriele Piccoli, and Blake Ives, "Virtual Teams: A Review of Current Literature and Directions for Future Research." The DATA BASE for Advances in INformation Systems 35, no.1 (Winter 2004): 6-36.

[2] Keil, Mark, P.E. Lyytinen, and R.C. Schmidt. "A Framework for Identifying Software Project Risks." Communications of the ACM 41, no. 11 (1998): 76-83.

[3] Szilagyi, Jeffery G. "Bank of America's Masternet System: A Case Study in Risk Assessment." Sloan School of Management (Sloan School of Management), 1992.

[4] Zmud, Robert W. "Management of Large Software Development Efforts." MIS Quarterly 4, no. 2 (June 1980): 45-55.

[5] Boehm, B.W. "Software Risk Management: Principles and Practices." IEEE Software, January 1991: 32-41.

[6] Wallace, Linda. The Development of an Instrument to Measure Software Project Risk. Atlanta, GA: Georgia State University College of Business, 1999.

[7] Potter, R E, R A Cooke, and P A Balthazard, "Virtual Team Interaction: Assessment, Consequences and Management." Team Performance Management 6, no. 7/8 (2000): 131-137.

[8] Stevenson, W, and E W McGrath. "Differences Between On-Site and Off-Site teams: Manager Perceptions." Team Performance Management 10, no. 5/6 (2004): 127-132.

[9] Jones, Robert, Robert Oyung, and Lise Pace, Working Virtually: Challenges of Virtual Teams. Hershey, PA: Cybertech Publishing, 2005.

[10] Mayer, Margery. The Virtual Edge: Embracing Technology for Distributed Project Team Success. Newtown Square, PA: Project Management Institute Headquarters, 1998.

[11] Lee-Kelley, Liz, and Tim Sankey. "Global Virtual Teams for Value Creation and Project Success: A Case Study." International Journal of Project Management 26 (2008): 51-62.

[12] Majchrzak, A., A. Malhotra, J. Stamps, and J.Lipnack. "Can Absence Make a Team Grow Stronger?" Harvard Business Review 82, no. 5 (2004): 131-137.

[13] Mitchell, Alanah, and Ilze Zigurs. "Trust in Virtual Teams: Solvedor Still a Mystery?" The DATABASE for Advances in Information Systems 40, no.3 (August 2009): 61-83.

[14] Ahmad, Shabir, and Bilal Ehsan. "The Cloud Computing Security Secure User Authentication Technique (Multi Level Authentication)." IJSER 4(12): 2166-2171 (2013).

[15] Majchrzak, Ann, et al. "Technology adaptation: The case of a computer-supported inter-organizational virtual team." MIS quarterly (2000): 569-600.

[16] Khan, Kamran, et al. "Evaluation of PMI’s Risk Management Framework and Major Causes of Software Development Failure in Software Industry." IJSTR 3(11): 120-124, 2014.

[17] Azam, Farooq, et al. "Framework Of Software Cost Estimation By Using Object Orientated Design Approach." IJSTR 3(8): 97-100, 2014.

[18] Baloch, Muhammad Perbat, et al. "Comparative Study of Risk Management in Centralized and Distributed Software Development Environment." Sci.Int.(Lahore), 26(4), 1523-1528, 2014.

[19] McFarlan, F.W. "Portfolio Approach to Information Systems." Harvard Business Review 59, no. 5 (Sept-Oct 1981): 142-150.

[20] Wallace, Linda, and Mark Keil. "Software Project Risks and Their Effect on Outcomes." Communications of the ACM 47, no. 4 (2004): 68-73.

[21] Alter, Steven. "Implementation Risk Analysis." TIMS Studies in the Management Sciences 13, no. 2 (April 1979): 103-119.

[22] Keil, Mark, P.E. Lyytinen, and R.C. Schmidt. "A Framework for Identifying Software Project Risks." Communications of the ACM 41, no. 11 (1998): 76-83.

[23] Hussain, Shafiq, et al. "Threat Modelling Methodologies: A Survey." Sci.Int.(Lahore),26(4),1607-1609, 2014.

[24] Siddique Buker et al. “Integration of Requirement Engineering with UML in Software Engineering Practices” Sci.Int.(Lahore),26(5), 2157-2162, 2014.

[25] SIDDIQ, Shahida, et al. " Implementation Issues of Agile Methodologies in Pakistan Software Industry." International Journal of Natural & Engineering Sciences 9(1), 2015.