Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Lawrence (2003)
Are you up to itThe Computer Bulletin, 45
S. Vidalis
A critical discussion of risk & threat analysis methods & methodologies
M. Bronte‐Stewart
Developing a risk estimation model from IT project failure research
J. Meredith (2001)
Project Management in Practice
M. Sumner (2000)
Risk factors in enterprise wide information management systems projects
M. Easterby-Smith, R. Thorpe, A. Lowe (1991)
Management Research: An Introduction
B. Whittaker (1999)
What went wrong? Unsuccessful information technology projectsInf. Manag. Comput. Secur., 7
M. Saunders, P. Lewis, A. Thornhill (2006)
Research Methods for Business Students
W. Orlikowski, J. Baroudi (1990)
Studying Information Technology in Organizations: Research Approaches and AssumptionsOrganizations & Markets eJournal
D. Remenyi, B. Williams, A. Money, Ethné Swartz (1998)
Doing Research in Business and Management: An Introduction to Process and Method
Ralph Kliem, Irwin Ludin (1997)
Reducing Project Risk
R. Fielding
IT projects doomed to failure
M. Brown
Mitigating the risk of information technology initiatives: best practices and points of failure for the public sector
K. Lyytinen (1988)
Expectation failure concept and systems analysts' view of information system failures: Results of an exploratory studyInf. Manag., 14
R. Bostrom, J. Heinen (1977)
Mis problems and failures: a socio-technical perspectiveManagement Information Systems Quarterly
M. Sumner (1999)
Critical success factors in enterprise wide information management systems projects
Andrew Brown (1995)
Managing Understandings: Politics, Symbolism, Niche Marketing and the Quest for Legitimacy in IT ImplementationOrganization Studies, 16
Mingshu Li, Meng-Cheng Huang, Fengdi Shu, Juan Li (2006)
A risk-driven method for eXtreme programming release planningProceedings of the 28th international conference on Software engineering
C. Pritchard
The Project Management Communications
GAO
Business modernization: improvements needed in management of NASA's integrated financial management program
R. Yin (1984)
Case Study Research: Design and Methods
B. Boehm, P. Bose, E. Horowitz, Mingjune Lee (1995)
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach1995 17th International Conference on Software Engineering
F. Nah, J. Lau, Jinghua Kuang (2001)
Critical factors for successful implementation of enterprise systemsBus. Process. Manag. J., 7
J. Blasius (2001)
Nicholas Walliman, with Bousmaha Baiche: Your research project. A step-by-step guide for the first-time researcherKZfSS Kölner Zeitschrift für Soziologie und Sozialpsychologie, 53
J. Kasser
What do you mean you can't tell me if my project is in trouble?
C. Pritchard (2004)
The Project Management Communications Toolkit
V. Devedzic (2001)
Software Project Management
C. Holland, B. Light (1999)
A Critical Success Factors Model for ERP ImplementationIEEE Softw., 16
J. Gill, Phil Johnson (1991)
Research Methods For Managers
A. Finkelstein
Report of the inquiry into the London Ambulance Service
P. Drucker (1974)
Management: Tasks, Responsibilities, Practices
C. Hood, H. Rothstein (2000)
Business Risk Management in Government: Pitfalls and PossibilitiesCorporate Finance: Governance
R. Bostrom, J. Heinen
MIS problems and failures: a socio‐technical perspective. Part 2: the application of socio‐technical theory
R. Jaques
UK wasting billions on IT projects
S. Marsh (2007)
Between a rock and a hard planItnow, 49
R. Charette (1989)
Software Engineering Risk Analysis and Management
C. Chapman, S. Ward
Project Risk Management: Processes, Techniques and Insights
GAO
DOD business transformation: defense travel system continues to face implementation challenges
C. Clegg, C. Axtell, L. Damodaran, B. Farbey, Richard Hull, R. Lloyd-Jones, John Nicholls, R. Sell, C. Tomlinson (1997)
Information technology: a study of performance and the role of human and organizational factorsErgonomics, 40
James Cadle, D. Yeates (1996)
Project Management for Information Systems
F. Tsui (2004)
Managing Software Projects
A. Huizing, P. Carlson (1992)
A Review of MIS Research and Disciplinary DevelopmentJ. Manag. Inf. Syst., 8
R. Pressman (1982)
Software Engineering: A Practitioner's Approach
A. Vasconcelos (2007)
The role of professional discourses in the organisational adaptation of information systemsInt. J. Inf. Manag., 27
Andrew Brown (1998)
Narrative, Politics and Legitimacy in an IT ImplimentationJournal of Management Studies, 35
Voyages
Unfinished voyages, a follow up to the CHAOS report
B. Doolin (2004)
Power and resistance in the implementation of a medical management information systemInformation Systems Journal, 14
Offer Drori (1997)
From theory to practice or how not to fail in developing information systemsACM SIGSOFT Softw. Eng. Notes, 22
A. Vasconcelos (2003)
Management consultancies and technology consultancies in a converging market: a knowledge management perspective
GAO
Information technology management: SBA needs to establish policies and procedures for key IT processes
James Taylor (2003)
Managing information technology projects: applying project management strategies to software, hardware, and integration initiatives
P. Jalote (2002)
Software Project Management in Practice
M. Nunes, F. Annansingh
The risk factor
R. Bostrom, J. Heinen (1977)
MIS Problems and failures: a sociotechnical perspective part I: the causeManagement Information Systems Quarterly, 1
P. Jackson
Desk Research, Market Research Series
GAO
DOD business systems modernization: navy ERP adherence to best business practices critical to avoid past failures
N. Walliman
Your Research Project: A Step by Step Guide for the First Time Researcher
F. Shull, I. Rus, V. Basili (2000)
How perspective-based reading can improve requirements inspectionsComputer, 33
D. Dvir, S. Lipovetsky, A. Shenhar, A. Tishler (1998)
In search of project classification: a non-universal approach to project success factorsResearch Policy, 27
C. Glesne, A. Peshkin
Becoming Qualitative Researchers
M. Keil, P. Cule, K. Lyytinen, Roy Schmidt (1998)
A framework for identifying software project risksCommun. ACM, 41
P. Bhandari, M. Nunes, F. Annansingh
Analysing the penetration of knowledge management practices in organisations through a survey of case studies
F. Small
Ministerial inquiry into INCIS
D. Stufflebeam
Guidelines for developing evaluation checklists: the checklists development checklist (CDC)
A. Bryman
Research Methods and Organisation Studies
NAO
Identity and passport service: introduction of e‐passports
Purpose – This paper aims to present a study of Information Systems project risk management aimed at identifying a risk ontology and checklist that will enable decision making and mitigation strategy planning in information system (IS) development in the public sector. This sector is an ideal research field in risk management practices, due to the visibility that failure of IS/IT projects has acquired as a consequence of the duty of accountability that characterises it. Design/methodology/approach – The study is based on a qualitative approach anchored on a critical literature review, leading to the development of an analytical framework, followed by a thorough case‐study survey. Findings – A project risk ontology was derived from the analysis of ten case‐studies in the UK, USA and New Zealand and was divided into five main categories: pre‐project, customer, project management, technological issues, and development methodology. The analysis found that a considerable number of risk factors are incurred before the start of the formal project and pre‐determine the future of the project and create predictable risks that can be avoided. Research limitations/implications – This paper has focused on the pre‐implementation and implementation phases of IT/IS projects and further research into IS post‐implementation is required. Originality/value – The proposed ontology is designed to fit in real life systems development cycles and is aimed at supporting risk assessment and control. The findings suggest that risk thinking should start early in the project and not, as many modern design and development methodologies propose, solely as part of the development process itself.
Information Management & Computer Security – Emerald Publishing
Published: Jun 6, 2008
Keywords: Information systems; Risk management; Risk analysis
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.