Sie sind auf Seite 1von 17

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/221408636

A Framework for software risk management

Conference Paper in Journal of Information Technology · January 1995


DOI: 10.1057/jit.1996.2 · Source: DBLP

CITATIONS READS

75 276

3 authors, including:

Kalle Lyytinen Lars Mathiassen


Case Western Reserve University Georgia State University
444 PUBLICATIONS 16,892 CITATIONS 261 PUBLICATIONS 4,485 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

A contingency Model for Requirements Development View project

General Measurement Theory and Metrology View project

All content following this page was uploaded by Lars Mathiassen on 19 May 2014.

The user has requested enhancement of the downloaded file.


A Framework For Software Risk Management

Kalle Lyytinen§ Lars Mathiassen* Janne Ropponen+


§Department of Computer Science and Information Systems
University of Jyväskylä, 40100 Jyväskylä, Finland
*Institute for Electronic Systems
Aalborg University, 9220 Aalborg, Denmark
+Nokia Telecommunications, Cellular Systems
Network Management Systems, 33100 Tampere, Finland

Abstract 1. Introduction
We present a simple, but powerful framework Considerable hopes in improving the
for software risk management. The frame- performance in software development
work synthesizes, refines, and extends current have been placed in techniques and
approaches to managing software risks. We guidelines that identify, analyze and
illustrate its usefulness through an empirical tackle software risks (Alter & Ginzberg
analysis of two software development epi- 1978, Boehm 1989, 1991, Burns & Den-
sodes involving high risks. The framework
nis 1985, Charette 1989, Davis 1982,
can be used as an analytical device to evalu-
Fairly 1994, McFarlan 1982). Software
ate and improve risk management approach-
es and as a practical tool to shape the atten- risks are incidents that endanger a suc-
tion and guide the actions of risk managers. cessful development process leading to
wrong or inadequate software operation,
software rework, implementation diffi-
culty, delay or uncertainty (Boehm
1991). They involve the concept of a
consequence which incurs losses, is un-
certain and introduces choice (Barki et
al. 1993, Boehm 1989, Charette 1989).
Research on software risk manage-
ment has primarily focused on crafting
guidelines for specific tasks (Alter &

© Scandinavian Journal of Information Systems, 1996, 8(1):53–68


Ginzberg 1978, Boehm 1989, Charette software risk management and to pro-
1989, McFarlan 1982). This has led to a vide a general understanding of the liter-
number of problems. First, we have little ature on risk-based software manage-
empirical evidence of the practical use- ment. We then present two real-life soft-
fulness of risk management. Second, risk ware episodes to illustrate the value of
management approaches shape the atten- the framework in making sense, organiz-
tion and guide the actions of risk manag- ing and re-interpreting software manage-
ers in quite different and ad hoc ways. ment practices. Finally, we discuss some
Third, risk management approaches implications for research and practice in
have largely ignored the organizational software risk management.
environment in which they are used and
their impact on management perform-
ance.
Our research on software risk man- 2. Organizational Perspectives on
agement attempts to address these issues. Software Development
We have studied risk management prac- Contemporary approaches to software
tices (Ropponen 1993, Ropponen & risk management share a number of fun-
Lyytinen 1993; see also Neo & Leong damental weaknesses (Lyytinen et al.
1994, van de Swede & van Vliet 1993) 1994). First, they rely on simplistic envi-
and we have conducted experiments ronmental models and make no distinc-
with risk management approaches tions between different types of risk-gen-
(Mathiassen et al. 1995; see also Boehm erating contexts. Second, they guide ac-
et al. 1984). In addition, we have evalu- tion through ad hoc lists of risk resolu-
ated and compared classical approaches tion techniques that provide a rather
to risk management (Lyytinen et al. weak understanding of the nature of risk
1994). This paper is based on the insights management behavior. Third, they shape
from these studies with the goal to the attention of risk managers through
present a general characterization of specialized or narrowly focused lists of
software risk management as a distinct risk factors. We introduce three comple-
form of organizational behavior. The mentary organizational perspectives on
framework we present is general enough software development. Each perspective
to cover the entire development process is designed to overcome one of these
and comprehensive enough to integrate weaknesses.
all types of software risks and it can be
used both as an analytical device to eval- A hierarchical view of software
uate, compare and develop risk manage- development
ment approaches and as a practical tool Software development embraces three
for software risk managers. environments: the system environment
The paper is organized as follows. in which the software system is to oper-
First, we introduce three complementary ate, the development environment in
organizational views on software devel- which the development process takes
opment. These are synthesized into a place, and the management environment
framework for software risk manage- which shapes software management ac-
ment. We use the framework to analyze tivities. The development process is gen-

K. Lyytinen, L. Mathiassen & J. Ropponen 54


erated within the development environ- veloper can at best try to discover satis-
ment. Its purpose is to inquire into the factory solutions in relation to some as-
system environment, anticipate effective piration levels and adjust designs on the
ways to use software and thereafter im- basis of his or her information about the
plement the software system. The soft- environments and available heuristics at
ware management process forms a sec- hand. Alternatives are not given nor
ond-order process that manages the soft- readily at hand and the concept of search
ware development process and its envi- governed by heuristics is, as a conse-
ronment. It is generated within the quence, essential in understanding de-
management environment. The concern sign and management activities.
of this process is to design and sustain an Software risks are created by limited
effective development environment so resources, skills or information. These
that the first-order process meets its handicaps prevent designers successful-
goals. The practical reasons for introduc- ly seeking or selecting design alterna-
ing the three environments and the two tives, estimating their usefulness, or im-
related processes are: the dynamics of plementing them effectively. Risk-based
organizational learning, the management management is a means to derive more
of complexity through separation of or- information about the three environ-
ganizational concerns, and the manage- ments. Thereby actors decrease environ-
ment of organizational uncertainty. mental uncertainty (i.e. increase actors’
Software risks are borne: (1) within knowledge) so as to decide which alter-
the system environment, e.g. users might native actions to pursue (i.e. increase ac-
have no experience using the kind of tors’ intelligence), and dynamically set
software system being developed (Alter the aspiration levels (i.e. increase design
& Ginzberg 1978, McFarlan 1982); (2) adaptability). Risk management methods
within the development environment, specify search procedures for informa-
e.g. developers lack experience in ana- tion gathering, organization and interpre-
lyzing this kind of system environment tation to simplify complex decisions un-
(Alter & Ginzberg 1978, Barki et al. der conditions of bounded rationality
1993, Davis 1982); or (3) within the (Simon 1983).
management environment due to manag-
ers’ bias, laziness, ignorance or inaction The structure and dynamics of the
which leads to ignoring available infor- environments
mation (Keil 1995). Whilst the concept of satisficing behav-
ior is intuitively appealing it does not
Software development as satisficing help much in characterizing the content,
behavior size and the structure of search spaces.
Software development is concerned with We need to describe the structure and dy-
designing artifacts. Such design activi- namics of the three environments of soft-
ties fall short of completely rational be- ware development. We use Leavitt’s
havior in which knowledge of the envi- (1964) model of organizational change
ronments is certain and consequences of to frame the scope and structure of Simo-
all acts can be calculated (Parnas & Cle- nian search spaces in the context of soft-
mens 1986, Simon 1983). A software de- ware development. Leavitt’s presenta-

K. Lyytinen, L. Mathiassen & J. Ropponen 55


tion is appealing since it addresses or-
ganizational change and uncertainty in a 3. A Framework for Software Risk
general, but simple manner. Leavitt ar- Management
gues that organizations are multivariate By marrying the Simonian model of be-
systems consisting of four interacting havior (process view) with the Leavittian
variables—task, structure, actor, and model of an organization (structural
technology. Leavitt uses the term task to view) in the context of the hierarchical
denote organizational raison d’être such software development model we obtain
as manufacturing and servicing. By the framework depicted in figure 1. It
structure Leavitt means systems of com- meets some of the requirements we have
munication, systems of authority and set for a framework for software risk
systems of work flow. Actors refer to management: it is simple, general and
those participants involved that carry out comprehensive (cf. Lyytinen et al.
tasks, and technology is defined as any 1994).
technical means, know-how and tools to The framework describes the three
carry out tasks. According to Leavitt, software development environments
these four variables are highly interde- symmetrically in terms of the Leavittian
pendent and a change in one variable will model: on each level we distinguish a
result in changes in the others. qualitatively distinct set of tasks, tech-
Software risks arise whenever unex- nology, actors and structures. Their con-
pected threatening or conflicting states stellations can either create or reduce
occur in or between the four components software risks depending on how they
in any of the three environments as to in- are pasted together and what types of be-
crease the likelyhood of major loss haviors they are able to portray. The dif-
(Lyytinen et al. 1994). Likewise, a risk ferences in the Leavittian components on
reduction strategy can change any of the each level are exhibited by the use of dis-
four variables in the environments. tinct names for the components as exhib-
Leavitt’s model suggests a systematic ited by the terms ‘system’, ‘project’, and
way to organize risk identification and ‘management’, respectively. The model
resolution activities which is an im- recognizes that the three layers of socio-
provement over earlier, mostly ad-hoc technical systems are closely intertwined
check lists (e.g. Alter & Ginzberg 1978, by the two change processes that share
Barki et al. 1993, Boehm 1991, Davis properties of bounded rationality: the de-
1982, McFarlan 1982). It also articulates velopment process and the risk-based
some necessary and sufficient features of management process.
organizations that effectively cope with The risk-based management process
software risks. Finally, it clarifies the na- deals with questions like: do software
ture of software risks by relating them to developers have any experience with the
the turbulence and the lack of equilibri- technological platform of the project? It
um in the socio-technical system. thereby conducts a risk analysis of states
and events that may affect the capability
of the development environment to carry
out the software development task with-
in the set aspiration level (Boehm 1989,

K. Lyytinen, L. Mathiassen & J. Ropponen 56


FIGURE 1. A framework for software risk management

Actors Management
Environment
Structure Technology

Task
Risk-based Management
Process

Actors Project
Environment
Structure Technology

Task
Development
Process

Actors System
Environment
Structure Technology

Task

1991, Charette 1989). It can (often un- cidents which can prevent the project
consciously) change the development from meeting its aspiration levels and
environment by enacting heuristics. For thus incur losses.
example, it can launch experiments with Risk profiles can be attacked in two
the technological platform. Through ways: actively and skilfully where actors
such risk resolution activities (Boehm heedfully scan the environments, feel re-
1989, Charette 1989) one or all of the en- sponsible and committed, and wilfully
vironments will change (Boehm 1989). change aspiration levels; or passively by
Software risks can be seen to con- ignoring risks due to lack of accountabil-
dense into project specific risk profiles. ity, insufficient organizational commit-
Such profiles are continually shaped by ment, incompetence, information over-
component interactions and changes in- load, stress, opportunism or laziness. In
troduced by the risk-based management the latter situation the aspiration levels
process. In different project stages risk are decreased de facto and ex post with-
profiles vary, and at each development out introducing an explicit choice. These
stage the risk profile contains several in- two extreme strategies to deal with soft-

K. Lyytinen, L. Mathiassen & J. Ropponen 57


ware risks—an active and systematic
one, and a passive, laissez-faire and ad- TABLE 1. Project task relates to system
environment risk factors
hoc one—are highly dependent on how
the actors, technology and structure in System structure:
the management environment are joined Is the structure of the organisation fit for
together. the system?
Does the system span several organisa-
tional units?
Project Task Does the system structure change rap-
The system environment constitutes the idly?
context in which one has to understand Do power relations change?
Is the structure in harmony with the
the project task. The task is to describe a
tasks?
system environment in relation to stake-
holders’ expectations and—within spe- System technology:
Is the technology appropriate for the
cific time and cost constraints—to devel- tasks?
op and implement a new software system Is the technology well-proven and relia-
by changing the necessary components ble?
of the system environment. Task related What is the life-span of the technology?
risk resolution techniques should not just Is the technology new in this organisa-
tion?
address the project task as an abstract Is the technology standardised or chang-
formulation of the project outcome and ing fast?
its aspiration level. Instead, a full reper- Is the cost of the technology prohibitive?
toire of heuristics should be available to System actors:
probe system environment components Do the actors have experience with the
and their interactions. Some typical technology?
questions asked during risk identifica- Are their earlier experiences with IT bad?
How knowledgable are the actors?
tion are summarized in Table 1 (Boehm
Are their expectations realistic?
& Ross 1989, Lyytinen & Hirschheim Do actors personally benefit from the
1987, Lyytinen et al. 1994, Mumford change?
1983).

Project Structure
TABLE 1. Project task relates to system
This component refers to the systems of
environment risk factors
communication, authority and work
System task: flow. Systems of communication specify
Is the task understood? who should be communicating with
Is the task unstructured with many excep-
tions? whom, when, how frequently communi-
How many tasks are included? cations take place, and how formal com-
What is the impact on user tasks? munications are (Andersen et al. 1990,
Will actors be critically dependent on the Davis et al. 1990). Risks transpire when
system? actors communicate ineffectively, when
Is there much unarticulated, tacit knowl-
edge involved? the appropriate actors are not involved in
What is the extent of tasks? communications, or when the scope of
How much variation and flexibility are communications is limited (Curtis et al.
involved in the tasks? 1988, Heiskanen 1994). The systems of

K. Lyytinen, L. Mathiassen & J. Ropponen 58


authority define lines of responsibility and values. All these can vary from one
between project actors and groups. The actor (group) to another. Moreover they
more unclear and inappropriate the allo- can vary relative to an actor’s task, and
cation of responsibilities, the more risks his or her connection to the project struc-
are produced (Lyytinen et al. 1994); if ture and technology.
the selected organizational form is in dis-
agreement with the actors’ expectations Project Component Interactions
and the nature of the task new risks are Second order considerations examine in-
created (Constantine 1993); in addition, teractions between task, structure, tech-
the risk profile changes when the work nology, and actors as major sources of
flow structure does not match the task. risks. Examples of such considerations
are: actors’ ability and shortcomings in
Project Technology performing the task, the appropriateness
Project technology includes available of the structure and the technology in re-
methods, tools and infrastructure to de- lation to the task, the effectiveness with
sign the software system and eventually which the structural arrangements sup-
to implement it. System development port and utilize the actors’ abilities, skills
methods, quality assurance systems, and experience in using the technology,
computers, software, and other equip- and finally the fit between technology
ment are examples of such technologies and structural arrangements (Lyytinen et
(Cooprider & Henderson 1991). Techno- al. 1994).
logical shortcomings and the dynamic
nature of the technology are indisputable
sources of risk. Typically, the technolog-
ical conditions under which the task is 4. Risk-Based Software Management
carried out change and these changes The performance of the management en-
amplify existing weaknesses in the tech- vironment (cf. Figure 1) depends on how
nology including its inadequate func- actors, structure and technology in the
tionality, reliability, efficiency, or userf- management environment are assem-
riendliness. bled. Such performance is defined by the
available information processing capa-
Project Actors bility to find out critical incidents, to
Project actors cover all stakeholders who suggest alternatives, to calculate conse-
are involved in the development process quences and thereby to resolve software
or can set forward claims to or benefit risks.
from the project. Thus, all participating Management Task. The risk-based
persons, groups, and other stakeholders management task is to search for inci-
including customers, managers, main- dents that can prevent the development
tainers, development groups and users environment from performing in a satis-
[8] need to be included into the actor set. factory manner and to modify the devel-
Actors exhibit several prominent proper- opment process by intervening into the
ties that influence a project’s risk profile: development environment. This is indi-
knowledge and skills, experience, expec- cated by the big arrow pointing down-
tations and commitments, and beliefs wards from the management environ-

K. Lyytinen, L. Mathiassen & J. Ropponen 59


TABLE 2. Generic questions to support risk-based management

System Project Management


Which tasks are the What are the require- What is an appropriate
Task software system sup- ments to the system project environment?
porting? and its environment?
Which organisation is How is the project How are the manage-
Structure the software system organised? ment activities organ-
part of? ised?
Which technical plat- Which technologies are Which technologies are
form is the software used to develop the used to manage the
Technology
system implemented software system? project?
on?
Who are using the soft- Who are involved in or Who are involved in
Actor ware system or are are affected by the managing the project?
affected by it? project?
How is the fit and what How is the fit and what How is the fit and what
Relations is the dynamics is the dynamics is the dynamics
between components? between components? between components?

ment in Figure 1. Software risks are born based management forms an integral
in all three environments. Table 2 offers part of the project management activi-
a set of generic questions that can be ties. This corresponds to the continuous
used to search for specific risks in a soft- view of risk management advocated by
ware project. Table 1 offers more specif- Boehm (1988, 1989, 1991), and Alter &
ic questions focusing on the system envi- Ginzberg (1978). Sometimes risk-based
ronment and hence related to the project management forms a discrete event
task. which relates only to the very early phas-
The risk-based management task is es of a software project. This corre-
dynamic: it differs through project phas- sponds to the discrete view of risk man-
es and between development projects agement presented by Davis (1982) and
and it involves a feedback loop indicated McFarlan (1982).
by the small arrow. Through this loop
managers become more competent and Management Actor
experienced, the organization integrates Risk managers are expected to take de-
new experiences and schemes into its liberate actions to tackle risks. Usually
systems of interpretation (Weick & Daft this role is assigned to a project manager.
1983), and new methods, codifications But other project members and groups
of procedures, and decision making rules such as project committees can also car-
are adopted. ry out risk management tasks. Risk man-
We can observe a large variation in agers form a proactive part of the man-
how the risk management task is formu- agement environment: they decide what
lated and accomplished. Sometimes risk actions should be taken, what risk man-

K. Lyytinen, L. Mathiassen & J. Ropponen 60


agement technologies should be used, pressures, constraints and omissions; in-
and how the management structure ternal structural factors like the misfit
should be organized. They also set the between the organizational and IS man-
aspiration levels that are honored during agement structure; and actor related fea-
searches and consequent risk resolu- tures like past experience, culture and
tions. climate (Keil 1995).
Finding skilful, open-minded soft-
ware managers is instrumental in im- Management structure
proving the risk management capability Communication lines, the structure of
(Boehm 1989, van de Swede & van Vliet authority, and lines of accountability are
1993). Actors’ attitudes, psychological significant in organizing the risk-based
make-up and cognitive bias can drasti- management process. It is important to
cally affect the way in which they deal effectively communicate risks to every-
with software risks. This has been point- one involved and to reward reporting of
ed out by such actor features as “escalat- omissions and errors (Keil 1995). It is
ing commitment” (Keil 1995), “no-prob- also necessary to define systems of au-
lem syndrome” (Weinberg 1986), “group thority for tactical considerations on
think”, and “inaction” (Weick & Daft which risk resolution strategies to apply
1983). Actors’ capability can be im- when (Boehm & Ross 1989). The man-
proved by increasing their awareness of agement structure is also important to
risk management methods, improving create a sense and discipline of account-
their ability to use the methods, and forg- ability, i.e. that quality makes a differ-
ing values and preferences that deliber- ence and that actors are accountable for
ately recognize risks, esteem highly what they are doing (Rochlin 1993). At
quality and the lack of errors (cf. Boehm the same time, the management structure
& Ross 1989, Keil 1995, Roberts 1993). must be organized to provide adequate
and reliable information and a manage-
Management Technology ment structure which favors openness
Risk management methods offer heuris- and does not punish voicing of problems
tics to identify risks, compose a risk pro- and concerns (Keil 1995).
file, evaluate its significance and attack it
accordingly. These methods form the Si- Interactions and Improvements
monian “intelligence” that can be trans- The intrinsic and complex relations be-
ferred from one environment to another. tween the four Leavittian elements are
Most of these methods are codified rep- expressed in questions like: How do
resentations of good management prac- technologies relate to specific manage-
tices. Willcocks and Margetts (1994) ment tasks? What level of experience
convincingly demonstrate that conven- and competence do the involved actors
tional risk management technologies have in using these technologies? Who is
tend to ignore external factors that affect responsible for managing these risks and
the risk management capability. These when? Software organizations’ effec-
include: history like the past perform- tiveness can be nurtured over time by
ance that shapes actors’ expectations; perfecting the quality of some, or all
external structural factors like external components, in the management and de-

K. Lyytinen, L. Mathiassen & J. Ropponen 61


velopment environments. Such develop- followed. We analyze both cases using
ments, however, are not the subject of published written descriptions (Gjesing
project management, but one important 1993, Keil 1995, Markus & Keil 1994).
target in managing and orchestrating the In addition, we have communicated with
larger environment for software delivery the original authors and checked that our
(Earl 1989). Analysis of such changes interpretations are authentic and valid.
has taken place in discussions of evolu- Our primary goal is to illustrate the value
tionary models of IT diffusion (Lyytinen of the framework in making sense, or-
1991). These models are often called ma- ganizing and reinterpreting software risk
turity models. The weakness of such management practices.
models is their primary focus on well-de- In case Beta, the risk profile was nev-
fined processes of managing complexity er fully established. The system environ-
and what could be called lubrication of ment was, however, a major source of
the organizational machine. As a conse- risks and continued to be so throughout
quence they tend to ignore the impor- the project. At the same time a manage-
tance of an organic focus to deal effec- ment structure was installed that did not
tively with high levels of complexity and match with the risk levels and it was pop-
uncertainty. But despite of their weak- ulated with actors that were cognitively
nesses, maturity models have a definite and emotionally biased. Accordingly, the
value in distinguishing successive levels management environment was never in
of how the development capability can equilibrium with the risk based manage-
mature over time (Galliers & Sutherland ment task and it was handled with an in-
1991, Humphrey 1989, Nolan 1973). appropriate assembly of actors, manage-
Thereby, through succesive trials of ment structure and technology. In con-
analysis of weaknesses, maturity models trast, risk management was carried out
can be used to diagnose what organiza- consciously as a kind of one-shot strate-
tions have learned (i.e. their current level gy in case Alpha. Risk information was
of intelligence in Simonian terms) in sought, structured and at the end ana-
managing software risks, and to point out lyzed using quantitative tools. This ac-
that organizations must continually im- tivity was carried out by an individual
prove their risk management capability project manager. Risks arising from all
(i.e. the necessity to learn to learn [28]). three environments were systematically
detected and planned for and, despite in-
itially high levels of risks, the develop-
ment process could be managed better
5. Two Cases than usual.
In the following, we use the framework
to structure and interpret two software 5.1. Case Alpha: Advanced Banking
development episodes involving consid- System
erable risks. In case Alpha, risk manage- The project task was to develop a general
ment techniques were actively applied filing and retrieval system for a large
and the management environment was bank which would facilitate coordination
organized accordingly. In case Beta, no between bank employees while working
conscious risk management strategy was on the same customer case (Gjesing

K. Lyytinen, L. Mathiassen & J. Ropponen 62


1993). Another goal was to establish ho- case were the project manager accompa-
mogeneous working procedures for deal- nied by other project members and user
ing with customer cases. The overall task representatives. Overall the project was
was of medium size (approximately 12 staffed by 10 full time members. The
man years) and it involved a fair amount project structure forms a complex organ-
of technological novelty and complexity. izational web, because the project mem-
The system environment is a large bers had to be obtained from two depart-
bank. Relevant system actors are the en- ments representing both sites of the IS
tire bank personnel who are eventually department, and user representatives
going to use the system. The system from several functional areas. The
structure reflects the division of work project technology consisted of the sys-
and employed coordination mechanisms tem technology and a new object orient-
to manage customer cases. The system ed methodology and a new CASE tool.
(task) stores and retrieves files on cus- The project task, in the first stage of the
tomer cases on which the personnel are project, was to develop the prototype, to
currently working. The system technolo- garner sufficient experiences from the
gy consists of the bank’s existing com- design, implementation and use of it, and
puting facilities supplemented with a to produce information for making deci-
new file management system and an sions regarding the continuation of the
electronic mail system. project.
The development process was split The project manager worked in a spe-
into two stages because of the newness cific management environment. He con-
of technology components and the nec- ducted a risk analysis and managed the
essary changes in system structure. The development process based on this infor-
timing and quality constraints for the mation. The project manager was inex-
task were tight. During the project’s first perienced with managing projects of this
year a prototype was to be developed and size but he was willing to follow risk
tested within a limited functional area. management principles and committed
Based on the experiences gained from to improve the management process.
this prototype a full-scale system was Parts of the risk analysis were conducted
then to be developed over a period of an- in team meetings using the risk analysis
other two years. The first experimental steps suggested by Boehm (1989). The
stage was, as a consequence, crucial for risk management technology was the
the success of the whole project as fur- method suggested by Boehm (1989,
ther developments depended on the out- 1991) and the management structure was
comes of this initial stage. based on traditional project management
The development environment cov- principles.
ers part of the bank’s IS department, an The project manager saw several
organization with about 800 employees threats including new technology, com-
operating at two different sites. Both plex project organization, and a new ap-
sites develop and maintain the same plication area. Therefore he executed
computing infrastructure and no clear risk-based project planning in two steps
functional division had been made be- (Boehm 1989, 1991): (1) risk assessment
tween the sites. The project actors in this step—consisting of risk identification,

K. Lyytinen, L. Mathiassen & J. Ropponen 63


risk analysis, and risk prioritization; and ing with time; there is no support for
(2) risk control step—consisting of risk which risk resolution strategy to apply
management planning, risk resolution, and when. These problems indicate
and risk monitoring. During risk assess- weaknesses in pasting together the man-
ment, a list of 29 risk items were com- agement environment: actors’ cognitive
piled using Boehm’s top-ten list. It was bias (the-wolf-is-coming-effect), poor
supplemented with informal discussions commitment (pessimistic world-view),
with colleagues, the use of rich pictures lack of structure (time dimension), and
(Checkland 1981), soliciting past project poor heuristics (no support for strategy
experience, and conducting a detailed choice). Finally, the project manager ar-
analysis of the system requirements and gues that these weaknesses can be avoid-
success factors. Each risk was further an- ed if one is aware of them (by finding an
alyzed carefully in relation to the short appropriate technology-actor fit).
term goals of the project and assessed
quantitatively. 5.2. Case Beta: Expert System to
The risk profile included risks associ- Support Sales Representatives
ated with: the project task (insufficient The project task was to design and im-
requirements, generality of the design); plement an advanced expert system that
project technology (new CASE tool, dif- could be used by the sales force to con-
ficulty in the implementation of the basic figure error-free computer systems while
file system and electronic mail system, drafting customer orders (Keil 1995,
inefficient automatically generated Markus & Keil 1994). The project was
code), project actors (inexperienced originally welcomed with big fanfare,
project manager), project structure (tech- promised staggering return on invest-
nical subcontracts, considerable coordi- ment, had great visibility in the organiza-
nation effort, tight schedule), and actor- tion’s business strategy, and obtained
technology fit (project members inexpe- early management commitment. Moreo-
rienced with object oriented methodolo- ver, the project had good resources, had
gy). Subsequently, risk control activities good technical expertise at hand, and re-
were carried out with emphasis on risk lied on a careful project planning and
management planning. Risk resolution user participation strategy during the
tactics were evaluated, further designed, system roll out (Mumford & McDonald
and integrated into the project plan. 1989). It also had a number of risk fac-
The project manager found that this tors that were well recognized from the
approach shed light on the instrumental start such as untried system technology,
role of the risk management technology unique application area, and inexperi-
in improving searches, finding useful in- enced users. The project task was large in
formation, and in structuring the infor- size (over 100 man years), its complexity
mation. He also identified a number of was high, and its implementation scope
weaknesses: The approach is based on a was broad (Mumford & McDonald
pessimistic world view and important 1989).
risks can be neglected because they are The system environment is part of a
mentioned so often (the-wolf-is-coming- large computer vendor. The relevant sys-
effect); there is no mechanism for deal- tem actors are mainly the vendors’ sales-

K. Lyytinen, L. Mathiassen & J. Ropponen 64


representatives who were expected to through several larger or smaller imple-
use the system as a tool to configure the mentation measures. After a solid start
systems they sold. The idea originated the project faced chronic implementation
from the manufacturing department problems, despite several extensions and
which realized that most configuration improvements in software, until it was
errors are borne in sales and that their ex- abandoned.
pert system used in configuring the man- The development environment in-
ufactured systems could be leveraged cludes the company’s sales offices and
also to provide configuration support for representatives and during its peak the
sales. The sales department, however, project staff consisted of 26 technical
showed little interest in the project origi- specialists and managerial staff. The
nally and was during the initiation of the project structure is complex. It involves
project developing its price quotation the management of the technical system
system which it saw as a strategic appli- implementation, users through user de-
cation (Markus & Keil 1994). The sys- sign teams and coordination with chang-
tem structure reflect the traditional divi- es in company’s organization, product
sion of work in the sales organization. lines, strategy, sales channels and cam-
The system task is to prompt a series of paigns. The project technology is basi-
questions about the system being sold cally the same as the system technology
and thereafter to configure it correctly by mentioned above. It was familiar to the
looking for mismatched items and com- technical implementors. The initial
ponents, to lay out processors and other project task was to finish the project by
components in cabinets, to lay out the December 1982 (Keil 1995).
floor plan, and to do the cabling. The The management actors are the
system technology consists of standard project managers and other managers in-
hardware available from the vendor, pro- volved in making decisions. Most of
prietary expert system software to build these were not knowledgeable in devel-
up the data and rule base, and telecom- oping this kind of system. Those who
munication facilities available for the had experience had not been involved in
sales-offices. Part of the system technol- a similar type of development effort. The
ogy was not tested before. management structure was designed so
The development process consisted that few people controlled both the de-
of the initial design and implementation velopment resources and the auditing of
phase which lasted from late 1980 to end system outcomes (Keil 1995). The man-
of 1983. During that period the system agement structure did not specify re-
was designed, implemented and piloted sponsibilities and lines of communica-
among a number of user representatives. tion clearly which later led to ignoring
Piloting was found necessary to test out available information and misinforming
the technology and to get users involved. higher levels of management. The organ-
The second, roll out, phase lasted from ization had, however, experience in suc-
late 1983 until late 1992. During this pe- cessfully managing projects of this size.
riod the system was continually adapted In addition, the project strategy suggest-
and modified and its deficiencies and im- ed active user participation in designing
plementation hurdles were attacked the use of the system. The project was, in

K. Lyytinen, L. Mathiassen & J. Ropponen 65


summary, not specifically badly man- tion to the published literature so far, a
aged when compared to other more suc- wider and more systematic way to organ-
cessful projects in the organization. ize software risk considerations.
Nonetheless, the project did not ap- The framework sheds light on areas
ply any risk management technologies to improve software production. Organi-
and management actors constantly ig- zations should be attentive to risky inci-
nored available signals on system risks. dents that can help to change behaviors
A project risk profile was never system- and beliefs and the use of risk manage-
atically constructed though some risks ment methods should be encouraged.
were identified such as the novelty of the Risk management considerations should
system technology and organizational cover all the four components—task,
implementation difficulty. No specific structure, technology and actor—in all
plans to reduce these risks were devised. three environments. Table 2 offers a sur-
During the course of the development vey of key generic questions that define
process new risks emerged including the space in which specific software
wrong understanding of sales-represent- risks are born, and Table 1 provides more
atives’ work, poor or lacking functional- specific questions related to the identifi-
ity, an inadequate and cumbersome user- cation of risks in the system environ-
interface, poor data quality, slow per- ment.
formance, need for linkages with other Such checklists and other risk man-
company’s applications, and too tight agement methods provide a fast ap-
deadlines (Keil 1995, Markus & Keil proach to improve the risk management
1994). Some of these—especially lack of ability of a software organization.
linkages to other applications, lacking Changes in the other components of the
functionality, and the inappropriate fit management environment are outcomes
between the system structure and system of evolutions unfolding over longer peri-
task (Markus & Keil 1994)—were, at the ods of time: hiring new people, changing
end, fatal for the system. organizations’ competencies, skills and
beliefs, or restructuring the management
and development practices. Such drastic
interventions pay off only over longer
6. Conclusion periods of time—but then, in most cases,
We have presented a framework for soft- they do pay off more handsomely.
ware risk management and we have used
it to: (i) describe the nature of software
risk management, (ii) provide a general
understanding of the literature on risk- Acknowledgements
based software management, (iii) inter- The authors are thankful for useful com-
pret software episodes involving high ments from the editors and reviewers and
risks, and iv) provide generic checklists for discussions with Michael Gjesing,
covering the space in which software Mark Keil, Karleen Roberts, and Roy
risks are born. The framework should not Schmidt.
be seen as a traditional testable model.
Instead, the framework presents, in rela-

K. Lyytinen, L. Mathiassen & J. Ropponen 66


Curtis B., Krasner H., Iscoe N. (1988), A
References Field Study of the Software Design Proc-
Alter S., Ginzberg M. (1978), Managing ess for Large Systems, Communications
Uncertainty in MIS implementation, of the ACM, Vol. 31, No. 11.
Sloan Management Review, Fall. Davis G. B. (1982), Strategies for Information
Andersen N. E., Kensing F., Lundin J., Math- Requirements Determination, IBM Sys-
iassen L., Munk-Madsen A., Rasbech M., tems Journal, Vol. 21, No. 1.
Sørgaard P. (1990), Professional Systems Davis G. B., Lee A. S., Nickles K. R., Chat-
Development: Experience, Ideas and terjee S., Hartung R., Wu Y. (1990), Diag-
Action, Prentice Hall. nosis of an Information System Failure: A
Barki H., Rivard S., Talbot J. (1993), Toward Framework and Interpretive Process,
an Assessment of Software Development Management Information Systems
Risk, Journal of Management Information Research Centre, WP-91-06, University
Systems, Vol. 10, No. 2. of Minnesota.
Boehm B. W., Gray T., Seewaldt T. (1984): Earl M. (1989), Management Strategies for
Prototyping versus Specifying: A Multi- Information Technology, Prentice Hall,
project Experiment. IEEE Transactions London.
on Software Engineering, Vol. 10, No. 3. Fairly R. (1994), Risk Management for Soft-
Boehm B. W. (1988), A Spiral Model of Soft- ware Projects, IEEE Software, Vol. 11,
ware Development and Enhancement, No. 3.
Computer, May. Galliers R. D., Sutherland A. R. (1991),
Boehm B. W. (1989), Software Risk Manage- Information Systems Management and
ment, Tutorial, IEEE Computer Society Strategy Formulation: The “Stages of
Press, Los Alamitos, California. Growth” Model Revisited, Journal of
Boehm B. W. (1991), Software Risk Manage- Information Systems, Vol. 1, No. 2.
ment: Principles and Practices, IEEE Soft- Gjesing M. V. (1993), Risk-based Project
ware, January. Management—An Example, The Danish
Boehm B. W., Ross R. (1989), Theory-W Bank Academy, (in Danish).
Software Project Management: Principles Heiskanen A. (1994), Issues and Factors
and Examples, IEEE Transactions on Affecting the Success and Failure of a Stu-
Software Engineering, Vol. 15, No. 7. dent Record System Development Process
Burns R., Dennis A. (1985), Selecting an - a Longitudinal Investigation Based on
appropriate application development, Reflection-in-Action, PhD Dissertation,
Database, Fall. Department of Computer Science, Uni-
Charette R. N. (1989), Software Engineering versity of Tampere.
Risk Analysis and Management, Intertext Humphrey W. S. (1989), Managing the Soft-
Publications, McGraw-Hill. ware Process, Software Engineering Insti-
Checkland P. (1981), Systems Thinking, Sys- tute, The SEI Series in Software Engineer-
tems Practice, John Wiley. ing, Addison-Wesley.
Constantine L. (1993), Work Organization: Keil M. (1995), Pulling the Plug: Software
Paradigms for Project Management and Project Management and the Problem of
Organization, Communications of the Project Escalation, MISQ, Vol. 19, No. 4.
ACM, Vol. 36, No. 10. Leavitt H. J. (1964), Applied Organization
Cooprider J. G., Henderson J. C. (1991), Change in Industry: Structural, Technical
Technology - Process Fit: Perspectives on and Human Approaches, in New Perspec-
Achieving Prototyping Effectiveness, tives in Organizational Research, John
Journal of Management Information Sys- Wiley.
tems, Vol. 7, No. 3.

K. Lyytinen, L. Mathiassen & J. Ropponen 67


Lyytinen K. (1991), Penetration of Informa- Roberts K. ed. (1993), New Challenges to
tion Technology in Organizations: A Understanding Organizations, MacMil-
Comparative Study Using Stage Models lan, New York.
and Transaction Costs, Scandinavian Rochlin G. (1993), Defining ‘High Reliabil-
Journal of Information Systems, Vol. 3. ity’ Organizations in Practice: a Taxo-
Lyytinen K., Hirschheim R. (1987), Informa- nomic Prologue, in Roberts K. (ed.), New
tion Systems Failures - a survey and clas- Challenges to Understanding Organiza-
sification of the empirical literature, tions, Macmillan.
Oxford Surveys in Information Technol- Ropponen J. (1993), Risk Management in
ogy, Oxford University Press, Vol. 4. Information System Development, Licen-
Lyytinen K., Mathiassen L., Ropponen J. tiate thesis, Department of Computer Sci-
(1994), Attention shaping and software ence and Information Systems, University
risk—A categorical analysis of four clas- of Jyväskylä, Finland.
sical approaches, submitted for publica- Ropponen J., Lyytinen K. (1993), How Soft-
tion. ware Risk Management Can Improve Sys-
March J., Sproull L., Tamuz M. (1991), tems Development: An Exploratory
Learning from Samples of One or Fewer, Study, accepted for publication in Euro-
Organization Science, Vol. 2, No. 1. pean Journal of Information Systems.
McFarlan W. (1982), Portfolio Approach to Simon H. (1979), Rational Decision Making
Information Systems, Journal of Systems in Business Organizations, American Eco-
Management, January. nomic Review, Vol. 69, No. 4.
Markus L., Keil M. (1994), If We Build It, Simon H. (1983), Theories of Bounded
They will Come: Designing Information Rationality, Behavioral Economics and
Systems that Users Want to Use, Sloan Business Organization, Vol. 1-2, MIT
Management Review. Press, Cambridge.
Mathiassen L., Seewaldt T., Stage J. (1995), 43. Willcocks L., Margetts H. (1994), Risk
Prototyping and Specifying: Principles assessment and Information Systems,
and Practices of a Mixed Approach, Scan- European Journal of Information Systems,
dinavian Journal of Information Systems, Vol. 3, No.2.
Vol. 7, No. 1. Weick K., (1979) The Social Psychology of
Mumford E. (1983), Designing Human Sys- Organizing, Reading, Massachusetts,
tems, Manchester Business School, UK. Addison-Wesley.
Mumford E. , McDonald B. W. (1989), Weick K., Daft R. (1983), The Effectiveness
XSEL’s Progress - the continuing journey of Interpretation Systems, in Cameron K.,
of an expert system, Wiley & Sons, Chich- Whetten D. (eds.), Organizational Effec-
ester. tiveness: A Comparison of Multiple Mod-
Neo B. S., Leong K. S. (1994), Managing els, New York, Academic Press.
Risks in Information Technology Projects: Weinberg G. M. (1986), Becoming A Techni-
a Case Study of TradeNet, Journal of cal Leader—An Organic Problem Solving
Information Technology Management, Approach, Dorset House Publishing.
May. van de Swede V. & van Vliet J. (1993), Con-
Nolan R. L. (1973), Managing the Computer sistent Development: Results of a First
Resource: A Stage Hypothesis, Communi- Empirical Study on the Relation Between
cations of the ACM, Vol. 16, No. 7. the Project Scenario and Success, in G.
Parnas R., Clemens P. (1986), A Rational Wijers, S. Brinkkemper (eds.), Proceed-
Design Process: How and Why to Fake It, ings of the 6th CAiSE Conference,
IEEE Transactions on Software Engineer- Uttrecht, The Netherlands.
ing, Vol. SE-12, No. 2.

K. Lyytinen, L. Mathiassen & J. Ropponen 68

View publication stats

Das könnte Ihnen auch gefallen