Improving Business Value Assurance in Large-Scale IT Projects—A Quantitative Method Based on Founded Requirements Assessment

The probability of IT project failures can be mitigated more successfully when discovered early. To support a more insightful management of IT projects, which may also facilitate an early detection of IT project failures, transparency regarding a project's cash flows shall be increased. Therefore, an appropriate analysis of a project's benefits, costs, requirements, their respective risks and interdependencies is inevitable. However, to date, in requirements engineering only few methods exist that appropriately consider these factors when estimating the ex ante project business case. Furthermore, empirical studies reveal that a lot of risk factors emerge during the runtime of projects why the ex ante valuation of IT projects even with respect to requirements seems insufficient. Therefore, using the Action Design Research approach, we design, apply, and evaluate a practicable method for value-based continuous IT project steering especially for large-scale IT projects.

[1]  Gilbert Fridgen,et al.  An Approach for Portfolio Selection in Multi-Vendor IT Outsourcing , 2011, ICIS.

[2]  D. Bernoulli Specimen theoriae novae de mensura sortis : translated into German and English , 1967 .

[3]  Gilbert Fridgen,et al.  Benefits Quantification in IT Projects , 2013, Wirtschaftsinformatik.

[4]  Martin S. Feather,et al.  Quantitative risk-based requirements reasoning , 2003, Requirements Engineering.

[5]  D. Bernoulli Exposition of a New Theory on the Measurement of Risk , 1954 .

[6]  D. L. Hanson,et al.  ON THE THEORY OF RISK AVERSION , 1970 .

[7]  Betty H. C. Cheng,et al.  Current and Future Research Directions in Requirements Engineering , 2009 .

[8]  Dennis Kundisch,et al.  IT Sourcing Portfolio Management for IT Services Providers - A Risk/Cost Perspective , 2008, ICIS.

[9]  Dean M. Hanink A Mean-Variance Model of MNF Location Strategy , 1985 .

[10]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[11]  K. Arrow Essays in the theory of risk-bearing , 1958 .

[12]  KlierJulia,et al.  Improving Business Value Assurance in Large-Scale IT ProjectsA Quantitative Method Based on Founded Requirements Assessment , 2014 .

[13]  L. Kruschwitz,et al.  Daniel Bernoulli: Entwurf einer neuen Theorie zur Bewertung von Lotterien. “Specimen theoriae novae de mensura sortis”, Commentarii Academiae Scientiarum Imperialis Petropolitanae 1738, S. 175–192. Aus dem Lateinischen übersetzt , 1996 .

[14]  Alastair G. Longley-Cook Risk-Adjusted Economic Value Analysis , 1998 .

[15]  Line Dubé,et al.  Rigor in Information Systems Positivist Case Research: Current Practices , 2003, MIS Q..

[16]  Jane Cleland-Huang,et al.  Software by Numbers - Low-Risk, High-Return Development , 2003 .

[17]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[18]  Steffen Zimmermann,et al.  Integrierte Ex-ante-Rendite-/Risikobewertung von IT-Investitionen , 2005, Wirtschaftsinf..

[19]  Pamela Zave Classification of research efforts in requirements engineering , 1997, ACM Comput. Surv..

[20]  H. Markowitz Portfolio Selection: Efficient Diversification of Investments , 1971 .

[21]  A. Stuart,et al.  Portfolio Selection: Efficient Diversification of Investments , 1959 .

[22]  Emil Numminen,et al.  Using portfolio theory to support requirements selection decisions , 2010, 2010 Fourth International Workshop on Software Product Management.

[23]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[24]  Matthias Jarke,et al.  The Brave New World of Design Requirements: Four Key Principles , 2010, CAiSE.

[25]  Phillip G. Armour The inaccurate conception , 2008, CACM.

[26]  B. Flyvbjerg,et al.  Why Your IT Project May Be Riskier than You Think , 2011 .

[27]  Markus Glaser,et al.  What Determines How Top Managers Value Their Stock Options? , 2010 .

[28]  Neil A. Ernst,et al.  Agile Requirements Evolution via Paraconsistent Reasoning , 2012, CAiSE.

[29]  Axel van Lamsweerde,et al.  Requirements engineering in the year 00: a research perspective , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[30]  Indranil R. Bardhan,et al.  Prioritizing a Portfolio of Information Technology Investment Projects , 2004, J. Manag. Inf. Syst..

[31]  Sandeep Purao,et al.  Action Design Research , 2011, MIS Q..

[32]  E. Schmidt Descubrir -y reducir- los costos reales de la atención de salud , 2011 .

[33]  Klaus Pohl,et al.  The Three Dimensions of Requirements Engineering , 1993, CAiSE.

[34]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[35]  Gilbert Fridgen,et al.  The Importance of Continuous Value Based Project Management in the Context of Requirements Engineering , 2013, ArXiv.

[36]  Matthias Jarke,et al.  High Impact Requirements Engineering , 2010, Wirtschaftsinf..

[37]  Thorsten Spitta,et al.  Approaches to the Ex-ante Evaluation of Investments into Information Systems , 2004, Wirtschaftsinf..

[38]  Bashar Nuseibeh,et al.  Requirements engineering: a roadmap , 2000, ICSE '00.

[39]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[40]  Hans Ulrich,et al.  The Contribution of Business and Information Systems Engineering to the Early Recognition and Avoidance of "Black Swans" in IT Projects , 2012 .

[41]  Salvatore T. March,et al.  Design and natural science research on information technology , 1995, Decis. Support Syst..