Development of an Agile Requirements Risk Prioritization Method: A Design Science Research Study

被引:1
作者
Tuunanen, Tuure [1 ,2 ]
Vartiainen, Tero [3 ]
Kainulainen, Sanna [1 ]
Ebrahim, Mehdi [4 ]
机构
[1] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla, Finland
[2] Uppsala Univ, Dept Informat & Media, Uppsala, Sweden
[3] Univ Vaasa, Sch Technol & Innovat, Vaasa, Finland
[4] Adv Management Syst Ltd, London, England
来源
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2023年 / 52卷
关键词
Information Systems Development; Agile Requirements Risk Prioritization Method; Design Science Research; SOFTWARE PROJECT RISK; INFORMATION-SYSTEMS; MODEL; MANAGEMENT;
D O I
10.17705/1CAIS.05226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The practice of information systems development (ISD) has changed during the past two decades from very structured approaches to agile ISD methods. However, in the literature many methods available for managing requirements-related risks follow a structured approach to ISD. Few, if any, available methods offer solutions that prioritize requirements risks for agile ISD projects based on recognizing requirements-related risks and patterns in order to mitigate these. To fill this gap in the literature, we apply the design science research methodology to develop an agile requirements risk prioritization method together with industry experts (n=54) in Finland and New Zealand in a multi-year study. The method was developed by applying contingency theory, and our study makes an artifactual contribution to the literature. The method helps practitioners prioritize the overall requirements-related risks for ISD projects.
引用
收藏
页码:609 / 637
页数:30
相关论文
共 60 条
[21]   A unified model of requirements elicitation [J].
Hickey, AM ;
Davis, AM .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2004, 20 (04) :65-84
[22]  
Iversen JH, 2004, MIS QUART, V28, P395
[23]   A framework for identifying software project risks [J].
Keil, M ;
Cule, PE ;
Lyytinen, K ;
Schmidt, RC .
COMMUNICATIONS OF THE ACM, 1998, 41 (11) :76-83
[24]   How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects [J].
Keil, Mark ;
Rai, Arun ;
Liu, Shan .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2013, 22 (06) :650-672
[25]   The Dynamics of Prioritizing: How Actors Temporally Pattern Complex Role-Routine Ecologies [J].
Kremser, Waldemar ;
Blagoev, Blagoy .
ADMINISTRATIVE SCIENCE QUARTERLY, 2021, 66 (02) :339-379
[26]  
Lianping Chen, 2015, IEEE Software, V32, P50, DOI 10.1109/MS.2015.27
[27]  
Linstone H. A., 2002, The Delphi method: Techniques and applications
[28]  
LYYTINEN K, 1987, COMPUT SURV, V19, P5, DOI 10.1145/28865.28867
[29]   Attention shaping and software risk - A categorical analysis of four classical risk management approaches [J].
Lyytinen, K ;
Mathiassen, L ;
Ropponen, J .
INFORMATION SYSTEMS RESEARCH, 1998, 9 (03) :233-255
[30]   DESIGN AND NATURAL-SCIENCE RESEARCH ON INFORMATION TECHNOLOGY [J].
MARCH, ST ;
SMITH, GF .
DECISION SUPPORT SYSTEMS, 1995, 15 (04) :251-266