33 research outputs found
Recommended from our members
An Application of the Deming Management Method for Information Technology Projects
Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. A correlation analysis of the hypothesized relationships were all found to be positively and significantly related. Subsequently, it appears that there is strong support for applying the teachings and ideas of W. Edwards Deming to IT project quality management. While the correlation analysis provides support for the Deming Management Method, a descriptive statistical analysis provides some insight into how many of Deming’s ideas and teachings are being applied explicitly or implicitly in the development of information systems
Recommended from our members
The FBI Virtual Case File: A Case Study
The Federal Bureau of Investigation (FBI) began developing a case management software system called the Virtual Case File in 2000, but eventually abandoned the project in April 2005. The cost of this project was estimated to be over 340 million for the proposed FBI Information Technology Upgrade Project (FITUP) that was soon divided into three parts and renamed Trilogy. This project was scheduled to take three years and included an enterprise-wide upgrade of desktop hardware and software and the implementation of a more modern and secure network. In addition, a Virtual Case File system would include a case management system, an evidence management system, and a records management system that would replace the FBI’s antiquated case management system which limited the FBI’s ability to carry out its mission effectively. This study provides a qualitative analysis of this IT project failure. More specifically, this study attempts to answer the questions: Was the failure of the FBI’s Virtual Case File project unique? Or does it share common characteristics with other IT project failures? This case study should be of interest to IT academics in terms of teaching project management or as a theoretical basis for guiding future research. This study should also be of interest to IT practitioners in terms of understanding some important project management challenges when attempting to implement an IT solutio
Perceptual Changes in the Interaction Process of User and Developer Interaction: An Experimental and Exploratory Study
The primary focus of a previous study proposed and tested a theoretical model that views the dyadic relationship between system developers and end-users as a social process. The model was tested using a laboratory experiment. Support for the theoretical model and associated hypotheses was found. This paper reports the results of an exploratory component of the original study that looked at how user and developer perceptions may change as a result of their interactio
Recommended from our members
Applying the Capability Maturity Model to Assurance of Learning
Assurance of Learning (AoL) focuses on the continuous improvement of curriculum development, program review, and, in many cases, accreditation. AoL programs are important for assessing undergraduate, masters, and/or doctoral degree programs, as well as the impact on curriculum management. A recent mandate from the Association to Advance Collegiate Schools of Business (AACSB) is the need for mature AoL processes to be in place. This paper describes the Capability Maturity Model (CMM) and discusses how it can be applied to assess the maturity and capability of any educational institution’s AoL initiative. An Aol-CMM model introduced and discussed in this paper can be used to assess an academic institution’s AoL maturity and then act as a road map to develop and align key processes to plan and advance to a higher level of AoL maturity. A set of AoL key processes at an AACSB accredited business school provides a backdrop and discussion to understand better the application of this CMM framework. This should be of interest and value since the model can be used by schools and programs with varying levels of process maturity and capability. Even institutions not interested in accreditation may find the application of a maturity model useful for improving academic excellence. Regardless, each school or program can assess its current state and then develop an evolutionary plan to reach the next higher level of AoL process maturity
Recommended from our members
A Framework for Identifying and Understanding Risks in Information Technology Projects
Managing the costs, complexity, and risks of IT projects continues to be a challenge for many organizations. Project risk management is becoming an important sub-discipline of software engineering, and focuses on identifying, analyzing, and developing strategies for responding to project risk efficiently and effectively. This paper presents an IT project risk identification framework to facilitate identifying and understanding various project risks as part of an overall project risk management process. The proposed framework should be of interest to IT practitioners during the creation of the project plan and over the course of a project so that appropriate and corrective actions can be taken as needed. Moreover, this risk identification framework should also be of interest to IT academics in terms of teaching project risk management or as a theoretical basis for future research. Taken together, this may help increase the likelihood of IT project success
Recommended from our members
An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software
Blackboard® is a Web-based tool that is becoming an important and popular course management software application in higher education. Moreover, Blackboard® has been predicted to be the future of all types of distance learning. It provides a number of learning tools, including an online discussion board, course content management, a course calendar, information announcement, electronic mail, reviews, auto-marked quizzes and exams, navigation tools, access control, grade maintenance and distribution, student progress tracking, etc. Blackboard® benefits include a high level of interactivity, a greater level of learner enthusiasm, and a high level of satisfaction. This paper describes student perceptions in terms of applying the Unified Theory of Acceptance and Use of Technology (UTAUT) model. The UTAUT model consolidates previous TAM related studies. However, in this study mixed support for this model was found in terms of the reliability of the scale items representing the UTAUT constructs and the hypothesized relationships. Although students tend to agree that Blackboard® is a good idea and use it frequently, most of software’s features are not being used to their fullest capability
Recommended from our members
The cultural and political influences on IT diffusion in the People\u27s Republic of China
This paper investigates how political and cultural influences impact the diffusion and use of information technology (IT) in the People\u27s Republic of China. Five separate interviews were conducted with individuals in five state-owned businesses. Based upon our interviews, it appears that the role and use of information technology in these organizations depends largely upon societal spectrums such as politics, culture, economic status, and the educational levels of the employees
Recommended from our members
Project Zenith: A Case Study of Electronic Data Interchange
This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm\u27s president supported the project to the extent that it must be completed and generate revenue within three months. As a result, the project manager and team had to overcome a number of obstacles and issues. Several key decisions and lessons learned are discussed and should be of interest to both information system practitioners and researchers
Recommended from our members
A Combined Model of IT Outsourcing Partnerships and Success
Outsourcing has the potential to decrease costs, increase focus, improve productivity, add flexibility and innovation, and increase operating income by taking advantage of another organization’s expertise, innovation, or cheaper labor. However, many managers have admitted that outsourcing initiatives have not fulfilled many of their expectations. Furthermore, studies have reported that more than half of outsourcing relationships fail within the first five years of implementation. This paper introduces a comprehensive theoretical model that combines two models proposed previously by Lee and Kim (1999) and Alborz, Seddon, and Scheepers (2003). Both models include sets of factors believed to influence the quality of the outsourcing partnership and, in turn, influence outsourcing success. This paper also extends these two works by proposing two important missing factors: Process Factors and Cultural Factors. The model presented in this paper should be of interest to both practitioners and researchers. For managers in an organization, the proposed model attempts to reduce the complexity of an outsourcing relationship so that both partners can focus on the most important factors that have the greatest potential to increase the likelihood of success. For IS researchers, this paper provides a new theoretical model grounded upon previous research to offer a more comprehensive framework to guide discussion and future research
Recommended from our members
The Restech Connections CD Project: A Case Study on the Social Construction of Risk
Risk management is an important component in understanding and managing information technology (IT) projects. The traditional view of risk management focuses on a three-stage process: identifying risk, assessing risk, and developing a strategy for dealing with each risk. This, unfortunately, may give project stakeholders a false sense of security. Although the application of risk management philosophies, techniques, tools, and methods to managing IT projects is not new, the idea of viewing risk as a social construction outlines a new paradigm for understanding and managing risk. Since the idea of a social construction view of risk has been introduced only recently, no studies have been published to provide support for the development of a theoretical framework. This study provides a case study of an IT project undertaken at a large university located in the midwestem United States. The challenges and problems encountered by the ResTech Helpdesk staff outline a social construction of risk based on not only the organization itself, but also the characteristics of the project, its stakeholders, and other groups involved. Therefore, many of the challenges of this project would be inherent to a university setting but would not be inherent to most other organizations