Requirements Elicitation For Mobile B2B Applications: A Project-Based Consulting Approach
Requirements Elicitation For Mobile B2B Applications: A Project-Based Consulting Approach
Mobile B2B applications are an emerging issue when it comes to the adoption of new
technologies in business, providing innovative opportunities for multiple operations between
customers and companies. For organisations that have decided to implement such an
application within the scope of a project, the requirements elicitation process depicts an
important step in order to determine necessities and to build a basis for subsequent strategic
decisions. This paper depicts an offer for a B2B food sector company with the intention of
identifying the requirements for such a project. The introduced approach utilises approved
methods and techniques from the fields of project and software management.
I. References.............................................................................................................................14
1. Introduction – Background and Objectives
New communication technologies always bring along new chances and ways of conducting
daily business operations. In this context, the utilisation of the internet to collaborate with
trading partners depicts a notable advance within the last two decades. These direct
electronical collaborations are commonly labelled as business-to-business (B2B) applications,
which for example target “e-procurement, supply-chain management (SCM), and B2B e-
payment” (Al-Naeem et al., 2005, p. 41). Due to the rise of mobile devices like smartphones
or tablets and the concomitant increased usage of professionals’ mobile devices during work,
especially mobile B2B applications have been evolving as an important tool for customer
relationship management (Smilansky, 2015). Nowadays, people already spend more time
using mobile applications than internet via traditional desktop computers (Zamfiroiu, 2015).
Well-known software manufacturers already detected this development, offering mobile B2B
applications for multiple business purposes (Tornack et al., 2011).
The client, an SME providing food products to catering companies, is aware of this progress
and intends to program and implement a mobile B2B application for his customers. However,
due to the high complexity of such IT projects, only an extensive exposure of the
requirements can prevent the project from certain failure (Azadegan et al., 2013). Based on
the results of more than hundred research and development projects, Dvir et al. (2003) point
out that project success is strongly correlated with the definition of those requirements. In
order to determine relevant requirements of this project, a study shall provide valuable
information about different project necessities. Regarding software development, this process
is commonly labelled as ‘requirements engineering’ respectively ‘requirements elicitation’
which describes “seeking, uncovering, acquiring and elaborating requirements for computer
based systems” (Zowghi and Coulin, 2005, p. 19). Although requirements elicitation is mostly
perceived as the first major step of a software engineering project, the shape of its process and
used methods varies, depending on the particular project (Vijayan and Raju, 2011). Hence,
this report can be understood as a consulting offer to conduct a requirements elicitation study,
outlining all pertinent methods which are of importance for the individual case of the client.
It is of fundamental importance that the study as well as the development of the mobile B2B
application for the client itself can be seen as projects. Projects are unique sets of temporary
activities with a definable goal, which cut across functional lines and imply risks as well as
costs for an organisation (Nicholas and Steyn, 2012). That is why project management
methods as well as experiences from software project management case studies will take a
key role in the presented requirements elicitation approach. The study covers the following
objectives and related methods in order to reveal the client’s requirements for the project of
developing and implementing a mobile B2B application, whereas objectives and methods
build on one another:
1
Objective 1: Identifying the functional requirements of mobile B2B applications within the
food market for catering companies
Stakeholder Analysis
Software Benchmarking
Objective 3: Identifying the resources requirements the client has to raise for programming,
implementing and operating the mobile B2B application
At first, the offer will illustrate the intended relevant methods which are required in order to
reveal the particular requirements of the three objectives. Here, the methods are described
shortly, while evidences from project management background exemplify the adequacy of the
methods. Based on the introduced methods and their approximate time need, the offer will
illustrate the intended approach with the aid of a Gantt chart, providing an overview with start
and end times for the individual project steps and methods. Subsequently, the contribution of
the particular methods and the project as a whole will elucidate why the illustrated approach is
the most useful one for the company’s objectives, supported by several industry cases.
Finally, the concluding remarks will summarise the main details of the offer in order to
provide final decision guidance towards this offer.
The general aim of the study is to provide a holistic research approach for the client, which
covers all relevant kinds of requirements in order to assess the necessities of programming
and implementing the mobile B2B application. The following chapter illustrates the
background as well as the individual processes of the particular methods.
It has to be considered that the information gathering process of all the intended methods
requires an open communicative exchange with the client. Changing client requirements or
circumstances can occur during the whole requirements elicitation process and should be
incorporated as soon as the changes are identified. Therefore, a continuous two-way
communication process with the client in the form of a permanent contact person secures
adequacy of the study (Nakatani et al., 2014). This is supported by Houdek and Pohl (2000)
who examine the requirements elicitation process of Daimler-Chrysler projects and emphasise
that over 50% of the requirements changes happen after the actual identification process.
2
2.1 Objective 1 – Functional Requirements
As already indicated, B2B applications are able to cover several functionalities, from being
just a marketing tool to comprising a whole e-procurement system including embedded sales
and payment possibilities (Al-Naeem et al., 2005). In order to provide a basis for the further
requirements analyses, the examination of the functional requirements focuses on the
questions, how the application has to look like to please the stakeholders and in which
functional direction (e.g. sales, marketing, supply-chain management, e-payment, etc.) the
application has to go. Overall, the client receives knowledge about what the market and its
key players require of the B2B application.
The stakeholder identification process for the client happens on the basis of a brainstorming
meeting, as suggested by Calvert (1995). Here, also the client participates due to his superior
knowledge of the internal proceedings and affected groups (Pouloudi and Whitley, 1997). The
identification particularly focuses on what Sharp et al. (1999, p. 389) call ‘Baseline
Stakeholders’, which represent internal and external “users, developers, legislators and
decision-makers” with respect to the complete predicted software lifecycle. After the
identification of the relevant stakeholders, direct stakeholder communication is necessary in
order to determine their needs and requirements. This can happen through structured meetings
or personal conversations. This step ensures an understanding and involvement of the relevant
stakeholders from the beginning of the project (Passenheim, 2009). Also, the prioritisation of
stakeholders and their individual requirements are elementary steps towards stakeholder
comprehension since stakeholders are not equally important for the mobile application.
Overall, this prioritisation has to consider the strategic adjustment of the company (Glinz and
Wieringa, 2007). On the basis of these results, a final stakeholder matrix with objectives,
priorities and contributions is produced (Lock, 2013). Difficulties during the stakeholder
analysis may especially emerge in the case of hard accessibility of stakeholders as well as if
there is an individual stakeholder with diverging inner objectives (e.g. in the case of a
heterogeneous organisation) (Jepsen and Eskerod, 2009).
3
functional requirements, which were identified by those stakeholders with the highest
prioritisation. Benchmarking describes the practice of comparing the own organisational
operations with equivalent processes of industries’ market leaders. Doing so, it is possible to
gather information and achieve an improvement of the own business operations by applying
this information (Watson, 1993). In this sense, software benchmarking can be understood as a
certain kind of focused competitive analysis which, however, also includes software
companies as well as best practice examples of comparable markets. With this form of an
external benchmarking analysis, it is possible to set the functional requirements of the client
on a level which enables him to compete with his competitors on a qualitative and
technological high level (Hines, 1998).
Since benchmarking subjects (competitors and software companies) are already set, the first
step of the software benchmarking process is the collection of data (Kodali, 2008). The data
collection process for software benchmarking as such is a qualitative one (Jones, 1995). The
information is derived on the basis of general market reports from acknowledged data bases
such as Key Note, Mintel and MarketLine as well as providers of special benchmarking
reports such as Best Practices, LLC. Furthermore, the online visibilities of software
manufacturers such as SAP, Oracle and Microsoft offer further information about their mobile
solutions for several industry segments including the food industry. Based on the gathered
data, an analysis and evaluation of the benchmarks is performed subsequently. This analysis
will compare the identified stakeholder objectives with the elaborated benchmarks in order to
set the final functional requirements which the mobile B2B application has to fulfil in order to
achieve a possible competitive advantage within the industry (Kodali, 2008). However, it also
has to be considered that benchmarking has its bottlenecks. In times of fast changing
technology, it is not taken for granted that current software benchmarks remain the same
benchmarks in the future. Hence, long-term developments have to be considered (Kumar and
Harms, 2004).
4
of the operative business (Singer et al., 2009). Embedding changes within such an IT
environment which involves other entities creates constraints which are relevant due to the
question whether the client is able handle these constraints (MacLean et al., 2004).
Hence, the analysis has to comprise the identification of existing systems, modules and
interfaces (before) and of necessary systems, modules and interfaces (after) between the new
mobile application and the existing system environment (Pries and Quigley, 2008).
Furthermore, it has to reveal existing IT service, security and support processes which also
have to be considered during the implementation of the B2B application. The foundation of
the system environment analysis is an interview with the responsible IT leader or respectively
the responsible application owner of the client, in order to get an overview of the related
systems. For the case that the IT processes are administered by an external provider, it might
be necessary to consult the provider as an additional information source. Also already existing
system manuals can be drawn upon to collect information (Vijayan and Raju, 2011). On basis
of the information gathering process, a before & after graphic of the IT environment is
prepared. These graphics enable an understanding of which modules are affected by the new
application and which additional interfaces respectively interface tools might be necessary to
allow an automated data exchange and, hence, an operative usage of the application (Pries and
Quigley, 2008). Analysing further needs which may be derived from the graphics will reveal
possible necessary module adoptions. Depending on which systems are affected, it is also
possible to detect which particular IT skills are needed in order to conduct these changes. This
provides the basis for the subsequent personnel analysis.
Training time of developers and other staff in order to acquire necessary skills can be quite
intricate, so a systematic personnel analysis which compares necessary tasks and roles with
the human capital of the client reveals the exact personnel requirements for the project (Otero
et al., 2009). In this sense, the personnel analysis depicts an actual state analysis, comparing
‘what we need’ with ‘what we have’. In this analysis, the project role planning depicts the
first step. Taking the data of the functional requirements and the system environment analysis
as a basis, necessary roles have to be defined and adjusted to the client’s project. The project
roles also have to consider and be embedded within the organisational hierarchy, reflecting
administrative as well as technical tasks (Jucan, 2013). The second major step is the actual
state analysis which takes the information gathered by the project role planning, comparing it
5
with the organisational capabilities. Here, sources are the organigram of the client, position
descriptions as well as a possible personnel data base. If required, an interview with the CEO
or HR principle could deliver further insights (Project Management Institute, 2013). Problems
could occur if the staff and skill set of the company is given, but the staffing collides with
other operational responsibilities of the client. Furthermore, it can be hard to assess the
amount of required roles for a new project with a new combination of project teams (Barreto
et al., 2008).
6
2.3.1 Project Time Planning
Just like each project, the client’s mobile B2B software programming project consists of
individual steps which have to be undertaken. In order to get an overview of the time the
company has to spend for the project, project time planning is an important step to reveal
temporal requirements. Especially for software engineering projects, time estimates depict a
special challenge due to the high complexity and dependency on uncertain proceedings (Lock,
2013).
The two focus points of project time planning are the manufacturing of an activity-based
network and on this basis, the drawing of a Gantt chart (Maley, 2012). The first step towards
the network is to break down the project into activities in order to provide a foundation for
estimation and scheduling activities. This step requires deeper knowledge in software
programming and testing procedures, so that experiences from managers who were involved
in software engineering projects as well as software engineering case studies support this step.
Those sources, together with published estimation data, subsequently contribute to identify
the approximate required time (Project Management Institute, 2013). Afterwards, the revealed
activities have to be put into a logical sequence. Dependencies and individual task durations
allow for drawing a network diagram, considering start times, end times and milestones
(Passenheim, 2009). More detailed planning approaches would also consider costs and
resource constraints for the individual steps, which for the scope of this study however is not
relevant (Nicholas and Steyn, 2012). In the end, the network diagram results in a detailed
Gantt chart, as introduced in chapter 3. Overall, the usage of project management software
like MS Project is elementary for a project of such complexity and helps to avoid mistakes
and secures reliability for the planning approach. Furthermore, it provides multiple options for
the client regarding layout and reports of the time planning (Zhang and Bishop, 2013).
LCC can already be defined in the pre-project planning phase, providing an early overview
over a long time range (Lindholm and Suomala, 2005). The LCC analysis considers five
different types of costs: direct, indirect, contingent, intangible as well as external costs
(Norris, 2001). This can for example be material, labour or overhead costs (Passenheim,
2009). The data collection process for the LCC happens with help of a bottom-up approach,
applying activity-based costing which subsequently are accumulated (Vlachý, 2014). The
7
software life cycle is separated into various phases in order to distinguish the functional stages
(Kapp and Girmscheid, 2005). The results of the project time planning and its identified tasks
provide a first insight over necessary project steps. The process is supported by an open-
source estimation software and the calculations are based on market-based prices for hourly
wages and necessary software tools (Abran, 2015). Finally, the individual costs are
accumulated, providing a statement about the costs for the whole product life-cycle. However,
the danger of LCC is a possible unreliability of data. Costs can vary over time, so that the
analysis cannot anticipate possible changes (Higham et al., 2015). Hence, the result has to be
seen more as orientation and not as hard fact. In the case of a final project implementation, the
cost estimation will become on the basis of performance experiences more detailed and exact,
improving its reliability (Passenheim, 2009).
3. Study Gantt-Chart
As introduced, all techniques are connected by individual implementation steps and exhibit
certain process durations. In order to provide an overview of the process of the consulting
project for client, consultant and stakeholders, a Gantt chart is broadly identified as a useful
tool (Locke, 2013; Nicholas and Steyn, 2012). The Gantt chart considers individual
implementation durations of the single project steps as well as their dependencies. The
dependencies are shown as “Finish-to-start” dependencies, which means that they illustrate
which steps have to be completed before the dependent and following step can begin. On the
other hand, the critical path exemplifies the order of those critical steps, which have to be
completed to finish the whole project (Maley, 2012).
The entire study is scheduled for 6 months, which depicts 26 weeks, with a kick off meeting
initiating the project. As already indicated, a continuous consultant-client communication
ensures the adequacy of the study. However, this consistent possibility for consultation does
not affect the meetings which are provided for the individual techniques. The kick-off
meeting at the beginning of the study introduces the involved and responsible persons and
presents relevant details regarding the particular project steps, as suggested by Passenheim
(2009). While the first 22 weeks are part of the data gathering process, all information and
notes will be shaped in week 23 till 25 in order to produce the study. Since risk identification
and analysis are overlapping activities which include multiple factors, further adoptions may
be made during the resource requirements analysis. In the last week, the client will receive the
final report, including a presentation with recommendations towards further actions.
Furthermore, an evaluation meeting will offer the possibility for both sides to provide
improvement feedback for following consulting projects.
Figure 1 illustrates the Gantt chart, the sequence of the particular methods, their durations and
dependencies. The task ID helps to orientate and to distribute the dependencies. While the
task itself is conducted if the cells are filled, dashed cells symbolise that the individual tasks
are ancillary processes at those points. Grey cells represent slack time, which enables the
individual process to take longer, without increasing the critical path and the maximum
duration of the project. However, due to the fact that the most processes build on one another,
8
the Gantt chart does not provide much space for slack time. However, the project times were
estimated permissively, so that there should not be any major delays:
9
Timeframe (6 months = 26 Weeks)
Week 10
Week 14
Week 15
Week 16
Week 21
Week 22
Week 23
Week 26
Week 11
Week 12
Week 13
Week 17
Week 18
Week 19
Week 20
Week 24
Week 25
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
Week 7
Week 8
Week 9
Gantt Chart
Critical Path B K W AF AJ
Task ID Tasks Duration Dependencies
A Kick Off Meeting and Client Communication 1 Week -
B Objective 1 - Functional Requirements 7 Weeks A
C Stakeholder Mapping 4 Weeks A
D Stakeholder Identification 1 Week A
E Stakeholder Meetings/ Conversations 1 Week A,D
F Stakeholder Priorisation 2 Weeks A,D
G Stakeholder Matrix (incl. Prioritisation and Objectives) 1 Week A,D,E,F
H Software Benchmarking 3 Weeks C
I Data Collection Process 1 Week C
J Benchmark Analysis 2 Weeks C,I
K Objective 2 - Structural Requirements 8 Weeks B
L System Environment Analysis 3 Weeks B
M Interview with the IT Leader/ Application Owners 1 Week B
N Producing of IT Environment Graphics 2 Weeks B,M
O Need Analysis 1 Week B,M,N
P Personnel Analysis 3 Weeks L
Q Project Role Planning (Which roles are necessary?) 2 Weeks L
R Actual State Analysis (Does the company has the staff?) 1 Week L,Q
S Risk Identification and Analysis 8 Weeks B
T Risk Identification 4 Weeks B
U Risk Evaluation 3 Weeks B,T
V Risk Ranking (Matrix) 2 Weeks B,T,U
W Objective 3 - Resources Requirements 7 Weeks K
X Project Time Planning 3 Weeks K
Y Project Break Down and Time Estimation 2 Weeks K
Z Draw Network Diagram 1 Week K,Y
AA Draw Gantt Chart 1 Week K,Y,Z
AB Life-Cycle Cost Analysis 4 Weeks X
AC Analysing Types of Costs and Necessary Activities 2 Weeks X
AD Data (Cost) Collection for Revealed Activities 2 Weeks X, AC
AE Cost Accumulation 1 Week X,AC,AD
AF Producing the Study 3 Weeks B,K,W
AG Recommendations 2 Weeks B,K,W
AH Study Submission 1 Week B,K,W,AF,AG
AI Presentation of the Results 1 Week B,K,W,AF,AG
AJ Evaluation Meeting 1 Week B,K,W,AF,AG
Key:
Slack Time
Ancillary Process
After receiving an overview of the techniques and procedure of the study, the following
chapter will in detail deal with the question of how the individual techniques contribute to the
identified objectives and the overall aim of exposing all requirements for programming and
implementing a mobile B2B application. Evidences from industry and software case studies
are combined with insights researchers gained while using or investigating the particular
techniques.
Overall, the client will obtain all necessary information which helps him to determine a
picture of the project’s requirements from this approach. Furthermore, the client receives a
holistic and scientific approach, providing detailed insights about potentials and possibilities
for future IT projects within the company. Consequently, the client will be able to make
further relevant decisions regarding the project. If the revealed functional, structural and
resources requirements do not fit to the capabilities of the client, outsourcing the project could
be a possibility. However, if the study shows that undertaking the project is within the
capabilities of the client, the study already provides the first step of the project planning and
requirements elicitation phase, saving time and money for the client.
According to Vrhovec et al. (2015), stakeholder analysis before undertaking software projects
is also strongly connected to the risk identification and analysis process due to the
concomitant problems in the case of ignoring stakeholder needs. Based on a case study of an
application development in the banking sector, they point out that especially the IT
personnel’s understanding of the appropriate business process and the clear communication
among stakeholders are of particular importance. Also Rost and Glass (2009) emphasise the
impact of stakeholders on project risks, emphasising the need to analyse and assess them. Due
to the coverage of all relevant market participants such as users, programmers and customers,
a conscientious conducted stakeholder analysis in interaction with software benchmarking
makes a market analysis redundant.
Investigating its application in France, Maire et al. (2005) find that 50% of the examined
companies use benchmarking regularly in order to find best practices with the aim of
improving IT processes. Applying benchmarking theoretically and practically on the
requirements elicitation process of a website development project, Pang et al. (2009) illustrate
that benchmarking is a useful tool in order to assess IT-based requirements. In the context of
project management, Loo (2003) successfully applies benchmarking for technical aspects,
proving the suitability of benchmarking for complex projects. Especially regarding the
objective of revealing the functional requirements of the client’s mobile B2B application,
benchmarking is able to provide valuable industry insights of already existing and adopted
software. This fills the gap between those functional requirements already detected in the
stakeholder analysis, and the functional requirements which are necessary for a practical
implementation.
Charette (2005) summarises multiple failed software projects of small and large companies,
with the result that IT problems as well as inadequate adaptions were responsible for a large
part. Those problems can lead to foregone profits which can also be prevented by a focused
analysis of the IT infrastructure of the client. Moreover, the system environment analysis
allows further conclusions regarding the requirements of the IT security, service management
and risk management which is supported by the case of a Greek software company
undertaking implementation projects at clients (Maroukian, 2010). Also Byrd and Turner
(2000) emphasise the IT infrastructure’s key role for the users (personnel) on the one hand
and for further developments on the other hand in a broad-based study. This coincides with
the introduced approach, which provides the system environment analysis to be a foundation
of the subsequent personnel analysis.
Furthermore, Park et al. (2015) emphasise that planning and allocation of human resources
and especially of developers during software projects to certain tasks and responsibilities
depicts a necessity in order to handle time issues and to estimate the workload per employee.
Hence, possible bottlenecks can be revealed before they occur. For the client, the personnel
analysis depicts an elementary step in order to decide whether outsourcing the project or
hiring external freelancers may be a sensible possibility. In the case of minor expertise gaps
respectively shortages, freelancers could fill these gaps (Wu and Zmud, 2010).
Examining the adoption of time planning approaches for software projects, Verner et al.
(2007) find out that unreasonable time planning goes along with inadequate requirements
engineering, leading to rising time risks, while the failure of many projects can be derived by
those events. Hence, a conscious analysis with reasonable time estimation can prevent the
client from wrong time assessment, occurring risks and connected losses.
Investigating several industry cases about the adoption of LCC, Korpi and Ala-Risku (2008)
point out that the technique is particularly popular due to its provided insights concerning
long-term affordability which makes it superior in comparison to other cost estimation
techniques. Also Chikofsky and Cross (1990) underline the fact that LCC reduces a lot of
uncertainty for software projects by revealing hidden costs. This is of particular importance
for SMEs which come not from an IT background due to possible lacks in estimating software
costs.
5. Concluding Remarks
Overall, the offer provides a holistic approach to reliably reveal different kinds of project
requirements which are of particular interest for the client. This holistic approach is based on
acknowledged and approved methods, which offer detailed application instructions on the one
hand, and hints regarding possible problems on the other hand. It has to be considered that the
introduced approach is adapted to the individual case of the client and his specific
requirements, so that the client receives a study which perfectly fits his needs. Especially the
presented experiences of prior software engineering projects demonstrate the appropriateness
and validity of the techniques to examine the introduced objectives and, hence, the client’s
multiple requirements of daring the development of a mobile B2B application. For the case of
changes or enhancements in the client’s requirements, the close communication process
during the study ensures optimal customisation of the gathered information. Furthermore, the
client is, with the help of the Gantt-chart, always able to identify at which point in the study
he is located at the moment.
Due to the information the client receives from the study and the final presentation about the
pivotal results, he will be able to make the important decision whether it is more sensible to
buy the mobile application or to build and implement it in-house (“build or buy”) (Cortellessa
et al., 2008). This decision can be derived by the results of all conducted analyses, which
reveal if the client has the required knowledge, structure and resources to build the application
on his own while being able to handle the risks. In order to provide a guideline for this
decision, the provided study concludes with valuable recommendations for further actions.
I. References
Abran, A. (2015), Software project estimation: the fundamentals for providng high quality
information to decision makers. Hoboken, New Jersey: Wiley.
Al-Naeem, T., Rabhi, F.A., Benatallah, B. and Ray, P.K. (2005), “Systematic Approaches for
Designing B2B Applications”, International Journal of Electronic Commerce, Vol.9(2),
pp. 41-70.
Azadegan, A., Cheng, X., Yin, G. and Niederman, F. (2013), “Collaborative Requirements
Elicitation in Facilitated Collaboration: Report from a Case Study”, 46th Hawaii
International Conference on System Sciences, pp. 569-578.
Babar M.I., Ghazali M., Jawawi D.N.A. and Zaheer, K.B. (2015), “StakeMeter: Value-Based
Stakeholder Identification and Quantification Framework for Value-Based Software
Systems”, PLoS ONE, Vol.10(3), pp. 1-33.
Baccarini, D., Salm, G. and Love, P.E.D. (2004), “Management of risks in information
technology projects”, Industrial Management & Data Systems, Vol.104(4), pp. 286-295.
Barreto, A., Barros, M. and Werner, C.M.L. (2008), “Staffing a software project: A constraint
satisfaction and optimization-based approach”, Computers & Operations Research,
Vol.35, pp. 3073-3089.
Boehm, B.W. (1991), “Software Risk Management: Principles and Practices”, IEEE
Software, Vol.8(1), pp. 426-435.
Byrd, T.A. and Turner, D.E. (2000), “Measuring the Flexibility of Information Technology
Infrastructure: Exploratory Analysis of a Construct”, Journal of Management Information
Systems, Vol.17(1), pp. 167-208.
Calvert S. (1995), “Managing stakeholders”, in: Turner, J.R. (ed.), The commercial project
manager. Maidenhead: McGraw-Hill, pp. 214-222.
Chikofsky, E.J. and Cross, J.H. (1990), “Reverse Engineering and Design Recovery: A
Taxonomy”, IEEE Software, Vol.7(1), pp. 13-17.
Cortellessa, V., Marinellia, F. and Potena, P. (2008), “An optimization framework for “build-
or-buy” decisions in software architecture”, Computers & Operations Research, Vol.35,
pp. 3090-3106.
Dey, P.K., Kinch, J. and Ogunlana, S.O. (2007), “Managing risk in software development
projects: a case study”, Industrial Management & Data Systems, Vol.107(2), pp. 284-303.
Dvir, D., Raz, T. and Shenhar, A.J. (2003), “An empirical analysis of the relationship between
project planning and project success”, International Journal of Project Management,
Vol.21, pp. 89-95.
Eckardt, J.R., Davis, T.L., Stern, R.A., Wong, C.S., Marymee, R.K. and Bedjanian, A.L.
(2014), “The Path to Software Cost Control”, Defense AT&L, November–December 2014,
pp. 23-27.
Higham, A., Fortune, C. and James, H. (2015), “Life cycle costing: evaluating its use in UK
practice”, Structural Survey, Vol.33(1), pp. 73-87.
Hines, P. (1998), “Benchmarking Toyota’s supply chain: Japan vs UK”, Long Range
Planning, Vol. 31(6), pp. 911-918.
Jepsen, A.L. and Eskerod, P. (2009), “Stakeholder analysis in projects: Challenges in using
current guidelines in the real world”, International Journal of Project Management,
Vol.27, pp. 335-343.
Jucan, G. (2013), “People in Senior Project Roles”, in: Lock, D. and Scott, L. (eds.), The
Gower Handbook of People in Project Management. Farnham: Gower.
Kapp, M.J. and Girmscheid, G. (2005), “Risk based life cycle cost analysis model for
comparable life cycle project delivery decision taking”, in: Collaboration and
Harmonization in Creative Systems. London: Taylor & Francis, pp. 895-901.
Kaur, R. and Sengupta, J. (2011), “Software Process Models and Analysis on Failure of
Software Development Projects”, International Journal of Scientific & Engineering
Research, Vol.2(2), pp. 1-4.
Korpi, E. and Ala-Risku, T. (2008), “Life cycle costing: a review of published case studies”,
Managerial Auditing Journal, Vol.23(3), pp. 240-261.
Kumar, S. and Harms, R. (2004), “Improving business processes for increased operational
efficiency: a case study”, Journal of Manufacturing Technology Management, Vol.15(7),
pp. 662-674.
Lindholm, A. and Suomala, P. (2005), “Learning by costing: sharpening cost image through
life cycle costing?”, 7th Manufacturing Accounting Research Conference, Tampere,
Finland, 30.May – 1.June.
Lock, D. (2013), Project Management. 10th ed., Farnham: Gower Publishing Ltd.
Loo, R. (2003), “A multi-level causal model for best practices in project management”,
Benchmarking: An International Journal, Vol.10(1), pp. 29-36.
MacLean, R., Stepney, S., Smith, S., Tordoff, N., Gradwell, D., Hoverd, T. and Katz, S.
(2004), Analysing Systems: determining requirements for object oriented development.
Hemel Hempstead: Prentice Hall International.
Maire, J.-L., Bronet, V. and France, A. (2005), “A typology of best practices for a
benchmarking process”, Benchmarking: An International Journal, Vol.12(1), pp. 45-60.
Maley, C.H. (2012), Project management concepts, methods, and techniques. Boca Raton,
Fla.: CRC Press.
Nakatani, T., Hori, S., Katamine, K., Tsuda, M. and Tsumaki, T. (2014), “Estimation of the
Maturation Type of Requirements from Their Accessibility and Stability”, IEICE
Transactions on Information and Systems, Vol.97(5), pp. 1039-1048.
Nicholas, J.M. and Steyn H. (2012), Project management for engineering, business and
technology. 4th ed., London: Routledge.
Norris, G.A. (2001), “Integrating life cycle cost analysis and LCA”, The International
Journal of Life Cycle Assessment, Vol.6(2), pp. 118-120.
Ojala, A. and Tyrväinen, P. (2008), “Best practices in the Japanese software market”, Global
Business & Organizational Excellence, Vol.27(2), pp. 52-64.
Otero, L.D., Centeno, G., Ruiz-Torres, A.J. and Otero, C.E. (2009), “A systematic approach
for resource allocation in software projects”, Computers & Industrial Engineering, Vol.56,
pp. 1333-1339.
Pang, M.-S., Suh, W., Kim, J. and Lee, H. (2009), “A Benchmarking-Based Requirement
Analysis Methodology for Improving Web Sites”, International Journal of Electronic
Commerce, Vol.13(3), pp. 119-162.
Park, J., Seo, D., Hong, G., Shin, D., Hwa, J. and Bae, D.-H. (2015), “Human Resource
Allocation in Software Project with Practical Considerations”, International Journal of
Software Engineering and Knowledge Engineering, Vol.25(1), pp. 5-26.
Pries, K.M. and Quigley, J.M. (2008), Project Management of Complex and Embedded
Systems Ensuring Product Integrity and Program Quality. Hoboken: Taylor and Francis.
Rost, J. and Glass, R.L. (2009), “The Impact of Subversive Stakeholders on Software
Projects”, Communications of the ACM, Vol.52(7), pp. 135-138.
Singer, L., Brill, O., Meyer, S. and Schneider, K. (2009), “Utilizing Rule Deviations in IT
Ecosystems for Implicit Requirements Elicitation”, Second International Workshop on
Managing Requirements Knowledge (MaRK'09).
Smilansky, O. (2015), “Third-Party Power: The Rise of the B2B App Store”, CRM Magazine,
Vol.19(11), pp. 28-31.
Verner, J.M., Evanco, W.M. and Cerpa, N. (2007), “State of the practice: An exploratory
analysis of schedule estimation and software project success prediction”, Information and
Software Technology, Vol.49, pp. 181-193.
Vijayan, J. and Raju, G. (2011), “A New approach to Requirements Elicitation Using Paper
Prototype”, International Journal of Advanced Science and Technology, Vol. 28, pp. 9-16.
Vlachý, J. (2014), “Using Life Cycle Costing for Product Management”, Management,
Vol.19(2), pp. 205-218.
Watson, G.H. (1993), Strategic Benchmarking: How to Rate Your Company’s Performance
Against the World’s Best. New York: Wiley.
Wu, W.W. and Zmud, R.W. (2010), “Facing the Challenges of Temporary External IS Project
Personnel”, MIS Quarterly Executive, Vol.9(1), pp.13-21.
Zhang, Y. and Bishop, C. (2013), “Project-Management Tools for Libraries: A Planning and
Implementation Model Using Microsoft Project 2000”, Information Technology and
Libraries, Vol.24(3), pp. 147-152.