Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Managing Requirement Risks in Global Software Development

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 7
Year of Publication: 2011
Authors:
Aurangzeb Khan
Dr. Farooque Azam
Muhammad Shoaib Zafar
10.5120/4029-5747

Aurangzeb Khan, Dr. Farooque Azam and Muhammad Shoaib Zafar. Article: Managing Requirement Risks in Global Software Development. International Journal of Computer Applications 33(7):1-5, November 2011. Full text available. BibTeX

@article{key:article,
	author = {Aurangzeb Khan and Dr. Farooque Azam and Muhammad Shoaib Zafar},
	title = {Article: Managing Requirement Risks in Global Software Development},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {7},
	pages = {1-5},
	month = {November},
	note = {Full text available}
}

Abstract

Now a day’s trend toward software development is changed and Software organizations are distributing their development processes worldwide. Many organizations are interested in Global software development (GSD) as compared to in house development due to cheap human resources and to increase their revenue. Risk factor is also increased in GSD. In this study we will see how to mitigate the risk in requirement gathering phase of GSD.

Reference

  • Damian, D. & Moitra, D., "Gdevelopment: How far have we come?” IEEE Software, 2006.
  • Oberg, R., Probasco, L., and Ericsson, M., “Applying Software White Paper, Cupertino, CA, 2000, pp. 3-5.
  • Ramesh,V. and Dennis,A.R. object oriented team:lesions for virtual teams from global software development,Proc.of HICSS35,Hawaii,2002
  • Finkelstein,A. Requirements Engineering: an overview. 2ndAsia-Pacific Software Engineering Conference (APSEC'93), Tokyo, requirements engineering. International Journal of Software Japan, 1993.
  • Sims, E.M., Reusable, lifelike virtual humans for mentoring and role-playing. Computers &Education, 49), (2007) 75-92.
  • Uschold, M. and Gruninger, M., Ontologies: Principles, Methods and Applications. Knowledge Engineering Review, 11), (1996) 93-115).
  • Chandrasekaran, B., Josephson, J.R., and Benjamins, V. Ontology of Tasks and Methods. In KAW'98. Alberta, Canada1998).
  • Heeks, R., Krishna, S., Nicholson, B., & Sahay, S.(2001). Synching or Sinking: Global Software Outsourcing Relationships. IEEE Software,18(2), 54-60.
  • Sahay, S., 2003. Global software alliances: the challenge of ‘standardization”. Scandinavian Journal of Information Systems. Vol. 15,2003, pp.3-21.
  • Ramzan, S., Ikram, N., 2006. Requirement Change Management Process Models: Activities, Artifacts and Roles. Multitopic Conference, 2006 INMIC '06 IEEE.
  • Mathiassen, L. Saarinen, T.Tuunanen, T. Rossi, M., 2004. Managing Requirements Engineering Risks: Analysis and Synthesis of the Literature.Helsinki School of Economics Working Papers W-379, 2004.
  • Ralyte, J.; Lamielle, X.; Arni-Bloch, N.; Leonard, M, “A framework for supporting management in distributed information systems development”, Research Challenges in Information Science, Second International Conference on Digital Object Identifier:, 2008 , Page(s): 381 -392
  • Bass, M., Paulish, “Global Software Development Process Research at Siemens,” The 3rd Int. Workshop on Global Software Development, 2004
  • Robert K. Wysocki, “Effective Software Project Management, ” Wiley Publishing, Inc. USA , 2006 , pp. 112-113
  • McIvor, R., P.K. Humphreys, and W.E. McAleer, “A Strategic Model for the Formulation of an Effective Make or Buy Decision.” Management Decision, 1997. 35(2): p. 169-178.
  • Christiansen, H.M., “Meeting the Challenge of Communication in Offshore Software Development, in Software Engineering Approaches for Offshore and Outsourced Development,” S. First International Conference, Zurich, Switzerland, February 5-6, 2007. Revised Papers, Editor. Springer: Berlin / Heidelberg. p. 19-26. 2007.
  • Rottman,J.W., “Successfully outsourcing embedded software development.” Computer, 39(1): p. 55-61, 2006.
  • . Tafti, M.H.A., “Risks factors associated with offshore IT outsourcing.” Industrial Management & Data Systems,. 105(5): p. 549 - 560. 2005.
  • Khan, N., et al. “Evaluating Offshore IT Outsourcing in India: Supplier and Customer Scenarios. in hicss”. 2003. Hawaii, USA.
  • Cusumano, M.A., “ Managing software development in globally distributed teams “, ACM 2008 51 (2 ): p. 15-17
  • Bryson, N. and O.K. Ngwenyama, “Structuring IS Outsourcing Contracts for Mutual Gain: An Approach to Analyzing Performance Incentive Schemes.” Journal of the Association for Information Systems, 1(9): p. 1-14. 2000
  • Ahmed, Z., “Outsourcing exposes firms to fraud, in Thursday, 16 June 2005, 22:42 GMT 23:42 UK,”http://news.bbc.co.uk/2/hi/business/4094894.stm, Editor. 2005: 23.02.2008.