Professional Documents
Culture Documents
net/publication/299341240
CITATION READS
1 263
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Irapuan Glória Júnior on 22 March 2016.
ABSTRACT
This paper identifies risks of scope and organizational risks in IT projects during the merger period in telecommuni-
cations companies and proposes actions for risk mitigation. It adopts an interpretive epistemology in an exploratory case
study. The results include a list of unique risks about IT projects in such period, and recommendations for mitigating the
risks, which were identified through the research. The theoretical contribution is a list of risks during the merger of telecom-
munications companies, and to the practical part, this contribution enables project managers to apply the identified findings
and mitigations to the risk management in IT projects in a similar setting.
Keywords: project management; risk management; IT projects; merger; telecommunications; risks; case study.
Fusion is a risky operation and often with interruptions in called the National Telecommunications Agency
business activities [3]. In some extreme cases, this scenar- (ANATEL) [2].
io of changes can lead to the emergence of new risks [35]. The types of IT projects can be split into: devel-
Therefore, IT projects on time of companies merging may opment, in which the deliverable is a computer system, a
entail specific risks in this period. customized ERP or other process that requires develop-
The companies, that provide services for trans- ment in a computer language [36, 46]; or infrastructure,
mission and reception of sound and image, and also give which are characterized by the installation of software,
technological answers to the market in accordance with environmental reliability and control of IT items [36]. In
the regulations of the regulatory agency, are represented addition to this, in a project with dynamic environment,
by the telecommunications industry (telecoms, hencefor- only agile methodologies promise to deliver higher
ward) [2]. The impact, that companies suffer from this productivity, quality and a greater chance of success in
type of operation, is large [40, 32], and in the case of software development projects [5]. Scrum is applied to
telecoms companies is much higher, because they use the development of projects with small teams, using small
technology as their core competency [2]. In Brazil, for development cycles, which facilitates faster adaptation to
example, there were around 19 mergers in this sector per changes in volatile environments, the use of up to two
year, between 2002 and 2012 [29]. In addition, their IT weeks tasks cycles, and turnover in the various functions
projects can generate more risks in this period of uncer- of members of the development team [44; 18].
tainty [42, 35], where the correct identification of risks An event or uncertain condition originate risks
can corroborate with the success [35]. and may affect at least one objective of the project [35].
In this context, the objectives of this work are The risk management project includes continuous pro-
twofold: 1. Identify risks of scope and organizational risks cesses [23, 35], which increase the likelihood of positive
associated with IT projects on the merger of two telecoms events and decrease the negative events [35]. The risk
companies; and 2. Propose risk mitigation actions to fu- identification process should be done early to avoid fail-
ture mergers of telecoms companies. ure in projects [24, 25, 9, 35], considering the nature of
This paper is structured as follows: Section 2 de- the company [1]. The main risk management approaches
scribes the theoretical background of mergers and acquisi- include: PMBOK [35], the IPMA-NCB [23] and the stra-
tions, IT project management, and risks and uncertainties. tegic level the Enterprise Risk Management (ERM) [8].
Section 3 introduces the design of the research. Section 4
describes the analysis of the results. Section 5 and 6 pre- RESEARCH METHODOLOGY AND
sent the theoretical and practical implications, respective-
ly. Section 7 identifies the limitations and further works, PHILOSOPHICAL
and finally, Section 8 presents the conclusion. UNDERPINNINGS
The definition of the epistemological and onto-
THEORETICAL BACKGROUND logical guidelines helps to understand the assumptions
This paper is grounded in three theoretical bases: and analysis of the items that composed the search [41].
mergers and acquisitions, IT project management, and This exploratory study adopts a predominantly interpre-
risks and uncertainties. The use of mergers and acquisi- tive epistemology, with the qualitative technique [49] and
tions can change the scenario as in business expansion inductive approach [45]. The researchers assume the role
strategy [32]. The parties receive specific labels: 1. “ac- of an outside observer. The case study is an empirical
quiring company”which refers to the company that wish investigation of a phenomenon in depth and context, es-
to purchase another; 2. “target company” which is the pecially when both are not evident, in which the context
corporation that will suffer the action; and 3. “resulting must be considered [49]. The unit of analysis is IT pro-
company”, the company generated by fusion [32]. These jects in Company-A in the period of merger from 2007,
operations have different types of mergers and acquisi- with Company-B. Data collection was through: 1. Semi
tions [27]: 1. merger, create a new company from two or structured, interviews with the employees who worked
more companies; 2. incorporation, which is an operation during the period and had the project management func-
whereby one or more target companies are absorbed by tion or similar; 2. collection of documented information;
another; and 3. spin-off, whereby a company transfers and 3. information provided by the written media or from
assets portions to one or more companies [32]. In Brazil, the digital era. Data analysis was carried out by triangula-
the government agency that has the mission to manage the tion of data [22]. The flow of processes performed in this
telecoms industry and protect the interests of users is study follows the following order:
1. Listing the risks in IT projects in literature: We Based on that we have elaborated the following
have looked for papers that identified risks in IT six propositions to provide guidance for this study:
projects from local teams and we have obtained
it by searching for the words "Risk", "Project" Proposition 1: There is a preparation for the
and "IT" in the following leading journals be- moment of merger between telecoms. The
tween 1981 and 2014: Project Management directors and others in management posi-
Journal, International Journal of Project Man- tions prepare for the merger. This time may
agement (IJPM), Information Systems Journal, vary according to the reason of the operation
Journal of Management Information Systems, [40, 32];
Journal of Management Research, MIS Quarter- Proposition 2: There is an organizational re-
ly, Technovation and Telecommunication Poli- structuring in the IT field. The company
cy, Brazilian Journal of Management, and may suffer an organizational restructuring
Iberoamerican Journal of Project Management during the company merger period [40].
(IJoPM); Proposition 3: The projects receive estimates
2. Categorizing risks found in literature: The identi- of time and scope. Project data should be
fied risks have received a label which represents clearly specified in the Project Charter [35],
the focus that was referenced in an IT project. as well as important information which can
Only risks about scope and organization were be provide by IT area, and this can help to
considered; adequate resources [36, 46]. All projects
3. Interviews with IT project manager in Company- must receive time and scope specifications
A: We have designed a semi-structured ques- [23, 35].
tionnaire based on the interview protocol pre- Proposition 4: IT projects receive risk man-
sented in Appendix A. The interviews have agement treatment in Company-A. Risk
been carried out with people who had the func- management should be carried out in all pro-
tion at or close to a project manager. The inter- jects [35];
views could not be recorded by determination of Proposition 5: Risks are easily identified in IT
respondents. For this reason, they have been ac- projects. Project managers identify the risks
complished with another researcher, who has using specific techniques [35];
simultaneously held the notes, which were gath- Proposition 6: There are specific risks in the
ered in a single document; merger period for IT projects. Due to the
4. Listing the risks in IT projects of interviews, pro- amount of changes in the merger period
jects and Media Artifacts: All documents col- [40], you can have risks in times of great
lected in interviews and the information gath- uncertainty [35];
ered constituted the basis for the identification Proposition 7: There are mitigating actions
of risks and document requirements, besides the for the risks found. After identifying the
requests of process changes. We used special- risks, it is necessary to implement mitiga-
ized industry magazines and large circulation tions, and opportunities should be
newspapers; potentialized [35].
5. Classifying Risks in IT Projects: We have classi-
fied each identified risk in the previous item ac- The Study Objects
cording to the categories: scope or organization-
The two analyzed companies have specific char-
al;
acteristics from the point of view of its organizational
6. Identifying exclusive risks: We have kept the
structure, market and maturity in project management.
identified risks in the triangulation, which do
The “acquiring company”, called Company-A, is a multi-
not have equivalence in the risks listed in the
national installed in Brazil for nearly two decades and
literature. The comparison to the literature
initially had landline services in a few states. It had a
builds the internal validity, raises the theoretical
weak organizational matrix and the presence of project
level, and improves the construction of the defi-
managers is not part of the available positions [35]. De-
nitions [11];
spite this feature, many other positions, usually of coordi-
7. Proposing mitigation actions to the identified
nation, had exercised the function in the place of project
risks: Mitigation actions have been suggested to
managers.
the identified risks in item 6.
The target-company, called Company-B, is also process occurred when there was saturation of the data
a multinational installed in Brazil for over a decade and and the continuity of interviews would return insignificant
always had a mobile focus. It did not have a culture pro- improvements [11]. The three project managers inter-
ject and, like Company-A, had a weak organizational viewed mentioned some risks in engineering. Based on
matrix [35]. It has increased the market share in recent these reports, we interviewed an engineer who confirmed
years [29], and it was periodically probed by Company-A, the data collected by the project manager.
which came to acquire interests by purchasing of shares The proportion of the source of the respondents
[14]. to the interviews was greater in Company-A (82%) than
Although the operation performed, under the le- in Company-B (18%). The Company-A did not have the
gal point of view, has been characterized by the incorpo- position of project manager, but one can find employees
ration of Company B by Company A [2, 38], the way it acting as a project manager. This is common in business,
was spread in the media, it was considered a merger [14, and one can consider it as an employee who just did not
47, 16], even before the staff of their respective compa- get the label, but is fully capable of responding as a pro-
nies got to know that. In this study, to follow a standardi- ject manager [39]. In this research, there were those who
zation of various sources, we will consider the label "fu- acted as project managers, even before taking office as
sion". “Project Manager”, when they were “Department Admin-
Chronologically, the preparations for the opera- istrator”, “Engineer”, “Process Analyst”, “Business Ana-
tion began in 2007 through the purchase of assets [14, 47, lyst” or “Senior Systems Analyst”. Appendix A lists the
16], which was confirmed in the interviews. The telecoms function of each respondent in the period of merger.
agency approved the merger with three constraints items,
which should be addressed by mid-2012 [2]: 1. Expand Categorization and Classification
mobile offer in remote areas; 2. Increase mobile telepho-
In this paper, the categorization of the risks,
ny coverage with 3G technology; and 3. Provide tele-
which were listed in the literature, received a term to
communications infrastructure for scientific research
identify its activities within the area of IT projects, result-
networks. Other communication vehicles also covered the
ing in the following categories: 1. Scope, which includes
events [14, 47]. Until December 2014, the merger was not
the risks related to scope and environment; and 2. Organi-
totally accomplished. Besides that, another merger oc-
zation, risks attributed to the company, structure and cus-
curred in the beginning of 2015, which prevented new
tomers.
data.
Figure 1: Risk of Scope category in the literature. In the ID column, "L" stands
for Literature and "E" stands for Scope.
Figure 2: Risk of Organizational category in the literature. In the ID column, "L" stands
for Literature and "O" stands for Organizational.
Figure 3: Risk of Scope category in the literature. In the ID column, "R" stands for Respondents and "E"
stands for Scope.
Risks related to the corporate environment were The artificial environment was becoming unsus-
gathered in the Organization category. Figure 4 shows tainable and uninformed (RO09), reports the business
that the most referenced risk was the exchange of senior manager R4: "... To reassure us, our director said in a
management (RO01), as the report of the pro- meeting that Company-A would be in charge of decisions
ject manager R11: "... There was a process of evaluation to the new structure. But exactly the opposite happened ...
of best practices between the two companies, with map- ."
ping of current processes and monitoring of best practic- Some employees, due to possible disruption of
es. Based on this document, the works were started to services and low quality, stressed that the company's
plan the new management executive organization chart image could be ruined (RO07). The project manager R2
(...) from the new model and history (...) managerial re- said: "... Shutdown due to lack of operational capacity (...)
structuring and exchange of chairs ...” with the degradation of image ... ."
The conflict between the business and strategy
(RO02), one focused on quality and another in the results Exclusive Risks in the Merger Period
were indicated by the interviewee, who was acting as
We analyzed the risks found in the interviews to
business manager R4: "... The mobile phone market heat-
identify those which have no reference in the list of risks
ing pressed the Company-B to implement aggressive
identified in the literature. The comparison was performed
policies of sales to compete. Moreover, the Company-A,
by using the listed risks in the existing categories. Figure
which had a negative experience in operating with a focus
5 shows the results of categories. This list does not in-
on sales (... ) that resisted Company-B model, mainly
clude the risks found in the interviews that were refer-
because assumed quality commitments and attention to
enced in the risks identified in the literature. We analyzed
customers with the protection agencies and regulatory that
the exclusive risks in the two categories studied in this
contradicted the interests of the Company-B ... ."
paper as follows:
This change caused a possible cancellation of
Scope: The risk of changes in the specifica-
projects due to changes in management (RO03) or in-
tions of projects (RE01) is associated in the
sistent cost reduction request (RO04). Some improvement
literature with the risks of volatile environ-
projects of the Company's quality have been discontinued
ment (LE01) which describes about the con-
(RO08), as stated in the business manager R4: "... I found
tinuity of the project in unstable environ-
that all of our projects were at risk because some of the
ments or with many changes, thus it is not
meetings I could see the level of interest of the Company-
an exclusive risk.
B in the continuity of our projects, mainly due to the costs
Organizational: Risks addressed to the ex-
... ."
change of senior management by other ex-
The Company-A did not leave clear rules for
ecutives (RO01) and conflicts between the
dismissal (RO06) from the beginning, generating an ap-
business strategy (RO02) were identified in
parent tranquility (RO05), because after a layoff, it was
the literature. The risks of project cancella-
said that there would be no layoffs, but they continued to
tions due to management changes (RO03),
occur. The project manager R2 comments: "... loss of
lower costs (RO04) and others risks (RO05,
human capital (...) without clear rules on dismissal ... ."
RO06, RO07, RO08 and RO09) found no
support in the literature.
Image degradation
RO07 R2
Possible company image degradation before the market
Contradictory information
RO09 R4
The same information from different sources with different content
Figure 4: Risk of Organization category in the literature. In the ID column, "R" stands
for Respondents and "O" stands for Organization.
Image degradation
RO07
Possible company image degradation before the market
Contradictory information
RO09
The same information from different sources with different content
thing would be divided and that each one stated: "... we were getting over the most
would go to his own corner (...) the grape- critical period experienced by the company,
vine was buzzing and everyone had a story motivated by the lack of quality of our ser-
to tell... ." vices and products (...) the work aimed at
Proposition 2: There is an organizational rescuing the credibility of customers, protec-
restructuring in the IT field. The inter- tion and regulatory agencies, as well as the
views revealed that there were two different media. The goal was accomplished success-
situations: In Company-A, the impact was fully and at that time, the challenge was to
greater in systems that had to receive new maintain the achieved rates. The focus was
Company-B services that resulted in tech- quality... ."
nical staff changes and functions, as ex- Proposition 6: There are specific risks in
plained in the interview with Administrator the merger period for IT projects. We
R5: "...Some other systems stopped, no ad- found nine specific risks in the merger peri-
vancing further and remember that some od around IT projects, as shown in Figure 5,
programmers began appearing in public... ." among the most listed risks are feelings of
On the other hand, the impact was smaller in insecurity and anxiety, contradictory infor-
the Company-B, as described by the Process mation and conflicts between corporate
Analyst R7 of this company: "...the impact strategies.
on the Company-B (...) there was restructur- Proposition 7: There are mitigating ac-
ing in the area, but it did not affect my area, tions for identified risks. It was possible to
it was transparent... ." gather the actions carried out in the period to
Proposition 3: The projects receive esti- mitigate the risks, according to the data col-
mates of time and scope. Respondents were lected in the interviews. The first action re-
unanimous to assert that projects have date lates to the impact of layoffs on the team
of delivery and the scope of projects was with the change of shifts of the remaining
usually defined in three to four objectives. employees, who needed to stay longer, as
The project manager R2 said that a project reported in the following passage by Project
was delayed 100% due to changes related to Manager R2: "... [changing] shifts, [leaving]
the merger. Project managers R2, R3 and R4 staff on alert, changes in days off.. ". In an-
commented that several projects had the other group, the risks were centered on gath-
scope changed to meet the new guidelines of ering information and processes, in which
the company. the breakdown of established workflow was
Proposition 4: IT projects receive risk necessary so that the most reliable infor-
management treatment in Company-A. mation could be obtained, as related in the
According to the data collected in the inter- extract by Project Manager R3: "... made
views, risk management was carried out al- contact directly with users (...) contact with
most casually. Respondents with project other teams from other projects... ." Other
manager function managed to list the risks actions were related to remaining suppliers
in the interviews, but there was no formal who helped in the understanding of the ser-
document on the subject. vices, called "assisted supervision," and the
Proposition 5: Risks are easily identified creation of documental procedures, as what
in IT projects. Respondents related risks in can be seen in the interview with Project
the projects directly associated with their Manager R2: "... creating rollback proce-
department. Only two respondents, who dures (...) 'Assisted supervision' by suppliers
worked close to top management, comment- ... ." Thus, mitigating measures were taken
ed on the concern of the company's image in so that the projects could continue, even
the market, proving that the company image with the shortage of staff and all the adversi-
impacts directly on the amount and ease of ties of the period.
identification of risks. As it was reported by Other actions were related to outstanding
Project Manager R2: "... the standstill was suppliers who helped in the understanding of
due to the lack of operational capacity, the services, called "assisted supervision,"
which could lead to the degradation of im- and the creation of documentary procedures,
age ...". Besides that, Business Manager R4 as can be seen in the interview with the pro-
ject manager R2: "... creating procedures reality founded in the companies and the best practices in
rollback (...) 'Supervision assisted' by sup- the literature.
pliers ... " Mitigation 1: Using Scrum: In addition to
Scrum, which can be used in various types
Considerations for Analysis of Results of organizational environments [37, 33], the
application of this methodology is suitable
The merger took place in three main moments.
for small teams [44, 19] and in dynamic en-
The first in 2007, when Company-A bought the shares of
vironments, as the period of merger between
Company-B. A second moment, almost two years later,
the companies [32]. Because of the team
with the preparations for the operation and management
members do not have fixed functions, any-
level of some key processes. And in a last moment, when
one can be a systems analyst, developer or
there was the official statement by ANATEL, its internal
other function at different times [44, 19],
disclosure and the media.
promoting the continuation of activities,
IT projects have suffered in various ways: dis-
even with redundancies or turn-overs.
missals of team members, immediate need to integrate
Therefore, the application of Scrum can mit-
systems, new services, new development methodologies
igate the risk on RO06 by use of small
and different databases. The risks identified in the inter-
teams. The characteristic of fast deliveries
views revealed the speculation environment and dismis-
within two weeks with an executable prod-
sals in which the employees were inserted. Some execu-
uct, called "done" [44), covers the RO01,
tives tried to deny the situation, but the actions were frus-
RO07 and RO08 risks. The volatile envi-
trated.
ronment is related to RO02 risk.
The interviewees mentioned some actions that
Mitigation 2: Use of Project Management
are still being carried out: 1. the main system which has
Frameworks: Application of PMBoK [35]
more than two decades is being changed; 2. documenta-
may assist in mitigation for the application
tion of systems and environment is being updated; 3.
of lifting requirements techniques, as the
attempt to rescue the lost know-how because of dismis-
brainstorm and mind map in risk RO09 to
sals; 4. generation of documentation for environmental
understanding; and 5. reformulation of teams with mem- corroborate to clarify the company’s infor-
bers of the Company-A and B. mation. The mitigation of the risks on RP03
The deadline of this research was on August 31, and RO04 can be accomplished by applica-
2014, and until then, the merger had not yet been fully tion of cost management process to the fi-
accomplished. Many systems were still in the integration nancial control of projects by monitoring
phase, speculation of some specific layoffs and the crea- costs, use of PERT/CPM and use of budgets
tion of a new cultural identity still in training. and forecasts [35] contemplating the new
board interests in controlling costs and elim-
Recommendations for Mitigating Risks inating the need of use the shared manage-
ment. The IPMA-NCB [23] has an area de-
In each identified risk we propose mitigating ac-
nominated Conflict Management in which
tions to be incorporated into the project risk management
can be found cases related to disputes and
in future mergers of telecom companies, as shown in
concerns in the corporate environment, cor-
Figure 6. These recommendations are based on both the
responding to RO05 risk.
Mitigation ID Risks
Scrum -
RO02 Conflict between corporate strategies
Volatile Environment
IPMA-NCB – Conflict
RO05 Artificial environment of tranquility
Management
the recommendations in mergers of other industries. The- http://www.anatel.gov.br/, Last visit February,
se risks can be also used as input of the Enterprise Risk 2014.
Management [8] in a company. [3] Baker, E. W., and Niederman, F. (2014). Integrat-
ing the IS functions after mergers and acquisitions:
Limitations and Further Works Analyzing business-IT alignment. The Journal of
Strategic Information Systems, 23(2), 112-127.
The limitations for this research include the mer-
[4] Bannerman, Paul L (2007), Software Project Risk
ger of a single sector, and the barriers we can mention: the
in the Public Sector, Proceedings of the 2007 Aus-
difficulty in order to obtain documents of IT projects, the
tralian Software Engineering Conference
merger is still in process that can contribute to the emer-
(ASWEC'07).
gence of other risks not listed in this research, the re-
[5] Beck, K., Beedle, M., van Bennekum, A., Cock-
strictions when applying interviews to the employees, the
burn, A., Cunningham, W., Fowler, M., Grenning,
impossibility of interviews with the senior positions of the
J.,Highsmith, J., Hunt, A., Jeffries, R., Kern, J.,
involved companies and the need for validation of the
Marick, B., Martin, R.C., Mellor, S., Schwaber, K.,
Scrum methodology in such environment. It is appropriate
Sutherland, J. and Thomas, D. (2001). Agile Mani-
to clarify that this case study, as an experiment, is gener-
festo. Available at http://www.agilemanifesto.org/,
alizable to theoretical propositions as an analytical gener-
Last visit September, 2015
alization [49], in an identical situation or theory [31].
[6] Boehm, Barry W. (1991) Software Risk Manage-
Proposals for future work include the use of the
ment: Principles and Practices, IEEE Software, 32-
unique risks and mitigating proposals in other mergers of
41.
telecoms companies, applying the same study. Which
[7] Buckl, S., Matthes, F., Monahov, I., Roth, S.,
means, using the methodology of action research, study-
Schulz, C., &Schweda, C. M. (2011, August). To-
ing the merger impact on the organizational culture of the
wards an agile design of the enterprise architecture
target company during and after this period, and also, on
management function. In Enterprise Distributed
projects that have the scope changed by Company-A’s
Object Computing Conference Workshops
strategy.
(EDOCW), 2011 15th IEEE International, 322-329.
[8] COSO - The Committee of Sponsoring Organiza-
Conclusion tions of the Treadway Commission (2004). Enter-
This research adds to the body of knowledge of prise Risk Management - Integrated Framework.
projects, the identification of nine unique risks in IT pro- Available at http://www.coso.org/-erm.htm Last
jects during the merger period of two telecoms compa- visit November, 2014
nies, focusing on scope of projects and actions directed to [9] De Bakker, K., Boonstra, A., and Wortmann, H.
the organization. Among the most reported risks are the (2010). Does risk management contribute to IT pro-
insecure environment that permeated all areas and the ject success? A meta-analysis of empirical evi-
high rate of layoffs that impacted the IT projects. From dence. International Journal of Project Manage-
the list of unique risks, it was possible to propose mitigat- ment, 28(5), 493-503.
ing actions, as follows: 1. the use of Scrum methodology, [10] De Wet, B., and Visser, J. K. (2013). An evaluation
suitable for small teams, volatile environment and con- of software project risk management in South Afri-
stant deliveries; 2. the application of project management ca, South African Journal of Industrial Engineering,
techniques, which were related to the knowledge areas of 24, 14-29.
PMBoK and IPMA-NCB to address the specific risks [11] Eisenhardt, K. M. (1989). Building theories from
presented, as cost management and conflict management. case study research. Academy of Management Re-
view, 14(4), 532-550.
REFERENCES [12] El Emam, K., and Koru, A. G. (2008). A replicated
survey of IT software project failures, Software,
IEEE, 25(5), 84-90.
[1] Alao, Esther Monisola, Adebawojo, Oladipupo [13] Feitosa, M. J. S., Silva, M. E., and Firmo, L. A.
(2012), Risk and Uncertainty InInvestiment Deci- (2012). Fusões e aquisições empresariais no
sions: An Overview. Arabian Journal of Business contexto brasileiro: o caso da OI e BRASIL
and Management Review (OMAN Chapter), 2(4), TELECOM. Revista Razão Contábil and Finanças,
53-64. 2(1).
[2] ANATEL (2014). Agência Nacional de
Telecomunicações. Available at:
[14] FSP – Jornal Folha do Estado de São Paulo (2014). [28] Khan, Q., and Ghayyur, S. (2010). Software Risks
Available at www.folha.com.br, Last visit October, and Mitigation in Global Software Development,
2014. Journal of Theoretical and Applied Information
[15] Gallagher, B. P., Case, P. J., Creel, R. C., Kushner, Technology, 22, 58 69.
S., Williams, R. C. (2005), A Taxonomy of Opera- [29] KPMG (2014), Pesquisa de Fusões e Aquisições -
tional Risks, Carnegie Mellon – Software Engineer- 3o. trimestre de 2013. Available at
ing Institute, CMU/SEI-2005-TN-036, 1-40. https://www.kpmg.com, Last visit January, 2014,.
[16] Gazeta Mercantil (2014). Report Information from [30] Lamersdorf, A., Munch, J., Torre, A. Fernández del
ProQuest: GazetaMercantil. Available at Viso, and Sanchez, C. R. R.. (2011). A risk-driven
www.proquest.com, Last visit October, 2014. model for work allocation in global software devel-
[17] Gholami, S. (2012), Critical Risk Factors in Out- opment projects, 6th IEEE International Conference
sourced Support Projects of IT. Journal of Man- on Global Software Engineering (ICGSE), 15-24.
agement Research, 4(1), 1–13. [31] Lee, A. S. (1989). A scientific methodology for
doi:10.5296/jmr.v4i1.939 MIS case studies. MIS Quarterly, 33-50.
[18] Glória Júnior, I., & Chaves, M. S. (2014). Novos [32] Lemes Júnior, A. B., Rigo, C. M., and Cherobim,
riscos para a gestão de projetos de tecnologia da A. P. M. S. (2005). Administração Financeira:
informação com equipes locais. Iberoamerican princípios, fundamentos e práticas brasileiras (2ª
Journal of Project Management, 5(2), 16-38. Ed). Rio de Janeiro: Campus.
[19] Glória Júnior, I., Oliveira, R., and Chaves, M. [33] Moe, N B, Dingsoyr, T. and Dyba, T. (2010). A
(2014). A Proposal for Using Web 2.0 Technolo- temawork model for understanding an agile team:
gies in Scrum, ECIS - European Conference on In- A case of a Scrum project, Information and Soft-
formation Systems, Tel Aviv, Israel, 9-11 June. ware Technology, number 52, 480-491.
[20] Guest, G., Bunce, A., & Johnson, L. (2006). How [34] Pinna, M. C. C. de Abreu, and Arakaki, R. (2009),
many interviews are enough? An experiment with Arquitetura de Software: Uma Abordagem para
data saturation and variability. Field methods, Gestão de Riscos em Projetos de TI, Integração,
18(1), 59-82. Ano XV, Nr.57, 111-120
[21] Hartono, B., Sulistyo, S. R., Praftiwi, P. P., and [35] PMI, A. (2012). Guide to the project Management
Hasmoro, D. (2014). Project risk: Theoretical con- body of knowledge. Project Management Institute,
cepts and stakeholders' perspectives. International Pennsylvania USA.
Journal of Project Management, 32(3), 400-411. [36] Pressman, R. (2011). Engenharia de Software (6ª.
[22] Hussein, A. (2009). The use of triangulation in Ed.), São Paulo: McGraw-Hill.
social sciences research: Can qualitative and quan- [37] Rayhan, S. and Haque, N. (2008). Incremental
titative methods be combined. Journal of Compara- Adoption of Scrum for Sucessful Delivery of an IT
tive Social Work, 1(8), 1-12. Project in a Remote Setup, Agile 2008 Conference -
[23] IPMA (2006), International Project Management IEEE, 351-355.
Association - National Competence Baseline 3.0, [38] RF (2014). Receita Federal. Available at
International Project Management Association. www.receita.fazenda.gov.br, Last visit August,
[24] Jani, A. (2008). An experimental investigation of 2014.
factors influencing perceived control over a failing [39] Richardson, T. M. (2014). Project manager in-
IT Project. International Journal of Project Man- sights: An analysis of career progression. Organiza-
agement, 26(7), 726 732. tional Project Management, 1(1), 53-72.
[25] Jani, A. (2010). Escalation of commitment in trou- [40] Ross, S. A., Westerfield, R. W, Jaffe, J. F. (2002).
bled IT projects: influence of project risk factors Administração financeira – Corporate Finance. São
and self-efficacy on the perception of risk and the Paulo: Atlas.
commitment to a failing project. International Jour- [41] Sarker, S., Xiao, X., Beaulieu, T. (2013). Qualita-
nal of Project Management, 29(7), 934 945. tive Studies in Information Systems: A Critical,
[26] Jiang, J., & Klein, G. (2000). Software develop- Review and Some Guiding Principles. MIS Quar-
ment risks to project effectiveness, Journal of Sys- terly 37 (4) pp. iii-xviii.
tems and Software, nr. 52(1), 3-10. [42] Sauser, B. J., Reilly, R. R. and Shenhar, A. J.
[27] JusBrasil (2014), Lei das Sociedades Anônimas. (2009), Why projects fail? How contingency theory
Available at http://presrepublica.jusbrasil.com.br, can provide new insights – A comparative analysis
Last visit January, 2015. of NASA’s Mars Climate Orbiter loss. International
R6 Engineer Engineering A
# Question
Before the official date of the merger, was there some preparation to receive the impacts from the oper-
1
ation?