You are on page 1of 32

STUDENT ID: 74104298 (R 1709 D 3465127)

KALUBA ABRAHAM

MBA-Masters in Business Administration

FACULTY OF BUSINESS AND SOCIETY

MODULE: DISSERTATION PROJECT (Client Five project-5)

Requirements Elicitation for


Mobile B2B Applications
A project-based consulting approach

COURSE CODE: (BS4DO3-V1)


STUDENT NAME: KALUBA ABRAHAM
STUDENT ID: 74104298 (R 1709D3465127)

INSTITUTION: UNIVERSITY OF SOUTH WALES


TUTOR : DR. EVANTHIA PAPACHRISTOFOROU

DATE OF SUBMISSION: 28th August, 2019

Page 1 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
ABSTRACT………………………………………………………………………………….3
Chapter 1: INTRODUCTION……………….……………….………………………......4

1.1 Study Objectives……………………………………………………...5


1.2 Study Methodology…………………………………………………...6

Chapter 2: SUPPORTING EVIDENCE ……... …. …….…….…………………………7

2.1 OBJECTIVE 1: Functional Requirements …………………………...7

2.1.1 Market Analysis……………………………………………...8


2.1.2 Stakeholder Analysis………………………………………...8
2.1.3 Software Evaluation and Benchmarking…………………….9

2.2 OBJECTIVE 2: Structural Requirements…………………………...10

2.2.1 System Based Environmental Analysis………………….….10


2.2.2 Personnel Analysis……………………………………….…11
2.2.3 Risk Identification and Analysis……………………………12

2.3 OBJECTIVE 3: Resource Requirements……………………...……13

2.3.1 Project Time Planning……………………………………….13


2.3.2 Life Cycle Cost Analysis…………………………………….13

Chapter 3: STUDY GANTT CHART ………………………………………………….14

Chapter 4: CONTRIBUTIONS…………………………………………………………17

4.1 OBJECTIVE 1: Functional Requirements…………………………17

4.1.1 Stakeholder Analysis……………………………………….17


4.1.2 Market Analysis……………………….……………………18
4.1.3 Software Evaluation and Benchmarking……………………18

4.2 OBJECTIVE 2: Structural Requirements…………………………19

4.2.1 Systems Environment Analysis…………………………….19


4.2.2 Personnel Analysis…………………………………………19
4.2.3 Risk Identification and Analysis……………………………20

4.3 OBJECTIVE 3: Resource Requirements…………………………20

4.3.1 Project Time Planning……………………………………..20


4.3.2 Life Cycle Cost Analysis…………………………………..21

Chapter 5: CONCLUSION.……………………………………………………………21
Chapter 6: REFERENCES…………………………………………………………….23
Chapter 7: APPENDIX………………………………………………………….…….32
7.1 A3 Map…………………………………………………….32

Page 2 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

ABSTRACT

Consulting bidding process consists of many knowledge intensive processes, among which
requirement elicitation process is perhaps the most critical for the success of the project. The
rationale of the document was to develop a bid report proposal for the Company X scoping
study which sort to determine the necessary requirements for developing and implementation
of the B2B mobile application. The document provides an overview of the techniques,
methods, concepts and models available to support requirement elicitation process and
identify their contextual applications.

The study addressedd thee consulting process by collating important activities that contribute
to the efficient
execution of critical paths of the project. The activities were identified through reviews of
critical paths (functional requirements, structural requirements and resource requirements)
requirements which were analysed by using content analysis with supporting evidence based
on industrial information. The activities were then
integrated as a conceptual framework that consists of a step-by-step procedure by the help of
Gantt Chart.

The Gantt Chart can be used as a guideline by stakeholders, developers and clients to execute
the development and implementation of the B2B mobile application.

The paper predicts that the approach of considering approved consulting bidding processes
will increase satisfaction
timely delivery and linking the project success with an ethical approach.

The overall report, endeavors to use knowledge gained from the course study to identify and
analyze the relevant elements outlined in the Gantt Chart as elicitation requirements.

In view of self-plagiarism, I wish to state that some of the definitions, citations and phrases
will be returned from my previous works already submitted such, strategic Operation
Management, Strategic, Strategic Analysis, Tools and Techniques, Strategic Marketing to
mention a few.

Key Words: Requirement elicitation; Elicitation techniques; Elicitation technique selection;


Evaluation Framework.

Page 3 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

Chapter 1 – Introduction

Given the SME adoption of mobile application marketing, recent mobile society development
presents both opportunities and challenges to the business houses and their managers. With
the phenomenal rate of increase of smart phones and their associated applications, people’s
social interactions have been radically altered and increased mediation of the consumption
experience Schwann & Kwan, (2008) while Okello (2015) stated that there has been an
influence on how people communicate. According to statistics, there are 1.2 million mobile
web users in the world consisting of 17% of the global population, MobiThinking(2011).Smart
phone users across the world are projected to rise steadily to touch four million by year 2020
providing new and universal communication media,(statista.com and Shapiro,2011). As a
result, this raises questions concerning consumer needs, behavior, experiences and the highly
competitive app market which may contribute to the failure of the app by either receive little
or no downloads because of features unrelated to its functionality and usability, such as app
icon, app name, or level of exposure. In order to be successful, the app should ideally appeal
to a large number of users worldwide by way of building apps that are applicable to many
mobile devices providing a cross-platform capability Q,Xu et al(2011) .The use of internet
mobile applications through the use of internet, businesses have been able to collaborate with
trading partners and this kind of collaboration is commonly known as business to business
(B2B) application aiming for e-payment, e-procurement and supply chain-management.
These mobile services have become an indispensable part for the direct impact on the
function of the economy as reported by Deloitte (2012) with Smilansky(2015) stating that
these have been advancing as an important tool for customer relationship while Schwanen &
Kwan,2008 said that “ they are a powerful tool to help people make decisions on the go,
fluidly maintaining network connectivity and enabling ad hoc meetings”( 2008).
Reports suggests that there are more of mobile app users spending more and more of their
time on mobile applications, Alin (2015) and to this effect, most successful and well-known
companies have taken advantage of the mobile applications aiming to deal with the growing
number of users ,software companies responsible for mobile platforms such as ( Google
,Microsoft ,Samsung ,Nokia Sony etc) have sought alternatives to expand their business
through new technologies and processes to assist the development of mobile applications
while other companies in other businesses such as restaurants have used them for reaching
different business goals ,Kapil(2017).
Company X is an SME client providing food products to catering companies, it being aware
of the trends, pros and cons in the mobile app market, the client intends to program and
implement the mobile B2B application for its customers. It is in this regard that the client
sought for the consultant to undertake a scoping study to help determine the necessary
requirements for developing a B2B mobile application. The application is assumed to
promote the company visibility, create direct marketing channels, build brand and
recognition, improve customer engagement, cultivate customer loyalty and gain competitive
advantage, Dan (2017). However, due to concerning available research findings since year
2009 that only 32% of IT projects are successful ,44% challenged and 24% completely failed
cited by , Dannawi(2009) https://dannawi.wordpress.com/page/2/ form 2009 chaos survey
report. Therefore, for successful designing of the system, only extensive elicitation,

Page 4 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
negotiated, specified, analyzed and evaluated requirements solicited by the end users or other
stakeholders during the early stages of software development can enable this success.

Source: standish Chaos Survey Report-June 12,2009


Based on the research results cited from chaos survey report and other sources, point out that
projects are correlated with or strongly depends on the quality of requirements elicitations
(Hickey and Davis, 2003).
The development and integration of software applications in enterprises, demands prior
identification and careful analysis of different functional and non-functional requirements,
Veronica et al (2014). It is in this concern that the client sought for consultant to examine
these requirements. This study will provide valuable information based on the project
objectives outlining all pertinent methods which are of importance to the project and
comprehensively mapping evidence across a range of industrial studies designed to inform
future research practices, programs and policy. Covered will be the following objectives and
correlated approaches in order to expose the client’s requirements for the project of
developing and implementing a B2B mobile application, with objectives and methods
building on one another:
1.1 Study Objectives

It is of fundamental importance in this project study to identify the vital requirements for the
development of a mobile B2B application. The study covers the following objectives and
related methodologies in order to reveal the client ‘s requirements for the project out of which
the objectives and methods will build on one another.
Objective 1: Functional Requirements
Identification of the functional requirements of the mobile B2B applications within the food
market for catering companies. This will help to understand the market trends, needs and its
capabilities, stakeholder expectations, security risks and existing competition. This will be
achieved through:
• Market Analysis Tools
• Stakeholder Analysis/mapping
• Software evaluation and Benchmarking
• Risk Analysis

Page 5 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

Objective 2: Structural Requirements


Objective 2 identifies the structural requirements in order program and implement the
application (mobile B2B) within the company structures and its capabilities to determine how
mobile app. may enable the business competitive advantage by looking at:
• System based environmental Analysis
• Personnel Analysis (Personal Skills)
• Risk Identification & Analysis

Objective 3: Resource Requirements


Objective 3 will help to determine the business economic impact of the proposed mobile app.
development.Resource requirements will be identified which the client has to raise for
programing, implementation and operation on the mobile B2B application and this will be
achieved through the analysis of the following models:
• Project Time Planning
• The Life Cycle Cost Analysis

In order to achieve all these, this study will limit its discussion scope to the three objectives
outlined. The appropriate methods required to reveal the precise requirements will be
illustrated, briefly described and exemplified as adequate methods for the scoping study.
Based on the objectives approximate time need, the author intends to explain the project
implementation with the help of the Gantt chart. Lastly, the contributions based on the
objectives and selected methods will be outlined whilst explaining why the approach to
adopting B2B is the most appropriate for the company objectives outlined. Finally, the
conclusion remarks will summarize the authors findings and discussions and
recommendations to enable informed decision and guidance towards the offer.

1.2 Study Methodology

A descriptive survey based on the perceptions of the author was the method for this study. A
theory-based approach measure was used in order to extensively elicitate, negotiate, specify,
analyze and evaluate requirements solicited by the end users and other stakeholders during
the early stages of software development well known as “requirements engineering or
requirements elicitation” Nahar and Student, (2013). The main criteria for selecting the
strategic models or methods consisted of the fact that the models have been sufficiently used
to analyze business environments both internal and external. A critical literature review
method was chosen to analyze models. Articles included in the review were identified by
various online database which included University of South Wales online library and google
scholar.

Page 6 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Chapter 2. Supporting Evidence

Mostly, the main aim of supporting evidence is to provide an all-inclusive research approach
for the client. This section discusses individual processes related to the approaches chosen for
the study of all relevant kinds of requirements necessary for the client’s B2B project
implementation.

Since requirement elicitation includes a variety of activities, such as interviews,


brainstorming sessions and surveys (Castro-Herrera et al., 2009; Laurent et al., 2010), there is
a high risk of errors in the process in relation to rich communication between the analysts and
the stakeholders. It is highly apparent that the stakeholders may not recognize or spell out
their actual requirements and the analysts may fail to understand the concepts of business on
account of the cultural gap between the stakeholders and the analysts, Zowghi and Coulin,(
2005) as a result, insufficient requirement elicitation process may cause a lot of damage as
the whole software development process depends upon the satisfaction of requirements
elicitation process.

Existing research explains the reasons when requirements elicitation is ineffective as being
complex communication between the analyst and the stakeholders, Farinha and da-Silva,
(2013). Additionally, it revealed that insufficient requirements are responsible for the vital
problem of ever-changing nature of users’ requirements (Christel and Kang, 1992; Sharma
and Pandey, 2014).With this view ,more effort to remove the communication gap ,such as
semantic confusion and cognitive limitations ,which may play an influential role among
different stakeholders like developers and users (CastroHerrera et al., 2009)must be utilized .
Similarly, (Breaux and Antón ,2005) stated that, besides the complication of stakeholders
located in different geographical boundaries (Damian and Zowghi, 2003; Callele and Wnuk,
2011), semantic models must be used in order to inquire into the interaction of requirements
with privacy policies and to achieve the goals from the policy statements.
2.1 Objective 1: Functional Requirements
The retail environment has been impelled to transformation by the constant change in
consumer behavior. Consumers are connecting more and more with companies through web,
mobile and off-line channels in very diverse ways.This is an indication that consumers have
gotten used to utilizing multiple channels effectively throughout their buying process hence
the need for companies to find different ways to interact with their customers and at the same
time evolve their business in B2B e-commerce.Deloitte report states that already 86% of
consumers use computer or mobile devices for shopping related activities(2014).This was
supported by (Shankar and Balasubramanian 2009) who said that mobile devices exhibit
various characteristics hence making it not just a technological gadget, but a cultural object as
well, meaning that it is part of everyday traditions and practices. It is on this premise that the
offer presents that B2B applications are able to cover several functionalities including its
direction, value creating characteristics that link to purchasing strategies and business-
customer relationships.

Page 7 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
2.1.1 Market Analysis
In order for B2B application to succeed, it is essential to undertake a market analysis based
on the business objectives. To avoid leaning towards superficial evidence available, different
strategic models are used to examine macro-environment, industry and firm and make
decisions (Sadlet,2005) concerning external issues which may have the most direct influence
on the industry ,Grant(2008).Industry analysts are able to utilize strategic management
models and concepts such as PESTEL ,SWOT etc to determine the critical industry key
success factors ,Thompson, et al, (2012) and ensure that the functional assessments are
exhaustive and rigorous to offer analysts a strong overview of a firm’s marketing proficiency.
The process is believed to offer an in-depth knowledge and characteristics of the customers
which are essential to decide on the design of the application and appropriate functionalities.
The analysis helps to understand the expectations, needs and preferences of stakeholders such
as customers etc, which are fundamental elements for determining the integration pathways
of an application and to avoid some technical problems in requirement elicitation process
faced by stakeholder (Christel and Kang, 1992).Available research indicates technology
incompetence and new technology may lead to a challenge which may be overcome whereas
technology illiteracy will lead to an impaired project (Attarzadeh and Ow, 2008). This is why
it is strongly advised to cautiously research the market and understand its target customer
profile which includes the customers affordability, willingness and ability to use the mobile
application. This analysis process determines the potential users of the application, their
characteristics and presents the industry’s key success factors (Thompson, et al, 2012) for
Company X survival and prosperity in the market.
2.1.2 Stakeholder Analysis
The adaptation of stakeholder analysis by many different disciplines from business
management to the use in policy making, development and natural resources management,
has rendered it to widespread confusion over what is really meant by stakeholders’ analysis.
This was supported by Carroll’s (1993) definition of stakeholder where she stated that there is
no universal definition of stakeholders. For the sake of this study, the definition is based on
stakeholder theory of organization and management and ethics which defined stakeholder
analysis as a process of systematic collecting and analyzing qualitative information to
determine whose interests should be considered when developing or implementing a project.
According to Harrison & St.John (1998,p14),stakeholder analysis involves “identifying and
prioritizing key stakeholders ,assessing their needs ,collecting ideas from them and
integrating this knowledge into strategic management processes “ .In addition, Freeman’s
seminal work of (1984) defined a stakeholder as any group or individuals who can affect or is
affected by the achievement of the organization ‘s objectives. Thus, said above, stakeholder’s
identification process includes a variety of activities, such as, interviews, brainstorming
sessions and surveys (Castro-Herrera et al., 2009; Laurent et al., 2010). It is therefore
crucial to consider that each project has its own stakeholders which may partly not be that
obvious due to socio-cultural factors affect this inadequacy of requirements, Davey and Cope
(2008). The identification process usually takes into account of internal and external
environment (Grant2008),with which internal users can be the staff who are known as
internal customers .With respect to internal customers who are organization staff,Jeeff

Page 8 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Bezo(CEO of Amazon) 2017 speech ,affirmed Walter et al (1994) assertions that “ internal
marketing is the key to superior service and the result is external marketing success’. Other
external stakeholders involve, developers, legislators and decision markers.
Upon identification of stakeholders, communication is necessary in order for developers to
have a proper understanding of the objectives, the user’s needs, resources required and
constraints of time. “The degree of human contact is required for communication to be
successful. Face-to-face communication is said to have the highest level of social presence,
while a telephone call has less and written communication the least. For certain types of
communication face to-face meeting is vital, whereas other communication is adequate by
letter” (King & Xia, 1997). Elicitation may face either the problems of the lack of input from
the users or unrealistic input from the users, despite the fact that the interviews may be well
structured (Rajagopal et al., 2005). This processes ensures that stakeholders are integrated
right from the inception of the project, prioritization of the elemental requirements are
considered according to the stakeholders importance, Harrison & St.John (1998,p14)
Finally, there is a presumption that when needs are not met, there is need to address them
through modification of the lead organization’s plans, policies and activities. Of course, If
this final step is not completely successful, the company can be judged accordingly (Nasi
et al., 1997).

2.1.3 Software Evaluation (Benchmarking)

As a management strategic tool, benchmarking has a new meaning in business in order to


gain knowledge and create conditions for improving the own solutions and results in
business. Peter Drucker (2003, pg. 83) considers benchmarking to be one of the latest tools to
obtain information on productivity while (Macura, P. 2010, pg.12) says that it is the skill of
determining how and why some individuals or organizations do business better than others.
Markets are evaluated and compared to the best organizations as a process for measurement
of internal and external comparison to the leaders with the best practice, Harington, H.Y.&
Harington, J.S. (1996, pg. 15). The study does not intend to define the structured steps in
benchmarking but describes competitive analysis, which includes software companies as well
as best practice examples from comparable markets of the same sector.

Besides companies having different benchmarking methods, the major steps involved are the
issue of getting reliable data by means of a research to gain an objective insight into the
processes and business of the competitors and stakeholders ,then measure the performance of
the best-in-class relative to critical performance variables , second, determine how the levels
of performance are achieved, and third, use the information to develop and implement a plan
for improvement (Omachonu and Ross, 1994).This is all done on account of comparing the
identified stakeholders’ objectives with the detailed benchmarks in order to arrive at the final
functional requirements. However, it must be taken into account that benchmarking has
limitations, such as failure to involve stakeholders (employees/users) during the process as
the (employees/users) will be the ones eventually using the information and improving the
process (Omachonu and Ross, 1994) .Lastly, the factor of ethical aspects of benchmarking
,Samuel C. Certo (1994) ‘s general definition of ethics as “our concern for good behaviour;
our obligation to consider not only our own personal interests but also that of other human

Page 9 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
beings.” Ethics, where benchmarking is concerned, may be defined as “principles, guidelines,
or standards that determine a protocol of interaction between individuals and organizations”
(http://www.spinet.org/legeth.html, 2/19/97), given an example of divulging sensitive data
obtained from benchmarking to outsiders which may disparage users interviewed (Pattison,
1994),such as those with no or lower levels of education.

2.2 Objective 2 – Structural Requirements

A discourse whether B2B mobile app. would enable the business competitive advantage is
elaborated while looking at the pivotal role played by IT, personnel skills, risk capacities and
their influence on deviations and other occurring risks. The discussion focuses on the
question of whether the Client is to capable to fulfil the requirements by looking at systems
environment analysis, personnel skills analysis and risk identification and analysis.

2.2.1 System Based Environmental Analysis

As a requirement elicitation process ,Systems environment analysis is relevant due to its in-
depth examination on B2B application integration process ,offering an understanding of the
application domain in which the system will ultimately reside and the constraints that may be
enforced upon the system and its development, Zave, P., Jackson, M. (1997 ); Jackson, M.
(1995). The analysis examines how easy it is to program and implement the functions of the
IT environment through an in-depth look at the personnel capabilities, existing systems in the
market, interviewing of IT leaders or developers to help understand the integration process,
Bedell (2013).

The process of incorporating new application modifications within the IT environment with
specialized features is observed to be difficult, eMarketer’s (2016),the eMarkers assertion
strengths Abrahamson et al. (2014) postulation that anyone with the needed skills can build a
mobile app while a good knowledge of the specific characteristics and challenges of developing
software for mobile devices is required .Hence most common observed difficulties arises where
the app cannot be noticed, is not unique or is not a brand on itself as shown below;.

Furthermore, difficulties resulting from integrating challenges arising as a result of interactive


systems (Ancarani and Shankar 2003) which are part of the operational enterprise ( Liu et
al.,2016) involving other entities (Bedell,2013),creates constraints which are viewed as
challenges ,even though MacLean et al., (2004) argued that challenges are in fact relevant
due to the question of whether the client is able to handle them. Thus, challenges being the
reason, the analysis must explore, identify the necessities and compare interactive or existing
systems, the modules and interfaces (Perlman88) before and after the new mobile application
and the existing system environment. Subsequently, on the basis of the information gathering
process, a most widely graphically-oriented requirements definition technique-SADT
(Structured Analysis and Design Technique) ,(martin,1988)is applied to enable understanding
of which modules are affected by the new application and which interface tools would be

Page 10 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
necessary to enable data exchange and the operation of the application. Additionally, Systems
environment analysis reveals the existing IT services, security and support processes which
are considered during implementation of the B2B application. Finally, systems environment
analysis enshrines its foundation in the interviews with responsible IT leader, the application
owner (Client), existing system manuals and other externals should the IT processes be
administered by them, Leite (1987).Changes are only conducted upon detecting particular IT
skills that may be needed as a result of SADT and eventually providing the basis for
subsequent personnel analysis.
2.2.2 Personnel Analysis
Upon establishing the functions needed to be programmed and implemented and also
knowing how they would interact with the systems environment, personnel analysis becomes
a necessary requirement in order to determine the required personnel resources to implement
the functions Andrea et al., (2017). The analysis process is considered due to the aspect of
interdependency that the organization interacts or has interdependencies , Carroll’s
(1993).Therefore ,in order to acquire the required skills, taking advantage of human
computer interaction(HCI) which focuses on human factors (key skills ) improves the
practice of software engineering resulting into effective, efficient and satisfactory project
execution ,Dayton et al., (1993).Zhang et al. assertion states that personnel analysis provides
an understanding of human factors, such as affective, physical and cognitive constrains fitting
with the requirements of the systems development lifecycle -SDLC,(2004).
The analysis also illustrates how the projects are integrated within the organization and the
team’s structures. However, existing arguments states that development and implementation
of the project (mobile B2B application) is only executable if the client is able to provide the
required staff with appropriate skill sets Dayton et al., (1993) .Additionally, there must be
supportive efforts of adopting new approaches to system development such as user centered
system design Norman & Drapper,(1986). In support of user centered system design, the staff
and developers are trained in order to build their capacity and reduce the digital divide
OECD, (2002b). Thereafter, comparison of tasks and roles renders the understanding of
specific requirements of the staff in terms of skills set (OECD,2004). Based on the
understanding, role planning is considered to be the first step which defines tasks and roles
based on the functional requirements and the results of the systems environment analysis in
order to ensure compatibility between tasks and technology which results into innovation
Tornatzky and Klein (1982). Finally, the project roles are embedded within the organization
hierarchy taking into account of the technical and administrative tasks.
Since projects brings new tasks and additional roles, organizational capabilities become new
category of generic competency in the context of overall management of business processes,
rather than projects alone. Therefore, training of staff and developers need to be more focused
on integration understanding and skills for e-business, such as how to effectively integrate e-
business processes into existing systems environment.

Page 11 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
2.2.3 Risk Identification and Analysis

Existing research assumptions states that there is no risk free project ,each project is different
and involves some degree of uncertainty .However, many organizations still tend to assume
that all their projects will succeed and often fail to consider and analyses their project risks
and prepare in case some of thing goes wrong .This attitude often leads to project failure and
disappointing results and as many studies have shown ,project success rates are less than
satisfactory (Morris and Hough, 1987; Pinto and Mantel, 1990; Tishler et al., 1996). Due to
rapid dynamic environment changes, it is not enough just to have a good project plan or even
other monitoring systems but organizations need to be prepared for the project risks and be
ready to do something about them. Therefore, each project contains risks that are undesired
events that may cause delays, excessive spending and un-satisfactory projects.

Risk analysis only helps to identify factors that drive the behavior of the project schedule,
cost and technical performance as absolute elimination of risks is not possible. The aim is to
identify and control them. A qualitative and systematic project risk analysis method called
Risk Factor Analysis (FRA) is commonly used on a wide spectrum of projects as a tool for
risk identification and analysis developed by John P. Kindinger, and John L. Darby of Los
Alamos National Laboratory (LANL). Although projects differ, all of them suffer from the
same identified four categories of risks which are generic in nature, Technical risk, Schedule
risk, Cost risk, and Funding risk Shenhar and Dvir ,(1996).However, successful project
completion depends to a great extent on the early identification of immediate risks (Datta and
Mukerjee ,2001) using factor analysis, bearing in mind of the hypothesis that risks adversely
impact project success for software developmentt,” Jiang et al. (2002).

As a basis of risk identification, project risk management (PRM)process is typically


supported by tools and techniques such as checklists, brainstorming ,prototyping, simulation,
and contingency planning ;(Raz and Michael, 1999).This includes purposively selected expert
interviews, expected monetary value along with more advanced risk techniques Pritchard
(2001)and Raz and Michael (1999). Of the studies that have looked at failure, identified a
lack of learning from previous failures as a major failure factor in software development
projects Lyytinen and Robey, (1999).

This process, contains uncertain project risk events or conditions that, if they occur, has
negative effects on a project’s objectives (PMI, 2000). Therefore, this being the reason why
identified risks are analyzed in order to establish whether the client is able to handle them.
Assessment of the project risk or its impact on occurrence depicting the probability attribute
of a risk event such as, “probability,” “likelihood,” “probability of occurrence,” and
“occurrence frequency.” Scales used for these probability ratings ,range from low, medium,
and high, 1 to 10, 0 to 1.0, or some other nonlinear or linear scale, plays a pivotal role, PMI
(2000).Based on the assessment, care must be given with respect to the response plan based
on the category into which the risk falls after ranking( Jiang and Klein ,2001).Depending on
the organization’s strategy and tolerance, analysis of risks across cost, schedule, and technical
categories must occur (Pritchard, 2001).

Page 12 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
2.3 Objective 3 – Resources Requirements
Having known the structural requirements at hand, this tool helps in determining the required
resources the client has to raise for the execution of the project Hartney (2017). The required
resources constitute both tangible and intangible kind of requirements. This process reveals
how long software development would take and the required costs even though cost and time
are difficult to measure during the early stages of a project and may continue to shift over the
project life cycle (Atkinson, 1999). Moreover, these resources require mapping as part of
project management.
2.3.1 Project Time Planning

There is a consensus among authors that projects are unique endeavors, special tasks that
have not been done before. Thus, it is difficult or even impossible to know exactly at the
initial planning stage the activities that need to be carried out in order to complete the project,
and what their cost and duration parameters are.However, project time planning is an
important step, seeing recent studies have shown that when planning processes are improved,
the likelihood of project success increases ( Zwikael & Globerson,2004). Therefore, the goal
of project time planning phase is to prepare the structure or activity-based network (i.e. Gantt
Chart) for project execution and control ((Cooper & Kleinschmidt, 1995).

The structure or activity-based network breakdown, provides the estimate for the amount of
time required in order to develop the schedule of activities. This primary purpose of planning,
establishes a set of direction and sufficient detail showing the team of what to be done, when
it must be done and resources to use in order to successfully produce project deliverables
(Meredith & Mantel, 2006). However, this step requires deeper knowledge in software
programming contributed by the skills and attributes of the project managers who are key in
the planning and termination stages where commitment and energy play a major role (Belassi
& Tukel, 1996). In the same regard, Couilard (1995) scrutiny of project management
approaches devised to reduce the influence of risk and increase the likelihood of project
success, concluded that most experienced managers generally formalized plans, monitored
and controlled them closely. Moreover, the revealed activities are logically arranged such that
their dependencies and individual task durations are according to their ranking and the
resulting impact on occurrence.

The use of knowledge areas helps to avoid mistakes and secures reliability for the planning
approach. Ibbs and Kwak (2000) found that project managers pay most attention to Cost and
Communications areas. Cooke-Davies (2002) argues that Risk and Human Resources
knowledge areas are in fact the critical areas for project ssuccess. Furthermore, Jones (2004)
asserts that inadequate milestone tracking and reporting are the causes of project management
failure.

2.3.2 Life Cycle Cost Analysis

It is important to note that costs vary over time, which may result in the risk of relying on
Life Cycle Cos Analysis (LCCA)data rather using it as an orientation tool (Higham et
al.,2015). This process helps to determine the economic value of a project by analyzing initial
costs and future costs. Simply, this technique tackles the question of how much the
cumulative costs for the client will be. Life Cycle Cost Analysis is one of the recommended

Page 13 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
processes due to it being a sensitive approach for the client since it determines the total
financial requirement categorized as direct, indirect, intangible ,contingent and external costs
Norris (2001) of the project by looking at programming, implementation ,follow-up costs,
such as support ,maintenance, operation and disposal ,from the beginning to the end of the
project, (Douglas,2016;Nicholas and Steyn,2012 ).

While activities are broken down into different stages during project time planning phase, life
cycle cost analysis technique provides an overview of the project total costs by summing up
individual activity results. The total cost estimates can be or are arrived at by purposively use
of Delphie technique, a mechanism that helps to reach a consensus by resolving
inconsistencies in the estimation, H. Leung and Z. Fan (2002) while basing the estimates on
current premium market prices.

Chapter 3. Study Gantt -Chart


The project time planning phase provides the basis for the construction of a Work Breakdown
Structure (WBS) most widely used (Liberatore & Titus ,1983; Higgins & Watts, 1986) as a
planning technique identified as a Gantt Chart. The technique is a pedagogic way of showing
when different activities take place in time, making planning of parallel activities easier.
Simply the aim is to identify the activities necessary to perform in order to complete the
project task, Maley (2012). The technique serves the same purpose as specialization of labour
in planning and identifying controllable action sequences.
The Gantt chart highlights the duration of individual activities and their dependencies, their
start and end dates and the possible overlap of activities. This technique is supported and
extended by the Critical Path Model (CPM) displaying which activities involve
interdependencies by demonstrating the order of those critical steps and what the nature of
these interdependencies are. The most important interdependency is the sequential one,
meaning, which activities must be completed in order for the next one to start. Consequently,
the critical path are thereby the most important ones in terms of monitoring and control and in
this consulting project they are; functional requirements, structural requirements and resource
requirements.
The focus on the key activities is scheduled for Six months presented as twenty (26) weeks.
To initiate the project, the first meeting only introduces the relevant stakeholders and their
responsibilities while taking into account of the project constraints and avoidance of conflict
that may raise due to multiple participation of stakeholders (Fuentes et al,.2010).
Subsequently the details of the project are presented in order to avoid lack of understanding
of client requirements and issues such as lack of cooperation between different distributed
teams, (Kuusinen et al.2012).Due to projects dependent on communication in order to
function (Galbraith, 1973), continuous communication between consultant and client remains
intact in order to ensure adequacy of the project study. Furthermore, Thomson(1967),states
that the complexity of the tasks and the more interdependencies between activities ,causes a
greater need for task -relevant communication within the organization ,whereas
Kanter(1983) affirms that projects can be a way of bringing about communication in
organizations with sharp dividing lines between the sub–units and (Katz & Tusman 1980)
concluded that project effectiveness is strongly correlated to the amount of task–relevant
communication in the project organization .

Page 14 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Therefore, to help client and other stakeholders understand the major project steps for the
study and expected feedback and progress report from the consultancy, the Gantt Chart is
identified and its different sections are divided according to the objectives intended to meet
the client requirements. Each objective is supported by appropriate analytical tool or tools
such as market analysis, stakeholder analysis and existing industrial information.
Figure 1. herewith inserted below, illustrates the Gantt Chart. The sequence of activities in
this case which are the three objectives (Functional Requirements, Structural Requirements &
Resource Requirements), activities duration represented in weeks, with Task IDs depicted in
dependencies. Critical path indicating most important activities leading to the completion of
the project and most important to monitor and control. The critical path bears an assumption
that the completion times of all activities in the project are possible to assess beforehand, and
that these completion times are possible to change within certain limits by changing resources
allocated to the respective activities. However, the Gantt Chart suffers from the lack of
resource allocation which are excluded, which in turn means that interdependencies between
activities in terms of resources are excluded. Therefore, any two parallel activities using the
same resources or machine and people, efforts to co-ordinate them are insufficient due to that
the Gantt chart offers no way of displaying this fact.

Page 15 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Figure 1. Gantt Chart: Source - Own

Page 16 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Chapter 4. Contributions
This part of the study will in detail deal with the question of how individual techniques
contribute to the identified objectives of which are;

• To determine the business economic impact of the proposed mobile app.


• To determine how mobile app. is able to enhance business competitive advantage and
• To enable understanding of the market trends, needs, capabilities etc.

The objectives are met by way of a combination of existing industrial insights with existing
research theories of study acquired while investigating on various techniques. Extensive
discussions regarding selected analytical tools or models will be offered in order for the client
to obtain necessary information for the project requirements. Consequently, the client will be
able to make informed decisions regarding the project development.
Furthermore, this process covers important elements that are found in software teams
(Stakeholders), such as coordination of work.

4.1 Objective 1-Functional Requirements

Functional requirements describe what the system will do or simply describing the systems ‘s
functionalities, such as sending a message whenever a client signs up on the App. The
functional requirements are embedded in B2B applications. Al-Naeem et al (2005).
In order for the client to receive knowledge about the market and its key players needs and
wants of the B2B application, the following models were used;
4.1.1 Stakeholder Analysis

Due to increasing interdependencies with whom organizations interact with (Caroll,1993), no


organization is left an island, therefore to create a successful project, usually requires
interaction with project stakeholders ,noticed and listened to more carefully than those who
do not possess salience (Mitchell et al., 1997; O´Higgins and Morgan, 2006). Failure to
understand the interest groups, their salience and potential to influence throughout the project
lifecycle, is major challenge (IFC, 2007; Miller 2000). Therefore, influence can be assessed
through the stakeholder identification and salience model. Thus, it is essential to understand
both objectives of the stakeholders and the means through which their interest can affect the
project (Aaltonen et al., 2008; Paliszkiewicz, 2011). Based on this idea, stakeholder analysis
is important in order to identify those stakeholders likely to influence the mobile app project
and then manage their demands through continuous communication. Furthermore, the process
helps with the need for a more in-depth understanding of the changes in the positions of
stakeholders within the project Olander and Landin (2005) to enable improvements on the
activities. In so doing relevant stakeholders are identified to assist with insights on the design
and features development to ensure that their expectations are met even though earlier
research has acknowledged project stakeholders as a major source of unexpected events
(Söderholm, 2008). Finally, both market and stakeholder analysis present the available
market opportunities, threats and the criteria for the project success.

Page 17 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
4.1.2 Market Analysis

Most authors and theory, holds that this technique contributes significantly to the
transformation of the business because it enables them achieve their purpose (Pursche, 1990)
due to its ability to review market trends, size, market growth and other characteristics such
as existing technology which are the basis for decision making (Alketbi and Gardiner, 2014).
It is acknowledged that market analysis model help transmit information regarding the end
users of the app, their level of exposure to modern technology and also determine the level of
app (technological) complexities they can cope with as Alketbi and Gardiner (2014).It is also
believed that this tool is considered to be the simplest technique used by project managers in
solving complicated issues bordering on stakeholders expectations.Furthermore, the process
allows for in-depth understanding of customers different desires for benefits from the same
products or services and market offerings Backman (1994) . Based on identifying these
characteristics, markers may decide to segment the customers based on benefit segmentation
which is highly viewed as a tool predicting customer behavior better than demographic or
geographic segmentation Loker and Perdue (1992).
Upon adopting this tool, (Dalgic and Leeuw, 1994) postulates that markers can create
successful business ventures.

4.1.3 Software Evaluation and Benchmarking

The fact that earlier research believed benchmarking to be for statistical precision, it is
popularly being used as a guide (Muschter, 1997) with its ultimate objective of process
improvement that meets the attributes of customer expectations (Omachonu and Ross, 1994,
pp. 140-1).The model is viewed as a valuable tool because of its contribution to opening up
many different ideas to processes, approaches and concerns (Allan,1997). On the basis of this
assertion, the analysis is considered suitable for the industry because of its ability to reveal
functionalities that are required and appropriate to a relevant industry. Above all, the goal of
benchmarking contributes to the companies’s realization of world-class competitive
capability by way of identifying and learning from the best practices anywhere in the world
(Allan.1997).

Regarding benchmarking and adaptation process, an investigation on its application ,


(Omachonu and Ross, 1994), found that there were many companies using benchmarking
process which included Avon products, Exxon Chemical, Microsoft, Ford, and General
Motors and one of the best known examples of companies in the USA using benchmarking is
Xerox which eventually became to be known as the “pioneer “ of benchmarking
(Omachonu and Ross, 1994).Xerox did not get all improvements directly from benchmarking
but the improved processes and climate indirectly improved the rest of the organization
(Omachonu and Ross, 1994) as noticed by its results in direct labour cut by 50 per cent and
corporate staff cut by 35 per cent while increasing production volume (Omachonu and Ross,
1994).

While in order for benchmarking to be successful, there are general requirements to be


considered in an organization, such as senior management interest, support and dedication to
ongoing benchmarking efforts (Bateman, 1994).

Page 18 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
4.2 Objective – 2 Structural Requirements

4.2.1 Systems Environment Analysis

As part of the organization strategy and tolerance, the software project management
technique known as system environment analysis is considered as a valuable tool because of
its contribution to revealing different ideas, processes, approaches and concerns (Allan,1997).
The major concerns tackled in this process before and during requirement elicitation,
provides the basis for management decision making, according to Johnson (2001), 97 % of
projects which are successful are managed by skilled and experienced project managers.
Among the many concerns is the personnel and risk analysis since the IT environment
requires particular staff and skill sets. Furthermore, the model involves everyone in the
process , including the management and the workers while depending on the company’s
characteristics and circumstances (Matters and Evans, 1997).It is on this principle that the
analysis is considered suitable for the industry because of its ability to reveal functionalities
and exposure of structural IT requirements such IT capabilities appropriate for a relevant
industry . This is done bearing in mind of Hofstede’s (1984) cultural dimension of
uncertainty avoidance in order to survive and succeed in the highly competitive market, it is
this cultural change that must occur (McNair and Leibfried, 1992).

Regarding software projects failure, inadequate adaptations as well as IT problems known as


ccontent driven failure or the technology factor (Yeo, 2002), were responsible for a large
part. However, Sauer (1993) narrative emphasizes that interests and capabilities of the most
important stakeholders must be considered in order to avoid software project failure.
Furthermore, Sauer states that differential capacities can manifest themselves as failure, for
example the failed London ambulance project where users did not have the capacity to use
the system (1993).In support of Sauer’ assertion, Kappelman et al. (2008) argued that no
information Systems (IS) project fails due to technological factors, but rather due to people
and processes which manifests as technical issues. Similarly, Nelson (2007) revealed that
only 4 percent of the top ten failures listed technology as a factor compared with processes
and people.

4.2.2 Personnel Analysis

The failed projects reviewed were mostly huge and the failure factor were not just
management factors but also included technical factors (N. Cerpa and J. M. Verner,2009).
However, Kappelman et al., (2008) argued that no project fails due to technological factors,
but rather due to people and processes which manifest as technical factors. Similarly, Nelson
(2007) findings in his seminal works, stated that only 4 percent of the top ten project failures
listed technology as a factor compared with processes and people. Based on the assertions,
personnel analysis contributions to requirement elicitation is highly recommended especially
that software development, implementation and maintenance is people intensive task.
Therefore, only conceptual or focused analysis explains the required knowledge, Skills and
abilities (KSA) as important factors to yield quality performance within a short time, Brooks
(1987).

It is equally important during this activity to establish the level of scope for the system and
investigate in detail the needs and wants of the client, especially the users and also examine
the ways in which the system may support them in order to satisfy the project objectives.In
case of lack of skilled staff ,It is important to remember that requirements elicitation does not

Page 19 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
occur in a vacuum. It is strongly related to the context in which it is conducted and specific
characteristics of the project, organization, and environment where Groupware or Group
Systems could fill the gap Jackson (2000).

4.2.3 Risk Identification and Analysis

The process appears to be important due to its positive contribution to risk mitigation
particularly by exposing threats and opportunities. Just by entering the application domain
without investigating and examining in detail, this “real world”, is a risk factor enough to
cause project failure, Jackson (1995:1997). Among many risks exposed by this technique
includes constraints and avoidance of conflict that may raise due to multiple participation
(including none relevant) of stakeholders (Fuentes et al,.2010),lack of understanding of client
requirements and issues such as lack of cooperation between different teams, (Kuusinen et
al.2012),cognitive limitations Kappelman et al., (2008),such as the failed London ambulance
project where users did not have the capacity to use the system (Sauer, 1993), cultural
avoidance dimension Hofstede’s (1984) and semantic differences which may lead to rejection
of organization cultural change (McNair and Leibfried, 1992).If such potential risks of the
project are not identified in advance ,the project may not be delivered on time
,Grantetal.,(2006),within budget and expected quality. Based on the above, within the risk
management process, risk identification and analysis is considered by many authors as the
most crucial element of the entire process; since once the risk is identified as mentioned and
itemized above, it is possible to take measures for its management (Chapman and
Ward,2007).

Several examples of failed projects were largely contributed not just by management factors
but also included technical factors (N. Cerpa and J. M. Verner,2009). Consequentially,
Kappelman et al., (2008) stated that people and processes is what manifest as technical
factors. Hence, it is of particular importance for the client to adopt the traditional approach
which is more appropriate for projects with clear initial user requirements, clear risk
understanding and with very low level of uncertainty (Coram & Bohner, 2005; Bart CK,
1993). The traditional approach points out that risk identification and analysis of software
projects must be done with formal control and accuracy capture of information.

4.3 Objective 3 – Resource Requirements

4.3.1 Project Time Planning

Imperfect modeling and estimations are some of the common causes of time mismanagement
and eventual project failures. The inaccuracies can cause pressure and negative results such
as budget overrun characterized as “software Runways” meaning from original plans in cost
and delivery Ewusi-Mensah (2003, p.8). Common errors in time estimation results from IT
managers who are not given the opportunity to focus more on planning due to the pressure
from senior management, eventually, some of the projects start before they are clearly
defined (New Zealand Management, 2003) consequently leading to project failures.

Existing research indicates that shortening project duration is highly recommended for global
competition unlike prolonged projects which results into excessive accrual of costs. Further
recommendation is for organizations to continue searching for new ways to reduce project
duration through means such as activities overlapping (Jacobs & Herbig 1998) during project
development phase as is in this consulting work of B2B mobile application development for

Page 20 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Company X. In order to shorten the project duration, this consulting bid adopted the
overlapping approach as can be observed from the Gantt Chart earlier on presented in this
report. The approach is viewed as a critical success factor for accelerating development as
reported regarding Israeli project managers who have been found to invest most of their
efforts in schedule planning to expedite development (Globerson & Zwikael, 2002).

Even though it is found to be very difficult to know exactly at the initial planning phase what
are all the activities that need to be carried out in order to complete the project, and what their
costs and time limits are ,Andersen,(1996),conscious analysis with reasonable modeling and
time estimation can prevent wrong modelling and estimations and imminent risks leading to
losses and project failure.

4.3.2 Life Cycle Cost Analysis

The ultimate objective of the model ,identifies the lowest cost of the project overtime and
provides a framework for finding the total cost of design, development and production
(Fabrycky and Blanchard,1991).This entails early process implementation in order to
influence the design changes of the project with the aim of enabling investment options to be
more effectively evaluated while considering the impact of all costs, rather than only initial
capital costs Woodward,(1997).

Applying LCCA in a project elicitation process proves to be a comprehensive and detailed


technique regarding assessing a company’s project life cycle due to the tendency of using
economic principles such as Net Present Value (NPV) and Internal Rate of Rate (IRR) to
compare competing alternative investment strategies (Asiedu,1998).The use of these
economic principles allows for understanding of the future value of money in present day and
also how long it would take to return on what is invested, respectively. However, LCCA
attracts criticism largely from its reliance on complex reliability models which scholars have
argued that in order to perform an effective life cycle cost analysis, the life cycle cost analyst
must possess skills in many areas including finance, accounting, statistical analysis, logistics,
engineering etc. Bearing mind that there can never be a single professional, it should be a
corresponding team meaning that the organization will be susceptible to encounter
management problems arising from managing or organising high-level team of professionals
which is also expensive and time consuming.

This is of utmost importance for the client to take note that LCCA can only be successful, if
the attitude and thinking philosophy of the high-level management toward reliability are
considered a crucial factor Dhillon (2000).

Chapter 5 Conclusion Remarks

While this consulting bid report does not provide the main focus of study which is
requirement elicitation, a holistic approach was instead adopted in order to reveal the project
activities based on the main three critical paths elaborated on the Gantt Chart for guidance.
With requirement elicitation being a critical step in the elicitation process, it is important that
high level management apply appropriate methods and techniques recommended in this
report to perform the process successfully.

This report attempts to present meaningful insights based on theoretical guidelines as


supporting evidence. Furthermore, the report reveals different contextual situations for

Page 21 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
consideration during requirement elicitation process, development and implementation.
Having known that requirement elicitation is a complex social interaction process, this report
provides client a proper and contextual means to perform the process. It also empathizes on
relevant stakeholders to possess interpersonal skills to help build consensus between
heterogenous groups of stakeholders because the project is highly human intensive.

This report’s narrative is that, requirements elicitation is highly dependant on a large number
of factors including the type of system being developed, human knowledge, skills and
capabilities, the stage of the project, and the application domain in which the system will
reside etc. .It is of the utmost importance to ensure that management takes cognizance of
relative strengths and weaknesses of the available methods and the type of information
provided to the client because the reality is that in almost all projects ,a combination of
several different techniques will be necessary to achieve a successful outcome. In support of
using techniques in conjunction with each other, using Net Present Value (NPV) allows for
the understanding of the future cashflows in today’s value while Internal Rate of Return
(IRR) elaborates only on how long it would to realize that future value. Therefore, this report
strongly recommends that most of the approaches require a significant level of skill and
expertise from the analyst to use effectively such as in the case of Life Cycle Cost Analysis
which needs more than a single expert to handle statistical analysis, technical engineers,
Accountants etc.

This report ‘s emphasis on personnel analysis, viewed among others the challenge of
disagreement among stakeholders on suggested issues which includes the need for changes
because of opinions based on different experiences in carried out the process. It is on this
premise that communication should render an optimal customization of the collected
information. One other neglected factor, is the existing structural infrastructure which must
be upgraded and enforce human computer interaction, meaning that the software must be able
to help the user.

Finally, the report recommends that attention be paid to the uncertainty avoidance cultural
dimension during development and implementation process as the absence of it may lead to
the system being rejected. Most of the conclusion remarks, points to the people as the most
critical factor causing the project failure as stated Kappelman et al., (2008), “no project fails
due to technological factors, but rather due to people and processes which manifest as
technical factors”.

The consulting bid report for Company X provides the guideline and valuable
recommendations for decision making.

Page 22 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Chapter 6. References

Abrahamsson, P., Hanhineva, A., Huikko, H., Ihme, T., Jaalinnoja, J., Korkela, M., Koskela,
J., Kyllonen, P. and Salo, O. (2014) “Mobile-D: an agile approach for mobile application
development”, 19th annual ACM SIGPLAN conference on object-oriented programming
systems, languages and applications.Available {Online}Accessed on 11th August, 2019.

Al-Naeem, T., Rabhi, F.A., Benatallah, B. and Ray, P.K. (2005, pp. 41-70), “Systematic
Approaches for Designing B2B Applications”, International Journal of Electronic Commerce,
Vol.9(2).
Ancarani, Fabio and Venkatesh Shankar (2003, pp.56-76), “Symbian: Customer Interactions
through Collaboration and Competition in a Convergent Industry,” Journal of Interactive
Marketing, 17 (1).
Andersen ES (1996, pp.89-94) “Warning: activity planning is hazardous to your project’s
health!” International Journal of Project Management 1996;14(2).Available {Online}
https://www.researchgate.net/profile/Aaron_Shenhar/publication/223746814_An_Empirical_
Analysis_of_the_Relationship_between_Project_Planning_and_Project_Success/links/5c9dd
abd45851506d731d418/An-Empirical-Analysis-of-the-Relationship-between-Project-
Planning-and-Project-Success.pdf:Accessed on 14th August , 2019.

Aaltonen K., Kujala J., and Oijala T (2008, pp.509-516) “Stakeholder salience in global
projects”, International Journal of Project Management, 26, 2008.

Atkinson, R. (1999, pp.337-342)” Project management: cost, time and quality, two best
guesses and a phenomenon, its time to accept other success criteria “International Journal of
Project Management, 17 (6).

Alin Z. (2015, pp.131-138) “Factors Influencing the Quality of Mobile Applications”.


Informatica Economical Journal, Vol.18 (1). [Online]. Available {Online}
http://www.revistaie.ase.ro/content/69/12%20-%20Zamfiroiu.pdf;Accessed on 05th July,
2019.

Andrea Zangiacomi, Jonathan Oesterle, Rosanna Fornasiero, Marco Sacco & Americo
Azevedo (2017)” The implementation of digital technologies for operations management”
a case study for manufacturing apps, Production Planning & Control, Available
{Online} DOI: 10.1080/09537287.2017.1375142 ;Aaccessed on 28th September, 2018.

Y. Asiedu, P. Gu, (1998, p.883) “Product Life Cycle Cost Analysis” state of the art review
International Journal of Production Research 36 (4).

Apollo B. (2018)” In Complex B2B Sales, Stakeholders Have More Than One Dimension”.
Available {Online}
https://www.business2community.com/b2b-marketing/in-complex-b2b-sales-stakeholders-
have-more-than-one-dimension-02111011 :Accessed on 12 August 2019.

Attarzadeh, I. & Ow, S.H. (2008, pp. 234-241)” Project Management Practices: The Criteria
for Success or Failure” Communications of the IBIMA, 1.

Page 23 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

Backman, S. (1994, pp.1-16), “Using a person-situation approach to market segmentation”,


Journal of Park and Recreation Administration, Vol. 12 No. 1.
Bedell C. (2013) “Mobile apps development: Defining requirements is a whole new
ballgame” Available {Online}, https://searchsoftwarequality.techtarget.com/feature/Mobile-
apps-development-Defining-requirements-is-a-whole-new-ballgame,Accessed on 10th
August,2019.

Bhatia, Leena & Jain, Bindu. (2013, pp.33-44)” Card bases payment mode - an accounting
perspective: a comparison between credit card and debit card payment systems in India”.
Int. J. of Managerial and Financial Accounting. 5.

Bateman, G. (1994, p.6), “Benchmarking management education teaching and curriculum,”


in Camp, R., Benchmarking: The Search for Industry Best Practices that Lead to Superior
Performance, Quality Resources, White Plains, NY.

Brooks, F. (1987, pp.10-19)” No Silver Bullet: Essence and Accidents of Software


Engineering” IEEE Computer, Vol.20.

Chapman, C.B., Ward, S., (2007) “Project Risk Management”: Processes, Techniques and
Insights. School of Management, University of Southampton, UK0-470-85355-7.

Carroll, A. (1993) “Business and Society: Ethics and Stakeholder Management “,


Southwestern Publishing, Cincinnati, OH.

Chaitanya Kaul and Saurav Verma (2015, pp.30-33) “A Review Paper on Cross Platform
Mobile Application Development IDE”, IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 1.

Castro-Herrera, C., J. Cleland-Huang and B. Mobasher, (2009, pp.37-46)” Enhancing


stakeholder profiles to improve recommendations in online requirements elicitation” In:
Proc. 17th IEEE Int. Conf. Requirements Engineering, RE'09.

Callele, D. and K. Wnuk, (2011, pp.35-42)” More than requirements: Applying requirements
engineering techniques to the challenge of setting corporate intellectual policy, an experience
report. Proc” Fourth International Workshop on Requirements Engineering and Law
(RELAW, 2011) Available { Online}
http://cs.lth.se/fileadmin/cs/KrzysztofWnuk/CommGaps_CR_Candidate.pdf;Accessed on
06th July,2019.

Carey, J., D. Galletta, J. Kim, D. Te'eni, B. Wildermuth, and P. Zhang (2004, pp.357-379)
"The Role of HCI in IS Curricula: A Call to Action," Communication of the AIS (13)23.

Christel, M.G. and K.C. Kang, (1992.pp xx)” Issues in requirements elicitation” DTIC
Document.

Cooper, R. G., & Kleinschmidt, E. J. (1995, pp.374-391)” Benchmarking the firm’s critical
success factors in new product development “Journal of Production Innovation Management
,12.Available {Online} https://openresearch-

Page 24 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
repository.anu.edu.au/bitstream/1885/106515/5/01_Zwikael_The_Relative_Importance_2009
.pdf : Accessed on 13th August , 2019.

Cooke-Davies, T. J., & Arzymanow, A. (2002, pp.471-478)” The maturity of project


management in different industries: An investigation into variations between project
management models “. International Journal of Project Management, 21.

Couillard, J. (1995, pp.3-15) “The role of project risk in determining project management
approach”. Project Management Journal ,26.

Coram, M. & Bohner, S. (2005) “The impact of agile methods on software project
management “Proceedings of the 12th IEEE International Conference and Workshops on the
Engineering of Computer–Based Systems, USA

Datta, Sumit, and S.K. Mukerjee, (2001, pp.45-47) “Developing a Risk Management
Matrix for Effective Project Planning—An Empirical Study,” Project Management Journal
,32:2 (June 2001). Available {Online);
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.458.1970&rep=rep1&type=pdf;Ac
cessed on 13th August, 2019.

D.G. Woodward, Life Cycle Costing (1997, p.335) “Theory, Information Acquisition and
Application” International Journal of Project Management 15 (6)

Davey, B. and C. Cope, (2008, pp.543-551) “Requirements elicitation – what’s missing”.


Issues Inf. Sci. Inf. Technol., 5(1).

Dan S. (2017) “ 7 Reasons Why Small Businesses Need Mobile Apps” Available { Online}
http://app.foundation/7-reasons-why-small-businesses-need-mobile-apps/ ; Accessed on 13th
July, 2019.
Deloitte (2012)” what is the impact telephony on economic growth” A Report for the GSM
Association; Available {Online};
https://www.gsma.com/publicpolicy/wp-content/uploads/2012/11/gsma-deloitte-impact-
mobile-telephony-economic-growth.pdf;accessed on 10th July,2019.

Deloitte. (2014) “ Digital Engagement “ Tech Trend 2014,Available {Online}


https://www2.deloitte.com/insights/us/en/focus/tech-trends/2014/2014-tech-trends-digital-
engagement.html;Accessed on 20th July, 2019.

Damian, D.E. and D. Zowghi, (2003, pp.149-160)” RE challenges in multi-site software


development organizations” Requirements Eng., 8(3).

Douglass B. Lee (2016) “Fundamentals of Life-Cycle Cost Analysis Article in Transportation


Research”. Record Journal of the Transportation Research Board. Available {Online} https://
www.researchgate.net/publication/240011149 _Fundamentals_ of Life-Cycle_ Cost
_Analysis ;Accessed on 13th August ,2019.
Dhillon, B. S. (2000) “Design Reliability “Fundamentals and Applications London, NY,
Washington, D.C.: CRC Press.

Page 25 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Ewusi-Mensah, K. (2003)” Software Development Failures” Anatomy of Abandoned
Projects. London,England: The MIT Press.

Farinha, C. and M.M. da Silva, (2013, pp.1-12) “Requirements elicitation with focus groups”
Lessons learnt. in ECIS.

R. Fuentes-Fernández, J. Gómez-Sanz, and J. Pavón, (2010, pp.267-283) “Understanding the


Human Context in Requirements Elicitation. Requirements Engineering”, Vol. 15, No. 3.

Galbraith, Jay (1973)” Designing Complex Organizations. Reading”, MA: Addison–Wesley.

Grant, R. M. (2008) “Contemporary strategy analysis” Hoboken, NJ: John Wiley & Sons
Hartney J. (2017)” Types of Project Resources”. Available {Online}
http://www.projectengineer.net/types-of-project-resources/ ;Accessed on 10th August , 2019.
Grant, K.P., Cashman, W.M., Christensen, D.S., (2006, pp.52-58) “Delivering projects on
time” Research & Technology Management.

Hofstede, G. (1984, pp.81-99). Cultural dimensions in management and planning. Asia


Pacific journal of management, 1(2).

H. Leung and Z. Fan (2002) “Software Cost Estimation” Department of


Computing, The Hong Kong Polytechnic University.

Higham, A., Fortune, C. and James, H. (2015, pp.73-87), “Life cycle costing: evaluating its
use in UK practice”, Structural Survey, Vol.33(1).

Higgins, J. C. & Watts, K. M. (1986, pp.291-296) “Some Perspectives on the Use of


Management Science Techniques in R&D Management.” R&D Management, Vol 16, No 4:

IFC, (2007)” Stakeholder Engagement” A Good Practice Handbook for Companies Doing
Business in Emerging Markets, International Finance Corporation.

O´Higgins, E.R.E., and Morgan, J. W. (2006, pp.62-76“Stakeholder salience and


engagement in political organisations”, Society and Business Review, 1 (1), 2006.

Ibbs, C. W., & Kwak, Y. H. (2000, pp.32-43)” Assessing project management maturity”
Project Management Journal ,31(1).

Jackson, M. (1995, pp.283-292)” The World and the Machine” Proceedings of the
Seventeenth IEEE International Conference on Software Engineering, Seattle, WA.

Johnson, J., Boucher, K. D., Connors, K., & Robinson, J. (2001) “Collaboration:
Development & Management Collaborating on Project Success”

Jackson, M. (2000) “Problem Frames: Analyzing and Structuring Software Develo pment
Problems”, Addison Wesley: Boston, MA.

Jacobs, L. & Herbig, P. (1998, p.132) “Japanese product development strategies”


The Journal of Business & Industrial Marketing. Santa Barbara, 13, 2.

Page 26 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

J.L. Holland, (1985) “Making Vocational Choices: A Theory of Vocational Personalities and
Work Environments” 2nd Edition, Englewood Cliff, NJ: Prentice-Hall.

Jiang, James J, Gary Klein, and T. Selwyn Ellis, (2002,pp.30-41)“A Measure of Software
Development Risks,” Project Management Journal , 33:3.Available {Online );
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.458.1970&rep=rep1&type=pdf;Ac
cessed on 13th August, 2019.

] Bart CK. Controlling new product R&D projects.” R&D Management” (1993, pp.187-197)

Kappelman, L. A., McKeeman, R., & Zhang, L. (2008, pp.31-36) “Early Warning Signs Of
IT Project Failure” The Dominant Dozen. Information Systems Management.

Kapil M. (2017,PP.32-36) “ The undeniable importance of mobile applications and its global
impact” International Journal of Advanced Science and Research ISSN: 2455-4227, Impact
Factor: RJIF 5.12 .Volume 2; Issue 3; May 2017; Available {Online}
www.allsciencejournal.com/download/131/2-3-12-677.pdf: Accessed 03rd July,2019.

Kuusinen, K., Mikkonen, T. and Pakarinen, S. (2012, pp.94-111) “Agile user experience
development in a large software organization; Good expertise but limited impact”. Human-
Centered Software Engineering,Springer.

King, R. C., & Xia, W. D. (1997, pp.877-910)” Media appropriateness:


Effects of experience on communication media choice”. Decision Sciences, 28(4).

Leite,J.(1987,pp. ) “A survey on Requirements Analysis”. RTP 071, University of California,


Irvine,

Liberatore, Matthew J. & Titus, George J. (1983, pp.962-974) “The Practice of Management
Science in R&D Project Management.” Management Science, Vol 29, No 8:

Loker, L. and Perdue, R. (1992, pp.30-35), “A benefit-based segmentation of a non resident


summer travel market”, Journal of Travel Research, Vol. 31 No. 1.

Lyytinen, K., & Robey, D. (1999, pp.85-101)” Learning Failures in Information Systems
Development”. Journal of Information Systems, 9.

MacLean, R., Stepney, S., Smith, S., Tordoff, N., Gradwell, D., Hoverd, T. and Katz, S.
(2004, pp.)” Analysing Systems: determining requirements for object-oriented development”
Hemel Hempstead: Prentice Hall International.

Maley, C.H. (2012) “Project management concepts, methods, and techniques” Boca Raton,
Fla.: CRC Press.

Martin, C. (1988, pp.)” User-Centred Requirements Analysis, working systems, User


interface implementation” Englewood Cliffs, N.J.: Prentice-Hall.

Meredith J. R., & Mantel S. J. (2006)” Project management”: A managerial


Approach (6th ed.). New York: John Wiley and Sons.

Page 27 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

Mitchell, R.K., Agle, B.R. and Wood, D.J. (1997, pp.853-886), “Toward a theory of
stakeholder identification and salience: defining the principle of who and what really count”,
Academy of Management Review, Vol. 22 No. 4.

Miller, R., Lessard, D., (2000) “The Strategic Management of Large Engineering Projects”
Shaping Institutions, Risks and Governance, MIT Press, Cambridge, MA.

Nasi, J., Nasi, S., Philips, N. and S. Zyglidopoulos (1997, pp.296-321). The evolution of
corporate social responsiveness, Business and Society, 36, 3.

Nelson, R. R. (2007, pp.67-78) “IT Project Management”: Infamous Failures, Classic


Mistakes, and Best Pract ices. MIS Quarterly Executive, 6 (2).

New Zealand Management. (2003)” When IT projects fail”, Available {Online}


https://www.researchgate.net/profile/Khaled_Fagih/publication/282135018_A_Taxonomy_of
_an_IT_Project_Failure_Root_Causes/links/5604647e08ae8e08c08a9319/A-Taxonomy-of-
an-IT-Project-Failure-Root-Causes.pdf : Accessed on 19th August, 2019.

Norman, D.A., and Draper, S.W. (1986) “User Centred System Design: New
Perspectives on Human-Computer Interaction “. Hillsdale, NJ: Lawrence
Erlbaum Associates.Available {Online};
https://apps.dtic.mil/dtic/tr/fulltext/u2/a285210.pdf;Accessed on 12th August, 2019.

N. Cerpa and J. M. Verner, (2009, pp.130-134) “Why did your project fail?”
Communications of the ACM, vol. 52, no. 12.

Nicholas, J.M. and Steyn H. (2012)” Project management for engineering, business and
technology” 4th ed., London: Routledge.

Norris, G.A. (2001, pp.118-120) “Integrating life cycle cost analysis and LCA”, The
International Journal of Life Cycle Assessment, Vol.6(2).
https://www.researchgate.net/publication/225548796_Integrating_life_cycle_cost_analysis_a
nd_LCA :Accessed on 13th August, 2019.

OECD (2004), “ICT, E-Business and Small and Medium Enterprises”, OECD Digital
Economy Papers, No. 86, OECD Publishing, Paris.Available {Online} https://www.oecd-
ilibrary.org/docserver/232556551425.pdf?expires=1565724224&id=id&accname=guest&che
cksum=79FF7683D07C0D66F0867F7C5AD788B0;Accessed on 12th August , 2019.

OECD (2002b) “Information Technology Outlook 2002”, OECD, Paris. Available {Online}
https://www.oecd-
library.org/docserver/232556551425.pdf?expires=1565724224&id=id&accname=guest&che
cksum=79FF7683D07C0D66F0867F7C5AD788B0;Accessed on 12th August , 2019.

Omachonu, V.K. and Ross, J.R. (1994, pp.137-154) “Principles of Total Quality”, St. Lucie
Press, Delray Beach, FL.

Page 28 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Olander S., Landin, A., (2005, pp.321-328) “Evaluation of stakeholder influence in the
implementation of construction projects” International Journal of Project Management, 23(4).

Perlman, G (1988)” User Interface Development” Curriculum Module SEI-CM-17-1.0,


Software Engineering Institute, Carnegie Mellon University, Pittsburgh,

Pizzutillo P. (2015)” Software Benchmarks and Benchmarking” Available {Online}


https://www.castsoftware.com/blog/software-benchmarks-and-benchmarking;Accessed on
22nd July, 2019)

Project Management Institute (2013), “A Guide to the Project Management Body of


Knowledge (PMBOK Guide)”, Newtown Square, Pa.: Project Management Institute.

Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman, (2011, pp.329-344)


“Identifying diverse usage behaviours of smartphone apps,” in Proc. ACM SIGCOMM Conf.
Internet Meas. Conf.

Raz, T. and Michael, E. (2000, pp.9-17)” Use and benefits of tools for project risk
management” International Journal of Project Management .Available {Online}
https://www.researchgate.net/profile/Aaron_Shenhar/publication/227644860_Risk_Managem
ent_Project_Success_and_Technological_Uncertainty/links/5a7f1e19a6fdcc0d4baa7407/Risk
-Management-Project-Success-and-Technological-Uncertainty.pdf ;Accessed on 13th August
, 2019.

mobiThinking. (2011) “ Global mobile statistics 2012 “ Part B: mobile Web; mobile
broadband penetration; 3G/4G subscribers and networks. Available {Online}
http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats :Accessed 10th July ,
2019.

Okello-Obura, Constant and Ssekitto, Francis, (2015) "We 2.0 Technologies Application in
Teaching and Learning by Makerere University Academic Staff “Library Philosophy and
Practice (e-journal). 1248. Available {Online} http://digitalcommons.unl.edu/libphilprac/1248
Accessed on 03rd July, 2019.
Pegg, S., & Patterson, I. (2010, pp.85-99)” Rethinking music festivals as a staged event”
Journal of Convention & Event Tourism, 11(2).

Project Management Institute(2000)”A Guide to the Project Management Body of Knowledge


“(PMBOK® Guide), Project Management Institute.Available on {Online);
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.458.1970&rep=rep1&type=pdf:Ac
cessed on 13th August, 2019.

Pritchard, Carl, Risk Management, Concepts and Guidance, 2nd ed., ESI International
(2001). Available {Online};
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.458.1970&rep=rep1&type=pdf:
Accessed on 13th August,2019.

Rajagopal, P., R. Lee, T. Ahlswede, Chia-Chu Chiang and D. Karolak, (2005, pp.32-42) “A
new approach for software requirements elicitation. Sixth Int. Conf. Software Engineering,

Page 29 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Artificial Intelligence”, Networking and Parallel/Distributed Computing and First ACIS
International Workshop on Self Assembling Wireless Network, Towson, MD, USA.

Sauer, C. (1993)” Why information systems fail” A case study approach. Oxfordshire: Alfred
Waller.

Sauer, C., Southon, G., & Dampney, C. N. (1997, pp.349-366) “Fit, failure, and the house of
horrors: toward a configurational theory of is project failure”. Proceedings of the eighteenth
international conference on Information systems. Atlanta, GA, USA: ICIS.

Söderholm, A., (2008, pp.80-86) “Project management of unexpected events”. International


Journal of Project Management, 26(1).

Shenhar, A.J. and Dvir, D. ;(1996, pp.607-632) “Toward a typological theory of project
management” Research Policy ,25. Available {Online};
https://www.researchgate.net/profile/Aaron_Shenhar/publication/227644860_Risk_Managem
ent_Project_Success_and_Technological_Uncertainty/links/5a7f1e19a6fdcc0d4baa7407/Risk
-Management-Project-Success-and-Technological-Uncertainty.pdf;Accessed on
12thAugust,2019.

Tushman, Michael & Katz, Ralph (1980, pp.1071-1085) “External Communication and
Project Performance: An Investigation into the Role of Gatekeepers.” Management Science,
Vol 26, No 11.
Thompson, A. A., Peteraf, M. A., Gamble, J. E., & Strickland, A. J. (2012) “Crafting and
executing strategy” The quest for competitive advantage. New York: McGraw-Hill/Irwin.
Hickey, A.M. and A.M. Davis, (2003)” Requirements elicitation and elicitation technique
selection: model for two knowledge-intensive software development processes. in System
Sciences “Proceedings of the 36th Annual Hawaii International Conference on. 2003: IEEE.
Available {Online}; DOI: 10.3923/std.2018.149.157, Accessed on 12th July, 2019.

Sadler K., Robertson T. & Kan M. (2005)” Use Scenarios: A Useful Design Tool For
mBusiness” Available {Online}
.https://www.researchgate.net/publication/4167674_Use_scenarios_A_useful_design_tool_fo
r_mBusiness;Accessed on 23rd July , 2019.
Shankar, Venkatesh and Jeffery Meyer (2009), “Internet and International Marketing,” in
Handbook of International Marketing, Michael Kotabe and Kristiaan Helsen, eds., Sage
Publications Ltd.
Smilansky, O. (2015, pp.28-31), “Third-Party Power: The Rise of the B2B App Store”, CRM
Magazine, Vol.19(11).

Shapiro, M. J. (2011, pp.31-36) “Update: Apps for meetings”, Meetings & Conventions,
46(8).

Nahar, N. and P. Student, (2013, pp.27-33) “Managing requirement elicitation issues using
step-wise refinement model “Int. J. Adv. Stud. Computer. Sci. Eng., 2(5).

Page 30 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM
Walter, E., &Greene, GaryD., &Larry J. (1994, PP.5-13)” Internal Marketing the key to
external marketing success”, Journal od Services Marketing,8(4) Available
{Online}http://dx.doi.org/10.1108/08876049410070682,accessed:02 February, 2019.
Widya, I.A., R.G.A. Bults, M.H.A. Huis in 't Veld and M.M.R. Vollenbroek-Hutten, (2009,
pp406-413)” Scenario based requirements elicitation in a pain tele treatment application “
W.J. Fabrycky, B.S. Blanchard (1991) “Life Cycle Cost and Economic Analysis”, Prentice
Hall,Englewood Cliffs, NJ.

B. Shishkov, J. Cordeiro and A. Ranchordas (Eds.) (2009) “Proceedings of the ICSOFT”, 4th
Int. Conf. Software and Data Technologies, ICSOFT, Portugal: INSTICC.
Zowghi, D. and C. Coulin, (2005, pp.19-46) “Requirements elicitation: A survey of
techniques, approaches, and tools “In: A. Aurum and C. Wohlin (eds), Engineering and
Managing Software Requirements. Springer, Berlin, Heidelberg.
Matters, M. and Evans, A. (1997), “The nuts and bolts of benchmarking”, Available
{Online} http:// www. ozemail.com.au/~benchmark/nuts.bolts.html, Accessed on 24th July,19
Zave, P., Jackson, M. (1997, pp.1-30) “Four dark corners of requirements engineering”
ACM Transactions on Software Engineering and Methodology, 6 (1).

Zave, P., Jackson, M. (1997, pp.1-30) “Four dark corners of requirements engineering”
ACM Transactions on Software Engineering and Methodology, 6 (1).

Jackson, M. (1995, pp.24-28) “The World and the Machine”, Proceedings of the Seventeenth
IEEE International Conference on Software Engineering, pp. 283-292, Seattle, WA.

Zwikael, O., & Globerson, S. (2004, pp.1545-1556)” Evaluating the quality of project
planning: A model and field results” International Journal of Production Research ,42(8).

Page 31 of 32
STUDENT ID: 74104298 (R 1709 D 3465127)
KALUBA ABRAHAM

Chapter 7. Appendices

7.1 A3 Map

Client Requirements / Objectives Ghantt Chart


To undertake a scoping study for Company X an SME providing food products to the catering trade willing to create
an app for its customers to use.

The study shall strengthen the project's potential to:

To ensure visibility to customers at all times


To create Direct Marketing Channel with customers
To provide value to customers
To build brand and recognition
To improve customer engargement
To cultivate customer loyalty(retention)
To gain competitive advantage

Deliverables

1 To understand the market trends , needs and its capabilities, stakeholder expecations ,security risks and competion
by looking at :-

Market Analysis Tools


Stakeholder analysis/mapping
Software evaluation(Industrial analysis)
Risk Analysis

2
To determine how mobile App.may enable the business competitive advantage by looking at : -

System based environmental Analysis


Personnel Analysis( Personal Skills )
Risk Identification & Analysis

3
To determine the business economic impact of the proposed mobile App.development by looking at :-
The Life Cycle Cost Analysis
Project Time Planning Contributions

1. Stakeholders contribution - Allowed clear understanding relevant and needed


stakeholder to avoid wastage ,abandonment & failure
Supporting Evidence
Objective based
Supporting Theory 2 Software Benchmarkin- Contribution allowed Client understanding of where they
are and whey the need to be -Eg. General Motors USA & Toyota
Is used to assess the market trend, needs,market size,market growth ,target market and
1 Market Analysis competition in order to make an informed decision as these are fumdamental elements to the
success of B2B application , Sadler et al (2005 ) 3 System Environment Analysis - Contribution - Enabled undetstanding of Skills
2 Stakeholder C.Pacheco & E.Tavor(2007)- Allows ealier identification and involvement of key stakeholders available in the environment both to operate & use. Security & maintaince
Analysis/Mapping and theirs interests which averts the risk of projects failure.
3 Pestel Model The model provides the trend of the industry,the factors which are uncontrollable and can 4 Personnel Analysis contribution- Enabled clear understaing that the project was
either be opportunities or threats,Bryars,(1991), Human Intensive & that both success & filure depended on them
4 Gap Analysis This model answeres the quesition of whether the right products or services are offered to
customers . This idea links up with the portifolio analysis, ABE (2008,P.89), 5
5 Cost Benefit Analysis This evaluates the overall impact of the project,it compares the total costs of the project with
its benefits,Depuit(1844)

Industry Information

1 For MCOMMERCE App Users:Its All about time & money https://www.emarketer.com/public_media/docs/eM
arketer_Mobile_Commerce_Roundup_2017.pdf

2 Digital Ad spending,Benchmarks by Industry 2018 https://www.emarketer.com/content/digital-ad-


spending-benchmarks-by-industry-2018

3 The size of the Ad Fraud problem in Digital Marketing is Varying https://www.emarketer.com/content/the-size-of-the-


ad-fraud-problem-in-digital-marketing-is-varying

Page 32 of 32

You might also like