Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published April 1, 2019 | Version EJITPMV1I1Bawaneh1
Journal article Open

Avoiding Risk in Information Technology Projects

  • 1. Eastern Mediterranean University

Description

This study will be highlighting the main external issues threatening the IT projects, which could be develop during the project life cycle to be real risk. The expected external risk will be clarify and consider the risk in each IT project phases.

The main parts of this article is to be guideline to avoid the external risk of adopting new technology, the first phase is focuses on the understanding of the risk system and concept by define what is risk behind adopting new technology, risk management process, response and analysis ended by reducing risk and increase the probability of IT project success. This part will discuss how to select selected the right IT technology and avoid the technology risk, as technology now is become part of our life not only on the IT environment, and it is the main player when it will come to the IT evolution, either it is new implementation, operation, replacement, upgrade, or any kind of projects.

Files

Files (115.1 kB)

Name Size Download all
md5:37b0dc044bc3ac0f708b34ec3a0d3fab
115.1 kB Download

Additional details

References

  • [1] Risk Management for IT Projects: How to Deal with Over 150 Issues and Risks By Bennet P. Lientz & Lee Larssen (A book review by R. Max Wideman) [2] Project Risk Management Processes, Techniques and Insights- Second Edition, Chris Chapman and Stephen Ward, School of Management, University of Southampton, UK, 2003 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, cs-books@wiley.co.uk. [3] Strengthening Enterprise Risk Management for Strategic Advantage, COSO—The Commi_ee of Sponsoring Organiza_ons of the Treadway Commission, college of management – enterprise risk management NC state university. [4] Implementation Process: Stages, Steps and Activities ECTA Center Work Team on Implementation Process Barbara Smith, Joicey Hurth, Lynda Pletcher, Evelyn Shaw, Kathy Whaley, Mary Peters and Glen Dunlap March 25, 2014 Chapel Hill, NC 27599 ectacenter@unc.edu. [5] Risks in Information Systems, Development Projects, Management Information Systems, Vol. 4 (2009), No. 1, pp. 24 April 2009, UDC 005.334:005.8 [6] Analysis of external and internal risks in project early phase by Alquier A.M. Cagno E. Caron F. Leopoulos V. Ridao M.A. [7] International Journal of Computer Applications (0975 – 8887) Volume 82 – No.9, November 2013 The Impact of Electronic Word of Mouth on Consumers' Purchasing Decisions, Amal M. Almana and Abdulrahman A. Mirza College of Computer and Information Sciences King Saud University, Riyadh, Saudi Arabia. [8] Andreasson, T.W., Streukens, S., (2009). Service innovation and electronic Word of Mouth: is it worth listening to? Managing Service Quality Vol19 iss. 3 pp 249-265 [9] Implementing a Risk Management Process for a Large Scale Information System Upgrade – A Case Study, Paul R. Garvey, The MITRE Corporation, pgarvey@mitre.org [10] Cakim, I.M. (2010). Implementing Word of Mouth marketing: online strategies to identify influencers, craft stories, and draw customers. New Yersey: John Wiley & Sons. [11] Top IT Project Risks and What to do about them, By Vicky Haney, VBH Consulting, www.vbhconsulting.com. [12] Office of Government Commerce (2005), Managing Successful Projects with PRINCE2, London: TSO. Latest edition Managing Successful Projects with PRINCE2: 2009.