Management Project – Airline Start Up 1

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

This is an addendum to the previous upload

University of South Wales
Spring Term 2016
Module: Dissertation Project (Client Project 5)
Tutor: Dr. Paul Davies

Requirements Elicitation for
Mobile B2B Applications

A project-based consulting approach

Management Summary

Mobile B2B applications are an emerging issue when it comes to the adoption of new technologies in business, providing innovative opportunities for multiple operations between customers and companies. For organisations that have decided to implement such an application within the scope of a project, the requirements elicitation process depicts an important step in order to determine necessities and to build a basis for subsequent strategic decisions. This paper depicts an offer for a B2B food sector company with the intention of identifying the requirements for such a project. The introduced approach utilises approved methods and techniques from the fields of project and software management.

The offer covers an examination of three relevant categories of requirements. In order to determine the functional requirements (functionalities the B2B application has to exhibit), the methods stakeholder analysis and software benchmarking are introduced. For the structural requirements (possibility and appropriateness to implement the application within the company’s structural circumstances), system environment analysis, personnel analysis as well as risk identification and analysis cover a basis for future decisions. Finally, project time planning and life-cycle cost analysis investigate the resources requirements the company will have to face. The study will be conducted within a timeframe of 6 months (26 weeks) which is illustrated by a Gantt-chart. Overall, the holistic character of the approach, the acknowledged benefits of the individual methods as well as the recommendations which can be derived on the basis of the defined objectives will make the study of high value to the client and provide adequate information for further actions regarding the application’s programming and implementation process.

Table of Contents
1. Introduction – Background and Objectives 1
2. Supporting Evidence – The Requirements Elicitation Approach 2
2.1 Objective 1 – Functional Requirements 3
2.1.1 Stakeholder Analysis 3
2.1.2 Software Benchmarking 3
2.2 Objective 2 – Structural Requirements 4
2.2.1 System Environment Analysis 4
2.2.2 Personnel Analysis 5
2.2.3 Risk Identification and Analysis 6
2.3 Objective 3 – Resources Requirements 6
2.3.1 Project Time Planning 6
2.3.2 Life-Cycle Cost Analysis 7
3. Study Gantt-Chart 8
4. Contribution 10
4.1 Stakeholder Analysis 10
4.2 Software Benchmarking 10
4.3 System Environment Analysis 11
4.4 Personnel Analysis 11
4.5 Risk Identification and Analysis 12
4.6 Project Time Planning 12
4.7 Life-Cycle Cost Analysis 13
5. Concluding Remarks 13

I. References 14

1. Introduction – Background and Objectives

New communication technologies always bring along new chances and ways of conducting daily business operations. In this context, the utilisation of the internet to collaborate with trading partners depicts a notable advance within the last two decades. These direct electronical collaborations are commonly labelled as business-to-business (B2B) applications, which for example target “e-procurement, supply-chain management (SCM), and B2B e-payment” (Al-Naeem et al., 2005, p. 41). Due to the rise of mobile devices like smartphones or tablets and the concomitant increased usage of professionals’ mobile devices during work, especially mobile B2B applications have been evolving as an important tool for customer relationship management (Smilansky, 2015). Nowadays, people already spend more time using mobile applications than internet via traditional desktop computers (Zamfiroiu, 2015). Well-known software manufacturers already detected this development, offering mobile B2B applications for multiple business purposes (Tornack et al., 2011).

The client, an SME providing food products to catering companies, is aware of this progress and intends to program and implement a mobile B2B application for his customers. However, due to the high complexity of such IT projects, only an extensive exposure of the requirements can prevent the project from certain failure (Azadegan et al., 2013). Based on the results of more than hundred research and development projects, Dvir et al. (2003) point out that project success is strongly correlated with the definition of those requirements. In order to determine relevant requirements of this project, a study shall provide valuable information about different project necessities. Regarding software development, this process is commonly labelled as ‘requirements engineering’ respectively ‘requirements elicitation’ which describes “seeking, uncovering, acquiring and elaborating requirements for computer based systems” (Zowghi and Coulin, 2005, p. 19). Although requirements elicitation is mostly perceived as the first major step of a software engineering project, the shape of its process and used methods varies, depending on the particular project (Vijayan and Raju, 2011). Hence, this report can be understood as a consulting offer to conduct a requirements elicitation study, outlining all pertinent methods which are of importance for the individual case of the client.

It is of fundamental importance that the study as well as the development of the mobile B2B application for the client itself can be seen as projects. Projects are unique sets of temporary activities with a definable goal, which cut across functional lines and imply risks as well as costs for an organisation (Nicholas and Steyn, 2012). That is why project management methods as well as experiences from software project management case studies will take a key role in the presented requirements elicitation approach. The study covers the following objectives and related methods in order to reveal the client’s requirements for the project of developing and implementing a mobile B2B application, whereas objectives and methods build on one another:


Objective 1: Identifying the functional requirements of mobile B2B applications within the food market for catering companies

· Stakeholder Analysis

· Software Benchmarking

Objective 2: Identifying the structural requirements to program and implement the application within the current company structure and capabilities

· System Environment Analysis

· Personnel Analysis

· Risk Identification and Analysis

Objective 3: Identifying the resources requirements the client has to raise for programming, implementing and operating the mobile B2B application

· Project Time Planning

· Life-Cycle Cost Analysis

At first, the offer will illustrate the intended relevant methods which are required in order to reveal the particular requirements of the three objectives. Here, the methods are described shortly, while evidences from project management background exemplify the adequacy of the methods. Based on the introduced methods and their approximate time need, the offer will illustrate the intended approach with the aid of a Gantt chart, providing an overview with start and end times for the individual project steps and methods. Subsequently, the contribution of the particular methods and the project as a whole will elucidate why the illustrated approach is the most useful one for the company’s objectives, supported by several industry cases. Finally, the concluding remarks will summarise the main details of the offer in order to provide final decision guidance towards this offer.


2. Supporting Evidence – The Requirements Elicitation Approach

The general aim of the study is to provide a holistic research approach for the client, which covers all relevant kinds of requirements in order to assess the necessities of programming and implementing the mobile B2B application. The following chapter illustrates the background as well as the individual processes of the particular methods.

It has to be considered that the information gathering process of all the intended methods requires an open communicative exchange with the client. Changing client requirements or circumstances can occur during the whole requirements elicitation process and should be incorporated as soon as the changes are identified. Therefore, a continuous two-way communication process with the client in the form of a permanent contact person secures adequacy of the study (Nakatani et al., 2014). This is supported by Houdek and Pohl (2000) who examine the requirements elicitation process of Daimler-Chrysler projects and emphasise that over 50% of the requirements changes happen after the actual identification process.


2.1 Objective 1 – Functional Requirements

As already indicated, B2B applications are able to cover several functionalities, from being just a marketing tool to comprising a whole e-procurement system including embedded sales and payment possibilities (Al-Naeem et al., 2005). In order to provide a basis for the further requirements analyses, the examination of the functional requirements focuses on the questions, how the application has to look like to please the stakeholders and in which functional direction (e.g. sales, marketing, supply-chain management, e-payment, etc.) the application has to go. Overall, the client receives knowledge about what the market and its key players require of the B2B application.


2.1.1 Stakeholder Analysis

Stakeholder analysis as a project management technique is widely acknowledged among management practitioners and researchers as a part of the requirements elicitation process, providing a broad layer of necessary information (Glinz and Wieringa, 2007; Newcombe, 2003). Stakeholders of software are persons, organisations or other groups who affect or are affected by the software (Power, 2010). The technique tackles the questions of who the relevant project stakeholders are, how their wants and needs look like as well as how important they are in comparison to other stakeholders. It should be considered that each project has its own stakeholders which may partly not be that obvious as it would appear (Lock, 2013). All of these stakeholders have expectations for the intended software, with the wants and the needs often being in conflict with each other (Newcombe, 2003).

The stakeholder identification process for the client happens on the basis of a brainstorming meeting, as suggested by Calvert (1995). Here, also the client participates due to his superior knowledge of the internal proceedings and affected groups (Pouloudi and Whitley, 1997). The identification particularly focuses on what Sharp et al. (1999, p. 389) call ‘Baseline Stakeholders’, which represent internal and external “users, developers, legislators and decision-makers” with respect to the complete predicted software lifecycle. After the identification of the relevant stakeholders, direct stakeholder communication is necessary in order to determine their needs and requirements. This can happen through structured meetings or personal conversations. This step ensures an understanding and involvement of the relevant stakeholders from the beginning of the project (Passenheim, 2009). Also, the prioritisation of stakeholders and their individual requirements are elementary steps towards stakeholder comprehension since stakeholders are not equally important for the mobile application. Overall, this prioritisation has to consider the strategic adjustment of the company (Glinz and Wieringa, 2007). On the basis of these results, a final stakeholder matrix with objectives, priorities and contributions is produced (Lock, 2013). Difficulties during the stakeholder analysis may especially emerge in the case of hard accessibility of stakeholders as well as if there is an individual stakeholder with diverging inner objectives (e.g. in the case of a heterogeneous organisation) (Jepsen and Eskerod, 2009).


2.1.2 Software Benchmarking

On the basis of the stakeholder analysis, the subsequent software benchmarking examines if there are already existing best practice examples in the market which coincide with the results of the stakeholder analysis’ objectives. Here, the analysis especially focuses on those functional requirements, which were identified by those stakeholders with the highest prioritisation. Benchmarking describes the practice of comparing the own organisational operations with equivalent processes of industries’ market leaders. Doing so, it is possible to gather information and achieve an improvement of the own business operations by applying this information (Watson, 1993). In this sense, software benchmarking can be understood as a certain kind of focused competitive analysis which, however, also includes software companies as well as best practice examples of comparable markets. With this form of an external benchmarking analysis, it is possible to set the functional requirements of the client on a level which enables him to compete with his competitors on a qualitative and technological high level (Hines, 1998).


Since benchmarking subjects (competitors and software companies) are already set, the first step of the software benchmarking process is the collection of data (Kodali, 2008). The data collection process for software benchmarking as such is a qualitative one (Jones, 1995). The information is derived on the basis of general market reports from acknowledged data bases such as Key Note, Mintel and MarketLine as well as providers of special benchmarking reports such as Best Practices, LLC. Furthermore, the online visibilities of software manufacturers such as SAP, Oracle and Microsoft offer further information about their mobile solutions for several industry segments including the food industry. Based on the gathered data, an analysis and evaluation of the benchmarks is performed subsequently. This analysis will compare the identified stakeholder objectives with the elaborated benchmarks in order to set the final functional requirements which the mobile B2B application has to fulfil in order to achieve a possible competitive advantage within the industry (Kodali, 2008). However, it also has to be considered that benchmarking has its bottlenecks. In times of fast changing technology, it is not taken for granted that current software benchmarks remain the same benchmarks in the future. Hence, long-term developments have to be considered (Kumar and Harms, 2004).



2.2 Objective 2 – Structural Requirements

After the prior techniques exposed the functional requirements of the B2B application, the subsequent methods will focus on the question, if the client fulfils the structural requirements to program and implement an application with such functions within the current organisational environment. Especially IT, personnel as well as risk capacities play a pivotal role due to their influence on the matter whether the client is able to solve respectively control deviations and occurring risks or whether external service providers could be an alternative.


2.2.1 System Environment Analysis

The system environment analysis provides the basis for the structural requirements analysis. Before, the stakeholder matrix with its objectives and prioritisation as well as the results of the software benchmarking analysis revealed the functional requirements of the mobile B2B application (Nicholas and Steyn, 2012). Subsequently, the system environment analysis has to examine how “easy” it is to program and implement those functions within the client’s IT system environment. This process is highly relevant for the requirements elicitation process due to the necessity to embed the B2B application within the existing system environment (MacLean et al., 2004). An IT infrastructure consists of interacting subsystems which are part of the operative business (Singer et al., 2009). Embedding changes within such an IT environment which involves other entities creates constraints which are relevant due to the question whether the client is able handle these constraints (MacLean et al., 2004).

Hence, the analysis has to comprise the identification of existing systems, modules and interfaces (before) and of necessary systems, modules and interfaces (after) between the new mobile application and the existing system environment (Pries and Quigley, 2008). Furthermore, it has to reveal existing IT service, security and support processes which also have to be considered during the implementation of the B2B application. The foundation of the system environment analysis is an interview with the responsible IT leader or respectively the responsible application owner of the client, in order to get an overview of the related systems. For the case that the IT processes are administered by an external provider, it might be necessary to consult the provider as an additional information source. Also already existing system manuals can be drawn upon to collect information (Vijayan and Raju, 2011). On basis of the information gathering process, a before & after graphic of the IT environment is prepared. These graphics enable an understanding of which modules are affected by the new application and which additional interfaces respectively interface tools might be necessary to allow an automated data exchange and, hence, an operative usage of the application (Pries and Quigley, 2008). Analysing further needs which may be derived from the graphics will reveal possible necessary module adoptions. Depending on which systems are affected, it is also possible to detect which particular IT skills are needed in order to conduct these changes. This provides the basis for the subsequent personnel analysis.


2.2.2 Personnel Analysis

After coming to know which functions need to be programmed, implemented and embedded, and how those functions have to interact with the system environment, it is possible to investigate which personnel resources are necessary to implement it. In order to determine the client’s requirements, an important point is the question if the client is able to provide the necessary personnel resources. Only if the client can provide the required employees and their related skill sets which are needed for the development and implementation of a mobile B2B application, a self-initiated project is executable (Project Management Institute, 2013). Moreover, the personnel analysis has to illustrate, how the project organisation is embedded within the organisation and how the project team itself has to be structured (Passenheim, 2009).

Training time of developers and other staff in order to acquire necessary skills can be quite intricate, so a systematic personnel analysis which compares necessary tasks and roles with the human capital of the client reveals the exact personnel requirements for the project (Otero et al., 2009). In this sense, the personnel analysis depicts an actual state analysis, comparing ‘what we need’ with ‘what we have’. In this analysis, the project role planning depicts the first step. Taking the data of the functional requirements and the system environment analysis as a basis, necessary roles have to be defined and adjusted to the client’s project. The project roles also have to consider and be embedded within the organisational hierarchy, reflecting administrative as well as technical tasks (Jucan, 2013). The second major step is the actual state analysis which takes the information gathered by the project role planning, comparing it with the organisational capabilities. Here, sources are the organigram of the client, position descriptions as well as a possible personnel data base. If required, an interview with the CEO or HR principle could deliver further insights (Project Management Institute, 2013). Problems could occur if the staff and skill set of the company is given, but the staffing collides with other operational responsibilities of the client. Furthermore, it can be hard to assess the amount of required roles for a new project with a new combination of project teams (Barreto et al., 2008).


2.2.3 Risk Identification and Analysis

The last step of the structural requirements analysis is risk identification and analysis. Although project risk management approaches normally contain the steps risk identification, analysis, planning and control (Nicholas and Steyn, 2012), the objective of assessing the structural requirements of the client to realise the project just requires the execution of the first two points. There is a broad consensus that a conscientiously conducted risk management approach is one of the major steps in the preparation of each project (Passenheim, 2009). Each project contains risks which can be defined as unplanned deviations from initial objectives. Although absolute elimination of risks is not possible, the common aim is to identify and control them (Nicholas and Steyn, 2012). Project risks can be caused by multiple elements and can occur at each project stage (Lock, 2013). Furthermore, they can be either based on internal or on external factors (Maley, 2012).

The basis of the risk identification is a brainstorming meeting, which is supported by a checklist of possible project risks, as suggested by Maley (2012). The checklist is provided by Boehm (1991). Furthermore, experiences from prior client projects have an impact on the identification process (Lock, 2013). This process contains each risk that may somehow have negative consequences for the project outcome. Once identified, the risks have to be analysed in order to allow for conclusions if the client is able to handle them. The factors risk likelihood and risk impact play a pivotal role in assessing the project risks (Nicholas and Steyn, 2012). Here, the analysis provides an ordinal scale (high, medium, low) for the likelihood as well as a quantitative cost estimation for the risk impact (Maley, 2012; Passenheim, 2009). Based on this assessment, the risks can be ranked in a matrix. Due to the fact that the risk identification and analysis affect multiple requirements elicitation areas such as IT, personnel, time and costs risks, the risk identification and analysis are conducted as an overarching process (see Gantt chart). This approach enables a gapless identification, considering the possibility that other methods also reveal additional risks.


2.3 Objective 3 – Resources Requirements

After revealing the structural requirements for implementing a mobile B2B application, it is possible to conduct classical project management planning techniques in order to determine the required resources the client has to raise. The necessary resources probably constitute the most tangible kind of requirements, also because they are expressible in quantitative numbers. Overall, this analysis unveils, how long the software engineering and implementation process (including all necessary testing and coordination procedures) will take and which monetary resources will be necessary to conduct the project and handle follow-up costs.


2.3.1 Project Time Planning

Just like each project, the client’s mobile B2B software programming project consists of individual steps which have to be undertaken. In order to get an overview of the time the company has to spend for the project, project time planning is an important step to reveal temporal requirements. Especially for software engineering projects, time estimates depict a special challenge due to the high complexity and dependency on uncertain proceedings (Lock, 2013).

The two focus points of project time planning are the manufacturing of an activity-based network and on this basis, the drawing of a Gantt chart (Maley, 2012). The first step towards the network is to break down the project into activities in order to provide a foundation for estimation and scheduling activities. This step requires deeper knowledge in software programming and testing procedures, so that experiences from managers who were involved in software engineering projects as well as software engineering case studies support this step. Those sources, together with published estimation data, subsequently contribute to identify the approximate required time (Project Management Institute, 2013). Afterwards, the revealed activities have to be put into a logical sequence. Dependencies and individual task durations allow for drawing a network diagram, considering start times, end times and milestones (Passenheim, 2009). More detailed planning approaches would also consider costs and resource constraints for the individual steps, which for the scope of this study however is not relevant (Nicholas and Steyn, 2012). In the end, the network diagram results in a detailed Gantt chart, as introduced in chapter 3. Overall, the usage of project management software like MS Project is elementary for a project of such complexity and helps to avoid mistakes and secures reliability for the planning approach. Furthermore, it provides multiple options for the client regarding layout and reports of the time planning (Zhang and Bishop, 2013).


2.3.2 Life-Cycle Cost Analysis

The second part of the resources requirements depicts the life-cycle cost (LCC) analysis. This technique tackles the questions of how much the cumulative costs for the client will be. Software products have differing life cycle phases with connected costs. However, many occurring costs are not obvious without an appropriate analysis (Eckardt et al., 2014). To determine the financial requirements of the mobile B2B application, LCC analysis appears to be a sensible approach for the client since it not only contains relevant programming and implementation costs, but also follow-up costs such as necessary operating, maintenance, support and disposal costs, from the beginning to the end of the product (Nicholas and Steyn, 2012). This technique is also necessary since those costs are interrelated with each other: Cost savings in the development and testing phase could lead to increased maintenance costs in the operating phase (Passenheim, 2009).

LCC can already be defined in the pre-project planning phase, providing an early overview over a long time range (Lindholm and Suomala, 2005). The LCC analysis considers five different types of costs: direct, indirect, contingent, intangible as well as external costs (Norris, 2001). This can for example be material, labour or overhead costs (Passenheim, 2009). The data collection process for the LCC happens with help of a bottom-up approach, applying activity-based costing which subsequently are accumulated (Vlachý, 2014). The software life cycle is separated into various phases in order to distinguish the functional stages (Kapp and Girmscheid, 2005). The results of the project time planning and its identified tasks provide a first insight over necessary project steps. The process is supported by an open-source estimation software and the calculations are based on market-based prices for hourly wages and necessary software tools (Abran, 2015). Finally, the individual costs are accumulated, providing a statement about the costs for the whole product life-cycle. However, the danger of LCC is a possible unreliability of data. Costs can vary over time, so that the analysis cannot anticipate possible changes (Higham et al., 2015). Hence, the result has to be seen more as orientation and not as hard fact. In the case of a final project implementation, the cost estimation will become on the basis of performance experiences more detailed and exact, improving its reliability (Passenheim, 2009).


3. Study Gantt-Chart

As introduced, all techniques are connected by individual implementation steps and exhibit certain process durations. In order to provide an overview of the process of the consulting project for client, consultant and stakeholders, a Gantt chart is broadly identified as a useful tool (Locke, 2013; Nicholas and Steyn, 2012). The Gantt chart considers individual implementation durations of the single project steps as well as their dependencies. The dependencies are shown as “Finish-to-start” dependencies, which means that they illustrate which steps have to be completed before the dependent and following step can begin. On the other hand, the critical path exemplifies the order of those critical steps, which have to be completed to finish the whole project (Maley, 2012).

The entire study is scheduled for 6 months, which depicts 26 weeks, with a kick off meeting initiating the project. As already indicated, a continuous consultant-client communication ensures the adequacy of the study. However, this consistent possibility for consultation does not affect the meetings which are provided for the individual techniques. The kick-off meeting at the beginning of the study introduces the involved and responsible persons and presents relevant details regarding the particular project steps, as suggested by Passenheim (2009). While the first 22 weeks are part of the data gathering process, all information and notes will be shaped in week 23 till 25 in order to produce the study. Since risk identification and analysis are overlapping activities which include multiple factors, further adoptions may be made during the resource requirements analysis. In the last week, the client will receive the final report, including a presentation with recommendations towards further actions. Furthermore, an evaluation meeting will offer the possibility for both sides to provide improvement feedback for following consulting projects.

Figure 1 illustrates the Gantt chart, the sequence of the particular methods, their durations and dependencies. The task ID helps to orientate and to distribute the dependencies. While the task itself is conducted if the cells are filled, dashed cells symbolise that the individual tasks are ancillary processes at those points. Grey cells represent slack time, which enables the individual process to take longer, without increasing the critical path and the maximum duration of the project. However, due to the fact that the most processes build on one another, the Gantt chart does not provide much space for slack time. However, the project times were estimated permissively, so that there should not be any major delays:


Figure 1 – Study Project Gantt Chart (Own Figure)



4. Contribution

After receiving an overview of the techniques and procedure of the study, the following chapter will in detail deal with the question of how the individual techniques contribute to the identified objectives and the overall aim of exposing all requirements for programming and implementing a mobile B2B application. Evidences from industry and software case studies are combined with insights researchers gained while using or investigating the particular techniques.

Overall, the client will obtain all necessary information which helps him to determine a picture of the project’s requirements from this approach. Furthermore, the client receives a holistic and scientific approach, providing detailed insights about potentials and possibilities for future IT projects within the company. Consequently, the client will be able to make further relevant decisions regarding the project. If the revealed functional, structural and resources requirements do not fit to the capabilities of the client, outsourcing the project could be a possibility. However, if the study shows that undertaking the project is within the capabilities of the client, the study already provides the first step of the project planning and requirements elicitation phase, saving time and money for the client.


4.1 Stakeholder Analysis

Regarding the stakeholder analysis, Pacheco and Garcia (2012) point out that identification and understanding of stakeholders is critical for the requirements elicitation process and for the subsequent quality of the software. Only through the identification of all relevant stakeholders, software can fulfil sufficiently its value-based requirements (Babar et al., 2015). Applying a stakeholder analysis approach at a company which introduced an e-procurement system, Pan (2005) points out that understanding stakeholders and their objectives is crucial in order to avoid abandonment of information systems development projects. According to Kaur and Sengupta (2011), IT projects with a lack of user involvement can lead to a lack of commitment and a declining project support which is necessary for a successful project.

According to Vrhovec et al. (2015), stakeholder analysis before undertaking software projects is also strongly connected to the risk identification and analysis process due to the concomitant problems in the case of ignoring stakeholder needs. Based on a case study of an application development in the banking sector, they point out that especially the IT personnel’s understanding of the appropriate business process and the clear communication among stakeholders are of particular importance. Also Rost and Glass (2009) emphasise the impact of stakeholders on project risks, emphasising the need to analyse and assess them. Due to the coverage of all relevant market participants such as users, programmers and customers, a conscientious conducted stakeholder analysis in interaction with software benchmarking makes a market analysis redundant.


4.2 Software Benchmarking

The fact that several software manufacturers already offer mobile B2B applications for several industries and business segments, illustrates that a software benchmarking analysis strongly contributes to the objective of revealing which functionalities are required and appropriate for a certain industry (Tornack et al., 2011). Overall, examining and adapting software best practices can help companies to succeed in high competitive markets such as the B2B food market (Ojala and Tyrväinen, 2008).

Investigating its application in France, Maire et al. (2005) find that 50% of the examined companies use benchmarking regularly in order to find best practices with the aim of improving IT processes. Applying benchmarking theoretically and practically on the requirements elicitation process of a website development project, Pang et al. (2009) illustrate that benchmarking is a useful tool in order to assess IT-based requirements. In the context of project management, Loo (2003) successfully applies benchmarking for technical aspects, proving the suitability of benchmarking for complex projects. Especially regarding the objective of revealing the functional requirements of the client’s mobile B2B application, benchmarking is able to provide valuable industry insights of already existing and adopted software. This fills the gap between those functional requirements already detected in the stakeholder analysis, and the functional requirements which are necessary for a practical implementation.


4.3 System Environment Analysis

Regarding the application of the system environment analysis it has to be considered that this is not a classic technique used in software project management. However, considering the particular case of the client, the system environment analysis allows for conclusions about the subsequent personnel and risk analysis since a different IT environment requires a different need for staff and skill sets of the personnel and leads to different risks. Furthermore, practical implementations within several industry cases show its suitability regarding exposing structural IT requirements.

Charette (2005) summarises multiple failed software projects of small and large companies, with the result that IT problems as well as inadequate adaptions were responsible for a large part. Those problems can lead to foregone profits which can also be prevented by a focused analysis of the IT infrastructure of the client. Moreover, the system environment analysis allows further conclusions regarding the requirements of the IT security, service management and risk management which is supported by the case of a Greek software company undertaking implementation projects at clients (Maroukian, 2010). Also Byrd and Turner (2000) emphasise the IT infrastructure’s key role for the users (personnel) on the one hand and for further developments on the other hand in a broad-based study. This coincides with the introduced approach, which provides the system environment analysis to be a foundation of the subsequent personnel analysis.


4.4 Personnel Analysis

The personnel analysis is highly recommended since developing, implementing and maintaining software is a people intensive task, not only regarding developers, but also for project managers, testers, administrative or maintenance staff (Barreto et al., 2008). Hence, only a focused analysis can illustrate the personnel requirements, the client will have to face. Also Firesmith (2004) emphasises that a case-based requirements elicitation approach always has to consider the scope and, hence, the required staffing. This especially concerns the client, who exhibits as an SME much tighter personnel resources as for example a multinational company.

Furthermore, Park et al. (2015) emphasise that planning and allocation of human resources and especially of developers during software projects to certain tasks and responsibilities depicts a necessity in order to handle time issues and to estimate the workload per employee. Hence, possible bottlenecks can be revealed before they occur. For the client, the personnel analysis depicts an elementary step in order to decide whether outsourcing the project or hiring external freelancers may be a sensible possibility. In the case of minor expertise gaps respectively shortages, freelancers could fill these gaps (Wu and Zmud, 2010).


4.5 Risk Identification and Analysis

Especially for the client, who intends to enter an unknown area with a new product, risk identification and analysis appears particularly important due to the high risk susceptibility of IT projects (Lock, 2013). The risk identification and analysis is crucial in order to classify the elaborated requirements and to assess if the client is able to handle the risks alone. This is supported by multiple cases: Applying a holistic risk management framework for a software engineering project in the Barbados government sector, Dey et al. (2007) point out that risk identification and analysis at the beginning of a software project depicts a necessity for ensuring a clear risk understanding and comprehension of which actions may be required to control those risks. According to Baccarini et al. (2004), who undertook interviews with leading IT experts, IT projects provide a large range of possible risks, especially regarding personnel, scheduling and budget. The introduced methodology considers this fact with respect to the implementation of an overlapping risk approach. Moreover, several examples of failed IT projects can be associated with missing or insufficient risk management, such as in the cases of “American Airlines AMR Information Services (AMRIS)” or the “London Stock Exchange’s Transfer and Automated Registration of Uncertified Stock (TAURUS) system” (Baccarini et al., 2004, p. 286). Hence, it is of particular importance for the client to receive an overview of the risks and required countermeasures in order to assess the capabilities the firm has to raise to handle the risks.


4.6 Project Time Planning

In order to assess the resources requirements, project time planning plays a crucial role for companies due to multiple problems which occur with time: Bottlenecks and inaccurate time estimates can cause time pressure and even late delivery, which also negatively affects the project costs (Hazzan and Dubinsky, 2007). Providing several examples of failed IT projects, Charette (2005) illustrates the necessity of an appropriate project time planning technique for the appropriate estimation of temporal requirements. Although IT project estimation often is not an exact science, scheduling is a step towards less uncertainty.

Examining the adoption of time planning approaches for software projects, Verner et al. (2007) find out that unreasonable time planning goes along with inadequate requirements engineering, leading to rising time risks, while the failure of many projects can be derived by those events. Hence, a conscious analysis with reasonable time estimation can prevent the client from wrong time assessment, occurring risks and connected losses.


4.7 Life-Cycle Cost Analysis

Regarding the project requirements, costs often are a major reason for or against implementation (Passenheim, 2009). Applying LCC in an engineering project, Vlachý (2014) proves that LCC is a very comprehensive and detailed technique regarding assessing a company’s product costs till the end of the product life cycle, especially when the technique is already applied in the product conception phase. The assistance of LCC for the strategic decision-making depicts a major advantage of the technique (ibid.). This coincides with the advantages of the intended implementation: Through the presented approach it is possible to derive essential strategic conclusions for the later realisation of the project, especially regarding the question if the company is able to raise the required resources.

Investigating several industry cases about the adoption of LCC, Korpi and Ala-Risku (2008) point out that the technique is particularly popular due to its provided insights concerning long-term affordability which makes it superior in comparison to other cost estimation techniques. Also Chikofsky and Cross (1990) underline the fact that LCC reduces a lot of uncertainty for software projects by revealing hidden costs. This is of particular importance for SMEs which come not from an IT background due to possible lacks in estimating software costs.


5. Concluding Remarks

Overall, the offer provides a holistic approach to reliably reveal different kinds of project requirements which are of particular interest for the client. This holistic approach is based on acknowledged and approved methods, which offer detailed application instructions on the one hand, and hints regarding possible problems on the other hand. It has to be considered that the introduced approach is adapted to the individual case of the client and his specific requirements, so that the client receives a study which perfectly fits his needs. Especially the presented experiences of prior software engineering projects demonstrate the appropriateness and validity of the techniques to examine the introduced objectives and, hence, the client’s multiple requirements of daring the development of a mobile B2B application. For the case of changes or enhancements in the client’s requirements, the close communication process during the study ensures optimal customisation of the gathered information. Furthermore, the client is, with the help of the Gantt-chart, always able to identify at which point in the study he is located at the moment.

Due to the information the client receives from the study and the final presentation about the pivotal results, he will be able to make the important decision whether it is more sensible to buy the mobile application or to build and implement it in-house (“build or buy”) (Cortellessa et al., 2008). This decision can be derived by the results of all conducted analyses, which reveal if the client has the required knowledge, structure and resources to build the application on his own while being able to handle the risks. In order to provide a guideline for this decision, the provided study concludes with valuable recommendations for further actions.


I. References

Abran, A. (2015), Software project estimation: the fundamentals for providng high quality information to decision makers. Hoboken, New Jersey: Wiley.

Al-Naeem, T., Rabhi, F.A., Benatallah, B. and Ray, P.K. (2005), “Systematic Approaches for Designing B2B Applications”, International Journal of Electronic Commerce, Vol.9(2), pp. 41-70.

Azadegan, A., Cheng, X., Yin, G. and Niederman, F. (2013), “Collaborative Requirements Elicitation in Facilitated Collaboration: Report from a Case Study”, 46th Hawaii International Conference on System Sciences, pp. 569-578.

Babar M.I., Ghazali M., Jawawi D.N.A. and Zaheer, K.B. (2015), “StakeMeter: Value-Based Stakeholder Identification and Quantification Framework for Value-Based Software Systems”, PLoS ONE, Vol.10(3), pp. 1-33.

Baccarini, D., Salm, G. and Love, P.E.D. (2004), “Management of risks in information technology projects”, Industrial Management & Data Systems, Vol.104(4), pp. 286-295.

Barreto, A., Barros, M. and Werner, C.M.L. (2008), “Staffing a software project: A constraint satisfaction and optimization-based approach”, Computers & Operations Research, Vol.35, pp. 3073-3089.

Boehm, B.W. (1991), “Software Risk Management: Principles and Practices”, IEEE Software, Vol.8(1), pp. 426-435.

Byrd, T.A. and Turner, D.E. (2000), “Measuring the Flexibility of Information Technology Infrastructure: Exploratory Analysis of a Construct”, Journal of Management Information Systems, Vol.17(1), pp. 167-208.

Calvert S. (1995), “Managing stakeholders”, in: Turner, J.R. (ed.), The commercial project manager. Maidenhead: McGraw-Hill, pp. 214-222.

Charette, R.N. (2005), “Why Software Fails”, IEEE Spectrum [Online].

URL: http://spectrum.ieee.org/computing/software/why-software-fails

(Accessed: 13.04.2016).

Chikofsky, E.J. and Cross, J.H. (1990), “Reverse Engineering and Design Recovery: A Taxonomy”, IEEE Software, Vol.7(1), pp. 13-17.

Cortellessa, V., Marinellia, F. and Potena, P. (2008), “An optimization framework for “build-or-buy” decisions in software architecture”, Computers & Operations Research, Vol.35, pp. 3090-3106.

Dey, P.K., Kinch, J. and Ogunlana, S.O. (2007), “Managing risk in software development projects: a case study”, Industrial Management & Data Systems, Vol.107(2), pp. 284-303.

Dvir, D., Raz, T. and Shenhar, A.J. (2003), “An empirical analysis of the relationship between project planning and project success”, International Journal of Project Management, Vol.21, pp. 89-95.

Eckardt, J.R., Davis, T.L., Stern, R.A., Wong, C.S., Marymee, R.K. and Bedjanian, A.L. (2014), “The Path to Software Cost Control”, Defense AT&L, November–December 2014, pp. 23-27.

Firesmith, D.G. (2004), “Creating a Project-Specific Requirements Engineering Process”, Journal of Object Technology, Vol.3(5), pp. 31-44.

Glinz, M. and Wieringa, R.J. (2007), “Stakeholders in Requirements Engineering”, IEEE Software, Vol.28, pp. 18-20.

Hazzan, O. and Dubinsky, Y. (2007), “The Software Engineering Timeline: A Time Management Perspective”, IEEE International Conference on Software – Science, Technology and Engineering, pp. 95-103.

Higham, A., Fortune, C. and James, H. (2015), “Life cycle costing: evaluating its use in UK practice”, Structural Survey, Vol.33(1), pp. 73-87.

Hines, P. (1998), “Benchmarking Toyota’s supply chain: Japan vs UK”, Long Range Planning, Vol. 31(6), pp. 911-918.

Houdek, F. and Pohl, K. (2000), “Analyzing requirements engineering processes: A case study”, Proc. of the 11th International Workshop on Database and Expert Systems Applications (DEXA’00), pp. 983-987.

Jepsen, A.L. and Eskerod, P. (2009), “Stakeholder analysis in projects: Challenges in using current guidelines in the real world”, International Journal of Project Management, Vol.27, pp. 335-343.

Jones, C. (1995), “Software Benchmarking”, Computer, Vol.28(10), pp. 102-103.

Jucan, G. (2013), “People in Senior Project Roles”, in: Lock, D. and Scott, L. (eds.), The Gower Handbook of People in Project Management. Farnham: Gower.

Kapp, M.J. and Girmscheid, G. (2005), “Risk based life cycle cost analysis model for comparable life cycle project delivery decision taking”, in: Collaboration and Harmonization in Creative Systems. London: Taylor & Francis, pp. 895-901.

Kaur, R. and Sengupta, J. (2011), “Software Process Models and Analysis on Failure of Software Development Projects”, International Journal of Scientific & Engineering Research, Vol.2(2), pp. 1-4.

Kodali, G.A.R. (2008), “Benchmarking the benchmarking models”, Benchmarking: An International Journal, Vol.15(3), pp. 257-291.

Korpi, E. and Ala-Risku, T. (2008), “Life cycle costing: a review of published case studies”, Managerial Auditing Journal, Vol.23(3), pp. 240-261.

Kumar, S. and Harms, R. (2004), “Improving business processes for increased operational efficiency: a case study”, Journal of Manufacturing Technology Management, Vol.15(7), pp. 662-674.

Lindholm, A. and Suomala, P. (2005), “Learning by costing: sharpening cost image through life cycle costing?”, 7th Manufacturing Accounting Research Conference, Tampere, Finland, 30.May – 1.June.

Lock, D. (2013), Project Management. 10th ed., Farnham: Gower Publishing Ltd.

Loo, R. (2003), “A multi-level causal model for best practices in project management”, Benchmarking: An International Journal, Vol.10(1), pp. 29-36.

MacLean, R., Stepney, S., Smith, S., Tordoff, N., Gradwell, D., Hoverd, T. and Katz, S. (2004), Analysing Systems: determining requirements for object oriented development. Hemel Hempstead: Prentice Hall International.

Maire, J.-L., Bronet, V. and France, A. (2005), “A typology of best practices for a benchmarking process”, Benchmarking: An International Journal, Vol.12(1), pp. 45-60.

Maley, C.H. (2012), Project management concepts, methods, and techniques. Boca Raton, Fla.: CRC Press.

Maroukian, K. (2010), “IT Project Environment Factors Affecting Requirements Analysis in Service Provisioning for the Greek Banking Sector”, Journal of Software Engineering & Applications, Vol.3, pp. 858-868.

Nakatani, T., Hori, S., Katamine, K., Tsuda, M. and Tsumaki, T. (2014), “Estimation of the Maturation Type of Requirements from Their Accessibility and Stability”, IEICE Transactions on Information and Systems, Vol.97(5), pp. 1039-1048.

Newcombe, R. (2003), “From Client to Project Stakeholders: A Stakeholder Mapping Approach”, Construction Management and Economics, Vol.21, pp. 841-848.

Nicholas, J.M. and Steyn H. (2012), Project management for engineering, business and technology. 4th ed., London: Routledge.

Norris, G.A. (2001), “Integrating life cycle cost analysis and LCA”, The International Journal of Life Cycle Assessment, Vol.6(2), pp. 118-120.

Ojala, A. and Tyrväinen, P. (2008), “Best practices in the Japanese software market”, Global Business & Organizational Excellence, Vol.27(2), pp. 52-64.

Otero, L.D., Centeno, G., Ruiz-Torres, A.J. and Otero, C.E. (2009), “A systematic approach for resource allocation in software projects”, Computers & Industrial Engineering, Vol.56, pp. 1333-1339.

Pacheco, C. and Garcia, I. (2012), “A systematic literature review of stakeholder identification methods in requirements elicitation”, The Journal of Systems and Software, Vol.85, pp. 2171-2181.

Pan, G.S.C. (2005), “Information systems project abandonment: a stakeholder analysis”, International Journal of Information Management, Vol.25, pp. 173-184.

Pang, M.-S., Suh, W., Kim, J. and Lee, H. (2009), “A Benchmarking-Based Requirement Analysis Methodology for Improving Web Sites”, International Journal of Electronic Commerce, Vol.13(3), pp. 119-162.

Park, J., Seo, D., Hong, G., Shin, D., Hwa, J. and Bae, D.-H. (2015), “Human Resource Allocation in Software Project with Practical Considerations”, International Journal of Software Engineering and Knowledge Engineering, Vol.25(1), pp. 5-26.

Passenheim, O. (2009), Project Management. Copenhagen: Bookboon.

Pouloudi, A. and Whitley, E.A. (1997), “Stakeholder identification in inter-organizational systems: gaining insights for drug use”, European Journal of Information Systems, Vol.6(1), pp. 1-14.

Power, K. (2010), “Stakeholder Identification in Agile Software Product Development Organizations”, Agile Conference, August 2010, pp. 87-94.

Pries, K.M. and Quigley, J.M. (2008), Project Management of Complex and Embedded Systems Ensuring Product Integrity and Program Quality. Hoboken: Taylor and Francis.

Project Management Institute (2013), “A Guide to the Project Management Body of Knowledge (PMBOK Guide)”, Newtown Square, Pa.: Project Management Institute.

Rost, J. and Glass, R.L. (2009), “The Impact of Subversive Stakeholders on Software Projects”, Communications of the ACM, Vol.52(7), pp. 135-138.

Sharp, H., Finkelstein, A. and Galal, G. (1999), “Stakeholder identification in the requirements engineering process”, Proceedings of 10th International Workshop on Database & Expert Systems Applications (DEXA), pp. 387-391.

Singer, L., Brill, O., Meyer, S. and Schneider, K. (2009), “Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation”, Second International Workshop on Managing Requirements Knowledge (MaRK’09).

Smilansky, O. (2015), “Third-Party Power: The Rise of the B2B App Store”, CRM Magazine, Vol.19(11), pp. 28-31.

Tornack, C., Christmann, S. and Hagenhoff, S. (2011), “Tendenzielle Unterschiede zwischen B2B und B2C-Anwendungen für mobile Endgeräte”, University of Goettingen, Chair of Application Systems and E-Business, Working Paper No. 3/2011.

Verner, J.M., Evanco, W.M. and Cerpa, N. (2007), “State of the practice: An exploratory analysis of schedule estimation and software project success prediction”, Information and Software Technology, Vol.49, pp. 181-193.

Vijayan, J. and Raju, G. (2011), “A New approach to Requirements Elicitation Using Paper Prototype”, International Journal of Advanced Science and Technology, Vol. 28, pp. 9-16.

Vlachý, J. (2014), “Using Life Cycle Costing for Product Management”, Management, Vol.19(2), pp. 205-218.

Vrhovec S.L.R., Hovelja, T., Vavpotič, D. and Krisper, M. (2015), “Diagnosing organizational risks in software projects: Stakeholder resistance”, International Journal of Project Management, Vol. 33, pp. 1262-1273.

Watson, G.H. (1993), Strategic Benchmarking: How to Rate Your Company’s Performance Against the World’s Best. New York: Wiley.

Wu, W.W. and Zmud, R.W. (2010), “Facing the Challenges of Temporary External IS Project Personnel”, MIS Quarterly Executive, Vol.9(1), pp.13-21.

Zamfiroiu, A. (2015), “Factors Influencing the Quality of Mobile Applications”, Informatica Economică, Vol.18(1), pp. 131-138.

Zhang, Y. and Bishop, C. (2013), “Project-Management Tools for Libraries: A Planning and Implementation Model Using Microsoft Project 2000”, Information Technology and Libraries, Vol.24(3), pp. 147-152.

Zowghi D. and Coulin C. (2005), “Requirements Elicitation: A Survey of Techniques, Approaches, and Tools”, in: Engineering and Managing Software Requirements. Berlin: Springer, pp. 19-46.

Week 1Week 2Week 3Week 4Week 5Week 6Week 7Week 8Week 9

Week 10Week 11Week 12Week 13Week 14Week 15Week 16Week 17Week 18Week 19Week 20Week 21Week 22Week 23Week 24Week 25Week 26

Task ID

TasksDurationDependencies

AKick Off Meeting and Client Communication1 Week-

BObjective 1 – Functional Requirements7 Weeks

A

CStakeholder Mapping4 Weeks

A

D

Stakeholder Identification1 Week

A

E

Stakeholder Meetings/ Conversations1 Week

A,D

F Stakeholder Priorisation2 Weeks

A,D

G Stakeholder Matrix (incl. Prioritisation and Objectives)1 Week

A,D,E,F

HSoftware Benchmarking3 Weeks

C

I Data Collection Process1 Week

C

J Benchmark Analysis2 Weeks

C,I

KObjective 2 – Structural Requirements8 Weeks

B

LSystem Environment Analysis3 Weeks

B

M Interview with the IT Leader/ Application Owners1 Week

B

N Producing of IT Environment Graphics2 Weeks

B,M

O Need Analysis1 Week

B,M,N

PPersonnel Analysis3 Weeks

L

Q Project Role Planning (Which roles are necessary?)2 Weeks

L

R Actual State Analysis (Does the company has the staff?)1 Week

L,Q

SRisk Identification and Analysis8 Weeks

B

T Risk Identification4 Weeks

B

U Risk Evaluation3 Weeks

B,T

V Risk Ranking (Matrix)2 Weeks

B,T,U

WObjective 3 – Resources Requirements7 Weeks

K

XProject Time Planning3 Weeks

K

Y Project Break Down and Time Estimation2 Weeks

K

Z Draw Network Diagram1 Week

K,Y

AA Draw Gantt Chart1 Week

K,Y,Z

ABLife-Cycle Cost Analysis4 Weeks

X

AC Analysing Types of Costs and Necessary Activities2 Weeks

X

AD Data (Cost) Collection for Revealed Activities2 Weeks

X, AC

AE Cost Accumulation1 Week

X,AC,AD

AFProducing the Study3 Weeks

B,K,W

AGRecommendations2 Weeks

B,K,W

AHStudy Submission1 Week

B,K,W,AF,AG

AIPresentation of the Results1 Week

B,K,W,AF,AG

AJ

Evaluation Meeting1 Week

B,K,W,AF,AG

Key:

Slack Time

Ancillary Process

W

AF

Gantt Chart

Critical PathBK

Timeframe (6 months = 26 Weeks)

AJ

BS4D03 Management Project / Assessment Criteria

C
lie

n
t A

im
s &

O
b
je

c
tiv

e
s

Clear identification of the Client’s requirements setting out the objectives of the study

10%

S
u
p
p
o
rtin

g
E

v
id

e
n
c
e

Critical Identification and Evaluation of suitable industry studies and frameworks

applicable to the project

45%

A critical exploration of the relevant academic theory to support the subjects covered in the

project.

This is NOT a literature review; it should identify and explain the RELEVANT methods

that would be used to conduct the study

G
a
n
n
t C

h
a
rt &

M
e
th

o
d
s

Identification, explanation and critical evaluation of the range of activities needed to

complete the Client’s project.

25% Understanding and critical reflection in scheduling the activities e.g. timelines, dependent

activities, etc

C
o
n
trib

u
tio

n

A critical evaluation of the deliverable outcomes of the project. 20%

Clear meeting of the Client objectives set for the project

Remember, you are showing the Client WHY your approach is the most suitable to meet

their aims and thus win the bid

Total
(70% weighting of the overall students’ grade)

100%
R

e
fle

c
tiv

e
R

e
p

o
rt

Assumptions; 25

Ethics and Values; 25

Time management; 25

Learning from Experience and Moving Forward; 25

Total
(30% weighting of the overall students’ grade)

100

The Dissertation/Management
Project

© University of South Wales

Paula Stephens

Questions you may have:

• What do I need to do?

• What is a Client Project?

• Why am I acting as a Consultant?

© University of South Wales

What Have I Got to Produce?

• There is one piece of assessment for this module that is comprised by 2 parts; the

management project and the final reflection.

• It is a 12,000 word management report

• IT IS NOT a 20,000 academic research project (a traditional Dissertation)

• You are taking on the role of a consultant bidding for a project (for your company).
This will test important business skills

• The better the report bid…..the better the final

grade

© University of South Wales

Do I Need to Gather Primary Data?

NO

• You are bidding to win a Client Project (the client is

your company). You need to identify what would be

done in the future

• If you provide the data then you have worked for free.

• This is not a good way to survive in business and be able to eat!

– If you were to win the bid,

– then you would get the money,

– then you would do the work

© University of South Wales

You are showing the Client that you know the best

way to achieve the required aims of a specific

study !!!

© University of South Wales

What is the process of a Client

Project?

Client projects follow basic steps:

1. Client identifies a problem/issue to be addressed

2. Client provides a PROJECT BRIEF that generally describes the nature of the

problem/issue

3. Client asks interested companies/consultants to BID for the work

4. Consultants submit a report that clearly shows and explains how they

would do the study

5. The Client selects the bid that best fits their needs

6. The Client gives the successful Consultant the money to do the work

7. The Consultant does the tasks that were identified in the BID report

The client project will be identified by yourself – you are looking for a

project your company would benefit from.

You will not be expected to work out the costs of the project – we want you

to focus on the relevant methods to use

© University of South Wales

Why Am I a Consultant?

• One of the key skills for a manager is to be able to understand what is

required in a task and set out the best way to achieve it

• This is essentially about COMMUNICATION – a fundamental management skill

• Clients can exist within a company as well as outside e.g. departments

looking for projects to be completed; scarce resources to be bid for

• Bidding for a research project is a good way of developing a range of research

and communication skills

• You have to THINK AHEAD about what would need to be done

• The purpose of the report is to show the client What you would do and

Why you would use the methods identified

• If you can not show a ‘client’ what you would do for them you are not

communicating well…. you will lose the work or get sacked

© University of South Wales

Project Management Theory

• What is a Project?

– “A human activity that achieves a clear objective against a

timescale”

(Source: The Association of Project Managers)

– “A non-repetitive activity that is goal oriented, has a set of constraints, has a

measurable outcome and changes something”

(Source: Maylor, 1996)

© University of South Wales

The Deming Cycle

© University of South Wales

The Deming Cycle

• PLAN:

– Design or revise business process components to improve results

• DO:

– Implement the plan and measure its performance

• CHECK:

– Assess the measurements and report the results to

decision makers

• ACT:

– Decide on changes needed to improve the process

© University of South Wales

Characteristics of a Project

• All Projects have: –

• Stakeholders

• Uniqueness

• Objectives

• Resources

• Schedules

• Quality

• Uncertainty

• ‘Finiteness’

• Change

© University of South Wales

Types of Client Project

Even though a Client project is an individual study there are types of

project that are commonly asked for:

• An Evaluation study

– A Client needs part of the business or specific task reviewed to see if it has

achieved the targets set

• A Feasibility study

– A Client wants to do something new and needs a study to identify whether it is
possible and or desirable e.g. Launch a product into a new market

• A Scoping study

– The Client is interested to find out what factors may be

relevant in a different business activity

It is a good idea to work out if your Client project is one of these

© University of South Wales

Methods & Tools

Whatever the type of project you will need to identify relevant and

recognised Methods & Tools

The nature of the Client project will help to work out what methods are

relevant, e.g.

• An Evaluation study would normally require Cost/Benefit tools as part of the approach

• A Feasibility can often make use of a PESTLE to identify broader trends

relevant to the study

• A scoping study may be based on a particular industry so could use Porter’s Five
Forces and Market analysis models

• Stakeholder mapping is often a very good model to identify relevant individuals and

groups who should be involved in the study

It is important that the relevant subjects are identified for the particular study that you are

going to do as the Client briefs will be different

© University of South Wales

• What is A3 Reporting

• Key Elements of A3 Reporting

• (1) The Research or Project aim
• Background & Context

• (2) The Objectives

• Pragmatic problem solving
• Academic problem solving

• (3) Supporting Evidence

• What methods are relevant to the study?

• (4) Gantt Charting

• (5) Contribution

– The Value of your approach to the Client

• Tutorials 3 & 4

© University of South Wales

What is A3 Reporting?

• A structured problem-solving approach used by industry (e.g. Jaguar & Toyota,

EADS Cassidian et al) that aims to improve operational performance;

• Central to this is the training of people within a structured problem-solving

methodology that uses a tool called “The A3 Problem-Solving Report”.

• The methodology follows steps to proceed from – ‘problem identification’ to

‘resolution’ in a fashion that fosters learning, collaboration, and personal

development.

© University of South Wales

What is A3 Reporting?

• How?

– The problem-solver / project manager records the results of investigation and

planning in a concise ONE-page document (i.e. the A3 Report) that helps

facilitate knowledge sharing and collaboration;

– The term “A3” simply derives from the paper size used for the report;

– Industry actually uses several styles of A3 reports for solving problems,

for reporting project status and for proposing policy changes-each

having its own “storyline.”

• For the Business Project module we have focused on ONE simple

bespoke version of the A3 report;

– It is the most basic style, making it the best starting point and has been

adapted for you to -Plan, Do, Check & Act as you progress through your

projects – (“The PDCA Cycle”, Deming, 1986) .

© University of South Wales

The A3 Report
Student Name and Number – Report Title –

1 Research aim or Project aim

What is the background?
What is the reason/rationale/motivation for this project?

4 Methods

Explain the main steps of the study

Use a Gantt Chart to track and report your project milestones.

2 Objectives

What does this project intend to do – i.e. the deliverables?
What questions will it answer for the Client?
What problems will it solve for the Client?
You should be able to identify this in clear bullet points 5 Contribution

The Outcomes: –

Will the project achieve its aims – critical reflection of proposed
approach.
What are the advantages and potential weakness of the
proposed approach in terms of delivering the stated aim and
objectives.

3 Supporting Evidence

What are the main topics that underpin this project?

What literature has informed the research?

What Methods would be suggested to do this study?
What evidence is there from industry to support these
choices?

© University of South Wales

A3 Report – Why use it?

• Most problems that arise in organisations are addressed in superficial ways, what

some call “first-order problem- solving.”

– I.E. we work around the problem to accomplish our

immediate objective, but do not address the ‘root

causes’ of the problem so as to prevent its recurrence.

• By not addressing the ‘root cause’ we can encounter the same problem or similar

types of problem again and again and as a result, operational performance does not

improve.

© University of South Wales

A3 Report – Why use it?

• The A3 Process helps people engage in collaborative, in-depth problem-solving

methodology – it is rigorous and underpinned by management theory;

• It drives problem-solvers to address the ‘root causes’ of problems which

surface in day-to-day work routines;

• The A3 Process can be used for any situation and in any type of organisation;

• Our research and continuous interactions with industry informs us that

when used properly (i.e. the process is followed and

completed) – the chances of success improve dramatically.

© University of South Wales

A3 Report – Why use it?

• So, this is why we are offering A3 Reporting to help you manage your projects;

• Not only will A3 help you now, but also in the future, as embedded in the A3 process

are 7 key employability skills recognised by industry.

© University of South Wales

Employability Skills

• Self-management

• Team working

• Business and customer awareness

• Problem solving

• Communication and literacy

• Application of numeracy

• Application of information technology

© University of South Wales

Employability Skills

• Underpinning all these skills / attributes, the key foundation, must be a positive
attitude: a ‘can-do’ approach, a readiness to take part and contribute,
openness to new ideas and a drive to make these happen.

• Employers also value entrepreneurial graduates who demonstrate an innovative
approach, creative thinking, bring fresh knowledge and challenge
assumptions.

– http://highereducation.cbi.org.uk/uploaded/CBI_HE_taskf

orce_report.pdf

– www.cbi.org.uk/pdf/20110509-building-for-growth.pdf

© University of South Wales

(1) The Project aim

• What is the aim of the Client Project?

– What is the (strategic) reason/rationale/motivation for this project? i.e. what is the

range of problem(s) or issues involved?

– What impacts / implications would these problems

have if: –

• You attempt to address them in your project?

• If your project or the organisation does not address

these problems / issues

© University of South Wales

(2) The Objectives

• What does this research / project intend to do – i.e.

the deliverables?

• What questions will it answer for the Client?

• What problems will it solve for the Client?

• You should be able to identify this in clear bullet points

© University of South Wales

(3) Supporting Evidence

• What to research?

– You need to identify the methods that you would use to do

the study for the Client (if chosen)

• How do you do this?

– Understand the relevant topics for the Client problem

– This will help identify relevant models and tools that could be used to do the

study

• What do I use to help me?

– Academic Theory – most models come from work by academics to help

solve business problems

– Industry examples – what methods have already been

used in order to solve similar problems?

© University of South Wales

(4) Methods

What are you practically going to do for the Client?

• You need to be able to show the specific activities that would need to

be completed in order to the project to be done successfully.

• Each Method or Tool identified in Section 3 will need tasks to enable the data to be

gathered and analysed.

A way of making sense of these activities is through Gantt Charts

• Main advantage of Gantt charts – they are a useful communication tool & easy to

understand – “a picture paints a thousand words”;

• Provides a compact overview of responsibilities & progress on the project;

• Helps to calculate the start and finish times of each activity on the

Gantt chart.

© University of South Wales

(4) Methods – Gantt Charting

• What is a Gantt Chart?

– Henry Gantt a pioneer of scientific management – work

study

• Gantt Charts highlights the “critical path” in a project.

• Gantt charts are simple representation of a project from the view of the
TIME taken for each activity and the RESOURCES required at any
point in time;

• Used to monitor actual progress against a plan e.g. on a month-by-
month, week-by-week or day-by-day basis;

• Gantt charts can be produced separately for each

person or parts of projects to show their total workload;

• Arrows can be added to show the interrelationships and
interdependencies of different activities;

• Any slack or float time can be shown in each activity;

© University of South Wales

How to complete a Gantt Chart

• Starting at the end date of the research / project and work backwards to: –

– Identify all of the specific activities needed for the total project – i.e. compile
an ‘activity list’;

– Avoid general headings e.g. Data gathering, PESTLE analysis, etc

– What are the start and end dates of these activities?

– Understand each activities dependencies & interdependencies

– E.G. Some activities can only start when a previous activity has
completed – it is therefore dependant upon that earlier activity!

» These activities are likely to be on the projects “critical path” – i.e.
the longest duration through the project and MUST always be
completed on time;

– E.G. Some activities can take place simultaneously, i.e. at the same time
as other activities!

» These activities are likely to have “slack” or “float” times attached
to them and will not be activities on the projects critical path

– Identify these key milestones between the end date and today

– Map the activities onto your Gantt Chart

© University of South Wales

(5) Contribution
• What were the actual outcomes or Deliverables?

– Will Research project achieve its aims?

– What are the potential the unexpected benefits /

drawbacks?

– Did you set “SMART objectives” for the Research / Project?

– What was the innovation, impact, knowledge embedded

and contribution made by the research / project?

© University of South Wales

(5) Contribution

• Specific – precise outcomes

• Measureable – ways of measuring success

• Attainable – always achievable but innovative and challenging

• Realistic – achievable within defined constraints

• Time-bound – always a stated time for

achievement

© University of South Wales

Finally

• Remember all of this needs to be completed on ONE A3 page

report – please see examples provided by the Tutor in class.

– So:-

• More than one page will not be accepted!

• There maybe lots of data that underpins the A3 but: –

– We want to see it summarised on your A3 report!

– Can you focus and prioritise?

• A3 illustrates a Manager’s ability to “Manage by

exception!”

• Can you demonstrate this skill?

© University of South Wales

© University of South Wales

Thank you!

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper