Attention shaping and software risk - A categorical analysis of four classical risk management approaches

被引:184
作者
Lyytinen, K
Mathiassen, L
Ropponen, J
机构
[1] Univ Jyvaskyla, Dept Comp Sci & Informat Syst, Jyvaskyla 40350, Finland
[2] Aalborg Univ, Dept Comp Sci, DK-9220 Aalborg, Denmark
[3] Nokia Telecommun, Network Management Syst, Tampere 33101, Finland
关键词
software development; information system failure; risk management; risk management technique; socio-technical analysis; content analysis;
D O I
10.1287/isre.9.3.233
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper examines software risk management in a novel way, emphasizing the ways in which managers address software risks through sequential attention shaping and intervention. Software risks are interpreted as incongruent states within a socio-technical model of organizational change that includes task, structure, technology, and actors. Such incongruence can lead to failures in developing or implementing the system and thus to major losses. Based on this model we synthesize a set of software risk factors and risk resolution techniques, which cover the socio-technical components and their interactions. We use the model to analyze how four classical risk management approaches-McFarlan's portfolio approach, Davis' contingency approach, Boehm's software risk approach, and Alter's and Ginzberg's implementation approach-shape managerial attention. This analysis shows that the four approaches differ significantly in their view of the manager's role and possible actions. We advise managers to be aware of the limitations of each approach and to combine them to orchestrate comprehensive risk management practices in a context. Overall, the paper provides a new interpretation of software risk management which goes beyond a narrow system rationalism by suggesting a contingent, contextual, and multivariate view of software development.
引用
收藏
页码:233 / 255
页数:23
相关论文
共 116 条
[1]   RISK-MAKING MANAGEMENT [J].
ADLER, S .
BUSINESS HORIZONS, 1980, 23 (02) :11-14
[2]  
ALTER S, 1978, SLOAN MANAGE REV, V20, P23
[3]  
ANDERSEN NE, 1990, PROFESSIONAL SYSTEMS
[4]  
[Anonymous], 1989, Software Risk Management
[5]  
Arrow K.J., 1965, Aspects of the theory of risk-bearing
[6]  
Ashby W. R., 1956, INTRO CYBERNETICS
[7]  
Barki H., 1993, Journal of Management Information Systems, V10, P203
[8]  
Beath C.M., 1983, P 4 INT C INF SYST H, P133
[9]  
Beath C.M., 1987, P 8 INT C INF SYST P, P415
[10]   THE CONTRADICTORY STRUCTURE OF SYSTEMS-DEVELOPMENT METHODOLOGIES - DECONSTRUCTING THE IS-USER RELATIONSHIP IN INFORMATION ENGINEERING [J].
BEATH, CM ;
ORLIKOWSKI, WJ .
INFORMATION SYSTEMS RESEARCH, 1994, 5 (04) :350-377