258x Filetype PDF File size 2.05 MB Source: pdfs.semanticscholar.org
Proceedings of the 50th Hawaii International Conference on System Sciences | 2017
Risk –Informed Decision Making in Information System Implementation
Projects: Using Qualitative Assessment and Evaluation of Stakeholders’
Perceptions of Risk
Monica Schurr Manuel De Tuya Kathryn Noll
University at Albany University at Albany Rensselaer Polytechnic Institute
mlmeissner@albany.edu mdetuya@albany.edu tknoll12@gmail.com
Abstract decision making and risk response benefited a
manufacturing organization during and after the
The successful implementation of a new software implementation of a new department-wide software
system at any organization requires identification system. The purpose of the system was to move the
and management of risks as well as insight into the organization out of a paper-based manufacturing
decision-making process throughout the information process and into managing their production process
system lifecycle. Risk assessment of software systems via automated workflows able to control the
aids in planning, implementation and adoption stages execution of the manufacturing steps. The
and helps identify potential problems before they organization implementing the system could be
occur. This study utilized a qualitative case study characterized as highly concentrated on achieving
method and an interview design for data collection to excellence in their core competencies. Such core
competencies, as identified by company executives,
gather, organize and make sense of key stakeholders’ fell within the quality assurance and manufacturing
perceptions of risk for decision making in the areas, with the latter being the actual owner of the
implementation of a new department-wide system, making the project a department-wide
computerized system. Top stakeholder risks identified implementation. Nevertheless, the scope of the
include executive sponsorship support; adoption of system required the establishment of a cross-
the new technologies and processes; and functional implementation team to ensure that cross-
interoperability. The results of the analysis of departmental processes were considered when
perceptions of risks allowed the organization and the configuring the software solution.
team responsible for the implementation of the new The risk assessment for this study identified risks
system to make decisions about mitigating strategies associated with the new information system,
aligned with stakeholders’ expectations; forecast
potential issues within the implementation timeline hereinafter referred to as “the system”. Risks
based on activities associated with identified risks; associated with the system were based on perceptions
and make implementation and process decisions from areas of business such as Manufacturing,
based upon the risk assessment. This study extends Information Technology (IT), Quality Assurance
the research on IT risk management and decision (QA), Supply Chain, Process Controls, and
making by demonstrating the utility and efficacy of a Management. Traditionally, risk assessments for
qualitative case study method for eliciting the software implementation projects are performed
information needed from stakeholders in order to utilizing a variety of quantitative methods. In the case
make decisions regarding system implementation, of the organization being studied, there was a lack of
specifically in an organization that lacks the expertise in performing such assessments, in
appropriate risk management maturity level to particular for software projects. Using a qualitative
conduct an exhaustive quantitative analysis of risks method allowed the implementation team access to
associated with the project. key organizational representatives of the areas being
affected by the system.
1. Introduction This paper is organized into six sections: section
one includes an introduction to the paper in general
and this information system implementation project
This paper describes how a qualitative approach specifically; section two provides a brief literature
for assessing and evaluating risks in order to inform review; section three describes the methodology;
URI: http://hdl.handle.net/10125/41903
ISBN: 978-0-9981331-0-2
CC-BY-NC-ND 6120
section four presents results; section five analyzes The interviews for this paper were conducted
and discusses the interviews and identified risks, and between the end of the planning phase and the
details the risk-informed decision making process beginning of the implementation phase.
that resulted from this work; section six presents
limitations; and section seven presents contributions 2. Literature Review
and concluding remarks.
2.1. Risk Management for IT Projects
1.1 Description of the Information System Risks are classified as events that have adverse
Implementation Project outcomes. Risk management is a process involving
assessment, response and mitigation that can help
The main goal of the project was to improve prevent risk from occurring, as well as minimize
productivity and reduce cycle-time in the total time to damage and contain the cost of recovering from risk,
produce a manufacturing order. Automating the if risk does occur [1]. While risk can never be
process of controlling manufacturing records would entirely eliminated from a system, performing risk
optimize production activities within the organization assessment aids in identifying current or potential
and most likely bring additional synergies when risks associated with the implementation and
interacting with external manufacturers. The potential operation of a computerized system in a given
benefits identified during the development of the organization [2]. Additionally, it can provide
business cases were, among others, increased strategies to manage identified risks at a level that is
productivity, savings in labor costs, enhanced acceptable for the organization [3]. Risks are
management capabilities, shorter reaction time to assessed by examining magnitude and likelihood [1,
changing market conditions and higher availability of 3, 4], and risk response involves the organization
manufacturing information throughout the creating and implementing both preventative and
organization. corrective controls to ensure risk is minimized [5].
The proposed approach was to find a best of breed Additionally, risk mitigation acts to introduce
solution that could be integrated into the controls that reduce potential risks within a system, to
organization’s current technology landscape and long address risks and generate solutions to reduce and
term business and IT strategy. A transformative resolve threats [6].
initiative like this required the establishment of a Risk management within IT systems is vital to
governance body that included members of the ensure that systems operate within specific
leadership team acting as executive sponsors as well performance and computational accuracy thresholds
as active members of a steering committee. A project previously agreed upon in the form of user
manager from the IT department was in charge of the requirements and made official via Service Level
formal management of the project across the areas of Agreements (SLAs) [2, 3]. Generally speaking,
the organization needed in the definition and managing risks in a software implementation project
execution of the project deliverables. is a three phase process. Each of these phases may
As part of the management of the project, a present different types of risks and, accordingly,
comprehensive project timeline was produced, which different methods for managing them [7] .
listed a 17-month implementation strategy that The objective of a risk analysis and identification
included the definition of user and functional process is to provide information to facilitate the
requirements, definition of interfaces with other decision making process related to the
existing applications, unit, system and integration implementation of risk management strategies
testing phases and a final user acceptance testing whether it is acceptance, elimination or reduction [8].
phase followed by a month-long deployment into the Traditionally, risk assessments for software
production environment. The effort was divided into implementation projects rely heavily on a variety of
phases as per project management best practices: quantitative methods [9-11] that concentrate on the
a planning phase where high-level risk analysis and mitigation efforts to project-specific
requirements were gathered, vendors were deliverables or processes, which lead to a project-
screened and selected and budgets were specific decision-making modeling [12].
submitted for approval Nevertheless, software implementation projects
an implementation phase to design and produce business-specific (operational) risks that
configure the system should be quantified and, if needed, managed [9, 13].
a testing and deployment phase To that end, research has demonstrated that involving
6121
business subject matter experts (SMEs) positively vague, broad, and general statements/indicators [21,
impacts the performance of the implementation team 25-27].
and creates a sense of ownership for the SMEs when In applying this educational assessment and
they perceive the system as their own creation [14]. evaluation perspective to the assessment of risk in an
Appropriately addressing user (SMEs) perceptions of IT project, the indicator of the presence of learning
risk have been linked to increased levels of alignment (i.e. learning goal) can instead be framed in terms of
across the business as well as higher levels of an indicator of presence of risk (or, as the case may
organizational awareness [14]. be, the perceived presence of risk). Furthermore, the
The field of risk assessment and decision making concept of coarse-grained and fine-grained
is multifaceted and the processes multidisciplinary, information can be applied in terms of broad
which must be taken into account when considering a indicators of risk (e.g. issues with document
scientific platform and/or framework for risk [15]. maintenance) that can be broken down into more
Many theories explaining risk and decision making specific indicators (e.g. issues with record storage,
form the foundation of quantitative studies for risk ease of access, maintaining paper records and need
analysis and management, including decision theory, for backups, among others). As in the field of
the behavioral view of risk, and the real options view education, collecting this information at such a fine-
of risk [16-18]. While many consider quantitative grained level can inform decisions (what we will call
risk assessment (QRA) the method for estimating and or consider a form of risk evaluation) as much as the
quantifying risk, one must also consider that “societal actual actions. An example of this is users driving
risk decision making” – which stems from identifying organizational change management, as discussed in
such risks – requires consideration of stakeholders’ the next section.
understandings as well as contextual factors [15]. A
qualitative risk assessment targets the elicitation of 2.3. Users Driving Organizational Change
such important information (i.e. the answers to Management
“what” and “how” questions) and thus provides
pragmatic grounds for an exploratory method, which A determining success factor for the
could also lay the groundwork for theory implementation of computerized systems is the level
development [19]. of readiness achieved by the organization prior to
deploying the new technology [28, 29]. Such a state
of readiness is achieved by the appropriate planning
2.2. Assessing and Evaluating Risk and execution of an organizational change
management process [30], which consists of making
Understandings from the field of education with the organization aware of the change, educating users
regards to assessment and evaluation can provide a and secondary stakeholders on the consequences of
theoretical framework for the development of a the change and how to deal with it and creating the
qualitative interview protocol, the collection of data corresponding mechanisms so that the new status is
on specific risk indicators (assessment) as well as the adopted as seamlessly as possible [28, 30].
use of the information gathered from these qualitative A specific approach for facilitating organizational
interviews to inform decision making on risk change consists of involving non-supervisor members
management, mitigation, and reduction (evaluation). of the organization in a semi-crowdsourcing mode of
One approach in education is to separate the problem solving, also known as participative
concept of assessment from testing and grading, and leadership [31]. Research has positioned
understand it as the extent to which one has attained a participative leadership not only as a generator of
learning goal; and evaluation can be thought of as trust, but as a driver for enhanced organizational
applying that assessment information to inform and performance [31] and it is also positively influenced
make decisions [20-22]. For purposes of clarity and by higher degrees of information sharing from
precision when measuring attainment, broad learning supervisors [32]. This approach provides subject
goals can be written at very specific levels. matter experts, acting as subordinates of the project
Specifying (learning) indicators at a fine-grained leadership team, with intrinsic motivation for finding
level as opposed to a coarse-grained level [23, 24] innovative and effective solutions for specific
allows for collection of useful information and thus organizational needs [30, 33].
clear and specific measurement of attainment The inclusion of users (Subject Matter Experts or
(assessment) as well as actionable evaluation (using Stakeholders) in the risk management process should
the information to inform decisions) and eliminates provide a better understanding of perceived risks
the potential for confusion that is wrought with within the organization [15]. Such risks and their
6122
corresponding mitigation could either hinder or on pragmatic grounds as an opportunity to involve
promote the organizational change management future end users of the system in the identification of
process required for the successful implementation risks while gathering their perceptions of the project
and eventual maintenance of a transformative at large. In addition, the lack of in-house knowledge
computerized system [11,15]. Applying an on performing quantitative risk assessment and the
assessment and evaluation approach in this context need to keep the timeline unchanged made the
helps to frame the change management process in method ideal for this particular project.
terms of specific intended outcomes for said
processes. Employing assessment at a fine-grained Participant selection. Interviewees were selected
level allows identification of specific risks; based on level of involvement with the
employing evaluation allows us to use the implementation of the system into the company. The
information that results from the assessment to make total group (N = 27) was selected from
decisions in terms of implementation and manufacturing (N = 11), supply chain (N = 1), IT (N
maintenance. One can then gather information as to = 5), quality assurance (QA) (N = 4), process
whether the intended outcomes have occurred by sciences (N = 2), and management (N = 4), to
using evaluation techniques at the program level encompass a wide range of perceptions associated
(see, for example, [34] for a discussion of standards with implementation of the system.
for program evaluation).
Data collection approach. This case study
research utilized an interview design for accessing
and collecting data. Interviews lasted 30 minutes,
3. A Qualitative Approach
during which time interviewees’ perceptions of risk
associated with implementation of the system were
3.1 Case Study Research Method recorded.
The interviews were conducted in a semi-
Case studies facilitate the gathering of information structured manner, with a general set of questions
necessary for making decisions, as well as focusing prepared, but improvisation was used to obtain more
on the factors that influenced decisions within each specific information based on the subjects’
case and then comparing such factors in order to test knowledge and experience with the system.
existing theoretical constructs and relationships [35]. For each department, a different set of exploratory
Traditionally, for software implementation projects, “what” and “how” questions were used in order to
risk management is performed by analyzing elicit the thinking and opinions of each respective
indicators related to the development or group [19]. Sample questions included: “What are the
implementation process – requirements complexity, main risks you feel the system could generate for
software size, computational complexity and manufacturing that would interfere with the benefits
interfacing level, among others. By using an of the system?” (Manufacturing); “How will
interview design, indicators of risk (via perceptions) implementation of the new system affect the
can be gathered from a broad range of stakeholders, functionality of current systems?” (IT); “What could
both technical and non-technical, to gain a better be the risks if data integrity is compromised?”
understanding of concerns regarding the effects of the (Supply chain); “How could implementing the
new software on existing processes and computerized system affect compliance?” (Quality Assurance);
systems. More specifically, through semi-structured “What are the potential impacts or risks if the system
interviews [36], the level of flexibility facilitates is not accurate?” (Process sciences).
descriptive responses that allow the researcher to
develop detailed descriptions, integrate multiple Coding and data processing methods. Interview
perspectives, develop holistic descriptions and frame transcripts were reviewed after each interview to
hypotheses for quantitative research [37]. ensure that the proper meaning of the interviewees’
Furthermore, qualitative interview techniques lend responses were recorded. These interview transcripts
themselves to: the ability to generate reliable and were broken into smaller units, based on categories
valid data and reduce bias, such as via consensual created to reflect the main ideas of the responses
qualitative research methods [38]; inductive and gathered. For each interview question asked, the
deductive methods of analysis [39]; quantification for number of people surveyed was recorded; this was
further analysis [40], as well as laying the followed by responses to the question in unitized,
groundwork for theory development [19]. The coded form, listing category and subcategory, as well
qualitative approach for this study was chosen based as the participant’s identification number and
6123
no reviews yet
Please Login to review.