IT project risk assessment of learning organizations by fuzzy set and systems

2014 ◽  
Vol 22 (2) ◽  
pp. 161-180 ◽  
Author(s):  
Osman Taylan

Purpose – IT projects carry high risk of failure due to the existence of great obstacles during the planning, application and development phase. The projects' risks are multi-dimensional, and they must be assessed by multi-attribute decision-making methods. The purpose of this article is to provide analytic tools to evaluate the learning organization's IT project risks under incomplete and vague information. It was also aimed to place the risk in a proper category and predict the level of it in advance to develop strategies to counteract the high-risk factors. Design/methodology/approach – In this study, three mutual approaches were used to analyze the organizations IT applications. These are enterprise analysis for determination of information requirements of organization, payback method for IT project financial analysis and risk assessment using fuzzy sets and systems. The developed fuzzy model is an expert system which can predict the category of risk for IT projects in learning organizations. Findings – This study revealed that the greatest obstacles to IT project success were the lack of organizational learning, resistance to change, etc. User involvement limitation was found to be also one of the common reasons of IT project failure. The information sharing policy was determined to increase productivity of employees in offices and to decide the creators and the users of knowledge. Learning is a continuous process for organizational transformation. Individual and organizational learning were searched to minimize the level of risks factors and learning culture. IT project risks were categorized properly using fuzzy sets and systems to reduce or even eliminate high risks. Originality/value – The paper is original and gives the first such work for industry.

Kybernetes ◽  
2019 ◽  
Vol 49 (3) ◽  
pp. 916-937
Author(s):  
Chao Ren ◽  
Xiaoxing Liu ◽  
Zongqing Zhang

Purpose The purpose of this paper is to develop a risk evaluation method for the industrial network under high uncertain environment. Design/methodology/approach This paper introduces an extended safety and critical effect analysis (SCEA) method, which takes the weight of each industry in a network into risk assessment. Furthermore, expert experience and fuzzy logic are introduced for the evaluation of other parameters. Findings The proposed approach not only develops weight as the fifth parameter in quantitative risk assessment but also applies the interval type-2 fuzzy sets to depict the uncertainty in the risk evaluation process. The risk rating of each parameter excluding weight is determined by using the interval type-2 fuzzy numbers. The risk magnitude of each industry in the network is quantified by the extended SCEA method. Research limitations/implications There is less study in quantitative risk assessment in the industrial network. Additionally, fuzzy logic and expert experience are expressed in the presented approach. Moreover, different parameters can be determined by different weights in network risk assessment in the future study. Originality/value The extended SCEA method presents a new way to measure risk magnitude for industrial networks. The industrial network is developed in risk quantification by assessing weights of nodes as a parameter into the extended SCEA. The interval type-2 fuzzy number is introduced to model the uncertainty of risk assessment and to express the risk evaluation information from experts.


Author(s):  
Rudy M Harahap ◽  
Andri Setiawan ◽  
Adi Subakti Kurniawan ◽  
Merlin Mulia

The success rate of information technology (IT) projects is still low. Based on one survey done in 1990s, only about 10% of software development project could be finished according to its planned budget and schedule. Another study in 1995 found that only 16.2% IT project succeed, and at the same time more than 31% IT projects were cancelled before finished. It has been found a lot of IT projects had been implemented with swelling budget. Although it is still debatable, one of the reasons of IT project implementation failure is because risk management in some IT projects is not implemented by the IT providers. The objectives of this research are to get knowledge and assess risks in implementing IT projects. This research also gives recommendations in mitigating IT project risks. In two projects that were used as sample of this research, it has been found some risks that could be happened in IT projects. That risks were then assessed based on the probability and its impact, and finally produced the recommendation for risk mitigation. All risks are described in the Risk Priority, moreover risk probability and impact is described in the probability-impact matrix from all of 4 levels. This research could improve the awareness of IT providers in Indonesia about the important of implementing IT risk management so that more IT projects in Indonesia could be run successfully.Keywords: Risk assessment, information technology project, impact, frequency


Author(s):  
Areeg Barakat ◽  
Faten Moussa

Purpose – The purpose of this paper is to identify the variables that influence the international assignment – expatriate learning relationship and the expatriate learning – organizational learning relationship. Design/methodology/approach – The paper contains a literature review of the research on expatriates' learning and organizational learning Findings – The paper provides an integrative framework that identifies the moderating variables that influence both the relationship between the expatriate international assignment and expatriate learning as well as the relationship between expatriate learning and organizational learning. In addition, this framework specifies the process by which the international assignment influences organizational learning and shows that expatriate learning mediates this relationship. Several hypotheses were generated to provide avenues for future investigation. Research limitations/implications – The paper does not provide an exhaustive set of the moderating variables and does not focus on the interaction between situational and individual differences moderators. Practical implications – Managers should pay attention to the selection, maintenance and repatriation of expatriates and facilitate the conditions under which expatriate learning and organizational learning can be maximized. To remain competitive, managers should engage in the continuous process of assessing the effectiveness of international assignments in enhancing expatriate and organizational learning. Originality/value – The present research identifies the conditions that facilitate or hinder expatriate learning and organizational learning as well as the process by which international assignments influence organizational learning. Expatriate learning and organizational learning are critical for the continuous growth and competitive advantage of organizations, and, accordingly, it is imperative to study the factors and the process that influence learning in organizations, especially in response to the increasing popularity of globalization and the pressure to remain competitive.


2019 ◽  
Vol 27 (1) ◽  
pp. 42-53 ◽  
Author(s):  
Teresa Rebelo ◽  
Paulo Renato Lourenço ◽  
Isabel Dórdio Dimas

Purpose This paper is focused on team learning, the fourth discipline proposed by Senge (1990) in his seminal book The Fifth Discipline: The Art and Practice of the Learning Organization. This paper aims to provide a reflection upon the journey that this construct has made since this book’s publication, in terms of conceptualization, research and its link to organizational learning and learning organizations. Design/methodology/approach This paper is based on a review of Senge’s (1990) conceptualization of team learning and on a literature review of team learning research that has been produced since then. Findings Since the first edition of Senge’s book in 1990, team learning has been growing as an autonomous research topic with numerous papers centered on learning at this level of analysis. Senge’s proposals concerning team learning remain present in the way team learning is now conceptualized, but this research stream has led to advancements in its conceptualization and on the understanding of its antecedents and consequences. Nevertheless, the authors observed a lack of research centered on the link between team learning and organizational learning, as well as between team learning and the concept of the learning organization. Originality/value This paper offers a review of research on team learning, suggesting some avenues for further research on this topic and its contribution to learning organizations. As teams are nowadays the building blocks of most organizational structures, and learning is a key process for effectiveness, research on learning at this level of analysis will remain valuable.


2012 ◽  
Vol 27 (1) ◽  
pp. 17-34 ◽  
Author(s):  
Hazel Taylor ◽  
Edward Artman ◽  
Jill Palzkill Woelfer

The gap between research and practice is strikingly evident in the area of information technology (IT) project risk management. In spite of extensive research for over 30 years into IT project risk factors resulting in normative guidance on IT project risk management, adoption of these risk management methods in practice is inconsistent. Managing risk in IT projects remains a key challenge for many organizations. We discuss barriers to the application of normative prescriptions, such as assessments of probability and impact of risk, and suggest a contingency approach, which addresses the uncertainties, complexities, and ambiguities of IT projects and enables early identification of high-risk projects. Specifically, in a case study, we examine how the project management office (PMO) at one organization has bridged the gap between research and practice, developing a contingency-based risk assessment process well founded on research knowledge of project dimensions related to project performance, while also being practical in its implementation. The PMO's risk assessment process, and the risk spider chart that is the primary tool in this assessment, has proven to be effective for surfacing inherent risk at the early stages of IT projects, thereby enabling the recommendation of appropriate management strategies. The PMO's project risk assessment process is a model for other organizations striving to engage in effective and collaborative practices in order to improve project outcomes. The case illustrates the importance of considering the practical constraints of the context of application in order to transform research findings into practices that promote attainment of desired outcomes.


2018 ◽  
Vol 25 (1) ◽  
pp. 2-9
Author(s):  
Patrice M. Buzzanell

Purpose This paper aims to first introduce the four contributions to the themed issue of The Learning Organization entitled “Learning Organization/Organizational Learning and Gender Issues”. Second, the commonalities among these articles function as themes that can generate further research and engaged or problem-driven scholarship and practice. Design/methodology/approach Feminist critique. Findings These articles challenge commonsense, blur boundaries between reality and imagined visions and form a multilevel matrix for understanding and change regarding gendered learning organizations. Originality/value As an introduction to a special issue, this essay summarizes and extends on the four contributions and then extends the insights to encourage discovery, learning and engagement.


2016 ◽  
Vol 34 (3) ◽  
pp. 471-487 ◽  
Author(s):  
Zhengbiao Han ◽  
Shuiqing Huang ◽  
Huan Li ◽  
Ni Ren

Purpose This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO 27000. The purpose of this paper is to testify the feasibility of this method and provide suggestions for improving information security of the digital library. Design/methodology/approach This paper adopts convenience sampling to select respondents. The assessment of assets is through analyzing digital library-related business and function through a questionnaire which collects data to determine asset types and the importance of asset attributes. The five-point Likert scale questionnaire method is used to identify the threat possibility and its influence on the assets. The 12 respondents include directors and senior network technicians from the editorial department, comic library, children’s library, counseling department and the learning promotion centre. Three different Guttman scale questionnaires, tool testing and on-site inspection are combined to identify and assess vulnerabilities. There were different Guttman scale questionnaires for management personnel, technical personnel and general librarian. In all, 15 management librarians, 7 technical librarians and 72 ordinary librarians answered the vulnerability questionnaire. On-site inspection was conducted on the basis of 11 control domains of ISO 27002. Vulnerabilities were scanned using remote security evaluation system NSFOCUS. The scanning covered ten IP sections and a total of 81 hosts. Findings Overall, 2,792 risk scores were obtained. Among them, 282 items (accounting for 10.1 per cent of the total) reached the high risk level; 2 (0.1 per cent) reached the very high risk level. High-risk items involved 26 threat types (accounting for 44.1 per cent of all threat types) and 13 vulnerability types (accounting for 22.1 per cent of all vulnerability types). The evaluation revealed that this digital library faces seven major hidden dangers in information security. The assessment results were well accepted by staff members of this digital library, which testified to the applicability of this method to a Chinese digital library. Research limitations/implications This paper is only a case study of a typical Chinese digital library using a digital library information security assessment method. More case-based explorations are necessary to prove the feasibility of the assessing strategy proposed in this study. Originality/value Based on the findings of recent literature, the authors found that very few researchers have made efforts to develop methods for calculating the indicators for digital library information security risk assessment. On the basis of ISO 27000 and other related information security standards, this case study proposed an operable method of digital library information security risk assessment and used it to assess a the information security of a typical Chinese digital library. This study can offer insights for formulating a digital library information security risk assessment scale.


2016 ◽  
Vol 9 (2) ◽  
pp. 389-413 ◽  
Author(s):  
Blessing Javani ◽  
Pantaleo Mutajwaa Daniel Rwelamila

Purpose – The purpose of this paper is to study the recognition, application and understanding (status) of risk management in information technology (IT) projects in the South African public sector and thus contribute to the research gap. Design/methodology/approach – A quantitative approach in the form of a survey design was adopted, with data being collected through a questionnaire. The results from the study are compared to the theory and practice of risk management before drawing conclusions on the status of risk management in IT projects. Findings – The findings provide significant statistical support for the conclusion that risk management is being applied in current IT projects and that it is understood by the respective project clients. Research limitations/implications – Though risk management has been studied by several authors, very little is known about its status in the South African public sector. This study sheds light on its application in IT projects and its understanding by IT project clients. Practical implications – The study findings encourage project executives to develop knowledge bases for risk management in IT projects, as well as the corresponding tools. This will ultimately assist in knowledge sharing, which increases chances of IT project success. Importantly, the study also highlights that the relationship between project clients and project teams can be accelerated through knowledge sharing and continuous project communication. Originality/value – The research addresses one of the questions held by many scholars on the status of risk management in IT projects. It advances the recognition of risk management as a knowledge base and the practical implications thereof.


2017 ◽  
Vol 24 (1) ◽  
pp. 39-48 ◽  
Author(s):  
Eric W.K. Tsang

Purpose The first purpose of this short essay is to respond to Howells and Scholderer’s (2016) harsh critique that organizational unlearning is a superfluous concept. The second purpose is to establish a relationship between organizational unlearning and the learning organization. Design/methodology/approach To respond to Howells and Scholderer’s critique, the author carefully examines their arguments – focusing on their comments on the author’s previous publications – and checks whether the arguments are logical and coherent. To establish a relationship between organizational unlearning and the learning organization, the author draws on his own research of international joint ventures in China. Findings Howells and Scholderer seriously miscited the ideas in one of the author’s publications, and their main arguments are blatantly flawed. Moreover, they are unaware that many of the faults they find in the organizational unlearning literature are also present in the organizational learning literature. As to the second part of this essay, the study of the acquisition type of joint ventures clearly indicates the presence of organizational unlearning. Moreover, for such ventures to be learning organizations, the unlearning step has to be well managed. Research limitations/implications As mentioned, the author’s response to Howells and Scholderer’s critique focuses on their comments on the author’s publications. It is highly likely that they have made other erroneous arguments that this essay fails to capture. The author’s discussion of unlearning and learning organizations is constrained by the context of acquisition joint ventures. Originality/value This essay forcefully rebuts Howells and Scholderer’s critique, which can become an obstacle in the development of organizational unlearning research. The dynamics of knowledge transfer in acquisition joint ventures suggest that skills of unlearning, and not just learning, are essential to reaching the goal of being a learning organization.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Letícia Barbosa Gomes Figueiredo Filho ◽  
Marina Bouzon ◽  
Diego de Castro Fettermann

PurposeThis study aims to evaluate how stakeholders affect project risks by analyzing the connection between stakeholder management and risk management in the information technology (IT) project context.Design/methodology/approachUsing the Delphi method, interviews with IT project experts were conducted to examine four factors concerning stakeholder management and define probabilities for three risk variables. The design of experiments (DoE) method was applied for the design of the research instrument and data analysis.FindingsStakeholder engagement and communication with stakeholders have significant influence on the occurrence of negative risks, opportunities and the development of contingency strategies. These results provide project leaders with relevant data that better guide actions toward stakeholders and enhance project success probability.Originality/valueThis study clarifies important aspects of two main project management areas – stakeholder and risk management – in the IT projects context. This research also presented an unusual application for the DoE method which allows the subjective variables analysis by statistical tools and enables to explore factor influences on real project situations.


Sign in / Sign up

Export Citation Format

Share Document