MBA Management Project (BS4D03-V1) Chidi
MBA Management Project (BS4D03-V1) Chidi
MBA Management Project (BS4D03-V1) Chidi
November 2020
SUMMARY
In recent years, giant strides have been made in technology and these
technological advancements has been widely utilized by a lot of organizations for the
soul purpose of improving productivity and output, unlike in decades past where
most things where done in the analogue way that was time consuming and energy
sapping, today, modern technology has made things easier and time saving.
it appears that an app exists for virtually everything ranging from food, groceries,
opportunities, SMEs actually need to take up and utilize this business changing
R1801D4393242
technologies. In commerce their exist different kinds of relationship the first is the
and wholesalers. In all this kind of relationships, apps have proven to be very
essential in improving the business relationship and making things easier. Putting
Company X into perspective especially considering the fact that they sell food
Tutor:
products to caterers, one can see that Ahmad Qammar
the company will benefit greatly from a
business to business relationship, thus putting in a place a mobile app for this
This study is basically is a scoping study that seems to provide solution to the
study will be of benefit to company X in determining how exactly, they will go about
Page 3 of 42
BS4D03-V1 Management Project
in developing the app, it will also aid the company in taking some strategic decisions
as well as serve as an eye opener towards issues that must be looked into before
making such commitments. This paper will dwell strongly on past experiences by
other companies, it will also capture the methods that will be used as well as the
techniques especially the ones that have been used by professionals in similar
industries. This study cannot be complete if the financial resources that will be
required to carry out this project is not captures, also the appropriate techniques that
will be used to access the functionality of the mobile software must be discussed.
Furthermore discussions will be done on the appropriate conditions that will ensure
determining what task will be conducted as well as the advantages of the selected
techniques.
CHAPTER ONE
1.0 Introduction - - - - 5
1.1 Study Objectives - - - - 6
1.2 Methodology - - - - 8
CHAPTER TWO
2.0 Supporting Evidences - - - - 9
2.1 Objective 1: Functional Requirements - - - - 9
2.1.1 Market and Stakeholder Analysis - - - - 10
A. Market Analysis - - - - 10
B. Stakeholder Analysis - - - - 12
2.1.2 Software Benchmark Testing - - - - 13
2.1.3 Security Requirements Analysis - - - - 14
2.2 2 Objectives : the Structural Requirements
nd
- - 15
2.2.1 System Environmental Analysis (ESA) - - - - 15
2.2.2 Personnel Analysis - - - - 16
2.2.3 Risk Identification and Analysis - - - - 17
2.3 Objective 3: Resource Requirements - - - - 19
2.3.1 Project Time Planning - - - - 19
2.3.2 Life Cycle Cost Analysis - - - - 20
CHAPTER THREE
3.0 Study Grantt Chart - - - - 22
CHAPTER FOUR
4.0 Contributions - - - - 24
4.1 Functional Requirements - - - - 24
4.1.1 Market and Stakeholder Analysis - - - - 24
4.1.2 Software Evaluation - - - - 26
4.1.3 Security Requirement Analysis - - - - 27
4.2 Structural Requirements - - - - 27
4.2.1 System Environmental Analysis - - - - 27
4.2.2 Personal Analysis - - - - 28
4.2.3 Risk Identification and Analysis - - - - 29
4.3 Resource Requirements - - - - 30
4.3.1 Project Time Planning - - - - 31
Page 5 of 42
BS4D03-V1 Management Project
CHAPTER ONE
1.0 INTRODUCTION
Technology has succeeded in making the lives of mankind letter and it is still
doing that at a very fast pace, the faces of business are determined now by
which have found relevance in nearly all sectors ranging from food, clothing etc.
platform used in the sale and purchase of products and services as well as
information through smart phones, iPad, Pc etc. (Lardon et al. 2016). Internet usage
worldwide. The use of mobile apps while shopping has made it far more convenient
and time saving (Holsinger, et al. 2012) , Since people always have access to their
phones. Though people have access to different ICT devices like personal computer
(PC), laptops, iPad and predominantly Phones, these mobile apps usually installed
on the phones are very easy to access Babbie, E. (1999). The statistics for the use
3.5billion people while about 61.2% which represents 4.78billion people use smart
and feature phones. These statistics is too huge to be ignored especially for any
business that has a stake in this world of highly interconnected digital economy. In
2015 Alin discovered in his study that people spend more time on phone software’s
making it an excellent business hob for business to invest on especially SMEs. Chris
et al. (2003). Discovered that most successful business are taking advantage of the
they can largely benefit from M-commerce, especially because they have limited
resources in terms of finance and HR (Zhao, et. Al.2016). This limited resources
simply implies that not much money is available for spending in marketing,
advertising, thus M-commerce can help such a company reach more people around
the world Bagozi, R.P. (2009). Company X as an SME who is interested in B2B
determine what factors will be relevant to the success of it business, a study by Dan
in 2017 x-rays some of the advantages of adopting this application which includes:
different non-functional prerequisite is needed after the prior identification before the
development and integration of the software into the business. In summary the aims
of this study is ensure that the management of company X is satisfied to carry out
investigations into the prerequisites without losing focus on the goal of the project,
make adequate recommendations to the suitable methods and techniques that will
what company X requires to improve its business relationship with its customers, so
Page 8 of 42
BS4D03-V1 Management Project
the objective of this paper would simply entail identifying the necessary requirements
needed in the development of such a software and as a scoping study that it is, the
software that is customized for business to business interaction having food supply
industry as focus. It is also worthy of note that critical analysis like stake holder
such one of the objectives of this study will be to conduct a risk identification
analyses will aid in identifying the structural prerequisite for the safe programming
The cost of every project viz-a-viz the importance and the capacity of the
financier of the project is a key item to be considered in this study. The cost analysis,
the resources prerequisite which company X needs to appropriate for the project will
be determined in this study all for the purpose of programing, execution and
1.2 Methodology
A common saying in Africa goes that the quality of a soup is dependent on the
variants of ingredients used in preparing it, similarly, the quality and usefulness of
the B2B software app will greatly depend on the quality of method or technique used
in setting it up. One of the key points to be considered in ensuring the adequate
prerequisite can be achieved if we try to review some case studies and industry-
based studies without forgetting requirement engineering and elicitation which are
some of the components needed in developing applications (Dolly & Khanum, 2016).
in engineering design process Barone, M.J et al. (2000). The most important stage in
and discovering the basic requirements of a system from users, customers and other
use cases, role playing and prototyping Berkhout, F. et al. (2007). Considering how
critical this study is, we shall be using the requirement elicitation method. This study
will definitely provide justification and critical analysis on the methodologies that will
be used such that at the end a quality software that will be of benefit to company X
will emerge.
Page 10 of 42
BS4D03-V1 Management Project
CHAPTER TWO
chosen, it helps prove a claim to be true. In this study, the supporting evidence, all
the methods chosen for the singular purpose of evaluating all the stipulated
prerequisite key in the implementation of B2B software inclusive of the context will
market, group discussions will be helpful in the process of information gathering, also
more established methods like brainstorming, prototyping and interviewing will not be
left out. According to Rafiq et al, 2019, it is the most appropriate thing to do, if from
time to time, due consultation is made with the owners of a project, this is to ensure
that changes that may arise in the prerequisite are properly captured, in other words
there must be an open communication channel with company X since we are aware
The 21st century has seen business evolve into more complex ventures
especially with the advent of new and more sophisticated technologies B0uman,
M.S. (2000). This dynamism is obviously a thriving ground for technology especially
mobile app technology that makes business easier to run as well as easier to reach
more people around the globe. Ali et al in 2013 opined that business not minding the
size need to develop software’s that will facilitate a cordial interaction with its
customers considering that these customers are always with their mobile phones.
Page 11 of 42
BS4D03-V1 Management Project
Philip T.A et al. in 2014 attempted to classify mobile software into two types, firstly
the entertainment focused and secondly the highly goal drive software’s. These two
which are brain behind their development Clarke, R. (1999). The businesses of the
21st century are faced with the challenges of developing software’s that can add
value to their business. Today, the reason why most business to business
relationship (B2B) fail is because the software’s which are supposed to enhance the
B2B relationship lacks relevance, user focus and user friendliness, eventually the
the important attributes that tends to add value to the mobile app as well as enhance
the B2B relationship will be evaluated. The study will also discuss the functional
prerequisite of the mobile app while providing advices as to what direction to take in
A. Market Analysis
make a better decision (sadler, 2005). For one to make a decision especially on the
target audience as well as some of the attribute and characteristics of the consumers
firm grip of the market needs to be able to develop a special marketing plan and
attributes.
be over emphasized, the integration channel of software into the market is not an
exception Day, G.S. (1994). According to Robertson in 2005, one of the major
reasons for reported failure in software development is the inability of the software
phase, this generally leads to very low acceptance of the product and subsequent
death of the product in the long run. Therefore, top on the priority list of any software
developer is to carry out a robust analysis of the product with respect to the concerns
of the target audience, that way the report of the analysis can be properly
(1995). There are a number of factors or items that should be considered when
developing such application, these factors are some of the common factors been
major factor considering a lot of intending users are poor, secondly is the willingness
hardware or operating system does the software require Fang, E. et al. (2008). Other
factors include the amount of transaction which the software can accommodate,
areas that require access restrictions or granted, also a way of prospecting new
clients for the purpose of screening them especially for people that are qualified from
the unqualified person Finne, T. (1996). These and other factors will be addressed in
this study. The other issues to be addressed are a comparative analysis of several
Page 13 of 42
BS4D03-V1 Management Project
similar software’s and the cutting edge this software has over others which will be of
benefit to company X.
social environment comes with its own complexities and as such can be impacted by
many social factors that emanates mainly from requirement elicitation. A large part of
elicitation Ford, N. et al. (1998). Stake holder analysis can be defined as a process
relate to relevant and interested parties, these parties are the stakeholders. stake
have a solid impact on a business and vice versa, also, we can say that
in identifying the possible stakeholders and figuring out what they need and expect
stakeholders or their engagements, one has to begin the stake holder analysis by
first identifying possible stakeholders, some of the attributes they possess and the
levels of influence they can exact. It is advisable that clients that possess sound
guarantee the right result by these stakeholders in the identification process, the
phase of the study focuses more on both the external and internal users, developers,
legislators as well as the decision makers not forgetting to take into account the life
cycle of the software which are the base line stakeholders (sharp et al 1999). It is
very key to communicate with stakeholders via organizing a structured meeting with
them or holding individual discussions with them, this is important because it helps in
being reassured of their total commitment and to be sure that their needs are
completely known from beginning Gundlach, G.T. (2007). It is very important to set
importance despite the fact that these stakeholders have different levels of inputs as
developers who would help elucidate the current performance and initiates changes
that will in turn improve performance index Hermann, B.G (2006). The benchmark
coding is usually done so efficiently alongside fine tuning the available database so
business during the process of developing a mobile app and joining the e-commerce
world due o the singular fact that smartphones just like other pervasive devices also
to discover some of the interactive features that are captivating, best practices in that
under same conditions so as to enable a level playing ground for results comparism.
every given time the environmental conditions should be the same for all the tests,
apart from the active application no other application required for testing purpose
should be active, lastly the components of the hard and software should be in
sanctity of the owners and the customers, people will not patronize it no matter how
useful that software is, just like a functionality requirement, a software security
company to try to protect information on an external device that is not known to it like
people’s android phones, pcs etc in other to fight some of these drawbacks and
prevent loss of data, the company should maintain its information visibility but limit
the visibility of individual information Keefe, L.M. (2004). In this study we shall be
presenting some security prerequisite like offline data allocation, file system
mobile software, position items that require correction as priority, suggest processes
Page 16 of 42
BS4D03-V1 Management Project
for managing vulnerabilities and also based on the advice of some application
experts define the security of these vulnerabilities (Joen, R.L et al) 2018.
organization clients, the intention is to be able to meet the criteria required in the
contemporary environment coupled with all its associated complexities, also focus
will be on the other abilities available for risk control or self-deviation with the
approach for describing human actions impacting on the natural environment just to
problems Kogdenko, V.G. (2011). Research has shown that the business to
business software industry has in recent times experienced a very huge growth, this
growth has obviously led to very stiff competition Lund, M.S. (2003). Businesses
have evolved in getting consumers engaged through their mobile devices through
the development of new software’s. These customers are able to download these
software’s on their phones, get enjoy the best user experience and remain loyal to
the brand so long as competitors don’t come up with similar software’s that are better
stakeholders, the environmental scan of the system will help us explore the ease
with which these prerequisites are developed and implemented within the
T.J et al. (2006). A number of professionals have duly recommended the elicitation
process especially due to the growing needs for an integration of new business to
business software into the existing system environment. Usually, intentional hitches
or constrains are created, then these constrains are examined to see whether they
can be managed by customers, this is done to be double sure that when the final
products is released, such hitches when they arise can be resolved. This is the
particular requirement. We shall get to see in this study a comparism of the systems
developed. A look at the existing infotech services and supporting procedures that
had earlier itemized interview as one of the parts of requirement elicitation, sequel to
that an interview session will be conducted with software developers and leaders in
analyzing personnel activities has remained a formal tool Maignan, I. et al. (2004).
organization which also helps determine the cost associated with managing these
competence Martins, C.G. (2010). In this case personal analysis will be used to
determine if the clients firm has the required manpower to implement the project with
firm is expected to possess the needed personnel that have the required technical
knowhow and skills to execute the development and implementation of mobile B2B
software. One vital way to build capacity amongst the work force is to provide the
requisite training especially for the software developers and other employees in
general Moberg, A. (2006). One sure way to understand the specific needs of the
work force to carry out comparism of the task and roles within the company Neto, B.
(2007). Personnel analysis is suitable for job candidates and for carrier development
purposes. Besides the job-related task, the main area to be evaluated are
capacities since fresh responsibilities can emerge on the project that will certainly
complexity through strategic insight Okhotnikov, A.V. et al. (2010). In project risk
management, the process of modeling the risks may not be performed sufficiently
and exactly, due to the fact that the data and information available are usually
inexact, vague, unprecise and uncertain by nature. In the course of a project, certain
risk may occur that will affect a project either positively or negatively. These risks
may lead to uncertainties or deviation from goal of the project. To forestall future
problems in a project, there is a need to identify potential risks early enough because
these risks can manifest at any stage in the course of the project and the factors
responsible for such risks could originate externally or internally Pallottino, S. et al.
(2005). It is the responsibilities of managers to handle and manage this risk with all it
peculiarities. It is a known fact that absolutely eliminating risk is not possible rather a
potential threats that could be encountered in the project, so while the company is
searching for results and lasting benefits of mobile software for the future, the client
can take a decision on the level of risks which the company can absorb and manage
Pineda-Henson, R.et al. (2002). Usually, the process of identifying risk cab be
extrapolated from previously executed projects that are similar in nature. It is very
personnel of the project staff, when done may be seen a way to achieve the
appearance of risk identification without actually doing it Qu, R. et al. (2005). There
to have this knowledge buried in people’s minds so the team Has to do a lot of
Page 20 of 42
BS4D03-V1 Management Project
not to eliminate risks from consideration rather it is to identify all possible risks and
put them into consideration in the project, Project management Institute, (2013).
Resource requirement here involves the following: time, personnel, space and
mobile application implementation will be analyzed after looking deeply into the
diverse requirement for putting a structure in place for the project execution that
satisfies the stakeholder objectives. These requirements include all the facilities or
elements needed for the successful implementation of the project. The requirements
updated version which the business can buy or rent, secondly is hardware
Ramaswami, S.N. et al. (2003). It is worthy of note that those resources must
essentially be made available throughout the entire project duration whether they are
storable or not except if they get exhausted due to constant usage even at that, they
Time, they say is money. It is a very critical and major requirement as it has to
do with how long it will take to execute the project by company X. the mobile
application is so valuable to the company X as such the client firm must ensure that
the development of the software takes the minimum possible time. The software
Page 21 of 42
BS4D03-V1 Management Project
of uncertainties, for these reason, the most important step in the process is time
planning which is one most important objectives of the stakeholder that must be
Project planning basically entails identifying, prioritizing and assigning tasks and
al. (2005). literally speaking, a thorough project plan determines your team
members, the needed tools and materials that would be required, the process
the time frame for the completion of the project Thoben, W. (2000). Al-naeem et al in
2005 opined that every project must have an estimated duration of activity which will
be useful in designing a diagram for the network and subsequently a Gantt chart
which is detailed.
Life cycle analysis (LCCA) is a method used in determining the total cost of
facility ownership Van, A.J. (2001). LCCA is particularly useful in the case of project
alternatives that fulfill the same performance requirement, though differ in terms of
initial cost and cost of operation. In summary, project life cycle cost analysis is a
process recommended in assessing the economic value of a project Vargo, S.L et al.
(2004). One other use of this method is to guide on decision makings bothering on
investments that saves cost over the duration of the project. The LCCA seems to be
the appropriate method to use in accessing the total financial outlay on the intended
Though the development of software-based project comes with some hidden cost
that can only be seen when analysis is done, LCCA is also helpful to outline
expenses for the duration of the project Werther, W. B. et al. (2010). While the LCCA
evaluates the complete expenditure of the project right from its infancy to the end of
the project, other expenses which can be categorized under five group namely:
contingent external expenses indirect, intangible, direct including labor and material
expenses on individual activities is a product of the time planning process while the
project as enumerated by this method. In 2009 passenheim advised that during the
execution stage of a project, expenses should be revised just to avoid the risk that
could emanate from over reliance from the data from the LCCA instead of utilizing it
as a tool for orientation irrespective of the fact that the expenditure may experience
CHAPTER THREE
A Gantt chart is basically a type of bar chart that elucidates the schedule of a
project, this chart was names after henry Gantt who designed it Zobel, T. et al.
(2002). The chart shows on the vertical axis, the task that is required that is required
to be performed and on the horizontal it shows the time intervals. The duration of
each activity is illustrated by the width of the horizontal bar. Using a Gantt chart, the
starts and finish dates of the terminal elements and summary elements of a project
can be properly illustrated Zopounidis, C. et al. (2002). In a Gantt chart, the terminal
and summary element constitute the work breakdown structure. Modern Gantt charts
activities Bhattacharya, C.B. et al. (2008). This study involves a project that is
understudies within a six months period. The Gantt chart ensures that unforeseen
events are workable and executed and provides contingency measures for issues
that were never anticipated. To begin, there would be an inaugural meeting for the
project to usher it in the start of the study, in this meeting the key stake holder would
be duly introduced and all the relevant information and people would be presented.
To avoid abnormalities in the study, a regular consultation between the client and the
consultant will be done, also, based on the goals set as well client needs
satisfaction, the study will be divided into various sections. To meet up with every
objective of the study an appropriate technique and tools will be used for analysis,
the importance of which is not just to slow the possibilities of activities rather it also
slows their workability and order in which these activities will be executed Bjorklund,
A. E. (2002).
Page 24 of 42
BS4D03-V1 Management Project
Nov- Jan-
Oct-18 18 Dec-18 19 Feb-19
Activity Description W
Dura W W W W W W W e W W
tion e e W W e W e e W e e e e e
in e e e e e e e e e e e k e e
wee k k e e k e k k e k k k k
ks k k k k 1 1 1 1 1
1 2 3 4 5 6 7 8 9 0 1 2 3 4
Kick Starting
Begin welcome meeting where stakeholders will be briefed
2
Revising the portfolio of the companyh 1
Functional Requirements identification 11
Proper Analysis of the market 5
A firm grip of customers attributes, choices and experience 2
Point out application systems that are already existing 1
Carrying out a critical market survey 1
A critical analysis and compilation of survey report 2
Analysis of key stakeholders 4
Proper identification of key project stakeholder 3
Round table discuss with key stakeholders 2
Point out and jot down the priorities of key stakeholder 2
Stakeholder matrix 1
Critical evaluation of Software 3
Accumulation of reliable data from selected sources 3
Proper systematic analysis of date inclusive of documenting 2
the well
Systematic analysis of the security requirments of the app 1
Identify the common threats of B2B system App 1
Stating the security apparatus that can be utilized 1
Laying bare the Structural Requirements
6
Proper analysis of the system environment 3
Round table discuss with major of key informants (KIIs) 1
Analysis and documentation of some key requirements 2
Critical Personnel Analysis 2
planning of the major project role 1
Page 25 of 42
BS4D03-V1 Management Project
CHAPTER FOUR
4.0 CONTRIBUTIONS
In this section we shall be taking a critical look at similar case studies from
this will enable us generate evidence on the workability of selected methods on the
study objectives.
Page 26 of 42
BS4D03-V1 Management Project
the output and input is what is described as function Bukhalkov, M.I. (2009).
manipulations and processing, while behavioral requirements stand for all the cases
where the system uses the functional requirements captured in use cases Cannon,
J.P. et al. (2001). This study will be focused mainly on the firm, the stake holders as
Market analysis is so vital due to the fact that it is one of the most important
tools utilized in decision making that helps managers in achieving objectives of the
business, these objectives include addition of value to the project and successful
project implementation. Kelly in 2016 opined that many software’s developed end up
becoming a failure in providing return on investment (ROI) due to the fact that a good
number of market prospects are not put into consideration by these developers in the
food industry. A well carried out market analysis is an essential approach which
determine the best attributes that enables prospective marketers and clients
adequately interact to create potentials Eesley, C.et al. (2006). The market research
that will be conducted for this study will also put into consideration the information on
the end users of the software, the extent to which they are exposed to technology
inclusive of the extent to which they can manage software and satisfy their needs.
Page 27 of 42
BS4D03-V1 Management Project
process. In relation to this for it to be possible for the client to be able to identify
those stakeholders that are very likely to impact positively on the project, it is
pertinent to carry out a stakeholder analysis and subsequently manage their various
bid to ensure that the expectation of stakeholders aligns with the objectives of the
potential stakeholders that are identified will be approached with view to obtain their
input on the design of the mobile application. The use of stakeholder analysis and
market analysis will be used concurrently to map out available opportunities in the
market, also the successes of the mobile software clients, market requirements will
be enumerated and lastly a revelation of the possible threats to the business will be
highlighted.
a tricky balance between hard objectivity and very subjective (but very valid)
individual user experience Frazier, G.L et al. (2009). A software evaluation service
issued by the software sustainability institutes over many years helps one improve
his/her software, firstly, it can help access the general usability of the software and
Page 28 of 42
BS4D03-V1 Management Project
realistic view of its potential, this obviously is one of the key stages in the
characteristics that can make one’s company unique can be compared to enhancing
and appropriating the foundation laid down by the rivals. The info tech processes in
identifying key attributes and functions that are not frequently utilized. Mobile
that ordinarily would not be found using stakeholder or market analysis inclusive of
scenario as such the most engaging attributes best industry practices that can result
to an increase in the installed and usage capacity will be made known by the
Security is key especially due to the fact that the security architecture for
undertaking the development of mobile software this is to ensure that attacks from
various risk factors can be identified, analyzed and managed, this has become
necessary following the exponential rise in the number of private data leaks through
mobile devices Homburg, C. et al. (2009).in 2002 Hummber, J.M was of the opinion
that To ensure the merits derived from the software is higher than the risks involved,
(2015), this elucidates the importance of security requirements for mobile devices.
undertaking a study of the requirements will in general bring about a reduction in the
capability on the evaluation of some of the elements that prompts the inculcation of
while examining it from the perspective of the innovation system Huselid, M.A. et al.
(2005). It’s a known fact that various Infotech environment require particular skill sets
scale and of a longer duration will be studied mainly and particularly it will assist us
that exist in the company, bad social interaction and technical issues; according to
Walid (2017) A German basketball team, Paderborn had similar issues; such matters
summarizing about the IT firm in Greece that specifically provided various services to
financial institutions in Greece. Additionally, the basis to developing further and staff
The difficult characteristic of this project that includes but not limited to the
process of developing, executing and maintaining the software mobile apps that aids
effective communication and interaction amongst customers, this helps give detailed
what is absolutely required to ensure the proper functions will be properly executed
by the hosting environment include these steps which are three in number
encompasses the entire project, the required tools and needed processes, a large
variety of services are its composing parts. Going by the assertions of Dave and
David (2012) the designated persona that ensure all the reported are properly fixed
accordingly, as well remain steadfast until the implementations are done after the
evaluations must have been carried out especially new features are executed are
very qualified company employees who run designated tasks daily, these includes
managers; on a regular basis, backups are carried out as well as system updates
are constantly and very efficiently installed. In relation to this and in proper provision
elicitation was postulated by Holuram in (2013) and from which its relevance was
In 2001, Philip and his team where of the opinion that making available and
delivery of the critical process of setting up a software. This then makes it pertinent
that even if you intend to pick staff or workers from anywhere, the requirement of
properly training such staff becomes inevitable if and only if the best is to be
According to Rahja in 1997, that a project may encounter delay issues and
maybe in completed within the scheduled timeframe or within the budgeted amount
and quality anticipated if the possible risks of the project are not identified prior to the
end. Ajay (2007) is of the opinion that presently, various risks materialize in diverse
forms and they are related to the project, specifically application development
projects such as new mobile business-to-business software. Identifying risks and its
analysis are highly significant in making a determination on whether the risks can be
managed by the client alone (Rajman, 2017), according to Ahmed (2017) who stated
that as the client is about to enter an industry with a lot of risks as a result of the
predicting potential risks that may crop up. Taylor (2006); Rajman (2017); Charlton
(2006) carrying out these processes before commencement of the project makes it
risks. Failure of Projects was linked to an in consideration of some risk factors which
Page 32 of 42
BS4D03-V1 Management Project
comprehensive list risks associated with B2B and the potential solutions will be
provided using this approach so there can be a concrete evaluation of company X's
capabilities that requires to be built so the risk involved in the project can be
managed due to the fact the process of risk assessment particularly the stage where
clearly and incorporated, making sure resources requirements are available, fast
feedback cycle and client's review including Adapting to project changes that are
analysis including ensuring of time optimism and cost estimates. (Liz, 2018;
Haughey, 2015).
Usually time, resources, and quality are the three major types of non-
generally very useful and important. The importance of this number is in a variety of
project and setting a deadline for its completion, in the light of this Tira and his team
in 2018 suggested that estimation of time inaccurately can lead to time pressure or
late delivering of the project which may adversely affect the project expenditure, as
such, effective planning of a project plays a vital role in its successful completion.
requirements that are inadequate which leads to time impediments, this was
Selecting a very suitable framework to which is ideal and ensures the lowest
total expenses is consistent with function and quality (Fuller, 2016), the LCCA is
unarguably one of the most effective method used in assessing the total expenditure
(2009) that expenses is the key prerequisites in the proper project implementation.
stage since it has the potentials of being a strategic tool to managers for making
can raise the resources needed to ensure a completion of the project is elucidated
by this technique.
Page 34 of 42
BS4D03-V1 Management Project
Some researchers have suggested especially on the low associated cost and
the cost estimation method's role was focused on by Tripathi and Rai (2016); the
ability of the LCCA to reveal hidden expenses and bring about a decline in
appropriateness. (Korpi and Ala-Risku, 2008, Jiran et al.2013, Tannu and Kumar,
2014; Fuller, 2016) Additionally, the need for businesses without an IT foundation to
use it was pushed by David & Anatoly (2006) due to a potential inexperience in
CHAPTER FIVE
5.0 CONCLUSION
determining the requirements so that the client can make an informed decision on
his capital investment. Based on the client’s specific situation an adaptation has
been made, therefore the requirements that are acceptable by company X are in turn
adopted since the method utilized have been approved which are based on available
case studies and researches. We are aware that the business is a small and medium
enterprise (SME) as such in trying to arrive at the parameter that will decide all that
is required for company X to come up with a software that will aid a proper
established case studies found in that sector as the chosen methods. The
functional and non-financial resources required to create a software for the business
interaction (B2B). The clients have the soul prerogative to make decision on whether
implementation. Finally the deciding factor or element that will determine whether the
project should be continued or discontinued even in the face of all the risks and
threats stirring in the face of the management is the ability to raise the required funds
.
Page 36 of 42
BS4D03-V1 Management Project
REFERENCES
Adler TR, Leonard JG, Nordgren RK (2012).Efforts in Improving risk management:
graduating from risk elimination to risk avoidance. Inform. Softw. Technol., 41:
29-34.
agers. Washington DC: USAID. Economist. 2012. The good (and bad) model
guide. The Economist (April 10th): 68.
Backman, M., Thun, R., (2014). Total Cost Assessment. Recent industrial
Applications and developments. In: Backman, M., Thun, R. (Eds.), IIEE
Communications, International Institute for Industrial Environmental
Economics at Lunds University, Finland. Available from
http://www.iiiee.lu.se/Publication.nsf/DisplayCommunications? Open Page,
last acceded on 20.12.2006.
Bagozzi, R. P. (2009). Marketing as an organized behavioral system of exchange.
Journal of Marketing, 38(4), 77–81.
Barbirolli, G., Raggi, A., (2003). A valuable method for evaluating the overall
economic and technical performance of environmental innovations in cycles of
production . Journal of Cleaner Production 11 365-374.
Barone, M. J., Miyazaki, A. D., & Taylor, K. A. (2000). The influence of cause-related
marketing on consumer choice: Does one good.
Berkhout, F., Hertin, J., Azzone, G., Carlens, J., Drunen, M., Jasch, C., Noci, G.,
Olsthoorn, X., (2001). MEPI (Measuring the environmental performance of
industry). Final report to EC Environment and Climate Research programme:
Research theme 4 Human Dimensions of environmental change.
Bhattacharya, C. B., & Korschun, D. (2008). Stakeholder marketing: Beyond the four
Ps and the customer. Journal of Public Policy & Marketing, 27(1), 113–116.
Björklund, A.E., (2002). Survey of Approaches to Improve Reliability in LCA.
International Journal of LCA 7 (2) 64-72.
Bobryshev, A.N., Golchenko, Y.V. & Kazakov M.Y. (2014). Directions of municipal
territorial and economic transformation in a monopolar highly urbanized
region. Аctual Problems of Economics, 2(152), 230-238.
Bouman, M., Heijungs, R., Van der Voet, E., van den Bergh, J.C.J.M., Huppes G.,
(2000). Material flows and economic models: an analytical comparison of
SFA, LCA and partial equilibrium models. Ecological Economics 32 195-216.
Bukhalkov, M.I. (2009). Personnel management. Development of labor potential.
Moscow:
Cannon, J. P., & Homburg, C. (2001). Buyer and supplier relationships and customer
firm costs. Journal of Marketing, 65(1), 29–43.
Chapman RJ (2001). The controlling influences on effective identification of risk and
assessment for management of construction design. Int. J. Project Manage.,
19( 3) 147-160.
Colgate, M. R., & Danaher, P. J. (2000). Implementing a excellent customer
relationship strategy: The asymmetric impact of very poor versus excellent
execution. Journal of the Academy of Marketing Science, 28(3), 375–387.
Page 37 of 42
BS4D03-V1 Management Project
Eesley, C., & Lenox, M. J. (2006). Firm responses to secondary stakeholder action.
Strategic Management Journal, 27(8), 765– 781. Efficiency in Business:
Feasibility of a core set of indicators, available in:
EMAS (2001).
Regulation (EC) No 761/2001 of the European parliament and of the council
of 19 March 2001 allowing voluntary participation by organisations in a
Community eco-management and audit scheme (EMAS).
Environmental opposition to marketing. Journal of Marketing, 51
Environmental Progress 18 40 267-272.
Fang, E., Palmatier, R. W., & Evans, K. R. (2008). Influence of customer
participation on creating and sharing of new product value. Journal of the
Academy of Marketing Science, 36(3), 322– 336.
Federação Das Indústrias Do Estado Do Rio De Janeiro (FIRJAN) (2010).
Cadastro Industrial do Estado do Rio de Janeiro 2009/2010. Rio de Janeiro:
Ed. EBGE. 1 CD-ROM.
Ferrell, O. C., Fraedrich, J., & Ferrell, L. (2011). Business ethics: Ethical decision
making and cases (8th ed.). Mason: South-Western, Cengage Learning.
Finne, T. (2013). Soliciting Computer support for security analysis of information in a
small business environment. In feb. H.P. Eloff, (Ed.), Proceedings of the IFIP
TC11 WG 11.2 on very small systems security, (pp. 73–88), Samos.
Ford N, Sporne C. 2011. key informant inter-viewing and Survey interviewing.
Exeter: Institution of Population Studies, University of Exeter.
Frazier, G. L., Maltz, E., Antia, K. D., & Rindfleisch, A. (2009).
French, S., Geldermann, J., (2006). The numerous varied contexts for
environmental decision problems and their implications in decision support.
Environmental Science and Policy 378-391.
Frey, H.C., Zao, Y., (2014). The Quantification of variability and uncertainty for toxic
air emission inventories with the help censored emission factor data.
Environmental Science and Technology 38 6094-6100.
Fukushima, Y., Hirao, M., (2002). A structured framework and language for scenario-
based life cycle assessment. International Journal of LCA 7 (6) 317 – 329.
Garrett, D. E. (2015). The effectiveness of boycotting marketing policy:
Ghani JA (2005). Construction Risk Management. Punjab software Information
Greenley, G. E., & Foxall, G. R. (2009). External moderation of associations among
stakeholder orientations and company performance. International Journal of
Research in Marketing, 15(1), 51–69.
Gundlach, G. T. (2007). The American marketing association’s 2004 definition of
marketing: Perspectives on its implications for scholarship and the role and
responsibility of marketing in society. Journal of Public Policy and Marketing,
26(2), 243–250.
Gundlach, G. T., & Wilkie, W. L. (2011). Stakeholder marketing: the reason Why
“stakeholder” was removed from the American marketing association’s official
2007 definition of marketing and the reason why the future is bright for
stakeholder marketing. Journal of Public Policy & Marketing, 29(1), 89–92.
Page 38 of 42
BS4D03-V1 Management Project
Lund, M. S., den Braber, F., & Stølen, K. (2003). Maintaining Results from Security
Assess-ments. In Proceedings of the 7th European Conference on Software
Maintenance and Reengineering (CSMR’2003) (pp. 341–350). IEEE
Computer Society Press.
Luo, X., & Bhattacharya, C. B. (2009). The debate over doing good: Corporate social
performance, strategic marketing levers, and firm-idiosyncratic risk. Journal of
Marketing, 73
Lusch, R. F., & Vargo, S. L. (2006). Service-dominant logic as a foundation for a
general theory. In R. F. Lusch & S. L. Vargo (Eds.), The service-dominant
logic of marketing: Dialog, debate, and directions (pp. 406–419). Armonk: M.
E. Sharpe.
Madden, T. J., Fehle, F., & Fournier, S. (2006). Brands matter: An empirical
demonstration of the creation of shareholder value through branding. Journal
of the Academy of Marketing Science, 34(2), 224–235.
Maignan, I., & Ferrell, O. C. (2004). Corporate social responsibility and marketing:
An integrative framework. Journal of the Academy of Marketing Science,
32(1), 3–19.
Martins CG (2006). Aplicação das Técnicas de Identificação de Risco em Projetos
de E & P. 2006. 93f. Monografia (Pós-Graduação - MBA em Engenharia
Econômica e Financeira) – Universidade Federal Fluminense – UFF. Niterói.
Martins CG (2010). Avaliação da Função Utilidade do Segmento da Construção e
seu Grau de Conhecimento do Processo de Gerenciamento de Riscos e das
Técnicas de Identificação e Análise. 2010. 333 f. Dissertação (Mestrado em
Engenharia Civil) – Universidade Federal Fluminense – UFF. Niterói.
McWilliams, A., & Siegel, D. (2001). Corporate social responsibility: A theory of the
firm perspective. Accessing Academy of Management Review, 26(1), 117–
127.
Moberg, A. (2006). The Environmental systems analysis tools for decision-making.
LCA and the Swedish waste management as an example. Licentiate thesis.
Royal Institute of Technology, Department of Urban Planning and
Environment, Environmental Strategies Research. Available from
http://www.infra.kth.se/fms/pdf/kappaAM, last acceded on 02.12.2006.
Morano CAR (2003). Application of Risk Analysis Techniques in Construction
Projects. 2003. 206 f. Dissertation (Master in Civil Engineering) - Universidade
Federal Fluminense - UFF. Niteroi.
Neto, B. (2007). MIKADO: A Decision Support Tool for Pollution Reduction in
aluminium Pressure Die Casting. PhD Thesis, Wageningen University, The
Netherlands.
Neuman, SP. (2003). Maximum likelihood Bayesian averaging of uncertain model
predictions. Stochastic Environmental Research and Risk Assessment 17
291-305.
Novoseltseva, A.P. & Lyubenkova, E.P. (2014). Economic risks of universities during
the modernization of higher education in Russia. Crimean Economic Bulletin,
2(09), 141-145.
Page 40 of 42
BS4D03-V1 Management Project
APPENDIX
THE A3 REPORT
STUDENTS NAME AND NUMBER: EZEOBA CHIDI VINCENT REPORT TITLE:software development for company X
1. RESEACH AIM OR PROJECT AIM 4. METHODOLOGY
A scoping study that helps determine the requirements or the project for app development requirment elicitation menthod which includes
a. interviews
2. OBJECTIVES b. questionnairs
a. identifing the needed requirments to be utilized in the development of mobile B2B personal observation
b. identifying particulars as it concerns food industry c.brainstorming
c.a system environmental analysis, risk analysis will be conducted
d. conduction of project time planning and life cycle cost analysis 5.CONTRIBUTION
a. case study from previous executed projects
3. SUPPORTING EVIDENCE b.industry research
a. market analysis c.meeting clients requirement
b.consultation with project owners
c. brainstorming