SlideShare a Scribd company logo
1 of 14
The role and decompesition of
Delivery Quality in a Failing Project,
a Case Study
IASTED SE 2016, Innsbruck
Jaap van Ekris, Senior Consultant
J.vanEkris@Delta-Pi.nl
Project success
• Narrow definition:
– Time, Budget and Product
• Wider definitions:
– Include Customer Satisfaction
– Include Rebuy Intentions
“Rebuy Intentions” is a tough goal
Factors in Rebuy Intentions
Delivery Quality
Product Quality
Functionality
A decomposition of Delivery Quality
• Extended SERVQUAL decomposes delivery quality as:
– Reliability, The supplier keeps his promises;
– Empathy, The supplier understands the industry, actively
thinks about the solution for the specific customer;
– Partnership, The supplier actively strives for the same
goals as his customer;
– Responsiveness, The supplier responds quickly to
questions and change requests;
– Knowledgeable acting, The supplier has a good reputation
and shows its technical experience;
– Tangibles, documents and materials look good.
A Failing Project
• Replacement of a mission critical system
• COTS product, developed by a highly
specialised company
• During the implementation of the product,
the project was aborted due to product
instability
Critical Incidents identified
- Product Instability
+ High commitment of support personnel
+ Excellent domain knowledge
- Inadequate fixes in production environment
- Lack of Transparency about architecture
problems
Attribution of “Commitment Personnel”
Respondent Attribution
A Mentioned in the CIT, attributed to Partnership
B Mentioned in the CIT, attributed to Partnership
C Mentioned in the CIT, attributed to Partnership
D Mentioned in the CIT, attributed to Partnership
E Not mentioned
G Mentioned in the CIT, attributed to Partnership
A higher bar for “Partnership”
• The supplier strives for the same goals as the
customer
• The respondents clearly expected the supplier
to stand behind his product, and do whatever
it takes to let the product succeed at the
customers’ site
Attribution of “Inadequate Fixes”
Respondent Attribution
A Mentioned in the CIT, attributed to Responsiveness
B Mentioned in the CIT, attributed to Responsiveness
C Mentioned in interview, attributed to Responsiveness
D Mentioned in interview, attributed to Responsiveness
E Mentioned in interview, attributed to Responsiveness
G Mentioned in interview, attributed to Responsiveness
A twist to “Responsiveness”
• The supplier responds quickly to questions
and change requests
• The respondents clearly expected some
effectiveness of the quick response as well
Attribution of “Lack of Transparancy”
Respondent Attribution
A Mentioned in the CIT, not attributed
B Mentioned in interview, not attributed
C Mentioned in interview, not attributed
D Mentioned in the CIT, not attributed
E Suggested at interview, not attributed
G Not mentioned
The Impact of “Lack of Transparency”
The lack of transparency triggered a loss of trust in the
developer.
2 out of 6 respondents indicated that being more
transparent throughout the project:
• The customer would have allowed for more repairs
• The customer would have financially contributed to
refactoring/reengineering
• The project could have delivered a functioning product
in the end
Conclusions
• Improvements to the Extended SERVQUAL model:
– “Partnership” contains a notion of taking responsibility for
the products’ effects on the customers’ process
– “Responsiveness” contains a notion of effectiveness
– “Transparency” is a missing factor
• Delivery Quality can influence project outcome, even
when the product fails. It might buy enough time to
avert project abortion.
• A lack of Transparency can terminate a project, but
some customers rather live in the bliss of ignorance

More Related Content

What's hot

Lynnea Wells - Resume - June 2015
Lynnea Wells - Resume - June 2015Lynnea Wells - Resume - June 2015
Lynnea Wells - Resume - June 2015Lynnea Wells
 
Five Ways To Overcome Project Management Challenge
Five Ways To Overcome Project Management Challenge Five Ways To Overcome Project Management Challenge
Five Ways To Overcome Project Management Challenge Rock Interview
 
Understanding requirements
Understanding requirementsUnderstanding requirements
Understanding requirementsTASKTC
 
Avoiding Dental Construction Disasters
Avoiding Dental Construction DisastersAvoiding Dental Construction Disasters
Avoiding Dental Construction DisastersKimberlyFullerCMP
 
Lemon Framework For Balsamiq
Lemon Framework For BalsamiqLemon Framework For Balsamiq
Lemon Framework For BalsamiqVC Web Design
 
Test Missions as Requirements
Test Missions as RequirementsTest Missions as Requirements
Test Missions as RequirementsJohan Hoberg
 
Role of high-level project professionals perceptions on quality processes in ...
Role of high-level project professionals perceptions on quality processes in ...Role of high-level project professionals perceptions on quality processes in ...
Role of high-level project professionals perceptions on quality processes in ...Tristan Wiggill
 
KCDC - Live & Breath Agile
KCDC - Live & Breath AgileKCDC - Live & Breath Agile
KCDC - Live & Breath AgileShahzad Zafar
 
Engineering sourcing
Engineering sourcingEngineering sourcing
Engineering sourcingjoxenby
 
Value Engineering, What's not to love?
Value Engineering, What's not to love?Value Engineering, What's not to love?
Value Engineering, What's not to love?Nick Grant
 
Innovation Managemet Amman
Innovation Managemet AmmanInnovation Managemet Amman
Innovation Managemet AmmanQRCE
 
Senior Management Review (SMR) - Key pointers slideshare
Senior Management Review (SMR) - Key pointers   slideshareSenior Management Review (SMR) - Key pointers   slideshare
Senior Management Review (SMR) - Key pointers slideshareChannaveer Patil
 

What's hot (20)

Lynnea Wells - Resume - June 2015
Lynnea Wells - Resume - June 2015Lynnea Wells - Resume - June 2015
Lynnea Wells - Resume - June 2015
 
Five Ways To Overcome Project Management Challenge
Five Ways To Overcome Project Management Challenge Five Ways To Overcome Project Management Challenge
Five Ways To Overcome Project Management Challenge
 
Understanding requirements
Understanding requirementsUnderstanding requirements
Understanding requirements
 
Free PMP Sample Q & A
Free PMP Sample Q & AFree PMP Sample Q & A
Free PMP Sample Q & A
 
Establishing Reliability Goals
Establishing Reliability GoalsEstablishing Reliability Goals
Establishing Reliability Goals
 
Free PMP Sample Q & A
Free PMP Sample Q & AFree PMP Sample Q & A
Free PMP Sample Q & A
 
Avoiding Dental Construction Disasters
Avoiding Dental Construction DisastersAvoiding Dental Construction Disasters
Avoiding Dental Construction Disasters
 
Lemon Framework For Balsamiq
Lemon Framework For BalsamiqLemon Framework For Balsamiq
Lemon Framework For Balsamiq
 
Test Missions as Requirements
Test Missions as RequirementsTest Missions as Requirements
Test Missions as Requirements
 
Role of high-level project professionals perceptions on quality processes in ...
Role of high-level project professionals perceptions on quality processes in ...Role of high-level project professionals perceptions on quality processes in ...
Role of high-level project professionals perceptions on quality processes in ...
 
Free PMP Sample Q & A
Free PMP Sample Q & AFree PMP Sample Q & A
Free PMP Sample Q & A
 
Free PMP Sample Q & A
Free PMP Sample Q & AFree PMP Sample Q & A
Free PMP Sample Q & A
 
KCDC - Live & Breath Agile
KCDC - Live & Breath AgileKCDC - Live & Breath Agile
KCDC - Live & Breath Agile
 
Engineering sourcing
Engineering sourcingEngineering sourcing
Engineering sourcing
 
Value Engineering, What's not to love?
Value Engineering, What's not to love?Value Engineering, What's not to love?
Value Engineering, What's not to love?
 
Innovation Managemet Amman
Innovation Managemet AmmanInnovation Managemet Amman
Innovation Managemet Amman
 
Free PMP Sample Q & A
Free PMP Sample Q & AFree PMP Sample Q & A
Free PMP Sample Q & A
 
Senior Management Review (SMR) - Key pointers slideshare
Senior Management Review (SMR) - Key pointers   slideshareSenior Management Review (SMR) - Key pointers   slideshare
Senior Management Review (SMR) - Key pointers slideshare
 
PMP® Sample Questions 6
PMP® Sample Questions 6PMP® Sample Questions 6
PMP® Sample Questions 6
 
Webinar on Perform Integrated Change Control - PMP
Webinar on Perform Integrated Change Control - PMPWebinar on Perform Integrated Change Control - PMP
Webinar on Perform Integrated Change Control - PMP
 

Viewers also liked

2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…Jaap van Ekris
 
What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)Jaap van Ekris
 
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...Jaap van Ekris
 
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijkJaap van Ekris
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven designJaap van Ekris
 
2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheidJaap van Ekris
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Jaap van Ekris
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Jaap van Ekris
 
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Jaap van Ekris
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
 

Viewers also liked (13)

2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
 
What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)
 
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
 
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven design
 
2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
 
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 

Similar to 2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery quality in a failing project, a case study

Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...
Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...
Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...Lviv Startup Club
 
Building castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBuilding castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBohitesh Misra, PMP
 
Using Agile in Non-Ideal Situations
Using Agile in Non-Ideal SituationsUsing Agile in Non-Ideal Situations
Using Agile in Non-Ideal SituationsSynerzip
 
Lecture Presentation on Project Proposal
Lecture Presentation on Project ProposalLecture Presentation on Project Proposal
Lecture Presentation on Project ProposalJo Balucanag - Bitonio
 
Knowledge-Driven Support
Knowledge-Driven SupportKnowledge-Driven Support
Knowledge-Driven SupportLala Mamedov
 
Traditional Project management vs Agile project management.pptx
Traditional Project management vs Agile project management.pptxTraditional Project management vs Agile project management.pptx
Traditional Project management vs Agile project management.pptxAkshayKhairnar16
 
IIBA SVC - BSC - Poster Walk Slides.pdf
IIBA SVC - BSC - Poster Walk Slides.pdfIIBA SVC - BSC - Poster Walk Slides.pdf
IIBA SVC - BSC - Poster Walk Slides.pdfJessiannSalesPerson
 
Agile Implementation
Agile ImplementationAgile Implementation
Agile ImplementationOlga Sa
 
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...Lviv Startup Club
 
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...Lviv Startup Club
 
The Agile BA (Business Analyst)
The Agile BA (Business Analyst)The Agile BA (Business Analyst)
The Agile BA (Business Analyst)Quang Ngoc
 
Eliminate Bottlenecks in Software Development & Delivery
Eliminate Bottlenecks in Software Development & DeliveryEliminate Bottlenecks in Software Development & Delivery
Eliminate Bottlenecks in Software Development & DeliveryMicro Focus
 
Projects2016_Franks_Top10ReasonsProjectsFail
Projects2016_Franks_Top10ReasonsProjectsFailProjects2016_Franks_Top10ReasonsProjectsFail
Projects2016_Franks_Top10ReasonsProjectsFailBarbara Franks
 
Why Training Projects Fail:How to Recover
Why Training Projects Fail:How to RecoverWhy Training Projects Fail:How to Recover
Why Training Projects Fail:How to RecoverDavid Goodman
 
Resume Return to Basicspublic
Resume Return to BasicspublicResume Return to Basicspublic
Resume Return to BasicspublicCatherine Neary
 
Understanding Agile 11x17
Understanding Agile 11x17Understanding Agile 11x17
Understanding Agile 11x17Nigel Thurlow
 

Similar to 2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery quality in a failing project, a case study (20)

Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...
Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...
Андрій Просов "Fixed Price Agile Projects: Challenges for Project Manager" Kh...
 
Building castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBuilding castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environment
 
Using Agile in Non-Ideal Situations
Using Agile in Non-Ideal SituationsUsing Agile in Non-Ideal Situations
Using Agile in Non-Ideal Situations
 
Lecture Presentation on Project Proposal
Lecture Presentation on Project ProposalLecture Presentation on Project Proposal
Lecture Presentation on Project Proposal
 
Andrii prosov
Andrii prosov Andrii prosov
Andrii prosov
 
Knowledge-Driven Support
Knowledge-Driven SupportKnowledge-Driven Support
Knowledge-Driven Support
 
Traditional Project management vs Agile project management.pptx
Traditional Project management vs Agile project management.pptxTraditional Project management vs Agile project management.pptx
Traditional Project management vs Agile project management.pptx
 
IIBA SVC - BSC - Poster Walk Slides.pdf
IIBA SVC - BSC - Poster Walk Slides.pdfIIBA SVC - BSC - Poster Walk Slides.pdf
IIBA SVC - BSC - Poster Walk Slides.pdf
 
Pm training day 3
Pm training   day 3Pm training   day 3
Pm training day 3
 
Agile Implementation
Agile ImplementationAgile Implementation
Agile Implementation
 
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...
Андрій Просов: Managing Client Expectations in Fixed Price Agile Projects by ...
 
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...
Андрій Просов “Управління очікуваннями клієнтів в проектах з використанням гн...
 
The Agile BA (Business Analyst)
The Agile BA (Business Analyst)The Agile BA (Business Analyst)
The Agile BA (Business Analyst)
 
Session 4 gdas pmp study group presentation
Session 4   gdas pmp study group presentationSession 4   gdas pmp study group presentation
Session 4 gdas pmp study group presentation
 
Eliminate Bottlenecks in Software Development & Delivery
Eliminate Bottlenecks in Software Development & DeliveryEliminate Bottlenecks in Software Development & Delivery
Eliminate Bottlenecks in Software Development & Delivery
 
How to close a project
How to close a projectHow to close a project
How to close a project
 
Projects2016_Franks_Top10ReasonsProjectsFail
Projects2016_Franks_Top10ReasonsProjectsFailProjects2016_Franks_Top10ReasonsProjectsFail
Projects2016_Franks_Top10ReasonsProjectsFail
 
Why Training Projects Fail:How to Recover
Why Training Projects Fail:How to RecoverWhy Training Projects Fail:How to Recover
Why Training Projects Fail:How to Recover
 
Resume Return to Basicspublic
Resume Return to BasicspublicResume Return to Basicspublic
Resume Return to Basicspublic
 
Understanding Agile 11x17
Understanding Agile 11x17Understanding Agile 11x17
Understanding Agile 11x17
 

More from Jaap van Ekris

2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giantsJaap van Ekris
 
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebbenJaap van Ekris
 
2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festivalJaap van Ekris
 
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequentiesJaap van Ekris
 
TOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingTOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingJaap van Ekris
 
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Jaap van Ekris
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Jaap van Ekris
 
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 72010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7Jaap van Ekris
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
 
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemenJaap van Ekris
 
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...Jaap van Ekris
 
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...Jaap van Ekris
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patternsJaap van Ekris
 
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…Jaap van Ekris
 
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?Jaap van Ekris
 
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...Jaap van Ekris
 

More from Jaap van Ekris (16)

2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
 
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
 
2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival
 
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
 
TOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingTOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleiding
 
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
 
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 72010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
 
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
 
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
 
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
 
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
 
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery quality in a failing project, a case study

  • 1. The role and decompesition of Delivery Quality in a Failing Project, a Case Study IASTED SE 2016, Innsbruck Jaap van Ekris, Senior Consultant J.vanEkris@Delta-Pi.nl
  • 2. Project success • Narrow definition: – Time, Budget and Product • Wider definitions: – Include Customer Satisfaction – Include Rebuy Intentions
  • 4. Factors in Rebuy Intentions Delivery Quality Product Quality Functionality
  • 5. A decomposition of Delivery Quality • Extended SERVQUAL decomposes delivery quality as: – Reliability, The supplier keeps his promises; – Empathy, The supplier understands the industry, actively thinks about the solution for the specific customer; – Partnership, The supplier actively strives for the same goals as his customer; – Responsiveness, The supplier responds quickly to questions and change requests; – Knowledgeable acting, The supplier has a good reputation and shows its technical experience; – Tangibles, documents and materials look good.
  • 6. A Failing Project • Replacement of a mission critical system • COTS product, developed by a highly specialised company • During the implementation of the product, the project was aborted due to product instability
  • 7. Critical Incidents identified - Product Instability + High commitment of support personnel + Excellent domain knowledge - Inadequate fixes in production environment - Lack of Transparency about architecture problems
  • 8. Attribution of “Commitment Personnel” Respondent Attribution A Mentioned in the CIT, attributed to Partnership B Mentioned in the CIT, attributed to Partnership C Mentioned in the CIT, attributed to Partnership D Mentioned in the CIT, attributed to Partnership E Not mentioned G Mentioned in the CIT, attributed to Partnership
  • 9. A higher bar for “Partnership” • The supplier strives for the same goals as the customer • The respondents clearly expected the supplier to stand behind his product, and do whatever it takes to let the product succeed at the customers’ site
  • 10. Attribution of “Inadequate Fixes” Respondent Attribution A Mentioned in the CIT, attributed to Responsiveness B Mentioned in the CIT, attributed to Responsiveness C Mentioned in interview, attributed to Responsiveness D Mentioned in interview, attributed to Responsiveness E Mentioned in interview, attributed to Responsiveness G Mentioned in interview, attributed to Responsiveness
  • 11. A twist to “Responsiveness” • The supplier responds quickly to questions and change requests • The respondents clearly expected some effectiveness of the quick response as well
  • 12. Attribution of “Lack of Transparancy” Respondent Attribution A Mentioned in the CIT, not attributed B Mentioned in interview, not attributed C Mentioned in interview, not attributed D Mentioned in the CIT, not attributed E Suggested at interview, not attributed G Not mentioned
  • 13. The Impact of “Lack of Transparency” The lack of transparency triggered a loss of trust in the developer. 2 out of 6 respondents indicated that being more transparent throughout the project: • The customer would have allowed for more repairs • The customer would have financially contributed to refactoring/reengineering • The project could have delivered a functioning product in the end
  • 14. Conclusions • Improvements to the Extended SERVQUAL model: – “Partnership” contains a notion of taking responsibility for the products’ effects on the customers’ process – “Responsiveness” contains a notion of effectiveness – “Transparency” is a missing factor • Delivery Quality can influence project outcome, even when the product fails. It might buy enough time to avert project abortion. • A lack of Transparency can terminate a project, but some customers rather live in the bliss of ignorance