SlideShare a Scribd company logo
1 of 7
Download to read offline
IJAPRR Page 29
International Journal of Allied Practice, Research and Review
Website: www.ijaprr.com (ISSN 2350-1294)
Software Risk Factors in Developing E-Governance
Projects
Ms. Harmeet Malhotra
Associate Professor, Computer Science Department, IITM (Affiliated to GGSIPU)
Abstract- Software application development is a complex process that goes through various stages. Huge investments are
being made in developing such applications and if these are developed for government organizations and citizens of the
country then the reliability becomes the foremost factor. The more critical the application is the more risks are there. This
paper discusses the various risks related to various phases of software development life cycle. The challenges that are to be
faced by the development team whether it is related to data capturing or testing and implementation of such applications
need to be handled.
Keywords: E-Governance; software risk management; Information Technology; Software development cycle,
I. INTRODUCTION
The technological innovations and up gradations have led to the emergence of e-governance
projects all over the world. In order to give citizens maximum comfort in availing the services and that
too with minimum cost and effort, the government and other organizations are making use of ICT in
developing such projects. They are investing huge amount of money in such projects so as to connect to
citizens not only in urban but rural areas also in India. People living in rural areas are not technology
savvy and their literacy rate is also low. Therefore, efforts are being made to uplift them by providing
them necessary inputs as and when required with the help of Information and Communication
Technology. Long queues in government offices like passport office, driving license office, etc, lot of
documents in the form of physical files, registers, etc and many other issues pertaining to corruption and
other aspects have been controlled with such e-governance applications and websites. Many IT companies
like HCL, IBM, Infosys, etc are involved in this initiative of government in developing applications for
various government departments thereby helping them in efficient functioning and handling of day-to-day
operations.
IJAPRR Page 30
The development of e-governance projects where lot of investment is required is not an easy task.
Lot of members are involved in developing such applications, few of them are technical staff,
departmental staff and sometimes third party consultants are also hired so as to give maximum out of
these projects. The software development processes, metrics, testing and quality assurance tools and
techniques being used are to be chosen in very efficient manner so as to reduce the maintenance cost and
risk factor. The risks involved at each phase of software development life cycle need to be considered,
evaluated and prioritized for the successful implementation of projects. Not only development processes
but preparation of manuals and the documentation part are also very crucial for the maintenance of
software applications. These risks can be both technical and non-technical risks. Proper feasibility should
be conducted before initiating a particular project. The issues pertaining to technological feasibility,
economic feasibility, operational and legal feasibility need to be considered. The evaluation should be
done on each project and cost benefit analysis should be conducted along with SWOT analysis.
II. ANALYSIS RELATED RISK
The e-governance projects involve various types of risks which are discussed as follows:-
 Unclear problem definition – Unclear and improper definition of problem statement, goals and
objectives of e-governance projects to be undertaken is a major risk in developing any kind of IT related
projects.
 Ambiguity in understanding the goal and objective of the project – Various stakeholders might
interpret the goals in a different way that might lead to conflicts in further stages of project development
lifecycle.
 Inappropriate tools and methods of data gathering – Methodologies and techniques used for
information gathering related to the project must be selected properly. Since the data required for such
projects is very crucial and huge in volume so collecting such information requires appropriate
methodologies to be used keeping in mind the security, political and legal aspect also.
 Lacunas in conducting operational, technical, economical and legal feasibility study – Such a
huge investment is required in developing these applications so this aspect should be given utmost
importance.
 Incomplete or inaccurate Software Requirement Specification (SRS) documentation – SRS works
as an agreement between the development team and government department or organization for which the
project is being developed. If this agreement is incomplete or inappropriate, the further development may
not be correct and lead to failure of the project.
IJAPRR Page 31
III. DESIGN RELATED RISKS
 Inefficient design model – The pictorial representation for depicting actors involved, processes,
input-output, data flow among processes, etc should be made very clearly in order to increase the
understanding of the system. Thus, data flow diagrams, entity relationship diagrams and other UML
diagrams should be made keeping in mind all the factors involved in the project.
 Inconsistency in flow of data – The flow of data from one or more sources is being transformed
into output or stored in data stores after processing is being done. Any inconsistency in flow of data and
information may be risky and affect the success of the system.
 Inadequate designing of input screens/output reports – The format of data entry screens should be
user friendly and the chances of wrong entry of data should be minimal. The selection of GUI controls
being used in designing these screens should be done with utmost care. Like calendar controls can be used
wherever date has to be accepted, timer control can be used wherever necessary, and so on. Similarly, the
report format should also try to give the information in clear and precise terms that is easily
understandable by the end user and would help the user in decision making also.
 Un-normalized database – The database design should be made keeping in mind all the aspects
such as data redundancy, inconsistency, update or other anomalies, locking techniques and so on. The
DBA must be able to handle this data in an efficient manner because the volume and confidentiality of
this data is much more than other general applications.
IV. IMPLEMENTATION AND TESTING RELATED RISKS
 Language barrier – India is a country with different states having different languages and
cultures. So developing an application which can be used by all may require certain language translators.
If these translators are not incorporated properly in these projects, then there might be a risk of its usage
by only few sections of the society thereby overcoming the benefits with respect to investment done on
such projects.
 Lack of experienced development team – The development team of such projects comprising of
analysts, programmers, testers, quality analysts, etc must have expertise in the languages, tools and
techniques being used in developing such projects
The risk factors involved in these projects may lead to further success or failure of the
application. The more the preventive measures taken to avoid the risks, the less will be the chances of its
failure. Risk can be correlated with two major software attributes: maintainability and reliability.
Maintenance
Effort
R
i
s
k
Reliability
R
i
s
k
IJAPRR Page 32
The more the risk assessment and preventive measures taken the more will be the reliability of the
software. But if not done thoroughly it would be inversely proportional. Similarly if risks are more the
maintenance will also become difficult. Thus risk factor is directly proportional to maintenance.
Fig 1: Categorization of software development risks
IJAPRR Page 33
The main challenges in identifying the risks and doing the risk analysis are:-
i) Knowledge about the domain area
ii) Soft-gap between technology and governmental/political issues
iii) Availability of tools for measuring performance of such integrated applications.
iv) Preparing risk analysis document
v) Incorporating change management into risk analysis and prevention
vi) Continuous monitoring, controlling of the progress and impelentation of such huge and complex
projects.
vii) Time, resources and cost constraint
viii) Promoting the application and motivating the end user to take maximum benefit out of it
ix) Proper interpretation of user requirements and getting the consent of all government departments
and other stakeholders
x) Security of confidential data and handling of privacy issues as per cyber laws
V. MEASURES TO MINIMIZE THE TECHNOLOGICAL RISKS
While developing the e-governance projects various issues need to be addressed at earlier stages
of development only. The more preventive measures we will take the lesser the chances of failure. Both,
the hard and soft gaps need to be taken care of because in reality the government organizations are more
considered about the soft factors like people, politics, human culture, etc rather than the hard ideas related
to technology, engineering and so on. Similarly, on the other hand IT application designers are more
concerned about technologies and the government organization culture. So, in order to develop an e-
governance application this gap has to mend and both sides perspective need to be understood.
The first and foremost thing that is very important is the quality of project documentation that is
being developed throughout the software development life cycle. These documents are of utmost
importance because all the stakeholders will be referring them every now and then whether they are the
developers, testers, analysts, maintenance team or government officials and the end users. Each and every
term, data field, code, etc used in the project must be defined in these manuals so that at the time of
maintenance they could be referred and updations can be made easily. Moreover, if required, while
integrating its components with some other projects, it becomes easier if well documented.
Second major issue that needs to be addressed is the priority setting in project building. All the
features and functionalities must be prioritized in order to ensure that the most important functionalities
are given utmost importance in terms of business value and risks and are also completed first. If this
IJAPRR Page 34
aspect is neglected then the development team might increase the risk of failure as emphasis was given to
the low priority features as compared to high priority functionalities. Priority Matrix can be built where
the items of importance can be sorted in an order based on certain criteria and then the rating has to be
done. While deciding the criteria and importance, the end users must also be involved. You can quantify
particular criteria by giving them numerical rankings. But while prioritizing the things the constraints and
other project drivers must be considered such as availability of resources, schedule, cost, expertise, etc.
Thirdly, the integration of software tools should be handled carefully. There tools available are of
diverse technologies and methods and can be from the domain of compilers, code generators,
configuration management tools, testing tools, documentation, etc. Sometimes these tools are from
different vendors so integration of such tools becomes a difficult task. Moreover, it is not necessary that
these tools are compatible with the available hardware and software resources. So while integrating these
tools special measures should be taken regarding the standardisation and compatibility issues as well as
the techniques to be used for testing such applications should be chosen with utmost care. Proper
integration planning should be done and testing of these should be performed. Thus you must identify the
best fit from the pool of applications available.
Fourthly, many challenges are there in prioritizing the risks also. For different stakeholders, the
priority of a particular functionality might be different. So to resolve this priority conflict and come to a
consensus is a major challenge for the development firm. Moreover, the requirements and functionalities
of such large projects would be very large. Addressing all these will require maximum efforts and setting
the priorities would be very difficult. Weighing them against all the criteria set will require time,
resources and budget also which is generally a major constraint in almost all IT projects. Next in this
technological era, the requirements change frequently and so do the functionalities so managing this
change with respect to priority setting is very cumbersome. Lastly, in e-governance projects the
prioritization that is to be done is highly influenced by government agencies and politics may also be
involved so the only subjective and biased approached should not be there.
VI. CONCLUSION
In India, highly qualified expertise in the field of Information Technology is available but the
challenges of e-governance projects requiring lot of investment and knowledge are too high. A
customized approach has to be followed in developing these projects. Managing a project is not just
writing of code rather proper integration of people, technology, business, risk and legal management. The
identification of project risks is not the only task to be performed but analyzing the threats, challenges,
consequences is equally important as preventive measures has to be planned accordingly only.
VII. References
[1] Yan Aihua, “Risk Management in Software Development: A Continuous Process”, IS 6840 Term Paper, Fall November 2008
[2] Firesmith Donald, “Prioritizing Requirements”, Journal of Object Technology, Volume 3, September-October 2004
IJAPRR Page 35
[3] Bannerman, Paul L. "Risk and risk management in software projects: A reassessment." Journal of Systems and Software 81.12
(2008): 2118-2133.
[4] Boudry Elke, Verdegem Pieter, “The Challenge of Technology: Alignment Dynamics in Local Governments”, The Electronic
Journal of e-Government, Volume 10, Issue 2, December 2012
[5] United Nations e-Government Survey 2008 [Online], Available:
http://unpan3.un.org/egovkb/portals/egovkb/Documents/un/2008-Survey/unpan028607.pdf
[6] Li, Jingyue, Odd Petter N. Slyngstad, and Maurizio Morisio. "A state-of-the-Practice Survey of Risk Management in
Development with Off-the-Shelf Software Componenets." IEEE Transactions on Software Engineering, 2008: 271
[7]Subrahmanyam G.V., “Project Management in e-Governance”, Manage India, Issue 6, November 2011

More Related Content

Viewers also liked

Negros cecilia e kyra
Negros cecilia e kyraNegros cecilia e kyra
Negros cecilia e kyra
Argos Santos
 

Viewers also liked (13)

Pantallazos de la web digital loyola
Pantallazos de la web   digital loyola Pantallazos de la web   digital loyola
Pantallazos de la web digital loyola
 
寧舍通訊第4期 Hospicehome Newsletter No.4
寧舍通訊第4期 Hospicehome Newsletter No.4寧舍通訊第4期 Hospicehome Newsletter No.4
寧舍通訊第4期 Hospicehome Newsletter No.4
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
Creativiteit in het onderwijs
Creativiteit in het onderwijsCreativiteit in het onderwijs
Creativiteit in het onderwijs
 
25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveni25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveni
 
27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharam27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharam
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasir24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasir
 
Star Wars VI Erwan Louis
Star Wars VI Erwan LouisStar Wars VI Erwan Louis
Star Wars VI Erwan Louis
 
Negros cecilia e kyra
Negros cecilia e kyraNegros cecilia e kyra
Negros cecilia e kyra
 
Empresa word
Empresa wordEmpresa word
Empresa word
 
Gallatin Heritage Consortium Brochure Summer 2015
Gallatin Heritage Consortium Brochure Summer 2015Gallatin Heritage Consortium Brochure Summer 2015
Gallatin Heritage Consortium Brochure Summer 2015
 
Data mining final project for Influence Adoption
Data mining final project for Influence AdoptionData mining final project for Influence Adoption
Data mining final project for Influence Adoption
 

Similar to 31 ijaprr vol1-4-29-35harmeet

A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI EnvironmentA Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
AIRCC Publishing Corporation
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
ijcsit
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
AIRCC Publishing Corporation
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa upload
plpictimatec
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
IOSRjournaljce
 
Mobile App Part 1.15Project summaryProject requirements.docx
Mobile App Part 1.15Project summaryProject requirements.docxMobile App Part 1.15Project summaryProject requirements.docx
Mobile App Part 1.15Project summaryProject requirements.docx
annandleola
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
ijtsrd
 

Similar to 31 ijaprr vol1-4-29-35harmeet (20)

SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI EnvironmentA Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa upload
 
Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...Challenges of Technology Infrastructure Availability in EGovernance Program I...
Challenges of Technology Infrastructure Availability in EGovernance Program I...
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
 
Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?
 
Mobile App Part 1.15Project summaryProject requirements.docx
Mobile App Part 1.15Project summaryProject requirements.docxMobile App Part 1.15Project summaryProject requirements.docx
Mobile App Part 1.15Project summaryProject requirements.docx
 
Most severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in KuwaitMost severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in Kuwait
 
Operational risk in IT project
Operational risk in IT projectOperational risk in IT project
Operational risk in IT project
 
Acc 310
Acc 310Acc 310
Acc 310
 
Risk Organization for ERP Projects
Risk Organization for ERP ProjectsRisk Organization for ERP Projects
Risk Organization for ERP Projects
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
Unveiling the Cost to Build a fintech App Factors, Types, & Challenges
Unveiling the Cost to Build a fintech App Factors, Types, & ChallengesUnveiling the Cost to Build a fintech App Factors, Types, & Challenges
Unveiling the Cost to Build a fintech App Factors, Types, & Challenges
 
Dmytro Khudenko: The Future of Project Management Systems: Trends and Predict...
Dmytro Khudenko: The Future of Project Management Systems: Trends and Predict...Dmytro Khudenko: The Future of Project Management Systems: Trends and Predict...
Dmytro Khudenko: The Future of Project Management Systems: Trends and Predict...
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
 
Proposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projectsProposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projects
 

More from ijaprr_editor

More from ijaprr_editor (20)

32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42ramesh32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42ramesh
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabi28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabi
 
26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveen26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveen
 
23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqra23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqra
 
22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babita22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babita
 
21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juni21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juni
 
20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tushar20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tushar
 
19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandey19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandey
 
Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1
 
Ijaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shaileshIjaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shailesh
 
Ijaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmiIjaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmi
 
Ijaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshivIjaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshiv
 
Ijaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawarIjaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawar
 
Ijaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinderIjaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinder
 
Ijaprr vol1-2-12-47-59ajizahmad
Ijaprr vol1-2-12-47-59ajizahmadIjaprr vol1-2-12-47-59ajizahmad
Ijaprr vol1-2-12-47-59ajizahmad
 
Ijaprr vol1-2-11-6-41-46drjohnson
Ijaprr vol1-2-11-6-41-46drjohnsonIjaprr vol1-2-11-6-41-46drjohnson
Ijaprr vol1-2-11-6-41-46drjohnson
 
Studies on production and total phenol content (TPC) of leaf biomass of the s...
Studies on production and total phenol content (TPC) of leaf biomass of the s...Studies on production and total phenol content (TPC) of leaf biomass of the s...
Studies on production and total phenol content (TPC) of leaf biomass of the s...
 
Ijaprr vol1-2-9-29-32ppsarwade
Ijaprr vol1-2-9-29-32ppsarwadeIjaprr vol1-2-9-29-32ppsarwade
Ijaprr vol1-2-9-29-32ppsarwade
 
Ijaprr vol1-2-8-20-28manjoos
Ijaprr vol1-2-8-20-28manjoosIjaprr vol1-2-8-20-28manjoos
Ijaprr vol1-2-8-20-28manjoos
 

Recently uploaded

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 

31 ijaprr vol1-4-29-35harmeet

  • 1. IJAPRR Page 29 International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor, Computer Science Department, IITM (Affiliated to GGSIPU) Abstract- Software application development is a complex process that goes through various stages. Huge investments are being made in developing such applications and if these are developed for government organizations and citizens of the country then the reliability becomes the foremost factor. The more critical the application is the more risks are there. This paper discusses the various risks related to various phases of software development life cycle. The challenges that are to be faced by the development team whether it is related to data capturing or testing and implementation of such applications need to be handled. Keywords: E-Governance; software risk management; Information Technology; Software development cycle, I. INTRODUCTION The technological innovations and up gradations have led to the emergence of e-governance projects all over the world. In order to give citizens maximum comfort in availing the services and that too with minimum cost and effort, the government and other organizations are making use of ICT in developing such projects. They are investing huge amount of money in such projects so as to connect to citizens not only in urban but rural areas also in India. People living in rural areas are not technology savvy and their literacy rate is also low. Therefore, efforts are being made to uplift them by providing them necessary inputs as and when required with the help of Information and Communication Technology. Long queues in government offices like passport office, driving license office, etc, lot of documents in the form of physical files, registers, etc and many other issues pertaining to corruption and other aspects have been controlled with such e-governance applications and websites. Many IT companies like HCL, IBM, Infosys, etc are involved in this initiative of government in developing applications for various government departments thereby helping them in efficient functioning and handling of day-to-day operations.
  • 2. IJAPRR Page 30 The development of e-governance projects where lot of investment is required is not an easy task. Lot of members are involved in developing such applications, few of them are technical staff, departmental staff and sometimes third party consultants are also hired so as to give maximum out of these projects. The software development processes, metrics, testing and quality assurance tools and techniques being used are to be chosen in very efficient manner so as to reduce the maintenance cost and risk factor. The risks involved at each phase of software development life cycle need to be considered, evaluated and prioritized for the successful implementation of projects. Not only development processes but preparation of manuals and the documentation part are also very crucial for the maintenance of software applications. These risks can be both technical and non-technical risks. Proper feasibility should be conducted before initiating a particular project. The issues pertaining to technological feasibility, economic feasibility, operational and legal feasibility need to be considered. The evaluation should be done on each project and cost benefit analysis should be conducted along with SWOT analysis. II. ANALYSIS RELATED RISK The e-governance projects involve various types of risks which are discussed as follows:-  Unclear problem definition – Unclear and improper definition of problem statement, goals and objectives of e-governance projects to be undertaken is a major risk in developing any kind of IT related projects.  Ambiguity in understanding the goal and objective of the project – Various stakeholders might interpret the goals in a different way that might lead to conflicts in further stages of project development lifecycle.  Inappropriate tools and methods of data gathering – Methodologies and techniques used for information gathering related to the project must be selected properly. Since the data required for such projects is very crucial and huge in volume so collecting such information requires appropriate methodologies to be used keeping in mind the security, political and legal aspect also.  Lacunas in conducting operational, technical, economical and legal feasibility study – Such a huge investment is required in developing these applications so this aspect should be given utmost importance.  Incomplete or inaccurate Software Requirement Specification (SRS) documentation – SRS works as an agreement between the development team and government department or organization for which the project is being developed. If this agreement is incomplete or inappropriate, the further development may not be correct and lead to failure of the project.
  • 3. IJAPRR Page 31 III. DESIGN RELATED RISKS  Inefficient design model – The pictorial representation for depicting actors involved, processes, input-output, data flow among processes, etc should be made very clearly in order to increase the understanding of the system. Thus, data flow diagrams, entity relationship diagrams and other UML diagrams should be made keeping in mind all the factors involved in the project.  Inconsistency in flow of data – The flow of data from one or more sources is being transformed into output or stored in data stores after processing is being done. Any inconsistency in flow of data and information may be risky and affect the success of the system.  Inadequate designing of input screens/output reports – The format of data entry screens should be user friendly and the chances of wrong entry of data should be minimal. The selection of GUI controls being used in designing these screens should be done with utmost care. Like calendar controls can be used wherever date has to be accepted, timer control can be used wherever necessary, and so on. Similarly, the report format should also try to give the information in clear and precise terms that is easily understandable by the end user and would help the user in decision making also.  Un-normalized database – The database design should be made keeping in mind all the aspects such as data redundancy, inconsistency, update or other anomalies, locking techniques and so on. The DBA must be able to handle this data in an efficient manner because the volume and confidentiality of this data is much more than other general applications. IV. IMPLEMENTATION AND TESTING RELATED RISKS  Language barrier – India is a country with different states having different languages and cultures. So developing an application which can be used by all may require certain language translators. If these translators are not incorporated properly in these projects, then there might be a risk of its usage by only few sections of the society thereby overcoming the benefits with respect to investment done on such projects.  Lack of experienced development team – The development team of such projects comprising of analysts, programmers, testers, quality analysts, etc must have expertise in the languages, tools and techniques being used in developing such projects The risk factors involved in these projects may lead to further success or failure of the application. The more the preventive measures taken to avoid the risks, the less will be the chances of its failure. Risk can be correlated with two major software attributes: maintainability and reliability. Maintenance Effort R i s k Reliability R i s k
  • 4. IJAPRR Page 32 The more the risk assessment and preventive measures taken the more will be the reliability of the software. But if not done thoroughly it would be inversely proportional. Similarly if risks are more the maintenance will also become difficult. Thus risk factor is directly proportional to maintenance. Fig 1: Categorization of software development risks
  • 5. IJAPRR Page 33 The main challenges in identifying the risks and doing the risk analysis are:- i) Knowledge about the domain area ii) Soft-gap between technology and governmental/political issues iii) Availability of tools for measuring performance of such integrated applications. iv) Preparing risk analysis document v) Incorporating change management into risk analysis and prevention vi) Continuous monitoring, controlling of the progress and impelentation of such huge and complex projects. vii) Time, resources and cost constraint viii) Promoting the application and motivating the end user to take maximum benefit out of it ix) Proper interpretation of user requirements and getting the consent of all government departments and other stakeholders x) Security of confidential data and handling of privacy issues as per cyber laws V. MEASURES TO MINIMIZE THE TECHNOLOGICAL RISKS While developing the e-governance projects various issues need to be addressed at earlier stages of development only. The more preventive measures we will take the lesser the chances of failure. Both, the hard and soft gaps need to be taken care of because in reality the government organizations are more considered about the soft factors like people, politics, human culture, etc rather than the hard ideas related to technology, engineering and so on. Similarly, on the other hand IT application designers are more concerned about technologies and the government organization culture. So, in order to develop an e- governance application this gap has to mend and both sides perspective need to be understood. The first and foremost thing that is very important is the quality of project documentation that is being developed throughout the software development life cycle. These documents are of utmost importance because all the stakeholders will be referring them every now and then whether they are the developers, testers, analysts, maintenance team or government officials and the end users. Each and every term, data field, code, etc used in the project must be defined in these manuals so that at the time of maintenance they could be referred and updations can be made easily. Moreover, if required, while integrating its components with some other projects, it becomes easier if well documented. Second major issue that needs to be addressed is the priority setting in project building. All the features and functionalities must be prioritized in order to ensure that the most important functionalities are given utmost importance in terms of business value and risks and are also completed first. If this
  • 6. IJAPRR Page 34 aspect is neglected then the development team might increase the risk of failure as emphasis was given to the low priority features as compared to high priority functionalities. Priority Matrix can be built where the items of importance can be sorted in an order based on certain criteria and then the rating has to be done. While deciding the criteria and importance, the end users must also be involved. You can quantify particular criteria by giving them numerical rankings. But while prioritizing the things the constraints and other project drivers must be considered such as availability of resources, schedule, cost, expertise, etc. Thirdly, the integration of software tools should be handled carefully. There tools available are of diverse technologies and methods and can be from the domain of compilers, code generators, configuration management tools, testing tools, documentation, etc. Sometimes these tools are from different vendors so integration of such tools becomes a difficult task. Moreover, it is not necessary that these tools are compatible with the available hardware and software resources. So while integrating these tools special measures should be taken regarding the standardisation and compatibility issues as well as the techniques to be used for testing such applications should be chosen with utmost care. Proper integration planning should be done and testing of these should be performed. Thus you must identify the best fit from the pool of applications available. Fourthly, many challenges are there in prioritizing the risks also. For different stakeholders, the priority of a particular functionality might be different. So to resolve this priority conflict and come to a consensus is a major challenge for the development firm. Moreover, the requirements and functionalities of such large projects would be very large. Addressing all these will require maximum efforts and setting the priorities would be very difficult. Weighing them against all the criteria set will require time, resources and budget also which is generally a major constraint in almost all IT projects. Next in this technological era, the requirements change frequently and so do the functionalities so managing this change with respect to priority setting is very cumbersome. Lastly, in e-governance projects the prioritization that is to be done is highly influenced by government agencies and politics may also be involved so the only subjective and biased approached should not be there. VI. CONCLUSION In India, highly qualified expertise in the field of Information Technology is available but the challenges of e-governance projects requiring lot of investment and knowledge are too high. A customized approach has to be followed in developing these projects. Managing a project is not just writing of code rather proper integration of people, technology, business, risk and legal management. The identification of project risks is not the only task to be performed but analyzing the threats, challenges, consequences is equally important as preventive measures has to be planned accordingly only. VII. References [1] Yan Aihua, “Risk Management in Software Development: A Continuous Process”, IS 6840 Term Paper, Fall November 2008 [2] Firesmith Donald, “Prioritizing Requirements”, Journal of Object Technology, Volume 3, September-October 2004
  • 7. IJAPRR Page 35 [3] Bannerman, Paul L. "Risk and risk management in software projects: A reassessment." Journal of Systems and Software 81.12 (2008): 2118-2133. [4] Boudry Elke, Verdegem Pieter, “The Challenge of Technology: Alignment Dynamics in Local Governments”, The Electronic Journal of e-Government, Volume 10, Issue 2, December 2012 [5] United Nations e-Government Survey 2008 [Online], Available: http://unpan3.un.org/egovkb/portals/egovkb/Documents/un/2008-Survey/unpan028607.pdf [6] Li, Jingyue, Odd Petter N. Slyngstad, and Maurizio Morisio. "A state-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Componenets." IEEE Transactions on Software Engineering, 2008: 271 [7]Subrahmanyam G.V., “Project Management in e-Governance”, Manage India, Issue 6, November 2011