Stage-oe-small.jpg

Neuer Forschungsartikel im Journal of Information Technology veröffentlicht

Aus Aifbportal
Wechseln zu:Navigation, Suche

11.06.2018

Der Artikel "How do requirements evolve over time? A case study investigating the role of context and experiences in the evolution of enterprise software requirements" von Stephan Schneider, Jan Wollersheim, Helmut Krcmar und Ali Sunyaev wurde heute im Journal of Information Technology (JIT) als Open Access veröffentlicht.

Kurzzusammenfassung:
In recent years, organizations have increasingly sourced cloud-based enterprise software (ES). Although comprehensively capturing organizations’ requirements considerably affects the success of an ES sourcing project, little is known about how requirements evolve beyond the implementation. We conduct a longitudinal, exploratory single-case study of the life cycle of cloud-based ES in a medium-sized organization. Over 5 years, we trace the evolution of requirements throughout the ES life cycle, beginning with the initial adoption decision and ending with considerations to retire the ES. We develop a process theory that explains how requirements evolve beyond ES implementation and throughout its life cycle. We isolate nine mechanisms that explain how contextual factors and experiences are intertwined and shape the evolution of requirements. We then develop seven propositions that explain how sourcing cloud-based ES alters the mechanisms that shape the evolution of requirements. Our findings emphasize that the evolution of requirements for cloud-based ES follows similar mechanisms to that of the requirements for on-premises ES but changes how particular mechanisms manifest. Sourcing cloud-based ES changes the influence of business divisions in acquisition and configuration activities, the role of upgrade and customization procedures, and the influence of the ES’ ecosystem.

Link zum Open Access Artikel: https://doi.org/10.1057/s41265-016-0001-y

Schneider, S., Wollersheim, J., Krcmar, H. et al. J Inf Technol (2018) 33: 151. https://doi.org/10.1057/s41265-016-0001-y

« Zurück zu Critical Information Infrastructures