|Appears in Collections:||Management, Work and Organisation Journal Articles|
|Peer Review Status:||Refereed|
|Title:||Questioning the Key Techniques Underlying the Iterative and Incremental Approach to Information Systems Development|
|Author(s):||Yu, Angus Gonghua|
|Keywords:||incremental and iterative approach|
|Citation:||Yu AG (2010) Questioning the Key Techniques Underlying the Iterative and Incremental Approach to Information Systems Development, International Journal of Information Technology Project Management, 1 (1), pp. 15-29.|
|Abstract:||The iterative and incremental development (IID) approach is widely adopted in information systems development (ISD) projects. While the IID approach has played an important role the management of many ISD projects, some of the key techniques have not received critical appraisal from the academic community. This paper aims to fill the gap and examines three such techniques through a case study. First of all, the gap between the theory of user participation and the reality of user’s lack of real influence on design and development is explored The author proposes the concept of “participatory capture” to explain the side effect of user participation. Secondly, the assumption that evolutionary prototyping converges to a successful design is questioned. Thirdly, the side effect of the timeboxing technique is considered. The paper suggests that the IID approach represents the learning approach as categorized in Pich et al. (2002) and it might be ineffective in dealing with the significant uncertainties in ISD projects.|
|Rights:||The publisher has not yet responded to our queries therefore this work cannot be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author; you can only request a copy if you wish to use this work for your own research or private study.|
|Questioning the key technique underlying the iterative.pdf||158.33 kB||Adobe PDF||Under Permanent Embargo Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.