A Systematic Methodology and Guidelines for Software Project Manager to Identify Key Stakeholders
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Involving as many as possible of those who may be affected by or have an effect on any software project will lead to a better understanding, better process, greater community support as well as a more effective system. In order to gain all the advantages it brings to figure out who the stakeholders are, what are their roles and requirements and analyze them to identify which of them need to be involved at what level. Stakeholder analysis recognized the existence of a range of stakeholders and acknowledges that some stakeholders are more important than others, those are known as key stakeholders.When a project is carried out in a larger environment or greater range including various sections there need to analyze several facts and the complexity of that environment makes the task extremely critical. Different researcher uses stakeholder analysis for different purposes. But there have some lacks and in general there have no systematic methodologies which assist a software project manager to analyze and identify the key stakeholders. This study proposes a methodology that will assist a software project manager to identify the key stakeholders by analyzing them on the basis of their classification and impact on the project.
Authors and Affiliations
Md. Mijanur Rahman, Mt. Musfika Moonira and Fatema T. Zuhora
DESIGN AND IMPLEMENTATION OF ARM INTELLIGENT MONITORING SYSTEM USING ZIGBEE
In this paper the research method of Laboratory Intelligent monitoring System based on Zigbee is elaborated, and the hardware design and software design are discussed. Sensors controlling board collect the data to we...
K-Medoid Clustering Shows Negative Impact In Missing Data Imputation
Missing Data Imputation imputes the missing values from the known values. Rather than imputing from the whole dataset, imputation techniques are applied in the clusters generated by using clustering algorithm. In this...
Empowering the Privacy in Online Social Networks
Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...
A New Data Driven Model For Bigdata Using Datamining
Data mining is extension to data warehouse which derives useful patterns help us to take decision’s for business growth .but present volume of data increased comes from different sources along with complex relationsh...
EEG and Picture Based Brain Controlled Pic and Place Robot for Paralyzed Patients
This anticipate talked about around a cerebrum controlled biometric in light of Brain–computer interfaces (BCI). BCIs are frameworks that can sidestep traditional channels of correspondence (i.e., muscles and thought...