A Systematic Methodology and Guidelines for Software Project Manager to Identify Key Stakeholders
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Involving as many as possible of those who may be affected by or have an effect on any software project will lead to a better understanding, better process, greater community support as well as a more effective system. In order to gain all the advantages it brings to figure out who the stakeholders are, what are their roles and requirements and analyze them to identify which of them need to be involved at what level. Stakeholder analysis recognized the existence of a range of stakeholders and acknowledges that some stakeholders are more important than others, those are known as key stakeholders.When a project is carried out in a larger environment or greater range including various sections there need to analyze several facts and the complexity of that environment makes the task extremely critical. Different researcher uses stakeholder analysis for different purposes. But there have some lacks and in general there have no systematic methodologies which assist a software project manager to analyze and identify the key stakeholders. This study proposes a methodology that will assist a software project manager to identify the key stakeholders by analyzing them on the basis of their classification and impact on the project.
Authors and Affiliations
Md. Mijanur Rahman, Mt. Musfika Moonira and Fatema T. Zuhora
Shared Assessing For Distributed Data with Proficient Client Revocation in Cloud
Cloud gives administrations like information stockpiling and information partaking in a gathering. Clients can remotely store their information on cloud and appreciate the on-interest brilliant applications and admin...
Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms
Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarcha...
A Novel Symmetric Key Cryptography Algorithm for Improving Privacy of Data in Cloud Servers
In this paper, a cryptography technique, Novel Symmetric Key Cryptography algorithm is used to improve the data security and access control in the environment of Cloud Computing. The users upload the personal data ov...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...