Método para la construcción de una taxonomía: estructura base para riesgos en outsourcing de software

  • Gloria Piedad Gasca Hurtado Universidad de Medellín
  • Bell Manrique-Losada Universidad de Medellín

Abstract

Este artículo propone una taxonomía de riesgos enfocada en el ámbito de outsourcing de software. El objetivo es definir una estructura de clasificación de riesgos, relacionada con el proceso de outsourcing de software. La motivación está dada por la importancia que tiene la identificación de riesgos, y la ayuda que prestan las taxonomías al respecto, por lo cual se les conoce como una técnica efectiva que permite desarrollar una mejor gestión de riesgos. Este artículo incluye el método para construir la taxonomía (llamado MECT) y la estructura de una taxonomía de riesgos para outsourcing de software.
|Abstract
= 167 veces | PDF (ESPAÑOL (ESPAÑA))
= 27 veces|

Downloads

Download data is not yet available.

References

R. S. Pressman. Ingeniería de Software. Un enfoque práctico. 6ª ed. Ed. McGraw Hill. Madrid. 2006. pp. 958.

J. Persse. Project Management Success with CMMI. Harlow. Ed. Prentice Hall. 2007. pp. 254.

Software Engineering Institute. CMMI for Acquisition, Version 1.2, CMMI-ACQ V1.2. 2007. Ed. Carnegie Mellon. Pittsburgh. pp. 81 - 392.

Software Engineering Institute. CMMI for Development, Versión 1.2. Software Engineering Institute Carnegie Mellon. Carnegie Mellon. Pittsburgh. 2006. pp. 115- 351.

IEEE Computer Society. A Guide to the Project Management Body of Knowledge, IEEE Guide Adoption of PMI Standard. 2004. pp. 25-187.

K. Dodson, H. Hofmann, G. Ramani, D. Yedlin. “Adapting CMMI for Acquisition Organizations: A Preliminary Report”. SEI. Vol.1. 2006. pp. 8-335.

R. Charette. Software engineering risk analysis and management. Ed. McGraw-Hill. Inc. New York. 1989. pp. 325.

Office of Government Commerce. Managing Successful Projects with PRINCE2:2009. United Kingdom and other countries. 23 September. 2009. pp. 19-51.

R. E. Barbour, M. Carr, A. J. Dorofee, R. P. Higuera, S. L. Konda, S. L. S., J. A. Walker. “Software Acquisition Risk Management Key Process Area (KPA) – A Guidebook Version 1.0”. SEI. Carnegie Mellon University. Vol. 1. 1997. pp. 18.

Y. Y. H. Ronald, P. Higuera. “Software Risk Management”. Carnegie Mellon University, Pittsburgh. 1996. Vol. 1. pp. 19-35.

J. A. Calvo-Manzano, G. Cuevas, G. Gasca, T. A. San Feliu, V. Vega. Revisión Sistemática para la Gestión de Riesgos en la Adquisición de Software. Actas 3ª Conferencia Ibéricas de Sistemas y Tecnologías de la Información. Vol. 1. 2008. pp. 321-334.

J. A. Cooper, M. Fisher. “Software Acquisition Capability Maturity Model v1.03”, Software Engineering Institute Carnegie Mellon. Vol.1. 2002. pp. 2-14.

International Organization for Standarization. Systems and software engineering -Software life cycle processes, ISO/IEC 12207. Vol. 1. 2008. pp. 51-98.

T. Bernard, B. Gallagher, R. A. Bate, H. Wilson. “CMMI Acquisition Module, Version 1.1”. SEI, Carnegie Mellon. Vol. 1. 2005. pp. 11-31.

ITSqC Carnegie Mellon. Comparing the eSCM-CL and CMMI Pittsburgh. Carnegie Meellon University. Vol. 1 2005. pp. 14-19.

R. Singh. “International Standard ISO/IEC 12207 Software Life Cycle Processes”. Federal Aviation Administration. Vol. 1. 1995. pp. 45-53.

J. Van Bon, T. Verheijen. Frameworks for IT Management. 1st ed. Ed. Van Haren Publishing. Amersfoort. 2006. pp. 22-117.

R. T. Futrell, D. F. Shafer, I. L. Shafer. Quality software Project Management. Prentice Hall. United State of Amercia. 2002. pp. 73-178.

Office of Government Commerce. Managing Successful Projects with PRINCE2. 4ª ed. Ed. Stationery Office. 2005. pp. 25-53.

M. J. Carr, S. L. Konda, I. Monarch, F. C. A. Ulrich, C. F. Walker. “Taxonomy-Based Risk Identification”. SEI. Vol. 1. 1993. pp. 7-21.

R. Maria, G. Jose, L. Juan. “El outsourcing de sistemas de información: un estudio descriptivo y longitudinal”. Universia Busness Review. Vol. 1. 2007. pp. 86-103.

J. E. Parra. “Critical Factors of Success and Hypothesis about the Software Industry in Colombia Contextual and Academic Considerations”. Revista de Avances en Sistemas e Informática. Vol. 5. 2008. pp. 185-193.

J. A. Calvo-Manzano, G. Cuevas, G. Gasca, T. San Feliu. “State of the art for risk management in software acquisition”. ACM SigSoft. Vol. 34. 2009. pp. 1-10.

P. Kunal, R. Suju, G. Joydeep. Automatic Construction of N-ary Tree Based Taxonomies. Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops: IEEE Computer Society. 2006. pp. 75-79.

M. Neshati, L. S. Hassanbadi. “Taxonomy Construction Using Compound Similarity Measure”. Lecture Notes in Computer Science. Vol. 4803. 2007. pp. 915-932.

M. Neshati, A. Alijamaat, H. Abolhassani, A. Rahimi, M. Hoseini. “Taxonomy Learning Using Compound Similarity Measure”. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence: IEEE Computer Society. 2007. pp. 487-490.

D. Cruzes, M. Mendonça, V. Basili, F. Shull, M. Jino. Extracting Information from Experimental Software Engineering Papers. SCCC, XXVI International Conference of the Chilean Society of Computer Science (SCCC'07). 2007. pp. 105-114.

R. P. Kendall, D. E. Post, J. C. Carver, D. B. Henderson, D. A. Fisher. “A Proposed Taxonomy for Software Development Risks for High-Performance Computing (HPC) Scientific/Engineering Applications”. Software Engineering Institute, Carnegie Mellon. Vol. 1. 2007. pp. 1-27.

D. Firesmith. “A Taxonomy of Security-Related Requirements”. Software Engineering Institute, 2005. White paper. Acceso el 03 de marzo de 2011. Disponible en: http://www.sei.cmu.edu/library/ abstracts/whitepapers/taxonomysep2005.cfm

P. López Peña. “Taxonomía Unificada de Referencia de Fallos Accidentales de Software crítico”. Lenguajes, sistémas informáticos e Ingeniería de Software. PhD Madrid: Universiad Politécncia de Madrid. Vol. 1. 2005. pp. 172.

L. Jae-Nam, Q. H. Minh, C.-w. Kwok Ron, P. ShihMing. “IT outsourcing evolution---: past, present, and future”. Commun. ACM. Vol. 46. 2003. pp. 84-89.

L. Jae-Nam, Q. H. Minh, C.-w. Kwok Ron, P. ShihMing. The Evolution of Outsourcing Research: What is the Next Issue?. Proceedings of the 33rd Hawaii International Conference on System Sciences. Vol 7. 2000. pp. 10.

The Standish Group International. Caos: A recipe for success. 1999. Acceso 09 de Marzo de 2011. Disponible en http://www4.informatik.tumuenchen.de/lehre/vorlesungen/vse/WS2004/1999_Standish_Chaos.pdf

United States Government Accountability Office. Challenges in Aligning Space System Components. Report GAO-10-55. Report to the Chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. United State of America. 2009. pp. 1-37.

United States Government Accountability Office. Many Analyses of Alternatives Have Not Provided a Robust Assessment of Weapon System Options. Report GAO-09-655. Report to the Chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. 2009. pp. 1-33.

United States Government Accountability Office. Opportunities Exist to Achieve Greater Commonality and Efficiencies among Unmanned Aircraft Systems. Report GAO-09-520. Report to the Chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. 2009. pp. 1-68.

United States Government Accountability Office. Issues to be Considered for Army's Modernization of Combat Systems. Report GAO-09-793T. Testimony Before the Subcommittee on Airland, Committee on Armed Services, U.S. Senate. 2009. pp. 1-14.

United States Government Accountability Office. DOD Faces Substantial Challenges in Developing New Space Systems. Report GAO-09-705T. Testimony Before the Subcommittee on Airland, Committee on Armed Services. U.S. Senate. 2009. pp. 1-16.

R. A. Simmons. Software quality assurance (SQA) early in the acquisition process. Aerospace and Electronics Conference. Vol. 2. 1990. pp. 664-669.

Published
2012-11-22
How to Cite
Gasca Hurtado G. P., & Manrique-Losada B. (2012). Método para la construcción de una taxonomía: estructura base para riesgos en outsourcing de software. Revista Facultad De Ingeniería Universidad De Antioquia, (60), 92-101. Retrieved from https://revistas.udea.edu.co/index.php/ingenieria/article/view/13661