Open Access Open Access  Restricted Access Subscription or Fee Access

Software Project Management: Theory of Constraints, Risk Management, and Performance Evaluation

Antoine Asseman, Nada Ashqar Aloraidi, Mariam Salim, Eman Rezk, Heba Dawoud, Nasser Nasser Alkhuzaei, Souad Mecheter, Rana Rihan, Abdelaziz Bouras


Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place to determine the relation between those three factors. An enhanced model has been proposed to describe how these factors affect each other. As an application, the performance is examined for both open and closed source software projects in terms of some constraints and risk factors. Moreover, solutions for controlling both constraints and risks are provided. For constraints, project activities scheduling is enhanced using a genetic algorithm. For risks, RISKIT is briefly explained as a risk management methodology.



Software Project Management; Constraints; Risk Management; Resource-Constrained Project Scheduling Problem (RCPSP); Performance; RISKIT; Exploratory model



. Goldratt, E. M., & Cox, J. (1984). The goal: An ongoing improvement process (2nd Ed.). Great Barrington, MA: North River Press.

. Zadry, H. R., &Yusof, S. M. (2006). "Total quality management and theory of constraints implementation in Malaysian automotive suppliers: A survey result". Total Quality Management, 17, 999-1020.

. Mabin, V. J., &Balderstone, S. J. (2003). "The performance of the theory of constraints methodology". International Journal of Operations & Production Management, 23, 568-595.

. Frenklah G. & Mann R. (2011). "Marriage with TOC delivers improved product". TRIZ, Dublin, Ireland

. Tomtsongas. (2011) “Scope, Time and Cost – Managing the Triple Constraint”. In Programsuccess, May 2, 2011.

. Noreen, E., Smith, D., & Mackey.J. (1995). "The Theory of Constraints and its Implications for Management Accounting". Montvale, NJ: The IMA Foundation for Applied Research.

. L. Bernstein. (1996). “Software in the Large,” AT&T Technical Journal, vol. 1, pp. 5–14.

. A. H. Ghapanchi, A. Aurum. (2011). “The Impact of Project Capabilities on Project Performance: Case of Open Source Software Projects”, International Journal of Project Management.

. S. A Baird. (2008). “The Heterogeneous World of Proprietary and Open-Source Software”, University of Hong Kong, unpublished.

. G. Ferrie. (2010). “Software Development Processes: Research Comparing and Contrasting Open-Source Versus Closed-Source Software Projects”, Athabasca University, unpublished, 2010.

. H. Ouerfelli, A. Dammak. (2013). “The Genetic Algorithm with two point crossover to solve the Resource-Constrained Project Scheduling Problems”. 5th International Conference Modeling, Simulation and Applied Optimization (ICMSAO).

. Y. H Liao, and C. T Sun, An Educational Genetic Algorithms Learning Tool, (2001),fromhttp://www.ewh.ieee.org/soc/es/May2001/14/Begin.htm [accessed on Nov 2013].

. Genetic Algorithm tutorial, fromhttp://www.obitko.com/tutorials/genetic algorithms/ga-basic-description.php [accessed on Nov 2013].

. Genetic Algorithm, Wikipedia, fromhttp://ar.wikipedia.org/wiki [accessed on Nov 2013].

. H. I Mathkour, B. Shahzad. (2011). “Software Risk Management and Avoidance Strategy”, International Conference on Machine Learning and Computing, IPCSIT vol.3. Singapore.

. A. Chowdhury, Sh. Arefeen. (2011). “Software Risk Management: Importance and Practices”, IJCIT, ISSN 2078-5828, Vol.2, issue 1.

. T. Arnuphaptrairong. (2011). “Top Ten Lists of Software Project Risks: Evidence from the Literature Survey”, proceeding of the international multi conference of engineers and computer scientists. Vol. I, Hong Kong.

. D. Tesch, T. Kloppengburg. (2007). “In project risk factors, the project management professional’s perspective”, Journal of computer information systems.

. Al-Mudimigh, ZahidUllah. (2010). “Risk Identification and Preemptive Scheduling In Software Development Life Cycle”, Global Journal of Computer Science and Technology Vol. 10 Issue 2.

. Banff, Alberta, V. Kumar, U. Kumar. "Different Techniques for Risk Management in Software Engineering: A Review."

. The Economic Times, “Definition of 'Risk Management”. Retrieved from http://economictimes.indiatimes.com/definition/risk-management [accessed on Dec 2013].

. Wallace, L., Keil, M., Arun, R., (2004). How software project risk affects project performance: an investigation of the dimensions of risk and an exploratory model. Decision Sciences 35 (2), 289–321

. Kontio, Jyrki. (1997). "The riskit method for software risk management, version 1.00."Computer Science Technical Reports. University of Maryland, College Park, MD, USA.

. Freimut, Bernd, et al. (2001). "An industrial case study of implementing software risk management." ACM SIGSOFT Software Engineering Notes. Vol. 26. No. 5. ACM.

. Kontio, Jyrki, G. Getto, D. Landes. (1998). "Experiences in improving risk management processes using the concepts of the Riskit method." ACM SIGSOFT Software Engineering Notes 23.6: 163-1.

Full Text: PDF


  • There are currently no refbacks.


The Journal of Modern PM (ISSN: 2317-3963) | info@journalmodernpm.com