Nnamdi Azubuike Mba
Nnamdi Azubuike Mba
Nnamdi Azubuike Mba
September, 2021
Management Summary
On a daily basis, every organization are looking for innovative ways to be quite
competitive and more efficient in ways of achieving their aims and objectives, in this 21st
century this can almost be impossible without the incorporation of technology in their
business models. This extends to different business interactions which includes the
business to customer (B2C) transaction where there are sales of products directly to
customers, and the business to business (B2B) interaction where there are transactions
distributors to wholesalers.
mobile business app. This to a large extends saves time, improves and monitors
productivity, and it is being widely accepted and used by most organizations like transport
There are various software and applications designed to support the goal of an organization
and thereby serve as a background for making strategic decisions and solution based
them as manufacturers to her distributors, has realized the importance of B2B mobile
applications in their operations and intends to use it for fast and accurate efficiency in
operations.
This paper aids to determine required information needed for development of mobile B2B
app and its implementation. This will focus on past experiences based on case studies,
techniques and methods. It also discusses the three relevant categories of requirements. For
the Functional Requirements, the stakeholder analysis and software benchmarking are
74109683_ R1901D7421833 Page 3 of 41
identification and analysis are the rudiments for future decisions. All these are discussed
Lastly for Resources Requirement, project time planning and life-cycle cost analysis for
company Y shall be discussed. The study will utilize the Gantt-chart to illustrate the
schedule, sequence and progress of the task within the 6 months (26 weeks) timeframe and
its progress throughout the project. Extractions will be made from these categories, the
benefits, contribution and recommendations are thereby made available to the client, based
on their defined objectives to make the study of superior value, and provide adequate
implementation process.
74109683_ R1901D7421833 Page 4 of 41
CHAPTER TWO
2.0 Supporting Evidences - - - - 9
2.1 Objective 1: Functional Requirements - - - - 9
2.1.1 Stakeholder Analysis - - - - 10
2.1.2 Software Benchmark Testing - - - - 11
2.2 Structural Requirements - - - - 13
2.2.1 System Environmental Analysis (ESA) - - - - 14
2.2.2 Personnel Analysis - - - - 15
2.2.3 Risk Identification and Analysis - - - - 17
2.3 Resource Requirements - - - - 18
2.3.1 Project Time Planning - - - - 19
2.3.2 Life Cycle Cost Analysis - - - - 20
CHAPTER THREE
3.0 Study Gantt Chart - - - - 22
CHAPTER FOUR
4.0 Contributions - - - - 25
4.1 Functional Requirements - - - - 26
4.1.1 Stakeholder Analysis - - - - 26
4.1.2 Software Benchmarking - - - - 27
4.2 Structural Requirements - - - - 28
4.2.1 System Environmental Analysis - - - - 28
4.2.2 Personal Analysis - - - - 29
4.2.3 Risk Identification and Analysis - - - - 31
4.3 Resource Requirements - - - - 32
4.3.1 Project Time Planning - - - - 32
4.3.2 Life-Cycle Cost Analysis - - - - 33
CHAPTER FIVE
5.0 Conclusion - - - - 34
References - - - - 36
74109683_ R1901D7421833 Page 5 of 41
1.0 Introduction
The introduction of technology has enhanced our knowledge, methods, and giving us new
ideas on how to carry out our daily business activities which has aided in making the lives
These applications are stored in devices which has the capacity to connect with internet
through smart phones, laptops, iPads, PC etc. There are increased usage of internet services
worldwide which especially involves the use of mobile B2B applications which has
therefore been regarded as a principal tool for managing a good customer relationship
(Smilansky, 2015). This internet access helps in facilitating connectivity and partnership
electronically between business people and their clients, business conditions, behavior of
consumers and opportunities in the market have been changed extensively by technology
(OECD 2004; Dahlstrom et al., 2015; Daniel, 2016). In recent times, the public prefers the
use of mobile applications than the use of the old fashioned desktop computers because it is
According to discovery, quite a number of businesses are making good use of the
opportunities in obtaining mobile software to achieve the purpose of B2B connections for
customer’s contentment (Chris et al, 2003). Upon the development, well known
manufacturers results in offering mobile B2B applications for multiple business purposes
(Tornack et al, 2011). Having Company Y as a business, customers can to a great extent
make much profit from the use of M-commerce because they possess restricted assets in
terms of good management of funds and manpower (Zhao, et al, 2016). This restricted
assets clearly suggests that very limited funds are accessible to disburse for retail and
74109683_ R1901D7421833 Page 6 of 41
publicity, therefore M-commerce can assist company Y in reaching out to a lot of people
The purchaser, company Y having full knowledge about the mobile B2B applications
in order to grow a B2B mobile application in light of this positive evolution, Company Y
In various project researches, over hundred results have proven that majority of project
successes, are strongly tied in the visibility of those requirements (Dvir et al, 2003). In
order to dictate relevant requirements of this project, a study should be carried out to
summarized by Veronica et al., (2014), before Software is developed and incorporated into
the business. Concerning software development, this process is often called ‘requirements
acquiring and elaborating requirements for computer based systems” (Zowghi and Coulin,
2005, p. 19).
In overall, the purpose of this research study is to make sure that the enterprise, Company
Y is well pleased to investigate the requirement and still aimed in achieving the goal of the
project. As a result, incidences derived from research studies on software management and
methods involved in project management will take a vital role in the stated requirement for
74109683_ R1901D7421833 Page 7 of 41
an impression approach. The study describes the objectives and methods in order to
disclose information and requirements needed for the development and implementation of a
standard mobile B2B application, where we have the goals and procedures being
combined:
Objective 1: Identification of the need to have a functional B2B software, which aids in
Software benchmarking.
Stakeholder’s analysis.
Objective 2: Identification of the systemic conditions needed for the implementation and
plan of the software applications which contributes to the potentials of the existing
company.
Personnel Analysis
Objective 3: Funds are needed to have a standardized and operating mobile B2B program
application. Therefore the financial strength of the client is a vital item to be observed
1.2 Methodology
In this offer, there will be a demonstration of procedures which are needed to disclose
essential conditions in the three objectives. An extensive output of the software, B2B
application is solely dependent on the qualitative configuration approach used in the setup.
Therefore, the amount of quality input will either contribute to a successful software output
or to its abortion. As a result of the estimated time needed, this offer will introduce the use
of Gantt Chart which will help in the survey of the various methods and step of each
There will be an assessment survey to be carried out because there’s a speculation that it
contains the crucial knowledge needed for the programming of the software. Afterwards,
the company will be impressed that its objectives has been clarified due to the input of this
specific method. Lastly, the closing remark tells us about the main purpose for this offer,
and this is to give ideas and steps on how to carry out the final decision made on the offer.
74109683_ R1901D7421833 Page 9 of 41
This chapter in details explains the individual steps and procedures involved in organizing
the usage of the mobile B2B application. It includes all relevant information and
accessibility which are geared towards providing a comfortable approach for the client.
Clients are being invited for an open dialogue, so as to be informed about the steps and
processes involved. In most cases, clients can request for some changes in their
requirement during clarification and this should be added immediately the change is
recognized. According to Nakatani et al., (2014), to tighten the acceptability of this study, a
continuous interaction with the client should be created, and this is to improve familiarity
and comfortability. Houdek and Pohl (2000) who encouraged the above action took some
and he stressed that more than 50% of the requirement swap occurs after the recognition of
the procedures. This chapter will discuss about the circumstances involved in this particular
procedure, and also the single steps taken towards achieving its goal.
As already mentioned above, B2B software applications explains so much about its
and easy payment, not only as an advertising device (Al-Naeem et al., 2005). An
application is said to be excellent, if its efficiency adds a huge advantage to its prospective
users, thereby providing satisfaction to the customer. When there are no user-target in the
74109683_ R1901D7421833 Page 10 of 41
There will be an evaluation about the principle features which adds advantage to the mobile
software application which also improves B2B correspondence. In general, the client will
be educated concerning what the labor market expects of the B2B software application.
The development and programing of software application for the use of daily businesses
has indeed assisted greatly to decrease the difficulties and challenges encountered by the
interaction is not familiar with the end user, lacks appropriateness, with no focus, then it all
leads to an unsuccessful business -to- business (B2B) connection, and the final outcome
results during the struggle becomes unproductive (Sandler, 2005). In the course of this
study, we will be observing and taking notes of some essential features that will improve
the implementation and programming of the mobile software app. This also gives guidance
and steps taken in the gradual process of the software application and its role.
Just as Glinz and Wieringa, (2007); and Newcombe, (2003) has summarized, stakeholders
analysis is a major tool in the execution of project management and is publicly recognized
procedures. The entire process helps to provide important information which are needed in
the course of the project. The analysis of stakeholders involved in the software
development are persons, groups or organizations whose actions affect or are affected by
74109683_ R1901D7421833 Page 11 of 41
the software (Power, 2010). This procedure tends to ascertain the overall relevant
stakeholders, ranked or compared in their quantum of relevance, needs and wants explicitly
identified. The different stakeholders have varying expectations for the software, making
their wants and needs different, which could cause conflicts between them (Newcombe,
2003)
process of stakeholder for the client. The meeting is organized to deliberate on the
recognition process of the stakeholders. The client participates because of his/her higher-
level of knowledge in regards to the affected groups and domestic procedures (Pouloudi
and Whitley, 1997). The identification process focus on the ‘Baseline Stakeholders’ as
proposed by Sharp et al. (1999, p.389), which refer to the external and internal developers,
decision makers and legislators in direct relation to the complete expected software cycle
(Dissertation Project, 2016). After the pertinent stakeholders have been dutifully identified,
stakeholder. Avenues such as meetings and one-on-one dialogue sections serves as a means
stakeholders to participate from the start to finish of the proposed project. Struggles
encountered in the availability of stakeholders can result to facing many challenges while
There are so many software applications programmed in several mobile devices found in
the industry which has been specifically designed for businesses that contains so many
74109683_ R1901D7421833 Page 12 of 41
operating system (OS) while the client gets maximum satisfaction due to its user-friendly
feature (Pizzutillo, 2015). To enable the client enjoy the full benefit of the software, there
Benchmarking involves a competitive assessment of the software program, into finding out
its unique characteristics which are greatly used in business and other sections. In software
benchmarking the main target is centered on the workability of the software which the
stakeholders has pointed out as the highlight. Benchmarking best narrates the process of
incorporated alongside with software companies as the best course of action for equivalent
using the pattern of an outward benchmarking analysis, this helps the client to stand firm
and participate on a technical, top-level and on a subjective grounds with his competitors
(Hines, 1998).
the assembling of information (data), whereas the major concern of benchmarking which
are contenders and software industries are ready to kick start work. Data bases from Market
lines, Key Notes and Mintel are good sources of information during an extensive report
after sales, and also being the suppliers of an exceptional benchmarking reports such as
LLC and Best-Practice. More so, manufacturers such as Microsoft, SAP and Oracle whose
invention have ascertained a high level of visibility in terms of software programming, and
74109683_ R1901D7421833 Page 13 of 41
offers additional information for mobile solution which are needed in various sub industries
as well as in the pharmaceutical industry. Subsequent analysis and assessment are being
carried out on the collected information (data). Information gotten from the analysis are
being differentiated, and the motives of the stakeholders are being extracted together with
requirements where the mobile B2B software application has to satisfy the client’s
2008).
The essential functions of the B2B software application were uncovered as a result of
previous technique, and the questions extracted are basically derived from the following
procedures, among other contemporary administrative environment, the client will have to
satisfy the structural requirement needed in planning and executing the development of an
application with such features. The employees and also the risk dimensions takes part in a
crucial role and their control over certain issues, even when the client is not able to proffer
solutions according to control digression and dangers about to occur or if there will be an
The structural requirement analysis is the platform which the system environment analysis
has provided. This is an arranged procedure for narrating human activities which has
74109683_ R1901D7421833 Page 14 of 41
V.G., 2011). Afterwards, the system environmental analysis has to scrutinize whether it
will be demanding to organize and implement certain features and functions in the client’s
carried out systematically, this procedures are very essential because of how important it is
to implant into the B2B software application onto an existing system environment
The invention of software benchmarking has greatly assisted to make sure that a practical
prerequisites has well pleased the stakeholders and their various objectives being carefully
evaluated in the grid of stakeholders, the environmental study of the system will assist us to
survey the existing environment in which the requirements are developed and executed in
the information technology system environment of the company (Madden, T.J et al., 2006).
According to Pries and Quigley, (2008), the analysis should comprise of the interfaces and
extensions (after) which are found among the new B2B mobile software application and the
existing system environment, extensions and interfaces (before) and the required system,
lastly, the recognition of the existing systems to be contained in the analysis. More so, the
existing information technology (IT) service has to be revealed. During the programming
Surveying more requirement that may be gotten from the symbol will disclose that there
are possible condition for extension adoption. On the grounds that some systems are
pretentious, it is usually common and feasible to pick out a certain type of information
technology (IT) services expertise, which could be needed so as to control these effects.
74109683_ R1901D7421833 Page 15 of 41
The invention of mobile devices has helped to effectively involve the clients. Constraints
are created that require examination as to whether they can be managed by clients as a
result of integration of changes into interactive systems and their system environment
which constitutes part of the operational enterprise according to Liu et al. (2016) that has
New software are intentionally created for the businesses, for customers to come across
new software, and to be able to install it successfully, this gives the user a good satisfaction
and wonderful experience and will always remain faithful (EMarketer, 2006).
The following features that has been found very necessary and essential to be incorporated,
organized, and applied into the system’s environment, are realized to have worked very
effectively alongside with the system’s environment, this makes it easy to look into the
personnel assets, which are essential to organize it. In this analysis, it is important to know
what resources the client can provide based on the required employees and the designated
incorporation into the company and the formation of the teams; MindFit Consulting (2018),
concluded that the client will have to require the personnel assets to be aware of how to
manage the expertise for this project which includes the performance and development of
the mobile B2B software application. According to Project Management Institute, (2013),
the client is convinced enough to provide the number of the essential workforce and their
74109683_ R1901D7421833 Page 16 of 41
various handworks/skills, that are basically required for the performance and development
of the mobile B2B software application. Therefore a personnel analysis has to show how
much the project industry is incorporated together with the organization, and equally how
Functional requirements are selected roles which are derived from role planning that were
selected to note the environmental analysis results and also point out the 1st procedures
involved in the project. While deliberating on the practical task and the managerial duties,
there should be a set aside project task within company Y’s grading order, (Jucan, 2013).
Administrators and the other workforce of the company are extensively coached/ tutored to
gain and have knowledge of important skills, and this coaching process can be entirely
obligations of the human assets of the client should show exactly what the personnel
Henceforth, the personnel analysis shows the real state analysis by differentiating ‘what is
needed’ alongside with ‘what is present’. The tasking duty in this analysis is by
representing the opening move. For safe keeping, recording the information of the
Important duties should be identified and delegated the specific personnel that match the
According to Nicholas and Steyn, (2012), risk identification, analysis, planning and control
are usually embedded in the project risk management. The purpose of evaluating the
structural requirements involved in the execution of a client’s request is to take note that
the project needs the implementation of the initial first and second steps. According to a
comprehensive statistics, which was diligently carried out, it was recorded that risk
management approach tops the list of the important process in the composition of every
In spite of the fact that total removal of hazards is generally impossible, to identify and
control is the regular remedy (Nicholas and Steyn, 2012). So many components can result
to project risks within every project step (Lock, 2013). In addition, it has been proven that
In order to prevent future damages and hazards, there should be a proper investigation of
risk level that could happened, and this should be categorized in the order of their risk
level; this should be carried out as soon as the possible risks to the project has been
identified. A show of the risk potentials and level of hazards that can be possibly created
will be identified using the ordinal scale matrix (high, medium and low) as well as the
quantitative risk impact on cost estimation result (Passenheim, 2009; Maley, 2012). The
The risk identification and analysis should be carried out as an overarching process (see
Gantt chart) because risk identification and analysis affect numerous requirements
74109683_ R1901D7421833 Page 18 of 41
elicitation areas such personnel, IT, time and costs risks. This strategy ensures that there are
no gaps in the identification process, considering the likelihood that other methods also
After it was disclosed that for there to be a successful programming of mobile B2B
the client has to bring up. The essential resources must in all probability make-up of the
most reasonable type of requirements, and this is because they are capable of expressed
quantifying numbers. Generally, this research analysis unravels the length of time involved
in the execution and engineering of the programmed software procedure (and that includes
the essential trial and collaboration process) will consume and the financial assets that are
greatly needed to coordinate the project and be responsible for the expenditures involved
alongside.
Sequentially like every project, separate procedures will have to be carried out in the
surveying of time the organization will have to spare for the success of the project, and to
74109683_ R1901D7421833 Page 19 of 41
be able to disclose the provisional requirements for the essential procedures, organizing
project time is needed. This mostly involves the projects from the software engineers. Time
taken clearly represents a particular provocation because of the extreme complexity and
The first step is to get the foundation for the scheduling activities and estimation breaking it
down from one activity to the other and their dependence on the actual to the former
activities. This step needs testing procedures and excellent knowledge in software
projects and case studies are quite useful for the support of this step. Those sources,
combined with published estimation data, are required to contribute to the identification of
the approximate required time (Project Management Institute, 2013). Next, the step by step
activities that has been revealed will be put into a logical sequence. Individual task
durations and dependencies allow for drawing a network diagram, based on the start times,
end times and milestones (Passenheim, 2009). Although for the scope of this study which is
not relevant where more detailed method in planning would also look at resources
constraint and costs for each step (Nicholas and Steyn, 2012).
In the process to know the total time taken to perform each duty, suggestions such as Al-
Naeem et al., (2005, p41-70) discussed the total number of movement which are involved
in sketching a portrait that can assist the network and afterwards, explain each details.
Moreover, a Gantt chart which carries a lot of information will be talked about in chapter 3.
In addition, a well detailed and extensive plan where their financial challenges and
In general, Microsoft project which is part of the project management software is primarily
used for projects that are known to be difficult and aids to prevent errors which may occur
and protects the safety of the planning procedures. Additionally, it creates so many options
for the customer in respect to the records and arrangement of the time planning (Zhang and
Bishop, 2013).
According to Van, A.J, (2001) the method involved in discovering the total value of the
potential ownership is through the use of a Life Cycle Analysis (LCCA). Therefore, Life
cycle cost analysis is specifically important in the demonstration of the project which has
options that shows equal operation. In summary, project life cycle cost analysis is a
al., 2004).
Consequently, Lindholm and Suomala, (2005) explains that Life cycle cost analysis can
also be illustrated in the proposed planning phase, on the condition that there will be an
early survey over a long period range. Various software products have varying life cycle
phases with linked costs. However, without an appropriate analysis, many of this costs are
hidden and therefore not factored in LCC (Eckardt et al., 2014). To determine the monetary
requirements of the mobile B2B application, Life cycle cost analysis pose to be an
important approach for the client because apart from containing implementation costs and
the relevant programming, it also contains follow up costs like maintenance, operating,
disposal and supporting costs starting from the beginning of the product to the end
74109683_ R1901D7421833 Page 21 of 41
(Nicholas and Steyn, 2012). This approach is quite necessary since those costs are
interrelated to one another: Maintenance cost in the operating phase could be increased due
to a strategy to reduce cost in the development and testing phase of the product
(Passenheim, 2009).
The life cycle analysis are made up of five separate types of funds which includes the
following; external funds, contingent, direct, indirect, and intangible costs (Norris, 2001).
For example, these can be in form of labor, overhead and material cost (Passenheim, 2009).
The subsequent collection of information procedures which are applied for life cycle cost
analysis occurs with the aid of a bottom-up approach, applying costing based on
accumulated activities (Vlachy, 2014). In order to identify the functional steps required, the
software life cycle will be separated into different stages (Kapp and Girmscheid, 2005).
Nevertheless, the risks involved in life cycle cost analysis depends on its undependability
of information. With time, costs can change, and the analysis might not anticipate this
future changes in cost (Higham et al., 2015). It is therefore important to note that this
should be rather seen as an orientation and not a solid fact. In the instance of a total project
All the steps implemented have various process durations and are all linked in their varying
techniques. The Gantt chart is a widely identified useful tool for providing an overview of
the steps and processes for consulting project for a client, stakeholders and consultant
74109683_ R1901D7421833 Page 22 of 41
(Locke, 2013; Nicholas and Steyn, 2012). It is basically a bar chart that breaks down the
schedule of project, it was named after Henry Gantt who designed it (Zobel, T. et al.,
2002). The chart considers the individual implementation duration of each project step and
their dependencies. On the vertical axis it shows the required activity while the horizontal
axis reflects the time interval involved. The duration of each task is shown by the width of
the horizontal bar. The dependence on the Gantt chart is shown from the start to the finish
dependencies, this means that it shows which activity has to finish before the other begins
another way, the major path that decides the project duration, critical path are exemplified,
this is the critical steps that have to be completed for the whole project to finish (Maley,
2012). The Gantt chart enables workability in the event of any unforeseen circumstance by
providing contingency plans for problems that were never expected and thereby executed
on the overall.
The study is slated to last for a period of 26 weeks (6 months). The chart begins with an
inaugural meeting for the project to kick off where all stakeholder will be introduced and
necessary information and resources shall be presented for the individual techniques and
the client and consultant to ensure proper adequacy of the study. This is very key bearing in
mind the ultimate goals and objective of the client to ensure satisfaction at her end.
Although the first 22 weeks are part of the processes in data gathering, the project
So long as the risk identification and analysis overlaps on each other and this includes
numerous factors, future adoptions can be made during the analysis of the resource
requirements. The client will receive the final report as well as recommendation for further
actions in the final week. Also, an evaluation meeting can be set up for both sides to
The Gantt chart is illustrated in figure 1, the sequence of the particular methods, their
dependencies and durations. The task ID helps to orientate and to distribute the
dependencies. In the chart, the filled cells are represent the conducted task, while the
dashed cells reflects that at that point, the individual tasks are ancillary. Grey cells shows
slack time, which shows that the individual task will take a longer time, but this does not
increase the maximum duration of the project since the critical path is not affected.
However, since the activities on the study overlaps on each other, the Gant chart does not
give much space for slack time. It will be safe to say that the project times were estimated
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
w eek 2 6
1
2
3
4
5
6
7
8
9
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
w eek
Gantt
Critical Path 2 11 23 32 36
Task ID Task Duration Dependencies
1 Inaugural Meeting and Continous Communication 1 week ---
2 Objective 1 = Functional Requirement 7 weeks 1
3 Stakeholder Mapping 4weeks 1
4 Stakeholder identifi cation 1 week 1
5 Stakeholder meeting/conversation 1 week 1, 4
6 Stakeholder Prioritization 2 week 1, 4
7 Stakeholder Matrix (Incl. Prioritization and Objectives 1 week 1, 4, 5, 6
8 Software Benchmarking 3 weeks 3
9 Data Collection Process 1 week 3
10 Benchmark Analysis 2 weeks 3, 10
11 Objective 2 = Structural Requirement 8 weeks 2
12 System Environment Analysis 3 weeks 2
13 Interview with the IT Leader/Application Owners 1 week 2
14 Producing of IT Enviroonment Graphics 2 weeks 2, 13
15 Need Analysis 1 week 2, 13, 14
16 Personnel Analysis 3 weeks 12
17 Project Role Planning (which roles are necessary?) 2 weeks 12
18 Actual State Analysis (Does the company have the staff ?) 1 week 12, 17
19 Risk Identification and Analysis 8 weeks 2
20 Risk Identifi cation 4 weeks 2
21 Risk Evaluation 3 weeks 2, 20
22 Risk Ranking (Matrix) 2 weeks 2, 20, 21
23 Objective 3 = Resources Requirements 7 weeks 11
24 Project Time Planning 3 weeks 11
25 Project Beak Down and Time Estimation 2 weeks 11
26 Draw Network Diagram 1 week 11, 25
27 Draw Gantt Chart 1 week 11, 25, 26
28 Life Cycle Cost Analysis 4 weeks 24
29 Analysing Types of Cost and Necessary Activities 2 weeks 24
30 Data (Cost) Collection for Revealed Activities 2 weeks 24, 29
31 Cost Accumulation 1 week 24, 29, 30
32 Producing The Study 3 weeks 2, 11, 23
33 Recommendations 2 weeks 2, 11, 23
34 Study Submission 1 week 2, 11, 23, 32, 33
35 Presentation of the Result 1 week 2, 11, 23, 32, 33
36 Evaluation Meeting 1 week 2, 11, 23, 32, 33
4.0 Contribution:
Following the survey of the procedures and methods involved in the research study, the
answers to how individual methods contributes to the objective of the study are explained
comprehensively in this chapter, which includes the recognition of the condition and the
total display of all the requirements for executing and programming of the mobile B2B
software application. Evidence derived from software case studies and organization are
incorporated together with the knowledge researchers have gotten while investigating a
specific method.
This chapter will in details discuss about the result derived carefully from a similar
occurrence that has already been carried out especially those that has the same
characteristics, organizational research, this will greatly assist in providing clear evidence
on the effectiveness of the highlighted procedures on the research study goals. The client
will have an explicit explanation of the requirements to carry out the project, and thereby
decide if he/she can carry out the project or take the option of outsourcing based on the
emanating results from the functional, structural and resource requirement displayed.
Nevertheless, if the research study indicates that carrying out the project holistically is
within the capacity of the client, then, the first stage of the requirement and project
planning elicitation phase is already achieved, thereby economizing money and time for the
client.
74109683_ R1901D7421833 Page 26 of 41
Pacheco and Garcia (2012) states that the recognition and apprehension of stakeholders is
essential or important for the requirement evocation procedures and for the following
classification of the software program in terms of quality. The software can only
accomplish its expected requirements only if the relevant stakeholders can be identified
(Babar et al., 2015). Using a stakeholder analysis strategy to an organization which has
important to understand the stakeholders and their various goals in order to prevent the
neglect of the data systems development projects. According to Kaur and Sengupta (2011),
the absence of the client’s involvement in the information technology projects can cause
the need for allegiance and refusal of project support which are very essential if the project
Research study shows that stakeholder’s analysis is solidly associated to the risk
identification and analysis procedure because of the accompanying issues, especially when
paying no attention to what the stakeholder wants before venturing into software project
(Vrhovec et al., 2015). In scenarios which occurs in a banking sector, where we have
research findings that are totally centered on application development, they tend to go
straight to fish out that it is of utmost important that there should be a proper dialogue
between the stakeholders and for the most part, a good understanding of the information
technology’s personnel discussing the most suitable way for the business procedures. The
impact of the stakeholder towards project risks and hazards cannot be overemphasized,
according to Rost and Glass (2009), highlighting the importance of evaluation and total
74109683_ R1901D7421833 Page 27 of 41
checkmate on the project hazards. Due to the exploration of the end users, software
In reality, there are lots of software producers who has so far presented the mobile B2B
software applications for different companies and organizational sections, and this implies
that software benchmarking analysis completely comes up with ideas of showing the
different abilities that are needed and quite suitable for an organization (Tornack et al.,
2011). In general, mobile B2B software application should be constantly modified and
inspected in order to bring out its best features and assist industries to achieve its maximum
height in market competition (Ojala and Tyrväinen, 2008), for example, in the drug
industry.
it was discovered that 50% of the carefully inspected organizations, selectively use
benchmarking daily, and this is done to discover the foremost operations, with the goal of
can only be fortunate for scientific aspects, and this demonstrates the fitness of
benchmarking for multiplex projects (Loo, 2003). Mostly concerning the motives of
disclosing the functional requirements of the client mobile B2B software application,
and acquired software application. This replaces the space created between the functional
requirement that has already been spotted out in the analysis of the stakeholder and the
Concerning the system environmental analysis, it has been recorded that the analysis is
centered on its ability to asses few of the component that gives rise to the introduction of
new techniques which involves certain problems in relation to new system requirements,
while still under observation from the point of view of the innovation system (Huselid. M.
environment needs an exclusive skill, which are set aside to be able to prevent
opportunities for failures. Programming of software on a bigger scale and also on a lengthy
period of time will be examined majorly, and importantly, it will help in the general
technology services greatly contributed to a large extent for the several failures that were
recorded in the programming of software projects of big and small industries. Those
challenges can result to foregone gains which can be put to a stop by an engrossed analysis
security and service management are derived from the system environment analysis, which
permits further closure, and this is assisted by the case of a Greek software organization
carrying out the execution of project at the client’s request (Maroukian, 2010). The
information technology support’s major role for the consumers, and on the flip side,
therefore corresponds with the already presented procedure, which brings about the system
environmental analysis to be the base for continuous personnel analysis (Byrd and Turner,
2000).
There is high suggestion for the use of personnel analysis since it is a multiple intensive
responsibility for the execution, programming and maintenance of the software, not just for
the programmers, but also the project managers, maintenance, management workforce and,
Henceforth, to show the personnel requirement that the client has to encounter, our
requirement evocation procedure pays attention to the scope and therefore staffing needed.
Kirkor (2010) concluded that qualified staffs should be evenly allocated to various areas of
the organization to ensure that there is a fortunate and successful execution of the
procedure for the mobile software development. Therefore, the conclusion that follows the
subcontract work or carry out the reformation on the grounds that the chance to undergo a
successful training on the spot user and administration which also includes accepting help
when needed, these are extra gains of personnel analysis and also outlying skills wants.
Following the statement of Dave and David (2012) the nominated personnel that oversees
that the records are adequately registered in order, and also remain constant till the
executions are carried out, after so much inspection must have taken place, especially new
functions that has been implemented are efficient workforce of the organization whose
maintenance personnel, on a steady basis, assistance are carried out and also the system
upgrade that has been installed are always in check for efficiency. In association with the
scrutinizing of the requirements evocation are suggested by Holuram (2013), and this
brought forth the importance that was discovered during the case study.
The allocation of human resources and planning especially when it involves developers
during software project to certain responsibility and task shows an importance in handling
the estimated workload per employee and time issues (Park et al., 2015). Therefore
The client should consider personnel analysis as a basic step so as to decide whether hiring
can be a good replacement in situation where we have issues of small proficiency spaces,
and they can fit into those spaces with so much ease. (Wu and Zmud, 2010)
Company Y must be able to scrutinize this process to get qualified and certified employees
who can deliver the critical process of setting up a complementary software for the desired
objective of this project. Other staff to be picked should be at least trainable because
training is inevitable for this IT service provider services such as the mobile B2B software
application
Risk identification and analysis is particularly important for client that intend to venture
into an unknown area with a new products because the risk involved is highly susceptible
categorize the detailed requirement and to evaluate whether the client will be able to
control the risks involved without any assistance. There are many case studies that
elaborate this fact: The government sector in Barbados applied a holistic risk management
frame work for a software engineering project, Dey et al. (2007) explains that risk
identification and analysis discovered at the initial stages of the software project represents
lead to the immediate measures to be taken to put the risks under control.
74109683_ R1901D7421833 Page 32 of 41
When a leading IT professionals interviewed Baccarini et al., (2004), they stated that huge
risk are associated with IT projects especially in terms of the budget, personnel and
scheduling activities. The methodology introduced considers this fact in regards to the
execution of overlying risks and hazards. Furthermore, (Baccarini et al., 2004, p. 286)
stated that instances of incidents that occurred during the “London Stock Exchange’s
Transfer and Automated Registration of Uncertified Stock (TARUS) system” and that of
management of risks and hazards. Therefore, it is paramount that the client is given the
appropriate knowledge summary regarding the hazards and risks involved during the
process, and get a first class preventive measures which can be applied so as to assess the
Project time planning plays an important function for organization because of the presence
of so many challenges that happened with time; congestion and guessing of wrong time
leads to time constraints and delivers behind schedule, which negatively affect the cost of
the project (Hazzan and Dubinsky, 2007). In an attempt to illustrate the need for a suitable
project planning method for a proper time estimation for a provisional requirement,
Charette (2005) provided several examples of failed IT projects. Scheduling is a great step
74109683_ R1901D7421833 Page 33 of 41
In an attempt to examine the adoption of time planning strategies for software projects,
Verner et al., (2007) discovered that the uncooperative time arrangement coupled with the
insufficient prerequisites engineering are too poor for consumption, and that was why
scrutinizing the assumption of time planning proposal were selected, and this is causing the
increment of time risks or hazards, and also resulted to the numerous unsuccessful projects
in the past life. Therefore, error in time evaluation, related losses and occurring hazards
which the client can experience can be avoided using an intended analysis with an
According to Passenheim, (2009) the requirements needed for the project, the major cause
that prevents execution are cost. Vlachy (2014) states that Life Cycle Cost when applied
during an engineering project shows that LCC is a very extensive and specific method in
respect to evaluating the firm’s product cost until the life span of such product has elapsed,
especially when the method is already incorporated into the product origination stage. A
major privilege of the technique can be seen in strategic decision making due to the
assistance of LCC. The benefit of the intentional execution corresponds: Between the
displayed procedures, it becomes feasible to acquire important prudent conclusion for the
accomplishment of the project, but this can only be achievable if the organization can
Before the life cycle cost analysis could ascertain a validation, a proper and interrogating
research study should be carried out, according to Korpi and Ala-Risku (2008) the life
cycle cost analysis has been widely known due to the explained necessity of its long-term
affordability, and this makes it ranked above other cost estimation methods. Furthermore,
concealed costs that are unpredictable in software projects are revealed by life cycle cot
analysis (Chifosky and Cross, 1990). Now, this is particularly important for organizations
that have little or no IT basis and therefore lack software for the cost estimation.
that has proven to be authentic is being presented, which the client already has developed a
special interest. The widely accepted method is the comprehensive proposal, on the
grounds that it provides a complete format for application, and in another way, it proffers
comprehensive proposal has been modified to solve a particular case for the client and its
specific demands which is majorly to help in distribution of drugs from manufacturer to the
distributor, and this study will bring so much satisfaction to the client’s needs. The
previous software engineering project that encountered different incidents shows the
acceptability and rationality of its method to look into the initiated plans, and therefore, the
client’s various demands of daring into programming of a mobile B2B software application
for company Y. In the scenario where we there is need for change or improvement on the
established with the client during the course of the study will enable the client to have
74109683_ R1901D7421833 Page 35 of 41
maximum and accurate information. Additionally, the client will be able to recognize each
step and activity during the project with the help of the Gantt-chart.
The purpose of the study was to show the list of prerequisites needed, to have a
transaction for company Y, and these requirements involves basic functional, financial,
non-financial, and structural resources. After the submission of the final report, the client
makes a final decision based on the result of the conducted analysis contained in the
submitted report. In the final decision making, it solely rests on the client to either go ahead
with the programing of the software and implement, or rather make an outright purchase of
a software that meets his/her demand (“build or buy”) (Cortellessa et al., 2008), or to
The results of the conducted analysis will be able to guide the client on all the resources
he/she needs to provide to be able to carry out the project. If the client is capable to provide
all necessary requirement and makes a decision, whatever decision that is made stands.
74109683_ R1901D7421833 Page 36 of 41
References
Al-Naeem, T., Rabhi, F.A., Benatallah, B. and Ray, P.K. (2005) “Systematic Approaches
for Designing B2B Applications”, International Journal of Electronic Commerce, 9
(2), pp. 41-70.
Babar M.I., Ghazali M., Jawawi D.N.A. and Zaheer, K.B. (2015) “StakeMeter: Value-
Based Stakeholder Identification and Quantification Framework for Value-Based
Software Systems”, PLoS ONE, 10 (3), pp. 1-33.
Baccarini, D., Salm, G. and Love, P.E.D. (2004) “Management of risks in information
technology projects”, Industrial Management & Data Systems, 104 (4), pp. 286-295.
Bagozzi, R. P. (2009) ‘Marketing as an organized behavioral system of exchange’, Journal
of Marketing, 38 (4), pp. 77–81.
Barreto, A., Barros, M. and Werner, C.M.L. (2008) “Staffing a software project: A
constraint satisfaction and optimization-based approach”, Computers & Operations
Research, 35, pp. 3073-3089.
Bedell C. (2013) Mobile apps development: Defining requirements is a whole new
ballgame. [Online]. Available at:
https://searchsoftwarequality.techtarget.com/feature/Mobile-apps-development-
Defining-requirements-is-a-whole-new-ballgame (Accessed on 18 August, 2021)
Bhattacharya, C. B., & Korschun, D. (2008) ‘Stakeholder marketing: Beyond the four Ps
and the customer’, Journal of Public Policy & Marketing, 27 (1), pp. 113–116.
Byrd, T.A. and Turner, D.E. (2000) “Measuring the Flexibility of Information Technology
Infrastructure: Exploratory Analysis of a Construct”, Journal of Management
Information Systems, 17 (1), pp. 167-208.
Calvert S. (1995) “Managing stakeholders”, in: Turner, J.R. (ed.), The commercial project
manager. Maidenhead: McGraw-Hill, pp. 214-222.
Charette, R.N. (2005) “Why Software Fails”, IEEE Spectrum [Online]. Available at:
http://spectrum.ieee.org/computing/software/why-software-fails (Accessed on 7
August, 2021).
Chikofsky, E.J. and Cross, J.H. (1990) “Reverse Engineering and Design Recovery: A
Taxonomy”, IEEE Software, 7 (1), pp. 13-17.
Cortellessa, V., Marinellia, F. and Potena, P. (2008) “An optimization framework for
“build-or-buy” decisions in software architecture”, Computers & Operations
Research, 35, pp. 3090-3106.
Dahlstrom, E., Brooks, D.C., Grajek, S. and Reeves, J. (2015) ECAR Study of Students
and Information Technology, 2015, ECAR, Louisville, CO, p. 47. Available online
at: Google Scholar (Accessed on 7 August, 2021)
74109683_ R1901D7421833 Page 37 of 41
Kapp, M.J. and Girmscheid, G. (2005) “Risk based life cycle cost analysis model for
comparable life cycle project delivery decision taking”, in: Collaboration and
Harmonization in Creative Systems. London: Taylor & Francis, pp. 895-901.
Kaur, R. and Sengupta, J. (2011) “Software Process Models and Analysis on Failure of
Software Development Projects”, International Journal of Scientific & Engineering
Research, 2 (2), pp. 1-4.
Kodali, G.A.R. (2008) “Benchmarking the benchmarking models”, Benchmarking: An
International Journal, 15 (3), pp. 257-291.
Kogdenko, V.G. (2011) Analysis of personnel in the system of value-oriented management.
The Economic Analysis: Theory and Practice, 2 (209), pp. 121-129.
Korpi, E. and Ala-Risku, T. (2008) “Life cycle costing: a review of published case studies”,
Managerial Auditing Journal, 23 (3), pp. 240-261.
Krikor, M. (2010) “IT Project Environment Factors Affecting Requirements Analysis in
Service Provisioning for the Greek Banking Sector”, Journal of Software
Engineering & Applications, 3, pp. 858-868. Available at: 10.4236/jsea.2010.39100
(Accessed on 22 August, 2021).
Lindholm, A. and Suomala, P. (2005) “Learning by costing: sharpening cost image through
life cycle costing?”, 7th Manufacturing Accounting Research Conference, Tampere,
Finland, 30.May – 1.June.
Liu B. et al. (2016) Structural Analysis of User Choices for Mobile App Recommendation
[Online]. Available at: https://arxiv.org/abs/1605.07980 (Accessed on 15 August,
2021)
Lock, D. (2013) Project Management. 10th ed., Farnham: Gower Publishing Ltd.
Loo, R. (2003) “A multi-level causal model for best practices in project management”,
Benchmarking: An International Journal, 10 (1), pp. 29-36.
MacLean, R., Stepney, S., Smith, S., Tordoff, N., Gradwell, D., Hoverd, T. and Katz, S.
(2004) Analysing Systems: determining requirements for object oriented
development. Hemel Hempstead: Prentice Hall International.
Madden, T. J., Fehle, F., & Fournier, S. (2006) ‘Brands matter: An empirical demonstration
of the creation of shareholder value through branding’, Journal of the Academy of
Marketing Science, 34 (2), pp. 224–235.
Maire, J.-L., Bronet, V. and France, A. (2005) “A typology of best practices for a
benchmarking process”, Benchmarking: An International Journal, 12 (1), pp. 45-60.
Maley, C.H. (2012) Project management concepts, methods, and techniques. Boca Raton,
Fla.: CRC Press.
74109683_ R1901D7421833 Page 39 of 41
Vlachý, J. (2014) “Using Life Cycle Costing for Product Management”, Management, 19
(2), pp. 205-218.
Vrhovec S.L.R., Hovelja, T., Vavpotič, D. and Krisper, M. (2015) “Diagnosing
organizational risks in software projects: Stakeholder resistance”, International
Journal of Project Management, 33, pp. 1262-1273.
Watson, G.H. (1993) Strategic Benchmarking: How to Rate Your Company’s Performance
Against the World’s Best. New York: Wiley.
Wu, W.W. and Zmud, R.W. (2010) “Facing the Challenges of Temporary External IS
Project Personnel”, MIS Quarterly Executive, 9 (1), pp.13-21.
Zamfiroiu, A. (2015) “Factors Influencing the Quality of Mobile Applications”,
Informatica Economică, 18 (1), pp. 131-138.
Zhang, Y. and Bishop, C. (2013) “Project-Management Tools for Libraries: A Planning
and Implementation Model Using Microsoft Project 2000”, Information Technology
and Libraries, 24 (3), pp. 147-152.
Zobel, T., Almroth, C., Bresky, J., Burman, J., (2003) ‘The Identification and assessment of
environmental aspects in an EMS context: an approach to a new reproducible
method based on LCA methodology’, Journal of Cleaner Production, 10, pp. 381-
396.
Zowghi D. and Coulin C. (2005) “Requirements Elicitation: A Survey of Techniques,
Approaches, and Tools”, in: Engineering and Managing Software Requirements.
Berlin: Springer, pp. 19-46.