skip to main content
article
Free Access

Critical issues in abandoned information systems development projects

Published:01 September 1997Publication History
First page image

References

  1. 1 Brooks, F.P. Jr. No silver bullet: Essence and accidents of software engineering. IEEE Comput. 20, 4 (Apr. 1987), 10-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Curtis, B., Krasner, H. and Iscoe, N. A field study of the software design process for large systems. Comm. ACM 31, 11 (Nov. 1988), 1268-1287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Ewusi-Mensah, K. Why IS development projects are abandoned: A diagnosis from user perspectives. Working Paper, CBA, Loyola Marymount University, 1994.Google ScholarGoogle Scholar
  4. 4 Ewusi-Mensah, K., and Przasnyski, Z. H. On information systems project abandonment: An exploratory study of organizational practices. MIS (2 15, 1 (March 1991), 67-85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Ewusi-Mensah, K., and Przasnyski, Z. H. Factors contributing to the abandonment of information systems development projects. J. Inf Tech. 9 (1994), 185-201.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6 Ewusi-Mensah, K., and Przasnyski, Z. H. Learning from abandoned information systems development projects. J. Inf. Tech. 10 (1995), 3-14.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7 Halper, M. Outsourcer confirms demise of reservation coalition plan. Computerworlc126, 31 (Aug. 3, 1992).Google ScholarGoogle Scholar
  8. 8 Halper, M. IS cover-up charged in system kill. Computerwor#126, 32 (aug. 10, 1992).Google ScholarGoogle Scholar
  9. 9 Halper, M. Too many pilots. Computerwor#126, 41 (Oct. 12, 1992).Google ScholarGoogle Scholar
  10. 10 Oz, E. When professional standards are lax: The CONFIRM failure and its lessons. Commun. ACM 37, 10 (Oct. 1994), 29-36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 PC Week 16 (Jan. 1995), 68.Google ScholarGoogle Scholar
  12. 12 Zellner, W. Portrait of a project as a total disaster. Bus. Week (Jan. 17, 1994).Google ScholarGoogle Scholar

Index Terms

  1. Critical issues in abandoned information systems development projects

        Recommendations

        Reviews

        Peter G. Sassone

        Why are ongoi<__?__Pub Caret>ng information systems (IS) development projects so frequently abandoned__?__ Ewusi-Mensah sets out to address this important question in this brief but well-written article. A good deal of useful information and insight is presented. IS managers should spend the time needed to read this article. The author identifies the causal factors that distinguish abandoned projects from successful ones, and illustrates those factors anecdotally. Based on a variety of information sources, his conclusion is that “cancellation of projects can be attributed to a combination of several factors.” These factors include the lack of well-articulated project goals; inappropriate staffing of project teams; poor manage<__?__Pub Fmt hyphen-point>ment; technically weak project teams; a weak or inappropriate technology infrastructure in the organization; lack of senior management involvement; and escalating project costs and time to completion. All of the factors mentioned are internal to a particular project or IS department. The author does not seem to acknowledge that project abandonment can also be affected by external forces. These forces can be internal to the company but external to the project (such as a change in the client department's needs) or external to the company (such as an unexpected move by a competitor). Another question the author does not address is that of how many abandoned projects are too many. One could easily make the case that if projects never fail, they are not ambitious enough. Finally, both the data sets and information used, and the methods of analysis, are poorly described. It is not clear whether the results are based on serious analysis of 5, 50, or 500 cases.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 40, Issue 9
          Sept. 1997
          92 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/260750
          Issue’s Table of Contents

          Copyright © 1997 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 1997

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader