Show simple item record

dc.contributor.authorGhanbari, Hadi
dc.date.accessioned2016-03-17T09:01:58Z
dc.date.available2016-03-17T09:01:58Z
dc.date.issued2016
dc.identifier.citationGhanbari, H. (2016). Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study. In T. X. Bui, & R. H. Sprague, Jr. (Eds.), <em>Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS 2016)</em> (pp. 5407-5416). IEEE Computer Society. <a href="http://dx.doi.org/10.1109/HICSS.2016.668">doi:10.1109/HICSS.2016.668</a>
dc.identifier.otherTUTKAID_68803
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/49094
dc.description.abstractIn recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and resource constraints to form a theoretical model. Following previous studies we suggest that integrating agile practices, such as iterative development, review meetings, and continuous testing, into common plandriven processes enables development teams to better identify and manage technical debt.
dc.language.isoeng
dc.publisherIEEE Computer Society
dc.relation.ispartofProceedings of the 49th Hawaii International Conference on System Sciences (HICSS 2016), ISBN 978-0-7695-5670-3
dc.subject.othertechnical debt
dc.subject.othersoftware development
dc.titleSeeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201603171868
dc.contributor.laitosTietojenkäsittelytieteiden laitosfi
dc.contributor.laitosDepartment of Computer Science and Information Systemsen
dc.contributor.oppiaineTietojärjestelmät
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2016-03-17T07:15:03Z
dc.type.coarconference paper
dc.description.reviewstatuspeerReviewed
dc.format.pagerange5407-5416
dc.relation.issn1530-1605
dc.type.versionacceptedVersion
dc.rights.copyright© 2016 IEEE. This is an author's post-print version of an article whose final and definitive form has been published in the conference proceeding by IEEE.
dc.rights.accesslevelopenAccessfi
dc.relation.doi10.1109/HICSS.2016.668


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record