Title: Identifying and managing risks in the development of online educational software for social media use

Authors: Dimitris Koutanis; George A. Tsihrintzis; Dionisios Sotiropoulos

Addresses: Department of Informatics, University of Piraeus, Piraeus 18534, Greece ' Department of Informatics, University of Piraeus, Piraeus 18534, Greece ' Department of Informatics, Athens University of Economics and Business, Athens, Greece; Department of Informatics, University of Piraeus, Piraeus 18534, Greece

Abstract: This paper aims to contribute to the process associated with the creation of educational software intended for use on the internet through various social networks. In order to optimise the produced software we approached the issue following a methodology and procedures based on the theory of project management, particularly that of risk management. The methodology and procedures will subsequently be described in the project. The management of risks in software projects is a difficult and complex process. Its implementation includes three main stages that are search and locate the risks, evaluate, and finally overcome them. Based on the above characteristics we have created a questionnaire that aimed to identify the potential risks during the creation of this software category. The survey results were recorded and then evaluated. Upon completion of this process we were able to create a list of potential risks related to the creation of educational software for use on the Internet through social media. Finally based on the list we created, we proceeded with the formulation of proposals which aim to address the identified risks. These proposals after consideration of relevant work had as their object to overcome the individual risks that incurred.

Keywords: web application; educational software; software development; ICT in education; qualitative research; social networks; project management; risk management; risk management techniques.

DOI: 10.1504/IJCISTUDIES.2017.086064

International Journal of Computational Intelligence Studies, 2017 Vol.6 No.1, pp.68 - 97

Received: 30 Jul 2016
Accepted: 24 Nov 2016

Published online: 11 Aug 2017 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article