A field experiment on trialsourcing and the effect of contract types on outsourced software development

被引:4
|
作者
Jorgensen, Magne [1 ,2 ]
Grov, Jon [3 ]
机构
[1] Simula Metropolitan Ctr Digital Engn, Oslo, Norway
[2] Oslo Metropolitan Univ, Oslo, Norway
[3] Langs Radgiving, Oslo, Norway
关键词
Outsourcing; Software development skill; Contract types; Empirical study;
D O I
10.1016/j.infsof.2021.106559
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: To ensure the success of software projects, it is essential to select skilled developers and to use suitable work contracts. Objective: This study tests two hypotheses: (i) the use of work-sample testing (trialsourcing) improves the selection of skilled software developers; and (ii) the use of contracts based on hourly payment leads to better software project outcomes than fixed-price contracts. Method: Fifty-seven software freelancers with relevant experience and good evaluation scores from previous clients were invited to complete a two-hour long trialsourcing task to qualify for a software development project. Thirty-six developers completed the trialsourcing task with acceptable performance, and, based on a stratified random allocation process, were asked to give a proposal based on an hourly payment or a fixed-price contract. Eight hourly payment-based and eight fixed-priced proposals were accepted. The process and product characteristics of the completion of these 16 projects were collected and analysed. Results and Conclusion: While the use of trialsourcing may have prevented the selection of developers with insufficient skills, the performance on the trialsourcing task of the selected developers did, to a large extent, not predict their performance on the projects. The use of hourly payments seems to have led to lower costs than fixed-price contracts, but not to improved processes or products. We plan to follow up these results with research on how to design more skill-predictive trialsourcing tasks, and when and why different project contexts give different contract consequences.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Agile Software Development Practices and Success in Outsourced Projects: The Moderating Role of Requirements Risk
    Krancher, Oliver
    AGILE PROCESSES IN SOFTWARE ENGINEERING AND EXTREME PROGRAMMING (XP 2020), 2020, 383 : 56 - 72
  • [32] Effective Use of Test Types for Software Development
    Silva, Roshali
    Perera, Pulasthi
    Perera, Indika
    Samarasinghe, Kithsiri
    2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 7 - 12
  • [33] Classification of Task Types in Software Development Projects
    Wysocki, Wlodzimierz
    Miciula, Ireneusz
    Mastalerz, Marcin
    ELECTRONICS, 2022, 11 (22)
  • [34] Software Development: Why the Traditional Contract Model Is Not Fit for Purpose
    Atkinson, Susan
    Benefield, Gabrielle
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4842 - 4851
  • [35] Contract-driven cooperation development process for software outsourcing
    Xiao, JC
    Wang, Q
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 1104 - 1108
  • [36] The Fixed-Price Contract: A Challenge for the Software Development Project
    Gaebert, Cornelia
    SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 97 - 112
  • [37] Towards Specialization of the Contract-Aware Software Development Process
    Derezinska, Anna
    Oltarzewski, Przemyslaw
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2012, 2012, 112 : 494 - 501
  • [38] Overview of types of Ontology in the software development process
    Jabar, Marzanah A.
    Khalefa, Mustafa S.
    Abdullah, Rusli Hj.
    Abdullah, Salfarina
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 83 - +
  • [39] Making Sense of Software Development and Personality Types
    Capretz, Luiz Fernando
    Ahmed, Faheem
    IT PROFESSIONAL, 2010, 12 (01) : 6 - 13
  • [40] Integrating Types and Specifications for Secure Software Development
    Morrisett, Greg
    COMPUTER NETWORK SECURITY, 2010, 6258 : 32 - 35