{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T06:27:31Z","timestamp":1778221651562,"version":"3.51.4"},"reference-count":45,"publisher":"Emerald","issue":"2\/3","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Despite its tremendous success and achievements, the information science (IS) industry has been plagued by shadows of failure and inefficiency since its early days. This paper takes the stance that poor communication with target organizations and users is one of the major causes of these problems. If this communication is not properly recorded and managed, many of the agreed decisions may never be assumed by target organizations, therefore leaving project managers entirely responsible for failures or deviation from initial requirements. Nonetheless, the vast majority of Software (SW) development companies have very weak provision for Electronic Records Management (ERM). This is evident from the persistent use of ISO 9001 and ISO 90003 in their Quality Assurance (QA) and the consistent neglecting of the ISO 15489 standard for records management. This paper aims to examine this issue<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Since there are no studies in this area, this research employed an inductive qualitative research approach that consisted of a combination of critical literature review, an exploratory case study and thematic analysis.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>This paper reports on the study of an SW company that implemented ERM policies and an in\u2010house system that not only supports the recording of documentation and evidence for every phase of the development, but also the very difficult processes of organizational learning.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>This paper is of interest to both IS academics and practitioners, namely those interested in QA and ERM.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>There is very little research in this area that can inform both academics and practitioners on how to use ERM within SW project management practices. This paper aims at providing early insights into ways of addressing this gap and at generating discussion in this area.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00012531111135646","type":"journal-article","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T07:45:01Z","timestamp":1305963901000},"page":"168-187","source":"Crossref","is-referenced-by-count":20,"title":["Expanding the concept of requirements traceability"],"prefix":"10.1108","volume":"63","author":[{"given":"Hui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Baptista Nunes","sequence":"additional","affiliation":[]},{"given":"Lihong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Chao Peng","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010610195774300_b1","unstructured":"Alavi, M. and Carlson, P. (1992), \u201cA review of MIS research and disciplinary development\u201d, Journal of Management Information Systems, Vol. 8 No. 4, pp. 45\u201062."},{"key":"key2021010610195774300_b2","doi-asserted-by":"crossref","unstructured":"Allan, B. (2004), Project Management: Tools and Techniques for Today's ILS Professional, Facet Publishing, London.","DOI":"10.29085\/9781856049221"},{"key":"key2021010610195774300_b4","unstructured":"Briand, L. (2003), \u201cSoftware documentation: how much is enough?\u201d, Proceedings of IEEE 7th European Conference on Software Maintenance and Reengineering (CSMR), 26\u201028 March, Benevento."},{"key":"key2021010610195774300_b3","unstructured":"British E\u2010Government Policy Framework for Electronic Records Management (2001), E\u2010Government Policy Framework for Electronic Records Management, Crown, Kew."},{"key":"key2021010610195774300_b5","doi-asserted-by":"crossref","unstructured":"Bryman, A. (2002), Research Methods and Organisation Studies, Routledge, London.","DOI":"10.4324\/9780203359648"},{"key":"key2021010610195774300_b6","unstructured":"Chen, H., Nunes, M. and Zhou, L. (2009), \u201cThe implementation of electronic records management in facilitating knowledge sharing at software development projects\u201d, Proceedings of the 11th International Conference on Informatics and Semiotics in Organisations, Beijing, 11\u201012 April."},{"key":"key2021010610195774300_b7","unstructured":"Concise Oxford English Dictionary (2006), Concise Oxford English Dictionary, Oxford University Press, Oxford."},{"key":"key2021010610195774300_b8","unstructured":"Creswell, J.W. (2003), Research Design: Qualitative, Quantitative and Mixed Methods Approaches, Sage, Thousand Oaks, CA."},{"key":"key2021010610195774300_b10","unstructured":"Department of Defense (2002), Design Criteria Standard for Electronic Records Management Software Applications, available at: http:\/\/interpares.org\/display_file.cfm?doc=DoD_50152.pdf (accessed 19 August 2010)."},{"key":"key2021010610195774300_b9","unstructured":"Desai, M., Ogden, J. and Richards, T. (2002), \u201cInformation technology litigation and software failure\u201d, Journal of Information Law and Technology, Vol. 2002 No. 2, available at: www2.warwick.ac.uk\/fac\/soc\/law\/elj\/jilt\/2002_2\/desai\/ (accessed 25 August 2010)."},{"key":"key2021010610195774300_b11","unstructured":"Dominguez, J. (2009), The Curious Case of the CHAOS Report 2009, available at: www.projectsmart.co.uk\/the\u2010curious\u2010case\u2010of\u2010the\u2010chaos\u2010report\u20102009.html\/ (accessed 17 September 2010)."},{"key":"key2021010610195774300_b12","unstructured":"DSC (2007), Data Systems Consulting Co., Financial Statements, DSC Company, Taipei."},{"key":"key2021010610195774300_b13","doi-asserted-by":"crossref","unstructured":"Eveleens, J. and Verhoef, C. (2010), \u201cThe rise and fall of the Chaos Report figures\u201d, IEEE Software, Vol. 27 No. 1, pp. 30\u20106.","DOI":"10.1109\/MS.2009.154"},{"key":"key2021010610195774300_b14","unstructured":"Fresko, M. and Waldron, M. (2001), MoReq Specification: Model Requirements for the Management of Electronic Records, available at: www.cornwell.co.uk\/morequation html (accessed 19 August 2010)."},{"key":"key2021010610195774300_b15","doi-asserted-by":"crossref","unstructured":"Gotel, O.C.Z. and Finkelstein, A.C.W. (1994), \u201cAn analysis of the requirements traceability problem\u201d, Proceedings of the 1st International Conference on Requirements Engineering (ICRE '94), April 18\u201022, IEEE Computer Society Press, Colorado Springs, CO.","DOI":"10.1109\/ICRE.1994.292398"},{"key":"key2021010610195774300_b16","unstructured":"Gotel, O. and Finkelstein, A. (1996), \u201cRevisiting requirements production\u201d, Software Engineering Journal, Vol. 11 No. 3, pp. 166\u201082."},{"key":"key2021010610195774300_b17","unstructured":"Hare, C. and McLeod, J. (1997), Developing a Records Management Programme, Aslib, London."},{"key":"key2021010610195774300_b18","unstructured":"ICA (2005), Electronic Records: A Workbook for Archivists, ICA, Paris."},{"key":"key2021010610195774300_b19","unstructured":"International Data Corporation (IDC) (2008), IDC: International Data Corporation, IDC, Framingham, available at: www.idc.com\/about\/about.jsp (accessed 19 August 2010)."},{"key":"key2021010610195774300_b20","unstructured":"ISO (1998), ISO 10006: Quality Management \u2013 Guideline to Quality in Project Management, International Standards Organization, Geneva."},{"key":"key2021010610195774300_b21","unstructured":"ISO (2000), ISO 9001: Quality Management Systems \u2013 Requirements, International Standards Organization, Geneva."},{"key":"key2021010610195774300_b22","unstructured":"ISO (2001), ISO 15489\u20101: Information and Documentation \u2013 Records Management \u2013 Part 1: General, International Standards Organization, Geneva."},{"key":"key2021010610195774300_b23","unstructured":"ISO (2004), ISO 90003: Software Engineering \u2013 Guidelines for the Application of ISO 9001:2000 to Computer Software, International Standards Organization, Geneva."},{"key":"key2021010610195774300_b24","unstructured":"ISO (2005), ISO 9000: Quality Management Systems \u2013 Fundamentals and Vocabulary, International Standards Organization, Geneva."},{"key":"key2021010610195774300_b25","unstructured":"Jager, M. (1999), \u201cBenchmarking knowledge\u201d, Library Management, Vol. 20 No. 7, pp. 367\u201072."},{"key":"key2021010610195774300_b26","unstructured":"Johnson, J. (2001), \u201cMicro projects cause constant change\u201d, Proceedings of 2nd International Conference on eXtreme Programming and Flexible Processes in Software Engineering, Cagliari, 20\u201023 May."},{"key":"key2021010610195774300_b27","unstructured":"King, N. (2008), Template Analysis, available at: www.hud.ac.uk\/hhs\/research\/template_analysis\/index.htm (accessed 20 August 2010)."},{"key":"key2021010610195774300_b28","unstructured":"King, N. and Horrocks, C. (2010), Interviews in Qualitative Research, Sage, London."},{"key":"key2021010610195774300_b29","unstructured":"Kramer, D. (1999), \u201cDocumentation from source code comments: a case study of Javadoc\u201d, Proceedings of the 17th Annual International Conference on Computer Documentation, New Orleans, LA, ACM Press, New York, NY, pp. 147\u201053."},{"key":"key2021010610195774300_b30","unstructured":"Land, F. (1982), \u201cAdapting to changing requirements\u201d, Information & Management, Vol. 5 No. 2, pp. 59\u201075."},{"key":"key2021010610195774300_b31","doi-asserted-by":"crossref","unstructured":"Marcus, A. and Maletic, J. (2003), \u201cRecovering documentation\u2010to\u2010source\u2010code traceability links using latent semantic indexing\u201d, Proceedings of the 25th International Conference on Software Engineering (ICSE'03), Portland, OR, 3\u201010 May.","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"key2021010610195774300_b32","unstructured":"Nunes, M. and Al\u2010Mamari, S. (2008), \u201cInductive approaches using a priori coding in information systems research: a discussion\u201d, Proceedings of the 7th European Conference on Research Methods for Business and Management Studies, Regent's College, London, 19\u201020 June."},{"key":"key2021010610195774300_b33","unstructured":"Orlikowski, W. and Baroudi, J. (1991), \u201cStudying information technology in organisations: research approaches and assumptions\u201d, Information System Research, Vol. 2 No. 1, pp. 1\u201028."},{"key":"key2021010610195774300_b34","unstructured":"Ovaska, P., Rossi, M. and Smolander, K. (2005), \u201cFiltering, negotiating and shifting in the understanding of information system requirements\u201d, Scandinavian Journal of Information Systems, Vol. 17 No. 1, pp. 31\u201066."},{"key":"key2021010610195774300_b35","unstructured":"Public Record Office (2001), E\u2010Government Policy Framework for Electronic Records Management, Public Record Office, Kew, available at: www.nationalarchives.gov.uk\/documents\/egov_framework.pdf."},{"key":"key2021010610195774300_b36","unstructured":"Ramesh, B. and Jarke, M. (2001), \u201cToward reference models for requirements traceability\u201d, IEEE Transactions on Software Engineering, Vol. 27 No. 1, pp. 58\u201093."},{"key":"key2021010610195774300_b37","unstructured":"Sametinger, J. and Pomberger, G. (1992), \u201cA hypertext system for literate C++ programming\u201d, Journal of Object\u2010Oriented Programming, Vol. 4 No. 8, pp. 24\u20109."},{"key":"key2021010610195774300_b38","unstructured":"Saunders, M., Lewis, P. and Thornhill, A. (2002), Research Methods for Business Students, Prentice Hall, Harlow."},{"key":"key2021010610195774300_b39","unstructured":"Schwalbe, K. (2006), Introduction to Project Management, Thomson Learning, Boston, MA."},{"key":"key2021010610195774300_b40","unstructured":"Standish Group (2009), Chaos Report, Standish Group, Boston, MA, available at: www1.standishgroup.com\/newsroom\/chaos_2009.php (accessed 7 February 2011)."},{"key":"key2021010610195774300_b41","unstructured":"Suryn, W., Hailey, V. and Coster, A. (2004), \u201cHuge potential user base for ISO\/IEC 90003 \u2013 the state of the art for improving quality in software engineering\u201d, ISO Management System International, No. 4, July\u2010August."},{"key":"key2021010610195774300_b42","unstructured":"Turner, J. and Simister, S. (2000), Gower Handbook of Project Management, Gower Publishing, Aldershot."},{"key":"key2021010610195774300_b43","unstructured":"Yin, R.K. (1994), Case Study Research: Design and Methods, Sage, London."},{"key":"key2021010610195774300_b44","unstructured":"Zhou, L., Vasconcelos, A. and Nunes, M. (2007), \u201cA tool for risk mitigation in public sector IS\/IT projects: an evidence\u2010based information systems project risk checklist\u201d, Proceedings of the 6th International Conference on Management, Wuhan, 4\u20106 August."},{"key":"key2021010610195774300_b45","unstructured":"Zhou, L., Vasconcelos, A. and Nunes, M. (2008), \u201cSupporting decision making in risk management through an evidence\u2010based information systems project risk checklist\u201d, Information Management & Computer Security, Vol. 16 No. 2, pp. 166\u201086."}],"container-title":["Aslib Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00012531111135646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00012531111135646\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00012531111135646\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:37:12Z","timestamp":1753357032000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/63\/2-3\/168-187\/63439"}},"subtitle":["The role of electronic records management in gathering evidence of crucial communications and negotiations"],"editor":[{"given":"Peter","family":"Willett","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":45,"journal-issue":{"issue":"2\/3","published-print":{"date-parts":[[2011,3,22]]}},"alternative-id":["10.1108\/00012531111135646"],"URL":"https:\/\/doi.org\/10.1108\/00012531111135646","relation":{},"ISSN":["0001-253X"],"issn-type":[{"value":"0001-253X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,3,22]]}}}