{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:14:19Z","timestamp":1760300059048},"reference-count":92,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,1]]},"abstract":"<p>Modern software systems are growing increasingly complex, requiring increased complexity of software and software development process (SDP). Most software complexity measurement approaches focus on software features such as code size, code defects, number of control paths, etc. However, software complexity measurement should not only focus on code features but on features that cover several aspects of SDP in order to have a more complete approach to software complexity. To implement this approach, an extensive literature review for identifying factors that contribute to the complexity of SDP was performed and seventeen complexity factors were identified. As there were indications that the identified factors were not independent from each other but there were interrelations between them, statistical methods for identifying the underlined relations and refining them were applied, resulting to the final set of measures used in the proposed model. Finally, the proposed model has been tested in five software projects and the results were evaluated.<\/p>","DOI":"10.4018\/ijitpm.2018100102","type":"journal-article","created":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T15:43:27Z","timestamp":1534952607000},"page":"17-40","source":"Crossref","is-referenced-by-count":6,"title":["Modeling Software Development Process Complexity"],"prefix":"10.4018","volume":"9","author":[{"given":"Vyron","family":"Damasiotis","sequence":"first","affiliation":[{"name":"Department of Accounting and Finance, University of Applied Sciences of Thessaly \u2013 TEI Thessaly, Larisa, Greece"}]},{"given":"Panos","family":"Fitsilis","sequence":"additional","affiliation":[{"name":"Department of Business Administration, University of Applied Sciences of Thessaly \u2013 TEI Thessaly, Larisa, Greece"}]},{"given":"James F.","family":"O'Kane","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University, Business, Edinburgh, UK"}]}],"member":"2432","reference":[{"key":"IJITPM.2018100102-0","doi-asserted-by":"crossref","unstructured":"Ahmad, N., & Laplante, P. A. (2006). Software project management tools: Making a practical decision using AHP. In 2006 30th Annual IEEE\/NASA Software Engineering Workshop (pp. 76-84). Columbia, MD: IEEE.","DOI":"10.1109\/SEW.2006.30"},{"key":"IJITPM.2018100102-1","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(99)00038-1"},{"key":"IJITPM.2018100102-2","first-page":"83","article-title":"Measuring application development productivity.","author":"A. J.Albrecht","year":"1979","journal-title":"Proc. of IBM Applications Development Symposium"},{"issue":"3","key":"IJITPM.2018100102-3","doi-asserted-by":"crossref","DOI":"10.1061\/(ASCE)0733-9364(2000)126:3(176)","article-title":"Project procurement system selection model.","volume":"26","author":"T.Alhazmi","year":"2000","journal-title":"Journal of Construction Engineering and Management"},{"issue":"1","key":"IJITPM.2018100102-4","first-page":"1","article-title":"Why is security a software issue?","volume":"36","author":"J.Allen","year":"2007","journal-title":"The EDP Audit, Control, and Security Newsletter"},{"key":"IJITPM.2018100102-5","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2017070105"},{"key":"IJITPM.2018100102-6","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2017040102"},{"key":"IJITPM.2018100102-7","doi-asserted-by":"publisher","DOI":"10.1145\/75034.75056"},{"issue":"6","key":"IJITPM.2018100102-8","first-page":"1","article-title":"Practical considerations for using exploratory factor analysis in educational research.","volume":"15","author":"A. S.Beavers","year":"2013","journal-title":"Practical Assessment, Research & Evaluation"},{"key":"IJITPM.2018100102-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.03.112"},{"issue":"11","key":"IJITPM.2018100102-10","first-page":"200","article-title":"Concurrent software development.","volume":"43","author":"J.Blackburn","year":"2000","journal-title":"Communications of the ACM"},{"key":"IJITPM.2018100102-11","author":"B.Boehm","year":"1981","journal-title":"Software engineering economics"},{"key":"IJITPM.2018100102-12","author":"B.Boehm","year":"2000","journal-title":"Software cost estimation with COCOMO II"},{"key":"IJITPM.2018100102-13","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2017040101"},{"key":"IJITPM.2018100102-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24625-1_3"},{"key":"IJITPM.2018100102-15","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21351"},{"key":"IJITPM.2018100102-16","first-page":"411","article-title":"A case study of user participation in the information systems development process.","author":"T.Butler","year":"1997","journal-title":"Proceedings of the eighteenth international conference on Information systems"},{"key":"IJITPM.2018100102-17","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr0102_10"},{"key":"IJITPM.2018100102-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2016.05.001"},{"key":"IJITPM.2018100102-19","author":"D.Child","year":"2006","journal-title":"The essentials of factor analysis"},{"key":"IJITPM.2018100102-20","first-page":"321","article-title":"The future of software development","author":"K.Church","year":"2001","journal-title":"Managing Information Technology in a Global Economy"},{"issue":"7","key":"IJITPM.2018100102-21","first-page":"1","article-title":"Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis.","volume":"10","author":"A. B.Costelo","year":"2005","journal-title":"Practical Assessment, Research & Evaluation"},{"key":"IJITPM.2018100102-22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"IJITPM.2018100102-23","doi-asserted-by":"publisher","DOI":"10.1145\/50087.50089"},{"key":"IJITPM.2018100102-24","doi-asserted-by":"publisher","DOI":"10.1109\/IWASID.2007.373680"},{"key":"IJITPM.2018100102-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2011.06.004"},{"key":"IJITPM.2018100102-26","unstructured":"DeCoster, J. (1998). Overview of factor analysis. Retrieved 6 8, 2016, from http:\/\/www.stat-help.com\/factor.pdf"},{"key":"IJITPM.2018100102-27","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.12.1554.12072"},{"key":"IJITPM.2018100102-28","author":"A.Field","year":"2009","journal-title":"Discovering statistics using SPSS: Introducing statistical method"},{"key":"IJITPM.2018100102-29","doi-asserted-by":"crossref","unstructured":"Fink, L., Wyss, S., & Lichtenstein, Y. (2017). Aligning flexibility with uncertainty in software development arrangements through a contractual typology. Journal of Global Operations and Strategic Sourcing.","DOI":"10.1108\/JGOSS-11-2016-0033"},{"key":"IJITPM.2018100102-30","unstructured":"Fioretti, G., & Visser, B. (2004). A cognitive interpretation of organizational. E:CO Special Double Issue, 6(1-2), 11-23."},{"key":"IJITPM.2018100102-31","doi-asserted-by":"publisher","DOI":"10.1109\/CSIE.2009.936"},{"key":"IJITPM.2018100102-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.008"},{"key":"IJITPM.2018100102-33","doi-asserted-by":"crossref","unstructured":"Ghazarian, A. (2015). A theory of software complexity. In IEEE\/ACM 4th SEMAT Workshop on a General Theory of Software Engineering (pp. 29-32).","DOI":"10.1109\/GTSE.2015.11"},{"issue":"4","key":"IJITPM.2018100102-34","first-page":"37","article-title":"Reliability measurement of object oriented design: A complexity perspective. International Advanced Research Journal in Science","volume":"2","author":"N.Gupta","year":"2015","journal-title":"Engineering and Technology"},{"key":"IJITPM.2018100102-35","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2002.995795"},{"key":"IJITPM.2018100102-36","author":"M. H.Halstead","year":"1977","journal-title":"Elements of Software Science"},{"key":"IJITPM.2018100102-37","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1986.11517772"},{"key":"IJITPM.2018100102-38","doi-asserted-by":"crossref","unstructured":"Hongyan, L. (2010). The analysis of project risk management based on AHP Evaluation. In 2010 2nd IEEE International Conference on Information and Financial Engineering (pp. 576\u2013579). Chongqing: IEEE.","DOI":"10.1109\/ICIFE.2010.5609426"},{"key":"IJITPM.2018100102-39","doi-asserted-by":"publisher","DOI":"10.4135\/9780857028075"},{"key":"IJITPM.2018100102-40","unstructured":"IEEE. (2010). Systems and software engineering - Vocabulary. In ISO\/IEC\/IEEE 24765:2010(E) (pp. 1-418)."},{"issue":"3","key":"IJITPM.2018100102-41","first-page":"182","article-title":"An examination of the factors influencing software development effort.","volume":"1","author":"Z.Jiang","year":"2007","journal-title":"International Journal of Computer, Information, and Systems Science, and Engineering"},{"key":"IJITPM.2018100102-42","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291817"},{"key":"IJITPM.2018100102-43","unstructured":"Karner, G. (1993). Metrics for Objectory [Diploma thesis]. University of Link\u00f6ping, Sweden."},{"issue":"3","key":"IJITPM.2018100102-44","first-page":"143","article-title":"Software reliability, metrics, reliability improvement using agile process. IJISET - International Journal of Innovative Science","volume":"1","author":"G.Kaur","year":"2014","journal-title":"Engineering & Technology"},{"issue":"6","key":"IJITPM.2018100102-45","first-page":"2482","article-title":"Metric for early measurement of Software Complexity.","volume":"3","author":"G.Keshavarz","year":"2011","journal-title":"International Journal on Computer Science and Engineering"},{"key":"IJITPM.2018100102-46","doi-asserted-by":"publisher","DOI":"10.12785\/ijcnt\/040103"},{"key":"IJITPM.2018100102-47","doi-asserted-by":"publisher","DOI":"10.21015\/vtse.v9i2.410"},{"key":"IJITPM.2018100102-48","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.173"},{"key":"IJITPM.2018100102-49","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2003040101"},{"key":"IJITPM.2018100102-50","first-page":"187","article-title":"A complexity measure based on information contained in software.","author":"D. S.Kushwaha","year":"2006","journal-title":"Proceedings of the 5th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems"},{"key":"IJITPM.2018100102-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2007.03.004"},{"key":"IJITPM.2018100102-52","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231158"},{"key":"IJITPM.2018100102-53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"IJITPM.2018100102-54","doi-asserted-by":"crossref","unstructured":"McLeod, L., & MacDonell, S. G. (2011). Factors that affect software systems development project outcomes: A survey of research. ACM Computing Surveys, 43(4).","DOI":"10.1145\/1978802.1978803"},{"issue":"2","key":"IJITPM.2018100102-55","first-page":"419","article-title":"Effort estimation based on complexity and size of relational database system.","volume":"1","author":"S.Mishra","year":"2010","journal-title":"International Journal of Computer Science & Communication"},{"key":"IJITPM.2018100102-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"issue":"3","key":"IJITPM.2018100102-57","first-page":"10371","article-title":"An approach to find reusability of software using objet oriented metrics. International Journal of Innovative Research in Science","volume":"3","author":"N.Paliwal","year":"2014","journal-title":"Engineering and Technology"},{"key":"IJITPM.2018100102-58","doi-asserted-by":"crossref","unstructured":"Park, R. E. (1992). Software Size Measurement: A Framework for Counting Source Statements. Retrieved from http:\/\/www.sei.cmu.edu\/reports\/92tr020.pdf","DOI":"10.21236\/ADA258304"},{"key":"IJITPM.2018100102-59","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.900797"},{"key":"IJITPM.2018100102-60","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00033-6"},{"key":"IJITPM.2018100102-61","doi-asserted-by":"publisher","DOI":"10.1109\/SE-HPCCSE.2016.008"},{"key":"IJITPM.2018100102-62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235449"},{"key":"IJITPM.2018100102-63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSR.1994.365803"},{"key":"IJITPM.2018100102-64","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2016010101"},{"key":"IJITPM.2018100102-65","unstructured":"Remington, K., Zollin, R., & Turner, R. (2009). A model of project complexity: distinguishing dimensions of complexity from severity. In The 9th International Research Network of Project Management Conference (IRNOP-IX). Berlin: IRNOP."},{"key":"IJITPM.2018100102-66","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994374"},{"key":"IJITPM.2018100102-67","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2755-7_65"},{"key":"IJITPM.2018100102-68","author":"T.Saaty","year":"1980","journal-title":"The analytic hierarchy process: Planning, priority setting, resource allocation"},{"key":"IJITPM.2018100102-69","doi-asserted-by":"crossref","unstructured":"Salini, P., & Kanman, S. (2012). Survey and analysis on security requirements engineering. Survey and analysis on security requirements engineering, 38(6), 1785-1797.","DOI":"10.1016\/j.compeleceng.2012.08.008"},{"key":"IJITPM.2018100102-70","unstructured":"Saunders, M., Lewis, P., & Thornhill, A. (2012). Research Methods for Business Students (6 ed.). Pearson Education Limited."},{"key":"IJITPM.2018100102-71","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-225-8_9"},{"key":"IJITPM.2018100102-72","author":"B.Schneier","year":"2000","journal-title":"Secrets and lies: digital security in a networked world"},{"issue":"1","key":"IJITPM.2018100102-73","first-page":"112","article-title":"A complexity measure based on requirement engineering Document.","volume":"1","author":"A.Sharma","year":"2010","journal-title":"Journal of Computing Science and Engineering : JCSE"},{"key":"IJITPM.2018100102-74","doi-asserted-by":"crossref","unstructured":"Slyngstad, O. P., Conradi, R., Babar, M. A., Clerc, V., & Vliet, H. (2008). Risks and risk management in software architecture evolution: An industrial survey. In Proceedings of 15th Asia-Pacific Software Engineering Conference (pp. 101-108). Beijing: IEEE.","DOI":"10.1109\/APSEC.2008.70"},{"key":"IJITPM.2018100102-75","author":"G. W.Snedecor","year":"1989","journal-title":"Statistical methods"},{"key":"IJITPM.2018100102-76","author":"I.Sommerville","year":"2006","journal-title":"Software engineering"},{"key":"IJITPM.2018100102-77","doi-asserted-by":"publisher","DOI":"10.2307\/1412107"},{"key":"IJITPM.2018100102-78","author":"W.Stallings","year":"1999","journal-title":"Cryptography and network security: principles and practice"},{"key":"IJITPM.2018100102-79","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1935.tb02022.x"},{"key":"IJITPM.2018100102-80","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2017070101"},{"key":"IJITPM.2018100102-81","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2182009"},{"key":"IJITPM.2018100102-82","doi-asserted-by":"crossref","unstructured":"Trendowicz, A., & M\u00fcnch, J. (2009). Chapter 6 factors influencing software development productivity\u2014state\u2010of\u2010the\u2010art and industrial experiences. Advances in Computers, 77, 185-241.","DOI":"10.1016\/S0065-2458(09)01206-6"},{"key":"IJITPM.2018100102-83","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2016040101"},{"key":"IJITPM.2018100102-84","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.04.028"},{"key":"IJITPM.2018100102-85","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.10.016"},{"key":"IJITPM.2018100102-86","author":"S.Wagner","year":"2008","journal-title":"A structured review of productivity factors in software development"},{"key":"IJITPM.2018100102-87","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.07.002"},{"key":"IJITPM.2018100102-88","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(98)00047-7"},{"key":"IJITPM.2018100102-89","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.09.2.p079"},{"issue":"18","key":"IJITPM.2018100102-90","first-page":"9377","article-title":"Analysis of upper CASE tools in software design process.","volume":"11","author":"P.Zea Ord\u00f3\u00f1ez Mariuxi","year":"2016","journal-title":"International Journal of Applied Engineering Research"},{"key":"IJITPM.2018100102-91","doi-asserted-by":"crossref","unstructured":"Zuse, H. (1990). Software complexity measures and models. New York, NY: de Gruyter and Co.","DOI":"10.1515\/9783110866087"}],"container-title":["International Journal of Information Technology Project Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=212588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:12:28Z","timestamp":1673907148000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITPM.2018100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":92,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitpm.2018100102","relation":{},"ISSN":["1938-0232","1938-0240"],"issn-type":[{"value":"1938-0232","type":"print"},{"value":"1938-0240","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}