Preview

Risk management

Powerful Essays
Open Document
Open Document
17158 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk management
CS-TR-3782
UMIACS-TR-97-38

The Riskit Method for Software Risk Management, version 1.00
Jyrki Kontio
Institute for Advanced Computer Studies and
Department of Computer Science
University of Maryland
A.V. Williams Building
College Park, MD 20742, U.S.A.
Emails: jkontio@cs.umd.edu jyrki.kontio@cs.hut.fi Version 1.00
Status: Final
Abstract:
This paper presents the Riskit method for software engineering risk management. This document contains the motivation for the method, description of the Riskit analysis graph and a detailed description of the Riskit process.

Table of Contents
1.
2.
3.
4.
5.
6.

Introduction ...................................................................................................................4
Acknowledgments ..........................................................................................................4
Terminology...................................................................................................................5
Motivation for Risk Management....................................................................................6
Decomposing Risk: The Riskit Analysis Graph ...............................................................9
Risk Management Process ............................................................................................14
6.1 Risk Management Mandate Definition ......................................................................17
6.2 Goal review ..............................................................................................................19
6.3 Risk Identification.....................................................................................................22
6.4 Risk Analysis ............................................................................................................23
6.4.1 Risks Item Clustering ........................................................................................24
6.4.2 Risk



References: Microsoft Bookshelf/Houghton Mifflin Company, 1992. Anonymous. Merriam-Webster 's Collegiate Dictionary, Springfield, MA: MerriamWebster, 1995. V.R. Basili, Software Development: A Paradigm for the Future pp. 471-485, 1989. V.R. Basili, Software Modeling and Measurement: The Goal/Question/Metric Paradigm CS-TR-2956, 1992 pp. 370-381, 1992. Proceedings of the International Conference on Software Engineering, May 1992 Sons, 1994. pp. 528-532. Sons, 1994. pp. 470-476. A. Behforooz and F.J. Hudson. Software Engineering Fundamentals, New York: Oxford University Press, 1996. B.W. Boehm. Software Engineering Economics, Englewood Cliffs, N.J.: Prentice Hall, 1981. B.W. Boehm. Tutorial: Software Risk Management, IEEE Computer Society Press, 1989. Engineering Institute, 1993. R.N. Charette. Software Engineering Risk Analysis and Management, New York: McGraw-Hill, 1989. R.N. Charette. Applications Strategies for Risk Analysis, New York: McGraw-Hill, 1990. 2-9, September, 1992. Oxford: Pergamon, 1989. pp. 45-50. [21] N.E. Fenton. Software Metrics A Rigorous Approach, London: Chapman & Hall, 1991. [22] S. French. Decision Theory: An Introduction to the Mathematics of Rationality, Chichester: Ellis Horwood, 1986. [23] S. French. Readings in Decision Analysis, London: Chapman and Hall, 1989. [25] D.W. Karolak. Software Engineering Risk Management, Washington, DC: IEEE, 1996. [26] R.L. Keeney and H. Raiffa. Decision with Multiple Objectives: Preferences and Value Tradeoffs, New York: John Wiley & Sons, 1976. [27] J. Kontio, Software Engineering Risk Management: A Technology Review Report PI_4.1, 1994

You May Also Find These Documents Helpful

  • Good Essays

    Bsbpmg510A Kbq

    • 635 Words
    • 3 Pages

    Risk Management: While a new process or equipment may seem desirable this is not always the case due to the risks involved whether it be financial or otherwise. All these risks must be kept to a minimum through risk analysis in the planning and brainstorming phases or the new project could have a detrimental effect on the business or individuals.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The cons of implementing an Enterprise Risk Management System are involved with too many resources, sometimes it is quite time consuming and hard to determine the possibility of the risks.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    A closer look to the literature or project risk management standards will make the reader understand that depending on the author of the methodology, the name or the order of these sub-processes is different. Thus, risk identification and risk quantification are sometimes taken together and are called risk assessment or risk analysis; the risk response plan is sometimes met under the name of risk mitigation plan; the risk response plan and the risk control plan are sometimes taken together under the name of risk management plan.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The benefits of risk response control are improves effectiveness and efficiency of the risk approach during the project implementation. Risk response control includes the following elements throughout the project:…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Braude, E. J., & Bernstein, M. E. (2011). Software Engineering, Modern Approaches (2nd ed.). :…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Manage Risk

    • 7591 Words
    • 24 Pages

    The reason the investigation was conducted was to gauge what was both good and bad about the new café opening, what needs to be changed in order to increase efficiency at work and any legislative laws involved.…

    • 7591 Words
    • 24 Pages
    Powerful Essays
  • Best Essays

    Risk assessment is the process to identify areas of concern so an efficient response and an effective recovery plan can be placed if needed. In order to assess the potential risks a trial can face and to create a plan, six steps could be used: 1) Identify all the required Functions and Processes in the project; 2) Rank these identified functions and processes according to their “criticality”; 3) Determine the required time for recovery so the critical functions and processes can be maintained; 4) Identify those threats that could severely impact these critical functions and processes; 5) Determine the vulnerability of each critical project function and process; and 6) Identify and plan,…

    • 1542 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Risk assessment and risk management are regarded as key activities during preparation, critical reviews and implementation of a major application system like a VAT system. The risks that may impede the implementation covers a much broader spectrum than that of the information system itself as depicted below.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 1

    • 301 Words
    • 2 Pages

    A. RAI B. ROI C. RTO D. RPO 11. A(n) ________ identies processes that are critical to the operation of a business. 12. Which risk-assessment methodology is marketed as a self-directed approach and has two different editions for organizations of different sizes? A. CRAMM B. OCTAVE C. NIST D. EBIOS 13.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    An applications upgrade delivers the organization a tool which acts as a catalyst for business change, by delivering – new functionalities, better performance, new applications, etc. The effective migration/upgrade of the application ensures that the management enjoys the fruit of the efforts put/invested in this project. Thus it is the responsibility of the project team to ensure that all the risks are mitigated…

    • 1915 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    OWASP

    • 5288 Words
    • 22 Pages

    O About OWASP Foreword About OWASP Insecure software is already undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our digital infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially. We can no longer afford to tolerate relatively simple security problems like those presented in the OWASP Top 10. The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.…

    • 5288 Words
    • 22 Pages
    Good Essays
  • Powerful Essays

    Spiral Model

    • 8658 Words
    • 35 Pages

    spiral model; illustrate the application of the spiral model to a software project, using the TRW Software Productivity Project as an example; summarize the primary advantages a n d implications involved in using the spiral model and the primary difficulties in using it at its current incomplete level of elaboration; and present resulting conclusions.…

    • 8658 Words
    • 35 Pages
    Powerful Essays