SlideShare a Scribd company logo
1 of 13
A Study on Risk Assessment for Small and
Medium Software Development Projects
By
Spoorthi Sham
1PI14SSE12
• Risk
“ Smoking is dangerous to health. It causes cancer”
5/12/2015 M.Tech SSE, PESIT 2
Introduction
Risk
Scenario
Introduction
• "If you don’t actively attack the risks, the risks
will actively attack you.“ – Tom Gilb
• Barry Boehm’s risk management process
5/12/2015 M.Tech SSE, PESIT 3
5/12/2015 M.Tech SSE, PESIT 4
Introduction
• Software development projects
• Categories
• Examples
• Risk Identification
Creative method
Analytical method
• Risk Analysis
• Risk Prioritization
5/12/2015 M.Tech SSE, PESIT 5
Risk Assessment
SMSDP Risk Assessment Timeline
5/12/2015 8M.Tech SSE, PESIT
Two categories :
• Model category (6)
• Method category (6)
Models Category
Focus Proposes Description Inputs Risk ranking
Decision
taking types
Prototypes
1
Assessment,
treatment and
monitoring
RAT
model
Early phases of
the project
Project plan
and resources
Risk rank matrix –
category,
occurrence
probability, impact
Hybrid
assessment
Web
application
prototype
2
Risk assessment
and estimation SRAEM
Estimates efforts,
cost and risk
exposure
Measurement, model
and assumption errors
Probability and
software metrics of
risk management
Quantitative
assessment --
3
Risk
assessment
SRAM
Based on Grey Theory
using Analytic
Hierarchy Process
Demand analysis,
project quality,
schedule,circumstance,
technology
Subjective and
objective
method
Quantitative
assessment --
4
Risk
assessment
RA model for
prototyping
projects
Structures and
automates the
assessment of risk
Requirements,
personal and
complexity metrics
--
Quantitative
assessment --
5
Risk
assessment SRAM
Uses
comprehensive
questionnaire
Complexity,reliability,
requirements,
development
process, tools used
Impact of risk
elements on
quality,schedule and
cost
Quantitative
assessment --
6
Risk
assessment SPRAM
Assessment of
loss and risk
impact
Risk factor nodes
Conditional
probability
distribution table
Hybrid
assessment
--
5/12/2015 9M.Tech SSE, PESIT
Methods Category
Focus Proposes Description Inputs
Risk
ranking
Decision
taking types
Prototypes
1
Cost and
quality
Expectation –
Maximization
algorithm
Enhances ability
in producing
hidden nodes
Probability
vector of top-
level nodes
--
Quantitative
assessment
Assessment
tool
2
Risk
assessment
Source based
SRAM
Accounts
primary and
secondary facts
Primary and
secondary
facts
--
Quantitative
assessment
--
3
Risk
identification
Risk identification
based on Kepner-
Tregoe Program
4 analysis
methods : PA,
DA, PPA, SA
Checking
vulnerable
areas
--
Quantitative
assessment
--
4
Risk
assessment
Fuzzy expert
system
Evaluates risk in
all respects
Management,
funding,
planning,
technology
Matrix based on
probability and
severity
measurements
Quantitative
assessment
Assessment
fuzzy expert
system
5
Risk
assessment
Fuzzy linguistic
multiple attribute
decision making
method
Estimates risk
criteria values
Information
from
experts
Probability,
loss,uncontrolla
bility,
occurence time
Quantitative
assessment
Case study
application for
historic data
6
Risk
assessment
Risk assessment
method
Uses probabilistic
interference model
Interview
based risk
assessment
3 choices
Quantitative
assessment
Risk assessment
visualization tool
(RAVT) 4
5/12/2015 10M.Tech SSE, PESIT
Level of Risk Assessment Awareness
5/12/2015 11M.Tech SSE, PESIT
Trend (2008)
5/12/2015 12M.Tech SSE, PESIT
• Software development
• Risk assessment
Author’s Conclusion
• 12 articles based on two categories according to 7
parameters
• The parameters and inputs that each model or
method takes are not all of them available in SMSDPs
• SMSDPs are rapid development projects and they
run from cost, they have no time to fill all the
conditions defined by methods or models
5/12/2015 13M.Tech SSE, PESIT
A five – step process to assess risks :
• Establish strategic guidelines
• Determine model direction
• Choose the model
• Perform gap analysis
• Design a strategic road map
Conclusion
5/12/2015 14M.Tech SSE, PESIT
Thank You
5/12/2015 15M.Tech SSE, PESIT

More Related Content

What's hot

Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk AssessmentMichael Lines
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoringwww.datatrak.com
 
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014Risk Based Monitoring presentation by Triumph Research Intelligence January 2014
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014Triumph Consultancy Services
 
Tools to Drive Enrollment OCT Arena-Boston-2015
Tools to Drive Enrollment OCT Arena-Boston-2015Tools to Drive Enrollment OCT Arena-Boston-2015
Tools to Drive Enrollment OCT Arena-Boston-2015Dan Diaz
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Researchwww.datatrak.com
 
Risk Based Monitoring in Practice
Risk Based Monitoring in PracticeRisk Based Monitoring in Practice
Risk Based Monitoring in Practicewww.datatrak.com
 
Project Data Incorporating Qualitative Factors for Improved Software Defect P...
Project Data Incorporating Qualitative Factors for Improved Software Defect P...Project Data Incorporating Qualitative Factors for Improved Software Defect P...
Project Data Incorporating Qualitative Factors for Improved Software Defect P...Tim Menzies
 
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...WorldCongress
 
Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies www.datatrak.com
 
The mr process
The mr processThe mr process
The mr processsandyputul
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...ESEM 2014
 
Challenges and future directions of software technology: secure software deve...
Challenges and future directions of software technology: secure software deve...Challenges and future directions of software technology: secure software deve...
Challenges and future directions of software technology: secure software deve...Amna
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides SlideTeam
 

What's hot (20)

Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk Assessment
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoring
 
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014Risk Based Monitoring presentation by Triumph Research Intelligence January 2014
Risk Based Monitoring presentation by Triumph Research Intelligence January 2014
 
Tools to Drive Enrollment OCT Arena-Boston-2015
Tools to Drive Enrollment OCT Arena-Boston-2015Tools to Drive Enrollment OCT Arena-Boston-2015
Tools to Drive Enrollment OCT Arena-Boston-2015
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
 
TRI's DIA 2015 Presentation, Therapeutic KRIs: Digestive Disease
TRI's DIA 2015 Presentation, Therapeutic KRIs:  Digestive DiseaseTRI's DIA 2015 Presentation, Therapeutic KRIs:  Digestive Disease
TRI's DIA 2015 Presentation, Therapeutic KRIs: Digestive Disease
 
Risk Based Monitoring in Practice
Risk Based Monitoring in PracticeRisk Based Monitoring in Practice
Risk Based Monitoring in Practice
 
Project Data Incorporating Qualitative Factors for Improved Software Defect P...
Project Data Incorporating Qualitative Factors for Improved Software Defect P...Project Data Incorporating Qualitative Factors for Improved Software Defect P...
Project Data Incorporating Qualitative Factors for Improved Software Defect P...
 
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
 
Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
The mr process
The mr processThe mr process
The mr process
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
215 Towards a Framework to Support Large Scale Sampling in Software Engineeri...
 
Challenges and future directions of software technology: secure software deve...
Challenges and future directions of software technology: secure software deve...Challenges and future directions of software technology: secure software deve...
Challenges and future directions of software technology: secure software deve...
 
Risk analysis
Risk analysis Risk analysis
Risk analysis
 
Risk assessment tools and techniques
Risk assessment tools and techniquesRisk assessment tools and techniques
Risk assessment tools and techniques
 
Ml part2
Ml part2Ml part2
Ml part2
 
SA 530 Audit Sampling
SA 530 Audit SamplingSA 530 Audit Sampling
SA 530 Audit Sampling
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 

Viewers also liked

XIV Jornada INGECAL
XIV Jornada INGECALXIV Jornada INGECAL
XIV Jornada INGECALINGECAL
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisAlin Veronika
 
European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015FERMA
 
Risk Management in the Airline Industry
Risk Management in the Airline IndustryRisk Management in the Airline Industry
Risk Management in the Airline IndustryMohammed
 
FMEA Introduction.ppt
FMEA Introduction.pptFMEA Introduction.ppt
FMEA Introduction.pptbowerj
 
Failure Mode Effect Analysis (FMEA)
Failure Mode Effect Analysis (FMEA)Failure Mode Effect Analysis (FMEA)
Failure Mode Effect Analysis (FMEA)DEEPAK SAHOO
 
ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016Toyo Gustaman
 
Nebosh important q&a
Nebosh important q&aNebosh important q&a
Nebosh important q&ahijaziosama
 

Viewers also liked (8)

XIV Jornada INGECAL
XIV Jornada INGECALXIV Jornada INGECAL
XIV Jornada INGECAL
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative Analysis
 
European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015
 
Risk Management in the Airline Industry
Risk Management in the Airline IndustryRisk Management in the Airline Industry
Risk Management in the Airline Industry
 
FMEA Introduction.ppt
FMEA Introduction.pptFMEA Introduction.ppt
FMEA Introduction.ppt
 
Failure Mode Effect Analysis (FMEA)
Failure Mode Effect Analysis (FMEA)Failure Mode Effect Analysis (FMEA)
Failure Mode Effect Analysis (FMEA)
 
ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016ISO/TS 16949:2009 to IATF 16949:2016
ISO/TS 16949:2009 to IATF 16949:2016
 
Nebosh important q&a
Nebosh important q&aNebosh important q&a
Nebosh important q&a
 

Similar to Risk assessment

PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfMUST
 
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisHow to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisiZenBridge Consultancy Pvt. Ltd.
 
Perform qualitative risk analysis
Perform qualitative risk analysis Perform qualitative risk analysis
Perform qualitative risk analysis Shereef Sabri
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)Serdar Temiz
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information Systemtulipbiru64
 
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...GoQA
 
PetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factorPECB
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk ManagementLouis A. Poulin
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk ManagementRuchir Shah
 
Data Analytics for Internal Auditors - Understanding Sampling
Data Analytics for Internal Auditors - Understanding SamplingData Analytics for Internal Auditors - Understanding Sampling
Data Analytics for Internal Auditors - Understanding SamplingJim Kaplan CIA CFE
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety cvandr4
 
PMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep PresentationPMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep Presentationscottdreynolds
 

Similar to Risk assessment (20)

PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdf
 
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysisHow to Prioritize Risks with Qualitative and Quantitative Risk analysis
How to Prioritize Risks with Qualitative and Quantitative Risk analysis
 
Project managment 10
Project managment  10Project managment  10
Project managment 10
 
Perform qualitative risk analysis
Perform qualitative risk analysis Perform qualitative risk analysis
Perform qualitative risk analysis
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information System
 
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...
МАРИНА ШУЛЬГА «Чому розробка ядерних програм США може навчити софтверних тест...
 
PetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & Management
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
 
10- PMP Training - Risk Management
10- PMP Training - Risk Management 10- PMP Training - Risk Management
10- PMP Training - Risk Management
 
Risk management mod
Risk management modRisk management mod
Risk management mod
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
Procedural Risk Management
Procedural Risk ManagementProcedural Risk Management
Procedural Risk Management
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEs
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
Data Analytics for Internal Auditors - Understanding Sampling
Data Analytics for Internal Auditors - Understanding SamplingData Analytics for Internal Auditors - Understanding Sampling
Data Analytics for Internal Auditors - Understanding Sampling
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety
 
Session 18 4th edition PMP
Session 18 4th edition PMPSession 18 4th edition PMP
Session 18 4th edition PMP
 
PMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep PresentationPMI-RMP Exam Prep Presentation
PMI-RMP Exam Prep Presentation
 

More from Spoorthi Sham

Supply chain risk management
Supply chain risk managementSupply chain risk management
Supply chain risk managementSpoorthi Sham
 
Software assessment and audit
Software assessment and auditSoftware assessment and audit
Software assessment and auditSpoorthi Sham
 
Lean, six sigma and lean six sigma
Lean, six sigma and lean six sigmaLean, six sigma and lean six sigma
Lean, six sigma and lean six sigmaSpoorthi Sham
 
Response time difference analysis of performance testing tools
Response time difference analysis of performance testing toolsResponse time difference analysis of performance testing tools
Response time difference analysis of performance testing toolsSpoorthi Sham
 

More from Spoorthi Sham (7)

Supply chain risk management
Supply chain risk managementSupply chain risk management
Supply chain risk management
 
Software assessment and audit
Software assessment and auditSoftware assessment and audit
Software assessment and audit
 
Lean, six sigma and lean six sigma
Lean, six sigma and lean six sigmaLean, six sigma and lean six sigma
Lean, six sigma and lean six sigma
 
Exploratory testing
Exploratory testingExploratory testing
Exploratory testing
 
Ipc
IpcIpc
Ipc
 
Response time difference analysis of performance testing tools
Response time difference analysis of performance testing toolsResponse time difference analysis of performance testing tools
Response time difference analysis of performance testing tools
 
Mutimedia databases
Mutimedia databasesMutimedia databases
Mutimedia databases
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

Risk assessment

  • 1. A Study on Risk Assessment for Small and Medium Software Development Projects By Spoorthi Sham 1PI14SSE12
  • 2. • Risk “ Smoking is dangerous to health. It causes cancer” 5/12/2015 M.Tech SSE, PESIT 2 Introduction Risk Scenario
  • 3. Introduction • "If you don’t actively attack the risks, the risks will actively attack you.“ – Tom Gilb • Barry Boehm’s risk management process 5/12/2015 M.Tech SSE, PESIT 3
  • 4. 5/12/2015 M.Tech SSE, PESIT 4 Introduction • Software development projects • Categories • Examples
  • 5. • Risk Identification Creative method Analytical method • Risk Analysis • Risk Prioritization 5/12/2015 M.Tech SSE, PESIT 5 Risk Assessment
  • 6. SMSDP Risk Assessment Timeline 5/12/2015 8M.Tech SSE, PESIT Two categories : • Model category (6) • Method category (6)
  • 7. Models Category Focus Proposes Description Inputs Risk ranking Decision taking types Prototypes 1 Assessment, treatment and monitoring RAT model Early phases of the project Project plan and resources Risk rank matrix – category, occurrence probability, impact Hybrid assessment Web application prototype 2 Risk assessment and estimation SRAEM Estimates efforts, cost and risk exposure Measurement, model and assumption errors Probability and software metrics of risk management Quantitative assessment -- 3 Risk assessment SRAM Based on Grey Theory using Analytic Hierarchy Process Demand analysis, project quality, schedule,circumstance, technology Subjective and objective method Quantitative assessment -- 4 Risk assessment RA model for prototyping projects Structures and automates the assessment of risk Requirements, personal and complexity metrics -- Quantitative assessment -- 5 Risk assessment SRAM Uses comprehensive questionnaire Complexity,reliability, requirements, development process, tools used Impact of risk elements on quality,schedule and cost Quantitative assessment -- 6 Risk assessment SPRAM Assessment of loss and risk impact Risk factor nodes Conditional probability distribution table Hybrid assessment -- 5/12/2015 9M.Tech SSE, PESIT
  • 8. Methods Category Focus Proposes Description Inputs Risk ranking Decision taking types Prototypes 1 Cost and quality Expectation – Maximization algorithm Enhances ability in producing hidden nodes Probability vector of top- level nodes -- Quantitative assessment Assessment tool 2 Risk assessment Source based SRAM Accounts primary and secondary facts Primary and secondary facts -- Quantitative assessment -- 3 Risk identification Risk identification based on Kepner- Tregoe Program 4 analysis methods : PA, DA, PPA, SA Checking vulnerable areas -- Quantitative assessment -- 4 Risk assessment Fuzzy expert system Evaluates risk in all respects Management, funding, planning, technology Matrix based on probability and severity measurements Quantitative assessment Assessment fuzzy expert system 5 Risk assessment Fuzzy linguistic multiple attribute decision making method Estimates risk criteria values Information from experts Probability, loss,uncontrolla bility, occurence time Quantitative assessment Case study application for historic data 6 Risk assessment Risk assessment method Uses probabilistic interference model Interview based risk assessment 3 choices Quantitative assessment Risk assessment visualization tool (RAVT) 4 5/12/2015 10M.Tech SSE, PESIT
  • 9. Level of Risk Assessment Awareness 5/12/2015 11M.Tech SSE, PESIT
  • 10. Trend (2008) 5/12/2015 12M.Tech SSE, PESIT • Software development • Risk assessment
  • 11. Author’s Conclusion • 12 articles based on two categories according to 7 parameters • The parameters and inputs that each model or method takes are not all of them available in SMSDPs • SMSDPs are rapid development projects and they run from cost, they have no time to fill all the conditions defined by methods or models 5/12/2015 13M.Tech SSE, PESIT
  • 12. A five – step process to assess risks : • Establish strategic guidelines • Determine model direction • Choose the model • Perform gap analysis • Design a strategic road map Conclusion 5/12/2015 14M.Tech SSE, PESIT