SlideShare a Scribd company logo
1 of 7
Download to read offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Emerging Technologies in Computational
and Applied Sciences (IJETCAS)
www.iasir.net
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 223
ISSN (Print): 2279-0047
ISSN (Online): 2279-0055
Association between Requirement Engineering Processes and Risk
Management
Rajinder Singh
Department of Electronics, S.D College, Ambala Cantt, Haryana, India
___________________________________________________________________________________
Abstract: The software industry has shown ballooning growth rate in last few years but still it is over burdened
with failed and delayed projects. Most of these failed projects overrun their original budget. As per a report
presented by The Standish Group, 72 percent of software projects are failed as those are completed after
scheduled time and are over budget. More than 23 percent of software projects are cancelled before they ever
get completed, and 49 percent of projects cost 145 percent of their original estimates. (Standish, 1995). In
retrospection, many of these companies reported that their problems could have been avoided or drastically
reduced if high-risk elements of the project could have been identified in advance. Although there are many
risks involved in software development life cycle but the major risks are related to software cost, quality and
scheduling which can be controlled and avoided if proper strategies are adopted in the initial stages. Risk
management helps us to identify, analyze and control various risks associated with software development cycle.
Theories say, all of these risks crepes in due to poor requirement engineering processes followed by software
development team. Lack of understanding of client’s requirements, frequent changes in requirements, lack of
user involvement. Lack of standards for requirement elicitation methods are some of the factors which leads to
delayed, over budget and low quality software projects. If requirement engineering processes are followed by
companies, risks can be managed properly. So requirement engineering processes and risk management are co-
related and go side by side. The aim of this study is to check how much RE processes affects risk management
by conducting a survey in nine different software development companies and taking evidence from the software
developers who are actually using these practices practically in their jobs.
Keywords: Requirement Engineering, RE Processes, Risk Management, Software Engineering
___________________________________________________________________________________
I. Introduction
The software industry has shown ballooning growth rate in last few years but still it is over burdened with failed
and delayed projects. Most of these failed projects overrun their original budget. As per a report presented by
The Standish Group, 72 percent of software projects are failed as those are completed after scheduled time and
are over budget. More than 23 percent of software projects are cancelled before they ever get completed, and 49
percent of projects cost 145 percent of their original estimates (Standish, 1995). In retrospection, many of these
companies reported that their problems could have been avoided or drastically reduced if high-risk elements of
the project could have been identified in advance.
Although there are many risks involved in software development life cycle but the major risks are related to
software cost, quality and scheduling which can be controlled and avoided if proper strategies are adopted in the
initial stages. Risk management helps us to identify, analyze and control various risks associated with software
development cycle.
Theories say, all of these risks crepes in due to poor requirement engineering processes followed by software
development team. Lack of understanding of client’s requirements, frequent changes in requirements, lack of
user involvement. Lack of standards for requirement elicitation methods are some of the factors which leads to
delayed, over budget and low quality software projects. If requirement engineering processes are followed by
companies, risks can be managed properly. So requirement engineering processes and risk management are co-
related and go side by side.
The aim of this study is to check how much RE processes affects risk management by conducting a survey in
nine different software development companies and taking evidence from the software developers who are
actually using these practices practically in their jobs.
For this study, I have asked the questions to 23 respondents from 9 software development companies of Ambala,
Gurgaon, Pune, and Chandigarh. All these respondents are engaged in software development as developer or
manager.
This paper is divided in five sections. Section I gives introduction, Section II describes Requirement
Engineering, Section III gives introduction of Risk Management, Section IV states the objective of study, and
Section V gives details of Questions, results and their analysis followed by conclusion.
II. Requirement Engineering:
RE can be simply defined as identifying a problem’s context, locating the customer’s requirements within that
context and delivering a specification that meets customer needs within that context. There are many
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223-
229
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 224
requirements methodologies that purport to do this, for example, soft systems methodology [1], scenario
analysis [2], and UML [3]. Sometimes they work, sometimes they do not. The implication of such requirements
methodologies, if we can label at least aspects of them as such, is that the application of ‘x’ method will produce
the right requirements irrespective of the problem’s characteristics.
This is conventional wisdom and unsurprisingly, the creators and vendors of requirements methodologies claim,
with one exception [4] that their approach is a hammer and all problems are nails. While there are many factors
other than just application of a requirements methodology that influence the success or failure of software
projects in practice, in this paper I focus only on requirements engineering.
III. Risk Management:
A risk is a potential future harm that may arise from some present action (Wikipedia, 2004), such as, a schedule
slip or a cost overrun. The loss may be in terms of direct financial loss or indirect loss in terms of goodwill,
fame, future business, or loss of property or life.
Risk management is a series of steps whose objectives are to identify, address, and eliminate software risk items
before they become either threats to successful software operation or a major source of expensive rework.
(Boehm, 1989)
In the software development cycle, risks can be software requirement risks, software cost risks, software
scheduling risks and software quality risks. Due to these risks projects fail. Many projects fail either because
simple problems were reported too late or because the wrong problem was addressed (Bruegge and Dutoit,
2000). Software development Teams can be reactive or proactive about these problems. Reactive teams are
which take rapid action after the problem has occurred and find out the solution. On the other hand, Proactive
teams anticipate the risks and take preventive measures to avoid those risks to happen. They plan in advance to
avoid those risks to happen.
A. Risk Management Process( Risk Management ,Laurie Williams 2004):
A.1 Risk Identification
The very first step in the risk management process is risk identification. In this step, the team identifies as many
project risks as possible to make them explicit before they become problems. Risks can be of three types:
i) Project Risks
The risks which affect the project schedule or the personnel or budgets dedicated to the project are
known as Project risks.
ii) Product risks
The risks which affect the quality or performance of the software being developed are known as
Product risks.
iii) Business risks:
The risks which threaten the viability of the software are known as business risks , such as building an
excellent product no one wants or building a product that no longer fits into the overall business
strategy of the company.
A.2 Analyze
After the identification of risks, the next step is the analysis of risks. In the analysis phase, the identified risks
are transformed into decision-making information. The probability and the seriousness of each identified risk is
assessed. For each risk, the team must do the following:
• Assess the probability of a loss occurring. Set numerical probability for each qualitative value (e.g. very
improbable= 5 percent, improbable = 10 percent).
• Assess the impact of the loss if the loss were to occur. Delineate the consequences of the risk, and estimate the
impact of the risk on the project and the product. Similar to the probability discussion above, the team can
choose to assign numerical monetary values to the magnitude of loss, such as Rs100,000 for a week delay in
schedule.
A.3 Prioritize
The third step in risk management process is prioritizing the risks by ranking them. It is not feasible to take
action on every identified risk as too much of cost is involved. Some of them have a very low impact or a very
low probability of occurring – or both. By prioritization process, the team decides which risks it will take action
on. The team sorts the list so that the high probability, high impact risks percolate to the top of the table and the
low-probability, low impact risks drop to the bottom.
A.4 Plan
Risk management plans should be developed for each of the “above the line” prioritized risks so that proactive
action can take place.
A.5 Mitigate
Related to risk planning, through risk mitigation, the team develops strategies to reduce the possibility or the
loss impact of a risk. Risk mitigation produces a situation in which the risk items are eliminated or otherwise
resolved.
A.6 Monitor
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223-
229
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 225
After risks are identified, analyzed, and prioritized, and actions are established, it is essential that the team
regularly monitor the progress of the product and the resolution of the risk items, taking corrective action when
necessary. This monitoring can be done as part of the team project management activities or via explicit risk
management
A.7 Communicate
On-going and effective communication between management, the development team, marketing, and customer
representatives about project risks is essential for effective risk management.
IV. Objective of Study:
Theories say that RE practices helps managing the risk which in turn leads to the success of any software
project. The objective of this study is to explore the impact of requirement engineering practices on risk
management. Software industry is devoting large amount of funds towards the development of software thus
increasing the cost of final project. Cost incurred due to risks of rework or delayed projects or over budget
projects can be eliminated if can be identified at the initial stage of project development cycle and RE processes
if followed can reduce these risks drastically. Knowing the common underlying problems that cause risks and
identification of RE practices that reduces scope of risks will help software development teams avoid making
those same mistakes over and over and making use of those practices that have more success rate. Aim of this
study is to take the evidence from the IT professionals about the impact of RE processes on Risk management.
A. Research Methodologies
The aim of this paper is to check whether the RE practices lead to effective risk management or not. If such
practices are thoroughly studied, they could be used for enabling reduction of risks associated with project
development.
For this paper, I have conducted survey on some of Indian Companies and tried to find out the relation between
RE practices and Risk management.
To prepare the evidence to check the impact of Requirement engineering tools on risk management, a
Questionnaire is prepared and is filled by the authorized employees of the companies such as Infosys, Cognizant
Technology(Pune), Market RX (Gurgaon), One World Technology (Ambala), Ameotech Informatics
(Chandigarh), GENPACT, GTech Informatics, Automatic Data Processing India Pvt. Ltd, Silex Softwares Pvt.
Ltd. (Ambala).
After collecting the data from these companies, analysis of the data is done using frequency tables and graphs
tools of SPSS Software. The sample size used in this study involved 23 software development projects from
nine companies of Pune, Gurgaon, Chandigarh and Ambala. Due to this reduced sample size, the use of
qualitative research methods was preferred. Furthermore, the main aim of this study is to formulate a hypothesis
about the relationship between RE process and the risk management.
V. Questionnaire Results & Analysis:
I received completed questionnaires from number of respondents, reporting on 23 distinct projects. As noted
earlier, the majority of our respondents were developers or project managers from Pune, Gurgaon, Chandigarh
and Ambala based companies.The Survey questionnaire had mixed type of questions.
A. Questions & Responses:
Q1 How important is the use of RE Processes in improving risk management?
 Very Important
 Important
 Unsure
 Not really Important
 Not Important at All
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid important 3 13.6 13.6 13.6
very
important
19 86.4 86.4 100.0
Total 22 100.0 100.0
Q1
very important
important
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(1), March-May, 2014, pp. 1-
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 226
Analysis:
13.6 % respondents believe that RE processes are very important in improving risk management and 86.4%
believes it plays important role in improving risk management. No one selected unsure, not really important or
no important at all.
Q2 How the RE process affected risk assessment of the project?
 Far More
 More
 Same
 Less
 Far Less
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid far
more
1 4.5 4.5 4.5
more 21 95.5 95.5 100.0
Total 22 100.0 100.0
Q2
more
far more
Analysis:
95.5% respondents have selected more option. 4.5% respondents selected far more option. That means 100%
respondents believe that RE process affected risk assessment of the project
Q3 How do you believe the communication inspired by the requirements Analysis sessions improved or
deteriorated Risk management
 Far More
 More
 Same
 Less
 Far Less
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid far
more
7 31.8 31.8 31.8
more 15 68.2 68.2 100.0
Total 22 100.0 100.0
Q3
more
far more
Analysis:
68.2% respondents have selected more option. 31.8% respondents selected far more option. That means 100%
respondents believe that communication inspired by the requirements Analysis sessions improved or
deteriorated Risk management.
Q4 To what extend did the requirements engineering process enable your organization to manage
requirements:
 Far More
 More
 Same
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223-
229
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 227
 Less
 Far Less
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid far more 12 54.5 54.5 54.5
more 5 22.7 22.7 77.3
same 5 22.7 22.7 100.0
Total 22 100.0 100.0
Q4
same
more
far more
Analysis:
54.5% respondents have selected far more option. 22.7% respondents have selected more option and 22.7%
respondents have selected same option. That means requirements can be managed effectively if RE processes
are followed.
Q5 To what extend did the requirements engineering process enable your organization to assess impact of
changing requirements?
 Far More
 More
 Same
 Less
 Far Less
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid far
more
1 4.5 4.5 4.5
more 20 90.9 90.9 95.5
same 1 4.5 4.5 100.0
Total
22
100.
0
100.0
Q5
same
more
far more
Analysis:
90.9% respondents have selected more option. 4.5% respondents have selected far more option and 4.5%
respondents have selected same option. That means approx 95% respondents believe that requirements
engineering process enable organization to assess impact of changing requirements.
Q6 To what extend did the requirements engineering process enable your organization to analyze risk
 Far More
 More
 Same
 Less
 Far Less
Frequency
Percent
Valid
Percent
Cumulative
Percent
Valid far
more
5 22.7 22.7 22.7
less 5 22.7 22.7 45.5
more 12 54.5 54.5 100.0
Total 22 100.0 100.0
Q6
more
less
far more
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(1), March-May, 2014, pp. 1-
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 228
IMPLEMENTATION
Analysis:
54.5% respondents have selected more option. 22.7% respondents have selected far more option and 22.7%
respondents have selected less option. That means 77.2% respondents believe that requirements engineering
process enable organization to analyze risk.
Q7 In your design, coding, testing or documentation activities, how important is it to understand the
effect of RE processes on risk management.
DESIGN
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid import
ant
3 13.6 13.6 13.6
very
import
ant
19 86.4 86.4 100.0
Total 22 100.0 100.0
DESIGN
very important
important
IMPLEMENTATION
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid important 3 13.6 13.6 13.6
very
important
19 86.4 86.4 100.0
Total 22 100.0 100.0
TESTING
Frequency
Percent
Valid
Percent
Cumulative
Percent
Vali
d
important
2 9.1 9.1 9.1
neutral 2 9.1 9.1 18.2
not really
important
1 4.5 4.5 22.7
very important 17 77.3 77.3 100.0
Total 22 100.0 100.0
TESTING
very important
not really important
neutral
important
Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223-
229
IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 229
DOCUMENT
Frequency
Percent
ValidPercent
Cumulative
Percent
Valid important 6 27.3 27.3 27.3
neutral 3 13.6 13.6 40.9
not really
important
2 9.1 9.1 50.0
very
important
11 50.0 50.0 100.0
Total 22 100.0 100.0
DOCUMENT
very important
not really important
neutral
important
Analysis:
In Design phase, 100% respondents considered RE processes Important and very important for risk management
In Implementation phase, 100% respondents considered RE processes Important and very important for risk
management.
In Testing phase, 77.3% respondents considered RE processes very important, 9.1 % considered important,
9.1% were neutral and 4.5 % considered not important.
In Documentation phase, 50% respondents considered RE processes very important, 27.3 % considered
important, 13.6% were neutral and 9.1 % considered not really important.
Conclusion:
From above study, it is concluded that practically also most of the Software developers believe that if RE
processes followed properly help manage the risk effectively thereby reducing the risk of cost, schedule, quality
and requirements. There is a direct relationship between RE processes and Risk management.
References:
[1] Checkland, P., Systems Thinking, Systems Practice, Wiley Publications, 1981.
[2] Carroll, J. (ed.), Scenario-Based Design: Envisioning Work and Technology in System Development, Wiley Publications, 1995.
[3] Booch, G., Rumbaugh, J., Jacobson, The UML User Guide, Addison Wesley, 1999.
[4] Jackson, M., Problem Frames, Addison Wesley, 2001.
[5] Boehm, B. (1989). Software Risk Management. Washington, DC, IEEE Computer Society Press.
[6] Boehm, B. (January 1991). "Software Risk Management: Principles and Practices." IEEE Software: 32-41.
[7] Boehm, B. and R. Turner (2003). Balancing Agility and Discipline: A Guide for the Perplexed. Boston, MA, Addison Wesley.

More Related Content

What's hot

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaIJMTST Journal
 
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...
IRJET- A Review Paper on Risk Management using Primavera for Residential ...IRJET Journal
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Softwareijtsrd
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)Nesma
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk ManagementAchmad Solichin
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 
Project risk management
Project risk managementProject risk management
Project risk managementHaseeb Khan
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfPriyanshTan
 
Software metric analysis methods for product development maintenance projects
Software metric analysis methods for product development  maintenance projectsSoftware metric analysis methods for product development  maintenance projects
Software metric analysis methods for product development maintenance projectsIAEME Publication
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product developmentiaemedu
 
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...IRJET Journal
 
The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...amiraiti
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Applicationguestfea9c55
 
A study of various factors affecting risk management techniques in constructi...
A study of various factors affecting risk management techniques in constructi...A study of various factors affecting risk management techniques in constructi...
A study of various factors affecting risk management techniques in constructi...eSAT Journals
 
18 zain ul abideen final paper258--267
18 zain ul abideen final paper258--26718 zain ul abideen final paper258--267
18 zain ul abideen final paper258--267Alexander Decker
 

What's hot (20)

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
 
CRISC Exam Questions
CRISC Exam QuestionsCRISC Exam Questions
CRISC Exam Questions
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 
Project risk management
Project risk managementProject risk management
Project risk management
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
Software metric analysis methods for product development maintenance projects
Software metric analysis methods for product development  maintenance projectsSoftware metric analysis methods for product development  maintenance projects
Software metric analysis methods for product development maintenance projects
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product development
 
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...
IRJET- Review on Developing a Model of Risk Allocation and Risk Handling for ...
 
The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...
 
Software Engineering Risk Management Software Application
Software Engineering Risk Management   Software ApplicationSoftware Engineering Risk Management   Software Application
Software Engineering Risk Management Software Application
 
A study of various factors affecting risk management techniques in constructi...
A study of various factors affecting risk management techniques in constructi...A study of various factors affecting risk management techniques in constructi...
A study of various factors affecting risk management techniques in constructi...
 
18 zain ul abideen final paper258--267
18 zain ul abideen final paper258--26718 zain ul abideen final paper258--267
18 zain ul abideen final paper258--267
 

Similar to Ijetcas14 370

Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodologyIJECEIAES
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk ManagementGlen Alleman
 
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI EnvironmentA Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI EnvironmentAIRCC Publishing Corporation
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTijcsit
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTAIRCC Publishing Corporation
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET Journal
 
IT Risk managment combined
IT Risk managment combinedIT Risk managment combined
IT Risk managment combinedGlen Alleman
 
Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?IRJET Journal
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationSonata Software
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product developmentiaemedu
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software PlanningMuhammad Alhalaby
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design IJECEIAES
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
Efficient Indicators to Evaluate the Status of Software Development Effort Es...
Efficient Indicators to Evaluate the Status of Software Development Effort Es...Efficient Indicators to Evaluate the Status of Software Development Effort Es...
Efficient Indicators to Evaluate the Status of Software Development Effort Es...IJMIT JOURNAL
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...ijseajournal
 

Similar to Ijetcas14 370 (20)

Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodology
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI EnvironmentA Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
 
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTA PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
P44098087
P44098087P44098087
P44098087
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature Review
 
IT Risk managment combined
IT Risk managment combinedIT Risk managment combined
IT Risk managment combined
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?Software Requirements Prioritization: What, Why, and How?
Software Requirements Prioritization: What, Why, and How?
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product development
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Guide to Software Estimation
Guide to Software EstimationGuide to Software Estimation
Guide to Software Estimation
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Efficient Indicators to Evaluate the Status of Software Development Effort Es...
Efficient Indicators to Evaluate the Status of Software Development Effort Es...Efficient Indicators to Evaluate the Status of Software Development Effort Es...
Efficient Indicators to Evaluate the Status of Software Development Effort Es...
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
 

More from Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Ijetcas14 370

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 223 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Association between Requirement Engineering Processes and Risk Management Rajinder Singh Department of Electronics, S.D College, Ambala Cantt, Haryana, India ___________________________________________________________________________________ Abstract: The software industry has shown ballooning growth rate in last few years but still it is over burdened with failed and delayed projects. Most of these failed projects overrun their original budget. As per a report presented by The Standish Group, 72 percent of software projects are failed as those are completed after scheduled time and are over budget. More than 23 percent of software projects are cancelled before they ever get completed, and 49 percent of projects cost 145 percent of their original estimates. (Standish, 1995). In retrospection, many of these companies reported that their problems could have been avoided or drastically reduced if high-risk elements of the project could have been identified in advance. Although there are many risks involved in software development life cycle but the major risks are related to software cost, quality and scheduling which can be controlled and avoided if proper strategies are adopted in the initial stages. Risk management helps us to identify, analyze and control various risks associated with software development cycle. Theories say, all of these risks crepes in due to poor requirement engineering processes followed by software development team. Lack of understanding of client’s requirements, frequent changes in requirements, lack of user involvement. Lack of standards for requirement elicitation methods are some of the factors which leads to delayed, over budget and low quality software projects. If requirement engineering processes are followed by companies, risks can be managed properly. So requirement engineering processes and risk management are co- related and go side by side. The aim of this study is to check how much RE processes affects risk management by conducting a survey in nine different software development companies and taking evidence from the software developers who are actually using these practices practically in their jobs. Keywords: Requirement Engineering, RE Processes, Risk Management, Software Engineering ___________________________________________________________________________________ I. Introduction The software industry has shown ballooning growth rate in last few years but still it is over burdened with failed and delayed projects. Most of these failed projects overrun their original budget. As per a report presented by The Standish Group, 72 percent of software projects are failed as those are completed after scheduled time and are over budget. More than 23 percent of software projects are cancelled before they ever get completed, and 49 percent of projects cost 145 percent of their original estimates (Standish, 1995). In retrospection, many of these companies reported that their problems could have been avoided or drastically reduced if high-risk elements of the project could have been identified in advance. Although there are many risks involved in software development life cycle but the major risks are related to software cost, quality and scheduling which can be controlled and avoided if proper strategies are adopted in the initial stages. Risk management helps us to identify, analyze and control various risks associated with software development cycle. Theories say, all of these risks crepes in due to poor requirement engineering processes followed by software development team. Lack of understanding of client’s requirements, frequent changes in requirements, lack of user involvement. Lack of standards for requirement elicitation methods are some of the factors which leads to delayed, over budget and low quality software projects. If requirement engineering processes are followed by companies, risks can be managed properly. So requirement engineering processes and risk management are co- related and go side by side. The aim of this study is to check how much RE processes affects risk management by conducting a survey in nine different software development companies and taking evidence from the software developers who are actually using these practices practically in their jobs. For this study, I have asked the questions to 23 respondents from 9 software development companies of Ambala, Gurgaon, Pune, and Chandigarh. All these respondents are engaged in software development as developer or manager. This paper is divided in five sections. Section I gives introduction, Section II describes Requirement Engineering, Section III gives introduction of Risk Management, Section IV states the objective of study, and Section V gives details of Questions, results and their analysis followed by conclusion. II. Requirement Engineering: RE can be simply defined as identifying a problem’s context, locating the customer’s requirements within that context and delivering a specification that meets customer needs within that context. There are many
  • 2. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223- 229 IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 224 requirements methodologies that purport to do this, for example, soft systems methodology [1], scenario analysis [2], and UML [3]. Sometimes they work, sometimes they do not. The implication of such requirements methodologies, if we can label at least aspects of them as such, is that the application of ‘x’ method will produce the right requirements irrespective of the problem’s characteristics. This is conventional wisdom and unsurprisingly, the creators and vendors of requirements methodologies claim, with one exception [4] that their approach is a hammer and all problems are nails. While there are many factors other than just application of a requirements methodology that influence the success or failure of software projects in practice, in this paper I focus only on requirements engineering. III. Risk Management: A risk is a potential future harm that may arise from some present action (Wikipedia, 2004), such as, a schedule slip or a cost overrun. The loss may be in terms of direct financial loss or indirect loss in terms of goodwill, fame, future business, or loss of property or life. Risk management is a series of steps whose objectives are to identify, address, and eliminate software risk items before they become either threats to successful software operation or a major source of expensive rework. (Boehm, 1989) In the software development cycle, risks can be software requirement risks, software cost risks, software scheduling risks and software quality risks. Due to these risks projects fail. Many projects fail either because simple problems were reported too late or because the wrong problem was addressed (Bruegge and Dutoit, 2000). Software development Teams can be reactive or proactive about these problems. Reactive teams are which take rapid action after the problem has occurred and find out the solution. On the other hand, Proactive teams anticipate the risks and take preventive measures to avoid those risks to happen. They plan in advance to avoid those risks to happen. A. Risk Management Process( Risk Management ,Laurie Williams 2004): A.1 Risk Identification The very first step in the risk management process is risk identification. In this step, the team identifies as many project risks as possible to make them explicit before they become problems. Risks can be of three types: i) Project Risks The risks which affect the project schedule or the personnel or budgets dedicated to the project are known as Project risks. ii) Product risks The risks which affect the quality or performance of the software being developed are known as Product risks. iii) Business risks: The risks which threaten the viability of the software are known as business risks , such as building an excellent product no one wants or building a product that no longer fits into the overall business strategy of the company. A.2 Analyze After the identification of risks, the next step is the analysis of risks. In the analysis phase, the identified risks are transformed into decision-making information. The probability and the seriousness of each identified risk is assessed. For each risk, the team must do the following: • Assess the probability of a loss occurring. Set numerical probability for each qualitative value (e.g. very improbable= 5 percent, improbable = 10 percent). • Assess the impact of the loss if the loss were to occur. Delineate the consequences of the risk, and estimate the impact of the risk on the project and the product. Similar to the probability discussion above, the team can choose to assign numerical monetary values to the magnitude of loss, such as Rs100,000 for a week delay in schedule. A.3 Prioritize The third step in risk management process is prioritizing the risks by ranking them. It is not feasible to take action on every identified risk as too much of cost is involved. Some of them have a very low impact or a very low probability of occurring – or both. By prioritization process, the team decides which risks it will take action on. The team sorts the list so that the high probability, high impact risks percolate to the top of the table and the low-probability, low impact risks drop to the bottom. A.4 Plan Risk management plans should be developed for each of the “above the line” prioritized risks so that proactive action can take place. A.5 Mitigate Related to risk planning, through risk mitigation, the team develops strategies to reduce the possibility or the loss impact of a risk. Risk mitigation produces a situation in which the risk items are eliminated or otherwise resolved. A.6 Monitor
  • 3. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223- 229 IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 225 After risks are identified, analyzed, and prioritized, and actions are established, it is essential that the team regularly monitor the progress of the product and the resolution of the risk items, taking corrective action when necessary. This monitoring can be done as part of the team project management activities or via explicit risk management A.7 Communicate On-going and effective communication between management, the development team, marketing, and customer representatives about project risks is essential for effective risk management. IV. Objective of Study: Theories say that RE practices helps managing the risk which in turn leads to the success of any software project. The objective of this study is to explore the impact of requirement engineering practices on risk management. Software industry is devoting large amount of funds towards the development of software thus increasing the cost of final project. Cost incurred due to risks of rework or delayed projects or over budget projects can be eliminated if can be identified at the initial stage of project development cycle and RE processes if followed can reduce these risks drastically. Knowing the common underlying problems that cause risks and identification of RE practices that reduces scope of risks will help software development teams avoid making those same mistakes over and over and making use of those practices that have more success rate. Aim of this study is to take the evidence from the IT professionals about the impact of RE processes on Risk management. A. Research Methodologies The aim of this paper is to check whether the RE practices lead to effective risk management or not. If such practices are thoroughly studied, they could be used for enabling reduction of risks associated with project development. For this paper, I have conducted survey on some of Indian Companies and tried to find out the relation between RE practices and Risk management. To prepare the evidence to check the impact of Requirement engineering tools on risk management, a Questionnaire is prepared and is filled by the authorized employees of the companies such as Infosys, Cognizant Technology(Pune), Market RX (Gurgaon), One World Technology (Ambala), Ameotech Informatics (Chandigarh), GENPACT, GTech Informatics, Automatic Data Processing India Pvt. Ltd, Silex Softwares Pvt. Ltd. (Ambala). After collecting the data from these companies, analysis of the data is done using frequency tables and graphs tools of SPSS Software. The sample size used in this study involved 23 software development projects from nine companies of Pune, Gurgaon, Chandigarh and Ambala. Due to this reduced sample size, the use of qualitative research methods was preferred. Furthermore, the main aim of this study is to formulate a hypothesis about the relationship between RE process and the risk management. V. Questionnaire Results & Analysis: I received completed questionnaires from number of respondents, reporting on 23 distinct projects. As noted earlier, the majority of our respondents were developers or project managers from Pune, Gurgaon, Chandigarh and Ambala based companies.The Survey questionnaire had mixed type of questions. A. Questions & Responses: Q1 How important is the use of RE Processes in improving risk management?  Very Important  Important  Unsure  Not really Important  Not Important at All Frequency Percent Valid Percent Cumulative Percent Valid important 3 13.6 13.6 13.6 very important 19 86.4 86.4 100.0 Total 22 100.0 100.0 Q1 very important important
  • 4. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(1), March-May, 2014, pp. 1- IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 226 Analysis: 13.6 % respondents believe that RE processes are very important in improving risk management and 86.4% believes it plays important role in improving risk management. No one selected unsure, not really important or no important at all. Q2 How the RE process affected risk assessment of the project?  Far More  More  Same  Less  Far Less Frequency Percent Valid Percent Cumulative Percent Valid far more 1 4.5 4.5 4.5 more 21 95.5 95.5 100.0 Total 22 100.0 100.0 Q2 more far more Analysis: 95.5% respondents have selected more option. 4.5% respondents selected far more option. That means 100% respondents believe that RE process affected risk assessment of the project Q3 How do you believe the communication inspired by the requirements Analysis sessions improved or deteriorated Risk management  Far More  More  Same  Less  Far Less Frequency Percent ValidPercent Cumulative Percent Valid far more 7 31.8 31.8 31.8 more 15 68.2 68.2 100.0 Total 22 100.0 100.0 Q3 more far more Analysis: 68.2% respondents have selected more option. 31.8% respondents selected far more option. That means 100% respondents believe that communication inspired by the requirements Analysis sessions improved or deteriorated Risk management. Q4 To what extend did the requirements engineering process enable your organization to manage requirements:  Far More  More  Same
  • 5. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223- 229 IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 227  Less  Far Less Frequency Percent ValidPercent Cumulative Percent Valid far more 12 54.5 54.5 54.5 more 5 22.7 22.7 77.3 same 5 22.7 22.7 100.0 Total 22 100.0 100.0 Q4 same more far more Analysis: 54.5% respondents have selected far more option. 22.7% respondents have selected more option and 22.7% respondents have selected same option. That means requirements can be managed effectively if RE processes are followed. Q5 To what extend did the requirements engineering process enable your organization to assess impact of changing requirements?  Far More  More  Same  Less  Far Less Frequency Percent ValidPercent Cumulative Percent Valid far more 1 4.5 4.5 4.5 more 20 90.9 90.9 95.5 same 1 4.5 4.5 100.0 Total 22 100. 0 100.0 Q5 same more far more Analysis: 90.9% respondents have selected more option. 4.5% respondents have selected far more option and 4.5% respondents have selected same option. That means approx 95% respondents believe that requirements engineering process enable organization to assess impact of changing requirements. Q6 To what extend did the requirements engineering process enable your organization to analyze risk  Far More  More  Same  Less  Far Less Frequency Percent Valid Percent Cumulative Percent Valid far more 5 22.7 22.7 22.7 less 5 22.7 22.7 45.5 more 12 54.5 54.5 100.0 Total 22 100.0 100.0 Q6 more less far more
  • 6. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(1), March-May, 2014, pp. 1- IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 228 IMPLEMENTATION Analysis: 54.5% respondents have selected more option. 22.7% respondents have selected far more option and 22.7% respondents have selected less option. That means 77.2% respondents believe that requirements engineering process enable organization to analyze risk. Q7 In your design, coding, testing or documentation activities, how important is it to understand the effect of RE processes on risk management. DESIGN Frequency Percent ValidPercent Cumulative Percent Valid import ant 3 13.6 13.6 13.6 very import ant 19 86.4 86.4 100.0 Total 22 100.0 100.0 DESIGN very important important IMPLEMENTATION Frequency Percent ValidPercent Cumulative Percent Valid important 3 13.6 13.6 13.6 very important 19 86.4 86.4 100.0 Total 22 100.0 100.0 TESTING Frequency Percent Valid Percent Cumulative Percent Vali d important 2 9.1 9.1 9.1 neutral 2 9.1 9.1 18.2 not really important 1 4.5 4.5 22.7 very important 17 77.3 77.3 100.0 Total 22 100.0 100.0 TESTING very important not really important neutral important
  • 7. Rajinder Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(3), March-May, 2014, pp. 223- 229 IJETCAS 14-370; © 2014, IJETCAS All Rights Reserved Page 229 DOCUMENT Frequency Percent ValidPercent Cumulative Percent Valid important 6 27.3 27.3 27.3 neutral 3 13.6 13.6 40.9 not really important 2 9.1 9.1 50.0 very important 11 50.0 50.0 100.0 Total 22 100.0 100.0 DOCUMENT very important not really important neutral important Analysis: In Design phase, 100% respondents considered RE processes Important and very important for risk management In Implementation phase, 100% respondents considered RE processes Important and very important for risk management. In Testing phase, 77.3% respondents considered RE processes very important, 9.1 % considered important, 9.1% were neutral and 4.5 % considered not important. In Documentation phase, 50% respondents considered RE processes very important, 27.3 % considered important, 13.6% were neutral and 9.1 % considered not really important. Conclusion: From above study, it is concluded that practically also most of the Software developers believe that if RE processes followed properly help manage the risk effectively thereby reducing the risk of cost, schedule, quality and requirements. There is a direct relationship between RE processes and Risk management. References: [1] Checkland, P., Systems Thinking, Systems Practice, Wiley Publications, 1981. [2] Carroll, J. (ed.), Scenario-Based Design: Envisioning Work and Technology in System Development, Wiley Publications, 1995. [3] Booch, G., Rumbaugh, J., Jacobson, The UML User Guide, Addison Wesley, 1999. [4] Jackson, M., Problem Frames, Addison Wesley, 2001. [5] Boehm, B. (1989). Software Risk Management. Washington, DC, IEEE Computer Society Press. [6] Boehm, B. (January 1991). "Software Risk Management: Principles and Practices." IEEE Software: 32-41. [7] Boehm, B. and R. Turner (2003). Balancing Agility and Discipline: A Guide for the Perplexed. Boston, MA, Addison Wesley.