SlideShare a Scribd company logo
1 of 10
Download to read offline
TELKOMNIKA, Vol.16, No.3, June 2018, pp. 1376~1385
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v16i3.7288  1376
Received September 14, 2017; Revised February 14, 2018; Accepted March 24, 2018
Application Development Risk Assessment Model
Based on Bayesian Network
Jaka Sembiring*
1
, Johan P. Sipayung
2
, Arry A. Arman
3
1,3
Institut Teknologi Bandung, School of Electrical Engineering and Informatics
2
BPS, Statistics of Tapanuli Utara Regency
1
Jl. Ganesha 10 Bandung 40132, Indonesia
*Corresponding author, e-mail: jaka@itb.ac.id
Abstract
This paper describes a new risk assessment model for application development and its
implementation.The model is developed using a Bayesian network and Boehm’s software risk principles.
The Bayesian network is created after mapping top twenty risks in software projects with interrelationship
digraph of risk area category. The probability of risk on the network is analyzed and validated using both
numerical simulation and subjective probability from several experts in the field and a team of application
developers. After obtaining the Bayesian network model, risk exposure is calculated using Boehm's risk
principles.Finally,the implementation ofthe proposed model in a governmentinstitution is shown as a real
case illustration.
Keywords:bayesian network,risk assessment,sei taxonomy-based identification, risk area category, risk
exposure
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
To develop a high quality application on time and within budget, one usually has to deal
with various risks [1]. It is widely known that the success rate of successful IT project is very low.
This fact is supported by a research from Standish Group on IT project 1994-2004 where it is
shown that the completely failure rate was 18% in all projects, 53% of them were completed with
unsatisfactory time, costs or effect, and only 29% of them had successfully accomplished the
project target [2]. These facts show us that it is necessary to consider risk assessment as a way
to systematically identify whether the occurrence of risk may affect the objectives of
organization. Risk assessment method, as part of risk management, can be used as a tool to
analyze both opportunities and consequences of risk prior to decide the next strategic
action [3-4]. Risks in application development are related not only to the resources and
functional problems encountered in the process of developing application but also to the impact
of such problems.
Risk assessment in application development is a process to identify risk factors such as
lack of clarity of project requirements, delivery not according to schedule and time, and failure in
achieving the main objective of application development project [5]. Risk assessment procedure
generally consists of risk identification, risk analysis and risk evaluation; and it provides an
understanding of risks, their causes, consequences, and their probabilities [3-4]. According to
Tao, risk management in software projects should focus on prevention and reduction of risks,
assessing the likelihood of problems, determining risk potential that could become a major
concern [6]. In other development, Sonchan et.al. have introduced top 20 software risks based
on the frequency of their citations on highly referred and recent literature in the area of risk
management of application development projects. They have succeeded in extracting and
classifying top risks from thirty most frequently cited and recently published literatures on
software project risks. They used Delphi method to propose potential impacts and probabilities
of all classified risk [7]. They categorize these risks based on risk taxonomy described in [8].
However, their study did not investigate the interrelationship and probability of risks.
Other study from Gallagher has identified risk areas that are interconnected and he
used interrelationship digraph to identify the cause and effect between risks [9]. He describes
risk areas involving: (i) schedule pressure and veracity, (ii) suppression of information, (iii)
TELKOMNIKA ISSN: 1693-6930 
Application Development Risk Assessment Model Based on... (Jaka Sembiring)
1377
requirement management, (iv) facility funding, (v) people, resources and leadership, (vi)
operability, (vii) reliability and dependability, and (viii) testing.
The study in [7] does not cover the possibility of relation between risks, where the study
in [8] indicates that it is possible to find the relationship between risks. Based on these research
result, we enhance the work of [7] to show the possibility of relation between the top 20 risks.
Earlier effort on this topic can be seen in [10] where the theoretical background, context
diagram, mapping table, and preliminary model were elaborated. Our paper investigates further
on how to determine the probability and interrelationship of such risk in application development
using Bayesian network concept. Moreover, this paper also presents the impact of such risk
using Boehm's application risk principles and risk exposure. Finally the implementation of the
proposed model as a real case illustration in a government agency will be elaborated.
2. Research Method
This section will describe the step-by-step procedure to develop the proposed model.
Initially, we adopt the research result on top twenty risks in software project as our basic risk
classification [7]. In order to find the relationship among risks, those mentioned risks are
mapped to the SEI Taxonomy-Base Risk Identification to find the characteristic of related
risks [8]. Then based on the characteristic of the risks, the Category of Risk Area identified by
Gallagher is used to find the interrelationship among risk [9]. The obtained grouping is shown in
Table 1 to explain the relationship between risk areas. This result can also be seen in our
previous research [10].
Table 1. Proposed mapping table of risk assessment model
Taxonomy-Based Risk
Identification
(Class)
Taxonomy-Based
Risk Identification
(Category)
Top Tw enty Risks in Softw are
Projects
Risk Area Identified
Product Engineering Requirements User resistance Suppression of Information
Product Engineering Requirements
Unable to meet user
requirements
Reliability and Dependability
Product Engineering Code and unit test Low software performance Testing
Development
Environment
Development
Process
Inappropriate development
process
OperabilityRequirement creep
Development
Environment
Development
System
Problems w ith new technology
Lack of technicalskills
Technical complexity
Development
Environment
Management
Methods
Unclear customer
requirements
Requirements ManagementOptimistic resource planning
Inefficient team capability
Development
Environment
Management
Process
Lack of executive involvement
Unrealistic budgeting Facility Funding
Unrealistic schedule
Schedule Pressure and
Veracity
Development
Environment
Work Environment
Communication gaps
People, Resources and
Leadership
Conflicts among team
members
Program Constraints Resources
Staff turnover
Resource insufficiency
Inadequate infrastructure
Lack of law enforcement
With this grouping, one can create a dependency model based on interrelation of risk
category area shown in Figure 1. For clarity and consistency in further discussion, we assign
each relevan risk with specific codes as seen in Table 2. Using the works described in [9], a
direct relation between risk items can be constructed as an initial model shown in Figure 2. As
we can see, the network contains many node dependencies. The validity of this initial
dependency needs to be verified for implementation in a real environment. To evaluate node
dependencies, we turn to expert judgment through discussion and survey. The experts involved
in this step are application developers that we selected from application developer team in
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385
1378
Statistics Indonesia. Based on their experience, we are able to eliminate the relation among
risks that are considered irrelevant. The result of model refinement can be seen in Figure 3 and
Table 3. In the next section we will show that this model is valid to be implemented in a real
application based on judgment from international experts in the field and application developers.
Figure 1. Proposed relationship model based on Category of Risk Area
Table 2. Codes for top twenty risk used in this paper
Code Risk Item Code Risk Item
(1) (2) (3) (4)
R1 Unclear customer requirements R11 Unrealistic schedule
R2 Requirement creep R12 Optimistic resource planning
R3 Unable to meet user requirements R13 Lack of executive involvement
R4 Lack of technicalskills R14 Communication gaps
R5 Technical complexity R15 Conflicts among team members
R6 Low software performance R16 Staff turnover
R7 Inefficient team capability R17 Unrealistic budgeting
R8 Inappropriate development process R18 Resource insufficiency
R9 Problems w ith new technology R19 User resistance
R10 Inadequate infrastructure R20 Lack of law enforcement
TELKOMNIKA ISSN: 1693-6930 
Application Development Risk Assessment Model Based on... (Jaka Sembiring)
1379
Figure 2. Initial Bayesian network model
Figure 3. Refined and verified Bayesian network model
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385
1380
Table 3. Relationship among top twenty risk
Code Risk Item (Cause) Code Risk Item (Effect)
(1) (2) (3) (4)
R1 Unclear customer requirements
R2 Requirement creep
R3 Unable to meet user requirements
R8 Inappropriate development process
R3 Unable to meet user requirements R8 Inappropriate development process
R6 Low software performance R3 Unable to meet user requirements
R7 Inefficient team capability
R3 Unable to meet user requirements
R4 Lack of technicalskills
R6 Low software performance
R8 Inappropriate development process
R9 Problems w ith new technology
R15 Conflicts among team members
R16 Staff turnover
R10 Inadequate infrastructure R6 Low software performance
R11 Unrealistic schedule
R6 Low software performance
R12 Optimistic resource planning
R18 Resource insufficiency
R19 User resistance
R12 Optimistic resource planning
R3 Unable to meet user requirements
R5 Technical complexity
R6 Low software performance
R8 Inappropriate development process
R10 Inadequate infrastructure
R18 Resource insufficiency
R13 Lack of executive involvement
R3 Unable to meet user requirements
R6 Low software performance
R8 Inappropriate development process
R12 Optimistic resource planning
R15 Conflicts among team members
R14 Communication gaps R6 Low software performance
R15 Conflicts among team members R6 Low software performance
R16 Staff turnover R6 Low software performance
R17 Unrealistic budgeting
R10 Inadequate infrastructure
R18 Resource insufficiency
R19 User resistance
R8 Inappropriate development process
R12 Optimistic resource planning
R20 Lack of law enforcement R6 Low software performance
In this paper, following model derivation, we work further for implementation. We
expand the model to cover risk exposure and its impact on organization. We begin with
exposure concept from Tan to find the risk factor [11]. Based on this risk factor we calculate the
risk exposure using the result from Boehm [12]. The risk exposure is defined as the relation
between probability of unsatisfactory outcome and loss as a consequence of those
unsatisfactory outcomes. In this paper we use risk factor as an input of loss as a consequence
of unsatisfactory outcome. We will use the following equation.
RE = Prob(UO)×Loss(UO) (1)
Where:
RE = Risk Exposure
Prob(UO) = Probability of unsatisfactory outcome
Loss(UO) = Loss as an impact of unsatisfactory outcome
Finally we use the Risk-Level matrix from Stoneburner to classify the risk. The risk calssification
consists of three levels, i.e.: High, Medium, and Low [13]. With these levels, it will be easier for
the management to comprehend the risk as a whole and to take action as a response to the
risk.
TELKOMNIKA ISSN: 1693-6930 
Application Development Risk Assessment Model Based on... (Jaka Sembiring)
1381
3. Evaluation, Implementation and Discussion
3.1. Evaluation
To evaluate the model, first we perform a numerical simulation on several nodes. Since
the model uses the basic concept of probability, then the following conditions described in
equation (2) must be fulfilled.
0 ≤ CPT ≤ 1 (2a)
P(S) = 1 (2b)
0 ≤ P(R) ≤ 1 (2c)
Where:
CPT probability in Conditional Probability Table
P(S) total probability at a specified node
P(R) probability of the risk at nodes using the proposed model
For illustration purpose we calculate the probability of node (R1|R2), which means the
probability of “Unclear Customer Requirements” with evidence of risk “Requirement Creep”.
Assumed at random that the probability of node R1 is shown in Table 4, and assumed that the
prior probability of (R1|R2) is shown in Table 5.
Table 4. Probability of R1
R1 T F
Probability 0,7 0,3
Table 5. Probability of (R2|R1)
R1
P(R2|R1 =
T)
P(R2|R1 = F)
T 0,9 0,1
F 0,7 0,3
Using simple probability theory we can calculate:
1. P(R2|R1=T)=0.9
The risk’s probability of “Requirement Creep” if risk of “Unclear Customer
Requirements” occurs is 0.9.
2. P(R1)=0.7
The risk’s probability of “Unclear Customer Requirements” is 0.7.
Based on CPT in equation (2).
P(R2) = (P(R2|R1=T) * (P(R1=F)) + (P(R2|R1=F) * (P(R1=T))
= (0.9*0.3) + (0.7*0.3)
= 0.84
So that,
P(R1|R2) = (P(R2|R1)*P(R1))/(P(R2))
= ((0.9*0.7))/0.84
= 0.75
We conclude that the risk’s probability of “Unclear Customer Requirements” with
evidence of risk of “Requirement Creep” is 0.75. We can calculate the probability of each node
in the network with the same procedure and will obtain the consistency that each node fulfills the
condition in equation (2).
In addition to evaluation by simulation, we also evaluate the model through judgment
from international experts and application developers. We involve 20 application developers
from the government agencies we mentioned before and 10 international researchers/experts in
the field of application development. The result of relationship evaluation from 20 application
developers and 10 researchers point of view can be seen in Table 6. Based on numerical
simulation and subjective judgment in Table 6, we conclude that our proposed model has
consistency and can be used as an assessment tools.
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385
1382
Table 6. Evaluation of relationship among risks based on point of view from 20 application
developers and 10 researchers
Risk Item (Cause) Risk Item (Effect)
Eval. of
Relationship
Appl. Dev.
'Yes'
(%)
Expert
'Yes'
(%)
(Yes/No)
Unclear customer
requirements
Requirement creep Yes 80 60
Unable to meet user requirements Yes 90 85
Inappropriate development
process
Yes 50 85
Unable to meet user
requirements
Inappropriate development
process
Yes 50 90
Low software performance Unable to meet user requirements Yes 50 85
Inefficient team capability
Unable to meet user requirements Yes 60 65
Lack of technicalskills Yes 50 75
Low software performance Yes 80 25
Inappropriate development
process
Yes 70 70
Problems w ith new technology Yes 30 20
Conflicts among team members Yes 90 70
Staff turnover Yes 50 50
Inadequate infrastructure Low software performance Yes 70 95
Unrealistic schedule
Low software performance Yes 60 50
Optimistic resource planning Yes 70 75
Resource insufficiency Yes 80 45
User resistance Yes 10 25
Optimistic resource
planning
Unable to meet user requirements Yes 40 55
Technical complexity Yes 50 55
Low software performance Yes 60 50
Inappropriate development
process
Yes 60 60
Inadequate infrastructure Yes 40 35
Resource insufficiency Yes 80 75
Lack of executive
involvement
Unable to meet user requirements Yes 60 55
Low software performance Yes 10 20
Inappropriate development
process
Yes 40 60
Optimistic resource planning Yes 70 70
Conflicts among team members Yes 60 45
Communi-cation gaps Low software performance Yes 40 60
Conflicts among team
members
Low software performance Yes 40 75
Staff turnover Low software performance Yes 60 65
Unrealistic budgeting Inadequate infrastructure Yes 60 90
Resource insufficiency Yes 90 75
User resistance Inappropriate development
process
Yes 80 95
Optimistic resource planning Yes 40 35
Lack of law enforcement Low software performance Yes 40 45
TELKOMNIKA ISSN: 1693-6930 
Application Development Risk Assessment Model Based on... (Jaka Sembiring)
1383
3.1. Implementation and Discussion
For case illustration, we implement our proposed model for risk assessment in a
government agency Statistics Indonesia. In our proposed model there are total 469 parameters.
For implementation simplicity we use around 16% of the total variables to be implemented with
real values. We are using subjective probability method to assess the selected value involving
20 application developers to obtain the probability value. Those values can be seen in Table 7
column (3). With the same respondents, using Tan method [11] to obtain exposure factor, we
get the results given in Table 7 column (4).
Tabel 7. Risk and exposure factor values from 20 application developers view
Code Risk Average Probability Average Exposure Factor
(1) (2) (3) (4)
R1 Unclear customer requirements 0.66 47
R2 Requirement creep 0.69 37
R3 Unable to meet user requirements 0.48 54
R4 Lack of technical skills 0.36 57
R5 Technical complexity 0.46 60
R6 Low softw are performance 0.42 52
R7 Inefficient team capability 0.36 46
R8 Inappropriate development process 0.50 55
R9 Problems w ith new technology 0.32 49
R10 Inadequate infrastructure 0.35 61
R11 Unrealistic schedule 0.58 37
R12 Optimistic resource planning 0.50 51
R13 Lack of executive involvement 0.34 47
R14 Communication gaps 0.37 48
R15 Conflicts among team members 0.27 55
R16 Staff turnover 0.17 50
R17 Unrealistic budgeting 0.39 51
R18 Resource insufficiency 0.38 50
R19 User resistance 0.38 48
R20 Lack of law enforcement 0.30 55
From Tabel 7 column (3), we understood that in application development at Statistics
Indonesia, the risk of R2 “Requirement Creep” has the highest value. In many cases users quite
often asking to add new function or change user requirement during application development
process where they are not able or do not explain the requirement in detail. This result in higher
value of risk in user requirement. When we analyzed further the exposure factor from Table 7
column (4), the highest exposure are R10 “Inadequate infrastructure” (61) and R5 “Technical
complexity” (60). It means that although the risk for both factors are not as high as R2
“Requirement Creep”, but the perceive impact of those risks to the organization are severe.
For the purpose of simplicity without sacrificing the integrity of the model, we select
several conditional probabilities that we use for implementation of case illustration as shown in
Table 8 column (1), where P(R1|R2) means “The probability of R1 given evidence R2”,
P(R7|R3,R4,R6,R8,R9,R15,R16) means “The probability of R7 given evidence R3, R4, R6, R8,
R9, R15 and R16” and so on.
Using our proposed model, all of the result of implementation can be seen in Table 8. In
Table 8 column (2) we show the subjective probability from 20 application developers, and
column (3) is the exposure factor derived from Table 7. The risk exposure in column (4) is
calculated using Boehm’s formula in equation (1). Then using risk level from Stoneburner [13],
we obtain the risk level of the selected risks in Statistics Indonesia as our object of
implementation, which are shown in Table 8 column (5).
From Table 8 column (2) we obtain that the conditional risk P(R1|R2), which is the
probability of “Unclear user requirement” provided that “Requirement creep” is very high
reaching 0.73. This is consistent with our previous examination that both risks have the highest
probability, and the combination of both resulted in higher number of probability of risk. When
we assess the risk exposure further, we obtain that lower probability risk does not mean lower
impact. We can see that the impact of P(R1|R2), P(R1|R2,R3), P(R12|R3,R5,R6,R8,R10), and
P(R12|R3,R5,R6,R8,R10,R18) are higher even though they have different probability risk. It is
clear that the perceived exposure factor or impact has played significant role in this result. When
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385
1384
we calculate the risk level using Stoneburner method, it happened that in our case illustration all
of the risk levels are “Medium”, in other circumstances at other organization the results could
have been different. Using our proposed method, we have shown that it will be easier for the
management and application developers in organization to assess the risks and their impact on
organization so that it will help them to create a policy or do some actions to anticipate and
manage the risks.
Table 8. Implementation result of our proposed model
Probability
Avrg. Value of
Probability
Avrg.
Value of Exposure
Factor
Avrg.Value of Risk
Exposure
Risk
Level
(1) (2) (3) (4) (5)
P(R1|R2) 0.73 47 35 M
P(R1|R2,R3) 0.72 47 34 M
P(R1|R2,R3,R8) 0.68 47 32 M
P(R3|R8) 0.49 54 26 M
P(R6|R3) 0.50 52 27 M
P(R7|R3) 0.39 46 17 M
P(R7|R3,R4) 0.48 46 21 M
P(R7|R3,R4,R6) 0.50 46 22 M
P(R7|R3,R4,R6,R8) 0.45 46 20 M
P(R7|R3,R4,R6,R8,R9) 0.51 46 23 M
P(R7|R3,R4,R6,R8,R9,R15) 0.58 46 27 M
P(R7|R3,R4,R6,R8,R9,R15,R16) 0.64 46 30 M
P(R10|R6) 0.51 61 30 M
P(R11|R6) 0.60 37 21 M
P(R11|R6,R12) 0.62 37 22 M
P(R11|R6,R12,R18) 0.63 37 23 M
P(R11|R6,R12,R18,R19) 0.57 37 20 M
P(R12|R3) 0.58 51 29 M
P(R12|R3,R5) 0.65 51 33 M
P(R12|R3,R5,R6) 0.66 51 33 M
P(R12|R3,R5,R6,R8) 0.65 51 33 M
P(R12|R3,R5,R6,R8,R10) 0.67 51 34 M
P(R12|R3,R5,R6,R8,R10,R18) 0.68 51 34 M
P(R13|R3) 0.37 47 18 M
P(R13|R3,R6) 0.39 47 19 M
P(R13|R3,R6,R8) 0.40 47 19 M
P(R13|R3,R6,R8,R12) 0.45 47 22 M
P(R13|R3,R6,R8,R12,R15) 0.46 47 23 M
P(R15|R6) 0.38 55 21 M
P(R16|R6) 0.25 50 12 M
P(R17|R10) 0.39 51 20 M
P(R17|R10,R18) 0.43 51 21 M
P(R19|R8) 0.35 48 17 M
P(R19|R8,R12) 0.27 48 12 M
Note: M (Medium Risk Level)
TELKOMNIKA ISSN: 1693-6930 
Application Development Risk Assessment Model Based on... (Jaka Sembiring)
1385
4. Conclusion
In this paper, we propose a risk assessment model of application development using
Bayesian network and Boehm’s software risk principles. After classifying, mapping and
converting all risks to network nodes, we obtained the interrelationships among risks of top 20
risks in application development projects. Then we calculate the risk exposure on the derived
network. By implementing the method in a real environment in a government agency, we
conclude that management level and application developers can use our proposed risk
assessment model to evaluate relationship, calculate probability and impact of risks to manage
risk properly and appropriately.
References
[1] Westfall L. Software Risk Management. The Westfall Team. 2001.
[2] Xu F, Qi G, Sun Y. The Risk Analysis of Software Projects Based on Bayesian Network. Journal of
Convergence Information Technology. 2012; 7(5).
[3] IEC. International Standard IEC/ISO 31010.Risk Management-Risk Assessment Techniques. 2009.
[4] Pandey SK, Mustafa K. A Comparative Study of Risk Assessment Methodologies for Information
Systems. Bulletin of Electrical Engineering and Informatics (BEEI). 2012; 1(2): 111-122.
[5] Ai-Guo T., Ru-Long W. Software Project Risk Assessment Model Based on Fuzzy Theory.
International Conference on Computer and Communication Technologies in Agricultural Engineering.
2010: 328-330.
[6] Tao Y. A Study of Software Development Project Risk Management. International Seminar on Future
Information Technology and Management Engineering. 2008: 309-312.
[7] Sonchan P, Ramingwong S. Top Twenty Risks in Software Projects: A Content Analysis and Delphi
Study. The 11th Conference on Electrical Engineering/Electronics, Computer, Telecommunicationa
and Information Technology. 2014: 1-6.
[8] Carr MJ, Konda SL, Monarch I., Ulrich F.C., Walker C.F. Taxonomy-Based Risk Identification.
CMU/Software Engineering Institute. 1993.
[9] Gallagher B. A Taxonomy of Operational Risk. CMU/Software Engineering Institute. 2005.
[10] Sipayung JJP, Sembiring J. Risk Assessment Model of Application Development using Bayesian
Network and Boehm’s Software Risk Principles. International Conference on Information Technology,
Systems and Innovation. 2015: A-50
[11] Tan D. Quantitative Risk Analysis Step-By-Step. SANS Institute. 2003.
[12] Boehm BW. Software Risk Management: Principles and Practices. IEEE Software. 1991; 8(1): 32-41.
[13] Stoneburner G, Goguen A, Feringa A. Risk Management Guide for Information Technology Systems.
National Institute of Standards and Technology. 2002.

More Related Content

What's hot

Positive developments but challenges still ahead a survey study on ux profe...
Positive developments but challenges still ahead   a survey study on ux profe...Positive developments but challenges still ahead   a survey study on ux profe...
Positive developments but challenges still ahead a survey study on ux profe...Journal Papers
 
Thesis Part I EMGT 698
Thesis Part I EMGT 698Thesis Part I EMGT 698
Thesis Part I EMGT 698Karthik Murali
 
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...IJCSES Journal
 
Risk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectRisk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectIOSRJMCE
 
IRJET- Risk Assessment of Public Private Partnership Projects In Kerala
IRJET- Risk Assessment of Public Private Partnership Projects In KeralaIRJET- Risk Assessment of Public Private Partnership Projects In Kerala
IRJET- Risk Assessment of Public Private Partnership Projects In KeralaIRJET Journal
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 
Productivity Factors in Software Development for PC Platform
Productivity Factors in Software Development for PC PlatformProductivity Factors in Software Development for PC Platform
Productivity Factors in Software Development for PC PlatformIJERA Editor
 
A Ranking Model for Software Requirements Prioritization during Requirements ...
A Ranking Model for Software Requirements Prioritization during Requirements ...A Ranking Model for Software Requirements Prioritization during Requirements ...
A Ranking Model for Software Requirements Prioritization during Requirements ...IJCSIS Research Publications
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTijseajournal
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
 
An interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factorsAn interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factorsijfcstjournal
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...CSCJournals
 
Risk factorserp sumner
Risk factorserp sumnerRisk factorserp sumner
Risk factorserp sumnerIIUM
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...ijmpict
 
Review on cost estimation technque for web application [part 1]
Review on cost estimation technque for web application [part 1]Review on cost estimation technque for web application [part 1]
Review on cost estimation technque for web application [part 1]Sayed Mohsin Reza
 
An Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsAn Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsPavneet Singh Kochhar
 

What's hot (17)

Positive developments but challenges still ahead a survey study on ux profe...
Positive developments but challenges still ahead   a survey study on ux profe...Positive developments but challenges still ahead   a survey study on ux profe...
Positive developments but challenges still ahead a survey study on ux profe...
 
Thesis Part I EMGT 698
Thesis Part I EMGT 698Thesis Part I EMGT 698
Thesis Part I EMGT 698
 
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...
 
MBA_Project_Presentation
MBA_Project_PresentationMBA_Project_Presentation
MBA_Project_Presentation
 
Risk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway ProjectRisk Severity Framework for a BOT Highway Project
Risk Severity Framework for a BOT Highway Project
 
IRJET- Risk Assessment of Public Private Partnership Projects In Kerala
IRJET- Risk Assessment of Public Private Partnership Projects In KeralaIRJET- Risk Assessment of Public Private Partnership Projects In Kerala
IRJET- Risk Assessment of Public Private Partnership Projects In Kerala
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 
Productivity Factors in Software Development for PC Platform
Productivity Factors in Software Development for PC PlatformProductivity Factors in Software Development for PC Platform
Productivity Factors in Software Development for PC Platform
 
A Ranking Model for Software Requirements Prioritization during Requirements ...
A Ranking Model for Software Requirements Prioritization during Requirements ...A Ranking Model for Software Requirements Prioritization during Requirements ...
A Ranking Model for Software Requirements Prioritization during Requirements ...
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
An interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factorsAn interactive approach to requirements prioritization using quality factors
An interactive approach to requirements prioritization using quality factors
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 
Risk factorserp sumner
Risk factorserp sumnerRisk factorserp sumner
Risk factorserp sumner
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
 
Review on cost estimation technque for web application [part 1]
Review on cost estimation technque for web application [part 1]Review on cost estimation technque for web application [part 1]
Review on cost estimation technque for web application [part 1]
 
An Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsAn Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source Projects
 

Similar to Application Development Risk Assessment Model Based on Bayesian Network

Risk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsRisk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsIRJET Journal
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...IJECEIAES
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET Journal
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...ijcsit
 
Most severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in KuwaitMost severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in Kuwaitnooriasukmaningtyas
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...AIRCC Publishing Corporation
 
IRJET- Risk Management using Primavera Software for Residential Sector
IRJET-  	  Risk Management using Primavera Software for Residential SectorIRJET-  	  Risk Management using Primavera Software for Residential Sector
IRJET- Risk Management using Primavera Software for Residential SectorIRJET Journal
 
1729-4874-1-PB (1).pdf
1729-4874-1-PB (1).pdf1729-4874-1-PB (1).pdf
1729-4874-1-PB (1).pdfadisutsagaye
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...AIRCC Publishing Corporation
 
The Identification of Risks and its Criticality in the Nigeria Construction I...
The Identification of Risks and its Criticality in the Nigeria Construction I...The Identification of Risks and its Criticality in the Nigeria Construction I...
The Identification of Risks and its Criticality in the Nigeria Construction I...Dr. Amarjeet Singh
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectIRJET Journal
 
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...IRJET Journal
 
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptx
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptxTHE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptx
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptxEdrisAbdellaNuure1
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David BustinDavid Bustin
 
Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodologyIJECEIAES
 
Risk Contingency Evaluation in International Construction Projects (Real Case...
Risk Contingency Evaluation in International Construction Projects (Real Case...Risk Contingency Evaluation in International Construction Projects (Real Case...
Risk Contingency Evaluation in International Construction Projects (Real Case...IJLT EMAS
 
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docx
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docxRISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docx
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docxdaniely50
 
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...
IRJET- A Review Paper on Risk Management using Primavera for Residential ...IRJET Journal
 

Similar to Application Development Risk Assessment Model Based on Bayesian Network (20)

Risk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsRisk Management In High Rise Construction Projects
Risk Management In High Rise Construction Projects
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature Review
 
project management
project managementproject management
project management
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
 
Most severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in KuwaitMost severe risk factors in software development projects in Kuwait
Most severe risk factors in software development projects in Kuwait
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...
 
IRJET- Risk Management using Primavera Software for Residential Sector
IRJET-  	  Risk Management using Primavera Software for Residential SectorIRJET-  	  Risk Management using Primavera Software for Residential Sector
IRJET- Risk Management using Primavera Software for Residential Sector
 
Ijetcas14 370
Ijetcas14 370Ijetcas14 370
Ijetcas14 370
 
1729-4874-1-PB (1).pdf
1729-4874-1-PB (1).pdf1729-4874-1-PB (1).pdf
1729-4874-1-PB (1).pdf
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...
 
The Identification of Risks and its Criticality in the Nigeria Construction I...
The Identification of Risks and its Criticality in the Nigeria Construction I...The Identification of Risks and its Criticality in the Nigeria Construction I...
The Identification of Risks and its Criticality in the Nigeria Construction I...
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure project
 
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...
IRJET- Developing a Model of Risk Allocation and Risk Handling for Effective ...
 
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptx
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptxTHE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptx
THE IMPACT OF RISK IN ETHIOPIAN CONSTRUCTION PROJECT.pptx
 
Managing IT projects by David Bustin
Managing IT projects by David BustinManaging IT projects by David Bustin
Managing IT projects by David Bustin
 
Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodology
 
Risk Contingency Evaluation in International Construction Projects (Real Case...
Risk Contingency Evaluation in International Construction Projects (Real Case...Risk Contingency Evaluation in International Construction Projects (Real Case...
Risk Contingency Evaluation in International Construction Projects (Real Case...
 
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docx
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docxRISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docx
RISK RESPONSE STRATEGIES AND PERFORMANCE OF PROJECTS IN KIRINYAGA .docx
 
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...IRJET-  	  A Review Paper on Risk Management using Primavera for Residential ...
IRJET- A Review Paper on Risk Management using Primavera for Residential ...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Application Development Risk Assessment Model Based on Bayesian Network

  • 1. TELKOMNIKA, Vol.16, No.3, June 2018, pp. 1376~1385 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v16i3.7288  1376 Received September 14, 2017; Revised February 14, 2018; Accepted March 24, 2018 Application Development Risk Assessment Model Based on Bayesian Network Jaka Sembiring* 1 , Johan P. Sipayung 2 , Arry A. Arman 3 1,3 Institut Teknologi Bandung, School of Electrical Engineering and Informatics 2 BPS, Statistics of Tapanuli Utara Regency 1 Jl. Ganesha 10 Bandung 40132, Indonesia *Corresponding author, e-mail: jaka@itb.ac.id Abstract This paper describes a new risk assessment model for application development and its implementation.The model is developed using a Bayesian network and Boehm’s software risk principles. The Bayesian network is created after mapping top twenty risks in software projects with interrelationship digraph of risk area category. The probability of risk on the network is analyzed and validated using both numerical simulation and subjective probability from several experts in the field and a team of application developers. After obtaining the Bayesian network model, risk exposure is calculated using Boehm's risk principles.Finally,the implementation ofthe proposed model in a governmentinstitution is shown as a real case illustration. Keywords:bayesian network,risk assessment,sei taxonomy-based identification, risk area category, risk exposure Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction To develop a high quality application on time and within budget, one usually has to deal with various risks [1]. It is widely known that the success rate of successful IT project is very low. This fact is supported by a research from Standish Group on IT project 1994-2004 where it is shown that the completely failure rate was 18% in all projects, 53% of them were completed with unsatisfactory time, costs or effect, and only 29% of them had successfully accomplished the project target [2]. These facts show us that it is necessary to consider risk assessment as a way to systematically identify whether the occurrence of risk may affect the objectives of organization. Risk assessment method, as part of risk management, can be used as a tool to analyze both opportunities and consequences of risk prior to decide the next strategic action [3-4]. Risks in application development are related not only to the resources and functional problems encountered in the process of developing application but also to the impact of such problems. Risk assessment in application development is a process to identify risk factors such as lack of clarity of project requirements, delivery not according to schedule and time, and failure in achieving the main objective of application development project [5]. Risk assessment procedure generally consists of risk identification, risk analysis and risk evaluation; and it provides an understanding of risks, their causes, consequences, and their probabilities [3-4]. According to Tao, risk management in software projects should focus on prevention and reduction of risks, assessing the likelihood of problems, determining risk potential that could become a major concern [6]. In other development, Sonchan et.al. have introduced top 20 software risks based on the frequency of their citations on highly referred and recent literature in the area of risk management of application development projects. They have succeeded in extracting and classifying top risks from thirty most frequently cited and recently published literatures on software project risks. They used Delphi method to propose potential impacts and probabilities of all classified risk [7]. They categorize these risks based on risk taxonomy described in [8]. However, their study did not investigate the interrelationship and probability of risks. Other study from Gallagher has identified risk areas that are interconnected and he used interrelationship digraph to identify the cause and effect between risks [9]. He describes risk areas involving: (i) schedule pressure and veracity, (ii) suppression of information, (iii)
  • 2. TELKOMNIKA ISSN: 1693-6930  Application Development Risk Assessment Model Based on... (Jaka Sembiring) 1377 requirement management, (iv) facility funding, (v) people, resources and leadership, (vi) operability, (vii) reliability and dependability, and (viii) testing. The study in [7] does not cover the possibility of relation between risks, where the study in [8] indicates that it is possible to find the relationship between risks. Based on these research result, we enhance the work of [7] to show the possibility of relation between the top 20 risks. Earlier effort on this topic can be seen in [10] where the theoretical background, context diagram, mapping table, and preliminary model were elaborated. Our paper investigates further on how to determine the probability and interrelationship of such risk in application development using Bayesian network concept. Moreover, this paper also presents the impact of such risk using Boehm's application risk principles and risk exposure. Finally the implementation of the proposed model as a real case illustration in a government agency will be elaborated. 2. Research Method This section will describe the step-by-step procedure to develop the proposed model. Initially, we adopt the research result on top twenty risks in software project as our basic risk classification [7]. In order to find the relationship among risks, those mentioned risks are mapped to the SEI Taxonomy-Base Risk Identification to find the characteristic of related risks [8]. Then based on the characteristic of the risks, the Category of Risk Area identified by Gallagher is used to find the interrelationship among risk [9]. The obtained grouping is shown in Table 1 to explain the relationship between risk areas. This result can also be seen in our previous research [10]. Table 1. Proposed mapping table of risk assessment model Taxonomy-Based Risk Identification (Class) Taxonomy-Based Risk Identification (Category) Top Tw enty Risks in Softw are Projects Risk Area Identified Product Engineering Requirements User resistance Suppression of Information Product Engineering Requirements Unable to meet user requirements Reliability and Dependability Product Engineering Code and unit test Low software performance Testing Development Environment Development Process Inappropriate development process OperabilityRequirement creep Development Environment Development System Problems w ith new technology Lack of technicalskills Technical complexity Development Environment Management Methods Unclear customer requirements Requirements ManagementOptimistic resource planning Inefficient team capability Development Environment Management Process Lack of executive involvement Unrealistic budgeting Facility Funding Unrealistic schedule Schedule Pressure and Veracity Development Environment Work Environment Communication gaps People, Resources and Leadership Conflicts among team members Program Constraints Resources Staff turnover Resource insufficiency Inadequate infrastructure Lack of law enforcement With this grouping, one can create a dependency model based on interrelation of risk category area shown in Figure 1. For clarity and consistency in further discussion, we assign each relevan risk with specific codes as seen in Table 2. Using the works described in [9], a direct relation between risk items can be constructed as an initial model shown in Figure 2. As we can see, the network contains many node dependencies. The validity of this initial dependency needs to be verified for implementation in a real environment. To evaluate node dependencies, we turn to expert judgment through discussion and survey. The experts involved in this step are application developers that we selected from application developer team in
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385 1378 Statistics Indonesia. Based on their experience, we are able to eliminate the relation among risks that are considered irrelevant. The result of model refinement can be seen in Figure 3 and Table 3. In the next section we will show that this model is valid to be implemented in a real application based on judgment from international experts in the field and application developers. Figure 1. Proposed relationship model based on Category of Risk Area Table 2. Codes for top twenty risk used in this paper Code Risk Item Code Risk Item (1) (2) (3) (4) R1 Unclear customer requirements R11 Unrealistic schedule R2 Requirement creep R12 Optimistic resource planning R3 Unable to meet user requirements R13 Lack of executive involvement R4 Lack of technicalskills R14 Communication gaps R5 Technical complexity R15 Conflicts among team members R6 Low software performance R16 Staff turnover R7 Inefficient team capability R17 Unrealistic budgeting R8 Inappropriate development process R18 Resource insufficiency R9 Problems w ith new technology R19 User resistance R10 Inadequate infrastructure R20 Lack of law enforcement
  • 4. TELKOMNIKA ISSN: 1693-6930  Application Development Risk Assessment Model Based on... (Jaka Sembiring) 1379 Figure 2. Initial Bayesian network model Figure 3. Refined and verified Bayesian network model
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385 1380 Table 3. Relationship among top twenty risk Code Risk Item (Cause) Code Risk Item (Effect) (1) (2) (3) (4) R1 Unclear customer requirements R2 Requirement creep R3 Unable to meet user requirements R8 Inappropriate development process R3 Unable to meet user requirements R8 Inappropriate development process R6 Low software performance R3 Unable to meet user requirements R7 Inefficient team capability R3 Unable to meet user requirements R4 Lack of technicalskills R6 Low software performance R8 Inappropriate development process R9 Problems w ith new technology R15 Conflicts among team members R16 Staff turnover R10 Inadequate infrastructure R6 Low software performance R11 Unrealistic schedule R6 Low software performance R12 Optimistic resource planning R18 Resource insufficiency R19 User resistance R12 Optimistic resource planning R3 Unable to meet user requirements R5 Technical complexity R6 Low software performance R8 Inappropriate development process R10 Inadequate infrastructure R18 Resource insufficiency R13 Lack of executive involvement R3 Unable to meet user requirements R6 Low software performance R8 Inappropriate development process R12 Optimistic resource planning R15 Conflicts among team members R14 Communication gaps R6 Low software performance R15 Conflicts among team members R6 Low software performance R16 Staff turnover R6 Low software performance R17 Unrealistic budgeting R10 Inadequate infrastructure R18 Resource insufficiency R19 User resistance R8 Inappropriate development process R12 Optimistic resource planning R20 Lack of law enforcement R6 Low software performance In this paper, following model derivation, we work further for implementation. We expand the model to cover risk exposure and its impact on organization. We begin with exposure concept from Tan to find the risk factor [11]. Based on this risk factor we calculate the risk exposure using the result from Boehm [12]. The risk exposure is defined as the relation between probability of unsatisfactory outcome and loss as a consequence of those unsatisfactory outcomes. In this paper we use risk factor as an input of loss as a consequence of unsatisfactory outcome. We will use the following equation. RE = Prob(UO)×Loss(UO) (1) Where: RE = Risk Exposure Prob(UO) = Probability of unsatisfactory outcome Loss(UO) = Loss as an impact of unsatisfactory outcome Finally we use the Risk-Level matrix from Stoneburner to classify the risk. The risk calssification consists of three levels, i.e.: High, Medium, and Low [13]. With these levels, it will be easier for the management to comprehend the risk as a whole and to take action as a response to the risk.
  • 6. TELKOMNIKA ISSN: 1693-6930  Application Development Risk Assessment Model Based on... (Jaka Sembiring) 1381 3. Evaluation, Implementation and Discussion 3.1. Evaluation To evaluate the model, first we perform a numerical simulation on several nodes. Since the model uses the basic concept of probability, then the following conditions described in equation (2) must be fulfilled. 0 ≤ CPT ≤ 1 (2a) P(S) = 1 (2b) 0 ≤ P(R) ≤ 1 (2c) Where: CPT probability in Conditional Probability Table P(S) total probability at a specified node P(R) probability of the risk at nodes using the proposed model For illustration purpose we calculate the probability of node (R1|R2), which means the probability of “Unclear Customer Requirements” with evidence of risk “Requirement Creep”. Assumed at random that the probability of node R1 is shown in Table 4, and assumed that the prior probability of (R1|R2) is shown in Table 5. Table 4. Probability of R1 R1 T F Probability 0,7 0,3 Table 5. Probability of (R2|R1) R1 P(R2|R1 = T) P(R2|R1 = F) T 0,9 0,1 F 0,7 0,3 Using simple probability theory we can calculate: 1. P(R2|R1=T)=0.9 The risk’s probability of “Requirement Creep” if risk of “Unclear Customer Requirements” occurs is 0.9. 2. P(R1)=0.7 The risk’s probability of “Unclear Customer Requirements” is 0.7. Based on CPT in equation (2). P(R2) = (P(R2|R1=T) * (P(R1=F)) + (P(R2|R1=F) * (P(R1=T)) = (0.9*0.3) + (0.7*0.3) = 0.84 So that, P(R1|R2) = (P(R2|R1)*P(R1))/(P(R2)) = ((0.9*0.7))/0.84 = 0.75 We conclude that the risk’s probability of “Unclear Customer Requirements” with evidence of risk of “Requirement Creep” is 0.75. We can calculate the probability of each node in the network with the same procedure and will obtain the consistency that each node fulfills the condition in equation (2). In addition to evaluation by simulation, we also evaluate the model through judgment from international experts and application developers. We involve 20 application developers from the government agencies we mentioned before and 10 international researchers/experts in the field of application development. The result of relationship evaluation from 20 application developers and 10 researchers point of view can be seen in Table 6. Based on numerical simulation and subjective judgment in Table 6, we conclude that our proposed model has consistency and can be used as an assessment tools.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385 1382 Table 6. Evaluation of relationship among risks based on point of view from 20 application developers and 10 researchers Risk Item (Cause) Risk Item (Effect) Eval. of Relationship Appl. Dev. 'Yes' (%) Expert 'Yes' (%) (Yes/No) Unclear customer requirements Requirement creep Yes 80 60 Unable to meet user requirements Yes 90 85 Inappropriate development process Yes 50 85 Unable to meet user requirements Inappropriate development process Yes 50 90 Low software performance Unable to meet user requirements Yes 50 85 Inefficient team capability Unable to meet user requirements Yes 60 65 Lack of technicalskills Yes 50 75 Low software performance Yes 80 25 Inappropriate development process Yes 70 70 Problems w ith new technology Yes 30 20 Conflicts among team members Yes 90 70 Staff turnover Yes 50 50 Inadequate infrastructure Low software performance Yes 70 95 Unrealistic schedule Low software performance Yes 60 50 Optimistic resource planning Yes 70 75 Resource insufficiency Yes 80 45 User resistance Yes 10 25 Optimistic resource planning Unable to meet user requirements Yes 40 55 Technical complexity Yes 50 55 Low software performance Yes 60 50 Inappropriate development process Yes 60 60 Inadequate infrastructure Yes 40 35 Resource insufficiency Yes 80 75 Lack of executive involvement Unable to meet user requirements Yes 60 55 Low software performance Yes 10 20 Inappropriate development process Yes 40 60 Optimistic resource planning Yes 70 70 Conflicts among team members Yes 60 45 Communi-cation gaps Low software performance Yes 40 60 Conflicts among team members Low software performance Yes 40 75 Staff turnover Low software performance Yes 60 65 Unrealistic budgeting Inadequate infrastructure Yes 60 90 Resource insufficiency Yes 90 75 User resistance Inappropriate development process Yes 80 95 Optimistic resource planning Yes 40 35 Lack of law enforcement Low software performance Yes 40 45
  • 8. TELKOMNIKA ISSN: 1693-6930  Application Development Risk Assessment Model Based on... (Jaka Sembiring) 1383 3.1. Implementation and Discussion For case illustration, we implement our proposed model for risk assessment in a government agency Statistics Indonesia. In our proposed model there are total 469 parameters. For implementation simplicity we use around 16% of the total variables to be implemented with real values. We are using subjective probability method to assess the selected value involving 20 application developers to obtain the probability value. Those values can be seen in Table 7 column (3). With the same respondents, using Tan method [11] to obtain exposure factor, we get the results given in Table 7 column (4). Tabel 7. Risk and exposure factor values from 20 application developers view Code Risk Average Probability Average Exposure Factor (1) (2) (3) (4) R1 Unclear customer requirements 0.66 47 R2 Requirement creep 0.69 37 R3 Unable to meet user requirements 0.48 54 R4 Lack of technical skills 0.36 57 R5 Technical complexity 0.46 60 R6 Low softw are performance 0.42 52 R7 Inefficient team capability 0.36 46 R8 Inappropriate development process 0.50 55 R9 Problems w ith new technology 0.32 49 R10 Inadequate infrastructure 0.35 61 R11 Unrealistic schedule 0.58 37 R12 Optimistic resource planning 0.50 51 R13 Lack of executive involvement 0.34 47 R14 Communication gaps 0.37 48 R15 Conflicts among team members 0.27 55 R16 Staff turnover 0.17 50 R17 Unrealistic budgeting 0.39 51 R18 Resource insufficiency 0.38 50 R19 User resistance 0.38 48 R20 Lack of law enforcement 0.30 55 From Tabel 7 column (3), we understood that in application development at Statistics Indonesia, the risk of R2 “Requirement Creep” has the highest value. In many cases users quite often asking to add new function or change user requirement during application development process where they are not able or do not explain the requirement in detail. This result in higher value of risk in user requirement. When we analyzed further the exposure factor from Table 7 column (4), the highest exposure are R10 “Inadequate infrastructure” (61) and R5 “Technical complexity” (60). It means that although the risk for both factors are not as high as R2 “Requirement Creep”, but the perceive impact of those risks to the organization are severe. For the purpose of simplicity without sacrificing the integrity of the model, we select several conditional probabilities that we use for implementation of case illustration as shown in Table 8 column (1), where P(R1|R2) means “The probability of R1 given evidence R2”, P(R7|R3,R4,R6,R8,R9,R15,R16) means “The probability of R7 given evidence R3, R4, R6, R8, R9, R15 and R16” and so on. Using our proposed model, all of the result of implementation can be seen in Table 8. In Table 8 column (2) we show the subjective probability from 20 application developers, and column (3) is the exposure factor derived from Table 7. The risk exposure in column (4) is calculated using Boehm’s formula in equation (1). Then using risk level from Stoneburner [13], we obtain the risk level of the selected risks in Statistics Indonesia as our object of implementation, which are shown in Table 8 column (5). From Table 8 column (2) we obtain that the conditional risk P(R1|R2), which is the probability of “Unclear user requirement” provided that “Requirement creep” is very high reaching 0.73. This is consistent with our previous examination that both risks have the highest probability, and the combination of both resulted in higher number of probability of risk. When we assess the risk exposure further, we obtain that lower probability risk does not mean lower impact. We can see that the impact of P(R1|R2), P(R1|R2,R3), P(R12|R3,R5,R6,R8,R10), and P(R12|R3,R5,R6,R8,R10,R18) are higher even though they have different probability risk. It is clear that the perceived exposure factor or impact has played significant role in this result. When
  • 9.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 3, June 2018: 1376-1385 1384 we calculate the risk level using Stoneburner method, it happened that in our case illustration all of the risk levels are “Medium”, in other circumstances at other organization the results could have been different. Using our proposed method, we have shown that it will be easier for the management and application developers in organization to assess the risks and their impact on organization so that it will help them to create a policy or do some actions to anticipate and manage the risks. Table 8. Implementation result of our proposed model Probability Avrg. Value of Probability Avrg. Value of Exposure Factor Avrg.Value of Risk Exposure Risk Level (1) (2) (3) (4) (5) P(R1|R2) 0.73 47 35 M P(R1|R2,R3) 0.72 47 34 M P(R1|R2,R3,R8) 0.68 47 32 M P(R3|R8) 0.49 54 26 M P(R6|R3) 0.50 52 27 M P(R7|R3) 0.39 46 17 M P(R7|R3,R4) 0.48 46 21 M P(R7|R3,R4,R6) 0.50 46 22 M P(R7|R3,R4,R6,R8) 0.45 46 20 M P(R7|R3,R4,R6,R8,R9) 0.51 46 23 M P(R7|R3,R4,R6,R8,R9,R15) 0.58 46 27 M P(R7|R3,R4,R6,R8,R9,R15,R16) 0.64 46 30 M P(R10|R6) 0.51 61 30 M P(R11|R6) 0.60 37 21 M P(R11|R6,R12) 0.62 37 22 M P(R11|R6,R12,R18) 0.63 37 23 M P(R11|R6,R12,R18,R19) 0.57 37 20 M P(R12|R3) 0.58 51 29 M P(R12|R3,R5) 0.65 51 33 M P(R12|R3,R5,R6) 0.66 51 33 M P(R12|R3,R5,R6,R8) 0.65 51 33 M P(R12|R3,R5,R6,R8,R10) 0.67 51 34 M P(R12|R3,R5,R6,R8,R10,R18) 0.68 51 34 M P(R13|R3) 0.37 47 18 M P(R13|R3,R6) 0.39 47 19 M P(R13|R3,R6,R8) 0.40 47 19 M P(R13|R3,R6,R8,R12) 0.45 47 22 M P(R13|R3,R6,R8,R12,R15) 0.46 47 23 M P(R15|R6) 0.38 55 21 M P(R16|R6) 0.25 50 12 M P(R17|R10) 0.39 51 20 M P(R17|R10,R18) 0.43 51 21 M P(R19|R8) 0.35 48 17 M P(R19|R8,R12) 0.27 48 12 M Note: M (Medium Risk Level)
  • 10. TELKOMNIKA ISSN: 1693-6930  Application Development Risk Assessment Model Based on... (Jaka Sembiring) 1385 4. Conclusion In this paper, we propose a risk assessment model of application development using Bayesian network and Boehm’s software risk principles. After classifying, mapping and converting all risks to network nodes, we obtained the interrelationships among risks of top 20 risks in application development projects. Then we calculate the risk exposure on the derived network. By implementing the method in a real environment in a government agency, we conclude that management level and application developers can use our proposed risk assessment model to evaluate relationship, calculate probability and impact of risks to manage risk properly and appropriately. References [1] Westfall L. Software Risk Management. The Westfall Team. 2001. [2] Xu F, Qi G, Sun Y. The Risk Analysis of Software Projects Based on Bayesian Network. Journal of Convergence Information Technology. 2012; 7(5). [3] IEC. International Standard IEC/ISO 31010.Risk Management-Risk Assessment Techniques. 2009. [4] Pandey SK, Mustafa K. A Comparative Study of Risk Assessment Methodologies for Information Systems. Bulletin of Electrical Engineering and Informatics (BEEI). 2012; 1(2): 111-122. [5] Ai-Guo T., Ru-Long W. Software Project Risk Assessment Model Based on Fuzzy Theory. International Conference on Computer and Communication Technologies in Agricultural Engineering. 2010: 328-330. [6] Tao Y. A Study of Software Development Project Risk Management. International Seminar on Future Information Technology and Management Engineering. 2008: 309-312. [7] Sonchan P, Ramingwong S. Top Twenty Risks in Software Projects: A Content Analysis and Delphi Study. The 11th Conference on Electrical Engineering/Electronics, Computer, Telecommunicationa and Information Technology. 2014: 1-6. [8] Carr MJ, Konda SL, Monarch I., Ulrich F.C., Walker C.F. Taxonomy-Based Risk Identification. CMU/Software Engineering Institute. 1993. [9] Gallagher B. A Taxonomy of Operational Risk. CMU/Software Engineering Institute. 2005. [10] Sipayung JJP, Sembiring J. Risk Assessment Model of Application Development using Bayesian Network and Boehm’s Software Risk Principles. International Conference on Information Technology, Systems and Innovation. 2015: A-50 [11] Tan D. Quantitative Risk Analysis Step-By-Step. SANS Institute. 2003. [12] Boehm BW. Software Risk Management: Principles and Practices. IEEE Software. 1991; 8(1): 32-41. [13] Stoneburner G, Goguen A, Feringa A. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology. 2002.