版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Nearly half a million project managers execute about a millionsoftware projects every year all around the world, turning out softwareworth more than $600 billion. A considerable part of the softwareprojects, as one of th
2、e studies, Standish Group report shows nearlythree - quarter of over all as challenged or cancelled, goes in vain dueto unhandled damaging project risks associated with them. Most of them are unidentified until too
3、 late to manage them and theresults of these project have been nothing but desperate cancellation.Henceforth, it goes without saying the need of risk identification whichis a core process of risk management, the most cru
4、cial management inany project management. Software risk is a measure of the chance and loss of an unacceptableresult disturbing the software project, software process, or softwareproduct. Each software system
5、 is distinctive with its own particular set ofrisks. There are many software risks but fewer consequences that wecare to avoid. Mostly, it is hard to avoid all kinds of risks in a project.This is why we often care about
6、a few highly impacting risks likepotential cost, schedule, technical consequences in any project. Thesesoftware risks could avert a software project from meeting its cost,schedule, and technical objectives. Software risk
7、 is hazardous becauseit can prevent software project success. Software risk identification is the initial process in the riskassessment which is a part of risk management. Without proper riskidentification, it is t
8、ough to control and manage the risk that isassociated with the software project.So far, a number of research papers are contributed to this effortand a vast majority of techniques have been applied for the concernedprobl
9、em to solve the issue but still most of them are basically, dependon rigorous textual procedures to identify risks. The current work is an innovative attempt to solve the softwareproject risks identification proble
10、m with KeyGraph, a graphical tool ofchance discovery. This procedure, in turn, simplifies the software risksidentification and consolidates attempts to identify software risks morevivid and robust fashion. Further,
11、 the procedure enhances human ability and endeavour toidentify software risks by analytic capabilities. At the same time, it isimportant to bear in mind that the procedure consists an analyticalapproach that's what we ca
12、ll human initiative, the human process ofexternalizing the tacit experiences, rather than, an autonomous ormachine-dependent one. The software risk identification process begins with the creation ofsoftware project
13、 risk scenarios. These scenarios are at first, made bycollecting essential set of data or nodes as input to the formation ofKeyGraph. Further, co-occurrence network is created by links between thesefrequent co-occu
14、rring item-pairs or node-pairs of the data-set. Thefundamental islands are obtained by deleting links that separates thegraphs and deleting the links of highest contribution. This situation isregarded as generation of hu
15、bs, candidates of rare event or chance,indeed, risks which are significant items, touching many node-clusterbridges of frequent co-occurrence. A deliberate analysis is done beforethe nomination of these risks. Finally, t
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 軟件項(xiàng)目風(fēng)險(xiǎn)識(shí)別及風(fēng)險(xiǎn)評(píng)估研究.pdf
- 軟件項(xiàng)目風(fēng)險(xiǎn)的識(shí)別與風(fēng)險(xiǎn)的分析
- 軟件項(xiàng)目風(fēng)險(xiǎn)的識(shí)別與風(fēng)險(xiǎn)的分析
- 軟件項(xiàng)目風(fēng)險(xiǎn)識(shí)別及評(píng)價(jià)模型研究.pdf
- 軟件項(xiàng)目風(fēng)險(xiǎn)的識(shí)別與風(fēng)險(xiǎn)的分析解讀
- 項(xiàng)目風(fēng)險(xiǎn)識(shí)別
- 軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)估的研究.pdf
- 機(jī)會(huì)發(fā)現(xiàn)的形式建模.pdf
- 并購(gòu)項(xiàng)目風(fēng)險(xiǎn)識(shí)別研究.pdf
- 軟件開(kāi)發(fā)項(xiàng)目風(fēng)險(xiǎn)識(shí)別知識(shí)庫(kù)的構(gòu)建研究.pdf
- 基于Logistic模型的軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)估.pdf
- 基于BN的軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)估技術(shù)的研究.pdf
- 軟件項(xiàng)目風(fēng)險(xiǎn)管理.pdf
- 軟件項(xiàng)目風(fēng)險(xiǎn)管理
- 基于改進(jìn)bp網(wǎng)絡(luò)的軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)價(jià)研究
- 軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)估模型研究.pdf
- 軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)估方法的研究.pdf
- 機(jī)會(huì)發(fā)現(xiàn)算法及其應(yīng)用研究.pdf
- 基于改進(jìn)BP網(wǎng)絡(luò)的軟件項(xiàng)目風(fēng)險(xiǎn)評(píng)價(jià)研究.pdf
- 基于EXPERT COCOMO模型的軟件項(xiàng)目風(fēng)險(xiǎn)管理研究.pdf
評(píng)論
0/150
提交評(píng)論