{"title":"优化软件风险缓解计划的创新模型:案例研究","authors":"A. Khatavakhotan, S. H. Ow","doi":"10.1109/AMS.2012.55","DOIUrl":null,"url":null,"abstract":"Software risk management process like any other process faces some threats. Ignoring such threats may influence the efficiency of software systems. The risk mitigation process would not be proper if the unseen risks neglected. The model in this research presents the best combination of solutions for integration of risk mitigation plan. The proposed model facilitates the identification of circumferential opportunities and risks in mitigation process. In addition, hidden competencies will be identified and the effectiveness of risk mitigation decisions will be optimized. By applying the method on the active software project, the circumferential risks and opportunities were detected and prioritized based on the obtained values. The case study verifies the model in practice and shows its applicability.","PeriodicalId":407900,"journal":{"name":"2012 Sixth Asia Modelling Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"An Innovative Model for Optimizing Software Risk Mitigation Plan: A Case Study\",\"authors\":\"A. Khatavakhotan, S. H. Ow\",\"doi\":\"10.1109/AMS.2012.55\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software risk management process like any other process faces some threats. Ignoring such threats may influence the efficiency of software systems. The risk mitigation process would not be proper if the unseen risks neglected. The model in this research presents the best combination of solutions for integration of risk mitigation plan. The proposed model facilitates the identification of circumferential opportunities and risks in mitigation process. In addition, hidden competencies will be identified and the effectiveness of risk mitigation decisions will be optimized. By applying the method on the active software project, the circumferential risks and opportunities were detected and prioritized based on the obtained values. The case study verifies the model in practice and shows its applicability.\",\"PeriodicalId\":407900,\"journal\":{\"name\":\"2012 Sixth Asia Modelling Symposium\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Sixth Asia Modelling Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AMS.2012.55\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth Asia Modelling Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2012.55","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Innovative Model for Optimizing Software Risk Mitigation Plan: A Case Study
Software risk management process like any other process faces some threats. Ignoring such threats may influence the efficiency of software systems. The risk mitigation process would not be proper if the unseen risks neglected. The model in this research presents the best combination of solutions for integration of risk mitigation plan. The proposed model facilitates the identification of circumferential opportunities and risks in mitigation process. In addition, hidden competencies will be identified and the effectiveness of risk mitigation decisions will be optimized. By applying the method on the active software project, the circumferential risks and opportunities were detected and prioritized based on the obtained values. The case study verifies the model in practice and shows its applicability.