Recent Advances in Risk Analysis and Management (RAM)

Authors

  • Banerjee A Assistant Professor, St. Xavier‟s College, Jaipur, Rajasthan, India
  • Banerjee C Assistant Professor, Amity Institute of Info. Technology, Amity University, Rajasthan, India
  • Poonia AS Associate Professor, CSE, Govt. College of Engineering and Technology, Bikaner, Rajasthan, India

Keywords:

risk, Risk Analysis and Management (RAM), Recent Work in RAM, Future Directions in RAM

Abstract

In today‟s age, organizations consider software development process as an investment activity which is dependent on the comprehensive and precise working of each phase in Software Development Lifecycle. Flaws from each phase could remain undetected starting from requirement phase till maintenance phase. The flaw or defects if left unattended in the respective phase will be carried forward to next phase aggregating the issues. These undetected flaws should be identified and removed as early as possible so as to reduce additional overheads. From the data available, it is concluded that risk analysis is a major factor which is ignored during all the phases of software development process resulting in the emergence of undetected defects and flaws. Because of the failure of many projects, the importance of risk analysis during software development process is now being well recognized. A series of reversed as well as assorted researches are proceeding towards analyzing the risk „right from the beginning‟ during the software development process. Through researchers have contributed significantly in the field, still more needs to be achieved. This paper presents a review of the current research being done in Risk Analysis and Management (RAM), based on the recently published work. The study is carried out with respect to analysis and management of risk in various phase of SDLC. Such a thorough review enables one to identify mature areas of research, as well as areas that need further investigation. Finally, after critical analysis of the current research findings, the future research directions are highlighted with their significance.

References

Banerjee, C., &Pandey, S. K. (2009). Software Security Rules, SDLC Perspective. arXiv preprint arXiv:0911.0494.

Banerjee, C., Banerjee, A., &Murarka, P. D. Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker‟s Perspective. (2014) IJETTCS, 3(2), 245-250.

Banerjee, C., Banerjee, A., & D Murarka, P. (2014). Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirement) Metrics: Defensive Perspective. International Journal of Computer Applications, 93(18), 47-54.

S. K. Pandey et. al. (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1079-1085, Recent Advances in SRE Research [1]

Denis Verdon, Gary McGraw Risk Analysis in Software Design [2]

Banerjee, C., & Pandey, S. K. (2010). Research on software security awareness: problems and prospects. ACM SIGSOFT Software Engineering Notes, 35(5), 1-5.

Banerjee, A. B., & Murarka, P. D. (2013). An Improvised Software Security Awareness Model. International Journal of Information, Communication and Computing Technology, 1(2), 43-48.

Banerjee C., Banerjee Arpita, Pandey S. K. (2013): Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques. SGVU Journal of Engineering & Technology, 1(1), 33-38

Banerjee Arpita, Banerjee C. (2014). Cyber Security Awareness Through Education: Problems and Prospects. IMPETUS an Interdisciplinary Research Journal.2(1).

Banerjee C., Murarka P D, Banerjee Arpita (2013). IT Security Practices in an Organisation: Balancing Technology and Management Perspective. IMPETUS an Interdisciplinary Research Journal.2(1).1-6.

Gandhi, R. A., & Lee, S. W. (2007, October). Visual analytics for requirements-driven risk assessment.In Requirements Engineering Visualization, 2007. REV 2007. Second International Workshop on (pp. 6-6). IEEE.

De Bakker, K., Boonstra, A., &Wortmann, H. (2010). Does risk management contribute to IT project success? A meta-analysis of empirical evidence.International Journal of Project Management, 28(5), 493-503.

Liu, D., Wang, Q., & Xiao, J. (2009, October). The role of software process simulation modeling in software risk management: A systematic review. InEmpirical Software Engineering and Measurement, 2009.ESEM 2009. 3rd International Symposium on (pp. 302-311). IEEE.

Odzaly, E. E., Greer, D., & Sage, P. (2009, October). Software risk management barriers: An empirical study. In Empirical Software Engineering and Measurement, 2009.ESEM 2009. 3rd International Symposium on (pp. 418-421). IEEE.

Peng, G. C., &Nunes, M. B. (2009). Surfacing ERP exploitation risks through a risk ontology. Industrial Management & Data Systems, 109(7), 926-942.

Grantham, K., Elrod, C., Flaschbart, B., &Kehr, W. (2012). Identifying Risk at the Conceptual Product Design Phase: A Web-Based Software Solution and Its Evaluation.

Choetkiertikul, M., &Sunetnanta, T. (2010, August). A risk assessment model for offshoring using CMMI quantitative approach.In Software Engineering Advances (ICSEA), 2010 Fifth International Conference on (pp. 331-336).IEEE.

Amber, S., Shawoo, N., & Begum, S. (2012). Determination of Risk During Requirement Engineering Process. Journal of Emerging Trends in Computing and Information Sciences, ISSN, 2079-8407.

Sadiq, M., Rahman, A., Ahmad, S., Asim, M., & Ahmad, J. (2010, May). esrcTool: a tool to estimate the software risk and cost. In Computer Research and Development, 2010 Second International Conference on (pp. 886-890). IEEE.

Sarigiannidis, L., &Chatzoglou, P. D. (2011). Software development project risk management: A new conceptual framework. Journal of Software Engineering and Applications, 4(05), 293.

Fenton, N., & Neil, M. (2011). The use of Bayes and causal modelling in decision making, uncertainty and risk. CEPIS Upgrade 12 (5), 10-21.

Cailliau, A., & Van Lamsweerde, A. (2012, September). A probabilistic framework for goal-oriented risk analysis. In Requirements Engineering Conference (RE), 2012 20th IEEE International (pp. 201-210). IEEE.

Sharma, K. V., & Kumar, P. V. (2012, December). An efficient risk analysis in requirement engineering. In Engineering (NUiCONE), 2012 Nirma University International Conference on (pp. 1-5). IEEE.

Bazaz, Y., Gupta, S., PrakashRishi, O., & Sharma, L. (2012, March). Comparative study of risk assessment models corresponding to risk elements. In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 61-66).IEEE.

Anand, S., & Chopra, V. (2012). Decision Support System for Software Risk Analysis During Software Development. International Journal for Science and Emerging Technologies with Latest Trends, 2(1), 29-35.

PANDEY, S. K. (2012). A Comparative Study of Risk Assessment Methodologies for Information Systems. Bulletin of Electrical Engineering and Informatics, 1(2), 111-122.

Dapeng Liu (2012). Software effort estimation and risk analysis –A Survey, International Journal of Engineering and Innovative

Technology (IJEIT) 1(1).

Khan, M. A., Khan, S., &Sadiq, M. (2012). Systematic review of software risk assessment and estimation models. International Journal of Engineering and Advanced Technology, 1, 298.

Alberts, C. J., Allen, J. H., & Stoddard, R. W. (2012). Risk-based measurement and analysis: application to software security.

Hijazi, H., Khdour, T., &Alarabeyyat, A. (2012). A Review of Risk Management in Different Software Development Methodologies. International Journal of Computer Applications, 45.

SupannikaKoolmanojwong. (2014). Top-10 Risks in Real-Client Software Engineering Class Projects, IEEE

Hijazi, H., Alqrainy, S., Muaidi, H., &Khdour, T. (2014). Risk Factors in Software Development Phases. European Scientific Journal, 10(3).

Puri, S. (2010). A Risk Assessment Framework to Reduce Risk Level and Optimize Software Quality. SAMRIDDHI.

Downloads

Published

2024-02-26

How to Cite

Banerjee, A., Banerjee, C., & Poonia, A. S. (2024). Recent Advances in Risk Analysis and Management (RAM). COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1412–1416. Retrieved from https://ijact.in/index.php/j/article/view/244

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.