A new risk evaluation method for software development project

被引:0
|
作者
Xu, Lin [1 ]
Deng, Mingrong
机构
[1] Zhejiang Univ Technol, Coll Business & Adm, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Univ Technol, Coll Management, Hangzhou, Zhejiang, Peoples R China
来源
ISMOT'07: Proceedings of the Fifth International Symposium on Management of Technology, Vols 1 and 2: MANAGING TOTAL INNOVATION AND OPEN INNOVATION IN THE 21ST CENTURY | 2007年
关键词
software development project; risk; triangular fuzzy number; fuzzy comprehensive evaluation;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
In the risk evaluation of software development project, it difficult to quantify risk of software development project accurately due to uncertainty and illegibility of software development risk. Consequently, we present a new method to evaluate the aggregative risks in software development using fuzzy set theory -group hierarchical fuzzy comprehensive evaluation method based on previous researches. This method introduces the triangular fuzzy number to represent experts' judgment information. The key to proposed method is: in view of different effect on cost, schedule. and performance, the loss on the three dimensions are assessed respectively. Based on the assessed values above, the aggregative loss value is obtained by fuzzy comprehensive evaluation method. This algorithm should make the assessment of loss more accurate. On the other hand, simple defuzzifcation algorithm is adopted to simplify complicated operations of triangular fuzzy number. Conclusions are as follows: group hierarchical fuzzy comprehensive evaluation method is valid and reflects the risk characteristics in implementing software development. The proposed method has the following advantages: (1) It combines subjective analysis with quantitative analysis effectively. (2) It takes into account effect on quality, cost, schedule and make information integrated. (3) It does not take a large amount of time to calculate.
引用
收藏
页码:874 / 878
页数:5
相关论文
共 50 条
  • [1] Risk analysis in project of software development
    Lu, XN
    Ge, YL
    IEMC-2003: MANAGING TECHNOLOGICALLY DRIVEN ORGANIZATIONS: THE HUMAN SIDE OF INNOVATION AND CHANGE, PROCEEDINGS, 2003, : 72 - 75
  • [2] A NOVEL SOFTWARE PROJECT EVALUATION METHOD
    Tang, Shi
    MATERIAL ENGINEERING AND MECHANICAL ENGINEERING (MEME2015), 2016, : 213 - 219
  • [3] An Information-Entropy-based Risk Measurement Method of Software Development Project
    Jiang, Rong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (05) : 1279 - 1301
  • [4] A STUDY OF SOFTWARE DEVELOPMENT PROJECT RISK MANAGEMENT
    Tao, Ye
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 309 - 312
  • [5] The development of an instrument to measure software project risk
    Wallace, L
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDING OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1997, : 1066 - 1066
  • [6] Method for the Evaluation and Adaptation of New Product Development Project Complexity
    Schuh, G.
    Rebentisch, E.
    Riesener, M.
    Mattern, C.
    Fey, P.
    COMPLEX SYSTEMS ENGINEERING AND DEVELOPMENT, 2017, 60 : 338 - 343
  • [7] Teaching distributed software development with the project method
    Schuemmer, Till
    Lukosch, Stephan
    Haake, Joerg M.
    CSCL 2005: Computer Supported Collaborative Learning 2005: The Next 10 Years, Proceedings, 2005, : 577 - 586
  • [8] A project retrospectives method in telecom software development
    Sertic, Hrvoje
    Marzic, Kresimir
    Kalafatic, Zoran
    CONTEL 2007: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2007, : 109 - +
  • [9] AN EVALUATION OF SOFTWARE PROJECT RISK MANAGEMENT IN SOUTH AFRICA
    de Wet, B.
    Visser, J. K.
    SOUTH AFRICAN JOURNAL OF INDUSTRIAL ENGINEERING, 2013, 24 (01) : 14 - 28
  • [10] Multi-Attribute Evaluation for Software Project Risk
    Liu Renhui
    Zhai Fengyong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 4942 - 4945