Scheduling Strategies for Risk Mitigation

Peng Zhou, Hareton K. N. Leung

Abstract

Risk mitigation is essential for risk management because it aims to reduce or eliminate risks. To make the best use of resources, a scheduling strategy for risk mitigation is needed to determine the risks to be mitigated and when to mitigate them. The traditionally used strategy for scheduling risk mitigation, “risk value first strategy”, does not consider time elements of risk. Both PMI risk management framework and IEEE standard for software project risk management point out that time elements should be considered in risk mitigation. However, there is a lack of principles and guidelines on how to schedule risk mitigation with due consideration of these time elements. In this paper, we formally define scheduling strategy for risk mitigation, identify new scheduling strategies, and compare their performance by applying stochastic simulation.

References

  1. AS/NZS 2004. AS/NZS 4360: Risk Management. Standards Australia International Ltd.
  2. Boehm, B. W. 1989. Software Risk management, IEEE Computer Society Press.
  3. Cadle, J. & Yeates, D. 2008. Project Management for Information Systems, Harlow, England, Prentice Hall.
  4. Carr, M. J., Konda, S. L., MONARCH, I., ULRICH, C. & WALKER, C. F. 1993. Taxonomy-based risk identification. Pittsburgh, PA: Software Engineering Institute.
  5. Heemstra, F. J. & Kusters, R. J. 1996. Dealing with Risk: A Practical Approach. Journal of Information Technology, 11, 333-346.
  6. Holton, G. A. 2004. Defining Risk. Financial Analysts Journal, 60, 12-25.
  7. IEEE 2001. IEEE Std 1540-2001: IEEE Standard for Software Life Cycle Processes-Risk Management. New York: IEEE SA.
  8. ISO 2009. ISO 31000: Risk Management - Principle and Guidelines. Switzerland: International Standard Organization.
  9. Keil, M., Cule, P. E., Lyytinen, K. & Schmidt, R. C. 1998. A Framework for Identifying Software Project Risks. Communications of ACM.
  10. Kwan, T. W. 2009. A Risk Management Methodology with Risk Dependencies. Doctor of Philosophy, The Hong Kong Polytechnic University.
  11. Kwan, T. W. & Leung, H. K. N. 2011. A Risk Management Methodology for Project Risk Dependencies. IEEE Transactions on Software Engineering, 37, 635-648.
  12. Leung, H. K. N. 2010. Variants of Risk and Opportunity. 17th Asia Pacific Software Engineering Conference.
  13. Lister, T. 1997. Risk Management is Project Management for Adults. IEEE Software.
  14. PMI 2008. A Guide to the Project Management Body of Knowledge, Newtown, PA, Project management Institute.
  15. Sargent, R. G. 2010. Verification and Validation of Simulation Models. Proceedings of the 2010 Winter Simulation Conference.
  16. SEI 2006. CMMI® for Development Version 1.2, Pittsburgh, PA, Software Engineering Institute.
  17. Sherer, S. A. 2004. Managing Risk Beyond the Control of IS Managers: The Role of Business Management. Proceedings of 37th Hawaii International Conference on System Sciences. Hawaii.
  18. Williams, R. C., Pandelios, G. J. & Behrens, S. G. 1999. Software Risk Evaluation (SRE) Method Description (version 2.0). Pittsburgh, PA: Software Engineering Institute.
  19. Zhou, P. 2012. Managing Time Elements of Risk. Doctor of Philosophy, The Hong Kong Polytechnic University.
  20. Zhou, P. & Leung, H. K. N. 2011. Improving Risk Management with Modeling Time Element. 15th IASTED International Conference on Software Engineering and Applications. Dallas, USA.
  21. Zhou, P. & Leung, H. K. N. 2012. A stochastic simulation model for risk management process. 19th Asia-Pacific Software Engineering Conference (APSEC 2012). Hong Kong.
Download


Paper Citation


in Harvard Style

Zhou P. and K. N. Leung H. (2013). Scheduling Strategies for Risk Mitigation . In Proceedings of the 8th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2013) ISBN 978-989-8565-68-6, pages 365-376. DOI: 10.5220/0004409203650376


in Bibtex Style

@conference{icsoft-ea13,
author={Peng Zhou and Hareton K. N. Leung},
title={Scheduling Strategies for Risk Mitigation},
booktitle={Proceedings of the 8th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2013)},
year={2013},
pages={365-376},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004409203650376},
isbn={978-989-8565-68-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2013)
TI - Scheduling Strategies for Risk Mitigation
SN - 978-989-8565-68-6
AU - Zhou P.
AU - K. N. Leung H.
PY - 2013
SP - 365
EP - 376
DO - 10.5220/0004409203650376