Project Risk Management: Managing Software Development Risk
- Length: 250 pages
- Edition: 1
- Language: English
- Publisher: De Gruyter Oldenbourg
- Publication Date: 2021-03-08
- ISBN-10: 3110648237
- ISBN-13: 9783110648232
- Sales Rank: #0 (See Top 100 Books)
The objective of the multi-volume book Developments in Managing and Exploiting Risk is to offer a balanced view to enable the reader to better appreciate risk as a counterpart to reward, and to understand how to holistically manage both elements of this duality. Crises can challenge any organization, and with a seemingly endless stream of disruptive and even catastrophic events taking place, there is an increasing emphasis on preparing for the worst. However, being focused on the negative aspects of risk, without giving consideration to the positive attributes, may be shortsighted. Playing it safe may not always be the best policy, because great benefits may be missed.
Analyzing risk is difficult, in part because it often entails events that have never occurred. Organizations, being mindful of undesirable potential events, are often keenly averse to risk to the detriment of capitalizing on its potential opportunities. Risk is usually perceived as a negative or downside but a commensurate weight should also be given to the potential rewards or upside, when evaluating new ventures. Even so, too much of a good thing may create unintended consequences of positive risk, which is also an undesirable situation. Developments in Managing and Exploiting Risk provides a professional and scholarly venue in the critical field of risk in business with particular emphasis on decision-making using a comprehensive and inclusive approach.
Title Page Copyright Contents Advances in project risk management Introduction Fundamentals Applications Conclusion References Part I: Fundamentals 1 Managing risks and opportunities in cyber-physical systems with software architecture assessments 1.1 Introduction 1.2 Background 1.3 Software architecture assessment as a risk management instrument 1.4 Case study 1.5 Discussion 1.6 Conclusion Acknowledgments References Notes 2 Managing software development risk: Risks of introducing the role of agile coach – a multivocal literature review 2.1 Introduction 2.2 Understanding the relationship between risk and agile coach role 2.3 Research method 2.4 Results 2.5 Discussion 2.6 Conclusion Appendix References 3 The role of DMSS analytics tools in software project risk management 3.1 Introduction 3.2 Review of software project risk management process 3.3 Review of decision-making support systems – a modern analytics classification 3.4 Integrated DMSS analytics tools – software project risk management framework and illustrative cases 3.5 Discussion 3.6 Contributions and conclusions Appendix References 4 Managing layers of risk: Uncertainty in large development programs combining agile software development and traditional project management 4.1 Introduction 4.2 Method 4.3 Results 4.4 Discussion 4.5 Conclusion 4.6 Limitations 4.7 Implications for theory and practice Acknowledgements Appendix 1: Interview guide References Notes 5 A knowledge-based risk management approach for Scrum software development projects 5.1 Introduction 5.2 Background 5.3 Proposed solution 5.4 Conclusion References Notes 6 Managing bias risk in algorithms and decision models 6.1 Introduction 6.2 Decision algorithms 6.3 Bias in decision algorithms 6.4 Risk and algorithmic bias 6.5 Strategies to reduce bias and manage risk 6.6 Conclusion References Part II: Applications 7 Interactional motifs: Leveraging risks in large and distributed software development teams 7.1 Introduction 7.2 How do motifs matter? 7.3 Existing studies 7.4 Interaction motifs and developer outcomes: A case study 7.5 Results and perspectives 7.6 Ode to humility 7.7 Towards a motif based evaluation of risks Acknowledgments References Notes 8 Risk-based security engineering 8.1 Introduction 8.2 Cybersecurity, safety and product liability 8.3 Risk-oriented security 8.4 Case study: Automotive security engineering 8.5 Conclusions References 9 Location-based access control enforcement 9.1 Introduction 9.2 Location-based access control model 9.3 Efficient processing of location predicate satisfiability 9.4 Evaluation of access requests 9.5 Conclusion References 10 Information security management in the cloud computing environment 10.1 Introduction 10.2 Characteristics and benefits of cloud computing 10.3 Cloud security risks 10.4 Countermeasures of cloud security risks 10.5 Toward an integrative cloud security management framework 10.6 Conclusion References Notes 11 A process framework for integrated risk management in IT 11.1 Introduction 11.2 Related work 11.3 Research contributions 11.4 Case study: Use of the IRMIS PAM 11.5 Discussion 11.6 Conclusion and future works Acknowledgment References 12 Embracing risk to gain competitive advantage 12.1 Introduction 12.2 Identifying a call to action: Why should companies embrace risk? 12.3 Developing an IT strategy 12.4 Case study: Digital/mobile transformation at aramark uniform services 12.5 Conclusion References Contributors Index Developments in Managing and Exploiting Risk
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.