CFP last date
20 December 2024
Reseach Article

An Enhanced Risk Analysis Model (ERAM) of Riskit

by Ajayi S. W., Adekunle Y. A., Akinsanya A. O., Eze M. O., Awodele O.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 14
Year of Publication: 2018
Authors: Ajayi S. W., Adekunle Y. A., Akinsanya A. O., Eze M. O., Awodele O.
10.5120/ijca2018917805

Ajayi S. W., Adekunle Y. A., Akinsanya A. O., Eze M. O., Awodele O. . An Enhanced Risk Analysis Model (ERAM) of Riskit. International Journal of Computer Applications. 181, 14 ( Sep 2018), 34-41. DOI=10.5120/ijca2018917805

@article{ 10.5120/ijca2018917805,
author = { Ajayi S. W., Adekunle Y. A., Akinsanya A. O., Eze M. O., Awodele O. },
title = { An Enhanced Risk Analysis Model (ERAM) of Riskit },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 14 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number14/29893-2018917805/ },
doi = { 10.5120/ijca2018917805 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:00.198650+05:30
%A Ajayi S. W.
%A Adekunle Y. A.
%A Akinsanya A. O.
%A Eze M. O.
%A Awodele O.
%T An Enhanced Risk Analysis Model (ERAM) of Riskit
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 14
%P 34-41
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An exploration of riskit analysis graph (RAG) as a major technique of Riskit method is presented in this work with the aim of enhancing its capability for better risk identification (and management) and subsequently, contribute to software delivery time. The study begin with a brief background of the riskit as a major tool in risk analysis; pointing to the need for an enhancement of the tool and associated benefits plus disadvantages. After this, a review of closely related works in the field of study is presented leading to identification of some perceived limitations and challenges in the generic Riskit methods (RAG inclusive). Next, an analysis of a typical riskit analysis graph process vis-à-vis its main components is presented. Using the stepwise approach to risk profiling, a prototype of the intended model called the “enhanced risk analysis model- ERAM”- is presented based on risk ontology and prognosis states. The ERAM was developed in phases through leaning on the basic approach of risk models which comprises of a generic four steps –establishing the likelihood of occurrence of risks in the task pool, identification of major variables for measuring the impact (should it occur); a computer simulation is performed leading to a well defined risk profile and finally, a conclusion was drawn on the fact that Riskit can actually be extended through a deep analysis of it process components.

References
  1. Ajayi W. , Adekunle Y.A., Awodele O., Akinsanya A. O., Eze M.O and Ebiesuwa seun (2017) : Software development top models, risks control and effect on product quality, Global Journal of Computer Science and Technology, Volume 17, Issue 3 version 1.0.
  2. Busse J., Humm B., L¨ubbert C., Moelter F., Reibold A., Rewald M., Schl¨uter V., Seiler B.,Tegtmeier E., Zeh T.(2015) Actually, What Does “Ontology” Mean? A Term Coined by Philosophy in the Light of Different Scientific Disciplines, Journal of Computing and Information Technology - CIT 23, 2015, 1, 29–41
  3. Dhlamini J., Nhamu I., and Kachepa A.(2009) Intelligent Risk Management Tools for Software Development, SACLA ’09, 29 June - 1 July, ACM, Mpekweni Beach Resort, South Africa
  4. Dumbravă V. and Jacob V.(2013) Using Probability – Impact Matrix in Analysis and Risk Assessment Projects, Journal of Knowledge Management, Economics and Information Technology, special issue
  5. Edward H.(2008) Risk and opportunity of system change in organization (ROSCO) presentations, University of Sunderland, North East United Kingdom
  6. Freimut B., Hartkopt S., Kaiser P., Kontio J and Kobitzsch W.(2001) An Industrial Case Study of Implementing Software Risk Management, ESEC/FSE-9: Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, ACM , pp 277 – 287.
  7. Hashemian V. (2003) The Riskit Method For Software Risk Management, University of Waterloo, USA
  8. Kontio J. (1997) The Riskit Method for Software Risk Management. Version 1.00. CS-TR-3782. Computer Science Technical Reports. University of Maryland. College Park, Maryland. Available from http://www.soberit.hut.fi/~jkontio/riskittr.pdf
  9. Kontio J. (1999) Risk Management in Software Development: A Technology Overview and the Riskit Method, JCSE ’99, ACM, Los Angeles CA
  10. Kontio J. and Basili V.R.(1996) Risk Knowledge Capture in the Riskit Method, viewed on 29/10/2017from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.46.5592&rep=rep1&type=pdf
  11. Office of Government Commerce- OGC (2012; 2013) Project in a Controlled environment (PRINCE 2), TSO, UK
  12. Oxford Advanced Learners dictionary (2016). Oxford Advanced Learners, Oxford University Press, accessed on 27/10/2017http://www.oxfordlearnersdictionaries.com/definition/english/
  13. Saif H. and Sadim M.(2015) An Insight into Riskit Method, IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 12 | May 2015
Index Terms

Computer Science
Information Sciences

Keywords

Riskit methods RAG Enhanced Risk Analysis Model (ERAM) risk identification RTAS software quality