A Review of Various Software Risk Management techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
The development of the projects, especially in the software related field, due to its complex nature, could often encounter many unanticipated problems, resulting in projects falling behind on deadlines, exceeding budgets and result in sub-standard products. Although these all problems cannot be totally eliminated, but they can be controlled by applying Risk Management methods and techniques. This can help to deal with problems before they occur. Organizations who implement risk management procedures and techniques will have greater control over the management of the project. There are different types of techniques for find out the risks in the software or control the risk before they occurs. In this paper, we will make a review of various software risk management techniques which are used recently and are helpful in handling the various type risks which occur during the software project development.
Authors and Affiliations
Lahkveer Kaur , Er. Sukhpreet Singh , Dr. Madhuchanda Rakshit
A Review of Cyber Security Techniques for Critical Infrastructure Protection
Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have...
LOCK-FREE FIFO BASED PARALLEL HTB IN CLOUD COMPUTING
Cloud computing is becoming more and more popular in IT industry nowadays. Those famous companies including Amazon, IBM, HP, Google and Microsoft are creating and deploying Clouds in various locations around the world. T...
Secure Socket Layer Implementations-A Review
Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in betwe...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...
Apriori algorithm on Marine Fisheries Biological Data
Data Mining (DM) is the process of analysing data from different vista and gives summary on specific determination. Association rules are rules describing the associations or correlations to bring out the hidden pattern...