Software Risk Analysis with the use of Classification Techniques: A Review
Risk analysis and management is a critical aspect of the software development process. Various risks are associated with every phase of the software development lifecycle. The early identification of risks in each phase of software development coupled with mitigating plans can help to reduce the cost of the product and increase software quality. This study aims to explore various tools and techniques used in the literature of analyzing and managing risks. Most risk analysis techniques have been applied in the requirement analysis phase, so there is a scarcity of tools supporting automated risk analysis. Accommodating various types of risk factors to predict the software risks reduces the accuracy of the classifier.
Keywords:risk analysis, software risk, classification techniques
Y. Hu, X. Zhang, E. W. T. Ngai, R. Cai, M. Liu, “Software project risk analysis using Bayesian Networks with causality constraints”, Decision Support Systems, Vol. 56, pp. 439–449, 2013 DOI: https://doi.org/10.1016/j.dss.2012.11.001
M. Ray, D. P. Mohapatra, “Risk analysis: a guiding force in the improvement of testing”, IET Software, Vol. 7, No. 1, pp. 29–46, 2013 DOI: https://doi.org/10.1049/iet-sen.2011.0081
Y. Hu, J. Du, X. Zhang, X. Hao, E. W. T. Ngai, M. Fan, M. Liu, “An integrative framework for intelligent software project risk planning”, Decision Support Systems, Vol. 55, No. 4, pp. 927–937, 2013 DOI: https://doi.org/10.1016/j.dss.2012.12.029
Z. Kremljak, C. Kafol, “Types of risk in a system engineering environment and software tools for risk analysis”, Procedia Engineering, Vol. 69, pp. 177–183, 2014 DOI: https://doi.org/10.1016/j.proeng.2014.02.218
J. Li, M. Li, D. Wu, H. Song, “An integrated risk measurement and optimization model for trustworthy software process management”, Information Sciences, Vol. 191, pp. 47–60, 2012 DOI: https://doi.org/10.1016/j.ins.2011.09.040
S. Alhawari, L. Karadsheh, A. N. Talet, E. Mansour, “Knowledge-based risk management framework for information technology project”, International Journal of Information Management, Vol. 32, No. 1, pp. 50–65, 2012 DOI: https://doi.org/10.1016/j.ijinfomgt.2011.07.002
S. Islam, H. Mouratidis, E. R. Weippl, “An empirical study on the implementation and evaluation of a goal-driven software development risk management model”, Information and Software Technology, Vol. 56, No. 2, pp. 117–133, 2014 DOI: https://doi.org/10.1016/j.infsof.2013.06.003
C. Jin, S. W. Jin, “Applications of fuzzy integrals for predicting software fault-prone”, Journal of Intelligent Fuzzy Systems, Vol. 26, No. 2, pp. 721–729, 2014 DOI: https://doi.org/10.3233/IFS-120762
W. M. Han, “Discriminating risky software project using neural networks”, Computer Standard & Interfaces, Vol. 40, pp. 15–22, 2015 DOI: https://doi.org/10.1016/j.csi.2015.01.001
O. F. Arar, K. Ayan, “Software defect prediction using cost-sensitive neural network”, Applied Soft Computing, Vol. 33, pp. 263–277, 2015 DOI: https://doi.org/10.1016/j.asoc.2015.04.045
S. Chatterjee, B. Maji, “A new fuzzy rule based algorithm for estimating software faults in early phase of development”, Soft Computing, Vol. 20, No. 10, pp. 4023–4035, 2016 DOI: https://doi.org/10.1007/s00500-015-1738-x
H. C. Liu, J. X. You, M. M. Shan, L. N. Shao, “Failure mode and effects analysis using intuitionistic fuzzy hybrid TOPSIS approach”, Soft Computing, Vol. 19, No. 4, pp. 1085–1098, 2015 DOI: https://doi.org/10.1007/s00500-014-1321-x
R. Malhotra, “Comparative analysis of statistical and machine learning methods for predicting faulty modules”, Applied Soft Computing, Vol. 21, pp. 286–297, 2014 DOI: https://doi.org/10.1016/j.asoc.2014.03.032
G. Czibula, Z. Marian, I. G. Czibula, “Software defect prediction using relational association rule mining”, Information Sciences, Vol. 264, pp. 260–278, 2014 DOI: https://doi.org/10.1016/j.ins.2013.12.031
W. Li, Z. Huang, Q. Li, “Three-way decisions based software defect prediction”, Knowlegde-Based Systems, Vol. 91, pp. 263–274, 2016 DOI: https://doi.org/10.1016/j.knosys.2015.09.035
S. N. Bhukya, S. Pabboju, “Software engineering: Risk features in requirement engineering”, Cluster Computing, Vol. 22, No. S6, pp. 14789–14801, 2019 DOI: https://doi.org/10.1007/s10586-018-2417-3
N. D. Linh, P. D. Hung, V. T. Diep, T. D. Tung, “Risk management in projects based on Open-Source Software”, 8th International Conference on Software and Computer Applications, Penang, Malaysia, February, 2019 DOI: https://doi.org/10.1145/3316615.3316648
K. Suresh, R. Dillibabu, “Designing a machine learning based software risk assessment model using Naïve Bayes algorithm”, TAGA Journal, Vol. 14, pp. 3141--3147, 2018.
A. E. Yamami, S. Ahriz, K. Mansouri, M. Qbadou, E. Illoussamen, “Representing IT projects risk management best practices as a metamodel”, Engineering, Technology & Applied Science Research, Vol. 7, No. 5, pp. 2062-2067, 2017 DOI: https://doi.org/10.48084/etasr.1340
A. Chenarani, E. A. Druzhinin, “A quantitative measure for evaluating project uncertainty under variation and risk effects”, Engineering, Technology & Applied Science Research, Vol. 7, No. 5, pp. 2083-2088, 2017 DOI: https://doi.org/10.48084/etasr.1530
How to Cite
MetricsAbstract Views: 463
PDF Downloads: 301
Copyright (c) 2020 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.