Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2486046.2486073acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Search based risk mitigation planning in project portfolio management

Published:18 May 2013Publication History

ABSTRACT

Software projects are always facing various risks. These risks should be identified, analyzed, prioritized, mitigated, monitored and controlled. After risks are identified and analyzed, resources must then be devoted to mitigation. However, risk prioritization and mitigation planning are complicated problems. Especially in project portfolio management (PPM), resource contention among projects leads to difficulty in choosing and executing mitigation actions. This paper introduces a search based risk mitigation planning method that is useful in PPM. It integrates the analysis of risks, consideration of available resources, and evaluation of possible effects when taking risk mitigation actions. The method uses a genetic algorithm to search for the risk mitigation plan of optimal value. A case study shows how this method can identify effective risk mitigation plans, thus providing useful decision support for managers.

References

  1. CMMI® for Development, Version 1.2, CMU/SEI-2006-TR- 008, ESC-TR-2006-008. Carnegie Mellon University, Software Engineering Institute, Pittsburgh, Pa., 2006.Google ScholarGoogle Scholar
  2. Alba, E. and Chicano, J. F. Software Project Management with GAs. Journal of Information Sciences, 177, 11 2007), 2380-2401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Antoniol, G., Penta, M. D. and Harman, M. Search–Based Techniques Applied to Optimization of Project Planning for a Massive Maintenance Project. City, 2005.Google ScholarGoogle Scholar
  4. Boehm, B. Software risk management: principles and practices. IEEE Software, 8, 1 1991), 32 - 41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cao, P. and Chen, F. A Risk Control Optimization Model for Software Project. International Conference on Computational Intelligence and Software Engineering (CiSE)2009).Google ScholarGoogle Scholar
  6. Chang, C. K., Jiang, H.-y., Di, Y., Zhu, D. and Ge, Y. Timeline based model for software project scheduling with genetic algorithms. Information and Software Technology, 50, 11 2008), 1142-1154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fan, C.-F. and Yu, Y.-C. BBN-based software project risk management. The Journal of Systems and Software, 732004), 193–203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Freimut, B., Hartkopf, S., Kontio, J. and Kobitzsch, W. An Industrial Case Study of Implementing Software Risk Management. City, 2001.Google ScholarGoogle Scholar
  9. Gueorguiev, S., Harman, M. and Antoniol, G. Software Project Planning for Robustness and Completion Time in the Presence of Uncertainty using Multi Objective Search Based Software Engineering. City, 2009.Google ScholarGoogle Scholar
  10. Harman, M. The Relationship between Search Based Software Engineering and Predictive Modeling. City, 2010.Google ScholarGoogle Scholar
  11. Holland, J. H. Adaptation in natural and artificial systems. MIT Press Cambridge, City, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hui, A. K. T. Risks analysis of software development using bayesian belief network and non-linear programming methods. The Claremont Graduate University and California State University, Long Beach, 2009.Google ScholarGoogle Scholar
  13. Kılıc, M., Ulusoy, G. n. z. and lu, F. S. S.-e. A bi-objective genetic algorithm approach to risk mitigation in project scheduling. International Journal of Production Economics, 1122008), 202-216.Google ScholarGoogle Scholar
  14. LASER. Little-JIL 1.5 Language Report. UM-CS-2006-51, Laboratory for Advanced Software Engineering Research, University of Massachusetts, 2006.Google ScholarGoogle Scholar
  15. Li, J., Li, M., Wu, D. and Song, H. An integrated risk measurement and optimization model for trustworthy software process management. Information Sciences, 1912012), 47-60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Melo, A. C. V. d. and Sanchez, A. J. Software maintenance project delays prediction using Bayesian Networks. Expert Systems with Applications, 342008), 908–919. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. PMI A Guide to the Project Management Body of Knowledge (PMBOK® Guide)—Fourth Edition. Project Management Institute, Inc., 2008.Google ScholarGoogle Scholar
  18. Xiao, J., Osterweil, L. J., Wang, Q. and Li, M. Disruption-Driven Resource Rescheduling in Software Development Processes. Proceedings of International Conference on Software Process, LNCS61952010), 234-247. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Xiao, J., Wang, Q., Li, M., Yang, Q., Xie, L. and Liu, D. Value-based Multiple Software Projects Scheduling with Genetic Algorithm. City, 2009.Google ScholarGoogle Scholar
  20. Xu, R., Nie, P., Sai, Y., Qu, L. and Lee, Y. Optimizing Software Process Based On Risk Assessment and Control. Proceedings of the 2005 The Fifth International Conference on Computer and Information Technology (CIT’05)2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Zafra-Cabeza, A., Ridao, M. A. and Camacho, E. F. Using A Risk-Based Approach to Project Scheduling: A Case Illustration from Semiconductor Manufacturing. European Journal of Operation Research, 1902008), 708-723.Google ScholarGoogle Scholar

Index Terms

  1. Search based risk mitigation planning in project portfolio management

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSSP 2013: Proceedings of the 2013 International Conference on Software and System Process
      May 2013
      180 pages
      ISBN:9781450320627
      DOI:10.1145/2486046

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 May 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader