用户名: 密码: 验证码:
软件项目风险管理理论与模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在软件项目的投资、开发以及实施过程中,风险是时时存在的。而且随着软件系统复杂度和需求的不断增长,风险管理的作用变得越来越突出。因此,如何辨识风险、分析风险以及控制风险,降低风险发生的概率或造成的损失,是一个亟待解决的问题。
     本文首先回顾和分析了国内外研究现状,指出了当前要解决的主要问题;然后,从风险这一概念入手,对风险管理以及软件风险管理进行了简要的分析,详细说明了风险管理的理论基础以及软件项目风险管理相对于其它项目风险管理的特殊性。介绍了4套典型的风险管理体系,分析了各个体系的特点,并对这些风险管理体系进行了比较;第三,在构建软件项目风险评价体系的基础上,提出一种基于人工神经网络的软件项目投资风险评价模型。并通过实际IT项目评价数据的验证,说明该模型能够利用已知的样本数据进行有效的软件项目投资风险评价。在构建风险评价模型过程中,采用因子分析的方法对样本数据进行降维处理,同时利用了一种基于黄金分割原理的优化算法确定隐含层节点数;第四,提出一种动态软件项目开发风险管理模型。该模型通过风险跟踪模块实时监控风险状态,并根据风险状态的变化不断调整风险列表,使整个风险管理活动在一个具有持续反馈功能的风险管理流程当中进行,从而实现了动态的风险管理过程;第五,针对风险分析模块提出了一种基于贝叶斯网络的风险分析方法及其实现过程,并利用实际案例说明贝叶斯网络在软件项目风险分析过程中的应用过程。该方法能够根据不断更新的风险数据改变各个风险节点的状态,是支持软件开发过程中实现动态风险管理的基础。详细分析了贝叶斯网络的建模过程,即贝叶斯网络的结构学习过程和贝叶斯网络的参数学习过程。最后,总结全文,并指出该领域可能的发展方向。
Risk is ubiquitous in the process of investment or development and implementation of software project. Risk management becomes more important with the increase of software complexity and requirement. It is an urgent problem to study the strategies to analyze and control risk.
     The main contents of this paper are as follows: Firstly, the history and state-of-the-art of the risk management are reviewed both domestically and abroad. Then, the concepts about risk management and software risk management are defined based on the concept of risk. The theoretical foundation of risk management and the particularity of software project risk management are discussed in detail. After four styles of risk management systems are analyzed, their advantages and disadvantages are compared. Thirdly, based on establishing a risk evaluation system of software projects, a risk evaluation model of software project investment based on Artificial Neural Network (ANN) is proposed. The model is capable to evaluate risks effectively in the process of software project investment by verifying the data of software projects. And in the process of modeling, the factor analysis is utilized to decrease dimension of sample data and an optimization algorithm based on the principle of golden section is designed to find the optimal number of hidden layer nodes. Fourthly, a dynamic risk management model of software project development is proposed. The model can monitor risk states continually by using risk track module and then adjust risk list according to the change of risk states so that the activities of risk management run in the flow with feedback. Fifthly, A risk analysis implementation flow based on Bayesian Networks(BNs) for risk analysis module is presented. In addition, the BNs is applied to risk analysis module of a real case. The method can update risk data and change the states of risk nodes online. It is fundamental to implement dynamic risk management in the process of software development. In the process of modeling BNs, the structure learning and parameter learning of BNs are analyzed detailedly. At last, after summarizing main content discussed in this paper, potential research directions are pointed out.
引文
[1]信息产业部,中国软件产业研究报告,北京:人民出版社,2006,58~62
    [2]中国互联网协会,中国互联网发展报告,北京:人民出版社,2005,18~23
    [3]Boehm, B.W., DeMarco, T. Software Risk Management. IEEE Software, May/June, 1997, pp. 17~19.
    [4]Conrow, E.H., Shishido, P.S. Implementing Risk Management on Software Intensive Projects. IEEE Software, May/June, 1997, pp. 83~89.
    [5]黄梯云,管理信息系统(第二版),北京:高等教育出版社, 1999: 120~130.
    [6]薛华成,管理信息系统(第 3 版),北京:清华大学出版社, 1999: 328~330.
    [7]郑人杰,软件工程(高级),北京:清华大学出版社, 1999: 316~318.
    [8]张海藩,软件工程导论,北京:清华大学出版社, 1987: 98~100.
    [9]Hall E. M., 王海鹏等译,风险管理——软件系统开发方法,北京:清华大学出版社, 2002.
    [10]方德英,IT 项目风险管理理论与方法研究:[博士学位论文],天津:天津大学,2003
    [11]Williams TM. A classed bibliography of recent research relating to project risk management. European Journal of Operational Research 1995; 85:18~38.
    [12]Boehm, B.W. Software Risk Management. IEEE Computer Society Press Washington D.C, 1989.
    [13]Charette, Robert N. Software engineering risk analysis and management. McGraw-Hill Software Engineering Series, New York Intertext Publications; McGraw-Hill Book, 1989.
    [14]Ronald P. Higuera, Yacov Y. Haimes. Software Risk Management. CMU/SEI-96-TR-012 ESC-TR-96-012.
    [15]Microsoft Corp. MSF risk management process. http://www.Microsoft.com, 1999/6.
    [16]P.P. Tallon, et al. Using Real Options Analysis for Evaluating Uncertain Investments in Information Technology[A]: Insights From The ICIS 2001 Debate, Communications of the Association for Information Systems 2002, 9: 136~167.
    [17]Walsh, K.R. & Schneider, H. The role of motivation and risk behaviors in software development success. Information Research, (2002) 7 (3).
    [18]Bob Hughes, Mike Cotterell. Software project management (2nd edit.). McGraw-Hill, 1999.
    [19]P. L. Powell, J.H. Klein. Risk management for information systems development. Journal of Information Technology, 1996, 11(4): 0307~0317.
    [20]James J. Jiang et al. Risks to different aspects of system success. Information & Management, 1999, (36): 263~272.
    [21]Ira Monarch David P. Gluch. An Experiment in Software Development Risk Information Analysis. CMU/SEI-95-TR-014 ESC-TR-95-014.
    [22]Marvin J. Carr, S. L. Konda, I. Monarch, F. C. Ulrich, C. F. Walker. Taxonomy-Based Risk Identification. SEI Technical Report SEI-93-TR-006, Pittsburgh, PA: Software Engineering Institute, (SEI internal report).
    [23]Wideman, R. Max. Project and program risk management: a guide to managing project risks and opportunities. Project Management Institute, 1992.
    [24]Brian P. Gallagher. Software acquisition risk management key process area (KPA)— a guidebook version 1.02. CMU/SEI-99-HB-001, 1999/10.
    [25]Donald Reifer. Ten deadly risks in Internet and intranet software development. IEEE Software, May/June 1997, 126~127, 130~133.
    [26]IEEE. IEEE standard 1540-2001. IEEE Standard for Software Life Cycle Processes — Risk Management. Inc. New York, NY. , 2001.
    [27]Yong Jin Kim, G. Lawrence Sanders. Strategic actions in information technology investment based on real option theory. Decision Support Systems 2002 , (33): 1~11.
    [28]Taha, Hamdy A. Operations Research: An Introduction. New York: Macmillan, 1987.
    [29]Software Engineering Institute. The SEI Approach to Managing Software Technical Risks. Bridge 1992, (10):19~21.
    [30]David P. Gluch. A Construct for Describing Software Development Risks, July 1994. Technical Report CMU/SEI. The URL is http://www.rai.com.
    [31]Kontio, Jyrki. Software Engineering Risk Management: A Method, Improvement Framework, and Empirical Evaluation. A doctoral dissertation from Helsinki University of Technology, September 2001.
    [32]Karl E. Wiegers. Know your enemy: Software Risk Management. www.processimpact.com, Software Development, October 1998.
    [33]Hadar Ziv, Debra J. Richardson. The Uncertainty Principle in Software Engineering. Submitted to ICSE'97, 19th International Conference on Software Engineering.
    [34]Barbara, Kitchenhamand, Stephen Linkman. Estimates, Uncertainty, and Risk. IEEE Software, Vol.14, No.3, pp.69~74.
    [35]Elke U. Weber, Ann-Rene′ E Blais And Nancy E. Betz. A Domain-specific Risk-attitude Scale: Measuring Risk Perceptions and Risk Behaviors. Journal of Behavioral Decision Making, J. Behav. Dec. Making, (2002) 15: 263–290.
    [36]Barry W. Boehm, Richard E. Fairley. Software estimation perspectives. IEEE Software November/December 2000, pp.22~26.
    [37]Kevin Sullivan, Prasad Chalasani, Somesh Jha and Vibha Sazawa. Software Design as an Investment Activity: A Real Options Perspective. Real Options And Business Strategy, pp.215~245.
    [38]Ray C. Williams, George J. Pandelios, Sandra G. Behrens. Software Risk Evaluation (SRE) Method Description (Version 2.0). CMU/SEI-99-TR-029 December 1999.
    [39]Elaine M. Hall. Managing risk—Methods for Software System Development. Addison-Wesley, 1998, pp.225.
    [40]M. C. Paulk, B. Curits, M. B. Chrissis and C. V. Weber. Capability Maturity Model for Software, Version 1.1.Software engineering Institute. CMU/SEI-93-TR-24, August, 1993.
    [41]Project Management Institute (PMI). A Guide To The Project Management Body of Knowledge, Project Management Institute, Upper Darby, PA, 1996.
    [42]Brooks, F. P. The Mythical Man-Month. Addison-Wesley, Reading, MA, 1975.Essays on Software Engineering Anniversary Edition. Reading, MA: Addison-Wesley.
    [43]Frederick P. Brooks. No silver bullet: Essence and accidents of software engineering. IEEE Computer, 20(4):10~19, April 1987.
    [44]Carlo Ghezzi, Mehdi Jazayeri, and Dino Mandrioli. Fundamentals of Software Engineering. Prentice-Hall, Inc., Englewood Clis, New Jersey, 1991.
    [45]Alan M. Davis. 201 Principles of Software Development. McGraw Hill, New York, New York, 1995.
    [46]Boehm, B.W. Software risk management: principles and practices. IEEE Software, 1991, 8(1): 32~41.
    [47]王燕鸣,制造业信息化项目风险管理,科技管理研究,2003,35~37
    [48]周惠珍,投资项目评估实用全书,中国计划出版社,2003,44~57
    [49]Grey, Stephen, Practical Risk Assessment for Project Management, ICL, UK: John Wiley&Sons,1995
    [50]庄镇泉,王熙法,王东生,神经网络与神经计算机,北京:科学出版社,1994,1~4
    [51]徐绪松,但朝阳,高技术项目投资风险模糊综合评价模型,数量经济技术经济研究,2000,34~36.
    [52]郭百钢,基于 Bayes 网络的项目投资风险评估与决策方法研究:[博士学位论文],南京:南京理工大学,2004
    [53] 夏克文,李昌彪,沈钧毅,前向神经网络隐含层节点数的一种优化算法,计算机科学,2005,143~145
    [54] 赵弘,周瑞祥,林廷圻,基于Levenherg-Marquardt算法的神经网络监督控制,西安交通大学学报,2002,36(5):523~527
    [55]Elaine M. Hall. Managing Risk—Methods for Software System Development . Addison-Wesley.2002:89~99
    [56]Kathy Schwalbe. Information Technology Project Management. Thomson Learning public co. 1999.9.
    [57]M. Keil, P.E. Cule, K. Lyytinen, R.C. Schmidt. A framework for identifying software project risks. Communications of the ACM 41 1998, (11): 76~83.
    [58]Lreland, Lewis R. Quality Management for Projects and Programs. Project Management Institute, 1991.
    [59]Barki, Henri, Rivard, Suzanne and Talbot, Jean. An Integrative ContingencyModel of Software Project Risk Management. Journal of Management Information Systems Vol. 17 No. 4, Spring 2001 pp.37 ~ 70.
    [60]Jesús S. Aguilar-Ruiz, Isabel Ramos, José C. Riquelme, Miguel Toro. An Evolutionary Approach to Estimating Software Development Projects. Information and Software Technology, 17 July 2001.
    [61]Garvey, P., Phair, D.J. & Wilson, J.A. An Information Architecture for Risk Assessment and Management. IEEE Software, May/June, 1997, pp. 25~35.
    [62]K. Kunsala. Software Project Risk Assessment Based on Generic Experience of Companies. 3rd Escom Conf., ESCOM, Walstead, UK, 1992.
    [63]Roger S. Pressman. A Manager’s Guide to Software Engineering., McGraw-Hill 1993
    [64]Dale, Walter Karolak. Software Engineering Risk Management. IEEE Computer Society Press 1996.
    [65]Barki, H., Riverd, S., Talbot, J. Toward an assessment of software development risk. Journal of Management Information Systems, 1993, 10(2): 203~225.
    [66]Jyrki Kontio, Victor R. Basili. Empirical Evaluation of a Risk Management Method. This paper was presented at the SEI Conference on Risk Management, 1997, Atlantic City, NJ.
    [67]Kontio, J. Risk management in software development: A technology overview and the Riskit method. Software Engineering, 1999. Proceedings of the 1999 International Conference on, 1999 Page(s): 679 ~680.
    [68]Yacoub SM, Ammar H.H., Robinson. A methodology for architectural-level risk assessment using dynamic metrics. 11th International Symposium On Software Reliability Engineering, Proceedings 210~221, 2000.
    [69]Smolucha J. Software simulation tools minimize risk.WESCON/97 - Conference Proceedings, 323~328, 1997.
    [70]Dan X. Houston, Gerald T. Mackulak, James S. Collofello. Stochastic simulation of risk factor potential effects for software development risk management. The Journal of Systems and Software 59 (2001) 247~257.
    [71]Norman Fenton and Martin Neil. Software Metrics and Risk. FESMA 99, 2nd European Software Measurement Conference, 8 October, 1999.
    [72]Sunita Chulani, Barry Boehm, Bert Steece. Bayesian Analysis of Empirical software Engineering Cost Models. Software Engineering, IEEE Transactions on, Volume: 25 Issue: 4, July-Aug. 1999, Page(s): 573 ~583.
    [73]SCULLY. Scaling up Bayesian Nets for Software Risk Assessment. SCULLY Version 1.0, 12 July 1999.
    [74]Juite Wang. A fuzzy project scheduling approach to minimize schedule risk for product development. Fuzzy Sets and Systems 127 (2002) 99~116.
    [75]H.H. Ammar, T. Nikzadeh, J.B. Dugan. An Example of Risk Assessment of Software Systems Specifications. Software Reliability Engineering, 1997. Proceedings., The Eighth International Symposium on, 1997, Page(s): 156 ~167.
    [76]H. Ammar, T. Nikzadeh, and J.B. Dugan. A Methodology for Risk Assessment of Functional Specifications using Colored Petri NEts. In proceeding of the Fourth International Software Metrics Symposium (Metrics'97), IEEE Comp. Soc., November 1997.
    [77]Hany H. Ammar, Tooraj Nikzadeh, and Joanne Bechta Dugan. Risk assessment of software-system specifications. IEEE Transactions On Reliability, Vol. 50, No. 2, June 2001 171~183.
    [78]Judson Williford, Andrew Chang. Modeling the FedEx IT division: a system dynamics approach to strategic IT planning. The Journal of Systems and Software 46 (1999) 203~211.
    [79]Briand, L., El Eman, K., Bomarius, F. A hybrid method for Software Cost Estimation and Risk Assessment. Appear in proceedings of International Conference on Software Engineering (ICSE) '98, IEEE 1998.
    [80]Madachy, R.J. Heuristic risk Assessment using Cost Factors. IEEE Software, May/June, 1997, pp. 51~59.
    [81]Greer, D. and Bustard, D.W. Towards an Evolutionary Delivery Strategy based on Risk Analysis. Proceedings of Engineering of Computer Based Systems, IEEE Computer Society Press, March 1996.
    [82]Theron R. Leishman, Larry Smith. Software Project Management Technology Report. United States Air Force (USAF) Software Technology Support Center (STSC) , April 9, 2000 Version 4.6.
    [83]Terry R. Adler, John G. Leonard, Ric K. Nordgren. Improving risk management: moving from risk elimination to risk avoidance. Information and Software Technology 41 (1999) 29~34.
    [84]Mark Keil, Linda Wallace, Dan Turk, Gayle Dixon-Randall, Urban Nulden. An investigation of risk perception and risk propensity on the decision to continue a software development project. The Journal of Systems and Software 53 (2000) 145~157.
    [85]Izzet Sahin, Fatemeh (Mariam) Zahedi. Theory and Methodology: Optimal policies under risk for changing software systems based on customer satisfaction. European Journal of Operational Research 123 (2000) 175~194.
    [86]S. Ferat. A Bayesian Network Approach to the Self-organization and Learning in Intelligent Agents. Dissertation. Blacksburg, University Libraries, Virginia Polytechnic Institute and State University. 2000.
    [87]张少中,基于贝叶斯网络的知识发现与决策应用研究:[博士学位论文],大连:大连理工大学,2003
    [88]P. Spirtes, C. Glymour, R. Scheines. An Algorithm for Fast Recovery of Sparse Causal Graphs. Social Science Computer Review. 1991. 9: 62-72.
    [89]S. Acid, D. Campos, L.M. et al. Fast Algorithms for Learning Simplified Graphical Models. Symposium on Artificial Intelligence. CIMAF99. Special Session on Distributions and Evolutionary Optimization. 1999. 425-331,
    [90]S. Acid, D. Campos, L.M. et al. Approximations of Causal Networks by Polytrees: an Empirical Study. In B. Bouchon-Meunier, editor. Advances in Intelligent Compiting, Lectures Notes in Computer Science 945. Springer-Verlag, 1995. 149-158.
    [91]J. Cheng, R. Greiner, J. Kelly, D.A. Bell, W. Liu. Learning Bayesian Networks from Data: An Information-Theory Based Approach. The Artificial Intelligence Journal. 2002. 137:43-90.
    [92]J. Cheng, D.A. Bell, W. Liu. Learning Bayesian Networks from Data: An Efficient Approach Based on Information Theory. Tech. Rep. Department of Computer Science University of Alberta. 1998.
    [93]J. Cheng, D.A. Bell, W. Liu. Learning Bayesian Networks from Data: An Efficient Approach Based on Information Theory. In Proceedings of the Sixth ACM International Conference on Information and Knowledge Management. 1997.
    [94] D.M. Chickering, D. Geiger, D. Heckerman. Learning Bayesian Networks is NP-Hard. Microsoft Research Technical Report MSR-TR-94-17. 1994.
    [95]李刚,知识发现的图模型方法:[博士学位论文],中国科学院软件研究所, 2001
    [96]D. Heckerman, D. Geiger, D.M. Chickering. Learning Bayesian Networks: TheCombination of Knowledge and Statistical Data. Machine Learning. 1995. 20(3): 197-24.
    [97]D. Heckerman, E. H. Mamdani, P. Michael. Real-world Applications of Uncertain Reasoning. International Journal of Human Computer Studies. 1995. 42(6): 573-574.
    [98]P. Larranaga, et al. Structure Learning of Bayesian Networks by Genetic Algorithms: A performance Analysis of Control Parameters. IEEE Transactions on Pattern Analysis and Machine Intelligence. 1996. 18b(9): 912-926.
    [99]P. Larranaga, et al. Searching for the Best Ording in the Structure Learning of Bayesian Networks. IEEE Transactions on System, Man and Cybernetics. 1996. 26c(4): 487-493.
    [100]W. Lam. Alberto Maria Segre: A Distributed Learning Algorithm for Bayesian Inference Networks. TKDE. 2002. 14(l): 93 一 105.
    [101]M.L. Wong, W. Lam, K.S. Leung. Using Evolutionary Programming and Minimum Description Length Principle for Data Mining of Bayesian Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence. 1999. 21(2): 174-178.
    [102]P. Sebastiani, M. Ramoni. Bayesian Inference with Missing Data Using Bound and Collapse. Technical Report KMi-TR-58. Knowledge Median Institute. The Open University. November 1997.
    [103]N. Friedman. The Bayesian Structural EM Algorithm. UAI 1998. 129-138.
    [104]N. Friedman, The Bayesian structural EM algorithm, in G.F. Cooper and S. Moral (Eds.). Proceedings of Fourteenth Conference on Uncertainty in ArtificialIntelligence (UAI '98). San Francisco, CA. Morgan Kaufmann. 1998.
    [105]D.J. Spiegelhalter, S.L. Lauritzen. Sequential Udating of Probabilities on Directed Graphical Structures Networks. 1990. 20: 579-605.
    [106]慕春棣,戴剑彬,叶俊,用于数据挖掘的贝叶斯网络,软件学报,2000, 660-666
    [107] D. Heckerman. A Tutorial on Learning Bayesian Networks. Technical Report MSR-TR-95-06. Microsoft Research. 1995.
    [108]冯楠,李敏强,寇纪淞,方德英,基于贝叶斯网络的软件项目风险管理模型,计算机工程,2006
    [109]D. Heckerman. Bayesian Networks for Data Mining. Data Mining and Knowledge Discovery. 1997. 1(1):79-119

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700