Академический Документы
Профессиональный Документы
Культура Документы
TECHNOLOGIES AT BANGALORE
CHAPTER-1
1
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
1. INTRODUCTION
Every organization has a mission. In this digital era, as organizations use automated information
technology (IT) systems to process their information for better support of their missions, risk
management plays a critical role in protecting an organization’s information assets, and therefore
its mission, from IT-related risk. An effective risk management process is an important
component of a successful IT security program. The principal goal of an organization’s risk
management process should be to protect the organization and its ability to perform their
mission, not just its IT assets. Therefore, the risk management process should not be treated
primarily as a technical function carried out by the IT experts who operate and manage the IT
system, but as an essential management function of the organization.
There are many risks involved in creating high quality brisk technologies software on time and within
budget. However, in order for it to be worthwhile to take these risks, they must be compensated for
by a perceived reward. The greater the risk, the greater the reward must be to make it worthwhile to
take the chance. In brisk technologies software development, the possibility of reward is high, but so
is the potential for disaster. The need for brisk technologies software risk management is illustrated in
Gilb’s risk principle. “If you don’t actively attack the risks, they will actively attack you”. In order to
successfully manage a brisk technologies software project and reap our rewards, we must learn to
identify, analyses, and control these risks. This paper focuses on the basic concepts, processes, and
techniques of brisk technologies software risk management.
There are basic risks that are generic to almost all brisk technologies software products. Although
there is a basic component of risk management inherent in good project management, risk
management differs from project management in the following ways:
2
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
1. Avoiding software project disasters, including run away budgets and schedules, defect-ridden
software products, and operational failures.
3. Avoiding overkill with detection and prevention techniques in areas of minimal or no risk.
4. Stimulating a win-win software solution where the customer receives the product they need and
the vendor makes the profits they expect.
Software development is activity that uses a variety of technological advancements and requires high
levels of knowledge. Because of these and other factors, every software development project contains
elements of uncertainty. This is known as project risk. The success of a software development project
depends quite heavily on the amount of risk that corresponds to each project activity. As a project
manager, it’s not enough to merely be aware of the risks. To achieve a successful outcome, project
leadership must identify, assess, prioritize, and manage all of the major risks. The goal of most software
development and software projects is to be distinctive—often through new features, more efficiency, or
exploiting advancements in software. Any software project executive will agree that the pursuit of such
opportunities cannot move forward without risk. Because risks are painfully real and quite prevalent on
all software projects, it’s critically necessary that stakeholders work hard to identify, understand, and
mitigate any risks that might threaten the success of a project. For projects that have time and cost
constraints, our experience shows most clearly that successful software
3
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
development efforts are those in which risk mitigation is a central management activity.
Risk management means risk containment and mitigation. First, you’ve got to identify and plan.
Then be ready to act when a risk arises, drawing upon the experience and knowledge of the entire
team to minimize the impact to the project.
Most software projects are inherently risky because of the variety potential problems that might
arise. Experience from other software projects can help managers classify risk. The importance here
is not the elegance or range of classification, but rather to precisely identify and describe all of the
real threats to project success. A simple but effective classification scheme is to arrange risks
according to the areas of impact.
4
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
The main objective of the study is to know the overall financial position of the Brisk Technologies
from 2018-2019.
This research project is conducted to study the risk factors affecting the software quality. This study
is conducted under three main categories. They are quality of testing, test planning and quality
assurance team. In this study, a data collection survey is conducted, among Software quality
managers and quality leads of Software development companies in the Bangalore. This study will
fully focus on risk factor under IT SECTOR.
5
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
· Avoiding a risk in one part of the project may create risks in other parts of the project.
Do we know enough? If we don’t know enough, we can plan to “buy” additional information
through mechanisms such as prototyping, modeling, simulation, or conducting additional research.
Introduction to IT sector
Information Technology (IT) industry in India is one of the fastest growing industries. Indian IT
industry has built up valuable brand equity for itself in the global markets. IT industry in India
comprises of software industry and information technology enabled services (ITES), which also
includes business process outsourcing (BPO) industry. India is considered as a pioneer in software
development and a favorite destination for IT-enabled services. The origin of IT industry in India can
be traced to 1974, when the mainframe manufacturer, Burroughs, asked its India sales agent, Brisk
Technologies (BT), to export programmers for installing system software for a U.S. client.
6
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Today, Indian IT companies such as Tata Consultancy Services (TCS), Wipro, Infosys, HCL etc are renowned
in the global market for their IT prowess.
Some of the major factors which played a key role in India's emergence as key global IT player are:
Indian Education System
High Quality Human Resource
Competitive Costs
Infrastructure Scenario
Information technology (IT) is the application of computers to store, retrieve, transmit and
manipulate data, often in the context of a business or other enterprise. IT is considered a subset
of information and communications technology (ICT).
7
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
India is the world's largest sourcing destination for the information technology (IT) industry,
accounting for approximately 67 per cent of the US$ 124-130 billion market. The industry
employs about 10 million workforces. More importantly, the industry has led the economic
transformation of the country and altered the perception of India in the global economy. India's
cost competitiveness in providing IT services, which is approximately 3-4 times cheaper than the
US, continues to be the mainstay of its Unique Selling Proposition (USP) in the global sourcing
market. However, India is also gaining prominence in terms of intellectual capital with several
global IT firms setting up their innovation centers in India.
FEATURES OF THE IT INDUSTRY AT A GLANCE
Economies of scale for the information technology industry are high. The marginal cost of
each unit of additional software or hardware is insignificant compared to the value addition
that results from it.
Unlike other common industries, the IT industry is knowledge-based.
Efficient utilization of skilled labor forces in the IT sector can help an economy achieve a
rapid pace of economic growth.
The IT industry helps many other sectors in the growth process of the economy including the
services and manufacturing sectors.
This statistic illustrates the amount of revenue generated by the IT industry worldwide from 2005
to 2012, and also includes a forecast for 2013 and 2016. The source estimates that in 2016, more
than 1,357 billion euro revenue will be made through software, hardware and IT services.
8
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Mobility, Analytics and Cloud (SMAC) are collectively expected to offer a US$ 1 trillion
opportunity. Cloud represents the largest opportunity under SMAC, increasing at a CAGR of
approximately 30 per cent to around US$ 650-700 billion by 2020. The social media is the
second most lucrative segment for IT firms, offering a US$ 250 billion market opportunity by
2020. The Indian e-commerce segment is US$ 12 billion in size and is witnessing strong growth
and thereby offers another attractive avenue for IT companies to develop products and services to
cater to the high growth consumer segment.
The IT industry has also created significant demand in the Indian education sector, especially for
engineering and computer science. The Indian IT and ITeS industry is divided into four major
segments – IT services, Business Process Management (BPM), software products and
engineering services, and hardware.
The IT-BPM sector which is currently valued at US$ 143 billion is expected to grow at a
Compound Annual Growth Rate (CAGR) of 8.3 per cent year-on-year to US$ 143 billion for
2015-16. The sector is expected to contribute 9.5 per cent of India’s Gross Domestic Product
(GDP) and more than 45 per cent in total services export in 2015-16.
The Indian IT sector is expected to grow at a rate of 12-14 per cent for FY2016 in constant currency
terms. The sector is also expected triple its current annual revenue to reach US$ 350 billion by FY
2025, as per National Association of Software and Services Companies (NASSCOM).
9
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
India, the fourth largest base for new businesses in the world and home to over 3,100 tech start-
ups, is set to increase its base to 11,500 tech start-ups by 2020, as per a report by NASSCOM and
Zinnov Management Consulting Pvt Ltd.
India’s internet economy is expected to touch Rs 10 trillion (US$ 146.72 billion) by 2018,
accounting for 5 per cent of the country’s GDP, according to a report by the Boston Consulting
Group (BCG) and Internet and Mobile Association of India (IAMAI). India’s internet user base
reached over 350 million by June 2015, the third largest in the world, while the number of social
media users grew to 143 million by April 2015 and smartphones grew to 160 million.
BT has a strong network of strategic and solution partners with a joint objective of helping its
customers become high-performance businesses by maximizing the value of their technology
investments. Established in 1968, BT has grown to its current position as the largest IT services
firm in India on the basis of its outstanding service record, collaborative partnerships, innovation
and corporate responsibility.
For most software industrial, we can define five main risk impact areas:
User and functional requirements. Software requirements capture all user needs with respect to the
software system features, functions, and quality of service. Too often, the process of requirements
definition is lengthy, tedious, and complex. Moreover, requirements usually change with discovery,
10
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
prototyping, and integration activities. Change in elemental requirements will likely propagate
throughout the entire project, and modifications to user requirements might not translate to
functional requirements. These disruptions often lead to one or more critical failures of a poorly-
planned software development project.
Application and system architecture. Taking the wrong direction with a platform, component, or
architecture can have disastrous consequences. As with the technological risks, it is vital that the
team includes experts who understand the architecture and have the capability to make sound design
choices.
Performance. It’s important to ensure that any risk management plan encompasses user and partner
expectations on performance. Consideration must be given to benchmarks and threshold testing
throughout the project to ensure that the work products are moving in the right direction.
Organizational. Organizational problems may have adverse effects on project outcomes. Project
management must plan for efficient execution of the project, and find a balance between the needs
of the development team and the expectations of the customers. Of course, adequate staffing
includes choosing team members with skill sets that are a good match with the project.
After cataloging all of the risks according to type, the software development project manager should
craft a risk management plan. As part of a larger, comprehensive project plan, the risk management
plan outlines the response that will be taken for each risk—if it materializes.
To be effective, software risk monitoring has to be integral with most project activities. Essentially,
this means frequent checking during project meetings and critical events.
Monitoring includes:
11
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Accept: Acknowledge that a risk is impacting the project. Make an explicit decision to accept the
risk without any changes to the project. Project management approval is mandatory here.
Avoid: Adjust project scope, schedule, or constraints to minimize the effects of the risk.
Control: Take action to minimize the impact or reduce the intensification of the risk.
Transfer: Implement an organizational shift in accountability, responsibility, or authority to other
stakeholders that will accept the risk.
Continue Monitoring: Often suitable for low-impact risks, monitor the project environment for
potentially increasing impact of the risk.
Communicate
Throughout the project, it’s vital to ensure effective communication among all stakeholders,
managers, developers, QA—especially marketing and customer representatives. Sharing
information and getting feedback about risks will greatly increase the probability of project success.
12
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
biweekly as the project progresses. Everything listed in the top two lines are usually
businesscritical and this matrix helps keep the most urgent issues front and center.
Issues might include IT security, global and national compliance issues if applicable, delivery of
vendor shipments or contributions, launching a new product line, political unrest, and more.
13
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Small business owners can use this risk-assessment matrix to list out the thresholds for measuring
risk in various categories on an ongoing basis. Like the matrix above, the dollar amount under
14
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
“Cost” will vary for example, but a “5” would be a significant portion or even majority of the time
period’s forecasted income, while “1” would be a small amount. Using this matrix, a small
business owner can sketch out where the biggest risks may lie, and then update this weekly or
biweekly. Everything listed in the top two lines are usually business-critical and this matrix helps
keep the most urgent issues front and center.
Issues might include IT security, compliance issues if applicable, delivery of vendor shipments or
contributions, launching a new product line, and more.
15
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
16
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
endto-end outsourcing solutions for various industries. It has a comprehensive set of solutions
Telecom & IT Companies.
Brisk Techno Pvt. Ltd. has worked with over 200 Client worldwide, Including - Reliance
Communication, Northern Railway, BSNL, ESSAR Telecom, GTL, WTTIL(TATA) AT&T,
Quippo Telecom, Webtech, Mach Well Tools, Uniwise ,S.D Engineers, Ashari Technology
and Many More....
Brisk Techno Pvt. Ltd. serves customers in India and has presence across 4 continents. The
company offers the following range of enterprise services and solutions to meet varying
partner/customer requirements.
Brisk Techno for its Software services and certified for its IT & Telecom services.
17
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Brisk Techno has three delivery Offices in India, Lucknow, Meerut & Delhi.
Some reputed companies visit SIPL campus or our collaborative college campuses for placement.
For getting updated information about these drives, visit our website http://www.brisktechno.com.
In the June 2010, Twelve Companies have visited CERT College Meerut For Campus
Placement in an Job event organized by SIPL and has selected 175 candidates, out of which the
biggest recruiter were New Delhi, Gurgaon, Noida, Faridabad, Lucknow Based Companies, SIPL
has established itself as a pioneer Engineers Training Company, SIPL also provides Student and
Professional Membership, R&D, Tech-Fests and many other technical activities. SIPL has already
conducted On Campus Training Programs at many Colleges.
These training programs have been started to fulfill the requirements of various SIPL collaborative
companies.
LUCKNOW OFFICE:
nd
Address: 4/285 2 Floor, Vivek Khand, (Opp. Petrol Pump)
Gomti Nagar, Lucknow (U.P.)-226010
Phone No: +91-522-4067636
Fax No: -0522-4067636
MEERUT OFFICE:
19
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Website: http://www.BriskTechno.com
20
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
CHAPTER-2
21
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
• Personal discussion.
Annual Project reports
Published sources.
• Simple statistical
analyses.
There are mainly two types of data sources they are as follows:
PRIMARY DATA:
The data are originally collected by an investigator or agency for the first time for a statistical
investigation and used by them in the statistical investigation and used by them in the statistical
analysis and termed as primary data this data are collected directly from the source for first time.
SECONDARY DATA:
22
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
The data published or unpublished which have already been collected and processed by some
agency or person and take over from there and used by any other agency for their statistical work
and termed as secondary data as for as second agency is concerned. The second agency if and
when it possible and files one who late uses this data.
Both primary and secondary data have collected for the study purpose primary interviewing
certain executive who were and work experience in the nature in order to gain as such as
information as possible.
Most of the data collected is secondary in nature and include:
Annual project report of the company.
Other books and accounts maintained by the company.
Internet
Text books relating to financial management, management accounting
PROCEDURE ADOPTED:
Statistical Tool: Sample percentage
Sample Variety: Respondents will select from the Software Risk management category.
So the Sample Size is limited to 100 due to availability and the schedule of the employees.
23
A STUDY ON RISK MANAGEMENT IN BRISK
TECHNOLOGIES AT BANGALORE
Sampling Procedure: The sampling method will use as a Random Sampling. The
sampling unit mostly from Executives and non-executives. The sample size is fixed to 40
respondents; the sampling procedure is response from the respondents.
Statistical Tool: In this research various percentages were identified in the analysis and
these were presented pictorially by the pie charts in order to have a better quality.
Questionnaire Design: A structured questionnaire was designed consisting of close-ended
questions and were distributed to the respondents personally to get their responses.
24
CHAPTER-3
Analysis:
The above table clearly indicates 92% respondents are male and 8% female, out of 100%
respondents.
Graph 4.1:
Respondents percentage
100%
total
75
8%
Female
6
92%
Male
69
Interpretation
According to the survey, the above table indicates that 69(92%) of respondents are Male, 6(8%)
are Female and major software product risk finder in male only.
Analysis:
From the above table indicates that 66% of the respondents are aged among 20 to 30,
respondents are aged between 30 to 40 for 18%, between 40 to 50 for10 percent, between 50 to
60 for 6%.
Respondant Age
Total
100%
50-60
6%
40-50
10%
Respondents
30-40 Percentages
18%
20-30
66%
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the above table indicates that 30(66%) of respondents are age 20-30,
19(26%) are 30-40 age, 14(18%) are 30-4- age, 6(10%) are 40.50 age and 6(6%) are 50-60 age
major peoples responders software products 18-20 age groups.
Analysis:
From the above table indicates that 66% of the respondents are software developer facing
more risk during development,18% project manager facing risk, Systems Analyst 10% facing
software risk and 6% software tester facing risk.
Software Tester
Systems Analyst
Project Manager
Software Developer
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage facing risk software developer above mention the
table and graph.
Table4.4: What percentage of software projects is completed on time, within budget and
with all the required functionality?
Analysis:
From the above table indicates that 80% of the respondents are saying yes, 20% saying
no, But Major concern about every project completed on time more.
Graph 4.4: What percentage of software projects is completed on time, within budget and
with all the required functionality
No
Yes
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying project completed on time 80% and
remaining saying no.
Table4.5: What percentage of software projects fail to meet any or all of the following three
requirements, i.e. completed on time, within budget, and with all the required
functionality?
Analysis:
From the above table indicates that 75% of the respondents are saying completed on time
every software products, 20% saying within budget, and all required functionality in 5%, But
Major concern about every project completed on time more.
Graph 4.5: What percentage of software projects fail to meet any or all of the following
three requirements, i.e. completed on time, within budget, and with all the required
functionality?
completed on time, within budget, and with all
the required functionality?
Total 100
%
5%
All required functionality Respondents
Within Budget 20%
Percentages
75%
Completed on time
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying project completed on time 75% and
remaining saying below 75%.
Analysis:
From the above table indicates that 75% of the respondents are saying time very less,
20% saying insufficient resource, and Lake of knowledge in 5%, But Major concern about every
project facing risk for time very less reason.
Graph 4.6: While developing software product, what major risk facing
While developing software product,
what major risk facing
Total
Lake of knowledge
Insufficient Resource
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying project development time very less 75%,
insufficient resource for 20% and lake of knowledge 5%.
Table4.7: What percentage of software projects is terminated before completion?
yes 60 90%
no 15 10%
Total 75 100%
Analysis:
From the above table indicates that 90% of the respondents are saying software project is
terminated before completion and 10% saying software project terminated before completion.
Total
no
yes
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying project development terminated before
completion 90% and Saying no only 10%.
Table4.8: What impact does risk management have on the success of software projects in
terms of completing the project on time, within budget and within scope?
Not sure 5 5%
Total 75 100%
Analysis:
From the above table indicates that 75% of the respondents are saying Risk management increases
the probability of success, 20% saying Risk management has no impact on project success and 5% not
sure.
.
Graph 4.8: What impact does risk management have on the success of software projects in
terms of completing the project on time, within budget and within scope?
20 Respondents
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying Risk management increases the probability
of success 75%.
Table4.9: .Do formal risk management procedures typically yield better results (with
regard to completing a project on time within scope and within budget) than ad hoc
internally developed procedures?
Total 75 100%
Analysis:
From the above table indicates that 75% of the respondents are saying Formal methods produce
better results than internal methods, 20% saying Formal methods do not necessarily produce
better results than internal methods and 5% Not sure - I am not in the position to accurately
compare the two methods.
Graph 4.9: .Do formal risk management procedures typically yield better results (with
regard to completing a project on time within scope and within budget) than ad hoc
internally developed procedures?
100
% 75
n the position to accurately compare the two methods 5%
5
not necessarily produce better results than internal methods 20
%
10
duce better results than internal methods 75%
60
Interpretation:
According to the survey, the major percentage saying Formal methods produce better results than
internal methods 75%.
Analysis:
From the above table indicates that 75% of the respondents are saying project storage, 20%
saying multiple sharing tools and 5% Quality of services.
Perofrmance of project
Total
Quality of Service
Project Storage
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying Project storage on cloud that why storage
improve automatically 75%.
Table4.11: What kind of risk getting from software developer?
Analysis:
From the above table indicates that 75% of the respondents are saying communication risk, 20%
saying lack of knowledge and 5% Delay of task completion.
Total
Lack of knowledge
Communication risk
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying communication risk on software developer
to interact between managers to team leader at major percentages 75%.
Table4.12: What kind of risk getting from financial stability?
From the above table indicates that 75% of the respondents are saying software cost, 20% saying
insufficient budget cost and 5% Resource payment.
Total
Resource of payment
Software cost
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying software cost on IT Company marketing
rating for corporate worlds 75%.
Table4.13: Technical risk based on software company domain?
Analysis:
From the above table indicates that 75% of the respondents are saying Not prepare knowledge
about the particular domain, 20% saying Less technical resource and 5% others.
Technical Risk
Total
Others
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying not prepares knowledge about the particular
domain for software engineer at 75%.
Table4.14: Which one face more risk project flow or software flow?
Analysis:
From the above table indicates that 75% of the respondents are saying project flow, 20% saying
software flow and 5% others.
Graph 4.13: Which one face more risk project flow or software flow?
Compare risk project flow or software
flow
Total
Others
Software Flow
Project Flow
0 10 20 30 40 50 60 70 80
Interpretation:
According to the survey, the major percentage saying project flow more risk compare to software
flow for IT Company.
FINDINGS
1. The finding for risk management software fields under data analysis interpretation
following table clearly indicates 92% respondents are male and 8% female, out of 100%
respondents.
2. From the above table indicates that 66% of the respondents are aged among 20 to 30,
respondents are aged between 30 to 40 for 18%, between 40 to 50 for10 percent, between
50 to 60 for 6%.
3. From the above table indicates that 66% of the respondents are software developer facing
more risk during development,18% project manager facing risk, Systems Analyst 10%
facing software risk and 6% software tester facing risk.
4. From the above table indicates that 80% of the respondents are saying yes, 20% saying
no, But Major concern about every project completed on time more.
5. From the above table indicates that 75% of the respondents are saying completed on time
every software products, 20% saying within budget, and all required functionality in 5%,
But Major concern about every project completed on time more.
6. From the above table indicates that 75% of the respondents are saying time very less,
20% saying insufficient resource, and Lake of knowledge in 5%, But Major concern
about every project facing risk for time very less reason.
7. From the above table indicates that 75% of the respondents are saying Risk management
increases the probability of success , 20% saying Risk management has no impact on project
success and 5% not sure.
8. According to the survey, the major percentage saying project development terminated
before completion 90% and Saying no only 10%.
9. From the above table indicates that 75% of the respondents are saying Not prepare
knowledge about the particular domain, 20% saying Less technical resource and 5% others.
10. According to the survey, the major percentage saying software cost on IT Company
marketing rating for corporate worlds 75%.
11. According to the survey, the major percentage saying not prepares knowledge about the
particular domain for software engineer at 75%.
12. From the above table indicates that 75% of the respondents are saying project flow, 20%
saying software flow and 5% others.
13. From the above table indicates that 75% of the respondents are saying project storage,
LEARNING OUTCOME:
I learned brisk technologies risk management based on software product and software
application.
Brisk technologies, how they handling project and how they managing risk factor in
on time.
Learned various technical risk management under brisk technologies pvt ltd.
Following keys:
CONCLUSIONS
The following conclusions can be made with respect to the research questions.
• The success rate (completing the project on time, within budget, and within scope) of software
projects in Brisk Techno in India is low, as it is in the rest of the world. The need to investigate
the impact of risk management on project success rates can thus be substantiated.
• The risks that face software projects are generally the same in India as in the developed world.
• Most Indian software Brisk Techno use ad hoc internally developed risk management
procedures. These procedures mostly do not conform to the IEEE standard for software project
risk management. The adequacy of these procedures is thus questionable. Having stated that, the
success rate of Indian software projects was higher where ad hoc risk management was applied,
compared with projects where no risk management was applied.
• The fact that the majority of software risk management methods that were applied to Indian
software projects were ad hoc internally developed methods, rather than recognized formal
methods, means that the effectiveness of formal risk management procedures could not be
accurately measured. The results of formal methods could thus not be compared with the results
of ad hoc methods.
No formal procedure was applied to a sufficient number of projects (within the test sample) to
measure its results properly. It was thus not possible to state that one procedure is more effective
than others.
This study investigated the application of the IEEE Standard 1540 for risk management within
software development projects in India. This standard is fairly generic, and the steps are similar
to many other risk management processes in use today. The results indicate that formal processes
are not always used by Brisk Techno. The information engineering (IE) approach was developed
to assist Brisk Techno to execute software development projects successfully, and to do this on
time and within budget. Application of a risk management process should form part of IE; and
the results of this study indicate that there is a definite need for a more formal approach to
delivering software projects in India more successfully. The IE methodology is therefore not
applied in most software projects in India, and probably contributes to the low success rate.
RECOMMENDATION
It is recommended that India software Brisk Techno implement some form of risk management
in all of their software projects, since the application of risk management has a positive impact
on project success. Given that software project risks were found to be the same in India as in the
developed world, local software Brisk Techno are very likely to encounter a number of the risks
that were identified as being especially prevalent in the developed world (such as Boehm’s top
10 software project risks). It is therefore recommended that India software Brisk Techno take the
necessary steps appropriately to mitigate these risks that are common to most software projects
for Brisk Technologies in Bangalore.
FUTURE RESEARCH
There is still a gap in research into the effectiveness of formal software risk management
procedures in India. The fact that risks are the same in India as in the developed world suggests
that mitigation strategies that have proven to be successful in the developed world will also be
successful in India. This statement, however, cannot be empirically proven at this point. So there
is still a need to find Brisk Techno that implement formal software risk management procedures,
and to measure the effectiveness of these procedures.
REFERENCES
[4] Misra, S.C., Kumar, V. & Kumar, U. 2006. Different techniques for risk management in
software engineering: A review. Eric Sprott School of Business, Carleton University, ASAC,
Banff, Alberta.
[5] Boehm, B.W. 1991. Software risk management: Principles and practices, IEEE Software 8
(1), pp. 32-41.
[6] Esteves, J., Pastor, J., Rodriguez, N. & Roy, R. 2004. Implementing and improving the SEI
risk management method in a university software project. IEEE Latin American Transactions, 3,
(1), pp. 90-97.
[7] Kontio, J. 1997. The Riskit method for software risk management, version 1.00, UMIACS-
TR-97- 38, Institute for Advanced Computer Studies and Department of Computer Science
Technical Report, University of Maryland.
[8] Kontio J. 2001. Software engineering risk management: A method, improvement framework
and empirical evaluation. Doctoral dissertation, Helsinki University of Technology, Center of
Excellence, ISBN 952-5136-22-1.
[9] Keshlaf, A.A. & Hashim, K. 2000. A model and prototype tool to manage software risks,
IEEE Quality Software, 1,(1), pp. 297-305.