Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

March 2015, Volume 2, 1, pp 22-38

Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management

Abdelrafe Elzamly


Burairah Hussin

Abdelrafe Elzamly 1

Burairah Hussin 2

  1. Information and Communication Technology, University Technical Malaysia Malaka (UTeM); Department of Computer Science, Faculty of Applied Sciences, Al-Aqsa University, Gaza, Palestine 1

  2. Information and Communication Technology, University Technical Malaysia Malaka (UTeM), Malaysia 2

Pages: 22-38

DOI: 10.18488/journal.76/2015.2.1/

Share :


Regardless how much effort we put for the success of software projects, many software projects have a very high failure risk rate. The failure risk is not always avoidable, but it could be controllable by using risk management technique through the software development Lifecycle.  The aim of this study is to present the factor analysis techniques to classify and identify the risk management techniques in the software development project. The best thirty risk management techniques were presented to respondents and all risk management techniques are used most of the time, and often. We have chosen three components: Planning and requirement techniques, communication techniques, models and tools for thirty risk management techniques. The study has been conducted on a group of software project managers in software development companies. We will intend to apply these study results on a real-world software project to verify the effectiveness of the risk management techniques on a software project for mitigating risks. Successful identifying of risk management techniques will greatly improve the probability of mitigating software risk.
Contribution/ Originality
This study is to present the factor analysis technique to classify and identify the risk management techniques (controls) in the software development project for mitigating risks.




  1. J. Miler and J. Górski, "Supporting team risk management in software procurement and development projects," presented at the 4th National Conference on Software Engineering, 2002.
  2. J. Sodhi and P. Sodhi, "It project management handbook: Management concepts (USA), ISBN:1-56726-098," p. 264, 2001.
  3. A. Elzamly, "Evaluation of quantitative and mining techniques for reducing software maintenance risks," Appl. Math. Sci., vol. 8, pp. 5533–5542, 2014.
  4. K. Khanfar, A. Elzamly, W. Al-Ahmad, E. El-Qawasmeh, K. Alsamara, and S. Abuleil, "Managing software project risks with the chi-square technique," Int. Manag. Rev., vol. 4, pp. 18–29, 2008.
  5. A. Elzamly and B. Hussin, "Managing software project risks with proposed regression model techniques and effect size technique," Int. Rev. Comput. Softw., vol. 6, pp. 250–263, 2011.
  6. A. Elzamly and B. Hussin, "Estimating quality-affecting risks in software projects," Int. Manag. Rev. Am. Sch. Press, vol. 7, pp. 66–83, 2011.
  7. A. Elzamly and B. Hussin, "Managing software project risks (Implementation Phase) with proposed stepwise regression analysis techniques," Int. J. Inf. Technol., vol. 1, pp. 300–312, 2013.
  8. A. Elzamly and B. Hussin, "Managing software project risks (Design Phase) with proposed fuzzy regression analysis techniques with fuzzy concepts," Int. Rev. Comput. Softw., vol. 8, pp. 2601–2613, 2013.
  9. A. Elzamly and B. Hussin, "Managing software project risks (Planning Phase) with proposed fuzzy regression analysis techniques with fuzzy concepts," Int. J. Inf. Comput. Sci., vol. 3, pp. 31–40, 2014.
  10. A. Elzamly and B. Hussin, "Identifying and managing software project risks with proposed fuzzy regression analysis techniques: Maintenance phase," presented at the 2014 Conference on Management and Engineering (CME2014), 2014.
  11. A. Elzamly and B. Hussin, "Managing software project risks (Analysis Phase) with proposed fuzzy regression analysis modelling techniques with fuzzy concepts," J. Comput. Inf. Technol., vol. 22, pp. 131–144, 2014.
  12. A. Elzamly and B. Hussin, "Modelling and mitigating software implementation project risks with proposed mining technique," Inf. Eng., vol. 3, pp. 39–48, 2014.
  13. A. Elzamly and B. Hussin, "Mitigating software maintenance project risks with stepwise regression analysis techniques," J. Mod. Math. Front, vol. 3, pp. 34–44, 2014.
  14. A. Elzamly and B. Hussin, "A comparison of stepwise and fuzzy multiple regression analysis techniques for managing software project risks?: Analysis phase," J. Comput. Sci., vol. 10, pp. 1725–1742, 2014.
  15. A. Elzamly and B. Hussin, "Acomparison of fuzzy and stepwise multiple regression analysis techniques for managing software project risks: Implementation phase," Int. Manag. Rev., vol. 10, pp. 43–54, 2014.
  16. R. Dash and R. Dash, "Risk assessment techniques for software development," Eur. J. Sci. Res., vol. 42, pp. 629–636, 2010.
  17. F. Reyes, N. Cerpa, A. Candia, and M. Bardeen, "The optimization of success probability for software projects using genetic algorithms," J. Syst. Softw., vol. 84, pp. 775–785, 2011.
  18. A. Elzamly and B. Hussin, "An enhancement of framework software risk management methodology for successful software development," J. Theor. Appl. Inf. Technol., vol. 62, pp. 410–423, 2014.
  19. S. McConnell, Rapid development: Taming wild software schedules: Microsoft Press, 1996.
  20. R. Fairley, Managing and leading software projects: Wiley-IEEE Computer Society Press, ISBN: 978-0-470-29455-0, 2009.
  21. J. Ferraro, Project management techniques for non-project managers: AMACOM, ISBN: 0814417361, 2012.
  22. T. Addison and S. Vallabh, "Controlling software project risks – an empirical study of methods used by experienced project managers," in Proceedings of SAICSIT, 2002, pp. 128 – 140.
  23. K. Na, J. Simpson, X. Li, T. Singh, and K. Kim, "Software development risk and project performance measurement: Evidence in Korea," J. Syst. Softw., vol. 80, pp. 596–605, 2007.
  24. J. Ropponen and K. Lyytinen, "Components of software development risk: How to address them? A project manager survey," IEEE Trans. Softw. Eng., vol. 26, pp. 98–112, 2000.
  25. K. R. Linberg, "Software developer perceptions about software project failure: A case study," J. Syst. Softw., vol. 49, pp. 177–192, 1999.
  26. A. Puntambekar, Software engineering: Technical Publications, ISBN: 8184316054, 2009.
  27. P. Savolainen, J. Ahonen, and I. Richardson, "Software development project success and failure from the supplier’s perspective: A systematic literature review," Int. J. Proj. Manag., vol. 30, pp. 458–469, 2012.
  28. B. Boehm, B. Clark, E. Horowitz, C. Westland, R. Madachy, and R. Selby, "Cost models for future software life cycle processes: COCOMO 2.0," Ann. Softw. Eng., vol. 1, pp. 57–94, 1995.
  29. D. Surie, "Evaluation and integration of risk management in CMMI and ISO / IEC 15504," presented at the 8th Student Conference in Computing Science, Umeå, Sweden, 2004.
  30. D. Dufner, O. Kwon, and A. Doty, "Improving software development project team performance: A web-based expert support system for project control," in Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences (HICSS-32), 1999, pp. 1-10.
  31. V. Anantatmula, "Project planning techniques for academic advising and learning," Int. J. Scholarsh. Teach. Learn, vol. 6, pp. 1-19, 2010.
  32. F. Sarfraz, "Managing for a successful project closure," presented at the PICMET ’09 - 2009 Portland International Conference on Management of Engineering & Technology, 2009.
  33. S. Grabski, S. Leech, and B. Lu, "Risks and controls in the implementation of ERP systems," Int. J. Digit. Account. Res., vol. 1, pp. 47–68, 2001.
  34. G. Schulmeyer, "Handbook of software quality assurance," presented at the Fourth. ARTECH HOUSE, INC, 2008.
  35. J. Jianga, G. Kleinb, H. G. Chenc, and L. Lind, "Reducing user-related risks during and prior to system development," Int. J. Proj. Manag., vol. 20, pp. 507–515, 2002.
  36. C. Jones, Applied software measurement global analysis of productivity and quality, 3rd ed.: McGraw-Hill Companies, ISBN: 0071502440, 2008.
  37. J. Kasurinen, O. Taipale, and K. Smolander, "Test case selection and prioritization: Risk-based or," in Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement ESEM ’10, 2010, pp. 1–10.
  38. O. Miotto, T. Tan, and V. Brusic, "Supporting the curation of biological databases with reusable text mining," Genome Informatics, vol. 16, pp. 32–44, 2005.
  39. P. Kanjanasanpetch and B. Lgel, "Managing knowledge in enterprise resource planning (ERP) implementation," presented at the Managing Technologically Driven Organizations: The Human Side of Innovation and Change, Engineering Management Conference, IEMC ’03, 2003.
  40. R. M. Shand, "User manuals as project management tools: Part II-aractical applications," IEEE Trans. Prof. Commun., vol. 3, pp. 123–142, 1994.
  41. R. Green, "Documentation meets version control: An automated backup system for HTML-based help," in Professional Communication Conference, Proceedings of 2000 Joint IEEE International and 18th Annual Conference on Computer Documentation (IPCC/SIGDOC 2000), 2000, pp. 541–548.
  42. K. Kouskouras and A. Georgiou, "A discrete event simulation model in the case of managing a software project," Eur. J. Oper. Res., vol. 181, pp. 374–389, 2007.
  43. G. Jiang and Y. Chen, "Coordinate metrics and process model to manage software project risk," presented at the IEEE International Engineering Management Conference, 2004.
  44. D. Liu, Q. Wang, and J. Xiao, "The role of software process simulation modeling in software risk management: A systematic review," presented at the Third International Symposium on Empirical Software Engineering and Measurement, 2009.
  45. S. Alhawari, F. Thabtah, L. Karadsheh, and W. Hadi, "A risk management model for project execution," presented at the The 9th IIBIMA Conference on Information Management in Modern Organizations, 2008.
  46. R. Schmidt, K. Lyytinen, M. Keil, and P. Cule, "Identifying software project risks: An international delphi study," J. Manag. Inf. Syst., vol. 17, pp. 5–36, 2001.
  47. A. Azari, N. Mousavi, and S. Mousavi, "Risk assessment model selection in construction industry," Expert Syst. Appl., vol. 38, pp. 9105–9111, 2011.
  48. T. Dyba and T. Dingsoyr, "Empirical studies of agile software development: A systematic review," Inf. Softw. Technol., vol. 50, pp. 833–859, 2008.
  49. P. Webern, G. Medina-Oliva, C. Simon, and B. Iung, "Overview on bayesian networks applications for dependability, risk analysis and maintenance areas," Eng. Appl. Artif. Intell., vol. 42, pp. 115–125, 2010.
  50. S. Lee, "Probabilistic risk assessment for security requirements: A preliminary study," presented at the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011.
  51. J. Aagedal, F. Braber, T. Dimitrakos, B. Gran, D. Raptis, and K. Stølen, "Model-based risk assessment to improve enterprise security," in Proceedings of The Sixth International Enterprise Distributed Object Computing Conference (EDOC’02), 2002, p. 12.
  52. C. Strawbridge, "Project management in large collaborations: SNS lessons learned for ITER," presented at the Twenty-First IEEE/NPS Symposium on Fusion Engineering, 2005.
  53. K. Persohn and D. Brylow, "Interactive real-time embedded systems education infused with applied internet telephony," presented at the 35th IEEE Annual Computer Software and Applications Conference, 2011.
  54. R. Bavani, "Global software engineering: Challenges in customer value creation," presented at the 2010 International Conference on Global Software Engineering, 2010.
  55. M. Keil, L. Li, L. Mathiassen, and G. Zheng, "The influence of checklists and roles on software practitioner risk perception and decision-making," J. Syst. Softw., vol. 81, pp. 908–919, 2008.
  56. J. Greenyer, A. Sharifloo, M. Cordy, and P. Heymans, "Efficient consistency checking of scenario-based product-line specifications," presented at the 20th IEEE International Requirements Engineering Conference (RE), 2012.
  57. M. Oda, "The characteristics of the use of twitter by beginners: Study of the applicability to the e-healthcare," presented at the International Conference on Systems, Man, and Cybernetics (SMC), IEEE, 2010.
  58. D. M. Brandon, Project management for modern information systems: IRM Press, Idea Group Inc., PSBN:1-59140-693-5, 2006.
  59. A. Peppen and M. Ploeg, "Practicing what we teach: Quality management of systems-engineering education," IEEE Trans. Syst. Man, Cybern. C Appl. Rev., vol. 30, pp. 189–196, 2000.
  60. J. Chen and S. Huang, "An empirical analysis of the impact of software development problem factors on software maintainability," J. Syst. Softw., vol. 82, pp. 981–992, 2009.
  61. Z. Begum, M. Khan, M. Hafiz, M. S. Islam, and M. Shoyaib, "Software development standard and software engineering practice: A case study of Bangladesh," J. Bangladesh Acad. Sci., vol. 32, pp. 131–139, 2008.
  62. M. Li, S. Yu, N. Cao, and W. Lou, "Privacy-preserving distributed profile matching in proximity-based mobile social networks," IEEE Trans. Wirel. Commun., vol. 12, pp. 2024– 2033, 2013.
  63. V. Cahill, A. Fox, T. Kindberg, and B. Noble, "Building and evaluating ubiquitous system software," Pervasive Comput. IEEE CS IEEE Com Soc., vol. 3, pp. 20–21, 2004.
  64. J. Jin and B. Li, "Cooperative multicast scheduling with random network coding in WiMAX," presented at the 2009 17th International Workshop on Quality of Service, 2009.


Google Scholor ideas Microsoft Academic Search bing Google Scholor


Competing Interests:


Related Article

( 1 ) Web Pages Categorization Based on Classification & Outlier Analysis through FSVM
( 2 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 3 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 4 ) Classification Ensemble Based Anomaly Detection in Network Traffic
( 6 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 10 ) Development Problems of Information Provision on the Management of High Technology Park
( 11 ) A Survey on Efficient Power Management Using Smart Socket and IoT
( 12 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 14 ) An Overview of Advances in Image Colorization Using Computer Vision and Deep Learning Techniques
( 15 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 16 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 17 ) Feasibility of Chatbot for Mehran UET Examination Department
( 18 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 19 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 20 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 21 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 23 ) Information about Simulation Software for Testing of Wireless Network
( 24 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 25 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 26 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 27 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 28 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 29 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 30 ) Generalized Quantum Key Distribution for WDM Router Applications
( 31 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 32 ) Web Service Composition for E-Commerce Web Application
( 33 ) Role of Library and Information Science Professionals in the Knowledge Society
( 34 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 35 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 36 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 37 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 38 ) Perturbation Functions for Compact Database
( 39 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 40 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 41 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 43 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 44 ) A Security Scheme for Protecting Agent Societies
( 45 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 46 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 48 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 49 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 50 ) Development of Web Application for University of Uyo Post UTME Examination Timetable
( 51 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment
( 52 ) A Structural Framework for Distributed Electronic Voters Register
( 53 ) A Review of Machine Learning Models for Software Cost Estimation
( 54 ) Speed Control of Induction Motor on C2000 DSP Platform
( 55 ) Application of Ant Algorithm for Software Optimization
( 56 ) Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
( 57 ) Smart Feature Fusion and Model for Human Detection
( 58 ) LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel
( 59 ) Study and Comparative Analysis of Programming Languages Used for Big Data
( 60 ) Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio
( 61 ) Big Data Frameworks for Sites and Products Recommendation
( 62 ) Developing a Software Application for the Study and Learning of Linear a Script
( 63 ) Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection
( 68 ) On Homogeneous Cubic Equation with Fourunknowns x3+y3= 2lzw2
( 71 ) Security Issues with Contactless Bank Cards
( 73 ) Design and Analysis of Compact Microstrip Circular Resonator with Slotted in Ground Plane as a Grain Moisture Sensor