Skip to main content

Competitive Risk Identification Method for Distributed Teams

  • Conference paper
Software Engineering Approaches for Offshore and Outsourced Development (SEAFOOD 2009)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 35))

  • 490 Accesses

Abstract

The described method is a risk identification scenario for software development projects, where the project team is multi-lingual and distributed, time for the risk identification meeting is limited, meetings are recurrent and an amount of risks required is bigger than a hundred. The meeting is conducted as an online chat game, where participants compete for each risk source, inventing the most severe risk. The winner gets a bonus, while the meeting facilitator gets a big list of raw risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Project Management Institute, Project Management Body of Knowledge (PMBOK) Guide v.3., 3rd edn. PMI Press (2004)

    Google Scholar 

  2. Mulcahy, R.: Risk Management, Tricks of the Trade for Project Managers. RMC Publications, Inc., USA (2003)

    Google Scholar 

  3. Osborn, A.F.: Applied imagination: Principles and procedures of creative problem solving, 3rd revised edn. Charles Scribner’s Sons, New York (1963)

    Google Scholar 

  4. National Cyber Security Division of the U.S. Department of Homeland Security, Common vulnerabilities and exposures, Technical report, The MITRE Corporation, USA (2008)

    Google Scholar 

  5. Carr, M.J., Kondra, S.L., Monarch, I., Ulrich, F.C., Walker, C.F.: Taxonomy-based risk identification, Technical Report CMU/SEI-93-TR-006, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA (1993)

    Google Scholar 

  6. Mitchell, J.E.R., Deborah, J., Pennington, N.: Back to the future: Temporal perspective in the explanation of events. Journal of Behavioral Decision Making 2, 25–39 (1989)

    Article  Google Scholar 

  7. Britz, G.C., Emerling, D.W., Hare, L.B., Hoerl, R.W., Janis, S.J., Shade, J.E.: Improving Performance Through Statistical Thinking. American Society for Quality, USA (2000)

    Google Scholar 

  8. Linstone, H.A., Turoff, M.: The Delphi Method: Techniques and Applications. New Jersey’s Science & Technology University, NJ, USA (1975)

    MATH  Google Scholar 

  9. Schmidt, R., Lyytinen, K., Keil, M., Cule, P.: Identifying software project risks: An international delphi study. Journal of Management of Information Systems 17(4), 5–36 (2001)

    Google Scholar 

  10. Delbecq, A.L., VandeVen, A.H.: A group process model for problem identification and program planning. Journal Of Applied Behavioral Science VII, 466–491 (July/August 1971)

    Google Scholar 

  11. Delbecq, A.L., VandeVen, A.H., Gustafson, D.H.: Group Techniques for Program Planners. Scott Foresman and Company, Glenview, Illinois (1975)

    Google Scholar 

  12. Freimut, B., Hartkopf, S., Kaiser, P., Kontio, J., Kobitzsch, W.: An industrial case study of implementing software risk management. In: ESEC/FSE-9: Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, New York, NY, USA, pp. 277–287 (2001)

    Google Scholar 

  13. Keil, M., Cule, P.E., Lyytinen, K., Schmidt, R.C.: A framework for identifying software project risks. Communications of the ACM 41(11), 76–83 (1998)

    Article  Google Scholar 

  14. Wallace, L., Keil, M.: Software project risks and their effect on outcomes. Communications of the ACM 47(4), 68–73 (2004)

    Article  Google Scholar 

  15. Fairley, R.E.: Software risk management. IEEE Software 22(3), 101 (2005)

    Article  Google Scholar 

  16. Charette, R.N.: Software engineering risk analysis and management. McGraw-Hill, Inc., New York (1989)

    Google Scholar 

  17. Myers, G.J.: The Art of Software Testing, 2nd edn. John Wiley & Sons, Inc., NJ (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bugayenko, Y. (2009). Competitive Risk Identification Method for Distributed Teams. In: Gotel, O., Joseph, M., Meyer, B. (eds) Software Engineering Approaches for Offshore and Outsourced Development. SEAFOOD 2009. Lecture Notes in Business Information Processing, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02987-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02987-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02986-8

  • Online ISBN: 978-3-642-02987-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics