{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:07:36Z","timestamp":1762340856129,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":42,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226512"},{"type":"electronic","value":"9788132226536"}],"license":[{"start":{"date-parts":[[2015,11,19]],"date-time":"2015-11-19T00:00:00Z","timestamp":1447891200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2653-6_9","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T15:47:51Z","timestamp":1447861671000},"page":"121-138","source":"Crossref","is-referenced-by-count":11,"title":["A Study on Software Risk Management Strategies and Mapping with SDLC"],"prefix":"10.1007","author":[{"given":"Bibhash","family":"Roy","sequence":"first","affiliation":[]},{"given":"Ranjan","family":"Dasgupta","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"issue":"1","key":"9_CR1","first-page":"59","volume":"4","author":"R Stern","year":"2011","unstructured":"Stern, R., Arias, J.C.: Review of risk management methods. Bus. Intell. J. 4(1), 59\u201378 (2011)","journal-title":"Bus. Intell. J."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Silva, P.S., Trigo, A., Varaj\u00e3o, J.: Collaborative risk management in software projects. In: Proceedings of the 8th International Conference on the Quality of Information and Communications Technology, pp. 157\u2013160 (2012)","DOI":"10.1109\/QUATIC.2012.24"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Guiling, L., Xiaojuan, Z.: Research on the risk management of IT project. In: Proceedings of International conference on E-Business and E -Government (ICEE), pp. 1\u20134, 6\u20138 May 2011","DOI":"10.1109\/ICEBEG.2011.5882002"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Tianyin, P.: Development of software project risk management model review. In: Proceedings of International Conference on AI, Management Science and Electronic Commerce, pp. 2979\u20132982 (2011)","DOI":"10.1109\/AIMSEC.2011.6011139"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Avdoshin, S.M., Pesotskaya, E.Y.: Software risk management. In: Proceedings of 7th Central and Eastern European Software Engineering Conference, Russia, pp. 1\u20136 (2011)","DOI":"10.1109\/CEE-SECR.2011.6188471"},{"key":"9_CR6","unstructured":"Westfall, L.: Software risk management. In: International Conference on Software Quality, San Diego, California, 8\u201310, February, 2011"},{"key":"9_CR7","unstructured":"Mofleh, H.M., Zahary, A.: A framework for software product risk management based on quality attributes and operational life cycle (SPRMQ). http:\/\/www.nauss.edu.sa\/En\/DigitalLibrary\/Researches\/Documents\/2011\/articles_2011_3102.pdf"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.4236\/jsea.2011.45032","volume":"4","author":"L Sarigiannidis","year":"2011","unstructured":"Sarigiannidis, L., Chatzoglou, P.D.: Software development project risk management: a new conceptual framework. J. Softw. Eng. Appl. (JSEA) 4, 293\u2013305 (2011)","journal-title":"J. Softw. Eng. Appl. (JSEA)"},{"issue":"15","key":"9_CR9","first-page":"53","volume":"10","author":"N Sathish Kumar","year":"2010","unstructured":"Sathish Kumar, N., Vinay Sagar, A., Sudheer, Y.: Software risk management\u2014an integrated approach. Global J. Comput. Sci. Technol. (GJCST) 10(15), 53\u201357 (2010)","journal-title":"Global J. Comput. Sci. Technol. (GJCST)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/52.62930","volume":"8","author":"BW Bohem","year":"1991","unstructured":"Bohem, B.W.: Software risk management: principles and practices. IEEE Softw. 8, 32\u201341 (1991)","journal-title":"IEEE Softw."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Carr, M.: Taxonomy-based risk identification. Software Engineering Institute, CMU\/SEI-93-TR-6 (1993)","DOI":"10.21236\/ADA266992"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/TSMC.2013.2256126","volume":"44","author":"I Loutchkina","year":"2014","unstructured":"Loutchkina, I., Jain, L.C., Nguyen, T., Nesterov, S.: Systems\u2019 integration technical risks\u2019 assessment model (SITRAM). IEEE Trans. Syst. Man Cybern. Syst. 44(3), 342\u2013352 (2014)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Higuera, R.P., Gluch, D.P., Murphy, R.L.: An introduction to team risk management. Special report CMU\/SEI, SEI\/CMU, Pittsburg, May 1994","DOI":"10.21236\/ADA285070"},{"issue":"1","key":"9_CR14","first-page":"26","volume":"91","author":"BJ Alge","year":"2003","unstructured":"Alge, B.J., Witheoff, C., Klein, H.J.: When does the medium matter? Knowledge building experiences and opportunities in decision making teams. Organ 91(1), 26\u201327 (2003)","journal-title":"Organ"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Mead, N.R.: Measuring the software security requirements engineering process. In: Proceedings of 36th International Conference on Computer Software and Application Workshops, pp. 583\u2013588 (2012)","DOI":"10.1109\/COMPSACW.2012.107"},{"key":"9_CR16","unstructured":"Kontio, J., Basili, V.R.: Empirical evaluation of a risk management method. In: SEI Conference on Risk Management, Atlantic City (1997)"},{"issue":"4","key":"9_CR17","first-page":"373","volume":"1","author":"D Greer","year":"1997","unstructured":"Greer, D.: SERUM: software engineering risk: understanding and management. J. Proj. Bus. Risk Manag. 1(4), 373\u2013388 (1997)","journal-title":"J. Proj. Bus. Risk Manag."},{"key":"9_CR18","unstructured":"Hillson, D.A.: Towards risk maturity model. Int. J. Proj. Bus. Risk Manag. 1(1), 35\u201345 (1997). ISSN:1366-2163 (Spring)"},{"key":"9_CR19","unstructured":"Foo, S.-W., Muruganatham, A., Software risk assessment model. ICMIT 2000, IEEE, pp. 536\u2013544"},{"key":"9_CR20","unstructured":"Keshlaf, A.A., Hashim, K.: A model and prototype tool to manage software risks. In: Proceedings of the 1st Asia-Pacific Conference on Quality Software (APAQS\u201900), Washington, DC, USA (2000)"},{"key":"9_CR21","unstructured":"Armestrong, R., Adens, G.: Managing Software Project Risks. TASSC Technical paper, USA (2008). www.tassc-solutions.com . January 2008 Copyright 2001\u20132010, Tassc Limited"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Gupta, D., Sadiq, M.: Software risk assessment and estimation model. In: International Conference on Computer Science and International Technology, pp. 963\u2013967. IEEE Computer Society, Singapore (2008)","DOI":"10.1109\/ICCSIT.2008.184"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Rabbi, M., Mannan, K.: A review of software risk management for selection of best tools and techniques. In: Proceedings of 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, pp. 773\u2013778 (2008)","DOI":"10.1109\/SNPD.2008.127"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Sadiq, M., Rahmani, M.K.I., Ahmad, M.W., Jung, S.: Software risk assessment and evaluation process (SRAEP) using model based approach. In: International Conference on Networking and Information Technology (ICNIT), pp. 171\u2212177 (2010)","DOI":"10.1109\/ICNIT.2010.5508535"},{"key":"9_CR25","unstructured":"Hoodat, H., Rashidi, H.: Classification and analysis of risks in software engineering. In: WASET-2009, pp. 446\u2013452"},{"key":"9_CR26","first-page":"1","volume":"13","author":"L Danny","year":"2013","unstructured":"Danny, L.: Reducing operational risk by improving production software quality. Softw. Risk Reduction Rev. 13, 1\u201315 (2013)","journal-title":"Softw. Risk Reduction Rev."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Suebkuna, B., Ramingwong, S.: Towards a complete project oriented risk management model: a refinement of PRORISK. In: Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 349\u2013354, 11\u201313 May 2011","DOI":"10.1109\/JCSSE.2011.5930146"},{"issue":"8","key":"9_CR28","first-page":"2072","volume":"6","author":"B Shahzad","year":"2011","unstructured":"Shahzad, B., Al-Ohali, Y., Abdullah, A.: Trivial model for mitigation of risks in software development life cycle. Int. J. Phys. Sci. 6(8), 2072\u20132082 (2011)","journal-title":"Int. J. Phys. Sci."},{"key":"9_CR29","unstructured":"Roy, G.G.: A risk management framework for software engineering practice. In: Proceedings of the Australian Software Engineering Conference (AAWEC\u201904) (2014)"},{"issue":"3","key":"9_CR30","first-page":"358","volume":"3","author":"S Amber","year":"2012","unstructured":"Amber, S., Shawoo, N., Begum, S.: Determination of risk during requirement engineering process. Int. J. Emerg. Trends Comput. Inform. Sci. 3(3), 358\u2013364 (2012)","journal-title":"Int. J. Emerg. Trends Comput. Inform. Sci."},{"issue":"5","key":"9_CR31","first-page":"11","volume":"17","author":"D Pandey","year":"2011","unstructured":"Pandey, D., Suman, U., Ramani, A.K.: Security requirement engineering issues in risk management. Int. J. Comput. Appl. 17(5), 11\u201314 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Islam, S., Houmb, S.H.: Integrating risk management activities into requirements engineering. RCIS-2010, Nice, France, May 2010, pp. 299\u2013310","DOI":"10.1109\/RCIS.2010.5507389"},{"key":"9_CR33","unstructured":"Drs. Erik, P.W.M.: Practical risk-based testing\u2014product risk management: the PRISMA method, EuroSTAR-2011, Manchester, UK, pp. 1\u201324, 21\u201324 November 2011"},{"issue":"5","key":"9_CR34","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TSE.2010.108","volume":"37","author":"TW Kwan","year":"2011","unstructured":"Kwan, T.W., Leung, H.K.N.: A risk management methodology for project risk dependencies. IEEE Trans. Softw. Eng. 37(5), 635\u2013648 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Lobato, L.L., Neto, S., da Mota, P.A., do Carmo Machado, I.: A study on risk management for software engineering. In: Proceedings of the EASE, pp. 47\u201351 (2012)","DOI":"10.1049\/ic.2012.0006"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Lobato, L.L., da Mota, P.A., Neto, S., do Carmo Machado, I., de Almeida, E.S., de Lemos Meira, S.R.: Evidence from risk management in software product lines development: a cross-case analysis. In: Proceedings of 6th Brazilian Symposium on Software Components, Architectures and Reuse (2012)","DOI":"10.1109\/SBCARS.2012.24"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Nolan, A.J., Abrah\u00e3o, S., Clements, P.C., Pickard, A.: Requirements uncertainty in a software product line. In: Proceedings of 15th International Software Product Line Conference, pp. 223\u2013231 (2011)","DOI":"10.1109\/SPLC.2011.13"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Lobato, L.L. et al.: Risk management in software product lines: an industrial case study. In: Proceedings of ICSSP, Switzerland, pp. 180\u2013189 (2012)","DOI":"10.1109\/ICSSP.2012.6225963"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Gonzalo, E., Gallardo, E.: Using configuration management and product line software paradigms to support the experimentation process in software engineering. RCIS-2012, Valencia, May 2012. pp.\u00a01\u20136","DOI":"10.1109\/RCIS.2012.6240454"},{"key":"9_CR40","first-page":"1","volume":"12","author":"YB Khoo","year":"2008","unstructured":"Khoo, Y.B., Zhou, M., Kayis, B., Savci, S., Ahmed, A., Kusumo, R.: An agent-based risk management tool for concurrent engineering projects. Complex. Int. 12, 1\u201311 (2008)","journal-title":"Complex. Int."},{"key":"9_CR41","unstructured":"Sharif, A.M., Rozan, M.Z.A.: Design and implementation of project time management risk assessment tool for SME projects using oracle application express. In: World Academy of Science, Engineering, and Technology (WASET), vol. 65, pp. 1221\u20131226 (2010)"},{"key":"9_CR42","unstructured":"Snekir, W.G., Walker, P.L.: Enterprise risk management: tools and techniques for effective implementation. Institute of management Accounts, pp. 1\u201331 (2007)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2653-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:45:45Z","timestamp":1748695545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2653-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,19]]},"ISBN":["9788132226512","9788132226536"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2653-6_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,19]]}}}