IT Assignment Help Online study review analysis: ICT Project Estimation Standard Model & Bayesian Belief Network Model

IT Assignment Help Online study review analysis: ICT Project Estimation Standard Model & Bayesian Belief Network Model

ICT Project Estimation Standard Model

Bayesian Belief Network Model

 Bayesian Belief Network (BBN) Model is a very flexible and competitive method which is used for software or ICT projects estimations (Stamelois et al., 2003). Bayesian Belief Network is basically a kind of graph with directions where the probabilities are being represented by nodes while between two nodes, there are arrows existing which are used for depicting the various kinds of dependencies in the network (Fenton et al., 2004).

This BBN model is very attractive because of its capability as it is capable enough to model all the uncertainties in an effective manner and helps in data learning and probabilistic inference too. Thus BBN is an effective tool which is helpful in reducing the modelling data and incorporates uncertainty as it introduces the expert knowledge in the project. The reasoning methodology and the excellent graphic representation of BBN give the ICT project much more flexibility for not just for the process of estimation, but are used also for trade-off analysis.

 Currently this BBN model is being used in the varied areas like quality estimation, productivity prediction (Stamelois et al., 2003) and resource allocation (Fenton et al., 2004) as well. The BBN networks thus act as powerful tools which assist various modelling causes as well as very wide variety of domains and their effectiveness. These are very compact networks of probabilities which are helpful in capturing the probabilistic relationship existing between the various variables.

 A project level estimation model framework which has been developed based upon the four basic BBN Models which have been utilised for modelling the relationships between the effort, scope, quality and schedule for software development and testing. The four sub-models are:

  •  Component Estimation Model
  •  Test Effectiveness  Estimation Model
  •  Residual Defect Estimation Model
  •  Test Estimation Model

These sub models act like the basic building blocks which help in constructing a BBN model which is of project level. By using these sub models, even the project managers can easily model projects with great amount of flexibility.

 The Component Estimation Model is the one which contains the variables which are related to the development of component activities which help in covering the development effort, duration estimation as well as resources, defect introduction and allocation of resources (Wang et al., n.d.).

Test Effectiveness Estimation Model (Wang et al., n.d.) Inculcates all the variables concerned with the test activities, which are used vitally for covering the test effectiveness as well as the estimations.

 Residual Defect Estimation Model (Wang et al., n.d.) comprises of all the variables which are helpful in estimating the various kinds and counts of residual defects once the defects are being removed through defect removal activities.

Test Estimation Model comprises of the variables which are related to test efforts, resource allocation and schedule estimation (Wang et al., n.d.).

Component Estimation Model is being used by numerous software projects because there are many components which are developed and then integrated by various software teams to make a large software project. Therefore Component development is the main phase in any software project and is highly prone to defect introduction.

 In this case a component is the software entity which is created by software team which is identifiable and defects can be traced in it during and after the development of software entity. It can be seen from the figure 1 shown below:

The number of or the count of introduced defects here in the case studied can easily be calculated through the multiplication of COCOMO Quality Estimation with Software size of Component , the measurement of which can be done through defect density (Wang et al., n.d.). Factors influencing the introduction of number of defects are: Software size, People Experience and Organization maturity (Wang et al., n.d.).

Industry Risk Standard Model

 Risk is the term which is associated with every profession and  across different organizations too There are particular models for risk estimation which have been categorised for depending upon the profession like in financial world we use the Value  at Risk (VAR) Monetcarlo  Simulation and complex Methods while in IT we use  models like Simple to Apply risk Analysis (SARA) Simplified Process for  Risk Identification (SPRINT) and sometimes the Operationally Critical Threat, Asset and Vulnerability  Evaluation (OCTAVE) (Ramirez, 2008).

The information security professionals as well as the information security auditors can easily utilise varied kinds of risk models for risk management because their scope is not just limited to just the risk management tools. The risk management models are very helpful as they contribute to the bottom line of the organization by ensuring a very compact and comprehensive framework, which helps in increasing the visibility which exists in the organization between the risks and opportunities existing in the firm. This is a very complex and critical issue because it needs involvement thorough interacting with every at every level in the organization. Then we need to establish a common language as well as common approaches for risk management. This needs to be done without getting all the risks under one roof.

 As a result of various demands from various industries many risk management standard models have been developed. Selecting the right risk management standard for any organization is the outcome of doing formal comparison and is subjected to the specific needs as well as the expectations which have been defined by the senior management.
Associate Australian Institute of Risk Management (AAIRM) Risk Management Standard

It includes the references to the risk areas like (Ramirez, 2008):

  • Definition of risk in terminological manner
  •  Management of Risk
  •  Risk Analysis
  •  Risk Evaluation
  •  Risk Assessment
  •  Risk Reporting
  • Risk treatment
  •  Risk Monitoring and  Risk management process review
  •  Structure and the administration of risk management

The figure 2 depicted below shows the flow of risk management function during the process flow operation. The risk flow cycle is maintained while the strategic objectives are being covered in order to keep close monitoring of the risk management model. The formal audits act as major support while the whole process flow for risk management is done.

 This standard model also has a list of appendix which includes the list of various risk identification techniques along with the various risk analysis methods and the techniques which can be used for risk analysis. This helps in supporting the implementation and execution of risk management functions and to know about the available developments. With the help of this standard of AAIRM we can get a better overview of various stages and the various activities which are needed for the risk management process. But to implement a real-life process there would be requirement of many more details (Risk Manager, 2010).

PF29

if you want IT Management Assignment Help study samples to help you write professional custom essay’s and essay writing help.

Receive assured help from our talented and expert writers! Did you buy assignment and assignment writing services from our experts in a very affordable price.

To get more information, please contact us or visit www.myassignmenthelp.Com

download-button                chat-new (1)

Rounded Rectangle: MONITORINGRounded Rectangle: RISK ANALYSIS
RISK IDENTIFICATION
RISK DESCRIPTION
RISK ESTIMATION

Rounded Rectangle: RISK EVALUATIONRounded Rectangle: The Organization’s Strategic Objectives

Formal

Audit

Rounded Rectangle: RESIDUAL RISK REPORTINGRounded Rectangle: RISK TREATMENTRounded Rectangle: DECISIONRounded Rectangle: RISK REPORTING: Threats and OpportunitiesRounded Rectangle: RISK ASSESSMENT                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        Figure 2:ALARM Risk Management Model (Ramirez, 2008)