Journal articles on the topic 'Software risk mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software risk mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mittal, Sonam. "Risk Analysis and Mitigation Steps in Different Phases of Software Development." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 241–43. http://dx.doi.org/10.15373/22778179/june2013/77.
Full textRahman, Tania, Shanto Kumar Saha, Md Sajjadur Rahman Sohel, Md Tamim Maula, Abhijit Bowmik, and Rashidul Hasan Nabil. "Risk Identification and Analysis in Software Development in Bangladesh IT Industry: A Hybrid Model." AIUB Journal of Science and Engineering (AJSE) 21, no. 1 (May 12, 2022): 37–44. http://dx.doi.org/10.53799/ajse.v21i1.308.
Full textVerner, J. M., O. P. Brereton, B. A. Kitchenham, M. Turner, and M. Niazi. "Risks and risk mitigation in global software development: A tertiary study." Information and Software Technology 56, no. 1 (January 2014): 54–78. http://dx.doi.org/10.1016/j.infsof.2013.06.005.
Full text., S. Rehman. "SOFTWARE SECURITY RISK MITIGATION USING OBJECT ORIENTED DESIGN PATTERNS." International Journal of Research in Engineering and Technology 02, no. 07 (July 25, 2013): 71–89. http://dx.doi.org/10.15623/ijret.2013.0207010.
Full textFrydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César, and Barton P. Miller. "Automating Risk Analysis of Software Design Models." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.
Full textTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Full textMarx, Ben, and Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies." Risk Governance and Control: Financial Markets and Institutions 6, no. 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.
Full textYan, Shujie, Liangzhu (Leon) Wang, Michael J. Birnkrant, Zhiqiang (John) Zhai, and Shelly L. Miller. "Multizone Modeling of Airborne SARS-CoV-2 Quanta Transmission and Infection Mitigation Strategies in Office, Hotel, Retail, and School Buildings." Buildings 13, no. 1 (December 31, 2022): 102. http://dx.doi.org/10.3390/buildings13010102.
Full textBiro, Miklos, Atif Mashkoor, Johannes Sametinger, and Remzi Seker. "Software Safety and Security Risk Mitigation in Cyber-physical Systems." IEEE Software 35, no. 1 (January 2018): 24–29. http://dx.doi.org/10.1109/ms.2017.4541050.
Full textHasni, Mohamed S. M., and Turhan Köprübaşı. "Controlling Task Dependency as a Risk Mitigation Process." International Journal of Emerging Research in Management and Technology 6, no. 11 (June 13, 2018): 19. http://dx.doi.org/10.23956/ijermt.v6i11.42.
Full textCardan, Rex A., Elizabeth L. Covington, and Richard A. Popple. "Code Wisely: Risk assessment and mitigation for custom clinical software." Journal of Applied Clinical Medical Physics 22, no. 8 (July 10, 2021): 273–79. http://dx.doi.org/10.1002/acm2.13348.
Full textAnthony Jnr, Bokolo, Noraini Che Pa, Rozi Nor Haizan Nor, and Yusmadi Jah Josoh. "KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT." International Journal of Software Engineering and Computer Systems 3 (February 28, 2017): 1–16. http://dx.doi.org/10.15282/ijsecs.3.2017.1.0023.
Full textGefen, Wyss, and Lichtenstein. "Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts." MIS Quarterly 32, no. 3 (2008): 531. http://dx.doi.org/10.2307/25148855.
Full textVarnell-Sarjeant, Julia F. "Managing a man-rated software development program via risk mitigation." ACM SIGSOFT Software Engineering Notes 33, no. 4 (July 2008): 1–8. http://dx.doi.org/10.1145/1384139.1384147.
Full textMalik, Vinita, and Sukhdip Singh. "An Artificially Intelligent Algorithmic Paradigm for Risk Mitigation in Risk Managed Software Testing." Journal of Data Processing 8, no. 3 (September 1, 2018): 100. http://dx.doi.org/10.6025/jdp/2018/8/3/100-105.
Full textBiswas, Baidyanath, and Arunabha Mukhopadhyay. "G-RAM framework for software risk assessment and mitigation strategies in organisations." Journal of Enterprise Information Management 31, no. 2 (March 5, 2018): 276–99. http://dx.doi.org/10.1108/jeim-05-2017-0069.
Full textAlfarisi, Salman, and Nico Surantha. "Risk assessment in fleet management system using OCTAVE allegro." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 530–40. http://dx.doi.org/10.11591/eei.v11i1.3241.
Full textFirdose, Salma, and L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.9026.
Full textFirdose, Salma, and L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.pp349-356.
Full textPatil, Shruti, and Roshani Ade. "A Global Software Engineering Knowledge Management Approach for Intensive Risk Mitigation." International Journal of Managing Public Sector Information and Communication Technologies 6, no. 1 (March 31, 2015): 01–08. http://dx.doi.org/10.5121/ijmpict.2015.6101.
Full textAbdul-Rahman, Hamzah, Faizul Azli Mohd-Rahim, and Wang Chen. "Reducing failures in software development projects: effectiveness of risk mitigation strategies." Journal of Risk Research 15, no. 4 (April 2012): 417–33. http://dx.doi.org/10.1080/13669877.2011.634520.
Full textPutra, Yanuar Dharma, and Imron Mawardi. "ELIMINASI RISIKO OPERASIONAL BMT SRI SEJAHTERA SURABAYA." Jurnal Ekonomi Syariah Teori dan Terapan 6, no. 7 (January 17, 2020): 1317. http://dx.doi.org/10.20473/vol6iss20197pp1317-1330.
Full textIMADE, Odaro S., and Faith I. AKINNIBOSUN. "The risk mitigation indices associated with some risk mitigation protocols performed on contaminated aqua-cultured catfish (Clarias gariepinus)." Notulae Scientia Biologicae 12, no. 1 (March 31, 2020): 172–83. http://dx.doi.org/10.15835/nsb12110633.
Full textHermawan, I., I. Suhendra, H. Wiranata, R. W. Karim, A. W. Astuti, B. Silaen, and D. E. Wicaksono. "Disaster and Risk Mitigation at The Toll Road Planning Stage." IOP Conference Series: Earth and Environmental Science 936, no. 1 (December 1, 2021): 012016. http://dx.doi.org/10.1088/1755-1315/936/1/012016.
Full textDittmann, Kjeld, and Mogens Blanke. "Risk mitigation by design of autonomous maritime automation systems." at - Automatisierungstechnik 70, no. 5 (May 1, 2022): 469–81. http://dx.doi.org/10.1515/auto-2021-0151.
Full textMubin, Sajjad, Shah Jahan, and Ekaterina Gavrishyk. "Monte Carlo Simulation and Modeling of Schedule, Cost and Risks of Dasu Hydropower Project." July 2019 38, no. 3 (July 1, 2019): 557–70. http://dx.doi.org/10.22581/muet1982.1903.03.
Full textUmar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)." International Journal of Safety and Security Engineering 11, no. 3 (June 30, 2021): 239–46. http://dx.doi.org/10.18280/ijsse.110304.
Full textChang, Chia-Hsun, Jingjing Xu, Jingxin Dong, and Zaili Yang. "Selection of effective risk mitigation strategies in container shipping operations." Maritime Business Review 4, no. 4 (November 18, 2019): 413–31. http://dx.doi.org/10.1108/mabr-04-2019-0013.
Full textAbbas, Haider Muhi, Basel Halak, and Mark Zwolinski. "BTI mitigation by anti-ageing software patterns." Microelectronics Reliability 79 (December 2017): 79–90. http://dx.doi.org/10.1016/j.microrel.2017.10.009.
Full textPalupi, Ghea Sekar, Paramitha Nerisafitra, and Rahadian Bisma. "How Information Literacy Influences Student’s Online Risk Mitigation." Journal of Information Engineering and Educational Technology 6, no. 2 (December 24, 2022): 42–49. http://dx.doi.org/10.26740/jieet.v6n2.p42-49.
Full textShahzad, Basit, Fazal-e-Amin, Ahsanullah Abro, Muhammad Imran, and Muhammad Shoaib. "Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development." Sustainability 13, no. 5 (March 1, 2021): 2602. http://dx.doi.org/10.3390/su13052602.
Full textSalin, Hannes, and Martin Lundgren. "Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams." Journal of Cybersecurity and Privacy 2, no. 2 (April 13, 2022): 276–91. http://dx.doi.org/10.3390/jcp2020015.
Full textLOBATO, LUANNA LOPES, THIAGO JABUR BITTAR, PAULO ANSELMO DA MOTA SILVEIRA NETO, IVAN DO CARMO MACHADO, EDUARDO SANTANA DE ALMEIDA, and SILVIO ROMERO DE LEMOS MEIRA. "RISK MANAGEMENT IN SOFTWARE PRODUCT LINE ENGINEERING: A MAPPING STUDY." International Journal of Software Engineering and Knowledge Engineering 23, no. 04 (May 2013): 523–58. http://dx.doi.org/10.1142/s0218194013500150.
Full textZheng, Zheng, and Kishor S. Trivedi. "Guest editorial: special issue on modeling and mitigation techniques for software aging." Software Quality Journal 28, no. 1 (February 26, 2020): 3–5. http://dx.doi.org/10.1007/s11219-020-09496-0.
Full textRao, Aakarsh, Nadir A. Carreón, Roman Lysecky, and Jerzy Rozenblit. "FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems." Information 13, no. 10 (October 10, 2022): 487. http://dx.doi.org/10.3390/info13100487.
Full textKumar, Sameer, Anthony Kwong, and Chandan Misra. "Risk mitigation in offshoring of business operations." Journal of Manufacturing Technology Management 20, no. 4 (May 2009): 442–59. http://dx.doi.org/10.1108/17410380910953711.
Full textKassem, Yousseuf, Hüseyin Gökçekuş, and Nour Alijl. "Flash flood risk assessment modelling and methods: Kyrenia Region, Northern Cyprus." World Journal of Environmental Research 11, no. 1 (May 16, 2022): 42–52. http://dx.doi.org/10.18844/wjer.v11i1.7190.
Full textMathew, Saji K., and Yuanyuan Chen. "Achieving offshore software development success: An empirical analysis of risk mitigation through relational norms." Journal of Strategic Information Systems 22, no. 4 (December 2013): 298–314. http://dx.doi.org/10.1016/j.jsis.2013.03.001.
Full textMunang, Aswan, and Isnaini Nurisusilawati. "Modeling Underlying Pattern Making Construction Safety Risk Mitigation Decisions Using Dynamic Systems." Jurnal Ilmiah Teknik Industri 21, no. 1 (June 30, 2022): 37–48. http://dx.doi.org/10.23917/jiti.v21i1.17429.
Full textRahayu, Flourensia Sapty, Toni Indrawan, and Shafinah Kamarudin. "Risk Mitigation Strategies in Implementing Scrum Framework for Internet-Based IT Companies in Indonesia." Indonesian Journal of Information Systems 3, no. 1 (August 27, 2020): 50. http://dx.doi.org/10.24002/ijis.v3i1.3589.
Full textKavallieratos, Georgios, Christos Grigoriadis, Angeliki Katsika, Georgios Spathoulas, Panayiotis Kotzanikolaou, and Sokratis Katsikas. "Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems." Journal of Surveillance, Security and Safety 3, no. 4 (2022): 128–49. http://dx.doi.org/10.20517/jsss.2022.17.
Full textHardiyanto, Yovi. "CENGKLIK RESERVOIR PERFORMANCE ON DROUGHT MITIGATION." Journal of the Civil Engineering Forum 1, no. 2 (July 16, 2017): 69. http://dx.doi.org/10.22146/jcef.24000.
Full textShareef, Mohammad Esam, and Dheyaa Ghanim Abdulrazzaq. "River Flood Modelling For Flooding Risk Mitigation in Iraq." Civil Engineering Journal 7, no. 10 (October 1, 2021): 1702–15. http://dx.doi.org/10.28991/cej-2021-03091754.
Full textOlaiya, Kehinde, Kareem Arikewuyo, Ashim Shogunro, and Lateef Yunusa. "Effect of Risk Mitigation on Profitability of Insurance Industries in Nigeria." Izvestiya Journal of the University of Economics - Varna 65, no. 3 (November 8, 2021): 330–43. http://dx.doi.org/10.36997/ijuev2021.65.3.330.
Full textSrivanit, Manat. "Community Risk Assessment: Spatial Patterns and GIS-Based Model for Fire Risk Assessment - A Case Study of Chiang Mai Municipality." Journal of Architectural/Planning Research and Studies (JARS) 8, no. 2 (September 3, 2018): 113–26. http://dx.doi.org/10.56261/jars.v8i2.168615.
Full textHuong Tran, Thi Thanh, Paul Childerhouse, and Eric Deakins. "Supply chain information sharing: challenges and risk mitigation strategies." Journal of Manufacturing Technology Management 27, no. 8 (October 3, 2016): 1102–26. http://dx.doi.org/10.1108/jmtm-03-2016-0033.
Full textSteimers, André, and Moritz Schneider. "Sources of Risk of AI Systems." International Journal of Environmental Research and Public Health 19, no. 6 (March 18, 2022): 3641. http://dx.doi.org/10.3390/ijerph19063641.
Full textHarahap, Rudy M., Andri Setiawan, Adi Subakti Kurniawan, and Merlin Mulia. "PENGUKURAN RISIKO PROYEK PADA PERUSAHAAN TEKNOLOGI INFORMASI DI INDONESIA." CommIT (Communication and Information Technology) Journal 3, no. 2 (October 31, 2009): 70. http://dx.doi.org/10.21512/commit.v3i2.517.
Full textLuxton, Abigail, and Marin Marinov. "Terrorist Threat Mitigation Strategies for the Railways." Sustainability 12, no. 8 (April 22, 2020): 3408. http://dx.doi.org/10.3390/su12083408.
Full textBrooke, Phil, and Richard Paige. "User-visible cryptography in email and web scenarios." Information & Computer Security 23, no. 1 (March 9, 2015): 58–72. http://dx.doi.org/10.1108/ics-07-2013-0054.
Full text