SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 7 (January 2014), PP. 55-59

Risk Assessment Score (RAS) as an Indicator of Decision
Making
MaushumiLahon
Assam Engineering Institute
maushumi28@gmail.com
________________________________________________________________________________________
Abstract:- Risk Assessment is considered to be an important indicator in decision making. Different methods
are devised for assessing risk. This paperattempts to define a task in terms of certain factors and assess risk in
terms of the three factors. The factors considered are: the number of activities, the duration of the activities and
the resources required to complete the activities along with its availability. An algorithm is given to compute the
contribution from each factor which ultimately determines the Risk Assessment Score(RAS). This score can
form the basis of decision making or even can be used to identify the factors responsible for increased RAS and
design measures to minimise the RAS which in turn can ensure reduced uncertainty. This model is more or less
generic by not specifying any particular area of decision making and hence can be considered in any decision
making condition where ever the three factors can be ascertained.
Keywords:- Risk assessment, task, plan, decision, activities, resources.

I. INTRODUCTION
It is a universally accepted fact that resources are scarce and there should be minimum wastage of
resources. Risk assessment is a positive step in this direction as detailed risk assessment of a task, plan or act
can minimise the failure rate and thereby wastage of resources. Roger Pressman [1] inhis book on software
engineering mentioned that, there are different process models and in all the models, software building starts
with the problem definition. This is addressed by the requirements collection task as the first step. If the problem
definition and the requirements collection tasks are performed with maximum accuracy there is every possibility
that the other phases of analysis, design, testing and implementation will proceed with minimum error.
Considering risk assessment of any project or task as the problem to be addressed we can consider that
a detailed analysis of the tasks or activities involved needs to be done to identify the major sources of risk. This
may provide better accuracy in the risk identification process and thereby contribute positively in the subsequent
process of risk prioritization, monitoring and mitigation exercises. In this connection TORA (Task Oriented
Risk Assessment) [2] is a proposed model to filter out the tasks/ events which contribute significantly towards
failure of a project/task.
A task is a set of objectives, the current situation and other information, assumptions, requirements and
constraints affecting the problem to be solved. For example, the requirement that a certain action must be in any
acceptable plan would be a constraint on the task. A number of alternative plans can be produced for a given
task. Each plan can be at multiple levels of abstraction and consists of the whole set of information about the
plan. In particular, a plan is composed of a number of increasingly detailed action networks, and a set of
assumptions. The basic unit of organization in the Act formalism is an Act. Each Act describes a set of actions
that can be taken to fulfil some designated purposeunder certain conditions. The purpose could be either to
satisfy a goal or to respond to some event in the world[3]. This definition of act fits in with that of task.

II.

DEFINING A TASK

To define a task, we can consider a set of parameters which describes the task. In this case the help of
the network diagram [4] created by the project managers can beconsideredfor the purpose of analysis.The
network diagram represents the activities as well as the interdependence between the activities along with the
time required for completing each activity [5]. This network diagram can provide a very important resource for
performing the risk assessment exercise. As network diagram is prepared before the commencement of the
project, it can be used for risk assessment which is also a proactive exercise.
In case of analysing the task, the activities under the task needs to be identified such that they are the
primitive activities i.e. they cannot be further split into smaller activities and placed in a Hierarchical Task
Network (HTN) [6,7,8]. Every activity now can be represented by the time required for the completion of the
activity and the different types of resources required. For this paper we consider only those resources which are
necessary in at least two activities. This is because, if a resource is specifically required for a particular activity,

55
Risk Assessment Score (RAS) as an Indicator of Decision Making
then risk of non-availability of the resource is negligible and hence is not considered for risk assessment. A
representation of a task could look like :
T (n,t, rx)
Where T represents the task,
n represents the number of activities,
t represents the time required for the task,
rx represents the contribution of the resource towards timely completion of the task
x is an integer denoting the resource number

III. PROPOSED ALGORITHM FOR RISK ASSESSMENT
Consideringthat there are multiple plans to complete a taskwithout failure, risk assessment can become
an indicator to choose among the plans for completion of the task. So, risk assessment can become a valuable
metrics for the project managers or anyone who is involved in the process of decision making. From this point
i.e. after identifying the activities, their duration, the interdependencies and the resources required, the exercise
is to develop an algorithm to assess the risk so as to choose the plan where Risk AssessmentScore(RAS) is
least.The steps to calculate the RAS is as follows :
1: Calculate the contribution of number of activities (n) towards RAS.
2: Calculate the contribution of time required for the activities (t) towards RAS.
3: Calculate the contribution of availability of resources towards RAS.
4: Compute the final RAS.
The next step is to decide on the percentage of contributionof each of the threefactors towards computation of
RAS. For the purpose of this study the percentage of contribution towards the total assessment is considered as
shown in Table I.
Table I: Contribution from different factors
Factors
Contribution (%)
Number of activities
20%
Time
20%
Resources
60%
The number of activities required to complete a task plays a significant role in successful completion of
the task i.e. completion of the task in scheduled time and within the estimated cost. More number of activities,
more is the uncertainty in completion and more is the contribution towards RAS. Here a contribution of 20% is
assumed towards RAS. This is represented in table II.
Table II: Contribution from activities
No. of Activities
Contribution towards
RA Score (%)
0–5
5
6 -10
10
11 – 15
15
16- 20
18
>20
20
In this computation it is accepted that there is a positive correlation between the number of activities
and the RAS. According to the given model, the time required for completion of the task contributes towards
RA score to the extent of 20%. It is assumed that longer the duration / estimated time for completion of the task,
more is the uncertainty and hence more contribution to RAS. The relationship is considered to be directly
proportional and the contribution is represented in table III.
Table III: Contribution from duration
Estimated Time
Contribution
(days)
towards RA Score
(%)
0 – 15
5
16 – 30
10
31 – 45
15
46 – 60
18
>60
20

56
Risk Assessment Score (RAS) as an Indicator of Decision Making
IV.

CONTRIBUTION OFRESOURCE AVAILABILITY TOWARDS RAS

The data that is crucial is the contribution of the resources towards the completion of the task. There is
another aspect which needs to be recorded which is necessary for risk assessment according to this algorithm is
the uncertainty in the availability of the resource. This failure of availability of resource is represented in this
paper in language terms as Very likely (VL), Likely (L), Unlikely (U) and No Possibility (NP). This availability
of resources are expressed in language terms using table IV which represents the terms with its equivalent
percentage of chances of non-availability. The judgement of availability of a resource is to be based on previous
experiences and records of past projects.
Table IV:Terms with equivalent percentage of non-availability
Term
Chance of nonavailability (%)
Very likely
Above 70
Likely
41 - 70
Unlikely
21 - 40
No possibility
0 - 20
A numeric value is assigned to each of the language terms which is represented in table V. This
numeric value is necessary to compute the contribution of the availability of resources towards RAS.
Table V:Numeric value assignment of availability
Term
Numeric value
Very likely
1
Likely
0.75
Unlikely
0.5
No
0.25
possibility
AnActivity-Resource table is created as shown in table VIwhere all the resources required for the task according
to all the alternative plans are listed horizontally and all the activities vertically. According to the example
considered here, two plans are considered with four activities altogether in both the plans.Each of the cell
contains the extent of the contribution of the resource towards the completion of the activity in percentage and
also
the
uncertainty
in
the
availability
of
that
resourcein
language
terms.
Table VI:Activity – Resource table representing contribution of resource and uncertainty in availability
Resources
Contribution towards
R1
R2
R3
R4
R5
RA Score (%)
Activities
A1
10 – L
30 - VL
40 – U
20 – NP
7.5 +30+20+5=62.5
A2
20 – L
30 – VL
10 - VL
10 – U
30 – NP
15+30+10+5+7.5=67.5
A3
30 - L
40 – VL
20 - VL
10 – U
22.5 +40+20+5=87.5
A4
30 – VL
50 – U
20 – NP
30 + 25 + 5 = 60
The contribution from the resources towards the activity is expressed in terms of percentage and so the
contribution from the resources required for an activity that is represented in each row sums up to 100. The
value in the 7th column which gives the uncertainty in completion of the activity from the resource point of view
is computed as follows :

Where
r -represents the contribution of an activity towards RAS
n - represents number of resources required for that activity
p - percentage of contribution of the resource towards the activity
a - chances of non-availability of the resource in numeric terms
According to the entries in table VI the value in the 7th column of the table is calculated as follows :
r1 - 10*0.75 + 30*1 + 40*0.5 + 20*0.25 = 62.5 %
r2 - 20*0.75 + 30*1 + 10*1 + 10*0.5 + 30*0.25 = 67.5%
r3 - 30*0.75 + 40*1 + 20*1 + 10*0.5 = 87.5 %

57
Risk Assessment Score (RAS) as an Indicator of Decision Making
r4 - 30*1 + 50*0.5 + 20*0.25 = 60 %
The values are represented in terms of percentage i.e. out of 100.
To compute final RA Score, the contribution from all the three factors are to be combined. Before that, the
activities in each of the plan needs to be considered. For the purpose of this paper, two plans are considered P1
and P2 and the sequence of activities are as follows :
P1 : A1 - A3 - A4
and
P2 : A1 - A2 - A4
The duration of each of the activity is considered to be as follows:
A1 - 20 days, A2 - 32 days, A3 - 15 days, A4 - 42 days

V.

COMPUTATION OF FINAL RAS FOR EACH PLAN

To compute the contribution from factor 1 ,the total number of activities under each plan is considered
and converted into respective percentage using table II. In this case number of activities in both the plans are 3
and hence the contribution is 5% in both the cases.
For factor 2 the sum of the duration of all the activities under each plan is calculated and converted to
percentage using table III. In this case the summation of duration of activities according to both the plans is
greater than 60 and so the contribution is 20% in both the cases.
For factor 3 the RA score for each activity according to the Column 7 of table V is considered and the
summation according to each plan is computed and average is taken which represents in terms of 100%. Finally
to bring the value to match 60% contribution the sum is multiplied by 0.6 to get the value for factor 3.
The value is computed as follows :
For Plan P1 :
P1 - A1 – A3 – A4
From table VI the RA Score values respectively are 62.5, 87.5 and 60. To give equal weightage to
every activity and come to a single figure, average of the RA Score for each activity related to the respective
plan is considered. In the given case the average is given as :
62.5+87.5+60 /3 = 70
To get the contribution towards final RASthe average is multiplied by a factor0.6 .
70 * 0.6 = 42
For Plan P2 :
P2 – A1 – A2- A4
From table VI the RA Score values respectively are 62.5, 67.5 and 60.
The average is 62.5+67.5+60 /3 = 63.3
Contribution towards final RA Score = 63.3 * 0.6 = 37.99 ̴ 38
The final RAS from the three different factors are represented in the table VII. The contributions from each
factor is obtained from the respective tables and performing required calculations. The final RA Score is in
terms of percentage.
Table VII: Final RA Score computation
PLAN
Factor1 Factor 2 Factor 3 RA Score
NUMBER
(20%)
(20%)
(60%)
(100%)
P1
5
20
42
67
P2
5
20
38
63
The final table suggests that the RAS lies more or less in the same range and so the decision to choose
among the plans may depend on other aspects.

VI.

CONCLUSION

The concept of risk management includes risk identification, risk assessment, prioritization and finally
designing of mitigation strategies. In this paper risk assessment is considered as an indicator to decide on as to
which plan faces more uncertainty in terms of completion. For this a Risk Assessment Score(RAS) is calculated
on the basis of three factors. This is an aim to make the decision makers aware of the uncertainties associated
with each plan considering number of activities, duration of activities and the resources required for each
activity. This approach demands a thorough study of the various activities related to each plan which ensures a
detailed study of the plans. This detailed study can finally contribute to minimise uncertainty in successful
completion of the task which is the purpose of every project.As decision making forms an integral part of every
activity whenever there are more than one alternative, a detailed analysis of each alternative is essential. RAS
can form one factor to assist the decision maker before taking any decision. Moreover, as this is a proactive
exercise it is to be incorporated in the planning phase of the different phases in ‘Systems approach to

58
Risk Assessment Score (RAS) as an Indicator of Decision Making
management’. Finally, it can be considered that risk assessment can form a valuable measure for decision
makers as better planning gives better results.

REFERENCES
[1].
[2].
[3].

[4].
[5].
[6].
[7].

[8].

[9].

[10].

[11].
[12].
[13].

R.S. Pressman, ‘Software Engineering’, 5th Edition, McGRAW-HILL
Lahon M, Singh J Y, ‘Task Oriented Risk Assessment (TORA)’, International Journal of Computer
Application, Volume 66, 2013
Karen L. Myers ,David E. Wilkins, ‘The Act Formalism Version2.2’ ,SRI International, Artificial
Intelligence Center, myers@ai.sri.com, wilkins@ai.sri.com, Working Document: Revisions as of
September 25,1997
John J. Rakos, ‘Software Project Management for Small to Medium Sized Projects’,(1998, Prentice
Hall)
Jalote,P , ‘Software Project Management in Practice’(2001, Addison-Wesley Professional)
KutluhanErol ,JamesHendler ,Dana S. Nau, ‘HTN Planning: Complexity and Expressivity’, AAAI-94
Proceedings. Copyright © 1994, AAAI (www.aaai.org).
Erol, K.; Hendler, J.; and Nau, D. ‘Semantics for Hierarchical Task Network Planning’, Technical
report CS-TR-3239, UMIACS-TR-94-31, Computer Science Dept., University of Maryland, March
1994.
Erol, K.; Hendler, J.; and Nau, D., ‘ Complexity re-sults for hierarchical task-network planning’, To
appear in Annals of Mathematics and Artijkial Intelligence Also available as Technical report CS-TR3240, UMIACS-TR-94-32, Computer Science Dept ., University of Maryland, March 1994.
Dayasindhu N, Padmanabhan S, Ravi J, ‘Integrated Approach to Risk Management for Custom
Software Development and Maintenance Initiatives’Emerging Trends and Challenges in IT
Management,2006.
David E. Wilkins, Karen L. Myers, John D. Lowrance, and Leonard P. Wesley. ‘Planning and
reacting in uncertain and dynamic environment’, Journal of Experimental and Theoretical AI,
7(1):197–227,1995.
J. Shortreed, J. Hicks, L. Craig, ‘ Basic Frameworks for Risk Assessment’ Report prepared for the
Ontario Ministry of Environment, March’2003.
‘The Benefits of Risk Assessment for Projects, Portfolios, and Businesses’, An Oracle White Paper,
June 2009.
Bakker de K, Boonstra A, Wortmann H ,’Does risk management contribute to IT project success? A
meta-analysis of empirical evidence’International Journal of Project Management, 21July 2009,
www.sciencedirect.com

59

Más contenido relacionado

La actualidad más candente

“Application of the Program Evaluation Review and Technique
“Application of the Program Evaluation Review and Technique“Application of the Program Evaluation Review and Technique
“Application of the Program Evaluation Review and TechniquePantho Sarker
 
Programme evaluation & review technique (pert)
Programme evaluation & review technique (pert)Programme evaluation & review technique (pert)
Programme evaluation & review technique (pert)AnkitaKadam20
 
Pert and its applications
Pert and its applicationsPert and its applications
Pert and its applicationsAmrit Mty
 
Estimate costs in fragile and transitional contexts - July - 2014
Estimate costs in fragile and transitional contexts - July - 2014Estimate costs in fragile and transitional contexts - July - 2014
Estimate costs in fragile and transitional contexts - July - 2014Abdulrahman Ismail
 
Applications of pert
Applications of pertApplications of pert
Applications of pertnitigga92
 
Network analysis cpm module3 ppt
Network analysis cpm module3 pptNetwork analysis cpm module3 ppt
Network analysis cpm module3 pptahsanrabbani
 
Monte Carlo Schedule Risk Analysis
Monte Carlo Schedule Risk AnalysisMonte Carlo Schedule Risk Analysis
Monte Carlo Schedule Risk AnalysisIntaver Insititute
 
Project management chapter 9
Project management chapter 9Project management chapter 9
Project management chapter 9VancityInstitute
 
PERT-CPM : PROJECT MANAGEMENT TOOLS
PERT-CPM : PROJECT MANAGEMENT TOOLSPERT-CPM : PROJECT MANAGEMENT TOOLS
PERT-CPM : PROJECT MANAGEMENT TOOLSZulfiquer Ahmed Amin
 
Project management Using Pert
Project management Using PertProject management Using Pert
Project management Using PertVishnu RC Vijayan
 

La actualidad más candente (19)

SE chapters 24-25
SE chapters 24-25SE chapters 24-25
SE chapters 24-25
 
“Application of the Program Evaluation Review and Technique
“Application of the Program Evaluation Review and Technique“Application of the Program Evaluation Review and Technique
“Application of the Program Evaluation Review and Technique
 
PERT MBO GANTT CHART
PERT MBO GANTT CHARTPERT MBO GANTT CHART
PERT MBO GANTT CHART
 
Programme evaluation & review technique (pert)
Programme evaluation & review technique (pert)Programme evaluation & review technique (pert)
Programme evaluation & review technique (pert)
 
Pert and its applications
Pert and its applicationsPert and its applications
Pert and its applications
 
PERT
PERTPERT
PERT
 
Project management techniques
Project management techniquesProject management techniques
Project management techniques
 
Estimate costs in fragile and transitional contexts - July - 2014
Estimate costs in fragile and transitional contexts - July - 2014Estimate costs in fragile and transitional contexts - July - 2014
Estimate costs in fragile and transitional contexts - July - 2014
 
PERT
PERTPERT
PERT
 
Applications of pert
Applications of pertApplications of pert
Applications of pert
 
Seminar on pert
Seminar on pertSeminar on pert
Seminar on pert
 
Network analysis cpm module3 ppt
Network analysis cpm module3 pptNetwork analysis cpm module3 ppt
Network analysis cpm module3 ppt
 
Monte Carlo Schedule Risk Analysis
Monte Carlo Schedule Risk AnalysisMonte Carlo Schedule Risk Analysis
Monte Carlo Schedule Risk Analysis
 
Project management chapter 9
Project management chapter 9Project management chapter 9
Project management chapter 9
 
PERT-CPM : PROJECT MANAGEMENT TOOLS
PERT-CPM : PROJECT MANAGEMENT TOOLSPERT-CPM : PROJECT MANAGEMENT TOOLS
PERT-CPM : PROJECT MANAGEMENT TOOLS
 
Costing
CostingCosting
Costing
 
Project management Using Pert
Project management Using PertProject management Using Pert
Project management Using Pert
 
Pert, cpm & gert
Pert, cpm & gertPert, cpm & gert
Pert, cpm & gert
 
PERT
PERTPERT
PERT
 

Similar a International Journal of Engineering Research and Development

Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A Survey
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A SurveySize and Time Estimation in Goal Graph Using Use Case Points (UCP): A Survey
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A SurveyIJERA Editor
 
Resource Leveling Considering Float Consumption Impact
Resource Leveling Considering Float Consumption ImpactResource Leveling Considering Float Consumption Impact
Resource Leveling Considering Float Consumption Impactcoreconferences
 
IRJET- Value Management
IRJET- Value ManagementIRJET- Value Management
IRJET- Value ManagementIRJET Journal
 
SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)Peter Mello
 
Running head critical path method1 critical path method7critic
Running head critical path method1 critical path method7criticRunning head critical path method1 critical path method7critic
Running head critical path method1 critical path method7criticDIPESH30
 
Application Development Risk Assessment Model Based on Bayesian Network
Application Development Risk Assessment Model Based on Bayesian NetworkApplication Development Risk Assessment Model Based on Bayesian Network
Application Development Risk Assessment Model Based on Bayesian NetworkTELKOMNIKA JOURNAL
 
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdf
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdfProject_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdf
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdfsandipanpaul16
 
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...HIMADRI BANERJI
 
Estimation guidelines and templates
Estimation guidelines and templatesEstimation guidelines and templates
Estimation guidelines and templatesHoa PN Thaycacac
 
Building risk tolerance
Building risk toleranceBuilding risk tolerance
Building risk toleranceGlen Alleman
 
Schedule Development - Diploma in Project Management
Schedule Development - Diploma in Project Management Schedule Development - Diploma in Project Management
Schedule Development - Diploma in Project Management danieljohn810
 
GANTT CHART nursing Management for Msc nursing
GANTT CHART nursing Management for Msc nursingGANTT CHART nursing Management for Msc nursing
GANTT CHART nursing Management for Msc nursingThangamjayarani
 
Managing Project Resources
Managing Project ResourcesManaging Project Resources
Managing Project ResourcesToyin Osunlaja
 
Project Duration Estimation
Project Duration EstimationProject Duration Estimation
Project Duration EstimationHarsh Behl
 

Similar a International Journal of Engineering Research and Development (20)

Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A Survey
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A SurveySize and Time Estimation in Goal Graph Using Use Case Points (UCP): A Survey
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A Survey
 
Resource Leveling Considering Float Consumption Impact
Resource Leveling Considering Float Consumption ImpactResource Leveling Considering Float Consumption Impact
Resource Leveling Considering Float Consumption Impact
 
IRJET- Value Management
IRJET- Value ManagementIRJET- Value Management
IRJET- Value Management
 
Planning
PlanningPlanning
Planning
 
SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)SDPM (Success Driven Project Management)
SDPM (Success Driven Project Management)
 
project management
project managementproject management
project management
 
Running head critical path method1 critical path method7critic
Running head critical path method1 critical path method7criticRunning head critical path method1 critical path method7critic
Running head critical path method1 critical path method7critic
 
Application Development Risk Assessment Model Based on Bayesian Network
Application Development Risk Assessment Model Based on Bayesian NetworkApplication Development Risk Assessment Model Based on Bayesian Network
Application Development Risk Assessment Model Based on Bayesian Network
 
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdf
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdfProject_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdf
Project_Management_Institute_A_Guide_to_the_Project_Management_Body-201-300.pdf
 
Project Time Management
Project Time ManagementProject Time Management
Project Time Management
 
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
Project Management Series By Himadri Banerji: The New Frontiers From Himadri ...
 
Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25
 
Estimation guidelines and templates
Estimation guidelines and templatesEstimation guidelines and templates
Estimation guidelines and templates
 
Building risk tolerance
Building risk toleranceBuilding risk tolerance
Building risk tolerance
 
Schedule Development - Diploma in Project Management
Schedule Development - Diploma in Project Management Schedule Development - Diploma in Project Management
Schedule Development - Diploma in Project Management
 
GANTT CHART nursing Management for Msc nursing
GANTT CHART nursing Management for Msc nursingGANTT CHART nursing Management for Msc nursing
GANTT CHART nursing Management for Msc nursing
 
Unit2DQ1
Unit2DQ1Unit2DQ1
Unit2DQ1
 
Managing Project Resources
Managing Project ResourcesManaging Project Resources
Managing Project Resources
 
Project Duration Estimation
Project Duration EstimationProject Duration Estimation
Project Duration Estimation
 
Ii. pert cpm
Ii. pert cpmIi. pert cpm
Ii. pert cpm
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 9, Issue 7 (January 2014), PP. 55-59 Risk Assessment Score (RAS) as an Indicator of Decision Making MaushumiLahon Assam Engineering Institute maushumi28@gmail.com ________________________________________________________________________________________ Abstract:- Risk Assessment is considered to be an important indicator in decision making. Different methods are devised for assessing risk. This paperattempts to define a task in terms of certain factors and assess risk in terms of the three factors. The factors considered are: the number of activities, the duration of the activities and the resources required to complete the activities along with its availability. An algorithm is given to compute the contribution from each factor which ultimately determines the Risk Assessment Score(RAS). This score can form the basis of decision making or even can be used to identify the factors responsible for increased RAS and design measures to minimise the RAS which in turn can ensure reduced uncertainty. This model is more or less generic by not specifying any particular area of decision making and hence can be considered in any decision making condition where ever the three factors can be ascertained. Keywords:- Risk assessment, task, plan, decision, activities, resources. I. INTRODUCTION It is a universally accepted fact that resources are scarce and there should be minimum wastage of resources. Risk assessment is a positive step in this direction as detailed risk assessment of a task, plan or act can minimise the failure rate and thereby wastage of resources. Roger Pressman [1] inhis book on software engineering mentioned that, there are different process models and in all the models, software building starts with the problem definition. This is addressed by the requirements collection task as the first step. If the problem definition and the requirements collection tasks are performed with maximum accuracy there is every possibility that the other phases of analysis, design, testing and implementation will proceed with minimum error. Considering risk assessment of any project or task as the problem to be addressed we can consider that a detailed analysis of the tasks or activities involved needs to be done to identify the major sources of risk. This may provide better accuracy in the risk identification process and thereby contribute positively in the subsequent process of risk prioritization, monitoring and mitigation exercises. In this connection TORA (Task Oriented Risk Assessment) [2] is a proposed model to filter out the tasks/ events which contribute significantly towards failure of a project/task. A task is a set of objectives, the current situation and other information, assumptions, requirements and constraints affecting the problem to be solved. For example, the requirement that a certain action must be in any acceptable plan would be a constraint on the task. A number of alternative plans can be produced for a given task. Each plan can be at multiple levels of abstraction and consists of the whole set of information about the plan. In particular, a plan is composed of a number of increasingly detailed action networks, and a set of assumptions. The basic unit of organization in the Act formalism is an Act. Each Act describes a set of actions that can be taken to fulfil some designated purposeunder certain conditions. The purpose could be either to satisfy a goal or to respond to some event in the world[3]. This definition of act fits in with that of task. II. DEFINING A TASK To define a task, we can consider a set of parameters which describes the task. In this case the help of the network diagram [4] created by the project managers can beconsideredfor the purpose of analysis.The network diagram represents the activities as well as the interdependence between the activities along with the time required for completing each activity [5]. This network diagram can provide a very important resource for performing the risk assessment exercise. As network diagram is prepared before the commencement of the project, it can be used for risk assessment which is also a proactive exercise. In case of analysing the task, the activities under the task needs to be identified such that they are the primitive activities i.e. they cannot be further split into smaller activities and placed in a Hierarchical Task Network (HTN) [6,7,8]. Every activity now can be represented by the time required for the completion of the activity and the different types of resources required. For this paper we consider only those resources which are necessary in at least two activities. This is because, if a resource is specifically required for a particular activity, 55
  • 2. Risk Assessment Score (RAS) as an Indicator of Decision Making then risk of non-availability of the resource is negligible and hence is not considered for risk assessment. A representation of a task could look like : T (n,t, rx) Where T represents the task, n represents the number of activities, t represents the time required for the task, rx represents the contribution of the resource towards timely completion of the task x is an integer denoting the resource number III. PROPOSED ALGORITHM FOR RISK ASSESSMENT Consideringthat there are multiple plans to complete a taskwithout failure, risk assessment can become an indicator to choose among the plans for completion of the task. So, risk assessment can become a valuable metrics for the project managers or anyone who is involved in the process of decision making. From this point i.e. after identifying the activities, their duration, the interdependencies and the resources required, the exercise is to develop an algorithm to assess the risk so as to choose the plan where Risk AssessmentScore(RAS) is least.The steps to calculate the RAS is as follows : 1: Calculate the contribution of number of activities (n) towards RAS. 2: Calculate the contribution of time required for the activities (t) towards RAS. 3: Calculate the contribution of availability of resources towards RAS. 4: Compute the final RAS. The next step is to decide on the percentage of contributionof each of the threefactors towards computation of RAS. For the purpose of this study the percentage of contribution towards the total assessment is considered as shown in Table I. Table I: Contribution from different factors Factors Contribution (%) Number of activities 20% Time 20% Resources 60% The number of activities required to complete a task plays a significant role in successful completion of the task i.e. completion of the task in scheduled time and within the estimated cost. More number of activities, more is the uncertainty in completion and more is the contribution towards RAS. Here a contribution of 20% is assumed towards RAS. This is represented in table II. Table II: Contribution from activities No. of Activities Contribution towards RA Score (%) 0–5 5 6 -10 10 11 – 15 15 16- 20 18 >20 20 In this computation it is accepted that there is a positive correlation between the number of activities and the RAS. According to the given model, the time required for completion of the task contributes towards RA score to the extent of 20%. It is assumed that longer the duration / estimated time for completion of the task, more is the uncertainty and hence more contribution to RAS. The relationship is considered to be directly proportional and the contribution is represented in table III. Table III: Contribution from duration Estimated Time Contribution (days) towards RA Score (%) 0 – 15 5 16 – 30 10 31 – 45 15 46 – 60 18 >60 20 56
  • 3. Risk Assessment Score (RAS) as an Indicator of Decision Making IV. CONTRIBUTION OFRESOURCE AVAILABILITY TOWARDS RAS The data that is crucial is the contribution of the resources towards the completion of the task. There is another aspect which needs to be recorded which is necessary for risk assessment according to this algorithm is the uncertainty in the availability of the resource. This failure of availability of resource is represented in this paper in language terms as Very likely (VL), Likely (L), Unlikely (U) and No Possibility (NP). This availability of resources are expressed in language terms using table IV which represents the terms with its equivalent percentage of chances of non-availability. The judgement of availability of a resource is to be based on previous experiences and records of past projects. Table IV:Terms with equivalent percentage of non-availability Term Chance of nonavailability (%) Very likely Above 70 Likely 41 - 70 Unlikely 21 - 40 No possibility 0 - 20 A numeric value is assigned to each of the language terms which is represented in table V. This numeric value is necessary to compute the contribution of the availability of resources towards RAS. Table V:Numeric value assignment of availability Term Numeric value Very likely 1 Likely 0.75 Unlikely 0.5 No 0.25 possibility AnActivity-Resource table is created as shown in table VIwhere all the resources required for the task according to all the alternative plans are listed horizontally and all the activities vertically. According to the example considered here, two plans are considered with four activities altogether in both the plans.Each of the cell contains the extent of the contribution of the resource towards the completion of the activity in percentage and also the uncertainty in the availability of that resourcein language terms. Table VI:Activity – Resource table representing contribution of resource and uncertainty in availability Resources Contribution towards R1 R2 R3 R4 R5 RA Score (%) Activities A1 10 – L 30 - VL 40 – U 20 – NP 7.5 +30+20+5=62.5 A2 20 – L 30 – VL 10 - VL 10 – U 30 – NP 15+30+10+5+7.5=67.5 A3 30 - L 40 – VL 20 - VL 10 – U 22.5 +40+20+5=87.5 A4 30 – VL 50 – U 20 – NP 30 + 25 + 5 = 60 The contribution from the resources towards the activity is expressed in terms of percentage and so the contribution from the resources required for an activity that is represented in each row sums up to 100. The value in the 7th column which gives the uncertainty in completion of the activity from the resource point of view is computed as follows : Where r -represents the contribution of an activity towards RAS n - represents number of resources required for that activity p - percentage of contribution of the resource towards the activity a - chances of non-availability of the resource in numeric terms According to the entries in table VI the value in the 7th column of the table is calculated as follows : r1 - 10*0.75 + 30*1 + 40*0.5 + 20*0.25 = 62.5 % r2 - 20*0.75 + 30*1 + 10*1 + 10*0.5 + 30*0.25 = 67.5% r3 - 30*0.75 + 40*1 + 20*1 + 10*0.5 = 87.5 % 57
  • 4. Risk Assessment Score (RAS) as an Indicator of Decision Making r4 - 30*1 + 50*0.5 + 20*0.25 = 60 % The values are represented in terms of percentage i.e. out of 100. To compute final RA Score, the contribution from all the three factors are to be combined. Before that, the activities in each of the plan needs to be considered. For the purpose of this paper, two plans are considered P1 and P2 and the sequence of activities are as follows : P1 : A1 - A3 - A4 and P2 : A1 - A2 - A4 The duration of each of the activity is considered to be as follows: A1 - 20 days, A2 - 32 days, A3 - 15 days, A4 - 42 days V. COMPUTATION OF FINAL RAS FOR EACH PLAN To compute the contribution from factor 1 ,the total number of activities under each plan is considered and converted into respective percentage using table II. In this case number of activities in both the plans are 3 and hence the contribution is 5% in both the cases. For factor 2 the sum of the duration of all the activities under each plan is calculated and converted to percentage using table III. In this case the summation of duration of activities according to both the plans is greater than 60 and so the contribution is 20% in both the cases. For factor 3 the RA score for each activity according to the Column 7 of table V is considered and the summation according to each plan is computed and average is taken which represents in terms of 100%. Finally to bring the value to match 60% contribution the sum is multiplied by 0.6 to get the value for factor 3. The value is computed as follows : For Plan P1 : P1 - A1 – A3 – A4 From table VI the RA Score values respectively are 62.5, 87.5 and 60. To give equal weightage to every activity and come to a single figure, average of the RA Score for each activity related to the respective plan is considered. In the given case the average is given as : 62.5+87.5+60 /3 = 70 To get the contribution towards final RASthe average is multiplied by a factor0.6 . 70 * 0.6 = 42 For Plan P2 : P2 – A1 – A2- A4 From table VI the RA Score values respectively are 62.5, 67.5 and 60. The average is 62.5+67.5+60 /3 = 63.3 Contribution towards final RA Score = 63.3 * 0.6 = 37.99 ̴ 38 The final RAS from the three different factors are represented in the table VII. The contributions from each factor is obtained from the respective tables and performing required calculations. The final RA Score is in terms of percentage. Table VII: Final RA Score computation PLAN Factor1 Factor 2 Factor 3 RA Score NUMBER (20%) (20%) (60%) (100%) P1 5 20 42 67 P2 5 20 38 63 The final table suggests that the RAS lies more or less in the same range and so the decision to choose among the plans may depend on other aspects. VI. CONCLUSION The concept of risk management includes risk identification, risk assessment, prioritization and finally designing of mitigation strategies. In this paper risk assessment is considered as an indicator to decide on as to which plan faces more uncertainty in terms of completion. For this a Risk Assessment Score(RAS) is calculated on the basis of three factors. This is an aim to make the decision makers aware of the uncertainties associated with each plan considering number of activities, duration of activities and the resources required for each activity. This approach demands a thorough study of the various activities related to each plan which ensures a detailed study of the plans. This detailed study can finally contribute to minimise uncertainty in successful completion of the task which is the purpose of every project.As decision making forms an integral part of every activity whenever there are more than one alternative, a detailed analysis of each alternative is essential. RAS can form one factor to assist the decision maker before taking any decision. Moreover, as this is a proactive exercise it is to be incorporated in the planning phase of the different phases in ‘Systems approach to 58
  • 5. Risk Assessment Score (RAS) as an Indicator of Decision Making management’. Finally, it can be considered that risk assessment can form a valuable measure for decision makers as better planning gives better results. REFERENCES [1]. [2]. [3]. [4]. [5]. [6]. [7]. [8]. [9]. [10]. [11]. [12]. [13]. R.S. Pressman, ‘Software Engineering’, 5th Edition, McGRAW-HILL Lahon M, Singh J Y, ‘Task Oriented Risk Assessment (TORA)’, International Journal of Computer Application, Volume 66, 2013 Karen L. Myers ,David E. Wilkins, ‘The Act Formalism Version2.2’ ,SRI International, Artificial Intelligence Center, myers@ai.sri.com, wilkins@ai.sri.com, Working Document: Revisions as of September 25,1997 John J. Rakos, ‘Software Project Management for Small to Medium Sized Projects’,(1998, Prentice Hall) Jalote,P , ‘Software Project Management in Practice’(2001, Addison-Wesley Professional) KutluhanErol ,JamesHendler ,Dana S. Nau, ‘HTN Planning: Complexity and Expressivity’, AAAI-94 Proceedings. Copyright © 1994, AAAI (www.aaai.org). Erol, K.; Hendler, J.; and Nau, D. ‘Semantics for Hierarchical Task Network Planning’, Technical report CS-TR-3239, UMIACS-TR-94-31, Computer Science Dept., University of Maryland, March 1994. Erol, K.; Hendler, J.; and Nau, D., ‘ Complexity re-sults for hierarchical task-network planning’, To appear in Annals of Mathematics and Artijkial Intelligence Also available as Technical report CS-TR3240, UMIACS-TR-94-32, Computer Science Dept ., University of Maryland, March 1994. Dayasindhu N, Padmanabhan S, Ravi J, ‘Integrated Approach to Risk Management for Custom Software Development and Maintenance Initiatives’Emerging Trends and Challenges in IT Management,2006. David E. Wilkins, Karen L. Myers, John D. Lowrance, and Leonard P. Wesley. ‘Planning and reacting in uncertain and dynamic environment’, Journal of Experimental and Theoretical AI, 7(1):197–227,1995. J. Shortreed, J. Hicks, L. Craig, ‘ Basic Frameworks for Risk Assessment’ Report prepared for the Ontario Ministry of Environment, March’2003. ‘The Benefits of Risk Assessment for Projects, Portfolios, and Businesses’, An Oracle White Paper, June 2009. Bakker de K, Boonstra A, Wortmann H ,’Does risk management contribute to IT project success? A meta-analysis of empirical evidence’International Journal of Project Management, 21July 2009, www.sciencedirect.com 59