跳到主要內容

簡易檢索 / 詳目顯示

研究生: 陳景新
CHING-HSIN CHEN
論文名稱: 設計與實作使用模糊風險分析和控制方法之服務導向風險管理系統
Design and Implementation of a Service-Oriented Risk Management System with Fuzzy Risk Analysis and Control Approach
指導教授: 李允中
Jonathan Lee
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系在職專班
Executive Master of Computer Science & Information Engineering
畢業學年度: 95
語文別: 中文
論文頁數: 66
中文關鍵詞: 風險管理
外文關鍵詞: Risk Management System
相關次數: 點閱:8下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本篇論文針對風險管理及風險參數的分析方法進行研究,並設計與實作一個風險管理系統以支援能力成熟度整合模式(CMMI)風險管理流程領域之落實。為了幫助專案風險的分析與管理,本研究提出一個模糊風險分析與控制方法,其中風險的分析使用模糊理論定義風險相關參數並使用有效模糊權重平均演算法(EFWA)計算出風險的嚴重程度。在風險的控管部分則使用論文所定義之風險狀態、策略、風險臨界值、風險嚴重程度、風險減輕計畫與緊急應變計畫,幫助專案進行風險的控管,以期將可能導致開發失敗的逆向衝擊降至最低。


    The purpose of this paper is to make a study of risk management and risk analysis approaches and to design and develop a system to support the implementation of CMMI RSKM process area.
    This research proposes a fuzzy risk analysis and control approach:
    For risk analysis, we analyze risk exposure and risk priority using EFWA with various risk parameters. For risk control, the risk statuses, thresholds, mitigation plan and contingency plan identified in this paper are used with risk exposures and risk priorities to monitor, control, mitigate and handle the risks.

    第一章 緒論 1 1.1 背景 1 1.2 動機 1 1.3 論文架構 2 第二章 背景知識介紹 3 2.1 風險管理 3 2.1.1 CMMI之風險管理介紹 4 2.1.2 SEI的風險目錄 5 2.2 風險評估方法 5 2.3 模糊理論 7 2.3.1 模糊邏輯簡介 7 2.3.2 歸屬函數 8 2.3.3 風險參數的歸屬函數 8 2.3.4 模糊集合的簡介 9 2.3.5 有效模糊權重平均演算法(EFWA)介紹 9 2.4 歐幾里德距離 10 2.5 網路服務(Web Services) 11 2.6 AJAX 13 第三章 系統設計與實作 14 3.1 系統設計主要議題 14 3.2 風險管理的流程(Process) 15 3.2.1 決定風險來源及風險目錄 15 3.2.2 建立風險管理策略 17 3.2.3 風險識別 21 3.2.4 風險分析 22 3.2.5 發展風險減輕計畫 26 3.2.6 週期性地再評估風險 27 3.2.7 高階人員的風險複審 30 3.4風險規劃與風險分析子系統 34 3.4.1 風險來源及目錄規劃者(RSC Planner): 35 3.4.2 風險管理策略規劃者(RMS Planner): 35 3.4.3 風險識別者(Risk Identifier): 36 3.4.4 風險分析(Risk Analysis): 36 3.5風險降低子系統 38 3.5.1 風險減輕及緊急應變計畫規劃者(RMC Planner): 39 3.5.2 風險再評估(Risk Reassessment) 39 3.5.3 高階人員的風險複審(Status Review with Higher Level Management): 40 第四章 案例分析及系統展示 42 第五章 問題研討 51 5.1 問題一 51 5.2 問題二 51 5.3 問題三 52 第六章 結論 54 參考文獻: 55 附錄一:有效模糊權重平均演算法內容 57

    [1] W. Brown.etc. AntiPatterns; Refactoring Software, Architectures, and Projects
    in Crisis, New York, Wiley Computer Publishing, 1998.
    [2] Brown, Industrial-Strength Management Strategies. IEEE software, pp.94-103,
    July 1996.
    [3] B. Boehm. A Spiral Model of Software Development and Enhancement,
    Tutorial: Software Engineering Project Management, Thayer, R. H. (ed.),
    IEEE Computer Society Press, Washington, DC, pp.128- 142,1987.
    [4] R. N. Charette. Large-Scale Project Management is Risk Management. IEEE
    Software, pp.110-117, July 1996.
    [5] A Gemmer, Risk Management: Moving beyond Process, Computer, Scholar
    1997.
    [6] M. Can et al. Taxonomy-based Risk Identification. SEI technical Report
    SEI-93-TR-006, Pittsburgh, PA:SEI, 1993.
    [7] RAY C. WILLIAMS, JULIE A. WALKER, and AUDREY J. DOROFEE,
    Putting Risk Management into Practice, Software Engineering Institute, Software, IEEE , Volume 14, Issue 3, May-June 1997 Page(s):75 – 82, May-June 1997.
    [8] CMMI® for Development, Version 1.2, Software Engineering Institute of
    Carnegie Mellon University.
    [9] Alfred B. Process-Based Software Risk Assessment. Proceedings of the 4th
    European Workshop on Software Process Technology (EWSPT’95), Nordwijkerhout, Netherlands, April 1995.
    [10] Mark C. Paulk, Charles V. Weber, etc. Key Practices of the Capability
    Maturity Model, SM, Version 1.1. Technical Report, CMU-SEI-93-TR-025, ESC-TR- 93-178, 1993
    [11] Jeevan Perera, PhD, JD, Jerry Holsomback, An Integrated Risk Management
    Tool and Process, Aerospace, 2005 IEEE Conference 5-12 March 2005 Page(s):129 - 136
    [12] D.H. Lee, D. Park, An Efficient Algorithm for Fuzzy Weighted Average, Fuzzy Sets and Systems 87 (1997) 39–45.
    [13] E.W.T. Ngai, F.K.T. Wat , Fuzzy Decision Support System for Risk Analysis in E-Commerce Development , Decision Support Systems 40 (2005) 235– 255, ELSEVIER
    [14] Xu Ruzhi, Qian Leqiu, Jing Xinhai, CMM-Based Software Risk Control
    Optimization, Information Reuse and Integration, 2003. IRI 2003. IEEE International Conference on 2003 Page(s):499 – 503 , 2003
    [15] J Kontio, G Getto, D Landes, Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method, Procedings of the 6th ACM SIGSOFT international symposium, 1998
    [16] J Kontio, JP Jokinen, E Rosendahl , Visualizing and Formalizing Risk
    Information an Experiment , Software Metrics,2004. Proceedings. 10th International,2004
    [17] L Fussell, S Field, The Role of the Risk Management Database in the Risk
    Management Process, Systems Engineering, 2005. ICSEng 2005. 18th International , 2005
    [18] Roy, G.G., A Risk Management Framework for Software Engineering
    Practice, Software Engineering Conference, 2004. Proceedings. 2004 Australian 2004 Page(s):60 – 67 , 2004
    [19] Anil R., Seshadri V., Chavala A., Vemuri M., A Methodology for Managing
    Multidisciplinary Programs with Six Sigma Approach , Engineering Management Conference, 2004. Proceedings. 2004 IEEE International Volume 2, 18-21 Oct. 2004 Page(s):785 - 788 Vol.2 , 18-21 Oct. 2004

    QR CODE
    :::