Risk Assessor

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 201 Experts worldwide ranked by ideXlab platform

Julian M. Bass - One of the best experts on this subject based on the ideXlab platform.

  • How product owner teams scale agile methods to large distributed enterprises
    Empirical Software Engineering, 2015
    Co-Authors: Julian M. Bass
    Abstract:

    Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corporate reputations. Agile methods have been advocated to reduce project Risks, improving both productivity and product quality. This article uses practitioner descriptions of agile method tailoring to explore large scale offshore enterprise development programmes with a focus on product owner role tailoring, where the product owner identifies and prioritises customer requirements. In globalised projects, the product owner must reconcile competing business interests, whilst generating and then prioritising large numbers of requirements for numerous development teams. The study comprises eight international companies, based in London, Bangalore and Delhi. Interviews with 46 practitioners were conducted between February 2010 and May 2012. Grounded theory was used to identify that product owners form into teams. The main contribution of this research is to describe the nine product owner team functions identified: groom, prioritiser, release master, technical architect, governor, communicator, traveller, intermediary and Risk Assessor. These product owner functions arbitrate between conflicting customer requirements, approve release schedules, disseminate architectural design decisions, provide technical governance and propogate information across teams. The functions identified in this research are mapped to a scrum of scrums process, and a taxonomy of the functions shows how focusing on either decision-making or information dissemination in each helps to tailor agile methods to large scale offshore enterprise development programmes.

  • ICGSE - Agile Method Tailoring in Distributed Enterprises: Product Owner Teams
    2013 IEEE 8th International Conference on Global Software Engineering, 2013
    Co-Authors: Julian M. Bass
    Abstract:

    This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the product owner role is discussed. The product owner identifies and prioritizes customer requirements. But in globalized projects, the product owner must reconcile large numbers competing business interests and generate prioritized requirements for many development teams. The study comprises 8 international companies in London, Bangalore and Delhi. Interviews with 46 practitioners were conducted between February 2010 and May 2012. A grounded theory approach was used to identify that product owner teams comprise nine roles: Groom, Prioritizer, Release Master, Technical Architect, Governor, Communicator, Traveler, Intermediary and Risk Assessor. These product owner roles arbitrate between conflicting customer requirements, approve release schedules, make architectural design decisions, provide technical governance and disseminate information across teams. Understanding these roles will help agile coaches guide large scale agile teams.

Yachi Chu - One of the best experts on this subject based on the ideXlab platform.

  • performance evaluation of the recommendation mechanism of information security Risk identification
    Neurocomputing, 2017
    Co-Authors: Yuchih Wei, Yachi Chu
    Abstract:

    Abstract In recent decades, information security has become crucial for protecting the benefits of a business operation. Many organizations perform information security Risk management in order to analyze their weaknesses, and enforce the security of the business processes. However, identifying the threat–vulnerability pairs for each information asset during the processes of Risk assessment is not easy and time-consuming for the Risk Assessor. Furthermore, if the identified Risk diverges from the real situation, the organization may put emphasis on the unnecessary controls to prevent the non-existing Risk. In order to resolve the problem mentioned above, we utilize the data mining approach to discover the relationship between assets and threat–vulnerability pairs. In this paper, we propose a Risk recommendation mechanism for assisting user in identifying threats and vulnerabilities. In addition, we also implement a Risk assessment system to collect the historical selection records and measure the elapsed time. The result shows that with the assistance of Risk recommendations, the mean elapsed time is shorter than with the traditional method by more than 21%. The experimental results show that the Risk recommendation system can improve both the performance of efficiency and accuracy of Risk identification.

Lars Melholt Rasmussen - One of the best experts on this subject based on the ideXlab platform.

Chunbing Bao - One of the best experts on this subject based on the ideXlab platform.

  • a knowledge based Risk measure from the fuzzy multicriteria decision making perspective
    IEEE Transactions on Fuzzy Systems, 2019
    Co-Authors: Chunbing Bao
    Abstract:

    Risk measures play significant roles in determining the magnitude of Risks. The traditional Risk measures consider only the consequence $(C)$ and the probability $(P)$ and ignore the support of the knowledge behind to estimate $C$ and $P$ . Several researchers have suggested adding knowledge as a third dimension in the Risk measures. However, the issues of how to embed the dimension of knowledge in the Risk measures to output an explicit expression of the Risk measure and how to measure the strength of knowledge remain unresolved. This paper proposes a new Risk measure incorporating the dimension of knowledge, apart from $C$ and $P$ . It is shown that the proposed Risk measure has the form of traditional Risk measures when the Risk Assessor has full knowledge. In addition, a fuzzy multicriteria decision-making (MCDM) method is employed to assess the strength of knowledge. In the fuzzy MCDM method, an entropy optimization problem is solved to obtain fuzzy measures, which are critical for determining the score of the strength of knowledge. Finally, the proposed method is applied to a project Risk assessment, showing the feasibility of the method.

Masaaki Miyazawa - One of the best experts on this subject based on the ideXlab platform.

  • Bayesian integrated testing strategy (ITS) for skin sensitization potency assessment: a decision support system for quantitative weight of evidence and adaptive testing strategy
    Archives of Toxicology, 2015
    Co-Authors: Joanna S. Jaworska, Andreas Natsch, Cindy Ryan, Judy Strickland, Takao Ashikaga, Masaaki Miyazawa
    Abstract:

    The presented Bayesian network Integrated Testing Strategy (ITS-3) for skin sensitization potency assessment is a decision support system for a Risk Assessor that provides quantitative weight of evidence, leading to a mechanistically interpretable potency hypothesis, and formulates adaptive testing strategy for a chemical. The system was constructed with an aim to improve precision and accuracy for predicting LLNA potency beyond ITS-2 (Jaworska et al., J Appl Toxicol 33(11):1353–1364, 2013 ) by improving representation of chemistry and biology. Among novel elements are corrections for bioavailability both in vivo and in vitro as well as consideration of the individual assays’ applicability domains in the prediction process. In ITS-3 structure, three validated alternative assays, DPRA, KeratinoSens and h-CLAT, represent first three key events of the adverse outcome pathway for skin sensitization. The skin sensitization potency prediction is provided as a probability distribution over four potency classes. The probability distribution is converted to Bayes factors to: 1) remove prediction bias introduced by the training set potency distribution and 2) express uncertainty in a quantitative manner, allowing transparent and consistent criteria to accept a prediction. The novel ITS-3 database includes 207 chemicals with a full set of in vivo and in vitro data. The accuracy for predicting LLNA outcomes on the external test set ( n  = 60) was as follows: hazard (two classes)—100 %, GHS potency classification (three classes)—96 %, potency (four classes)—89 %. This work demonstrates that skin sensitization potency prediction based on data from three key events, and often less, is possible, reliable over broad chemical classes and ready for practical applications.