Software risk management is one the key factors in software project management with the goal to improve quality as avoid vulnerabilities. The term defect refers to an imperfection that may arise because of reasons including programmers' skills, lack of suitable testing strategies, and many others. When actual results are different from expected result or meeting wrong requirement, it is called defect and it forms the basis of risk escalation in a software project which is obviously not accepted in any type of deployment. Making a reliable software should be risk free from any vulnerability. Along with reliability another issue arises is software quality which is a factor with software risk management. The quality of software is to reduce the occurrence of risks and defects with the objective to produce an effectual value software which is key point of consideration. In this article, is underlined the present assorted risk management strategies proposed and projected by a number of researchers and academicians on the different parameters using benchmark datasets from renowned sources of research.<\/p>","DOI":"10.4018\/ijaec.2020010104","type":"journal-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:13:19Z","timestamp":1574687599000},"page":"52-62","source":"Crossref","is-referenced-by-count":2,"title":["An Empirical Evaluation of Assorted Risk Management Models and Frameworks in Software Development"],"prefix":"10.4018","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0931-1118","authenticated-orcid":true,"given":"Alankrita","family":"Aggarwal","sequence":"first","affiliation":[{"name":"IKG Punjab Technical University, Jallandhar Punjab, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7911-9244","authenticated-orcid":true,"given":"Kanwalvir Singh","family":"Dhindsa","sequence":"additional","affiliation":[{"name":"Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib Punjab, India"}]},{"given":"P. K.","family":"Suri","sequence":"additional","affiliation":[{"name":"Kurukshetra University, Kurukshetra, India"}]}],"member":"2432","reference":[{"key":"IJAEC.2020010104-0","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2010.2041855"},{"key":"IJAEC.2020010104-1","first-page":"85","author":"A.Bertolino","year":"2007","journal-title":"Software testing research: Achievements, challenges, dreams. In 2007 Future of Software Engineering"},{"key":"IJAEC.2020010104-2","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2005.32"},{"key":"IJAEC.2020010104-3","first-page":"45","article-title":"In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux operating system","volume":"231","author":"F.Shahzad","year":"2013","journal-title":"Data Mining for Information Security"},{"key":"IJAEC.2020010104-4","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"IJAEC.2020010104-5","first-page":"129","author":"L. M.Goyal","year":"2016","journal-title":"Fuzzy Model Generation using Subtractive and Fuzzy C\u2013Means Clustering.In CSI Transaction on ICT"},{"key":"IJAEC.2020010104-6","article-title":"Risk Assessment Model to Predict Software Adoption.","author":"C.Jantarachit","year":"2017,","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS. Academic Press."},{"key":"IJAEC.2020010104-7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2738622"},{"key":"IJAEC.2020010104-8","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.61"},{"key":"IJAEC.2020010104-9","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146625"},{"issue":"4","key":"IJAEC.2020010104-10","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1007\/s10614-018-9821-x","article-title":"Monitoring the Impact of Economic Crisis on Crime in India Using Machine Learning.","volume":"53","author":"M.Mittal","year":"2019","journal-title":"Computational Economics"},{"issue":"1","key":"IJAEC.2020010104-11","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4018\/IJISMD.2019010103","article-title":"Adaptive Threshold Based Clustering: A Deterministic Partitioning Approach.","volume":"10","author":"M.Mittal","year":"2019","journal-title":"International Journal of Information System Modeling and Design"},{"key":"IJAEC.2020010104-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_8"},{"key":"IJAEC.2020010104-13","doi-asserted-by":"publisher","DOI":"10.1145\/1668862.1668866"},{"key":"IJAEC.2020010104-14","unstructured":"Mundada, D., Murade, A., Vaidya, O., & Swathi, J. N. (2016). Software fault prediction using artificial neural network and Resilient Back Propagation.International Journal on Computer Science and Engineering, 5(3)."},{"key":"IJAEC.2020010104-15","author":"N.Idika","year":"2007","journal-title":"A survey of malware detection techniques"},{"key":"IJAEC.2020010104-16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"IJAEC.2020010104-17","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2001.922409"},{"key":"IJAEC.2020010104-18","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.59"},{"key":"IJAEC.2020010104-19","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.cose.2014.10.011","article-title":"A framework for metamorphic malware analysis and real-time detection.","volume":"48","author":"S.Alam","year":"2015","journal-title":"Computers & Security"},{"key":"IJAEC.2020010104-20","unstructured":"Svendsen, H. (2017). Security Risk Assessment in Software Development Projects [Master's thesis]. NTNU."},{"key":"IJAEC.2020010104-21","first-page":"1465","article-title":"Identification of Patterns in Failure of Software Projects.","volume":"33","author":"B.Shehzad","year":"2017","journal-title":"Journal of Information Science and Engineering"},{"issue":"8","key":"IJAEC.2020010104-22","doi-asserted-by":"crossref","first-page":"384","DOI":"10.4236\/jsea.2015.88038","article-title":"A framework for software defect prediction using neural networks.","volume":"8","author":"V.Vashisht","year":"2015","journal-title":"Journal of Software Engineering and Applications"},{"key":"IJAEC.2020010104-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.056"}],"container-title":["International Journal of Applied Evolutionary Computation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=243459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:55:10Z","timestamp":1651870510000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJAEC.2020010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijaec.2020010104","relation":{},"ISSN":["1942-3594","1942-3608"],"issn-type":[{"value":"1942-3594","type":"print"},{"value":"1942-3608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}