Page 200 - DCAP304_DCAP515_SOFTWARE_PROJECT_MANAGEMENT
P. 200
Software Project Management
Notes Techniques
Risk monitoring can typically be performed using the following techniques:
Assessment of current situation
Auditing of current situation
Cross Functional Teams to provide multiple viewpoints so that all aspects of risk
management can be monitored
Inspecting of current development or usage tasks
Interviews with stakeholders, domain experts, and members of the development and
operations organizations
Incremental Development of the risk monitoring report
Iteration of the risk monitoring report
Observation of current development or usage tasks
Parallel Development of the risk monitoring with other tasks
Reviewing of current development situation
Work Products
Risk monitoring typically results in the production of all or part of the following work products:
Risk monitoring Report
Guidelines
Risk monitoring is an ongoing task that is not completed until the endeavor is finished.
10.5.4 Risk Mitigation
Intelligent Risk Mitigation Solutions
Acxiom’s suite of advanced, information-based risk management solutions help organizations
manage risk and make intelligent decisions. Acxiom’s accurate, comprehensive database
maximizes information currency and helps keep companies and their customers secure. Specific
uses include fraud prevention, investigation, verification and authentication of individuals, and
debt recovery.
Our portfolio includes:
Fraud prevention solutions for the financial, insurance, health care, higher education,
automotive, and telecommunications industries.
Real-time transaction monitoring and detection for fraudulent behaviors.
Investigative tools for governmental agencies, law enforcement and security firms.
Debt-recovery solutions for financial institutions.
A precise, accurate service for identifying the best address and telephone number for
individuals.
194 LOVELY PROFESSIONAL UNIVERSITY