Page 200 - DCAP304_DCAP515_SOFTWARE_PROJECT_MANAGEMENT
P. 200

Software Project Management




                    Notes          Techniques

                                   Risk monitoring can typically be performed using the following techniques:
                                      Assessment of current situation
                                      Auditing of current situation

                                      Cross Functional  Teams  to  provide multiple  viewpoints  so  that all  aspects  of  risk
                                       management can be monitored
                                      Inspecting of current development or usage tasks

                                      Interviews with  stakeholders, domain  experts, and members of  the development  and
                                       operations organizations
                                      Incremental Development of the risk monitoring report

                                      Iteration of the risk monitoring report
                                      Observation of current development or usage tasks
                                      Parallel Development of the risk monitoring with other tasks
                                      Reviewing of current development situation

                                   Work Products

                                   Risk monitoring typically results in the production of all or part of the following work products:
                                      Risk monitoring Report

                                   Guidelines

                                      Risk monitoring is an ongoing task that is not completed until the endeavor is finished.

                                   10.5.4 Risk Mitigation


                                   Intelligent Risk Mitigation Solutions

                                   Acxiom’s suite of advanced, information-based risk management solutions help organizations
                                   manage  risk and  make intelligent  decisions.  Acxiom’s  accurate, comprehensive database
                                   maximizes information currency and helps keep companies and their customers secure. Specific
                                   uses include fraud prevention, investigation, verification and authentication of individuals, and
                                   debt recovery.
                                   Our portfolio includes:

                                      Fraud prevention solutions for  the financial, insurance, health care, higher education,
                                       automotive, and telecommunications industries.

                                      Real-time transaction monitoring and detection for fraudulent behaviors.
                                      Investigative tools for governmental agencies, law enforcement and security firms.
                                      Debt-recovery solutions for financial institutions.

                                      A precise, accurate service for identifying  the best address and telephone number  for
                                       individuals.





          194                               LOVELY PROFESSIONAL UNIVERSITY
   195   196   197   198   199   200   201   202   203   204   205