Elicitation Techniques and System-Specific Risks Quiz
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are some elicitation techniques that can be used to identify system-specific risks?

The elicitation techniques reviewed in Chapter 2 include using scenarios to raise 'WHAT IF' questions and point out failure situations, systematically exploring potential deviations, and applying knowledge reuse techniques from previous experiences.

How should the identified risks be assessed?

The identified risks should be assessed in terms of the likelihood of their occurrence and the severity of their possible consequences in order to prioritize the risks and determine an appropriate response for likely risks that have severe consequences.

Why may scenarios be used in the identification of system-specific risks?

Scenarios may be used to raise 'WHAT IF' questions and point out failure situations, as well as to systematically explore potential deviations and expected interactions that do not occur under different conditions.

What is the purpose of using knowledge reuse techniques in risk identification?

<p>Knowledge reuse techniques may be applied to risks previously experienced with similar systems or within the same organization.</p> Signup and view all the answers

Why are group sessions specifically dedicated to the identification of project-specific risks?

<p>Group sessions may be specifically dedicated to the identification of project-specific risks to facilitate the collaborative identification process and gather diverse perspectives.</p> Signup and view all the answers

What are the limitations of using risk assessment tables for prioritizing risks?

<p>The severity values are coarse-grained and subjective, and the likelihood of consequences is not taken into account.</p> Signup and view all the answers

How is risk exposure estimated using numerical scales for risk estimation and companion?

<p>Risk exposure for a risk with independent consequences is estimated as $Exp(r) = (c) \times 5(c)$, where $I(c)$ and $S(c)$ are the likelihood and severity of consequence $c$.</p> Signup and view all the answers

What is the alternative to using risk assessment tables for prioritizing risks?

<p>Using numerical scales for risk estimation and companion, where the likelihood of a risk and the likelihood of a consequence are estimated in a discrete range of probability values and the severity of a consequence is estimated on a scale of 1 to 10.</p> Signup and view all the answers

Why are the conclusions from the technique of using risk assessment tables limited?

<p>The severity values are coarse-grained and subjective, and the likelihood of consequences is not taken into account.</p> Signup and view all the answers

How are severity levels and likelihood of consequences accounted for in quantitative risk assessment?

<p>Severity levels and likelihood of consequences are accounted for by estimating the risk exposure using numerical scales, where the likelihood and severity of consequences are quantitatively assessed.</p> Signup and view all the answers

More Like This

Requirement Elicitation Techniques
24 questions
Photo-Elicitation Techniques in Marketing
10 questions
Requirements Engineering Overview
21 questions
Use Quizgecko on...
Browser
Browser