Abstract

Nowadays, information technology plays a significant role in increasing the efficiency of any company by focusing its attention on market trends, reducing and increasing competition for maximum profit. Based on the results of the analysis of scientific works, the author concluded that the existing information technologies in project risk management can be partially applied to manage the risks of IT projects, taking into account threats and opportunities. Therefore, this study is dedicated to solving the scientific and practical problem of developing information technology for risk management in such projects, which would consider the impact of threats and opportunities. The developed structure of the information base of the integrated management of threats and opportunities in the IT project will make it possible to implement risk management models and methods toensure the accumulation of statistical and expert information on the management of threats and opportunities. The structure of the information technology of integrated management of threats and opportunities in the IT project, as well as the scheme of its implementation, have been developed, which in turn will enable the project manager and his team to implement the relevant models and methods developed by the author in order to ensure the successful and timely implementation of the project to meet the needs of project stakeholders. The given algorithm for filling the information technology of integrated management of threats and opportunities in the IT project will allow managing risks taking into account threats and opportunities in accordance with the developed models and methods of integrated management of threats and opportunities in the IT project, which differs from modern approaches to risk management in project management methodology and programsand will reduce negative impacts and take into account positive impacts in such project. Thus, the obtained results make it possible to increase the effectiveness of risk management in IT projects, taking into account the impact of threatsand opportunities on them.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.