<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Implementation Models Application for IT Project Risk Management</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Ternopil National Economic University</institution>
          ,
          <addr-line>Ternopil</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article considers simulation models of risk analysis for IT projects. An article objective is research of simulation models and their application for risk management of information technology projects. An information system based on simulation models of risk analysis for IT projects is developed. The experimental approbation of the developed system is analyzed. One of the major tasks to address within project management is project risk management or project risk management. This task is not separate from most other project management functions. It projects are characterized by a large number of connected processes. The most expedient method for analyzing and managing IT projects risk, including the risks of observing calendar schedules, is imitation modeling. This method provides both accurate analysis and visual representation of alternatives to management behavior. Considered model allows constructing distributions of probability values for the most important parameters of the progress of the project, which in turn allows you to put and check stochastic hypotheses.</p>
      </abstract>
      <kwd-group>
        <kwd>Risk</kwd>
        <kwd>IT Project</kwd>
        <kwd>Simulation Model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>One of the major tasks to address within project management is project risk
management or project risk management. This task is not separate from most other project
management functions. When determining financial needs, calculating budget and
budget, preparing and concluding contracts, the task of protecting project participants
from various types of risks arises during the control of the project implementation.
Risks arise at all stages of the project activity, so the function of managing them is
relevant until the project closure. Project risk management permeates all areas of
project management activities without exception. This causes various difficulties
(organCopyright © 2020 for this paper by its authors. This volume and its papers are published under
the Creative Commons License Attribution 4.0 International (CC BY 4.0).
izational, personnel, psychological, etc.) to separate this function into an independent
element of the organizational structure of project management.</p>
      <p>
        Within the risk management of IT projects, the following issues are relevant [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ]:
• Classification of project risks;
• Methods of risk identification and assessment;
• Informational support of risk management;
• Monitoring and forecasting of risks;
• Risk mitigation technologies;
• Organization of risk management;
• Assessing the effectiveness and justification of the optimal level of risk
management costs.
      </p>
      <p>
        Within the theory and practice of project risk management, the most important are, in
particular, methods of risk assessment, monitoring and forecasting, risk management
information support [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ]. Risk management activities cover the following main
stages: identifying risk, assessing it, choosing a method and means of risk management,
preventing, controlling, financing risk, evaluating results. The project is a single
process consisting of a set of coordinated and controlled activities with start and end
dates, carried out to achieve a specific target that has limitations in terms of time, cost
and resources [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ]. The project operates in a defined environment containing
internal and external components that, in turn, take into account economic, political,
social, technological, regulatory, and cultural and other factors.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Works</title>
      <p>
        The project is always focused on the result, the achievement of the set goals, the
specific subject area. The authorized project management, project manager and project
team working under this management, other project participants who perform specific
activities and processes for the project, carry out the implementation of the project. As
part of the project, usually on a part-time basis, representatives of the linear and
functional divisions of companies responsible for performing their tasks, activities,
functions, including planning, management, control, organization, administration, and
other system-wide functions, may participate. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The managed parameters of the project are [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21">13-21</xref>
        ]:
• Scope of work and types of project work;
• Cost, project expenses;
• Temporary parameters, including terms, duration and reserves of work, stages,
phases of the project, as well as parameters of the relationship of works;
• Resources required for the implementation of the project, including: human or
labor, financial, logistical, subdivided into building materials, machines,
equipment, components and parts, and resource constraints;
• Quality of design decisions, required resources, project components, etc.
Project management is an activity aimed at implementing a project with the highest
possible efficiency with given time constraints, resources, and the quality of the
project outputs (documented, for example, in the terms of reference) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In order for
effectively project management constraints, methods of constructing and controlling
work schedules are used. To manage the resource constraints, the methods of forming
the financial plan (budget) of the project are used and, as the work is carried out,
monitoring is carried out in order to prevent costs from getting out of hand.
Appropriate resources are required to perform the work, using specific methods of human and
material resource management (for example, the responsibility matrix, resource
loading diagrams). Of the three main constraints, the most difficult is to control the
constraints on the project results. The problem is that tasks are often difficult to formulate
and control. In particular, quality management methods are used to solve these
problems. Thus, project managers are responsible for three aspects of project
implementation: timing, cost and quality of output. However, effective time management is the
key to success by all indicators. Project time constraints are often the most critical.
Where project deadlines are severely delayed, cost overruns and poor quality of work
are likely consequences. Therefore, in most project management methods focus is on
the work scheduling and monitoring of the calendar schedule [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27">22-27</xref>
        ].
      </p>
      <p>The main elements of a system of management in situations of uncertainty are:
identifying risk in alternatives and keeping it within acceptable levels; development of
specific recommendations aimed at eliminating or minimizing the possible negative
effects of risk [28-33]. The challenge of managing IT projects is to reduce the impact
of unwanted factors on the project lifecycle to produce the results closest to the
desired ones. For complex systems, where the problems of research and prediction of
states are mostly solved, depending on the chosen management strategies, such as
systems of analysis and management of project risks, there are difficulties in the
application of analytical models. They are caused by the following factors:
• Large projects have many links between processes;
• Real projects fall under the influence of random external and internal factors, the
accounting of which is not possible analytically;
• The possibility of comparison of the original with the model exists only at the
beginning and after the application of the mathematical apparatus, since the
intermediate results may have no analogues.</p>
      <p>In this regard, it is advisable to use a more flexible method, the simulation method.</p>
      <p>The model is presented in the form of an algorithm in which all the most essential
elements, connections in the system are determined and initial values of the
parameters corresponding to the initial moment of time are given.</p>
      <p>All further changes occurring in the system by the cause and effect law are
calculated by means of logical processing of data when executing this algorithm.</p>
      <p>This method does not require equations and does not require their solution, so it is
widely used in many areas of human activity without additional special knowledge.</p>
    </sec>
    <sec id="sec-3">
      <title>Materials and Methods</title>
      <p>During the simulation experiment, the computer simulates the functioning of the
system, process, or project and calculates the characteristics of the properties manifested
by the system. The simulation experiment is similar to a full-scale experiment, but
unlike a full-scale experiment, it allows you to experiment with systems that are
already missing or to predict the behavior of existing systems in the future, to study
their behavior in emergencies. It is cheaper and faster than full-scale experiments.</p>
      <p>
        Simulation modeling in the management of IT projects can be seen as a kind of
"simulator" that allows the manager of any level to predict the execution of the project
under the influence of various controlled and uncontrolled factors of the external and
internal environment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. With simple simulation modeling tools, it is possible to
calculate the likelihood of a particular result when accounting for the impact of
several factors. Efficiency and simplicity of the method allows varying a huge number of
situations at many combinations of initial conditions. The constant process of
accumulation of simulation results leads to the formation of a sufficiently large but finite
array of typical management situations with a finite number of standard behaviors. It
gives an opportunity to regulate certain steps in project management and allows
increasing efficiency and effectiveness of management activity.
      </p>
      <p>Simulation modeling is a versatile method that provides both accurate analysis and
visual display of alternative management behaviors. In addition, because of its
versatility, the ability to conduct numerous experiments and plan for various changes,
imitation models of complex systems are the most common. In the process of conducting
experiments on the simulation model, it is possible to make the following changes:
• In the model structure (add new items and links, remove others)
• Behavior models, model parameters;
• Parameters and laws of distribution of random factors;
• In time of values and external variables.</p>
      <p>Simulation models allow us to investigate system-wide properties, system behavior in
special situations, to find better values of system parameters that were free before the
start of the study, to predict system behavior over time. The algorithmic structure of
the simulation models facilitates the implementation of various schemes of
hierarchical subordination and coordination between the elements of the model.</p>
      <p>We distinguish the following eight stages of simulation.
3.1</p>
      <sec id="sec-3-1">
        <title>Defining the Goals, Objectives and Opportunities of Imitation</title>
        <p>The objective is external to the system under consideration, determined by the tactical
or strategic interests of the individual or group of persons for whom the study is being
conducted. Of particular interest is the situation where the ODA (administrator,
manager, and supervisor) solves some practical problem. The purpose of the study (or
each set of goals) is specified in the form of a set of tasks, the solution of which is
necessary and sufficient to achieve the goal. Usually, many tasks have a hierarchical
structure and can conveniently depicted as a tree of goals and tasks.</p>
        <p>Another factor that leads to the identification of this problem is the ability of the
researcher (theoretical, financial, time and others). Theoretical capabilities are those
data and research methods that a researcher can apply to solve a problem based on
their professional knowledge and experience. Financial capability limits the use of
tools, the volume of experiments and observations, the number of specialists and
support staff. Any research should done in specific timeframes, which significantly
depend on the scale of the problem and the depth of its study.</p>
        <p>In general, the purpose of the study can be decomposed as follows:
• Description of the functioning of the system (description of the system in the
framework of an already formulated problem, i.e. some aspect of the functioning of
the system);
• Forecast of functioning at different impacts (predicting the state of the system in
the future under different variants of internal and external influences (scenarios) on
the system);
• Search for the best version of the system.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Analysis of the System and Construction of its Conceptual Model</title>
        <p>The formulation of the research problem allows us to outline the boundaries of the
object, distinguishing it from the environment. The result of the systematic approach
to the problem is a conceptual model that reflects the concept of the study and is
determined by its goals and opportunities. The conceptual model contains:
• Description of the boundaries of the system;
• Set of system elements;
• The set of status indicators for each element;
• A set of links between elements of the system (if necessary, indicate the intensity
of resource and information flows);
• A list of processes that take place in the system;
• A list of internal and external influences on the system.</p>
        <p>The most common are verbal (verbal) descriptions of the conceptual model; various
diagrams, graphs, tables and charts are also used to provide the information in a clear
and concise manner. The conceptual model may contain formalized elements
(flowcharts, flow models, mathematical relations, etc.), which facilitates subsequent
steps of formalization.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Drawing up and Structuring of the Simulation Model</title>
        <p>The next stage of simulation is the formalization of the conceptual model that is
obtained, that is, the construction of a formal model. The general appearance of a formal
simulation model can defined by the ratios:</p>
        <p>x(t + ∆t) = x(t) + (∆t)ft ( x(t), u(t),ξ (t)), x(0) = x0 , t = 0,, T − ∆t,
Where
x(t) = ( x1(t),, xn (t)) is vector of state;
xi (t), (i = 1,, n) is this is the value of the indicators that characterize the state of
the system at time t; components of the state vector can take both quantitative
(numeric, symbolic, etc.) and qualitative values on some order scale;
u(t) = (u1(t),, um (t)) is vector of controlled effects;
ξ (t) = (ξ1(t),,ξ p (t)) is vector of not controlled effects;
f1( x(t), u(t),ξ (t)) is vector-function of the same dimension as x (t), which
determines the dynamics of the state vector under conditions of external influence;
x0 = ( x01,, x0n ) is the initial value of the state vector that is known;
T is the period during which the dynamics of the system are simulated;
∆t is modeling step (time difference between two consecutive states of the
system).</p>
        <p>Each of the vectors x(t), u(t) і ξ (t) can take values from some valid range,
which is determined accordingly X (t) , U (t) і Ξ(t) . Area of valid states X (t) is
characterizes the range of possible states of the system, the range of acceptable
controls, U (t) is characterizes the capabilities of the subject to control the system, and
the area Ξ(t) is characterizes the possible values of uncontrollable factors (in the
complete absence of information this area coincides with the whole space R p ).</p>
        <p>Depending on the purpose of the simulation, a system time is introduced to
simulate the course of time in a real system. There are two types of scales of model
(system) time: uniform and event (by actions). After setting the system state vector and
selecting a time step, the model is decomposed and its block design is determined.
The block principle of model building has a number of advantages, especially tangible
when creating complex imitation models.
3.4</p>
      </sec>
      <sec id="sec-3-4">
        <title>Software Implementation of the Simulation Model</title>
        <p>An integral part of applied systematic research is computer simulation experiments
with the model. The constructed formal model should presented in the form of a
program that implements the corresponding research algorithm: numerical solution of the
system of algebraic and differential equations, optimization problem, and transition of
the system from the initial state to the final state.
3.5</p>
      </sec>
      <sec id="sec-3-5">
        <title>Analysis and Correction of the Simulation Model</title>
        <p>Before using a built-in simulation model, the following questions must addressed:
• Select the values of structural and numerical parameters of the model;
• Make sure that with these parameter values, the model fits well with the modeled
system and describes it adequately (verification, verification of certain adequacy).
3.6</p>
      </sec>
      <sec id="sec-3-6">
        <title>Planning and Conducting Simulation Experiments</title>
        <p>In simulation modeling, the computer plays the role of an experimental institution,
giving the value of managed variables, uncontrollable factors, and the initial
conditions of the system trajectory. Since the number of possible combinations of
controlled and unmanaged external factors (even for a finite set of them) per system is
large, so is the role of planning simulation experiments.
3.7</p>
      </sec>
      <sec id="sec-3-7">
        <title>Processing and Analysis of Simulation Results</title>
        <p>Usually, the immediate results of the simulation are not yet suitable for solving the
tasks. They should systematized, submitted in a form that is more favorable for later
analysis, submitted to the ODA, and analyzed. Negative results can obtained at this
stage, which means that you need to correct the model and return to the previous
steps. The statistical methods of processing the simulation results include:
• Data capture and accumulation of modeling statistics;
• Determination of intervals for initial values;
• Identifying functional relationships between variables using regression analysis;
• Identification of the law of distribution on the histogram.</p>
        <p>Analysis of simulation results contains:
• Evaluation of the accuracy of the simulation experiment;
• Reducing the number of model parameters;
• Determination of intervals of change of parameters;
• Search for the source of errors;
• Removal of sharply rejected values;
• Selection of coordinate system for presentation of results, etc.
3.8</p>
      </sec>
      <sec id="sec-3-8">
        <title>Management and Support of Simulation Results</title>
        <p>
          The key to simulating systems is to solve practical problems. Therefore, the
simulation process does not end even after receiving, processing and interpreting the results
of the simulation ODA and experts. It is necessary to ensure the practical application
of these results in the management of an appropriate dynamic system. It is necessary
that the results can used not only for a single solution of the task, but also for the
multiple solution of a complex of problems related to this system [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
        </p>
        <p>In this way, simulation models allow us to investigate the behavior of large
systems, in particular, IT projects, that are not amenable to research by other methods.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Experiment</title>
      <p>
        We present information technology project as a certain sequence of wi ∈W processes.
The process is a set of interrelated or interrelated activities that converts the inputs to
outputs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Each process has its own defined start tiП ∈Т and finish tiЗ ∈T dates. In
addition, the beginning of some processes may depend on the end of the others that
proceed. Model of the IT project will be as a place in the form of network. Each
project will be marked with a network arc, which is focused on project implementation
and combines two stages of the project. The stages of the project are designated by
network nodes and establish a relationship of retraction among processes of IT
project. In other words, the stage is an event of start or end process.
      </p>
      <p>Building a network of project is based on the following rules:
• Each process is fed to one and only one arc;
• Each process is identified by two end nodes (a node of the beginning of the process
and its node completion);
• To maintain the correct relationship of transposing additional process, you must
specify:
o Which process is directly preceded by the accompanying process;
o What process should be performed after the added process is completed;
o What process competes, that is performed in parallel, with added process.</p>
      <p>The analysis of the risk of compliance with the deadlines of the project is to determine
the probability of which the project will executed at a certain time and vice versa,
how much time is required for successfully complete the project with the given
probability. It is obvious that the project will be successful, that is, in a predetermined
period, completed in case of completion of all the work of the project. The
performance of the project can be calculated by summing the longest by chronological
dimension of path (the critical way), which determines the maximum duration of the
project overall. The process is critical if it has no "allowance" for the time of its start
and completion. So that the entire project is completed immediately, it is necessary
that all the critical processes are started and end in a strictly defined time. For a
noncritical process, some deviations in its start time, but within certain boundaries –
means when the time of its start does not affect the duration of the entire project. To
perform the necessary calculations we define an event as a point on the timeline axis
where one process ends and another begins. We introduce the following designations:
• t′j is the earliest possible occurrence of the event j;
• t′j′ is the latest possible time of occurrence of the event j;
• D jq is process Duration ( j, q) .</p>
      <p>Calculation of the critical path occurs in two passages. During the first pass, the
earliest times of occurrence of events are evaluated, and for the second – the earliest times
of occurrence of the same events.</p>
      <p>І-st pass. The calculations start at node 1 and finish at last node n. Let’s assume,
that t′j = 0 , means, projects starts at zero time point. Then for each node j we define
nodes p,q...,v, which are directly related to node j by processes (p,j) (q,j)..., (v,j), for
which we already calculated the earliest time of corresponding events. The earliest
time of event j is calculated by formula: t′j = max{t′p + Dpj , tq′ + Dqj , tv′ + Dvj}.
Moving forward is finished, when value tn′ is calculated for node n.</p>
      <p>ІІ-nd pass. Calculations start at the last node n and end in node 1. Let’s assume,
that tn′′ = tn′ , means that earliest and latest time for finishing project are the same.
Then for each node j we define nodes p,q...,v, directly connected to node j by
processes (p,j) (q,j)..., (v,j), for which we already calculated latest time of corresponding
events. The latest time of event j is calculated by formula:</p>
      <p>t′j = min{t′p′ − Dpj , tq′′ − Dqj , tv′′ − Dvj}.</p>
      <p>Moving backward is finished, when value t1′′ is calculated for node 1.</p>
      <p>Process (i,j) will be critical, if following conditions are valid:
1. ti′′ = ti′ ;
2. t′j′ = t′j ;</p>
      <p>t′′ − ti′′ = t′j − ti′ = Dij .
3. j
Critical processes should form a continuous path across the entire network from the
initial event to the end. For the implementation of simulation model of IT Projects
Risk analysis is developed about a system that decides to determine the probability of
successful completion of the project at the specified dates and the time of completion
of the project at a specified probability of successful completion.</p>
      <p>The project is in the form of a network. An arc oriented in the direction of project
implementation marks each process of the project. Each event is set by a network
node and establishes a coding relationship among project processes. Its number, title
and duration characterize each process of the project.</p>
      <p>The duration of the processes can be deterministic, stochastic or probabilistic. In
the first case, the Critical Path Method is used, in the second – PERT (Program
Evaluation and Review Technique) method.</p>
      <p>In the case of probabilistic lifetime’s processes, for each of them it is necessary to
obtain probabilistic distributions of time of execution of this process. To obtain the
kind of law probabilistic distribution and its parameters, you can use several
methods. The First is to obtain the type and parameters of the distribution law by
questioning experts (subjective probabilities). The second is based on the plural of analogues
projects (objective probability). To determine the analogues projects must first
classify the simulated project. To do this, we use the database of already executed projects
and with the help of fuzzy classification; we divide the projects into classes by certain
signs. Later after conducting cluster analysis of a simulated project determine the
class to which it belongs and choose the rationing procedure for calculating the
parameters of the project.
5</p>
    </sec>
    <sec id="sec-5">
      <title>The Results</title>
      <p>For example, the developed system is to take the project given by the network in Fig.
1. Input the data in this system to enter the project's network model is the
characteristics of the project processes: process numbers and their names, the longest and
shortest duration. In order to establish relationships, project processes as input parameter
for each process are set numbers of processes without which the process is impossible
to start. This data is entered in the dialog box (Fig 2) in the table (Fig 3).
For all project processes the probabilistic distribution law is specified, which will be
used with a random values generator and the distribution parameters are necessary if
necessary. The number of settlement iterations is given separately (Fig. 4). To provide
random values by the selected distribution law, the generators of random quantities
are used.
In particular, the system provides random value generators to provide random values
after we have the law of distribution: Uniform distribution; Normal distribution (D);
β- distribution (parameters α and β); Exponential distribution; γ-distribution
(parameter α). The system works as follows. After specifying input data is generation of
random duration of work with a specified user. Generation occurs according to the
selected law distribution. Later passes the process of finding the critical path of the
project, in accordance with the given order of following works and their generated
lifetimes. The number of such transitions depends on the number of the settlement
iterations.</p>
    </sec>
    <sec id="sec-6">
      <title>Discussions</title>
      <p>For the project, the table (Fig. 3) and the distribution parameters (Fig. 4) critical path
be the following (Fig. 5). Then the system forms probabilistic distributions for the
found critical ways, analyzes them and depicts graphically (Fig. 6). The source data of
the system are the formed probabilistic distributions in both separate found critical
ways and for the project in general (Fig. 7).</p>
      <p>As a result of the system work, we can get an answer to the question:
• How long will the project is performed in advance of the given likelihood?
• What is the probability that the project may executed in a specified period?
For example: For a period of 72 time units, a project that is specified in Fig. 1 will be
finalized with a probability of 0.80373, and the completion of this project with the
probability of 0.9 is possible in the period not later than 73 time units (Fig. 8).</p>
      <p>The received information can used to develop specific recommendations for reducing
the impact of undesirable factors on the life cycle of the IT project in order to obtain
the results closest to the desired ones.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>It projects are characterized by a large number of connected processes. The most
expedient method for analyzing and managing IT projects risk, including the risks of
observing calendar schedules, is imitation modeling. This method provides both
accurate analysis and visual representation of alternatives to management behavior.
Considered model allows constructing distributions of probability values for the most
important parameters of the progress of the project, which in turn allows you to put
and check stochastic hypotheses. The project is in the form of a network. An arc
oriented in the direction of project implementation marks each process of the project.
Each event is set by a network node and establishes a coding relationship among
project processes. Its number, title and duration characterize each process of the project.
The duration of the processes can be deterministic, stochastic or probabilistic. In the
first case, the Critical Path Method is used, in the second – PERT (Program
Evaluation and Review Technique) method. In the case of probabilistic lifetime’s processes,
for each of them it is necessary to obtain probabilistic distributions of time of
execution of this process. To obtain the kind of law probabilistic distribution and its
parameters, you can use several methods. The First is to obtain the type and parameters
of the distribution law by questioning experts (subjective probabilities). The second is
based on the plural of analogues projects (objective probability). To determine the
analogues projects must first classify the simulated project. To do this, we use the
database of already executed projects and with the help of fuzzy classification; we
divide the projects into classes by certain signs. Later after conducting cluster analysis
of a simulated project determine the class to which it belongs and choose the rationing
procedure for calculating the parameters of the project. Further work in this direction
will focus on the research of situations in which every particular IT project process
may have a different kind of probabilistic runtime distribution.
28. Babichev, S.: An Evaluation of the Information Technology of Gene Expression Profiles
Processing Stability for Different Levels of Noise Components. In: Data, 3 (4), art. no. 48.
(2018). DOI: 10.3390/data3040048
29. Babichev, S., Durnyak, B., Pikh, I., Senkivskyy, V.: An Evaluation of the Objective
Clustering Inductive Technology Effectiveness Implemented Using Density-Based and
Agglomerative Hierarchical Clustering Algorithms. In: Advances in Intelligent Systems and
Computing, 1020, 532-553. (2020). DOI: 10.1007/978-3-030-26474-1_37
30. Shpak, N., Sorochak, O., Hvozd, M., Sroka, W.: Risk evaluation of the reengineering
projects: A case study analysis. In: Scientific Annals of Economics and Business, Volume 65,
Issue 2, 215-226. (2018)
31. Shpak, N., Dvulit, Z., Luchnikova, T., Sroka, W.: Strategic development of cargo transit
services: A case study analysis. In: Engineering Management in Production and Services,
Volume 10, Issue 4, 76-84. (2018). DOI: 10.2478/emj-2018-0024
32. Shpak, N., Kyrylych, T., Greblikaite, J.:Diversification models of sales activity for steady
development of an enterprise. In: Sustainability (Switzerland) Volume 8, Issue 4, 393.
(2016). DOI: doi.org/10.3390/su8040393
33. Shpak, N., Seliuchenko, N., Kharchuk, V., Kosar, N., Sroka, W.: Evaluation of product
competitiveness: A case study analysis. In: Organizacija, Volume 52, Issue 2, 107-126.
(2019). DOI: 10.2478/orga-2019-0008</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Zafeiropoulos</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Metaxiotis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Askounis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system</article-title>
          .
          <source>In: Information Management &amp; Computer Security</source>
          . (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Islam</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mouratidis</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weippl</surname>
            ,
            <given-names>E. R.:</given-names>
          </string-name>
          <article-title>An empirical study on the implementation and evaluation of a goal-driven software development risk management model</article-title>
          .
          <source>In: Information and Software Technology</source>
          ,
          <volume>56</volume>
          (
          <issue>2</issue>
          ),
          <fpage>117</fpage>
          -
          <lpage>133</lpage>
          . (
          <year>2014</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.infsof.
          <year>2013</year>
          .
          <volume>06</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Deng</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bian</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Constructing a risk management mechanism model of ERP project implementation</article-title>
          .
          <source>In: International Conference on Information Management, Innovation Management and Industrial Engineering</source>
          ,
          <volume>2</volume>
          ,
          <fpage>72</fpage>
          -
          <lpage>77</lpage>
          . (
          <year>2008</year>
          ). DOI:
          <volume>10</volume>
          .1109/ICIII.
          <year>2008</year>
          .79
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
          </string-name>
          , H.:
          <article-title>The Risk Management Modelling in Multi Project Environment</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>32</fpage>
          -
          <lpage>35</lpage>
          . (
          <year>2017</year>
          ). DOI:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2017</year>
          .8098730
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Chyrun L.:
          <article-title>Analysis and evaluation of risks in electronic commerce</article-title>
          .
          <source>In: CAD Systems in Microelectronics, 9th International Conference</source>
          ,
          <volume>332</volume>
          -
          <fpage>333</fpage>
          . (
          <year>2007</year>
          ). DOI:
          <volume>10</volume>
          .1109/CADSM.
          <year>2007</year>
          .4297570
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. ISO 9000-
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Chapman</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ward</surname>
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Project risk management: processes, techniques and insights</article-title>
          . Chichester: John Wiley &amp; Sons,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kahkonen</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <article-title>Integration of risk and opportunity thinking in projects</article-title>
          ,
          <source>Fourth European Project Management Conference, PMI Europe</source>
          <year>2001</year>
          ,
          <string-name>
            <surname>London</surname>
            <given-names>UK</given-names>
          </string-name>
          ,
          <fpage>6</fpage>
          -
          <lpage>7</lpage>
          June 2001.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chapman</surname>
            ,
            <given-names>R. J.:</given-names>
          </string-name>
          <article-title>The rules of project risk management: Implementation guidelines for major projects</article-title>
          .
          <source>Routledge</source>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Loosemore</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cheung</surname>
          </string-name>
          , E.:
          <article-title>Implementing systems thinking to manage risk in public private partnership projects</article-title>
          .
          <source>In: International Journal of Project Management</source>
          ,
          <volume>33</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1325</fpage>
          -
          <lpage>1334</lpage>
          . (
          <year>2015</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.ijproman.
          <year>2015</year>
          .
          <volume>02</volume>
          .005
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Elzamly</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hussin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A comparison of fuzzy and stepwise multiple regression analysis techniques for managing software project risks: Implementation phase</article-title>
          . In: International Management Review,
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>43</fpage>
          -
          <lpage>54</lpage>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Calkin</surname>
            ,
            <given-names>D. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finney</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ager</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thompson</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebert</surname>
            ,
            <given-names>K. M.:</given-names>
          </string-name>
          <article-title>Progress towards and barriers to implementation of a risk framework for US federal wildland fire policy and decision making</article-title>
          .
          <source>In: Forest Policy and Economics</source>
          ,
          <volume>13</volume>
          (
          <issue>5</issue>
          ),
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          . (
          <year>2011</year>
          ). DOI:
          <volume>10</volume>
          .1016/j.forpol.
          <year>2011</year>
          .
          <volume>02</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Trach</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Determination of Measures of Counteraction to the SocialOriented Risks of Virtual Community Life Cycle Organization</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1080</volume>
          ,
          <fpage>680</fpage>
          -
          <lpage>695</lpage>
          . (
          <year>2020</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -33695-0_
          <fpage>46</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Yurynets</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yurynets</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kis</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Risk Assessment Technology of Crediting with the Use of Logistic Regression Model</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>153</fpage>
          -
          <lpage>162</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beley</surname>
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>The information System of control risks</article-title>
          .
          <source>In: IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Aplications IDAACS</source>
          ,
          <fpage>270</fpage>
          -
          <lpage>274</lpage>
          . (
          <year>2001</year>
          ). DOI:
          <volume>10</volume>
          .1109/IDAACS.
          <year>2001</year>
          .942029
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          :
          <article-title>An approach to intelligent agent construction for determining the group of bank risk basing on ontology</article-title>
          .
          <source>In: Actual Problems of Economics (7)</source>
          ,
          <fpage>314</fpage>
          -
          <lpage>320</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noennig</surname>
            ,
            <given-names>J. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nykolyshyn</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pryshchepa</surname>
          </string-name>
          , H.:
          <article-title>Aviation Aircraft Planning System Project Development</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>315</fpage>
          -
          <lpage>348</lpage>
          . (
          <year>2020</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -33695-0_
          <fpage>23</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turok</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dyyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Information Model of the Tendering System for Large Projects</article-title>
          .
          <source>In: CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>1224</fpage>
          -
          <lpage>1236</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aliekseyeva</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Quality evaluation of information resources in webprojects</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          <volume>136</volume>
          (
          <issue>10</issue>
          ),
          <fpage>226</fpage>
          -
          <lpage>234</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Chereshnyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panasyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banasik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golyash</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Fuzzy-multiple Approach in Choosing the Optimal Term for Implementing the Innovative Project</article-title>
          .
          <source>In: International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <volume>533</volume>
          -
          <fpage>537</fpage>
          . (
          <year>2017</year>
          ). DOI:
          <volume>10</volume>
          .1109/IDAACS.
          <year>2017</year>
          .8095138
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalnichenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mezentseva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>The method of interaction modeling on basis of deep learning the neural networks in complex IT-projects</article-title>
          .
          <source>International Journal of Computing</source>
          ,
          <volume>19</volume>
          (
          <issue>1</issue>
          ),
          <fpage>88</fpage>
          -
          <lpage>96</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent System of Visual Simulation of Passenger Flows</article-title>
          .
          <source>In: CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>906</fpage>
          -
          <lpage>920</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torska</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobasyar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Application of the cellular automata for obtaining pitting images during simulation process of thei growth</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>242</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>306</lpage>
          . (
          <year>2014</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -02309-0_
          <fpage>32</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Varetskyy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molga</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatovych</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A new method of fingerprint key protection of grid credential</article-title>
          .
          <source>In: Advances in Intelligent and Soft Computing</source>
          ,
          <volume>84</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>103</lpage>
          . (
          <year>2010</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -16295-4_
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lendyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rippa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Simulation of Computer Adaptive Learning and Improved Algorithm of Pyramidal Testing</article-title>
          .
          <source>In: Intelligent Data Acquisition and Advanced Computing Systems</source>
          ,
          <volume>2</volume>
          ,
          <fpage>764</fpage>
          -
          <lpage>770</lpage>
          . (
          <year>2013</year>
          ). DOI:
          <volume>10</volume>
          .1109/IDAACS.
          <year>2013</year>
          .6663028
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gerasin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topalov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A simulation model for robot's slip displacement sensors</article-title>
          .
          <source>In: International Journal of Computing</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ),
          <fpage>224</fpage>
          -
          <lpage>236</lpage>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Tsague</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Twala</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Investigation of carrier mobility degradation effects on mosfet leakage simulations</article-title>
          .
          <source>In: International Journal of Computing</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ),
          <fpage>237</fpage>
          -
          <lpage>247</lpage>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>