Abstract
By analyzing three parts of interval valued intuition fuzzy sets (IVIFS), we provide a novel framework constructing risk function with IVIFS information for risk analysis of outsourced software project. First, we introduced some risk factors of outsourced software project according to their hierarchical levels, and present a general risk function model. And then, some useful mathematical properties of this risk function are proved. Based on the mathematical properties of general risk function, all these presented specific risk functions are classified into four types: incentive function, punitive function, incentive-punitive function and equilibrium function. Especially, two kinds of incentive-punitive risk functions are focused on and a construction method for them is proposed. Finally, an application example for the risk assessment of outsourced software project illustrates the use of this decision making method. The simulation results show that these functions are effective in risk prediction.
Keywords
Introduction
Since Zadeh first introduced the concept of fuzzy set (FSs) [11], many extensions of the theory have been proposed, such as intuitionistic fuzzy set (IFS) [10], interval-valued intuitionistic fuzzy set (IVIFS) [9], interval-valued fuzzy set (IVFS) etc., which generalized FS theory. The introduction of IFS and IVIFS attracted many scholars to participate in the research. Some scholars applied them to multi attribute decision making and pattern recognition, and presented many order operators, similar operators, and distance measures. Some classical decision operators are gradually developed. According to Atanassov, two order operators derived from membership and non-membership degree were introduced. Hence, Chen & Tan [16] proposed a dominant order operator, Hong & Choi [5] introduced a clarity ordering operator,Xu & Xia [14, 28] presented a relative orderingoperator, Wei et al. [4] discussed how to construct order operator using distance, Zhang et al. [24–26] introduced the concept of order maintaining, and applied it to the construction of order operators and distance measures.
Though many researchers studied IFS theory, few of them applied IFS to the study of risk assessment for software project development. Taking into account the fuzziness of Likert scale in outsourced software risk evaluation, it is necessary for us to introduce IFS method in this study.
In the research of software development risk, early scholars majorly focused on principles [2] and project risk index system [1–3, 29]. Wallace, Keil, and Nidumolu et al. studied the constitute of output & decision attributes for software project risk, and analyzed the effect of condition attributes to decision attributes qualitatively [12, 17]. Jones, Xu and Khoshgoftaar et al. studied the assessment and control of software risk [1, 29]. Hu, Zhang, and Nagi et al. utilized Bayesian networks to construct causal analysis framework for software project risk [21, 22], and predicted the risk by supervised combinational model [19, 20]. In fact, for the research of unsupervised model applied to software project risk prediction, only conventional clustering method and fuzzy neural network are presented [12, 30]. Based on the research result on risk index systems and IVIFS method, Zhang et al. presented a semi-supervised method and a dynamic method in 2016 [23, 27].
In this paper, we propose some risk functions of outsourced software project according to the analysis of the construction on IVIFS, and apply them to risk assessment of outsourced software development.
Firstly, we introduce the definition and some conventional order operators of IVIFS. Secondly, by analyzing the component of IVIFS, we present some risk functions with IVIFS information and their mathematical properties. Thirdly, the constructions of intermediate separation incentive-punitive and extreme separation incentive-punitive risk functions are introduced, respectively. Finally, we apply the conventional order operators and the presented risk functions to risk evaluation of outsourced software project development. The experimental results illustrate that all the proposed functions are valid methods.
Conventional weighted order operators
Where M
A
(x) : X ⟶ [0, 1] , N
A
(x) : X ⟶ [0, 1] , H
A
(x) : X ⟶ [0, 1] with the condition:
Where M A (x), N A (x) and H A (x) are the interval of membership degree, non-membership degree and hesitant degree of x to A, respectively. According to the statistical background of IVIFS, it is well known that membership interval refers to the range of supporters, non-membership interval the scope of opponents, hesitation interval the range of the neutral.
Obviously, the more supporters and the less opponents means the larger the membership degree and the smaller the non-membership degree for IVIFS, Thus, A being contained in B indicates that the supporters of A is less than that of B, and the opponents of A more than that of B.
From IVIFS, two weighted operators of membership and non-membership degree are defined:
Chen & Tan [16] presented a weighted dominant ranking operator as follows:
Hong & Choi [5] proposed a weighted clarity operator according to the sum of positive and negative comments:
Where and are defined in Definition 1.
Xu presented the following formula (6) [14, 28]:
Xu proposed four operators from Equation (6) using four distance formulas.
In the following, we will construct some risk functions on outsourced software project with IVIFS information. We design a risk attribute framework.
We have collected more than 600 papers in this field since 1990s. According to our research in the past 10 years, we know that there are many risk factors of outsourced software project, involving three aspects: Contractee risk, contractor risk and the complexity of the project. Many risk factors has a significant positive correlation effect on the development of the outsourced software project, such as the standard level of project development, practical development experiment, communication skills and collaboration level between contractee and contractor, etc.
Next we will introduce some risk assessment methodology of outsourced software project with IVIFS information. Taking into account the specialty and particularity of the project development process of outsourced software, we utilize three first-level factors to analyze the risk of project development according to references [1–3, 29]: contractor risks, customer risks and project complexity risks. And Table 1 contains all the second-level risk factors.
Risk factors of outsourced software project analysis
Risk factors of outsourced software project analysis
According to previous research [19–22, 30], we use 23 second-level risk factors with significant influence, 11 attributes of them belong to project complexity risks, 7 of them customs risks, and 5 them of them contractor risks. From reference [27], based on a survey data set focused on some small and medium companies undertaking software outsourced project from USA, Japan, and Southeast Asia, we analyzed all second-level risk factors by using supervised structural equation modeling, among them 14 secondary significant indexes (p < 0.05) with boldness are selected to form the most important attribute set.
For example, considering the project manager of contractor risk, we adopt 5-level Likert scale according to years of experience in software development, the number of software development, and cooperation and communication level. Obviously, for a project manager, the more experience and development ability he has, the less development risk will be. IF a manager is very excellent in development, his IVIFS values will be {< x, [1, 1] , [0, 0] , [0, 0] > |x ∈ X} over x, where x is project manager attribute. Thus, his development risk will reach the minimum 0. For the worst manager, his development risk will be the largest.
Target attribute is composed of 8 output attributes: Function, Performance, Information Quality, Maintainability, Satisfaction (Customer and User), Company Profits, Completion Degree in Time, Completion Degree in Budget [12, 17]. The options are Yes or No. A project is success project when 8 options are all Yes.
In present studies [19, 30], we have proposed a specific risk analyzing framework for the project development of outsourced software, and made use of Bayesian networks to analyze its development risk.
Where the definition is the same with Definition 1. And M A (x) indicates the support degree of the outstanding performance with regard to project A in factor x, while N A (x) the opposition degree of the outstanding performance with respect to project A in factor x. For example: S = < x,, [0, 0], [0, 0] > | x ∈ X means M S (x) = [1, 1], N S (x) = [0, 0] and H S (x) = [0, 0]; F = < x, [0, 0], [1, 1], [0, 0] > | x ∈ X means M F (x) = [0, 0], N F (x) = [1, 1] and H F (x) = [0, 0]. Where S means that everyone thinks that all the influence factors perform excellently in this project, thus it represents a successful project (Membership degree intervals are all [1, 1]). On the contrary, F shows a failure project because its influence factors perform the worst (Non-Membership degree intervals are all [1, 1]). According to IVIFS, we provide a general risk function (8) for risk factor x ∈ X.
Where are introduced in Definition 1.
However, it is hard to find a suitable elementary function and construct the related risk function from formula (7). Thus, we should seek some more concise expressions of risk functions. Considering the correspondence between variables, we define:
Hence we obtain:
are equivalent to . Thus, we only prove and can be expressed by According to , we know that and can also be represented by easily. Therefore, Equation (8) is equivalent to Equation (10).
If R* (a1, a2, a3, a4, a5, a6) satisfy: For each a
k
, then we obtain:
Theorem 2 shows that monotone increasing function can maintain the order of IVIFS, which means that if A and B are two IVIFSs and A ⊆ B, and the risk function is a monotone increasing function, then we conclude that the risk of A is more than that of B.
R* (a1, a2, a3, a4, a5, a6) ≤ R* (b1, b2, b3, b4, b5, b6) . For two IVIFSs A & B, and A ⊆ B is equivalent to M
A
(x) ≤ M
B
(x), N
A
(x) ≥ N
B
(x), then
Theorem 1 demonstrates that Formula (8) is equivalent to Formula (10), which shows that Equation (10) can be applied to construct risk function.
Theorem 2 proves that each monotonically increasing function in [0, 1]6 can be used as a risk assessment model.
Let
Where R(a k ), the component function of R* (A (x)), is an increasing function in the domain [0, 1].
According to Theorem 2, each monotonically increasing function in [0, 1]6 is with the condition being a risk function. If R (a k ) is a monotonically increasing function in [0, 1], then R* (A (x)) is a risk function. If R (a k ) is a linear function, then R (a k ) changes evenly followed with a k . Thus it is an equilibrium risk-function. If R (a k ) is a monotonically increasing convex function, then it is easy to infer that when a k approaches boundary value 0, the risk function value is sharply reduced to 0 and the possibility of success of the project greatly increased. Hence, we define it incentive risk-function. Similarly an increasing concave function means a punitive risk-function.
When 0 ≤ a k ≤ a, when a ≤ a k ≤1, then R* (A (x)) is an extreme separation incentive-punitive risk function.
Figure 1a shows an example of intermediate-separation incentive-punitive risk function. For this function, when the risk variable a k approaches boundary value (0 or 1), the risk function value changes slowly, and the discrimination degree between every two IVIFSs is small. When the risk variable approaches the middle 0.5, the risk function value changes quickly and the discrimination degree between every two IVIFSs is large. On the contrary, Fig. 1b illustrates an example of extreme-separation incentive-punitive risk function. It means that when the risk variable a k approaches boundary value (0 or 1), the risk function value changes quickly and the discrimination degree between every two IVIFSs is large. When the risk variable approaches the middle 0.5, the risk function value changes slowly, and the discrimination degree between every two IVIFSs is small. From Fig. 1, the former is suitable for stimulating the separation between high-risk and low-risk from middle part, while the latter mainly separate the high-risk and low-risk in the two endpoints 0 and 1.

Classification of incentive-punitive risk function. (a) Intermediate separation function. (b) Extreme separation function.
Based on Equation (11), we introduce a component function (12) of the incentive-punitive risk function R* (A (x)) as follows.
According to Definition 8, and then we obtain:
Assume that f (a
k
) satisfies:
Hence we have:
Where
From equation (14), we have
Thus, we draw a conclusion under the precondition of Lemma 1:
When β < 1, if 0 ≤ a k < 0.5 then , and if 0.5 < a k ≤ 1 then . It denotes an intermediate separation risk function, as is shown in Fig. 1a.
When β > 1, if 0 ≤ a k < 0.5 then , and if 0.5 < a k ≤ 1 then . It denotes an extreme separation risk function, as is shown in Fig. 1b.
Therefore, we know that if the components function of R (a k ) satisfies Lemma 1:
then R* (A (x)) is an incentive-punitive risk function.
Obviously, when β = 1, R (a k ) = a k , R* (A (x)) is a linear function of the equilibrium change. The other two cases have been analyzed from Lemma 1 above.
From Fig. 1, the following properties are obvious. Compared with traditional linear risk function, the risk function value is significantly changed in the middle of the attribute value for intermediate separation incentive-punitive risk function (in Fig. 1a), and the deviation degree of risk will be larger. For conditional attributes, the difference of risk values based on most of good performance projects and poor performance projects are widen and significantly distinguished, hence the variance, standard deviation, and range of intermediate separation risk function will be large than that of linear risk function.
For the extreme separation incentive-punitive risk function (in Fig. 1b), its properties are different from the properties of intermediate separation risk function and linear risk function. According to Fig. 1b, only the extreme value will be increased or decreased sharply, which means that only the difference between very good performance projects and the very terrible performance projects are widen and significantly distinguished by the risk values, while most risk values of all projects may be changed slowly. Thus, the variance, standard deviation, and range of intermediate separation risk function will be smaller than that of linear risk function and intermediate separation incentive-punitive risk function.
If β = 1, we have and , which means a liner risk-function for risk attribute a k and we call it an equilibrium risk-function.
Next we introduce some component functions meeting the needs of Lemma 2 and construct their incentive-punitive risk functions , we adopt β = 0, 0.5, 1, 2, 3:
Intermediate separation incentive-punitive risk function:
Extreme separation incentive-punitive risk function:
Equilibrium risk-function:
Obviously, for two IVIFSs A & B, if A ⊆ B, then .
According to formula (9), we get
From formulas (17, 22), we obtain the results below:
From formulas (17, 18), we get the result as follows. Similarly, we get the following Table 2.
Results based on risk functions and conventional order operators of IVIFS
Results based on risk functions and conventional order operators of IVIFS
Experimental result analysis.
In Table 2, R M represents the weighted membership and R CT means a superiority sorting function with the difference of Membership minus non-membership. Therefore, for R M & R CT , the larger the value of them, the smaller the software project risk and the higher the development success rate. On the contrary, for each i > 0, is risk function, which means that it possess exactly the opposite properties with R M & R CT : the smaller their values, the smaller the software project risk and the higher the development success rate. R NM is composed by weighted non-membership degree, and it means that R NM is also a kind of risk function as .
According to Table 2, we obtain:
Thus we get A2 ≻ A1, A5 ≻ A1, A3 ≻ A1, A3 ≻ A4 .
For example, from the membership degree R M (A5) > R M (A1) = R M (A2) and the non-membership degree R NM (A2) < R NM (A5) < R NM (A1), we obtain A5 ≻ A1, A2 ≻ A1. Similarly, we have A3 ≻ A1, A3 ≻ A4. Hence, the optimal decision-making is from set A2, A3, A5.
From Table 2, R
CT
, R
NM
, R1*, R0* and R0.5* satisfy A2 ≻ A1, A3 ≻ A1, A5 ≻ A1, A3 ≻ A4 . While R
M
, R
HC
don’t satisfy A3 ≻ A4 and A2 ≻ A1, R2* and R3* don’t satisfy A3 ≻ A4. Discussion.
From Example 1, for contractor risks (x1) and customer risks (x2), A5 is outstanding, while it performs the worst in project complexity risks (x3).
A3 and A4 show their advantages in x1 and x3, but A4 is terrible in x2. In general, A3 performs well in all three respects, and the overall performance of A2, A3. and A4 are homogeneous in all attributes.
However, A1 and A5 show extreme performance on their attributes.
Obviously, A3 and A5 are closer to successful projects while A1 failure project.
Considering , Let:
Where T means all the membership degree values of attributes x1, x2, x3 are 1 and all the non-membership degree values of attributes x1, x2, x3 are 0. Thus the risk of project T is 0 and T can be defined as a successful project. On the contrary, the membership degree values of attributes x1, x2, x3 for F are 0 and its non-membership degree values 1. Therefore, F is regarded as a failure project and its risk will be the maximum 6. M represents middle level of risk. By calculating , we obtain Table 3.
Risk level and deviation of several risk functions with IVIFS information
Risk level and deviation of several risk functions with IVIFS information
According to A
i
(x), most of the attribute values
Similarly, When 0 ≤ β < 1, all the risk values will be decreased, and the higher the degree of membership is, indicating that the closer to success the project is and the rapid decline the project risk will be.
When β = 1, the risk values is changed linearly.
Discussion on the risk value deviations of all the risk functions in Table 3. From Table 3, we know that the deviation of the extreme separation risk functions will be less than that of the equilibrium risk function, and the values calculated by the equilibrium risk function are smaller than that by the extreme separation risk functions, which is the same as the properties deduced in theory.
We draw a conclusion: For if 0 ≤ β j < 1 < β l ≤ 3, , the deviations of are less than that of , and the deviations of are less than that of .
In our survey, we collect 260 valid and complete individuals, 191 of them are success and 69 failure. The average accuracy of 10 tests is shown in Table 4. The algorithm steps are shown below:
Average accuracy of IVIFS
Average accuracy of IVIFS
In the experiment, we sample 200 individuals to be training sample and the rest testing sample.
The data set consists of 14 significant attributes with 5 level scale, we use triangle module to define membership, non-membership, and hesitation interval. For all risk factors, we use the equal weights to construct risk function.
Considering that the success rate of project is 26.5%, 53 individuals with the lowest risk are regarded as success projects in training example.
According to the threshold value, calculate the risk of testing individuals and classify them.
In Table 4, all the prediction accuracy of risk operators maintaining order are better than that with no order. For example, all R* are better than R HC .
Based on a decade research on risk index system of outsourced software project, 14 important attributes are extracted as the basis for modeling the risk operator. According to their mathematical properties, we propose a general risk function derived from IVIFS and software engineering, and divide them into 4 categories: incentive function, punitive function, incentive-punitive function and equilibrium function. This paper focuses on two kinds of incentive-punitive risk functions, and applies them to risk assessment of outsourced software project. In theory, we prove that if the risk function is a monotonically increasing function, then it will satisfy all the conditions as a risk function. By comparing the presented risk function with some conventional operators including R M , R NM , R CT and R HC , we conclude that it is easy to construct a reasonable and appropriate risk assessment model according to new risk functions by a combination of vectors maintaining order relations. And the experimental results illustrate the effectiveness of the presented risk function assessment model. However, Since the new risk function is suitable for special cases, the overall recognition effect is slightly inferior to the equilibrium risk function for the specific condition is not satisfied. The determination of weights is also an interesting topic. Moreover, the model can be extended to hesitant fuzzy set as [7].
Footnotes
Acknowledgments
This paper is funded by the National Natural Science Foundation of China (No. 71271061), Philosophy & Social Science Project (No. GD12XGL14) & Soft Science Project (No. 2015A070704051) & Natural Science Projects (No. 2014A030313575, 2016A030313688) of Guangdong Province, Science & Technology Fund of Guangdong Education Department (No. 2013KJCX0072), Philosophy & Social Science Project of Guangzhou (No. 14G41), Special Innovative Project (No. 15T21) & Key Team (No. TD1605) & Major Education Foundation (No. GYJYZDA14002) & Higher Education Foundation (No. 2016GDJYYJZD004) of Guangdong University of Foreign Studies, Climbing Plan Foundations of Guangdong (No. pdjh2015a0180, pdjh2016a0166).
