SlideShare a Scribd company logo
1 of 24
Metrics for Project Size
Estimation
Accurate Estimation Satisfactory Estimation
of of
Problem Size effort, time, cost
For estimating metric or unit required
Project size to express project size
Project Size
IS NOT:
- Bytes source code occupies, executables
occupy
IS:
- Measure of problem complexity in terms of
time and effort required to develop product
LINES OF CODE (LOC)
• The simplest among all metrics available to
estimate project size
• Project size estimated by counting the number of
source instructions
• Lines used for commenting, header lines ignored
• To find LOC at the beginning of a project divide
module into sub modules and so on until size of each
module can be predicted
Disadvantages of LOC
# Gives a numerical value of problem size that vary
widely with individual coding style
If( x>y ) x > y ? x++ : y++;
then x++;
else
y++;
# Good problem size Overall complexity of
Problem + Effort needed
# Effort needed for analysis, design , coding,
testing etc (not just coding)
Disadvantages of LOC
# Larger Code size  Better Quality?
# Impact of Code Reuse on LOC ?
#include <stdio.h>
void main(){
…………
}
# Logical Complexity?
Complex Logic More Effort
Simple Logic Less Effort
while(i<4){ printf(“testing”);
printf(“testing”); printf(“testing”);
} printf(“testing”);
printf(“testing”);
stdio.h
# Accurate computation of LOC only after
project completion!!
Disadvantages of LOC
Function Point Metric
Size of software product computed directly from problem
specification
Size of software = number of different functions/ features it
supports
Input Output
Many features Larger size
Apart from that size depends on
- number of files
- number of interfaces
- number of enquiries
Function
Size of Function Point (FP)= Weighted sum of
these five problem characteristics
1. Number of inputs: Data items input by user
(Group of user inputs taken together)
Employee Account
- Name - Account Name
- Age - Account Number
- Sex - Account Open Date
- Address
Function Point Metric
2. Number of Outputs: Reports, Screen outputs,
Error Messages
3. Number of inquiries: Interactive queries made
by users. user system
4. Number of Files: Logical files e.g. data
structures, physical files
5. Number of interfaces: Interfaces for
exchanging information e.g. disk, tapes,
communication links
Function Point Metric
Software Risks
Anticipated( predict) unfavorable event
When risk turns to reality it hampers successful and
timely completion of project
Anticipate/Identify risks
Contingency Plans
Risky Component
Employee Turnover
Give incentive to employees
Outsource/ Third party
Software Risks
Basic Characteristics of Risks:
i. Uncertainty: Risk may or may not happen
ii. Loss: If risk becomes a reality losses will occur
Risk Management
Risk Identification
Risk Assessment
Risk Containment
i. Risk Identification
- Early identification is important
- Equivalent to listing your nightmares
- To systematically identify important risks
categorize them into classes
Project Risks Business Risk Technical Risks
Types of Risks
a. Project Risk
- Budgetary, Schedule, Personnel,
Resource, Customer related
Schedule Slipping
Cause
- Intangible nature of software
Possible Solution
- Increase visibility thru documentation
b.Technical Risk
- Ambiguous, incomplete, changing
specification
- Potential Flaws in Design
- Implementation
- Interfacing
- Testing, maintenance
- Technical uncertainty/obsolesce
c.Business Risks
- Excellent product but no one wants!!
- Losing budgetary commitment
- Losing personnel commitment
For forseeing and identifying risks
Company Disaster List
All bad events that have happened
contains
prepare
ii. Risk Assessment
Rank risk in terms of their damage causing
potential
The overall risk exposure, RE
Risk Exposure (RE) = r x c
Here, r is probability of occurrence for a risk, and c
is cost to project should risk occur.
ii. Risk Assessment
• Risk exposure can be computed for each risk in
risk table, once an estimate of cost of risk
is made.
• The total risk exposure for all risks (above
the cutoff in the risk table) can provide a
means for adjusting the final cost estimate for a
project.
Case Study
For example, assume that software team defines a project risk in
as follows:
Risk Identification: Only 70 percent of the software components
scheduled for reuse will, in fact, be integrated into the application.
The remaining functionality will have to be custom developed.
Risk Probability: 80% (likely)
The average component is 100 LOC and local data indicate that
the software engineering cost for each LOC is $14.00
Risk Exposure. RE = ?
Case Study
For example, assume that software team defines a project risk in
as follows:
Risk Identification: Only 70 percent of the software components
scheduled for reuse will, in fact, be integrated into the application.
The remaining functionality will have to be custom developed.
Risk Probability: 80% (likely)
Risk Impact: 60 reusable software components were planned. If
only 70 percent can be used, 18 components would have to be
developed from scratch (in addition to other custom software that
has been scheduled for development).
The average component is 100 LOC and local data indicate that
the software engineering cost for each LOC is $14.00
Risk Exposure. RE = ?
Case Study
For example, assume that software team defines a project risk in
as follows:
Risk Identification: Only 70 percent of the software
components scheduled for reuse will, in fact, be integrated into
the application. The remaining functionality will have to be
custom developed.
Risk Probability: 80% (likely)
Risk Impact: 60 reusable software components were planned. If
only 70 percent can be used, 18 components would have to be developed
from scratch (in addition to other custom software that has been
scheduled for development). Since the average component is 100
LOC and local data indicate that the software engineering cost
for each LOC is $14.00
Overall cost (impact) to develop the components would be 18 x
100 x 14 = $25,200.
Risk Exposure. RE = 0.80 x 25,200 ~ $20,200.
iii. Risk Containment
Plans to suppress the most damaging and most likely
risks:
1. Avoid the risk
- discussion with customer and reduce scope of
work
- provide incentives to engineers to avoid
employee turnover
2. Transfer the Risk
- get the risky component developed by a third
party
3. Risk Reduction
- Plan ways to contain the damage due to a risk
Some key personnel might leave  Plan new recruitment

More Related Content

Similar to estimation(Risk).ppt

riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfWilliamTom9
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software PlanningMuhammad Alhalaby
 
Lecture5
Lecture5Lecture5
Lecture5soloeng
 
se01.ppt
se01.pptse01.ppt
se01.pptxiso
 
Hard work matters for everyone in everytbing
Hard work matters for everyone in everytbingHard work matters for everyone in everytbing
Hard work matters for everyone in everytbinglojob95766
 
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINAL
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINALJun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINAL
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINALAlex Tarra
 
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET Journal
 
Chapter 11 Metrics for process and projects.ppt
Chapter 11  Metrics for process and projects.pptChapter 11  Metrics for process and projects.ppt
Chapter 11 Metrics for process and projects.pptssuser3f82c9
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdfbcanawakadalcollege
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareMary Brown
 
Software Engineering - Basics
Software Engineering - BasicsSoftware Engineering - Basics
Software Engineering - BasicsPurvik Rana
 
Effort estimation( software Engineering)
Effort estimation( software Engineering)Effort estimation( software Engineering)
Effort estimation( software Engineering)kiran Patel
 

Similar to estimation(Risk).ppt (20)

riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
Unit iii
Unit iiiUnit iii
Unit iii
 
Ch26
Ch26Ch26
Ch26
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Lecture5
Lecture5Lecture5
Lecture5
 
se01.ppt
se01.pptse01.ppt
se01.ppt
 
Estimation sharbani bhattacharya
Estimation sharbani bhattacharyaEstimation sharbani bhattacharya
Estimation sharbani bhattacharya
 
Hard work matters for everyone in everytbing
Hard work matters for everyone in everytbingHard work matters for everyone in everytbing
Hard work matters for everyone in everytbing
 
SW_Cost_Estimation.ppt
SW_Cost_Estimation.pptSW_Cost_Estimation.ppt
SW_Cost_Estimation.ppt
 
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINAL
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINALJun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINAL
Jun 08 - PMWT Featured Paper -Tarabykin - XP PAPER - FINAL
 
Cost effort.ppt
Cost effort.pptCost effort.ppt
Cost effort.ppt
 
Guide to Software Estimation
Guide to Software EstimationGuide to Software Estimation
Guide to Software Estimation
 
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software
 
Chapter 11 Metrics for process and projects.ppt
Chapter 11  Metrics for process and projects.pptChapter 11  Metrics for process and projects.ppt
Chapter 11 Metrics for process and projects.ppt
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable Software
 
Software Engineering - Basics
Software Engineering - BasicsSoftware Engineering - Basics
Software Engineering - Basics
 
Effort estimation( software Engineering)
Effort estimation( software Engineering)Effort estimation( software Engineering)
Effort estimation( software Engineering)
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Risk
RiskRisk
Risk
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

estimation(Risk).ppt

  • 1. Metrics for Project Size Estimation Accurate Estimation Satisfactory Estimation of of Problem Size effort, time, cost For estimating metric or unit required Project size to express project size
  • 2. Project Size IS NOT: - Bytes source code occupies, executables occupy IS: - Measure of problem complexity in terms of time and effort required to develop product
  • 3. LINES OF CODE (LOC) • The simplest among all metrics available to estimate project size • Project size estimated by counting the number of source instructions • Lines used for commenting, header lines ignored • To find LOC at the beginning of a project divide module into sub modules and so on until size of each module can be predicted
  • 4. Disadvantages of LOC # Gives a numerical value of problem size that vary widely with individual coding style If( x>y ) x > y ? x++ : y++; then x++; else y++; # Good problem size Overall complexity of Problem + Effort needed # Effort needed for analysis, design , coding, testing etc (not just coding)
  • 5. Disadvantages of LOC # Larger Code size  Better Quality? # Impact of Code Reuse on LOC ? #include <stdio.h> void main(){ ………… } # Logical Complexity? Complex Logic More Effort Simple Logic Less Effort while(i<4){ printf(“testing”); printf(“testing”); printf(“testing”); } printf(“testing”); printf(“testing”); stdio.h
  • 6. # Accurate computation of LOC only after project completion!! Disadvantages of LOC
  • 7. Function Point Metric Size of software product computed directly from problem specification Size of software = number of different functions/ features it supports Input Output Many features Larger size Apart from that size depends on - number of files - number of interfaces - number of enquiries Function
  • 8. Size of Function Point (FP)= Weighted sum of these five problem characteristics 1. Number of inputs: Data items input by user (Group of user inputs taken together) Employee Account - Name - Account Name - Age - Account Number - Sex - Account Open Date - Address Function Point Metric
  • 9. 2. Number of Outputs: Reports, Screen outputs, Error Messages 3. Number of inquiries: Interactive queries made by users. user system 4. Number of Files: Logical files e.g. data structures, physical files 5. Number of interfaces: Interfaces for exchanging information e.g. disk, tapes, communication links Function Point Metric
  • 10. Software Risks Anticipated( predict) unfavorable event When risk turns to reality it hampers successful and timely completion of project Anticipate/Identify risks Contingency Plans Risky Component Employee Turnover Give incentive to employees Outsource/ Third party
  • 11. Software Risks Basic Characteristics of Risks: i. Uncertainty: Risk may or may not happen ii. Loss: If risk becomes a reality losses will occur
  • 12. Risk Management Risk Identification Risk Assessment Risk Containment
  • 13. i. Risk Identification - Early identification is important - Equivalent to listing your nightmares - To systematically identify important risks categorize them into classes Project Risks Business Risk Technical Risks Types of Risks
  • 14. a. Project Risk - Budgetary, Schedule, Personnel, Resource, Customer related Schedule Slipping Cause - Intangible nature of software Possible Solution - Increase visibility thru documentation
  • 15. b.Technical Risk - Ambiguous, incomplete, changing specification - Potential Flaws in Design - Implementation - Interfacing - Testing, maintenance - Technical uncertainty/obsolesce
  • 16. c.Business Risks - Excellent product but no one wants!! - Losing budgetary commitment - Losing personnel commitment
  • 17. For forseeing and identifying risks Company Disaster List All bad events that have happened contains prepare
  • 18.
  • 19. ii. Risk Assessment Rank risk in terms of their damage causing potential The overall risk exposure, RE Risk Exposure (RE) = r x c Here, r is probability of occurrence for a risk, and c is cost to project should risk occur.
  • 20. ii. Risk Assessment • Risk exposure can be computed for each risk in risk table, once an estimate of cost of risk is made. • The total risk exposure for all risks (above the cutoff in the risk table) can provide a means for adjusting the final cost estimate for a project.
  • 21. Case Study For example, assume that software team defines a project risk in as follows: Risk Identification: Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application. The remaining functionality will have to be custom developed. Risk Probability: 80% (likely) The average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00 Risk Exposure. RE = ?
  • 22. Case Study For example, assume that software team defines a project risk in as follows: Risk Identification: Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application. The remaining functionality will have to be custom developed. Risk Probability: 80% (likely) Risk Impact: 60 reusable software components were planned. If only 70 percent can be used, 18 components would have to be developed from scratch (in addition to other custom software that has been scheduled for development). The average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00 Risk Exposure. RE = ?
  • 23. Case Study For example, assume that software team defines a project risk in as follows: Risk Identification: Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application. The remaining functionality will have to be custom developed. Risk Probability: 80% (likely) Risk Impact: 60 reusable software components were planned. If only 70 percent can be used, 18 components would have to be developed from scratch (in addition to other custom software that has been scheduled for development). Since the average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00 Overall cost (impact) to develop the components would be 18 x 100 x 14 = $25,200. Risk Exposure. RE = 0.80 x 25,200 ~ $20,200.
  • 24. iii. Risk Containment Plans to suppress the most damaging and most likely risks: 1. Avoid the risk - discussion with customer and reduce scope of work - provide incentives to engineers to avoid employee turnover 2. Transfer the Risk - get the risky component developed by a third party 3. Risk Reduction - Plan ways to contain the damage due to a risk Some key personnel might leave  Plan new recruitment

Editor's Notes

  1. Obsolesce-No longer wanted even it is working gud