SlideShare a Scribd company logo
1 of 29
Download to read offline
- Introduction
- Risk identification
- Risk projection (estimation)
- Risk mitigation, monitoring, and
management
Risk Management
Introduction
Definition of Risk
3
 A risk is a potential problem – it might happen and it might not
 Conceptual definition of risk
 Risk concerns future happenings
 Risk involves change in mind, opinion, actions, places, etc.
 Risk involves choice and the uncertainty that choice entails
 Two characteristics of risk
 Uncertainty – the risk may or may not happen, that is, there are no 100% risks
(those, instead, are called constraints)
 Loss – the risk becomes a reality and unwanted consequences or losses occur
Risk Categorization – Approach #1
4
 Project risks
 They threaten the project plan
 If they become real, it is likely that the project schedule will slip and that costs will
increase
 Technical risks
 They threaten the quality and timeliness of the software to be produced
 If they become real, implementation may become difficult or impossible
 Business risks
 They threaten the viability of the software to be built
 If they become real, they jeopardize the project or the product
(More on next slide)
Risk Categorization – Approach #1
(continued)
5
 Sub-categories of Business risks
 Market risk – building an excellent product or system that no one really wants
 Strategic risk – building a product that no longer fits into the overall business
strategy for the company
 Sales risk – building a product that the sales force doesn't understand how to sell
 Management risk – losing the support of senior management due to a change in
focus or a change in people
 Budget risk – losing budgetary or personnel commitment
Risk Categorization – Approach #2
6
 Known risks
 Those risks that can be uncovered after careful evaluation of the project plan, the business
and technical environment in which the project is being developed, and other reliable
information sources (e.g., unrealistic delivery date)
 Predictable risks
 Those risks that are extrapolated from past project experience (e.g., past turnover)
 Unpredictable risks
 Those risks that can and do occur, but are extremely difficult to identify in advance
Reactive vs. Proactive Risk Strategies
7
 Reactive risk strategies
 "Don't worry, I'll think of something"
 The majority of software teams and managers rely on this approach
 Nothing is done about risks until something goes wrong
 The team then flies into action in an attempt to correct the problem rapidly (fire fighting)
 Crisis management is the choice of management techniques
 Proactive risk strategies
 Steps for risk management are followed (see next slide)
 Primary objective is to avoid risk and to have a contingency plan in place to handle
unavoidable risks in a controlled and effective manner
Steps for Risk Management
8
1) Identify possible risks; recognize what can go wrong
2) Analyze each risk to estimate the probability that it will occur and the
impact (i.e., damage) that it will do if it does occur
3) Rank the risks by probability and impact
- Impact may be negligible, marginal, critical, and catastrophic
4) Develop a contingency plan to manage those risks having high probability
and high impact
Risk Identification
Background
10
 Risk identification is a systematic attempt to specify threats to the project plan
 By identifying known and predictable risks, the project manager takes a first
step toward avoiding them when possible and controlling them when necessary
 Generic risks
 Risks that are a potential threat to every software project
 Product-specific risks
 Risks that can be identified only by those a with a clear understanding of the
technology, the people, and the environment that is specific to the software that is to
be built
 This requires examination of the project plan and the statement of scope
 "What special characteristics of this product may threaten our project plan?"
Risk Item Checklist
11
 Used as one way to identify risks
 Focuses on known and predictable risks in specific subcategories (see next slide)
 Can be organized in several ways
 A list of characteristics relevant to each risk subcategory
 Questionnaire that leads to an estimate on the impact of each risk
 A list containing a set of risk component and drivers and their probability of
occurrence
Known and Predictable Risk Categories
12
 Product size – risks associated with overall size of the software to be built
 Business impact – risks associated with constraints imposed by management
or the marketplace
 Customer characteristics – risks associated with sophistication of the
customer and the developer's ability to communicate with the customer in a
timely manner
 Process definition – risks associated with the degree to which the software
process has been defined and is followed
 Development environment – risks associated with availability and quality
of the tools to be used to build the project
 Technology to be built – risks associated with complexity of the system to
be built and the "newness" of the technology in the system
 Staff size and experience – risks associated with overall technical and
project experience of the software engineers who will do the work
Questionnaire on Project Risk
13
1) Have top software and customer managers formally committed to support
the project?
2) Are end-users enthusiastically committed to the project and the
system/product to be built?
3) Are requirements fully understood by the software engineering team and its
customers?
4) Have customers been involved fully in the definition of requirements?
5) Do end-users have realistic expectations?
6) Is the project scope stable?
(Questions are ordered by their relative importance to project success)
(More on next slide)
Questionnaire on Project Risk
(continued)
14
7) Does the software engineering team have the right mix of skills?
8) Are project requirements stable?
9) Does the project team have experience with the technology to be
implemented?
10) Is the number of people on the project team adequate to do the job?
11) Do all customer/user constituencies agree on the importance of the project
and on the requirements for the system/product to be built?
Risk Components and Drivers
15
 The project manager identifies the risk drivers that affect the following risk
components
 Performance risk - the degree of uncertainty that the product will meet its requirements
and be fit for its intended use
 Cost risk - the degree of uncertainty that the project budget will be maintained
 Support risk - the degree of uncertainty that the resultant software will be easy to correct,
adapt, and enhance
 Schedule risk - the degree of uncertainty that the project schedule will be maintained and
that the product will be delivered on time
 The impact of each risk driver on the risk component is divided into one of four
impact levels
 Negligible, marginal, critical, and catastrophic
 Risk drivers can be assessed as impossible, improbable, probable, and frequent
Risk Projection (Estimation)
Background
17
 Risk projection (or estimation) attempts to rate each risk in two ways
 The probability that the risk is real
 The consequence of the problems associated with the risk, should it occur
 The project planner, managers, and technical staff perform four risk projection
steps (see next slide)
 The intent of these steps is to consider risks in a manner that leads to
prioritization
 Be prioritizing risks, the software team can allocate limited resources where
they will have the most impact
Risk Projection/Estimation Steps
18
1) Establish a scale that reflects the perceived likelihood of a risk (e.g., 1-low,
10-high)
2) Delineate the consequences of the risk
3) Estimate the impact of the risk on the project and product
4) Note the overall accuracy of the risk projection so that there will be no
misunderstandings
Contents of a Risk Table
19
 A risk table provides a project manager with a simple technique for risk
projection
 It consists of five columns
 Risk Summary – short description of the risk
 Risk Category – one of seven risk categories (slide 12)
 Probability – estimation of risk occurrence based on group input
 Impact – (1) catastrophic (2) critical (3) marginal (4) negligible
 RMMM – Pointer to a paragraph in the Risk Mitigation, Monitoring, and
Management Plan
Risk Summary Risk Category Probability Impact (1-4) RMMM
(More on next slide)
Developing a Risk Table
20
 List all risks in the first column (by way of the help of the risk item checklists)
 Mark the category of each risk
 Estimate the probability of each risk occurring
 Assess the impact of each risk based on an averaging of the four risk
components to determine an overall impact value (See next slide)
 Sort the rows by probability and impact in descending order
 Draw a horizontal cutoff line in the table that indicates the risks that will be
given further attention
Assessing Risk Impact
21
 Three factors affect the consequences that are likely if a risk does occur
 Its nature – This indicates the problems that are likely if the risk occurs
 Its scope – This combines the severity of the risk (how serious was it) with its overall
distribution (how much was affected)
 Its timing – This considers when and for how long the impact will be felt
 The overall risk exposure formula is RE = P x C
 P = the probability of occurrence for a risk
 C = the cost to the project should the risk actually occur
 Example
 P = 80% probability that 18 of 60 software components will have to be developed
 C = Total cost of developing 18 components is $25,000
 RE = .80 x $25,000 = $20,000
Risk Mitigation, Monitoring, and
Management
Background
23
 An effective strategy for dealing with risk must consider three issues
(Note: these are not mutually exclusive)
 Risk mitigation (i.e., avoidance)
 Risk monitoring
 Risk management and contingency planning
 Risk mitigation (avoidance) is the primary strategy and is achieved through a
plan
 Example: Risk of high staff turnover (see next slide)
(More on next slide)
Background (continued)
24
 Meet with current staff to determine causes for turnover (e.g., poor working
conditions, low pay, competitive job market)
 Mitigate those causes that are under our control before the project starts
 Once the project commences, assume turnover will occur and develop techniques
to ensure continuity when people leave
 Organize project teams so that information about each development activity is
widely dispersed
 Define documentation standards and establish mechanisms to ensure that
documents are developed in a timely manner
 Conduct peer reviews of all work (so that more than one person is "up to speed")
 Assign a backup staff member for every critical technologist
Strategy for Reducing Staff Turnover
Background (continued)
25
 During risk monitoring, the project manager monitors factors that may provide
an indication of whether a risk is becoming more or less likely
 Risk management and contingency planning assume that mitigation efforts have
failed and that the risk has become a reality
 RMMM steps incur additional project cost
 Large projects may have identified 30 – 40 risks
 Risk is not limited to the software project itself
 Risks can occur after the software has been delivered to the user
(More on next slide)
Background (continued)
26
 Software safety and hazard analysis
 These are software quality assurance activities that focus on the identification and
assessment of potential hazards that may affect software negatively and cause an
entire system to fail
 If hazards can be identified early in the software process, software design features can
be specified that will either eliminate or control potential hazards
The RMMM Plan
27
 The RMMM plan may be a part of the software development plan (Paragraph
5.19.1) or may be a separate document
 Once RMMM has been documented and the project has begun, the risk
mitigation, and monitoring steps begin
 Risk mitigation is a problem avoidance activity
 Risk monitoring is a project tracking activity
 Risk monitoring has three objectives
 To assess whether predicted risks do, in fact, occur
 To ensure that risk aversion steps defined for the risk are being properly applied
 To collect information that can be used for future risk analysis
 The findings from risk monitoring may allow the project manager to ascertain
what risks caused which problems throughout the project
Seven Principles of Risk Management
28
 Maintain a global perspective
 View software risks within the context of a system and the business problem that is is intended to
solve
 Take a forward-looking view
 Think about risks that may arise in the future; establish contingency plans
 Encourage open communication
 Encourage all stakeholders and users to point out risks at any time
 Integrate risk management
 Integrate the consideration of risk into the software process
 Emphasize a continuous process of risk management
 Modify identified risks as more becomes known and add new risks as better insight is achieved
 Develop a shared product vision
 A shared vision by all stakeholders facilitates better risk identification and assessment
 Encourage teamwork when managing risk
 Pool the skills and experience of all stakeholders when conducting risk management activities
Summary
29
 Whenever much is riding on a software project, common sense dictates risk analysis
 Yet, most project managers do it informally and superficially, if at all
 However, the time spent in risk management results in
 Less upheaval during the project
 A greater ability to track and control a project
 The confidence that comes with planning for problems before they occur
 Risk management can absorb a significant amount of the project planning effort…but
the effort is worth it


More Related Content

What's hot

Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-managementzeeshanwrch
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)Nesma
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Adnan Naseem
 
Framework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsFramework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsAdili Zella
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software IndustryRehan Akhtar
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementgnitu
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment templateGlen Alleman
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual EssayPrince Bertrand
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 

What's hot (19)

Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Risk management
Risk managementRisk management
Risk management
 
Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)
 
Framework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projectsFramework criteria-appraisal-socioeconomic-justification-education-projects
Framework criteria-appraisal-socioeconomic-justification-education-projects
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software Industry
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
RMMM Plan
RMMM PlanRMMM Plan
RMMM Plan
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk management
Risk managementRisk management
Risk management
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual Essay
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 

Similar to Risk Management Overview

pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptMuhammadKashif703372
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxRanjitKdk
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering MuhammadTalha436
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoMatthewTennant613
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfWilliamTom9
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptxKamranKhan353531
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementyenohhoney
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptYasirShaikh34
 
Project risk management model based on prince2 and scrum frameworks
Project risk management model based on prince2 and scrum frameworksProject risk management model based on prince2 and scrum frameworks
Project risk management model based on prince2 and scrum frameworksijseajournal
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software PlanningMuhammad Alhalaby
 
Schwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.pptSchwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.pptAyidAlmgati
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptavisha23
 

Similar to Risk Management Overview (20)

RMMM
RMMMRMMM
RMMM
 
Risk
RiskRisk
Risk
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
PPT SE SACHIN.ppt
PPT SE SACHIN.pptPPT SE SACHIN.ppt
PPT SE SACHIN.ppt
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Project risk management model based on prince2 and scrum frameworks
Project risk management model based on prince2 and scrum frameworksProject risk management model based on prince2 and scrum frameworks
Project risk management model based on prince2 and scrum frameworks
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Schwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.pptSchwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.ppt
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Risk Management Overview

  • 1. - Introduction - Risk identification - Risk projection (estimation) - Risk mitigation, monitoring, and management Risk Management
  • 3. Definition of Risk 3  A risk is a potential problem – it might happen and it might not  Conceptual definition of risk  Risk concerns future happenings  Risk involves change in mind, opinion, actions, places, etc.  Risk involves choice and the uncertainty that choice entails  Two characteristics of risk  Uncertainty – the risk may or may not happen, that is, there are no 100% risks (those, instead, are called constraints)  Loss – the risk becomes a reality and unwanted consequences or losses occur
  • 4. Risk Categorization – Approach #1 4  Project risks  They threaten the project plan  If they become real, it is likely that the project schedule will slip and that costs will increase  Technical risks  They threaten the quality and timeliness of the software to be produced  If they become real, implementation may become difficult or impossible  Business risks  They threaten the viability of the software to be built  If they become real, they jeopardize the project or the product (More on next slide)
  • 5. Risk Categorization – Approach #1 (continued) 5  Sub-categories of Business risks  Market risk – building an excellent product or system that no one really wants  Strategic risk – building a product that no longer fits into the overall business strategy for the company  Sales risk – building a product that the sales force doesn't understand how to sell  Management risk – losing the support of senior management due to a change in focus or a change in people  Budget risk – losing budgetary or personnel commitment
  • 6. Risk Categorization – Approach #2 6  Known risks  Those risks that can be uncovered after careful evaluation of the project plan, the business and technical environment in which the project is being developed, and other reliable information sources (e.g., unrealistic delivery date)  Predictable risks  Those risks that are extrapolated from past project experience (e.g., past turnover)  Unpredictable risks  Those risks that can and do occur, but are extremely difficult to identify in advance
  • 7. Reactive vs. Proactive Risk Strategies 7  Reactive risk strategies  "Don't worry, I'll think of something"  The majority of software teams and managers rely on this approach  Nothing is done about risks until something goes wrong  The team then flies into action in an attempt to correct the problem rapidly (fire fighting)  Crisis management is the choice of management techniques  Proactive risk strategies  Steps for risk management are followed (see next slide)  Primary objective is to avoid risk and to have a contingency plan in place to handle unavoidable risks in a controlled and effective manner
  • 8. Steps for Risk Management 8 1) Identify possible risks; recognize what can go wrong 2) Analyze each risk to estimate the probability that it will occur and the impact (i.e., damage) that it will do if it does occur 3) Rank the risks by probability and impact - Impact may be negligible, marginal, critical, and catastrophic 4) Develop a contingency plan to manage those risks having high probability and high impact
  • 10. Background 10  Risk identification is a systematic attempt to specify threats to the project plan  By identifying known and predictable risks, the project manager takes a first step toward avoiding them when possible and controlling them when necessary  Generic risks  Risks that are a potential threat to every software project  Product-specific risks  Risks that can be identified only by those a with a clear understanding of the technology, the people, and the environment that is specific to the software that is to be built  This requires examination of the project plan and the statement of scope  "What special characteristics of this product may threaten our project plan?"
  • 11. Risk Item Checklist 11  Used as one way to identify risks  Focuses on known and predictable risks in specific subcategories (see next slide)  Can be organized in several ways  A list of characteristics relevant to each risk subcategory  Questionnaire that leads to an estimate on the impact of each risk  A list containing a set of risk component and drivers and their probability of occurrence
  • 12. Known and Predictable Risk Categories 12  Product size – risks associated with overall size of the software to be built  Business impact – risks associated with constraints imposed by management or the marketplace  Customer characteristics – risks associated with sophistication of the customer and the developer's ability to communicate with the customer in a timely manner  Process definition – risks associated with the degree to which the software process has been defined and is followed  Development environment – risks associated with availability and quality of the tools to be used to build the project  Technology to be built – risks associated with complexity of the system to be built and the "newness" of the technology in the system  Staff size and experience – risks associated with overall technical and project experience of the software engineers who will do the work
  • 13. Questionnaire on Project Risk 13 1) Have top software and customer managers formally committed to support the project? 2) Are end-users enthusiastically committed to the project and the system/product to be built? 3) Are requirements fully understood by the software engineering team and its customers? 4) Have customers been involved fully in the definition of requirements? 5) Do end-users have realistic expectations? 6) Is the project scope stable? (Questions are ordered by their relative importance to project success) (More on next slide)
  • 14. Questionnaire on Project Risk (continued) 14 7) Does the software engineering team have the right mix of skills? 8) Are project requirements stable? 9) Does the project team have experience with the technology to be implemented? 10) Is the number of people on the project team adequate to do the job? 11) Do all customer/user constituencies agree on the importance of the project and on the requirements for the system/product to be built?
  • 15. Risk Components and Drivers 15  The project manager identifies the risk drivers that affect the following risk components  Performance risk - the degree of uncertainty that the product will meet its requirements and be fit for its intended use  Cost risk - the degree of uncertainty that the project budget will be maintained  Support risk - the degree of uncertainty that the resultant software will be easy to correct, adapt, and enhance  Schedule risk - the degree of uncertainty that the project schedule will be maintained and that the product will be delivered on time  The impact of each risk driver on the risk component is divided into one of four impact levels  Negligible, marginal, critical, and catastrophic  Risk drivers can be assessed as impossible, improbable, probable, and frequent
  • 17. Background 17  Risk projection (or estimation) attempts to rate each risk in two ways  The probability that the risk is real  The consequence of the problems associated with the risk, should it occur  The project planner, managers, and technical staff perform four risk projection steps (see next slide)  The intent of these steps is to consider risks in a manner that leads to prioritization  Be prioritizing risks, the software team can allocate limited resources where they will have the most impact
  • 18. Risk Projection/Estimation Steps 18 1) Establish a scale that reflects the perceived likelihood of a risk (e.g., 1-low, 10-high) 2) Delineate the consequences of the risk 3) Estimate the impact of the risk on the project and product 4) Note the overall accuracy of the risk projection so that there will be no misunderstandings
  • 19. Contents of a Risk Table 19  A risk table provides a project manager with a simple technique for risk projection  It consists of five columns  Risk Summary – short description of the risk  Risk Category – one of seven risk categories (slide 12)  Probability – estimation of risk occurrence based on group input  Impact – (1) catastrophic (2) critical (3) marginal (4) negligible  RMMM – Pointer to a paragraph in the Risk Mitigation, Monitoring, and Management Plan Risk Summary Risk Category Probability Impact (1-4) RMMM (More on next slide)
  • 20. Developing a Risk Table 20  List all risks in the first column (by way of the help of the risk item checklists)  Mark the category of each risk  Estimate the probability of each risk occurring  Assess the impact of each risk based on an averaging of the four risk components to determine an overall impact value (See next slide)  Sort the rows by probability and impact in descending order  Draw a horizontal cutoff line in the table that indicates the risks that will be given further attention
  • 21. Assessing Risk Impact 21  Three factors affect the consequences that are likely if a risk does occur  Its nature – This indicates the problems that are likely if the risk occurs  Its scope – This combines the severity of the risk (how serious was it) with its overall distribution (how much was affected)  Its timing – This considers when and for how long the impact will be felt  The overall risk exposure formula is RE = P x C  P = the probability of occurrence for a risk  C = the cost to the project should the risk actually occur  Example  P = 80% probability that 18 of 60 software components will have to be developed  C = Total cost of developing 18 components is $25,000  RE = .80 x $25,000 = $20,000
  • 23. Background 23  An effective strategy for dealing with risk must consider three issues (Note: these are not mutually exclusive)  Risk mitigation (i.e., avoidance)  Risk monitoring  Risk management and contingency planning  Risk mitigation (avoidance) is the primary strategy and is achieved through a plan  Example: Risk of high staff turnover (see next slide) (More on next slide)
  • 24. Background (continued) 24  Meet with current staff to determine causes for turnover (e.g., poor working conditions, low pay, competitive job market)  Mitigate those causes that are under our control before the project starts  Once the project commences, assume turnover will occur and develop techniques to ensure continuity when people leave  Organize project teams so that information about each development activity is widely dispersed  Define documentation standards and establish mechanisms to ensure that documents are developed in a timely manner  Conduct peer reviews of all work (so that more than one person is "up to speed")  Assign a backup staff member for every critical technologist Strategy for Reducing Staff Turnover
  • 25. Background (continued) 25  During risk monitoring, the project manager monitors factors that may provide an indication of whether a risk is becoming more or less likely  Risk management and contingency planning assume that mitigation efforts have failed and that the risk has become a reality  RMMM steps incur additional project cost  Large projects may have identified 30 – 40 risks  Risk is not limited to the software project itself  Risks can occur after the software has been delivered to the user (More on next slide)
  • 26. Background (continued) 26  Software safety and hazard analysis  These are software quality assurance activities that focus on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail  If hazards can be identified early in the software process, software design features can be specified that will either eliminate or control potential hazards
  • 27. The RMMM Plan 27  The RMMM plan may be a part of the software development plan (Paragraph 5.19.1) or may be a separate document  Once RMMM has been documented and the project has begun, the risk mitigation, and monitoring steps begin  Risk mitigation is a problem avoidance activity  Risk monitoring is a project tracking activity  Risk monitoring has three objectives  To assess whether predicted risks do, in fact, occur  To ensure that risk aversion steps defined for the risk are being properly applied  To collect information that can be used for future risk analysis  The findings from risk monitoring may allow the project manager to ascertain what risks caused which problems throughout the project
  • 28. Seven Principles of Risk Management 28  Maintain a global perspective  View software risks within the context of a system and the business problem that is is intended to solve  Take a forward-looking view  Think about risks that may arise in the future; establish contingency plans  Encourage open communication  Encourage all stakeholders and users to point out risks at any time  Integrate risk management  Integrate the consideration of risk into the software process  Emphasize a continuous process of risk management  Modify identified risks as more becomes known and add new risks as better insight is achieved  Develop a shared product vision  A shared vision by all stakeholders facilitates better risk identification and assessment  Encourage teamwork when managing risk  Pool the skills and experience of all stakeholders when conducting risk management activities
  • 29. Summary 29  Whenever much is riding on a software project, common sense dictates risk analysis  Yet, most project managers do it informally and superficially, if at all  However, the time spent in risk management results in  Less upheaval during the project  A greater ability to track and control a project  The confidence that comes with planning for problems before they occur  Risk management can absorb a significant amount of the project planning effort…but the effort is worth it 