SlideShare a Scribd company logo
1 of 31
CBAM (Cost Benefit Analysis Method)
Presented By
Asim Shahzad
MCS02121005
Agenda
CBAM, Cost Benefit Analysis Method.
Decision Making Context.
The Basics of CBAM.
CBAM Steps.
CBAM Outcomes and Strengths
Cost-Benefit Analysis Method (CBAM)
CBAM an architecture for analyzing the costs,

benefits and schedule implications of architectural
decisions.
ATAM (Architecture Trade-off Analysis Method)
considered the design decisions with respect to
architectural quality attributes like modifiability,
performance, availability, usability, and so on.
CBAM is different from the former method, it add the
costs (and implicit budgets or money) as quality
attributes.
Cont..
The biggest tradeoffs in large, complex systems

usually have to do with finance.
How should an organization invest its resources in a
manner that will maximize its gains and minimize its
risk?
“…perhaps more important than costs, are the
benefits than an architecture decision may bring to an
organization.”
CBAM provides an assessment of the technical and
economic issues and architectural decisions
Decision-Making Context
The CBAM does not make decisions for the stakeholders. It

simply aids in the documentation of the costs and benefits
analysis.
The

CBAM can aid the stakeholders in choosing
architectural strategies based on their return on investment
(ROI) – the ratio of benefit to cost.
Calculating ROI
R (ROI) = (B (Benefit) / C (Cost))*100
This can be used to determine the optimal order for

implementation the various strategies.

Investment= $2000
Benefit = $500
R (ROI)=(B(benefit)/C(cost))*100
R(ROI)=($500/$2000)*100= 25%
Context of CBAM
The Basis for the CBAM
Variations of Scenarios
 a way to strongly express and represent specific quality attributes

(performance, cost, trademark etc. )

Utility-Response
 Every incentive in a scenario provides some utility to the

stakeholders.

Priorities of Scenarios
 Different scenarios within a given system have different levels of

importance to the stakeholders and hence different utilities.
 To characterize the relative importance of each scenario, a weigh is
assigned through a two-step voting exercise.
The Basis for the CBAM {2}
Architectural Strategies
In order to move from the current

utility attribute response level to the
desired or even best-case level.
Side

Effects
Impact of the changes
The importance of Cost Modeling
“How do I convince my boss to investing in

availability ?”
Maintain high availability requires a high level of
redundancy(duplication) with a rollover capability
This takes time an personnel
Personnel cost money as do purchasing highly available

software and adapting it for particular needs

Cost models are imperfect for a wide variety of

reasons, but they are the only tools available to
constrain requirements.
The CBAM steps:
This section first describes the steps of the CBAM
and then explores how to quantify uncertainty
to aid in making decisions.
Iteration I: Establish an Initial
Ranking
In the first iteration of the CBAM, each step is executed
to establish an initial ranking that will then be refined
in the second iteration. These steps serve to reduce the
size of the decision space, refine the scenarios, collect
sufficient information for decision making, and
establish an initial ranking of ASs.
Step 1:
Collate scenarios
Collate the scenarios elicited during the ATAM
exercise, and allow stakeholders to contribute new
ones. Prioritize these scenarios based on satisfying the
business goals of the system and choose the top onethird for further study.
Step 2:
Refine scenarios
Refine the scenarios by focusing on their
stimulus/response measures. Elicit the worst, current,
desired, and best-case QA response level for each
scenario.
Step 3:
Prioritize scenarios
Allocate 100 votes to each stakeholder and have them
distribute the votes among the scenarios by considering
the desired response value for each scenario. Total the
votes and choose the top 50% of the scenarios for
further analysis. Assign a weight of 1.0 to the highest
rated scenario, and assign the other scenarios a weight
relative to that scenario. This becomes the scenario
weight that appears in the calculation of the overall
benefit of an AS. Make a list of the QAs that concern
the stakeholders
Step 4:
Assign utility.
Determine the utility for each QA response level
(worst-case, current, desired, or best-case) for all
scenarios. The QAs of concern are the ones in the list
generated in step
Step 5:
Develop ASs for scenarios and determine their
expected QA response levels.
Develop (or capture the already-developed) ASs that
address the top 50% of the scenarios chosen in step 3,
and determine the expected QA response levels that
will result from implementing these ASs. Given that an
AS may affect multiple scenarios, this calculation must
be performed for each affected scenario.
Step 6:
Determine the utility of the expected QA response
level by interpolation.
Using the elicited utility values (that form a utility
curve) determine the utility of the “expected” QA
response level. We perform this calculation for each
affected scenario.
Step 7:
Calculate the total benefit obtained from an AS.
Subtract the utility value of the “current” level from the
“expected” level and normalize it using the votes
elicited in step 3. Sum the benefit of a particular AS
across all scenarios and across all relevant QAs
Step 8
Choose ASs based on ROI, subject to cost and
schedule constraints.
Determine the cost and schedule implications of each
AS. Calculate the ROI value for each remaining AS as a
ratio of benefit to cost. Rank order the ASs according to
their ROI values, and choose the top ones until the
budget or schedule is exhausted.
Step 9:
Confirm the results with intuition.
Of the chosen ASs, consider whether these seem to
align with the organization’s business goals. If not,
consider issues that may have been overlooked during
the analysis. If significant issues exist, perform another
iteration of these steps.
AS (Architecture
strategies)
QA (Quality
Attribute)
Iteration II: Incorporating
Uncertainty
A more sophisticated and realistic version of the CBAM
can be created by expanding on the steps enumerated
above. Secondary information can be added about risk
estimation and uncertainty and the allocation of
development resources. Each category of secondary
information may potentially affect the investment
decisions under consideration. Therefore, the ways they
augment the steps of the method must be considered
carefully for correctness and for practicality
Iteration II: Incorporating
Uncertainty(cont.…)
Augmenting the Steps.
The CBAM relies on stakeholder judgments for its
valuations of software benefits and costs. But these
judgments will naturally be uncertain, due to
differences in beliefs and experiences. One way to think
rigorously about the uncertainty of the results collected
in Iteration I is to collect and consider the risks
inherent in the estimates that have been made. To do
this, some kind of risk assessment exercise must be
performed. The risks typically fall into these four
categories.
Cont.….
Risks that affect the cost estimate of a strategy
under consideration
2. Risks that affect a stimulus-response characteristic
or a utility estimate of a strategy in the context of a
scenario.
3. Risks that affect stimulus-response characteristics
of other scenarios or QAs not previously considered.
These risks pertain to the side effects (rather than
the intended effects) of an AS.
1.
Cont.….
4. Risks that are related to project management and

schedule
CBAM Outcomes and Strengths
solving a problem in theory is very different from
solving one in practice.
The method provides values as a basis for a rational

decision making process in applying certain
architectural strategies
The method provides a business measure that can
determine the level of return on investment of a
particular change to the system.
Cont.…
The method will help organizations in analyzing and

pre-evaluating the resource investment in different
directions by adopting those architectural strategies
that are maximizing the gains and minimize the risks.
CBAM tells us that giving people the appropriate
tools to frame and structure their decision-making
process in relation to costs and benefits and
encouraging the right kind of dialogue among the
stakeholders are beneficial to the development of the
soft-ware system.
Questions??
 CBAM

More Related Content

What's hot

Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
koolkampus
 

What's hot (20)

Software design
Software designSoftware design
Software design
 
unit 3 Design 1
unit 3 Design 1unit 3 Design 1
unit 3 Design 1
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Unified process Model
Unified process ModelUnified process Model
Unified process Model
 
software project management Artifact set(spm)
software project management Artifact set(spm)software project management Artifact set(spm)
software project management Artifact set(spm)
 
Saam
SaamSaam
Saam
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineering
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentation
 
Unified process model
Unified process modelUnified process model
Unified process model
 
Usability Engineering Presentation Slides
Usability Engineering Presentation SlidesUsability Engineering Presentation Slides
Usability Engineering Presentation Slides
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
Spm software effort estimation
Spm software effort estimationSpm software effort estimation
Spm software effort estimation
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
 
Software Cost Estimation Techniques
Software Cost Estimation TechniquesSoftware Cost Estimation Techniques
Software Cost Estimation Techniques
 
Software process
Software processSoftware process
Software process
 
Architectural structures and views
Architectural structures and viewsArchitectural structures and views
Architectural structures and views
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Unit 2
Unit 2Unit 2
Unit 2
 

Viewers also liked (10)

Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testing
 
Architecture Review
Architecture ReviewArchitecture Review
Architecture Review
 
Software reliability tools and common software errors
Software reliability tools and common software errorsSoftware reliability tools and common software errors
Software reliability tools and common software errors
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
Abc
AbcAbc
Abc
 
Saam
SaamSaam
Saam
 
Importance of software architecture
Importance of software architectureImportance of software architecture
Importance of software architecture
 
Structural patterns
Structural patternsStructural patterns
Structural patterns
 
Software archiecture lecture07
Software archiecture   lecture07Software archiecture   lecture07
Software archiecture lecture07
 

Similar to CBAM

Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
Erik De Monte
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
cherishwinsland
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
smumbahelp
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
Maanbahadurkhadka
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
Vinoth Kumar
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
christinemaritza
 

Similar to CBAM (20)

IM426 3A G5.ppt
IM426 3A G5.pptIM426 3A G5.ppt
IM426 3A G5.ppt
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit Analysis
 
Quality - An Introduction-170715
Quality - An Introduction-170715Quality - An Introduction-170715
Quality - An Introduction-170715
 
Making Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI AdoptionMaking Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI Adoption
 
Return on-investment (roi)
Return on-investment (roi)Return on-investment (roi)
Return on-investment (roi)
 
Agile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementAgile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value Management
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk management
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
 
Feasibility_Study
Feasibility_StudyFeasibility_Study
Feasibility_Study
 
Savi chapter9
Savi chapter9Savi chapter9
Savi chapter9
 
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
 
Ch09
Ch09Ch09
Ch09
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGN
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

CBAM

  • 1.
  • 2. CBAM (Cost Benefit Analysis Method) Presented By Asim Shahzad MCS02121005
  • 3. Agenda CBAM, Cost Benefit Analysis Method. Decision Making Context. The Basics of CBAM. CBAM Steps. CBAM Outcomes and Strengths
  • 4. Cost-Benefit Analysis Method (CBAM) CBAM an architecture for analyzing the costs, benefits and schedule implications of architectural decisions. ATAM (Architecture Trade-off Analysis Method) considered the design decisions with respect to architectural quality attributes like modifiability, performance, availability, usability, and so on. CBAM is different from the former method, it add the costs (and implicit budgets or money) as quality attributes.
  • 5. Cont.. The biggest tradeoffs in large, complex systems usually have to do with finance. How should an organization invest its resources in a manner that will maximize its gains and minimize its risk? “…perhaps more important than costs, are the benefits than an architecture decision may bring to an organization.” CBAM provides an assessment of the technical and economic issues and architectural decisions
  • 6. Decision-Making Context The CBAM does not make decisions for the stakeholders. It simply aids in the documentation of the costs and benefits analysis. The CBAM can aid the stakeholders in choosing architectural strategies based on their return on investment (ROI) – the ratio of benefit to cost.
  • 7. Calculating ROI R (ROI) = (B (Benefit) / C (Cost))*100 This can be used to determine the optimal order for implementation the various strategies. Investment= $2000 Benefit = $500 R (ROI)=(B(benefit)/C(cost))*100 R(ROI)=($500/$2000)*100= 25%
  • 9. The Basis for the CBAM Variations of Scenarios  a way to strongly express and represent specific quality attributes (performance, cost, trademark etc. ) Utility-Response  Every incentive in a scenario provides some utility to the stakeholders. Priorities of Scenarios  Different scenarios within a given system have different levels of importance to the stakeholders and hence different utilities.  To characterize the relative importance of each scenario, a weigh is assigned through a two-step voting exercise.
  • 10. The Basis for the CBAM {2} Architectural Strategies In order to move from the current utility attribute response level to the desired or even best-case level. Side Effects Impact of the changes
  • 11. The importance of Cost Modeling “How do I convince my boss to investing in availability ?” Maintain high availability requires a high level of redundancy(duplication) with a rollover capability This takes time an personnel Personnel cost money as do purchasing highly available software and adapting it for particular needs Cost models are imperfect for a wide variety of reasons, but they are the only tools available to constrain requirements.
  • 12. The CBAM steps: This section first describes the steps of the CBAM and then explores how to quantify uncertainty to aid in making decisions.
  • 13. Iteration I: Establish an Initial Ranking In the first iteration of the CBAM, each step is executed to establish an initial ranking that will then be refined in the second iteration. These steps serve to reduce the size of the decision space, refine the scenarios, collect sufficient information for decision making, and establish an initial ranking of ASs.
  • 14. Step 1: Collate scenarios Collate the scenarios elicited during the ATAM exercise, and allow stakeholders to contribute new ones. Prioritize these scenarios based on satisfying the business goals of the system and choose the top onethird for further study.
  • 15. Step 2: Refine scenarios Refine the scenarios by focusing on their stimulus/response measures. Elicit the worst, current, desired, and best-case QA response level for each scenario.
  • 16. Step 3: Prioritize scenarios Allocate 100 votes to each stakeholder and have them distribute the votes among the scenarios by considering the desired response value for each scenario. Total the votes and choose the top 50% of the scenarios for further analysis. Assign a weight of 1.0 to the highest rated scenario, and assign the other scenarios a weight relative to that scenario. This becomes the scenario weight that appears in the calculation of the overall benefit of an AS. Make a list of the QAs that concern the stakeholders
  • 17. Step 4: Assign utility. Determine the utility for each QA response level (worst-case, current, desired, or best-case) for all scenarios. The QAs of concern are the ones in the list generated in step
  • 18. Step 5: Develop ASs for scenarios and determine their expected QA response levels. Develop (or capture the already-developed) ASs that address the top 50% of the scenarios chosen in step 3, and determine the expected QA response levels that will result from implementing these ASs. Given that an AS may affect multiple scenarios, this calculation must be performed for each affected scenario.
  • 19. Step 6: Determine the utility of the expected QA response level by interpolation. Using the elicited utility values (that form a utility curve) determine the utility of the “expected” QA response level. We perform this calculation for each affected scenario.
  • 20. Step 7: Calculate the total benefit obtained from an AS. Subtract the utility value of the “current” level from the “expected” level and normalize it using the votes elicited in step 3. Sum the benefit of a particular AS across all scenarios and across all relevant QAs
  • 21. Step 8 Choose ASs based on ROI, subject to cost and schedule constraints. Determine the cost and schedule implications of each AS. Calculate the ROI value for each remaining AS as a ratio of benefit to cost. Rank order the ASs according to their ROI values, and choose the top ones until the budget or schedule is exhausted.
  • 22. Step 9: Confirm the results with intuition. Of the chosen ASs, consider whether these seem to align with the organization’s business goals. If not, consider issues that may have been overlooked during the analysis. If significant issues exist, perform another iteration of these steps.
  • 24. Iteration II: Incorporating Uncertainty A more sophisticated and realistic version of the CBAM can be created by expanding on the steps enumerated above. Secondary information can be added about risk estimation and uncertainty and the allocation of development resources. Each category of secondary information may potentially affect the investment decisions under consideration. Therefore, the ways they augment the steps of the method must be considered carefully for correctness and for practicality
  • 25. Iteration II: Incorporating Uncertainty(cont.…) Augmenting the Steps. The CBAM relies on stakeholder judgments for its valuations of software benefits and costs. But these judgments will naturally be uncertain, due to differences in beliefs and experiences. One way to think rigorously about the uncertainty of the results collected in Iteration I is to collect and consider the risks inherent in the estimates that have been made. To do this, some kind of risk assessment exercise must be performed. The risks typically fall into these four categories.
  • 26. Cont.…. Risks that affect the cost estimate of a strategy under consideration 2. Risks that affect a stimulus-response characteristic or a utility estimate of a strategy in the context of a scenario. 3. Risks that affect stimulus-response characteristics of other scenarios or QAs not previously considered. These risks pertain to the side effects (rather than the intended effects) of an AS. 1.
  • 27. Cont.…. 4. Risks that are related to project management and schedule
  • 28. CBAM Outcomes and Strengths solving a problem in theory is very different from solving one in practice. The method provides values as a basis for a rational decision making process in applying certain architectural strategies The method provides a business measure that can determine the level of return on investment of a particular change to the system.
  • 29. Cont.… The method will help organizations in analyzing and pre-evaluating the resource investment in different directions by adopting those architectural strategies that are maximizing the gains and minimize the risks. CBAM tells us that giving people the appropriate tools to frame and structure their decision-making process in relation to costs and benefits and encouraging the right kind of dialogue among the stakeholders are beneficial to the development of the soft-ware system.

Editor's Notes

  1. To earn profit of $50000000 in the year. To open 20 branches all over the world till 2020. Predictive Analysis, Security Method