SlideShare a Scribd company logo
Software Risk Management
Matakuliah Rekayasa Perangkat Lunak (CS215) – Gasal 2015/2016
Magister Ilmu Komputer - Universitas Budi Luhur
Achmad Solichin, S.Kom, M.T.I (achmatim@gmail.com)
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
A Small Case Study
Lintang adalah seorang freelancer yang tinggal diTangerang. Sebagai web developer, Lintang sudah 4
tahun berpengalaman membangun berbagai aplikasi berbasis web. Saat ini, Lintang juga sedang
terikat kontrak maintenance sebuah sistem HRIS berbasis web di perusahaan XYZ selama setahun
mendatang. Selain itu, Lintang juga sedang melanjutkan studi di Magister Ilmu Komputer, Universitas
Budi Luhur (semester 3).
Suatu hari, seorang kenalan bernama Mulyanto menawarkan sebuah project untuk membangun
sistem informasi laundry berbasis web. Berdasarkan hasil pertemuan antara Lintang dan Mulyanto,
diperoleh beberapa informasi terkait project yg ditawarkan. Mulyanto memiliki 4 usaha laundry yang
tersebar di sejumlah tempat di Jakarta danTangerang. Sebagai pemilik, Mulyanto ingin mengetahui
dan mengontrol dg cepat bagaimana bisnis laundry dijalankan oleh anak buahnya, melalui sebuah
aplikasi berbasis web. Mulai dari proses penyerahan pakaian oleh pelanggan, proses pengerjaan oleh
pegawai hingga pendapatan untuk setiap pegawai harus tercatat dg baik di aplikasi. Selain
berdasarkan kehadiran, pendapatan masing2 pegawai juga dihitung berdasarkan jumlah pekerjaan
yang dilakukan.
Sebagai seorang lulusan kampus ternama, Mulyanto sudah menyusun rancangan aplikasi yang
diinginkan, mulai dari rancangan layar, rancangan masukan, rumus / perhitungan, rancangan basis data
hingga rancangan laporan. Semua disusun berdasarkan pengalaman Mulyanto menangani bisnis
laundry. Memang, Mulyanto termasuk orang yg sangat perfeksionis dan selektif dlm mengerjakan
sesuatu. Kali ini dia mencari seorang programmer berpengalaman yg sanggup mengimplementasikan
rancangannya menjadi sebuah aplikasi yg dapat langsung digunakan setidaknya 2 bulan mendatang.
Mulyanto menjanjikan kompensasi yang cukup besar untuk pekerjaan ini.
Menurut Anda, Lintang harus menerima atau menolak tawaran project dari Mulyanto? Jelaskan!
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Overview
• What is Software Risk Management?
• Risk Management Process
• Risk Management Strategies
• Risk Metrics (Risk Estimation)
• International Risk Management Standards.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Important Goals of Project Management
• Deliver the software to the customer at the agreed time.
• Keep overall costs within budget.
• Deliver software that meets the customer’s expectations.
• Maintain a happy and well-functioning development team.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Project Manager Responsibility
• Project planning. Project managers are responsible for planning, estimating and
scheduling project development, and assigning people to tasks.
• Reporting. Project managers are usually responsible for reporting on the progress
of a project to customers and to the managers of the company developing the
software.
• Risk management. Project managers have to assess the risks that may affect a
project, monitor these risks, and take action when problems arise
• People management. Project managers are responsible for managing a team of
people.
• Proposal writing.The first stage in a software project may involve writing a
proposal to win a contract to carry out an item of work
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management
• Risk management involves anticipating risks that might affect the project
schedule or the quality of the software being developed, and then taking
action to avoid these risks (Hall, 1998; Ould, 1999)
• Three categories of Risk:
• Project risks. Risks that affect the project schedule or resources. Ex: the loss of an
experienced designer.
• Product risks. Risks that affect the quality or performance of the software being
developed. Ex: the failure of a purchased component to perform as expected.
• Business risks. Risks that affect the organization developing or procuring the software.
Ex: a competitor introducing a new product.
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Reactive Risk Management
• Project team reacts to risks when they occur.
• Mitigation—plan for additional resources in anticipation of fire fighting
• Fix on failure—resource are found and applied when the risk strikes
• Crisis management—failure does not respond to applied resources and
project is in jeopardy.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Proactive Risk Management
• Formal risk analysis is performed.
• Organization corrects the root causes of risk
• TQM (total quality management) concepts and statistical SQA
• Examining risk sources that lie beyond the bounds of the software
• Developing the skill to manage change
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Principle of Risk Management
• Maintain a global perspective—view software risks within the context of a system in which it is a
component and the business problem that it is intended to solve
• Take a forward-looking view—think about the risks that may arise in the future (e.g., due to
changes in the software); establish contingency plans so that future events are manageable.
• Encourage open communication—if someone states a potential risk, don’t discount it. If a risk is
proposed in an informal manner, consider it. Encourage all stakeholders and users to suggest
risks at any time.
• Integrate—a consideration of risk must be integrated into the software process.
• Emphasize a continuous process—the team must be vigilant throughout the software process,
modifying identified risks as more information is known and adding new ones as better insight is
achieved.
• Develop a shared product vision—if all stakeholders share the same vision of the software, it is
likely that better risk identification and assessment will occur.
• Encourage teamwork—the talents, skills, and knowledge of all stakeholders should be pooled
when risk management activities are conducted.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Example of Risks
[Sommerville, 2011]
Risk Affects Description
Staff turnover Project Experienced staff will leave the project before it is finished.
Management change Project There will be a change of organizational management with different
priorities.
Hardware
unavailability
Project Hardware that is essential for the project will not be delivered on schedule.
Requirements change Project and
product
There will be a larger number of changes to the requirements than
anticipated.
Specification delays Project and
product
Specifications of essential interfaces are not available on schedule.
Size underestimate Project and
product
The size of the system has been underestimated.
CASE tool
underperformance
Product CASE tools, which support the project, do not perform as anticipated.
Technology change Business The underlying technology on which the system is built is superseded by
new technology.
Product competition Business A competitive product is marketed before the system is completed.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
The Risk Management Process
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Identification
[Sommerville, 2011]
• May be a team activities or based on the individual project manager’s experience.
• Six types of common risk:
1. Technology risks. Risks that derive from the software or hardware technologies that are
used to develop the system.
2. People risks. Risks that are associated with the people in the development team.
3. Organizational risks. Risks that derive from the organizational environment where the
software is being developed.
4. Tools risks. Risks that derive from the software tools and other support software used to
develop the system.
5. Requirements risks. Risks that derive from changes to the customer requirements and the
process of managing the requirements change.
6. Estimation risks. Risks that derive from the management estimates of the resources
required to build the system.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Identification
[Sommerville, 2011]
Risk type Possible risks
Technology The database used in the system cannot process as many transactions per second as expected. (1)
Reusable software components contain defects that mean they cannot be reused as planned. (2)
People It is impossible to recruit staff with the skills required. (3)
Key staff are ill and unavailable at critical times. (4)
Required training for staff is not available. (5)
Organizational The organization is restructured so that different management are responsible for the project. (6)
Organizational financial problems force reductions in the project budget. (7)
Tools The code generated by software code generation tools is inefficient. (8)
Software tools cannot work together in an integrated way. (9)
Requirements Changes to requirements that require major design rework are proposed. (10)
Customers fail to understand the impact of requirements changes. (11)
Estimation The time required to develop the software is underestimated. (12)
The rate of defect repair is underestimated. (13)
The size of the software is underestimated. (14)
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Analysis
[Sommerville, 2011]
• Assess probability and seriousness of each risk.
• Probability may be:Very Low (< 10%), Low (10-25%), Moderate (25-50%),
High (50-75%) orVery High (> 75%).
• Risk consequences might be: Catastrophic (threaten the survival of the
project), Serious (would cause major delays),Tolerable (delays are within
allowed contingency), or Insignificant.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
RiskTypes and Example
[Sommerville, 2011]
Risk Probability Effects
Organizational financial problems force reductions in the project budget (7). Low Catastrophic
It is impossible to recruit staff with the skills required for the project (3). High Catastrophic
Key staff are ill at critical times in the project (4). Moderate Serious
Faults in reusable software components have to be repaired before these
components are reused. (2).
Moderate Serious
Changes to requirements that require major design rework are proposed
(10).
Moderate Serious
The organization is restructured so that different management are
responsible for the project (6).
High Serious
The database used in the system cannot process as many transactions per
second as expected (1).
Moderate Serious
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
RiskTypes and Example
[Sommerville, 2011]
Risk Probability Effects
The time required to develop the software is underestimated (12). High Serious
Software tools cannot be integrated (9). High Tolerable
Customers fail to understand the impact of requirements changes (11). Moderate Tolerable
Required training for staff is not available (5). Moderate Tolerable
The rate of defect repair is underestimated (13). Moderate Tolerable
The size of the software is underestimated (14). High Tolerable
Code generated by code generation tools is inefficient (8). Moderate Insignificant
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Projection
[Pressman, 2010]
• Also called Risk Estimation
• Risk Projection steps:
• Establish a scale that reflects the perceived likelihood of a risk.
• Delineate the consequences of the risk.
• Estimate the impact of the risk on the project and the product.
• Assess the overall accuracy of the risk projection so that there will be no
misunderstandings.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Impact Assessment
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Planning
[Sommerville, 2011]
• Consider each risk and develop a strategy to manage that risk.
• Risk strategies:
• Avoidance strategies.The probability that the risk will arise is reduced.
• Minimization strategies.The impact of the risk on the project or product will be
reduced.
• Contingency plans. If the risk arises, contingency plans are plans to deal with that risk.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management Strategies
[Sommerville, 2011]
Risk Strategy
Organizational financial
problems
Prepare a briefing document for senior management showing how the
project is making a very important contribution to the goals of the business
and presenting reasons why cuts to the project budget would not be cost-
effective.
Recruitment problems Alert customer to potential difficulties and the possibility of delays;
investigate buying-in components.
Staff illness Reorganize team so that there is more overlap of work and people therefore
understand each other’s jobs.
Defective components Replace potentially defective components with bought-in components of
known reliability.
Requirements changes Derive traceability information to assess requirements change impact;
maximize information hiding in the design.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management Strategies
[Sommerville, 2011]
Risk Strategy
Organizational
restructuring
Prepare a briefing document for senior management showing how the
project is making a very important contribution to the goals of the business.
Database performance Investigate the possibility of buying a higher-performance database.
Underestimated
development time
Investigate buying-in components; investigate use of a program generator.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Monitoring
[Sommerville, 2011]
• Assess each identified risks regularly to decide whether or not it is becoming
less or more probable.
• Also assess whether the effects of the risk have changed.
• Each key risk should be discussed at management progress meetings.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Indicators
[Sommerville, 2011]
Risk type Potential indicators
Technology Late delivery of hardware or support software; many reported technology
problems.
People Poor staff morale; poor relationships amongst team members; high staff
turnover.
Organizational Organizational gossip; lack of action by senior management.
Tools Reluctance by team members to use tools; complaints about CASE tools;
demands for higher-powered workstations.
Requirements Many requirements change requests; customer complaints.
Estimation Failure to meet agreed schedule; failure to clear reported defects.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Developing a RiskTable
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Exposure (RE)
[Pressman, 2010]
𝑅𝐸 = 𝑃 ∗ 𝐶
Dimana:
• RE = Risk Exposure
• P = Probability of occurrence for a risk
• C = cost to the project should the risk occur
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Exposure (RE)
[Pressman, 2010]
• Risk identification. Only 70 percent of the software components scheduled
for reuse will, in fact, be integrated into the application.The remaining
functionality will have to be custom developed.
• Risk probability. 80 percent (likely).
• Risk impact. Sixty reusable software components were planned. If only 70
percent can be used, 18 components would have to be developed from
scratch (in addition to other custom software that has been scheduled for
development). Since the average component is 100 LOC and local data
indicate that the software engineering cost for each LOC is $14.00, the
overall cost (impact) to develop the components would be 18 x 100 x $14 =
$25,200.
• Risk exposure. RE = 0.80 x $25,200 ≈ $20,200.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Information Sheet (RIS)
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• COSO ERM (2004)
• Applies to management, directors, regulators, academics and others who are
interested in better understanding enterprise risk management
• COSO ERM is a framework providing integrated principles, common terminology and
practical implementation guidance supporting entities' programs to develop or
benchmark their enterprise risk management processes.
• This standard is voluntary.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO 31000: Risk Management (2009)
• Applies to any public, private or community enterprise, association, group or
individual.Therefore, it is not specific to any industry or sector.
• ISO 31000 provides principles and generic guidelines on risk management.Applies to
any type of risk, whatever its nature, whether having positive or negative
consequences.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO/IEC 31010: Risk Management – Risk AssessmentTechniques (2009)
• Applies to any public, private or community enterprise, association, group or
individual.Therefore, it is not specific to any industry or sector.
• ISO 31010 assists organizations in implementing the risk management principles and
guidelines provided by the recently published ISO 31000:2009, itself complemented by
ISO Guide 73:2009 on risk management vocabulary.This standard deals with risk
assessment concepts, risk assessment process, and selection of risk assessment
techniques.This standard is not intended for certification, regulatory or contractual
use.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO/IEC Guide 73: Risk Management Guidelines (2009)
• Applies to those engaged in managing risks, those who are involved in activities of ISO
and IEC, and developers of national or sector-specific standards, guides, procedures
and codes of practice relating to the management of risk
• The guide provides the definitions of generic terms related to risk management. It
aims to encourage a mutual and consistent understanding of, and a coherent approach
to, the description of activities relating to the management of risk, and the use of
uniform risk management terminology in processes and frameworks dealing with the
management of risk.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• BS 31100 (Risk Management)
• Applies to any organization of any size
• BS 31100 provides a foundation for organizations to understand, create, integrate and
maintain risk management programs by giving recommendations on its model,
framework, and process with the goal of increasing the organizations chances of
meeting its objectives.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
References
• Roger S. Pressman, 2010, Software Engineering: A Practitioner’s Approach
7th edition, McGraw-Hill.
• Ian Sommerville, 2011, Software Engineering 9th edition, Addison-Wesley.
• Other references
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Thanks
• Achmad Solichin, S.Kom, M.T.I
• achmatim@gmail.com
• Twitter: @achmatim
• Facebook: facebook.com/achmatim
• Web: http://achmatim.net
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur

More Related Content

What's hot

Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
Dhamo daran
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
Shashi Kumar
 
Presentation on Project Risk Management
Presentation on Project Risk ManagementPresentation on Project Risk Management
Presentation on Project Risk Management
Md. Masudur Rahman, PMP
 
Lect4 software economics
Lect4 software economicsLect4 software economics
Lect4 software economics
meena466141
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
zeeshanwrch
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimation
tumetr1
 
Spm unit1
Spm unit1Spm unit1
Spm unit1
Naga Dinesh
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Martin Sillaots
 
software-effort_estimation(updated)9 ch05
 software-effort_estimation(updated)9 ch05 software-effort_estimation(updated)9 ch05
software-effort_estimation(updated)9 ch05
Shahid Riaz
 
Project Risk Management
Project Risk ManagementProject Risk Management
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
Navjyotsinh Jadeja
 
project planning-estimation
project planning-estimationproject planning-estimation
project planning-estimation
Reetesh Gupta
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk ManagementGunjan Patel
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
Priya Tomar
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Oleksa Stelmakh
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
ShudipPal
 
risk management
risk managementrisk management
risk management
Arti Maggo
 
Selection of an appropriate project approach
Selection of an appropriate project approachSelection of an appropriate project approach
Selection of an appropriate project approach
tumetr1
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register
simplesteps
 

What's hot (20)

Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Presentation on Project Risk Management
Presentation on Project Risk ManagementPresentation on Project Risk Management
Presentation on Project Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Lect4 software economics
Lect4 software economicsLect4 software economics
Lect4 software economics
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimation
 
Spm unit1
Spm unit1Spm unit1
Spm unit1
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
software-effort_estimation(updated)9 ch05
 software-effort_estimation(updated)9 ch05 software-effort_estimation(updated)9 ch05
software-effort_estimation(updated)9 ch05
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
project planning-estimation
project planning-estimationproject planning-estimation
project planning-estimation
 
Software Risk Management
Software Risk ManagementSoftware Risk Management
Software Risk Management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
risk management
risk managementrisk management
risk management
 
Selection of an appropriate project approach
Selection of an appropriate project approachSelection of an appropriate project approach
Selection of an appropriate project approach
 
Project Risk Register
Project Risk Register Project Risk Register
Project Risk Register
 

Similar to Lecture 03 Software Risk Management

Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
BhagyashriMore10
 
SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
Amr E. Mohamed
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
Achmad Solichin
 
lecture 1-5.pdf
lecture 1-5.pdflecture 1-5.pdf
lecture 1-5.pdf
AkankshaJha53
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
Fáber D. Giraldo
 
04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
ALI2H
 
Various Process of Software Engineering notes
Various Process of Software Engineering notesVarious Process of Software Engineering notes
Various Process of Software Engineering notes
Dr Anuranjan Misra
 
D0365030036
D0365030036D0365030036
D0365030036
theijes
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
yenohhoney
 
SE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementSE_Lec 11_ Project Management
SE_Lec 11_ Project Management
Amr E. Mohamed
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
YaseenNazir3
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software ProjectsJayakumar PP
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
Anton Fajardo
 
GER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfGER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdf
Tigabu Yaya
 
4213ijsea08
4213ijsea084213ijsea08
4213ijsea08
ijseajournal
 
PROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMIPROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMI
IJSEA
 
A novel risk management model in the Scrum and extreme programming hybrid me...
A novel risk management model in the Scrum and extreme  programming hybrid me...A novel risk management model in the Scrum and extreme  programming hybrid me...
A novel risk management model in the Scrum and extreme programming hybrid me...
IJECEIAES
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
KhajaPasha33
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
MuhammadKashif703372
 
“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems
journalBEEI
 

Similar to Lecture 03 Software Risk Management (20)

Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
 
lecture 1-5.pdf
lecture 1-5.pdflecture 1-5.pdf
lecture 1-5.pdf
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
 
04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
 
Various Process of Software Engineering notes
Various Process of Software Engineering notesVarious Process of Software Engineering notes
Various Process of Software Engineering notes
 
D0365030036
D0365030036D0365030036
D0365030036
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
SE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementSE_Lec 11_ Project Management
SE_Lec 11_ Project Management
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
GER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfGER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdf
 
4213ijsea08
4213ijsea084213ijsea08
4213ijsea08
 
PROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMIPROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMI
 
A novel risk management model in the Scrum and extreme programming hybrid me...
A novel risk management model in the Scrum and extreme  programming hybrid me...A novel risk management model in the Scrum and extreme  programming hybrid me...
A novel risk management model in the Scrum and extreme programming hybrid me...
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems
 

More from Achmad Solichin

Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Achmad Solichin
 
Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)
Achmad Solichin
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Achmad Solichin
 
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Achmad Solichin
 
Webinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHPWebinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHP
Achmad Solichin
 
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi LuhurWebinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Achmad Solichin
 
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARUTREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
Achmad Solichin
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
Achmad Solichin
 
Materi Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHPMateri Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHP
Achmad Solichin
 
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan RadiasiPercobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Achmad Solichin
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
Achmad Solichin
 
Depth First Search (DFS) pada Graph
Depth First Search (DFS) pada GraphDepth First Search (DFS) pada Graph
Depth First Search (DFS) pada Graph
Achmad Solichin
 
Breadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada GraphBreadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada Graph
Achmad Solichin
 
Binary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur DataBinary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur Data
Achmad Solichin
 
Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0
Achmad Solichin
 
Seminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web ProgrammerSeminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web Programmer
Achmad Solichin
 
The Big 5: Future IT Trends
The Big 5: Future IT TrendsThe Big 5: Future IT Trends
The Big 5: Future IT Trends
Achmad Solichin
 
Modern PHP Developer
Modern PHP DeveloperModern PHP Developer
Modern PHP Developer
Achmad Solichin
 
Seminar: PHP Developer for Dummies
Seminar: PHP Developer for DummiesSeminar: PHP Developer for Dummies
Seminar: PHP Developer for Dummies
Achmad Solichin
 
Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1
Achmad Solichin
 

More from Achmad Solichin (20)

Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
 
Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
 
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
 
Webinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHPWebinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHP
 
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi LuhurWebinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
 
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARUTREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
 
Materi Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHPMateri Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHP
 
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan RadiasiPercobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
 
Depth First Search (DFS) pada Graph
Depth First Search (DFS) pada GraphDepth First Search (DFS) pada Graph
Depth First Search (DFS) pada Graph
 
Breadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada GraphBreadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada Graph
 
Binary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur DataBinary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur Data
 
Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0
 
Seminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web ProgrammerSeminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web Programmer
 
The Big 5: Future IT Trends
The Big 5: Future IT TrendsThe Big 5: Future IT Trends
The Big 5: Future IT Trends
 
Modern PHP Developer
Modern PHP DeveloperModern PHP Developer
Modern PHP Developer
 
Seminar: PHP Developer for Dummies
Seminar: PHP Developer for DummiesSeminar: PHP Developer for Dummies
Seminar: PHP Developer for Dummies
 
Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Lecture 03 Software Risk Management

  • 1. Software Risk Management Matakuliah Rekayasa Perangkat Lunak (CS215) – Gasal 2015/2016 Magister Ilmu Komputer - Universitas Budi Luhur Achmad Solichin, S.Kom, M.T.I (achmatim@gmail.com) CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 2. A Small Case Study Lintang adalah seorang freelancer yang tinggal diTangerang. Sebagai web developer, Lintang sudah 4 tahun berpengalaman membangun berbagai aplikasi berbasis web. Saat ini, Lintang juga sedang terikat kontrak maintenance sebuah sistem HRIS berbasis web di perusahaan XYZ selama setahun mendatang. Selain itu, Lintang juga sedang melanjutkan studi di Magister Ilmu Komputer, Universitas Budi Luhur (semester 3). Suatu hari, seorang kenalan bernama Mulyanto menawarkan sebuah project untuk membangun sistem informasi laundry berbasis web. Berdasarkan hasil pertemuan antara Lintang dan Mulyanto, diperoleh beberapa informasi terkait project yg ditawarkan. Mulyanto memiliki 4 usaha laundry yang tersebar di sejumlah tempat di Jakarta danTangerang. Sebagai pemilik, Mulyanto ingin mengetahui dan mengontrol dg cepat bagaimana bisnis laundry dijalankan oleh anak buahnya, melalui sebuah aplikasi berbasis web. Mulai dari proses penyerahan pakaian oleh pelanggan, proses pengerjaan oleh pegawai hingga pendapatan untuk setiap pegawai harus tercatat dg baik di aplikasi. Selain berdasarkan kehadiran, pendapatan masing2 pegawai juga dihitung berdasarkan jumlah pekerjaan yang dilakukan. Sebagai seorang lulusan kampus ternama, Mulyanto sudah menyusun rancangan aplikasi yang diinginkan, mulai dari rancangan layar, rancangan masukan, rumus / perhitungan, rancangan basis data hingga rancangan laporan. Semua disusun berdasarkan pengalaman Mulyanto menangani bisnis laundry. Memang, Mulyanto termasuk orang yg sangat perfeksionis dan selektif dlm mengerjakan sesuatu. Kali ini dia mencari seorang programmer berpengalaman yg sanggup mengimplementasikan rancangannya menjadi sebuah aplikasi yg dapat langsung digunakan setidaknya 2 bulan mendatang. Mulyanto menjanjikan kompensasi yang cukup besar untuk pekerjaan ini. Menurut Anda, Lintang harus menerima atau menolak tawaran project dari Mulyanto? Jelaskan! CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 3. Overview • What is Software Risk Management? • Risk Management Process • Risk Management Strategies • Risk Metrics (Risk Estimation) • International Risk Management Standards. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 4. Important Goals of Project Management • Deliver the software to the customer at the agreed time. • Keep overall costs within budget. • Deliver software that meets the customer’s expectations. • Maintain a happy and well-functioning development team. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 5. Project Manager Responsibility • Project planning. Project managers are responsible for planning, estimating and scheduling project development, and assigning people to tasks. • Reporting. Project managers are usually responsible for reporting on the progress of a project to customers and to the managers of the company developing the software. • Risk management. Project managers have to assess the risks that may affect a project, monitor these risks, and take action when problems arise • People management. Project managers are responsible for managing a team of people. • Proposal writing.The first stage in a software project may involve writing a proposal to win a contract to carry out an item of work [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 6. Risk Management • Risk management involves anticipating risks that might affect the project schedule or the quality of the software being developed, and then taking action to avoid these risks (Hall, 1998; Ould, 1999) • Three categories of Risk: • Project risks. Risks that affect the project schedule or resources. Ex: the loss of an experienced designer. • Product risks. Risks that affect the quality or performance of the software being developed. Ex: the failure of a purchased component to perform as expected. • Business risks. Risks that affect the organization developing or procuring the software. Ex: a competitor introducing a new product. [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 7. Reactive Risk Management • Project team reacts to risks when they occur. • Mitigation—plan for additional resources in anticipation of fire fighting • Fix on failure—resource are found and applied when the risk strikes • Crisis management—failure does not respond to applied resources and project is in jeopardy. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 8. Proactive Risk Management • Formal risk analysis is performed. • Organization corrects the root causes of risk • TQM (total quality management) concepts and statistical SQA • Examining risk sources that lie beyond the bounds of the software • Developing the skill to manage change [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 9. Principle of Risk Management • Maintain a global perspective—view software risks within the context of a system in which it is a component and the business problem that it is intended to solve • Take a forward-looking view—think about the risks that may arise in the future (e.g., due to changes in the software); establish contingency plans so that future events are manageable. • Encourage open communication—if someone states a potential risk, don’t discount it. If a risk is proposed in an informal manner, consider it. Encourage all stakeholders and users to suggest risks at any time. • Integrate—a consideration of risk must be integrated into the software process. • Emphasize a continuous process—the team must be vigilant throughout the software process, modifying identified risks as more information is known and adding new ones as better insight is achieved. • Develop a shared product vision—if all stakeholders share the same vision of the software, it is likely that better risk identification and assessment will occur. • Encourage teamwork—the talents, skills, and knowledge of all stakeholders should be pooled when risk management activities are conducted. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 10. Example of Risks [Sommerville, 2011] Risk Affects Description Staff turnover Project Experienced staff will leave the project before it is finished. Management change Project There will be a change of organizational management with different priorities. Hardware unavailability Project Hardware that is essential for the project will not be delivered on schedule. Requirements change Project and product There will be a larger number of changes to the requirements than anticipated. Specification delays Project and product Specifications of essential interfaces are not available on schedule. Size underestimate Project and product The size of the system has been underestimated. CASE tool underperformance Product CASE tools, which support the project, do not perform as anticipated. Technology change Business The underlying technology on which the system is built is superseded by new technology. Product competition Business A competitive product is marketed before the system is completed. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 11. The Risk Management Process [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 12. Risk Identification [Sommerville, 2011] • May be a team activities or based on the individual project manager’s experience. • Six types of common risk: 1. Technology risks. Risks that derive from the software or hardware technologies that are used to develop the system. 2. People risks. Risks that are associated with the people in the development team. 3. Organizational risks. Risks that derive from the organizational environment where the software is being developed. 4. Tools risks. Risks that derive from the software tools and other support software used to develop the system. 5. Requirements risks. Risks that derive from changes to the customer requirements and the process of managing the requirements change. 6. Estimation risks. Risks that derive from the management estimates of the resources required to build the system. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 13. Risk Identification [Sommerville, 2011] Risk type Possible risks Technology The database used in the system cannot process as many transactions per second as expected. (1) Reusable software components contain defects that mean they cannot be reused as planned. (2) People It is impossible to recruit staff with the skills required. (3) Key staff are ill and unavailable at critical times. (4) Required training for staff is not available. (5) Organizational The organization is restructured so that different management are responsible for the project. (6) Organizational financial problems force reductions in the project budget. (7) Tools The code generated by software code generation tools is inefficient. (8) Software tools cannot work together in an integrated way. (9) Requirements Changes to requirements that require major design rework are proposed. (10) Customers fail to understand the impact of requirements changes. (11) Estimation The time required to develop the software is underestimated. (12) The rate of defect repair is underestimated. (13) The size of the software is underestimated. (14) CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 14. Risk Analysis [Sommerville, 2011] • Assess probability and seriousness of each risk. • Probability may be:Very Low (< 10%), Low (10-25%), Moderate (25-50%), High (50-75%) orVery High (> 75%). • Risk consequences might be: Catastrophic (threaten the survival of the project), Serious (would cause major delays),Tolerable (delays are within allowed contingency), or Insignificant. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 15. RiskTypes and Example [Sommerville, 2011] Risk Probability Effects Organizational financial problems force reductions in the project budget (7). Low Catastrophic It is impossible to recruit staff with the skills required for the project (3). High Catastrophic Key staff are ill at critical times in the project (4). Moderate Serious Faults in reusable software components have to be repaired before these components are reused. (2). Moderate Serious Changes to requirements that require major design rework are proposed (10). Moderate Serious The organization is restructured so that different management are responsible for the project (6). High Serious The database used in the system cannot process as many transactions per second as expected (1). Moderate Serious CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 16. RiskTypes and Example [Sommerville, 2011] Risk Probability Effects The time required to develop the software is underestimated (12). High Serious Software tools cannot be integrated (9). High Tolerable Customers fail to understand the impact of requirements changes (11). Moderate Tolerable Required training for staff is not available (5). Moderate Tolerable The rate of defect repair is underestimated (13). Moderate Tolerable The size of the software is underestimated (14). High Tolerable Code generated by code generation tools is inefficient (8). Moderate Insignificant CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 17. Risk Projection [Pressman, 2010] • Also called Risk Estimation • Risk Projection steps: • Establish a scale that reflects the perceived likelihood of a risk. • Delineate the consequences of the risk. • Estimate the impact of the risk on the project and the product. • Assess the overall accuracy of the risk projection so that there will be no misunderstandings. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 18. Risk Impact Assessment [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 19. Risk Planning [Sommerville, 2011] • Consider each risk and develop a strategy to manage that risk. • Risk strategies: • Avoidance strategies.The probability that the risk will arise is reduced. • Minimization strategies.The impact of the risk on the project or product will be reduced. • Contingency plans. If the risk arises, contingency plans are plans to deal with that risk. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 20. Risk Management Strategies [Sommerville, 2011] Risk Strategy Organizational financial problems Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business and presenting reasons why cuts to the project budget would not be cost- effective. Recruitment problems Alert customer to potential difficulties and the possibility of delays; investigate buying-in components. Staff illness Reorganize team so that there is more overlap of work and people therefore understand each other’s jobs. Defective components Replace potentially defective components with bought-in components of known reliability. Requirements changes Derive traceability information to assess requirements change impact; maximize information hiding in the design. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 21. Risk Management Strategies [Sommerville, 2011] Risk Strategy Organizational restructuring Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business. Database performance Investigate the possibility of buying a higher-performance database. Underestimated development time Investigate buying-in components; investigate use of a program generator. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 22. Risk Monitoring [Sommerville, 2011] • Assess each identified risks regularly to decide whether or not it is becoming less or more probable. • Also assess whether the effects of the risk have changed. • Each key risk should be discussed at management progress meetings. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 23. Risk Indicators [Sommerville, 2011] Risk type Potential indicators Technology Late delivery of hardware or support software; many reported technology problems. People Poor staff morale; poor relationships amongst team members; high staff turnover. Organizational Organizational gossip; lack of action by senior management. Tools Reluctance by team members to use tools; complaints about CASE tools; demands for higher-powered workstations. Requirements Many requirements change requests; customer complaints. Estimation Failure to meet agreed schedule; failure to clear reported defects. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 24. Developing a RiskTable [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 25. Risk Exposure (RE) [Pressman, 2010] 𝑅𝐸 = 𝑃 ∗ 𝐶 Dimana: • RE = Risk Exposure • P = Probability of occurrence for a risk • C = cost to the project should the risk occur CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 26. Risk Exposure (RE) [Pressman, 2010] • Risk identification. Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application.The remaining functionality will have to be custom developed. • Risk probability. 80 percent (likely). • Risk impact. Sixty reusable software components were planned. If only 70 percent can be used, 18 components would have to be developed from scratch (in addition to other custom software that has been scheduled for development). Since the average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00, the overall cost (impact) to develop the components would be 18 x 100 x $14 = $25,200. • Risk exposure. RE = 0.80 x $25,200 ≈ $20,200. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 27. Risk Information Sheet (RIS) [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 28. International Risk Management Standards • COSO ERM (2004) • Applies to management, directors, regulators, academics and others who are interested in better understanding enterprise risk management • COSO ERM is a framework providing integrated principles, common terminology and practical implementation guidance supporting entities' programs to develop or benchmark their enterprise risk management processes. • This standard is voluntary. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 29. International Risk Management Standards • ISO 31000: Risk Management (2009) • Applies to any public, private or community enterprise, association, group or individual.Therefore, it is not specific to any industry or sector. • ISO 31000 provides principles and generic guidelines on risk management.Applies to any type of risk, whatever its nature, whether having positive or negative consequences. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 30. International Risk Management Standards • ISO/IEC 31010: Risk Management – Risk AssessmentTechniques (2009) • Applies to any public, private or community enterprise, association, group or individual.Therefore, it is not specific to any industry or sector. • ISO 31010 assists organizations in implementing the risk management principles and guidelines provided by the recently published ISO 31000:2009, itself complemented by ISO Guide 73:2009 on risk management vocabulary.This standard deals with risk assessment concepts, risk assessment process, and selection of risk assessment techniques.This standard is not intended for certification, regulatory or contractual use. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 31. International Risk Management Standards • ISO/IEC Guide 73: Risk Management Guidelines (2009) • Applies to those engaged in managing risks, those who are involved in activities of ISO and IEC, and developers of national or sector-specific standards, guides, procedures and codes of practice relating to the management of risk • The guide provides the definitions of generic terms related to risk management. It aims to encourage a mutual and consistent understanding of, and a coherent approach to, the description of activities relating to the management of risk, and the use of uniform risk management terminology in processes and frameworks dealing with the management of risk. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 32. International Risk Management Standards • BS 31100 (Risk Management) • Applies to any organization of any size • BS 31100 provides a foundation for organizations to understand, create, integrate and maintain risk management programs by giving recommendations on its model, framework, and process with the goal of increasing the organizations chances of meeting its objectives. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 33. References • Roger S. Pressman, 2010, Software Engineering: A Practitioner’s Approach 7th edition, McGraw-Hill. • Ian Sommerville, 2011, Software Engineering 9th edition, Addison-Wesley. • Other references CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 34. Thanks • Achmad Solichin, S.Kom, M.T.I • achmatim@gmail.com • Twitter: @achmatim • Facebook: facebook.com/achmatim • Web: http://achmatim.net CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur

Editor's Notes

  1. LOC = line of code
  2. LOC = line of code