SlideShare a Scribd company logo
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
DOI : 10.5121/ijsea.2015.6107 81
PROJECT RISK MANAGEMENT MODEL BASED ON
PRINCE2 AND SCRUM FRAMEWORKS
Martin Tomanek and Jan Juricek
Department of Systems Analysis, University of Economics, Prague, Czech Republic
ABSTRACT
There is a lack of formal risk management techniques in agile software development methods Scrum.
The need to manage risks in agile project management is also identified by various authors. Authors
conducted a survey to find out the current practices in agile project management. Furthermore authors
discus the new integration framework of Scrum and PRINCE2 with focus on risk management. Enrichment
of Scrum with selected practices from the heavy-weight project management methodology PRINCE2
promises better results in delivering software products especially in global development projects.
KEYWORDS
Project Management, Risk Management, PRINCE2, Scrum, Agile
1. INTRODUCTION
Agile methods grew out of the real-life project experiences of leading software professionals who
had experienced the challenges and limitations of traditional waterfall development
methodologies on projects after projects. The agile development frameworks are widely used and
they don’t contain any risk management techniques because it is believed that short iterative
development cycles will minimize any unpredictable impact related to product development [1],
[2]. However in larger projects or during development of complex products, especially in the
global environment, the need of proper risk management is required. From the audit perspective,
there is the clear control requirement “BAI01.10 Manage programme and project risk“ defined by
COBIT 5 that requires that project risks should be systematically identified, analysed, responded
to, monitored and controlled. Additionally the risks should be centrally recorded [3, p. 125].
Additionally, controlling risk in software projects is considered to be a major contributor to
project success [4].
The need to manage risks in agile project management is also identified by various authors.
The SOA principles from the agile project management perspective were used to create
a framework for understanding agile risk management strategies for global IT projects [5]. Main
risk models and frameworks used by software engineers are discussed with conclusion that
the risk management steps are required for delivery of quality software [6], [7]. Agile
methodologies don’t cover the risk management knowledge area that can be taken from project
management frameworks like PMBOK [8]. Risks related to global software development projects
using Scrum have been researched and a conceptual framework to mitigate them designed [9].
Also the increasing variety of security threats should be managed as risks in the agile
development projects [10], [11].
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
82
The authors of this paper prove that this lack of risk management techniques in agile development
can be fixed by aligning risk management techniques between project management framework
PRINCE2 and agile product development framework Scrum. However the traditional risk
management is heavily centred on documentation and agile development principles tries to avoid
any unnecessary documentation and focus more on people iteration [12].
2. PRINCE2 RISK MANAGEMENT PROCESS
Prince2 provides a disciplined environment for implementation of risk responses based
on identifying and assessing project risks. Lack of the proper risk management is the one of
the leading factor, why the projects failed [13]. Risk management within PRINCE2 methodology
contains three dimensions: risk management strategy (how risk management will be embedded in
the project management activities, what is the risk tolerance and when is the exception triggered);
Risk register as a tool for capturing and maintaining information of identified threads and
opportunities (Project Support will typically maintain the Risk Register on behalf of the Project
Manager); and a risk management procedure [14].
The project risk management process recommends 5 steps: identify, assess (estimation and
evaluation), plan, implement and communicate. The first four steps are sequential,
with the ’Communicate’ step running in parallel; As well as techniques for identification, risk
estimation and evaluation techniques and thread responses (avoid, reduce, fallback, transfer,
share, accept). In the implement step, the risk owner and the risk actionee roles are defined.
The risk owner is a named individual who is responsible for the management, monitoring and
control of a risk, while the risk actionee is an individual assigned to carry out a risk response
action or actions to respond to a particular risk or a set of risks. They support and take direction
from the risk owner.
3. RISK MANAGEMENT IN SCRUM
Scrum doesn’t define the formal risk management process or even the risk owner. However every
Scrum artefact or meeting potentially help to identify or mitigate risks. The list of artefacts and
meetings with related risks is described for example in [15]. If the Scrum master, the product
owner or the development team want to manage risks in a more formal or in a more proactive
way then they can use for example a simple risk register [1] or a risk burn-down chart [16]. If
they do so then it will be recommended to prioritize the highest-value and highest-risk
requirements first in the upcoming sprint [15].
In the Scrum guide [17] there is a concept of impediments. The impediment can be anything that
keeps a team from being productive. From risk management perspective the impediment is equal
to an issue (a materialized risk). The Scrum master is responsible to solve these impediments and
let the development team work in effective environment.
The other risk management model, mentioned in [18], combines the PMBOK approach with
Scrum. The author suggests using a risk board with two kinds of notes. The red notes are used to
describe the risks and the yellow ones to describe the risk responses. Another good example how
risks can be potentially mitigated in Scrum (such an intrinsic schedule flaw, specification
breakdown, scope creep, and personnel loss and productivity variance) is mentioned by [19].
Some techniques have been developed to support the story prioritization based on inherit risks,
for example the story-risk prioritization matrix [20] or the risk burn-down technique [21].
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
83
4. SURVEY
The authors of this paper conducted in April and May 2014 a survey with objective to found out
how project managers manage risks in agile software development projects. The completed
survey was received from 64 project managers working in Czech Republic and Slovakia
on global software development projects.
The results of the survey:
• 67 % of respondents review the project risks on weekly basis.
• 87 % of respondents stated that the project manager is formally responsible for managing
risks.
• 27 % of respondents stated that also the product owner is formally responsible
for managing risks.
• Respondents were asked who primarily identifies the risks. The project team members
(80%), the project manager (67 %), the development team member (40%) and the scrum
master (40%).
• 73 % of respondents use a risk log or risk register to document and maintain risks.
The rest of respondents 27 % use different techniques or don’t document risks at all.
Respondents were also asked what risk attributes they document and keep watching. The Figure 1
shows the result. The most important risk attribute is the risk exposure (severity of impact) and
likelihood that are defined during risk assessment and analysis exercise. The mitigation actions
and responsible persons are the key elements of risk management. The responsible person
executes the mitigation actions in order to mitigate the risks.
Figure 1. Risk Attributes. Source: The survey conducted by authors.
The Figure 2 shows the Scrum meetings where the project managers discuss the risks
with the development team. The most critical meeting for identifying risks and planning
mitigation actions is the sprint planning meeting. The review of existing risks and identification
of potential risks introduced by the product increment is done in the spring review meeting.
As the project manager needs to regularly review the risk status, the weekly status meeting is
ideal for him or her. The weekly status meeting can be an extended version of the daily Scrum
meeting.
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
84
Figure 2. Risk Meetings. Source: The survey conducted by authors.
The last question was formulated as “Do you think that agile development frameworks should be
enriched by the risk management techniques from the project management framework?” The
majority of respondents (60%) think that the enrichment would be helpful and 40% think that
there is no value in this enrichment.
5. TAILORING OF PRINCE2 PROJECT AND RISK MANAGEMENT TO MEET
THE SCRUM APPROACH
At first, integrated process model should be created for tailoring the PRINCE2 project
management process model to meet the Scrum approach. This conceptual model has been
developed and it is described in [22]. In this paper this model was further reviewed, slightly
modified and key meetings (ceremonies) and documents highlighted in red, see the Figure 3.
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
85
Corporateor
ProgrammeProjectBoardProjectManagerScrummaster
Project Mandate
Starting Up
a Project
Initiating a
Project
Directing a Project
Controling a Stage
Managing a Stage
Boundary
Closing a Project
Closure Notification
Project
Brief &
Business
Case
Project
Plan
Authorization
DevelopmentTeamProductOwner
Facilitating Scrum
Creating Initial
Requirements
Delivering an Increment
Sprint
Planning
Daily Sprint
Sprint
Review
Product
Backlog
Spring
Backlog
Defining, Prioritizing and
Communicating Requirements
Burndown
report
Sprint Retrospective
Product
Increment
End Stage Report End Project ReportHighlight
Report
Weekly Status Meeting
Figure 3. Process model integrating PRINCE2 and Scrum frameworks with highlighted risk meetings.
Source: Authors.
5.1. Key meetings and documents
The sprint planning meeting is the key meeting where the risks are identified. These risks are
mostly related to the stories/software features that will be developed in the coming sprint. Based
on the risk-story prioritization technique [20], the high-risk stories should be selected first and
developed first. All the risks related to the developing features should be adequately assessed and
evaluated by the development team. The risk attributes that are mostly used are: risk exposure,
mitigation actions, likelihood, responsible person and financial impact (based on authors’ survey).
The weekly status meeting should contain the review of the current sprint risks. This meeting
should be led by the project manager. The Scrum master should also participate in this meeting
because he/she has the overview of the risks and other impediments the development team is
facing to. It is a good practise to invite also risk actionees who can comment on progress for the
critical risks or risks with the lowest risk proximity. As a suitable technique for reviewing the
total sprint risk exposure can be the risk burndown chart [21].
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
86
The sprint review meeting is focused on presenting the product increment to the product owner
and other customers/key users. The risks related to the development of product features should be
already mitigated and closed. If some risks are not fully mitigated then the residual risks should
be presented here and accepted. Also new risks that were identified during the development and
are not fully mitigated can be presented here and mitigation actions planned.
The highlight report is used by the project manager to inform the project board about the project
progress. Information about the key risks should be part of this report.
The Table 1 describes the mandatory or optional risk related tasks that are done during the Scrum
meetings. This does not mean that risk identification, assessment and responses would only be
done during these meetings. Most of the work will be done between the meetings in the process
“Delivering the product increment” that is represented by the Sprint. M means mandatory and it
should be done every time or on a continuous basis, O means optional and it should be done only
if needed.
Table 1. Risk Management Activities in Scrum Meetings and the sprint, Source: Authors.
Risk Actions
Scrum
meetings
Identification Assessment
Response
Plan
Apply
Response
Risk
Approval
Sprint
Planning
M M M O
Daily Sprint O O O
Sprint Review O O O M
Sprint M
Retrospective O O O
5.2. Risk Escalation
One of the PRINCE2 principles is the Manage by exception. The project manager manages the
project and tries to keep the project within its budget, deliver the project on time and in required
quality. For these aspects the project manager has defined boundaries within which he or she can
act. If these limits are exceeded then project board involvement is required. Additional boundaries
are specified by the project manager for the development team. The development team also acts
in defined limits and when these limits are exceeded then it must be escalated to the project
manager. These limits can be set for example to: minimum number of stories/features to be
delivered in the sprint, acceptable deviation for the sprint progress based on the burndown chart
and also for the criticality of the identified risks.
6. CONCLUSIONS
Risk management in agile software development projects has been discussed by many researchers
and various techniques have been proposed. However, based on the literature review executed by
authors, there is no comprehensive model for embedding the project risk management process
into the Scrum framework. Authors also executed a survey with objective to understand how
project managers manage risks in the agile software development projects. As a final result of this
paper the authors proposed to extend the conceptual framework for managing agile software
development projects, based on Scrum and PRINCE2, by risk management aspects. The
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
87
conceptual framework is extended by mandatory or optional risk related tasks that are done
during the Scrum meetings. The major Scrum meetings and their relations to risk management
activities have been discussed. The benefits of agile – scrum risk management include improving
capacity to manage project uncertainties on the product delivery level and enhance
communication of risks within the entire project organization.
REFERENCES
[1] D. G. Edzreena Odzaly, “Lightweight Risk Management in Agile Projects,” Proc. Int. Conf. Softw.
Eng. Knowl. Eng., vol. 26, pp. 576–581, Jul. 2014.
[2] R. L. Rick Dove, “Fundamentals of Agile Systems Engineering – Part 1 and Part 2,” Int. Counc. Syst.
Eng. Int. Symp. 2014, 2014.
[3] ISACA, COBIT 5 - Enabling Processes. Rolling Meadows, IL 60008 USA: ISACA, 2012.
[4] P. L. Bannerman, “Risk and risk management in software projects: A reassessment,” J. Syst. Softw.,
vol. 81, no. 12, pp. 2118–2133, Dec. 2008.
[5] O.-K. D. Lee and D. V. Baby, “Managing Dynamic Risks in Global It Projects: Agile Risk-
Management Using the Principles of Service-Oriented Architecture,” Int. J. Inf. Technol. Decis. Mak.,
vol. 12, no. 6, pp. 1121–1150, Nov. 2013.
[6] S. S. Limkar and V. P. Bhosale, “Software Project Risk Management,” in Proceedings of the 5th
National Conference; INDIACom-2011, New Delhi, 2011.
[7] S. C. Misra, U. Kumar, V. Kumar, and M. A. Shareef, “Risk management models in software
engineering,” Int. J. Process Manag. Benchmarking, vol. 2, no. 1, pp. 59–70, Jan. 2007.
[8] M. N. Brohi, “Embedding project management into XP, SCRUM and RUP,” Eur. Sci. J., vol. 10, no.
15, pp. 293–307, 2014.
[9] M. A. B. Emam Hossain, “Risk Identification and Mitigation Processes for Using Scrum in Global
Software Development: A Conceptual Framework.,” Softw. Eng. Conf. 2009 APSEC 09 Asia-Pac.,
pp. 457–464, 2009.
[10] R. B. M. Siponen, “Integrating Security into Agile Development Methods,” Syst. Sci. 2005 HICSS 05
Proc. 38th Annu. Hawaii Int. Conf. On, p. 185a – 185a, 2005.
[11] I. G. Zulkarnain Azham, “Security backlog in Scrum security practices,” Softw. Eng. MySEC 2011
5th Malays. Conf., pp. 414 – 417, 2011.
[12] K. Beck, M. Beedle, A. van Bennekum, A. Cockburn, W. Cunningham, M. Fowler, J. Grenning, J.
Highsmith, A. Hunt, R. Jeffries, J. Kern, B. Marick, R. C. Martin, S. Mellor, K. Schwaber, J.
Sutherland, and D. Thomas, “Manifesto for Agile Software Development,” 2001. [Online]. Available:
http://agilemanifesto.org/. [Accessed: 16-Dec-2012].
[13] N. Cerpa and J. M. Verner, “Why did your project fail?,” Commun. ACM, vol. 52, no. 12, p. 130,
Dec. 2009.
[14] OGC, Managing Successful Projects with PRINCE2: 2009 Edition, 2009th ed. Stationery Office
Books, 2009.
[15] M. C. Layton, “How to Manage Risk within Agile Management - For Dummies,” Agile Project
Management For Dummies, May-2012. [Online]. Available: http://www.dummies.com/how-
to/content/how-to-manage-risk-within-agile-management.html. [Accessed: 18-Mar-2014].
[16] S. T. Veethil, “Risk Management in Agile,” Scrum Alliance, 03-May-2013. [Online]. Available:
http://www.scrumalliance.org/community/articles/2013/2013-may/risk-management-in-agile.
[Accessed: 18-Mar-2014].
[17] K. Schwaber and J. Sutherland, “The Scrum Guide: The definitive guide to Scrum: The rules of the
game.” SCRUM.org, Jul-2013.
[18] V. Ylimannela, “A model for risk management in agile software development,” 16-Mar-2012.
[Online]. Available: http://www.cloudsw.org/under-review/a6f468c9-4857-4206-96ee-
f67df0583d41/file_initial_version. [Accessed: 18-Mar-2014].
[19] V. Morris, “Managing Risk in Scrum, Part 1,” SolutionsIQ, 28-Oct-2011. [Online]. Available:
http://www.solutionsiq.com/resources/agileiq-blog/bid/70560/Managing-Risk-in-Scrum-Part-1.
[Accessed: 18-Mar-2014].
[20] A. Arora and C. Naresh, “A Risk Based Story Prioritization Technique In An Agile Environment,”
Int. J. Adv. Found. Rese Arch Comput. IJAFRC, vol. 1, no. 7, pp. 16–25, 2014.
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
88
[21] M. Singh and R. Saxena, “Risk Management in Agile Model,” IOSR J. Comput. Eng., vol. 16, no. 5,
pp. 43–46, 2014.
[22] M. Tomanek, R. Cermak, and Z. Smutny, “A Conceptual Framework for Web Development Projects
Based on Project Management and Agile Development Principles,” 10th Eur. Conf. Manag.
Leadersh. Gov. ECMLG 2014, vol. 10, pp. 550–558, Nov. 2014.
AUTHORS
Martin Tomanek graduated from applied informatics at the Faculty of Informatics and Statistics,
University of Economics, Prague. Currently, he is PhD student at the Department of Systems Analysis,
Faculty of Informatics and Statistics, University of Economics, Prague, where he develops the integrated
framework based on PRINCE2, Scrum and other best practices used in SW development area.
Jan Juricek graduated from applied informatics at the Faculty of Informatics and Statistics, University of
Economics, Prague. Currently, he is PhD student at the Department of Systems Analysis, Faculty of
Informatics and Statistics, University of Economics, Prague, where he deals with agile principles,
objectives and benefits in project management.

More Related Content

What's hot

Risk Management
Risk ManagementRisk Management
Risk Management
Hinal Lunagariya
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
Achmad Solichin
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk Management
Minhas Kamal
 
A risk management framework for distributed scrum using PRINCE2 methodology
A risk management framework for distributed scrum using PRINCE2 methodologyA risk management framework for distributed scrum using PRINCE2 methodology
A risk management framework for distributed scrum using PRINCE2 methodology
journalBEEI
 
PMP_Project Risk Management
PMP_Project Risk ManagementPMP_Project Risk Management
PMP_Project Risk Management
Hisham Haridy MBA, PMP®, RMP®, SP®
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
deep sharma
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
AYESHA JAVED
 
Risk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP examRisk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP exam
Maria Kirk
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)
Adnan Naseem
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
EMAC Consulting Group
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
Glen Alleman
 
Agile project management and normative
Agile project management and normativeAgile project management and normative
Agile project management and normative
Glen Alleman
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
Rogerio P C do Nascimento
 
risk management
risk managementrisk management
risk management
Arti Maggo
 
Project risk management
Project risk managementProject risk management
Project risk management
Yogender Singh Rana
 
What is risk?
What is risk?What is risk?
What is risk?
Glen Alleman
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual Essay
Prince Bertrand
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
Shashi Kumar
 
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) examRanga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
rrangraj
 
Risk management case study
Risk management case studyRisk management case study
Risk management case study
Eng.Ahmed Said Mohamed Refaei
 

What's hot (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk Management
 
A risk management framework for distributed scrum using PRINCE2 methodology
A risk management framework for distributed scrum using PRINCE2 methodologyA risk management framework for distributed scrum using PRINCE2 methodology
A risk management framework for distributed scrum using PRINCE2 methodology
 
PMP_Project Risk Management
PMP_Project Risk ManagementPMP_Project Risk Management
PMP_Project Risk Management
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
 
Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...Critical analysis of an integrative contingency model of software project ris...
Critical analysis of an integrative contingency model of software project ris...
 
Risk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP examRisk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP exam
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
Agile project management and normative
Agile project management and normativeAgile project management and normative
Agile project management and normative
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
risk management
risk managementrisk management
risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
What is risk?
What is risk?What is risk?
What is risk?
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual Essay
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) examRanga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
 
Risk management case study
Risk management case studyRisk management case study
Risk management case study
 

Viewers also liked

A formal conceptual framework
A formal conceptual frameworkA formal conceptual framework
A formal conceptual framework
ijseajournal
 
Iso9126 based software quality evaluation using choquet integral
Iso9126 based software quality evaluation using choquet integral Iso9126 based software quality evaluation using choquet integral
Iso9126 based software quality evaluation using choquet integral
ijseajournal
 
Observations of service
Observations of serviceObservations of service
Observations of service
ijseajournal
 
A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...
ijseajournal
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximum
ijseajournal
 
A method for business process reengineering based on enterprise ontology
A method for business process reengineering based on enterprise ontologyA method for business process reengineering based on enterprise ontology
A method for business process reengineering based on enterprise ontology
ijseajournal
 
An extended stable marriage problem
An extended stable marriage problemAn extended stable marriage problem
An extended stable marriage problem
ijseajournal
 

Viewers also liked (7)

A formal conceptual framework
A formal conceptual frameworkA formal conceptual framework
A formal conceptual framework
 
Iso9126 based software quality evaluation using choquet integral
Iso9126 based software quality evaluation using choquet integral Iso9126 based software quality evaluation using choquet integral
Iso9126 based software quality evaluation using choquet integral
 
Observations of service
Observations of serviceObservations of service
Observations of service
 
A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximum
 
A method for business process reengineering based on enterprise ontology
A method for business process reengineering based on enterprise ontologyA method for business process reengineering based on enterprise ontology
A method for business process reengineering based on enterprise ontology
 
An extended stable marriage problem
An extended stable marriage problemAn extended stable marriage problem
An extended stable marriage problem
 

Similar to Project risk management model based on prince2 and scrum frameworks

Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodology
IJECEIAES
 
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
ijseajournal
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
Umair Abbas
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature Review
IRJET Journal
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
GeorgeKabongah2
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
felicidaddinwoodie
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
EECJOURNAL
 
Plan risk management
Plan risk management Plan risk management
Plan risk management
Shereef Sabri
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
Glen Alleman
 
The Project Risk Management Process
The Project Risk Management ProcessThe Project Risk Management Process
The Project Risk Management Process
Joshua (Josh) Pratchard
 
Managing Risk as Opportunity
Managing Risk as OpportunityManaging Risk as Opportunity
Managing Risk as Opportunity
Glen Alleman
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
Invensis Learning
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
IJECEIAES
 
Schwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.pptSchwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.ppt
AyidAlmgati
 
Project of entrepreneurship
Project of entrepreneurship Project of entrepreneurship
Project of entrepreneurship
AliAbbas390458
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
KamranKhan353531
 
presentation project risk management description
presentation project risk management descriptionpresentation project risk management description
presentation project risk management description
mambojumb
 
Risk Management
Risk ManagementRisk Management
Risk Management
rajuinstru
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
Mohamed Salah Eldien Mohamed Ali
 

Similar to Project risk management model based on prince2 and scrum frameworks (20)

Risk management framework in Agile software development methodology
Risk management framework in Agile software development  methodologyRisk management framework in Agile software development  methodology
Risk management framework in Agile software development methodology
 
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
A NEW MATHEMATICAL RISK MANAGEMENT MODEL FOR AGILE SOFTWARE DEVELOPMENT METHO...
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
 
IRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature ReviewIRJET- Risk Management in Construction: A Literature Review
IRJET- Risk Management in Construction: A Literature Review
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
 
Plan risk management
Plan risk management Plan risk management
Plan risk management
 
Managing risk as Opportunity
Managing risk as OpportunityManaging risk as Opportunity
Managing risk as Opportunity
 
The Project Risk Management Process
The Project Risk Management ProcessThe Project Risk Management Process
The Project Risk Management Process
 
Managing Risk as Opportunity
Managing Risk as OpportunityManaging Risk as Opportunity
Managing Risk as Opportunity
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
PORM: Predictive Optimization of Risk Management to Control Uncertainty Probl...
 
Schwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.pptSchwalbe-11ProjectRisk.ppt
Schwalbe-11ProjectRisk.ppt
 
Project of entrepreneurship
Project of entrepreneurship Project of entrepreneurship
Project of entrepreneurship
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
presentation project risk management description
presentation project risk management descriptionpresentation project risk management description
presentation project risk management description
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Project risk management model based on prince2 and scrum frameworks

  • 1. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 DOI : 10.5121/ijsea.2015.6107 81 PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS Martin Tomanek and Jan Juricek Department of Systems Analysis, University of Economics, Prague, Czech Republic ABSTRACT There is a lack of formal risk management techniques in agile software development methods Scrum. The need to manage risks in agile project management is also identified by various authors. Authors conducted a survey to find out the current practices in agile project management. Furthermore authors discus the new integration framework of Scrum and PRINCE2 with focus on risk management. Enrichment of Scrum with selected practices from the heavy-weight project management methodology PRINCE2 promises better results in delivering software products especially in global development projects. KEYWORDS Project Management, Risk Management, PRINCE2, Scrum, Agile 1. INTRODUCTION Agile methods grew out of the real-life project experiences of leading software professionals who had experienced the challenges and limitations of traditional waterfall development methodologies on projects after projects. The agile development frameworks are widely used and they don’t contain any risk management techniques because it is believed that short iterative development cycles will minimize any unpredictable impact related to product development [1], [2]. However in larger projects or during development of complex products, especially in the global environment, the need of proper risk management is required. From the audit perspective, there is the clear control requirement “BAI01.10 Manage programme and project risk“ defined by COBIT 5 that requires that project risks should be systematically identified, analysed, responded to, monitored and controlled. Additionally the risks should be centrally recorded [3, p. 125]. Additionally, controlling risk in software projects is considered to be a major contributor to project success [4]. The need to manage risks in agile project management is also identified by various authors. The SOA principles from the agile project management perspective were used to create a framework for understanding agile risk management strategies for global IT projects [5]. Main risk models and frameworks used by software engineers are discussed with conclusion that the risk management steps are required for delivery of quality software [6], [7]. Agile methodologies don’t cover the risk management knowledge area that can be taken from project management frameworks like PMBOK [8]. Risks related to global software development projects using Scrum have been researched and a conceptual framework to mitigate them designed [9]. Also the increasing variety of security threats should be managed as risks in the agile development projects [10], [11].
  • 2. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 82 The authors of this paper prove that this lack of risk management techniques in agile development can be fixed by aligning risk management techniques between project management framework PRINCE2 and agile product development framework Scrum. However the traditional risk management is heavily centred on documentation and agile development principles tries to avoid any unnecessary documentation and focus more on people iteration [12]. 2. PRINCE2 RISK MANAGEMENT PROCESS Prince2 provides a disciplined environment for implementation of risk responses based on identifying and assessing project risks. Lack of the proper risk management is the one of the leading factor, why the projects failed [13]. Risk management within PRINCE2 methodology contains three dimensions: risk management strategy (how risk management will be embedded in the project management activities, what is the risk tolerance and when is the exception triggered); Risk register as a tool for capturing and maintaining information of identified threads and opportunities (Project Support will typically maintain the Risk Register on behalf of the Project Manager); and a risk management procedure [14]. The project risk management process recommends 5 steps: identify, assess (estimation and evaluation), plan, implement and communicate. The first four steps are sequential, with the ’Communicate’ step running in parallel; As well as techniques for identification, risk estimation and evaluation techniques and thread responses (avoid, reduce, fallback, transfer, share, accept). In the implement step, the risk owner and the risk actionee roles are defined. The risk owner is a named individual who is responsible for the management, monitoring and control of a risk, while the risk actionee is an individual assigned to carry out a risk response action or actions to respond to a particular risk or a set of risks. They support and take direction from the risk owner. 3. RISK MANAGEMENT IN SCRUM Scrum doesn’t define the formal risk management process or even the risk owner. However every Scrum artefact or meeting potentially help to identify or mitigate risks. The list of artefacts and meetings with related risks is described for example in [15]. If the Scrum master, the product owner or the development team want to manage risks in a more formal or in a more proactive way then they can use for example a simple risk register [1] or a risk burn-down chart [16]. If they do so then it will be recommended to prioritize the highest-value and highest-risk requirements first in the upcoming sprint [15]. In the Scrum guide [17] there is a concept of impediments. The impediment can be anything that keeps a team from being productive. From risk management perspective the impediment is equal to an issue (a materialized risk). The Scrum master is responsible to solve these impediments and let the development team work in effective environment. The other risk management model, mentioned in [18], combines the PMBOK approach with Scrum. The author suggests using a risk board with two kinds of notes. The red notes are used to describe the risks and the yellow ones to describe the risk responses. Another good example how risks can be potentially mitigated in Scrum (such an intrinsic schedule flaw, specification breakdown, scope creep, and personnel loss and productivity variance) is mentioned by [19]. Some techniques have been developed to support the story prioritization based on inherit risks, for example the story-risk prioritization matrix [20] or the risk burn-down technique [21].
  • 3. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 83 4. SURVEY The authors of this paper conducted in April and May 2014 a survey with objective to found out how project managers manage risks in agile software development projects. The completed survey was received from 64 project managers working in Czech Republic and Slovakia on global software development projects. The results of the survey: • 67 % of respondents review the project risks on weekly basis. • 87 % of respondents stated that the project manager is formally responsible for managing risks. • 27 % of respondents stated that also the product owner is formally responsible for managing risks. • Respondents were asked who primarily identifies the risks. The project team members (80%), the project manager (67 %), the development team member (40%) and the scrum master (40%). • 73 % of respondents use a risk log or risk register to document and maintain risks. The rest of respondents 27 % use different techniques or don’t document risks at all. Respondents were also asked what risk attributes they document and keep watching. The Figure 1 shows the result. The most important risk attribute is the risk exposure (severity of impact) and likelihood that are defined during risk assessment and analysis exercise. The mitigation actions and responsible persons are the key elements of risk management. The responsible person executes the mitigation actions in order to mitigate the risks. Figure 1. Risk Attributes. Source: The survey conducted by authors. The Figure 2 shows the Scrum meetings where the project managers discuss the risks with the development team. The most critical meeting for identifying risks and planning mitigation actions is the sprint planning meeting. The review of existing risks and identification of potential risks introduced by the product increment is done in the spring review meeting. As the project manager needs to regularly review the risk status, the weekly status meeting is ideal for him or her. The weekly status meeting can be an extended version of the daily Scrum meeting.
  • 4. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 84 Figure 2. Risk Meetings. Source: The survey conducted by authors. The last question was formulated as “Do you think that agile development frameworks should be enriched by the risk management techniques from the project management framework?” The majority of respondents (60%) think that the enrichment would be helpful and 40% think that there is no value in this enrichment. 5. TAILORING OF PRINCE2 PROJECT AND RISK MANAGEMENT TO MEET THE SCRUM APPROACH At first, integrated process model should be created for tailoring the PRINCE2 project management process model to meet the Scrum approach. This conceptual model has been developed and it is described in [22]. In this paper this model was further reviewed, slightly modified and key meetings (ceremonies) and documents highlighted in red, see the Figure 3.
  • 5. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 85 Corporateor ProgrammeProjectBoardProjectManagerScrummaster Project Mandate Starting Up a Project Initiating a Project Directing a Project Controling a Stage Managing a Stage Boundary Closing a Project Closure Notification Project Brief & Business Case Project Plan Authorization DevelopmentTeamProductOwner Facilitating Scrum Creating Initial Requirements Delivering an Increment Sprint Planning Daily Sprint Sprint Review Product Backlog Spring Backlog Defining, Prioritizing and Communicating Requirements Burndown report Sprint Retrospective Product Increment End Stage Report End Project ReportHighlight Report Weekly Status Meeting Figure 3. Process model integrating PRINCE2 and Scrum frameworks with highlighted risk meetings. Source: Authors. 5.1. Key meetings and documents The sprint planning meeting is the key meeting where the risks are identified. These risks are mostly related to the stories/software features that will be developed in the coming sprint. Based on the risk-story prioritization technique [20], the high-risk stories should be selected first and developed first. All the risks related to the developing features should be adequately assessed and evaluated by the development team. The risk attributes that are mostly used are: risk exposure, mitigation actions, likelihood, responsible person and financial impact (based on authors’ survey). The weekly status meeting should contain the review of the current sprint risks. This meeting should be led by the project manager. The Scrum master should also participate in this meeting because he/she has the overview of the risks and other impediments the development team is facing to. It is a good practise to invite also risk actionees who can comment on progress for the critical risks or risks with the lowest risk proximity. As a suitable technique for reviewing the total sprint risk exposure can be the risk burndown chart [21].
  • 6. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 86 The sprint review meeting is focused on presenting the product increment to the product owner and other customers/key users. The risks related to the development of product features should be already mitigated and closed. If some risks are not fully mitigated then the residual risks should be presented here and accepted. Also new risks that were identified during the development and are not fully mitigated can be presented here and mitigation actions planned. The highlight report is used by the project manager to inform the project board about the project progress. Information about the key risks should be part of this report. The Table 1 describes the mandatory or optional risk related tasks that are done during the Scrum meetings. This does not mean that risk identification, assessment and responses would only be done during these meetings. Most of the work will be done between the meetings in the process “Delivering the product increment” that is represented by the Sprint. M means mandatory and it should be done every time or on a continuous basis, O means optional and it should be done only if needed. Table 1. Risk Management Activities in Scrum Meetings and the sprint, Source: Authors. Risk Actions Scrum meetings Identification Assessment Response Plan Apply Response Risk Approval Sprint Planning M M M O Daily Sprint O O O Sprint Review O O O M Sprint M Retrospective O O O 5.2. Risk Escalation One of the PRINCE2 principles is the Manage by exception. The project manager manages the project and tries to keep the project within its budget, deliver the project on time and in required quality. For these aspects the project manager has defined boundaries within which he or she can act. If these limits are exceeded then project board involvement is required. Additional boundaries are specified by the project manager for the development team. The development team also acts in defined limits and when these limits are exceeded then it must be escalated to the project manager. These limits can be set for example to: minimum number of stories/features to be delivered in the sprint, acceptable deviation for the sprint progress based on the burndown chart and also for the criticality of the identified risks. 6. CONCLUSIONS Risk management in agile software development projects has been discussed by many researchers and various techniques have been proposed. However, based on the literature review executed by authors, there is no comprehensive model for embedding the project risk management process into the Scrum framework. Authors also executed a survey with objective to understand how project managers manage risks in the agile software development projects. As a final result of this paper the authors proposed to extend the conceptual framework for managing agile software development projects, based on Scrum and PRINCE2, by risk management aspects. The
  • 7. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 87 conceptual framework is extended by mandatory or optional risk related tasks that are done during the Scrum meetings. The major Scrum meetings and their relations to risk management activities have been discussed. The benefits of agile – scrum risk management include improving capacity to manage project uncertainties on the product delivery level and enhance communication of risks within the entire project organization. REFERENCES [1] D. G. Edzreena Odzaly, “Lightweight Risk Management in Agile Projects,” Proc. Int. Conf. Softw. Eng. Knowl. Eng., vol. 26, pp. 576–581, Jul. 2014. [2] R. L. Rick Dove, “Fundamentals of Agile Systems Engineering – Part 1 and Part 2,” Int. Counc. Syst. Eng. Int. Symp. 2014, 2014. [3] ISACA, COBIT 5 - Enabling Processes. Rolling Meadows, IL 60008 USA: ISACA, 2012. [4] P. L. Bannerman, “Risk and risk management in software projects: A reassessment,” J. Syst. Softw., vol. 81, no. 12, pp. 2118–2133, Dec. 2008. [5] O.-K. D. Lee and D. V. Baby, “Managing Dynamic Risks in Global It Projects: Agile Risk- Management Using the Principles of Service-Oriented Architecture,” Int. J. Inf. Technol. Decis. Mak., vol. 12, no. 6, pp. 1121–1150, Nov. 2013. [6] S. S. Limkar and V. P. Bhosale, “Software Project Risk Management,” in Proceedings of the 5th National Conference; INDIACom-2011, New Delhi, 2011. [7] S. C. Misra, U. Kumar, V. Kumar, and M. A. Shareef, “Risk management models in software engineering,” Int. J. Process Manag. Benchmarking, vol. 2, no. 1, pp. 59–70, Jan. 2007. [8] M. N. Brohi, “Embedding project management into XP, SCRUM and RUP,” Eur. Sci. J., vol. 10, no. 15, pp. 293–307, 2014. [9] M. A. B. Emam Hossain, “Risk Identification and Mitigation Processes for Using Scrum in Global Software Development: A Conceptual Framework.,” Softw. Eng. Conf. 2009 APSEC 09 Asia-Pac., pp. 457–464, 2009. [10] R. B. M. Siponen, “Integrating Security into Agile Development Methods,” Syst. Sci. 2005 HICSS 05 Proc. 38th Annu. Hawaii Int. Conf. On, p. 185a – 185a, 2005. [11] I. G. Zulkarnain Azham, “Security backlog in Scrum security practices,” Softw. Eng. MySEC 2011 5th Malays. Conf., pp. 414 – 417, 2011. [12] K. Beck, M. Beedle, A. van Bennekum, A. Cockburn, W. Cunningham, M. Fowler, J. Grenning, J. Highsmith, A. Hunt, R. Jeffries, J. Kern, B. Marick, R. C. Martin, S. Mellor, K. Schwaber, J. Sutherland, and D. Thomas, “Manifesto for Agile Software Development,” 2001. [Online]. Available: http://agilemanifesto.org/. [Accessed: 16-Dec-2012]. [13] N. Cerpa and J. M. Verner, “Why did your project fail?,” Commun. ACM, vol. 52, no. 12, p. 130, Dec. 2009. [14] OGC, Managing Successful Projects with PRINCE2: 2009 Edition, 2009th ed. Stationery Office Books, 2009. [15] M. C. Layton, “How to Manage Risk within Agile Management - For Dummies,” Agile Project Management For Dummies, May-2012. [Online]. Available: http://www.dummies.com/how- to/content/how-to-manage-risk-within-agile-management.html. [Accessed: 18-Mar-2014]. [16] S. T. Veethil, “Risk Management in Agile,” Scrum Alliance, 03-May-2013. [Online]. Available: http://www.scrumalliance.org/community/articles/2013/2013-may/risk-management-in-agile. [Accessed: 18-Mar-2014]. [17] K. Schwaber and J. Sutherland, “The Scrum Guide: The definitive guide to Scrum: The rules of the game.” SCRUM.org, Jul-2013. [18] V. Ylimannela, “A model for risk management in agile software development,” 16-Mar-2012. [Online]. Available: http://www.cloudsw.org/under-review/a6f468c9-4857-4206-96ee- f67df0583d41/file_initial_version. [Accessed: 18-Mar-2014]. [19] V. Morris, “Managing Risk in Scrum, Part 1,” SolutionsIQ, 28-Oct-2011. [Online]. Available: http://www.solutionsiq.com/resources/agileiq-blog/bid/70560/Managing-Risk-in-Scrum-Part-1. [Accessed: 18-Mar-2014]. [20] A. Arora and C. Naresh, “A Risk Based Story Prioritization Technique In An Agile Environment,” Int. J. Adv. Found. Rese Arch Comput. IJAFRC, vol. 1, no. 7, pp. 16–25, 2014.
  • 8. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015 88 [21] M. Singh and R. Saxena, “Risk Management in Agile Model,” IOSR J. Comput. Eng., vol. 16, no. 5, pp. 43–46, 2014. [22] M. Tomanek, R. Cermak, and Z. Smutny, “A Conceptual Framework for Web Development Projects Based on Project Management and Agile Development Principles,” 10th Eur. Conf. Manag. Leadersh. Gov. ECMLG 2014, vol. 10, pp. 550–558, Nov. 2014. AUTHORS Martin Tomanek graduated from applied informatics at the Faculty of Informatics and Statistics, University of Economics, Prague. Currently, he is PhD student at the Department of Systems Analysis, Faculty of Informatics and Statistics, University of Economics, Prague, where he develops the integrated framework based on PRINCE2, Scrum and other best practices used in SW development area. Jan Juricek graduated from applied informatics at the Faculty of Informatics and Statistics, University of Economics, Prague. Currently, he is PhD student at the Department of Systems Analysis, Faculty of Informatics and Statistics, University of Economics, Prague, where he deals with agile principles, objectives and benefits in project management.