SlideShare a Scribd company logo
Risk Management
By: Vijay Kumar
Risk strategies
• According to Webster’s Dictionary,
– Risk is the possibility of suffering loss.
• Any decisions that we take generally carries some
amount of risk.
• Any decision we take may result in a gain or loss for us.
In both cases, we must bear the consequences.
• In simple terms, this results in taking a risk.
• Risk-taking entails making a choice.
• Risk involves change in some form like a change in
place, a change in profession and change in opinion.
• Software engineering also entails many risks.
• What are the risks pertaining to the software project?
• How will any change, inherent or circumstantial, affect
the performance of the project?
• At every step, we must make a choice be it the selection
of people for the project or the selection of equipment to
be used.
Risk strategies
• There are two commonly used strategies to deal with risks in
software engineering
– Reactive strategies and
– Proactive strategies.
• There is a phrase “cross the bridge when you come across it”, which
when applied to a software project would mean taking care of
problems as and when we come across them without planning for
them in advance.
• This is termed as “Reactive strategy”, which means we react to the
problem.
• With reactive strategies, the team does nothing about risks until
something goes wrong.
• When a problem arises, the team goes into action and takes
initiative to solve the problem.
• Reactive strategy can be depicted as Figure.
Problem
occurs
Takes
Action
Reactive strategy
• Assume that there was a software project in progress
with three software engineers involved in all kinds of
responsibilities.
• The firm never accounted for the fact that any one of
them may leave. It simply took for granted the
continuance of the staff. But, all of a sudden, two of the
engineers leave the project.
• In such a situation, the entire burden falls upon the lone
software engineer.
• Due to shortage of time, it may so happen that the firm is
unable to hire new staff immediately and the project may
have to be abandoned or delayed.
• In the given example, reactive strategy would mean
hiring and training new staff after the earlier staff has
quit.
• Had the problem been foreseen, the engineers who plan
to quit could be made to train the new staff and then
leave.
Proactive strategy
• Proactive means taking the initiative.
• Proactive strategy with respect to a software
project would mean acting in advance, predicting
that a problem may arise and taking
precautionary measures for it.
• Identification of risks that may occur, prioritizing
them and planning solution strategies to deal
with these risks are part of proactive strategy.
• Figure illustrates this strategy.
Predicts
Problem Takes
Action
Problem
occurs
Characteristics Of Risks
• Any kind of risk possesses two
characteristics –
• Uncertainty:
– Uncertainty is probability estimation about
whether the foreseen risk will actually occur.
• Loss:
– If the risk becomes a reality, unwanted
consequences or losses will occur.
– Loss is the direct consequence of the risk
actually taking place.
Software risks
• Risks can be categorized into several categories
• Project risks:
– These affect or threaten any project plan that has been laid.
– Project risks can cause time delays or increase in cost.
– These risks include personnel, customer, resource, budgetary,
scheduling and requirement risks.
• Business risks:
– Business risks affect the viability of the software to be built.
– Business risks can come in various forms:
• building a product that the marketing team does not know how to
sell,
• building a product that does not fit into the business strategy of the
company,
• building a superlative product that no one wants to use.
• Sometimes, business risks are unpredictable too.
• Technical risks:
– These risks can have an effect on the creation and completion of
software.
– In case such a risk becomes real, implementation could become
difficult and even impossible.
– Technical risks can occur within any of these stages:
implementation, interfacing, verification, design, and
maintenance.
– The causes for technical risks could be software obsolescence,
technical uncertainty, and ambiguity in specifications.
• Predictable risks:
– Certain risks like unrealistic delivery date, lack of documented
requirements or software scope can be predicted by evaluating
the project plan and the environment under which the project will
be developed.
– Predictable risks can be identified from past project experience.
• Unpredictable risks:
– These are the risks that may occur but cannot be predicted in
advance.
Software risks
Risk identification
• Risk Identification is a systematic attempt to specify
factors that may affect the project plan.
• It is important to identify the known and predictable risks
so that they can be avoided or controlled.
• For each of the risks listed in the previous section, there
are two types of risks -
– generic risks and
– product-specific risks.
• Generic risks can affect any software project whereas
product specific risks can be identified by those who are
familiar with the technology, the people and the project
at hand.
• Detailed examination of the project plan is necessary to
find out and identify the product specific risks.
Risk identification
• A risk item checklist is generally created to
help in identification of risks as well as focus on
different categories of risks.
• The checklist will consist of the following
parameters:
– Product size
– Customer characteristics
– Process definition
– Business Impact
– Development environment
– Technology
– Risk associated with staff size and experience
Product size
• This is the risk associated with the overall size of
the software to be built or modified.
• Project risk is directly proportional to product
size.
• Questions that maybe asked to check product
size can be drawn as follows:
– Estimated Lines of Code or function points
– Confidence in a size estimate
– Deviation of past projects from the estimate
– Size of the database created or used by the software
– Number of users
– Number of projected requirement changes
– Amount of reused software
Customer Characteristics
• These are the risks associated with the sophistication of the
customer and the ability of the developer to communicate with the
customer in a timely manner.
• Customers have different needs and different personalities.
• They also have varied associations with their suppliers and most
customers are often contradictory.
• Questions that may be asked to check the customer characteristics
are as given below:
– Have we worked with the customer before?
– Does the customer know what he wants?
– Will the customer spend time to formally define the requirements
and scope of the project at a meeting?
– Is the customer willing to communicate closely with the
developer?
– Will the customer participate in reviews?
– Is the customer technically sophisticated in the product area?
– Will the customer let the process occur without looking over our
shoulder during technically detailed work?
– Does the customer understand the software process?
Process definition
• These risks are associated with the degree to
which the software process has been defined
and followed by the development organization.
• Questions that may be asked to check process
definition risks are as given below:
– Does management support a written policy that
stresses the use of a development process?
– Are staff members willing to use the process?
– Is the process similar for all projects?
– Are standards published and available for all
developers and managers?
– Are the standards being followed?
– How are the aspects of the process being monitored?
– What software tools are being used in the
development of the project?
Business Impact
• These are the risks associated with constraints
posed by the management or the market.
• Some parameters that can affect business
impact are given below:
– Effect of the product on company income
– Visibility of the product to senior management
– Number of customers using the end product and how
stable their needs remain
– Knowledge levels of end users, Level of
documentation needed for the customer
– Governmental constraints
– Cost of late delivery
– Cost of a defective product
Development environment
• These are risks associated with the availability and quality of the
tools that may be used to build the product.
• If defective materials and tools are used in any trade, the end
product will not meet the specified requirement.
• Good, proper tools are a pre-requisite to any trade.
• The checklist drawn to check the development environment will be
based on the availability of the following:
– Process and project management tools
– Analysis and design tools
– Appropriate tools for the project
– Appropriate compilers and code generators
– Testing tools
– Database or Data stores
– Integration of tools with each other
– Trained staff
– Help for using the tools
Technology
• These are risks associated with the complexity of the
system and the unfamiliarity with the new technology.
• The checklist for technology parameters is as given
below:
– Is the technology new to our organization?
– Does the customer demand new algorithms or input or output
technology?
– Does the software interface with new or unproven software?
– Is a specialized interface demanded by the product
requirements?
– Is the type of software to be developed new to our organization?
– Are we using new analysis, design or testing methods for this
project?
– Are the required development methods unconventional?
– Do the requirements put excessive performance constraints on
the product?
Risk associated with staff size and
experience
• In addition to all the above factors, we must also
assess staff size and experience.
• The questions that will help us arise at the right
conclusion are as follows:
– Are the best people available?
– Do the people have the right combination of skills?
– Are there enough people?
– Is the staff committed for the entire duration of the
project?
– Is there any staff working part time on the project?
– Does the staff have the necessary training?
– Will the change in staff be low enough to maintain
continuity?

More Related Content

What's hot

Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - Final
Kuldeep Kumar
 
Software measurement lecture 7
Software measurement lecture 7Software measurement lecture 7
Software measurement lecture 7
Abdul Basit
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
deep sharma
 
Process and Project Metrics-1
Process and Project Metrics-1Process and Project Metrics-1
Process and Project Metrics-1
Saqib Raza
 
Sop test planning
Sop test planningSop test planning
Sop test planning
Frank Gielen
 
Defect Prevention
Defect PreventionDefect Prevention
Defect Prevention
nazeer pasha
 
BugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect ManagementBugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect Management
guestf794555
 
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
AgileSparks
 
Unit3 software review control software
Unit3 software review control softwareUnit3 software review control software
Unit3 software review control software
Reetesh Gupta
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing Methods
Reuben Korngold
 
RMMM Plan
RMMM PlanRMMM Plan
RMMM Plan
Ankit Bahuguna
 
Software testing and software development process
Software testing and software development processSoftware testing and software development process
Software testing and software development process
Gen Aloys Ochola Badde
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
Prof Ansari
 
Slides chapters 21-23
Slides chapters 21-23Slides chapters 21-23
Slides chapters 21-23
Priyanka Shetty
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based Testing
TechWell
 
Seii unit4 software_process
Seii unit4 software_processSeii unit4 software_process
Seii unit4 software_process
Ahmad sohail Kakar
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
Yolanda Williams
 
Software product quality
Software product qualitySoftware product quality
Software product quality
tumetr1
 
PI5_InspectAdapt
PI5_InspectAdaptPI5_InspectAdapt
PI5_InspectAdapt
Yolanda Williams
 
Lecture 04 Software Metrics and Estimation
Lecture 04 Software Metrics and EstimationLecture 04 Software Metrics and Estimation
Lecture 04 Software Metrics and Estimation
Achmad Solichin
 

What's hot (20)

Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - Final
 
Software measurement lecture 7
Software measurement lecture 7Software measurement lecture 7
Software measurement lecture 7
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
 
Process and Project Metrics-1
Process and Project Metrics-1Process and Project Metrics-1
Process and Project Metrics-1
 
Sop test planning
Sop test planningSop test planning
Sop test planning
 
Defect Prevention
Defect PreventionDefect Prevention
Defect Prevention
 
BugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect ManagementBugDay Bangkok 2009 Defect Management
BugDay Bangkok 2009 Defect Management
 
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...Shirly Ronen  - Agile defect management - Functional Defects versus Regressio...
Shirly Ronen - Agile defect management - Functional Defects versus Regressio...
 
Unit3 software review control software
Unit3 software review control softwareUnit3 software review control software
Unit3 software review control software
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing Methods
 
RMMM Plan
RMMM PlanRMMM Plan
RMMM Plan
 
Software testing and software development process
Software testing and software development processSoftware testing and software development process
Software testing and software development process
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
 
Slides chapters 21-23
Slides chapters 21-23Slides chapters 21-23
Slides chapters 21-23
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based Testing
 
Seii unit4 software_process
Seii unit4 software_processSeii unit4 software_process
Seii unit4 software_process
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
 
Software product quality
Software product qualitySoftware product quality
Software product quality
 
PI5_InspectAdapt
PI5_InspectAdaptPI5_InspectAdapt
PI5_InspectAdapt
 
Lecture 04 Software Metrics and Estimation
Lecture 04 Software Metrics and EstimationLecture 04 Software Metrics and Estimation
Lecture 04 Software Metrics and Estimation
 

Similar to Risk management lec. 06

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
Shashi Kumar
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
ShudipPal
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
TharuniDiddekunta
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
vishnupriyapm4
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
LeahRachael
 
Recent and-future-trends spm
Recent and-future-trends spmRecent and-future-trends spm
Recent and-future-trends spm
Prakash Poudel
 
6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx
SATHYABAMAMADHANKUMA
 
unit 1.pptx regasts sthatbabs shshsbsvsbsh
unit 1.pptx regasts sthatbabs shshsbsvsbshunit 1.pptx regasts sthatbabs shshsbsvsbsh
unit 1.pptx regasts sthatbabs shshsbsvsbsh
sagarjsicg
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
RanjitKdk
 
Software process models
Software process modelsSoftware process models
Software process models
Malik WaQas
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
tmbainjr131
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
yenohhoney
 
Introduction to Software Development Life Cycle.pptx
Introduction to Software Development Life Cycle.pptxIntroduction to Software Development Life Cycle.pptx
Introduction to Software Development Life Cycle.pptx
Godwin Monserate
 
Risk Management
Risk ManagementRisk Management
Risk Management
Saqib Raza
 
Software Engineering _ Introduction
Software Engineering _ IntroductionSoftware Engineering _ Introduction
Software Engineering _ Introduction
ThenmozhiK5
 
Software System Engineering - Chapter 1
Software System Engineering - Chapter 1Software System Engineering - Chapter 1
Software System Engineering - Chapter 1
Fadhil Ismail
 
Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)
YamunaP6
 
Intoduction to software engineering part 2
Intoduction to software engineering part 2Intoduction to software engineering part 2
Intoduction to software engineering part 2
Rupesh Vaishnav
 
Software Engineering in 6 hours of knowledge gate
Software Engineering in 6 hours of knowledge gateSoftware Engineering in 6 hours of knowledge gate
Software Engineering in 6 hours of knowledge gate
abhinav23479
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
Vrinsoft Technology
 

Similar to Risk management lec. 06 (20)

Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
 
Recent and-future-trends spm
Recent and-future-trends spmRecent and-future-trends spm
Recent and-future-trends spm
 
6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx
 
unit 1.pptx regasts sthatbabs shshsbsvsbsh
unit 1.pptx regasts sthatbabs shshsbsvsbshunit 1.pptx regasts sthatbabs shshsbsvsbsh
unit 1.pptx regasts sthatbabs shshsbsvsbsh
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Software process models
Software process modelsSoftware process models
Software process models
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Introduction to Software Development Life Cycle.pptx
Introduction to Software Development Life Cycle.pptxIntroduction to Software Development Life Cycle.pptx
Introduction to Software Development Life Cycle.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Software Engineering _ Introduction
Software Engineering _ IntroductionSoftware Engineering _ Introduction
Software Engineering _ Introduction
 
Software System Engineering - Chapter 1
Software System Engineering - Chapter 1Software System Engineering - Chapter 1
Software System Engineering - Chapter 1
 
Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)
 
Intoduction to software engineering part 2
Intoduction to software engineering part 2Intoduction to software engineering part 2
Intoduction to software engineering part 2
 
Software Engineering in 6 hours of knowledge gate
Software Engineering in 6 hours of knowledge gateSoftware Engineering in 6 hours of knowledge gate
Software Engineering in 6 hours of knowledge gate
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
 

More from Noor Ul Hudda Memon

The Perceptron and its Learning Rule
The Perceptron and its Learning RuleThe Perceptron and its Learning Rule
The Perceptron and its Learning Rule
Noor Ul Hudda Memon
 
Neuro Linguistic Programming (artificial intelligence)
Neuro Linguistic Programming (artificial intelligence)Neuro Linguistic Programming (artificial intelligence)
Neuro Linguistic Programming (artificial intelligence)
Noor Ul Hudda Memon
 
(Ch#1) artificial intelligence
(Ch#1) artificial intelligence(Ch#1) artificial intelligence
(Ch#1) artificial intelligence
Noor Ul Hudda Memon
 
Sqa lec. 07
Sqa lec. 07Sqa lec. 07
Sqa lec. 07
Noor Ul Hudda Memon
 
Software estimation models ii lec .05
Software estimation models ii lec .05Software estimation models ii lec .05
Software estimation models ii lec .05
Noor Ul Hudda Memon
 
Se notes
Se notesSe notes
Proj mgmt complete)
Proj mgmt complete)Proj mgmt complete)
Proj mgmt complete)
Noor Ul Hudda Memon
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
Noor Ul Hudda Memon
 
Ch04 agile development models
Ch04 agile development modelsCh04 agile development models
Ch04 agile development models
Noor Ul Hudda Memon
 
Ch03 process models
Ch03 process modelsCh03 process models
Ch03 process models
Noor Ul Hudda Memon
 
Agiel sw development
Agiel sw developmentAgiel sw development
Agiel sw development
Noor Ul Hudda Memon
 
Voice controlled robot ppt
Voice controlled robot pptVoice controlled robot ppt
Voice controlled robot ppt
Noor Ul Hudda Memon
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
Noor Ul Hudda Memon
 

More from Noor Ul Hudda Memon (13)

The Perceptron and its Learning Rule
The Perceptron and its Learning RuleThe Perceptron and its Learning Rule
The Perceptron and its Learning Rule
 
Neuro Linguistic Programming (artificial intelligence)
Neuro Linguistic Programming (artificial intelligence)Neuro Linguistic Programming (artificial intelligence)
Neuro Linguistic Programming (artificial intelligence)
 
(Ch#1) artificial intelligence
(Ch#1) artificial intelligence(Ch#1) artificial intelligence
(Ch#1) artificial intelligence
 
Sqa lec. 07
Sqa lec. 07Sqa lec. 07
Sqa lec. 07
 
Software estimation models ii lec .05
Software estimation models ii lec .05Software estimation models ii lec .05
Software estimation models ii lec .05
 
Se notes
Se notesSe notes
Se notes
 
Proj mgmt complete)
Proj mgmt complete)Proj mgmt complete)
Proj mgmt complete)
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Ch04 agile development models
Ch04 agile development modelsCh04 agile development models
Ch04 agile development models
 
Ch03 process models
Ch03 process modelsCh03 process models
Ch03 process models
 
Agiel sw development
Agiel sw developmentAgiel sw development
Agiel sw development
 
Voice controlled robot ppt
Voice controlled robot pptVoice controlled robot ppt
Voice controlled robot ppt
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 

Recently uploaded

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

Risk management lec. 06

  • 2. Risk strategies • According to Webster’s Dictionary, – Risk is the possibility of suffering loss. • Any decisions that we take generally carries some amount of risk. • Any decision we take may result in a gain or loss for us. In both cases, we must bear the consequences. • In simple terms, this results in taking a risk. • Risk-taking entails making a choice. • Risk involves change in some form like a change in place, a change in profession and change in opinion. • Software engineering also entails many risks. • What are the risks pertaining to the software project? • How will any change, inherent or circumstantial, affect the performance of the project? • At every step, we must make a choice be it the selection of people for the project or the selection of equipment to be used.
  • 3. Risk strategies • There are two commonly used strategies to deal with risks in software engineering – Reactive strategies and – Proactive strategies. • There is a phrase “cross the bridge when you come across it”, which when applied to a software project would mean taking care of problems as and when we come across them without planning for them in advance. • This is termed as “Reactive strategy”, which means we react to the problem. • With reactive strategies, the team does nothing about risks until something goes wrong. • When a problem arises, the team goes into action and takes initiative to solve the problem. • Reactive strategy can be depicted as Figure. Problem occurs Takes Action
  • 4. Reactive strategy • Assume that there was a software project in progress with three software engineers involved in all kinds of responsibilities. • The firm never accounted for the fact that any one of them may leave. It simply took for granted the continuance of the staff. But, all of a sudden, two of the engineers leave the project. • In such a situation, the entire burden falls upon the lone software engineer. • Due to shortage of time, it may so happen that the firm is unable to hire new staff immediately and the project may have to be abandoned or delayed. • In the given example, reactive strategy would mean hiring and training new staff after the earlier staff has quit. • Had the problem been foreseen, the engineers who plan to quit could be made to train the new staff and then leave.
  • 5. Proactive strategy • Proactive means taking the initiative. • Proactive strategy with respect to a software project would mean acting in advance, predicting that a problem may arise and taking precautionary measures for it. • Identification of risks that may occur, prioritizing them and planning solution strategies to deal with these risks are part of proactive strategy. • Figure illustrates this strategy. Predicts Problem Takes Action Problem occurs
  • 6. Characteristics Of Risks • Any kind of risk possesses two characteristics – • Uncertainty: – Uncertainty is probability estimation about whether the foreseen risk will actually occur. • Loss: – If the risk becomes a reality, unwanted consequences or losses will occur. – Loss is the direct consequence of the risk actually taking place.
  • 7. Software risks • Risks can be categorized into several categories • Project risks: – These affect or threaten any project plan that has been laid. – Project risks can cause time delays or increase in cost. – These risks include personnel, customer, resource, budgetary, scheduling and requirement risks. • Business risks: – Business risks affect the viability of the software to be built. – Business risks can come in various forms: • building a product that the marketing team does not know how to sell, • building a product that does not fit into the business strategy of the company, • building a superlative product that no one wants to use. • Sometimes, business risks are unpredictable too.
  • 8. • Technical risks: – These risks can have an effect on the creation and completion of software. – In case such a risk becomes real, implementation could become difficult and even impossible. – Technical risks can occur within any of these stages: implementation, interfacing, verification, design, and maintenance. – The causes for technical risks could be software obsolescence, technical uncertainty, and ambiguity in specifications. • Predictable risks: – Certain risks like unrealistic delivery date, lack of documented requirements or software scope can be predicted by evaluating the project plan and the environment under which the project will be developed. – Predictable risks can be identified from past project experience. • Unpredictable risks: – These are the risks that may occur but cannot be predicted in advance. Software risks
  • 9. Risk identification • Risk Identification is a systematic attempt to specify factors that may affect the project plan. • It is important to identify the known and predictable risks so that they can be avoided or controlled. • For each of the risks listed in the previous section, there are two types of risks - – generic risks and – product-specific risks. • Generic risks can affect any software project whereas product specific risks can be identified by those who are familiar with the technology, the people and the project at hand. • Detailed examination of the project plan is necessary to find out and identify the product specific risks.
  • 10. Risk identification • A risk item checklist is generally created to help in identification of risks as well as focus on different categories of risks. • The checklist will consist of the following parameters: – Product size – Customer characteristics – Process definition – Business Impact – Development environment – Technology – Risk associated with staff size and experience
  • 11. Product size • This is the risk associated with the overall size of the software to be built or modified. • Project risk is directly proportional to product size. • Questions that maybe asked to check product size can be drawn as follows: – Estimated Lines of Code or function points – Confidence in a size estimate – Deviation of past projects from the estimate – Size of the database created or used by the software – Number of users – Number of projected requirement changes – Amount of reused software
  • 12. Customer Characteristics • These are the risks associated with the sophistication of the customer and the ability of the developer to communicate with the customer in a timely manner. • Customers have different needs and different personalities. • They also have varied associations with their suppliers and most customers are often contradictory. • Questions that may be asked to check the customer characteristics are as given below: – Have we worked with the customer before? – Does the customer know what he wants? – Will the customer spend time to formally define the requirements and scope of the project at a meeting? – Is the customer willing to communicate closely with the developer? – Will the customer participate in reviews? – Is the customer technically sophisticated in the product area? – Will the customer let the process occur without looking over our shoulder during technically detailed work? – Does the customer understand the software process?
  • 13. Process definition • These risks are associated with the degree to which the software process has been defined and followed by the development organization. • Questions that may be asked to check process definition risks are as given below: – Does management support a written policy that stresses the use of a development process? – Are staff members willing to use the process? – Is the process similar for all projects? – Are standards published and available for all developers and managers? – Are the standards being followed? – How are the aspects of the process being monitored? – What software tools are being used in the development of the project?
  • 14. Business Impact • These are the risks associated with constraints posed by the management or the market. • Some parameters that can affect business impact are given below: – Effect of the product on company income – Visibility of the product to senior management – Number of customers using the end product and how stable their needs remain – Knowledge levels of end users, Level of documentation needed for the customer – Governmental constraints – Cost of late delivery – Cost of a defective product
  • 15. Development environment • These are risks associated with the availability and quality of the tools that may be used to build the product. • If defective materials and tools are used in any trade, the end product will not meet the specified requirement. • Good, proper tools are a pre-requisite to any trade. • The checklist drawn to check the development environment will be based on the availability of the following: – Process and project management tools – Analysis and design tools – Appropriate tools for the project – Appropriate compilers and code generators – Testing tools – Database or Data stores – Integration of tools with each other – Trained staff – Help for using the tools
  • 16. Technology • These are risks associated with the complexity of the system and the unfamiliarity with the new technology. • The checklist for technology parameters is as given below: – Is the technology new to our organization? – Does the customer demand new algorithms or input or output technology? – Does the software interface with new or unproven software? – Is a specialized interface demanded by the product requirements? – Is the type of software to be developed new to our organization? – Are we using new analysis, design or testing methods for this project? – Are the required development methods unconventional? – Do the requirements put excessive performance constraints on the product?
  • 17. Risk associated with staff size and experience • In addition to all the above factors, we must also assess staff size and experience. • The questions that will help us arise at the right conclusion are as follows: – Are the best people available? – Do the people have the right combination of skills? – Are there enough people? – Is the staff committed for the entire duration of the project? – Is there any staff working part time on the project? – Does the staff have the necessary training? – Will the change in staff be low enough to maintain continuity?