SlideShare a Scribd company logo
Risk Analysis & Management
Priyajit Sen
Assistant Professor
Department of Computer Application
MAKAUT, W.B., India
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
What is risk?
A risk is a potential problem that might happen and might not. It can be
conceptually defined as concerns of future happenings that involve
change in mind, option, actions, places, etc.
Basic Characteristics of Risk:
Uncertainty:- It may or may not happen, that is there is no 100%
guarantee of risk becoming true.
Loss:- If the risk becomes true then unwanted consequences or
losses may occur.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
What is risk management?
Risk Management is a process of thinking systematically about all
possible risks, problems or disasters before they happen and setting up
procedures that will avoid the risk, or minimize the impact, or cope
with its impact.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Types of Risk:
Reactive:- A response based risk management approach, which is
dependent on accident evaluation and audit based findings.
Proactive:- Adaptive, closed loop feedback control strategy based on
measurement, observation of the present safety level and planned
explicit target safety level with a creative intellectuality.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Purpose of Proactive and Reactive Risk Management:
Reactive risk management: Reactive risk management attempts to
reduce the tendency of the same or similar accidents which happened in
past being repeated in future.
Proactive risk management: Proactive risk management attempts to
reduce the tendency of any accident happening in future by identifying
the boundaries of activities, where a breach of the boundary can lead to
an accident.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Difference between Proactive and Reactive Risk Management
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Categories of risk
Project risk:- Risk that affect the project schedule or recourse. An example
of a project risk is the loss of an experienced designer. Finding a replacement,
may take a long time and consequently, the software design will take longer to
complete.
Product Risk:- Risk that affect the quality or performance of the software
being developed. An example of a product risk is the failure of a purchased
component to perform as expected.
Business Risk:- Risk that affect the organization developing or procuring the
product. For example, a competitor introducing a new product. The
introduction of a competitive product may mean that the assumption made
about the sales of existing software products may be unduly optimistic.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Process of Risk management
Risk Identification: Identity possible project, product and business risks.
Risk Projection: Assessment of the likelihood and consequences of these
risks.
Risk Mitigation: Plan to address the risk, either by avoiding it or minimize
effects on the project.
Risk Monitoring: Regularly assess the risk and the plan
revise these when we learn more about the risk.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Process of Risk management
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Identification
Basically, there are six types of risks.
Organizational Risks: Drive from the organizational environment where the
software is being developed.
Tools Risks: Drive from the software tools and other supporting software
used to develop the system.
Requirement Risks: Drive from changes to the customer requirements and
the process of managing the requirements change.
Estimation Risks: Drive from the management estimates of the resources
required to build the system.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Projection
The likelihood of a risk coming true(r).
The consequence of the problems associated with that risk(s).
Based on these two factors, the priority of each risk can be computed
as:
p = r * s
Where p is the priority with which the risk must be handled, r is the probability of
the risk becoming true
and s is the severity of damage caused due to the risk becoming true.
If all identified risks are prioritized then most likely and damaging risks can be
handled first and more comprehensive risk abatement procedures can be designed
for these risks.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Refinement:
This general condition can be refined in the following manner:
Sub-condition 1: Certain reusable components were developed by a
third party with no knowledge of internal design standards.
Sub-condition 2: The design standard for component interfaces has not
been solidified and may not conform to certain existing reusable
components.
Sub-condition 3: Certain reusable components have been implemented
in a language that is not supported on the target environment.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Mitigation
Avoid Risk: The probability that the risk will arise will be reduce. It may
take several forms such as discussions with the customer to reduce the
scope of the work, giving incentives to engineers to avoid risk of man
power turn over, etc.
Transfer Risk: This strategy involves getting the risky component
developed by third party or buying insurance career, etc.
Risk Reduction: This involves planning ways to contain the damage due
to a risk. For example, if there is risk that some key personnel might
leave, new recruitment may be planned.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Monitoring & Management
Risk monitoring and management is the process of checking that our
assumptions about the project, product and business risks have not
changed.
We should regularly assess each of the identified risk to decide whether
or not that risk is becoming more or less probable.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
RMMM Plan
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Safety Critical Software
Primary safety-critical software: Malfunctioning of this kind
of software could cause direct human or environment damage.
Secondary safety-critical software: Malfunctioning of this
software could cause indirect human or environment damage.
For example if a drug dispensing machine gave out the wrong
drugs to someone, the system itself would not cause damage, but
it would be the reason that damage was caused.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Different Hazards:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Industry Analysis Techniques:
A number of hazard analysis techniques have been developed in order to fully
understand and
resolve these hazards.
An example of this is the STAMP technique which was developed at MIT, and
is not only for hazard analysis, but also considers organizational factors and
the dynamics of complex systems.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
STAMP has five steps:
1. Identify the system hazards: identify all of the potential hazards in a system and
expand on them to find rough solutions
2. Identify safety related requirements and constraints: In order to remove the
hazard what are the constraints
3. Define the basic system control structure: Define who is in control at the time
of the potential hazard
4. Identify inadequate control actions that could lead to a hazard: Find out how the
system reaches the hazardous state using the control structure.
5. Determine what constraints could be violated and eliminate, prevent or control
them through the system design
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Project Scheduling and Techniques:
Break down each activity into tasks.
Determine the dependency among different tasks.
Establish the estimates for the time durations necessary to complete the tasks.
Represent the information in the form of an activity network.
Determine task starting and ending dates from the information represented in
the activity network.
Determine the critical path. A critical path is a chain of tasks that determines
the duration of the project.
Allocate resources to tasks.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
THANK YOU
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India

More Related Content

Similar to Software Project Management.pptx

Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Management
abhinayverma
 
Software Engineering :Project Management
Software Engineering :Project ManagementSoftware Engineering :Project Management
Software Engineering :Project Management
simmis5
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
felicidaddinwoodie
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
Sonata Software
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
Umair Abbas
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
VijayapriyaP1
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
NmnKmr2
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
MatthewTennant613
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
RanjitKdk
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
PriyanshTan
 
Software testing-and-risk-analysis
Software testing-and-risk-analysisSoftware testing-and-risk-analysis
Software testing-and-risk-analysis
Ajit Waje
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
SathishKumar960827
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
WilliamTom9
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
PPT SE SACHIN.ppt
PPT SE SACHIN.pptPPT SE SACHIN.ppt
PPT SE SACHIN.ppt
SACHINMAURYA57
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
AyidAlmgati
 

Similar to Software Project Management.pptx (20)

Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Management
 
Software Engineering :Project Management
Software Engineering :Project ManagementSoftware Engineering :Project Management
Software Engineering :Project Management
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software testing-and-risk-analysis
Software testing-and-risk-analysisSoftware testing-and-risk-analysis
Software testing-and-risk-analysis
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
PPT SE SACHIN.ppt
PPT SE SACHIN.pptPPT SE SACHIN.ppt
PPT SE SACHIN.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Software Project Management.pptx

  • 1. Risk Analysis & Management Priyajit Sen Assistant Professor Department of Computer Application MAKAUT, W.B., India Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 2. What is risk? A risk is a potential problem that might happen and might not. It can be conceptually defined as concerns of future happenings that involve change in mind, option, actions, places, etc. Basic Characteristics of Risk: Uncertainty:- It may or may not happen, that is there is no 100% guarantee of risk becoming true. Loss:- If the risk becomes true then unwanted consequences or losses may occur. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 3. What is risk management? Risk Management is a process of thinking systematically about all possible risks, problems or disasters before they happen and setting up procedures that will avoid the risk, or minimize the impact, or cope with its impact. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 4. Types of Risk: Reactive:- A response based risk management approach, which is dependent on accident evaluation and audit based findings. Proactive:- Adaptive, closed loop feedback control strategy based on measurement, observation of the present safety level and planned explicit target safety level with a creative intellectuality. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 5. Purpose of Proactive and Reactive Risk Management: Reactive risk management: Reactive risk management attempts to reduce the tendency of the same or similar accidents which happened in past being repeated in future. Proactive risk management: Proactive risk management attempts to reduce the tendency of any accident happening in future by identifying the boundaries of activities, where a breach of the boundary can lead to an accident. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 6. Difference between Proactive and Reactive Risk Management Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 7. Categories of risk Project risk:- Risk that affect the project schedule or recourse. An example of a project risk is the loss of an experienced designer. Finding a replacement, may take a long time and consequently, the software design will take longer to complete. Product Risk:- Risk that affect the quality or performance of the software being developed. An example of a product risk is the failure of a purchased component to perform as expected. Business Risk:- Risk that affect the organization developing or procuring the product. For example, a competitor introducing a new product. The introduction of a competitive product may mean that the assumption made about the sales of existing software products may be unduly optimistic. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 8. Process of Risk management Risk Identification: Identity possible project, product and business risks. Risk Projection: Assessment of the likelihood and consequences of these risks. Risk Mitigation: Plan to address the risk, either by avoiding it or minimize effects on the project. Risk Monitoring: Regularly assess the risk and the plan revise these when we learn more about the risk. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 9. Process of Risk management Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 10. Risk Identification Basically, there are six types of risks. Organizational Risks: Drive from the organizational environment where the software is being developed. Tools Risks: Drive from the software tools and other supporting software used to develop the system. Requirement Risks: Drive from changes to the customer requirements and the process of managing the requirements change. Estimation Risks: Drive from the management estimates of the resources required to build the system. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 11. Risk Projection The likelihood of a risk coming true(r). The consequence of the problems associated with that risk(s). Based on these two factors, the priority of each risk can be computed as: p = r * s Where p is the priority with which the risk must be handled, r is the probability of the risk becoming true and s is the severity of damage caused due to the risk becoming true. If all identified risks are prioritized then most likely and damaging risks can be handled first and more comprehensive risk abatement procedures can be designed for these risks. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 12. Risk Refinement: This general condition can be refined in the following manner: Sub-condition 1: Certain reusable components were developed by a third party with no knowledge of internal design standards. Sub-condition 2: The design standard for component interfaces has not been solidified and may not conform to certain existing reusable components. Sub-condition 3: Certain reusable components have been implemented in a language that is not supported on the target environment. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 13. Risk Mitigation Avoid Risk: The probability that the risk will arise will be reduce. It may take several forms such as discussions with the customer to reduce the scope of the work, giving incentives to engineers to avoid risk of man power turn over, etc. Transfer Risk: This strategy involves getting the risky component developed by third party or buying insurance career, etc. Risk Reduction: This involves planning ways to contain the damage due to a risk. For example, if there is risk that some key personnel might leave, new recruitment may be planned. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 14. Risk Monitoring & Management Risk monitoring and management is the process of checking that our assumptions about the project, product and business risks have not changed. We should regularly assess each of the identified risk to decide whether or not that risk is becoming more or less probable. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 15. RMMM Plan Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 16. Safety Critical Software Primary safety-critical software: Malfunctioning of this kind of software could cause direct human or environment damage. Secondary safety-critical software: Malfunctioning of this software could cause indirect human or environment damage. For example if a drug dispensing machine gave out the wrong drugs to someone, the system itself would not cause damage, but it would be the reason that damage was caused. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 17. Different Hazards: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 18. Industry Analysis Techniques: A number of hazard analysis techniques have been developed in order to fully understand and resolve these hazards. An example of this is the STAMP technique which was developed at MIT, and is not only for hazard analysis, but also considers organizational factors and the dynamics of complex systems. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 19. STAMP has five steps: 1. Identify the system hazards: identify all of the potential hazards in a system and expand on them to find rough solutions 2. Identify safety related requirements and constraints: In order to remove the hazard what are the constraints 3. Define the basic system control structure: Define who is in control at the time of the potential hazard 4. Identify inadequate control actions that could lead to a hazard: Find out how the system reaches the hazardous state using the control structure. 5. Determine what constraints could be violated and eliminate, prevent or control them through the system design Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 20. Project Scheduling and Techniques: Break down each activity into tasks. Determine the dependency among different tasks. Establish the estimates for the time durations necessary to complete the tasks. Represent the information in the form of an activity network. Determine task starting and ending dates from the information represented in the activity network. Determine the critical path. A critical path is a chain of tasks that determines the duration of the project. Allocate resources to tasks. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 21. THANK YOU Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India