SlideShare a Scribd company logo
Software Engineering
                  B.Tech IT/II Sem-II

                     Term: 2008-2009
                    Unit-7 PPT SLIDES

Text Books:1.Software Engineering, A practitioner’s approach
                   Roger s. Pressman 6th edition McGraw-
  Hill
           2.Software Engineering Somerville 7th edition



                                                          1
Unit 7 Syllabus
• Metrics for Process and Products : Software
  Measurement, Metrics for software quality.
• Risk management : Reactive vs. Proactive Risk
  strategies, software risks, Risk identification,
  Risk projection, Risk refinement, RMMM, RMMM
  Plan.




                                                 2
INDEX
                                       Unit 7
S.No                         Topic Name              Lecture No   Slide No.

 1.    Metrics for process and product: Software        L1           4
             Measurement
 2.    Metrics for software quality                     L2           12

 3.    Risk Management: Reactive VS Proactive risk      L3           14

 4.    Software Risk                                    L4           16

 5.    Risk Identification                              L5           18

 6.    Risk Projection                                  L5           20

 7     Risk Refinement                                  L6           24

 7.    Risk Mitigation Monitoring And Management        L6           26

 8.    RMMM plan                                        L7           29


                                                                              3
Metrics for Process And Product
• Software Measurement:
  Software measurement can be
  categorized as
1)Direct Measure and

2)Indirect Measure


                                4
Metrics for Process And Product
• Direct Measurement
 Direct measure of software process include
  cost and effort
 Direct measure of product include lines of code,
  Execution speed, memory size, defects per
  reporting time period.
• Indirect Measurement
 Indirect measure examines the quality of
  software product itself(e.g. :-functionality,
  complexity, efficiency, reliability and
  maintainability)                                 5
Reasons for measurement
1. To gain baseline for comparison with
   future assessment
2. To determine status with respect to plan
3. To predict the size, cost and duration
   estimate
4. To improve the product quality and
   process improvement

                                              6
Software Measurement
•   The metrics in software Measurement are
   Size oriented metrics
   Function oriented metrics
   Object oriented metrics
   Web based application metric




                                              7
Size Oriented Metrics
• It totally concerned with the measurement
  of software.
• A software company maintains a simple
  record for calculating the size of the
  software.
• It includes LOC, Effort,$$,PP
  document,Error,Defect ,People.


                                              8
Function oriented metrics
• Measures the functionality derived by the
  application
• The most widely used function oriented
  metric is Function point
• Function point is independent of
  programming language
• Measures functionality from user point of
  view
                                              9
Object oriented metric
• Relevant for object oriented programming
• Based on the following
 Number of scenarios(Similar to use cases)
 Number of key classes
 Number of support classes
 Number of average support class per key
  class
 Number of subsystem
                                          10
Web based application metric
• Metrics related to web based application
  measure the following
1.Number of static pages(NSP)
2.Number of dynamic pages(NDP)
     Customization(C)=NSP/NSP+NDP
       C should approach 1


                                             11
Metrics for Software Quality
• Measuring Software Quality
1.Correctness=defects/KLOC
2.Maintainability=MTTC(Mean-time to
  change)
3.Integrity=Sigma[1-(threat(1-security))]
   Threat : Probability that an attack of
  specific type will occur within a given time
   Security : Probability that an attack of a
  specific type will be repelled              12
Metrics for Software Quality
4. Usability: Ease of use
5. Defect Removal Efficiency(DRE)
    DRE=E/(E+D)
    E is the no. of errors found before
   delivery and D is no. of defects reported
   after delivery
    Ideal value of DRE is 1

                                               13
Risk Management
• Risk is an undesired event or circumstance that
  occur while a project is underway
• It is necessary for the project manager to
  anticipate and identify different risks that a
  project may be susceptible to.
• Risk Management
  It aims at reducing the impact of all kinds of risk
  that may effect a project by identifying, analyzing
  and managing them

                                                  14
Risk Management
Reactive Vs Proactive risk
 Reactive :
 It monitors the projects likely risk and
 resources are set aside.
 Proactive:
 Risk are identified, their probability and
 impact is accessed

                                              15
Software Risk
• It involve 2 characteristics
1. Uncertainty : Risk may or may not happen
2. Loss : If risk is reality unwanted loss or
   consequences will occur
• It includes
1)Project Risk
2)Technical Risk
3)Business Risk
4)Known Risk
5)Unpredictable Risk
6)Predictable Risk                              16
Software Risk
• Project risk: Threaten the project plan and affect
  schedule and resultant cost
• Technical risk: Threaten the quality and
  timeliness of software to be produced
• Business risk: Threaten the viability of software
  to be built
• Known risk: These risks can be recovered from
  careful evaluation
• Predictable risk: Risks are identified by past
  project experience
• Unpredictable risk: Risks that occur and may be
  difficult to identify                              17
Risk Identification
•   It concerned with identification of risk
•   Step1: Identify all possible risks
•   Step2: Create item check list
•   Step3: Categorize into risk components-
    Performance risk, cost risk, support risk and
    schedule risk
•   Step4: Divide the risk into one of 4 categories
•   Negligible-0
•   Marginal-1
•   Critical-2
•   Catastrophic-3                                    18
Risk Identification
•   Risk Identification includes
•   Product size
•   Business impact
•   Development environment
•   Process definition
•   Customer characteristics
•   Technology to be built
•   Staff size and experience
                                   19
Risk Projection
• Also called risk estimation
• It estimates the impact of risk on the
  project and the product
• Estimation is done by using Risk Table
• Risk projection addresses risk in 2 ways
• Likelihood or probability that the risk is
  real(Li)
• Consequences(Xi)
                                               20
Risk Projection
• Steps in Risk projection
1. Estimate Li for each risk
2. Estimate the consequence Xi
3. Estimate the impact
4. Draw the risk table
5. Ignore the risk where the management concern
   is low i.e., risk having impact high or low with low
   probability of occurrence
6. Consider all risks where management concern is
   high i.e., high impact with high or moderate
   probability of occurrence or low impact with high
   probability of occurrence                          21
Risk Projection
Risk            Category   Probability   Impact   RMMM
Size estimate PS           60%           2
may be
significantly
low
Larger no. of   PS         30%           3
users than
planned
Less reuse      PS         70%           2
than planned
End user        BU         40%           3
resist system




                                                         22
Risk Projection
• The impact of each risk is assessed by
  Impact values
  Catastrophic-1
  Critical-2
   Marginal-3
   Negligible-4


                                           23
Risk Refinement
• Also called Risk assessment
• Refines the risk table in reviewing the risk
  impact based on the following three
  factors
a.Nature: Likely problems if risk occurs
b.Scope: Just how serious is it?
c.Timing: When and how long


                                                 24
Risk Refinement
• It is based on Risk Elaboration
• Calculate Risk exposure RE=P*C
   Where P is probability and C is cost of
  project if risk occurs




                                             25
Risk Mitigation Monitoring And
       Management (RMMM)
• Its goal is to assist project team in
  developing a strategy for dealing with risk
• There are three issues of RMMM
1)Risk Avoidance

2)Risk Monitoring and

3)Risk Management
                                                26
Risk Mitigation Monitoring And
       Management (RMMM)
• Risk Mitigation
  Proactive planning for risk avoidance
• Risk Monitoring
- Assessing whether predicted risk occur or not
- Ensuring risk aversion steps are being properly
  applied
- Collection of information for future risk analysis
- Determine which risks caused which problems

                                                       27
Risk Mitigation Monitoring And
       Management (RMMM)
• Risk Management
- Contingency planning
- Actions to be taken in the event that
  mitigation steps have failed and the risk
  has become a live problem
- Devise RMMP(Risk Mitigation Monitoring
  And Management Plan)

                                              28
RMMM plan
• It documents all work performed as a part
  of risk analysis.

• Each risk is documented individually by
  using a Risk Information Sheet.

• RIS is maintained by using a database
  system
                                              29

More Related Content

What's hot

2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
bcanawakadalcollege
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
IrtazaAfzal3
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
Research & Development LAB QUEST Nawabshah
 
1.1 The nature of software.ppt
1.1 The nature of software.ppt1.1 The nature of software.ppt
1.1 The nature of software.ppt
JAYAPRIYAR7
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementChandan Chaurasia
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and DesignHaitham El-Ghareeb
 
software cost factor
software cost factorsoftware cost factor
software cost factor
Abinaya B
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
JAINAM KAPADIYA
 
Phased life cycle model
Phased life cycle modelPhased life cycle model
Phased life cycle model
Stephennancy
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
Aman Adhikari
 
Chapter 1 2 - some size factors
Chapter 1   2 - some size factorsChapter 1   2 - some size factors
Chapter 1 2 - some size factors
NancyBeaulah_R
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
Atul Karmyal
 
Spm software effort estimation
Spm software effort estimationSpm software effort estimation
Spm software effort estimation
Kanchana Devi
 
Programming team structure
Programming team structureProgramming team structure
Programming team structure
NancyBeaulah_R
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
deep sharma
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24koolkampus
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software Engineering
Upekha Vandebona
 

What's hot (20)

2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
PRESCRIPTIVE PROCESS MODEL(SOFTWARE ENGINEERING)
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
 
1.1 The nature of software.ppt
1.1 The nature of software.ppt1.1 The nature of software.ppt
1.1 The nature of software.ppt
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 
software cost factor
software cost factorsoftware cost factor
software cost factor
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
Phased life cycle model
Phased life cycle modelPhased life cycle model
Phased life cycle model
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Chapter 1 2 - some size factors
Chapter 1   2 - some size factorsChapter 1   2 - some size factors
Chapter 1 2 - some size factors
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Spm software effort estimation
Spm software effort estimationSpm software effort estimation
Spm software effort estimation
 
Programming team structure
Programming team structureProgramming team structure
Programming team structure
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software Engineering
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 

Similar to Unit 7

OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
RanjitKdk
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
SUBHASISHMAHAKUD
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
KhajaPasha33
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
MuhammadKashif703372
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
ShudipPal
 
Riskmanagement software Engineering1.ppt
Riskmanagement software Engineering1.pptRiskmanagement software Engineering1.ppt
Riskmanagement software Engineering1.ppt
sirishaYerraboina1
 
risk management
risk managementrisk management
risk management
Arti Maggo
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
zeeshanwrch
 
Software Quality presentation.pptx
Software Quality presentation.pptxSoftware Quality presentation.pptx
Software Quality presentation.pptx
ChrisMunyau
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 
RMMM
RMMMRMMM
Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
ShrejalKesharwani
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
Shashi Kumar
 
Risk management
Risk managementRisk management
Risk management
Usman Mukhtar
 
Risk management
Risk managementRisk management
Risk management
bipulpwc
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 
Risk-management
 Risk-management Risk-management
Risk-management
Umesh Gupta
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
Navjyotsinh Jadeja
 

Similar to Unit 7 (20)

OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk management
Risk managementRisk management
Risk management
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Riskmanagement software Engineering1.ppt
Riskmanagement software Engineering1.pptRiskmanagement software Engineering1.ppt
Riskmanagement software Engineering1.ppt
 
risk management
risk managementrisk management
risk management
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Software Quality presentation.pptx
Software Quality presentation.pptxSoftware Quality presentation.pptx
Software Quality presentation.pptx
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
RMMM
RMMMRMMM
RMMM
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 

More from anuragmbst

Unit 1 watertech1 merged
Unit 1 watertech1 mergedUnit 1 watertech1 merged
Unit 1 watertech1 mergedanuragmbst
 
Unit 7-phaserule
Unit 7-phaseruleUnit 7-phaserule
Unit 7-phaseruleanuragmbst
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resourcesanuragmbst
 
Unit 3 polymers
Unit 3 polymersUnit 3 polymers
Unit 3 polymersanuragmbst
 
Unit 2-science-of-corrosion
Unit 2-science-of-corrosionUnit 2-science-of-corrosion
Unit 2-science-of-corrosionanuragmbst
 
Unit 3 requirements engineering processes merged
Unit 3 requirements engineering processes mergedUnit 3 requirements engineering processes merged
Unit 3 requirements engineering processes mergedanuragmbst
 

More from anuragmbst (20)

Unit 1 watertech1 merged
Unit 1 watertech1 mergedUnit 1 watertech1 merged
Unit 1 watertech1 merged
 
Unit 7-phaserule
Unit 7-phaseruleUnit 7-phaserule
Unit 7-phaserule
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resources
 
Unit 3 polymers
Unit 3 polymersUnit 3 polymers
Unit 3 polymers
 
Unit 2-science-of-corrosion
Unit 2-science-of-corrosionUnit 2-science-of-corrosion
Unit 2-science-of-corrosion
 
Unit 3 requirements engineering processes merged
Unit 3 requirements engineering processes mergedUnit 3 requirements engineering processes merged
Unit 3 requirements engineering processes merged
 
Unit 8
Unit 8Unit 8
Unit 8
 
Unit 6
Unit 6Unit 6
Unit 6
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit4
Unit4Unit4
Unit4
 
Unit2
Unit2Unit2
Unit2
 
Unit1
Unit1Unit1
Unit1
 
Unit 01 dbms
Unit 01 dbmsUnit 01 dbms
Unit 01 dbms
 
Unit 08 dbms
Unit 08 dbmsUnit 08 dbms
Unit 08 dbms
 
Unit 07 dbms
Unit 07 dbmsUnit 07 dbms
Unit 07 dbms
 
Unit 06 dbms
Unit 06 dbmsUnit 06 dbms
Unit 06 dbms
 
Unit 05 dbms
Unit 05 dbmsUnit 05 dbms
Unit 05 dbms
 
Unit 04 dbms
Unit 04 dbmsUnit 04 dbms
Unit 04 dbms
 
Unit 03 dbms
Unit 03 dbmsUnit 03 dbms
Unit 03 dbms
 
Unit 02 dbms
Unit 02 dbmsUnit 02 dbms
Unit 02 dbms
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Unit 7

  • 1. Software Engineering B.Tech IT/II Sem-II Term: 2008-2009 Unit-7 PPT SLIDES Text Books:1.Software Engineering, A practitioner’s approach Roger s. Pressman 6th edition McGraw- Hill 2.Software Engineering Somerville 7th edition 1
  • 2. Unit 7 Syllabus • Metrics for Process and Products : Software Measurement, Metrics for software quality. • Risk management : Reactive vs. Proactive Risk strategies, software risks, Risk identification, Risk projection, Risk refinement, RMMM, RMMM Plan. 2
  • 3. INDEX Unit 7 S.No Topic Name Lecture No Slide No. 1. Metrics for process and product: Software L1 4 Measurement 2. Metrics for software quality L2 12 3. Risk Management: Reactive VS Proactive risk L3 14 4. Software Risk L4 16 5. Risk Identification L5 18 6. Risk Projection L5 20 7 Risk Refinement L6 24 7. Risk Mitigation Monitoring And Management L6 26 8. RMMM plan L7 29 3
  • 4. Metrics for Process And Product • Software Measurement: Software measurement can be categorized as 1)Direct Measure and 2)Indirect Measure 4
  • 5. Metrics for Process And Product • Direct Measurement  Direct measure of software process include cost and effort  Direct measure of product include lines of code, Execution speed, memory size, defects per reporting time period. • Indirect Measurement  Indirect measure examines the quality of software product itself(e.g. :-functionality, complexity, efficiency, reliability and maintainability) 5
  • 6. Reasons for measurement 1. To gain baseline for comparison with future assessment 2. To determine status with respect to plan 3. To predict the size, cost and duration estimate 4. To improve the product quality and process improvement 6
  • 7. Software Measurement • The metrics in software Measurement are  Size oriented metrics  Function oriented metrics  Object oriented metrics  Web based application metric 7
  • 8. Size Oriented Metrics • It totally concerned with the measurement of software. • A software company maintains a simple record for calculating the size of the software. • It includes LOC, Effort,$$,PP document,Error,Defect ,People. 8
  • 9. Function oriented metrics • Measures the functionality derived by the application • The most widely used function oriented metric is Function point • Function point is independent of programming language • Measures functionality from user point of view 9
  • 10. Object oriented metric • Relevant for object oriented programming • Based on the following  Number of scenarios(Similar to use cases)  Number of key classes  Number of support classes  Number of average support class per key class  Number of subsystem 10
  • 11. Web based application metric • Metrics related to web based application measure the following 1.Number of static pages(NSP) 2.Number of dynamic pages(NDP) Customization(C)=NSP/NSP+NDP C should approach 1 11
  • 12. Metrics for Software Quality • Measuring Software Quality 1.Correctness=defects/KLOC 2.Maintainability=MTTC(Mean-time to change) 3.Integrity=Sigma[1-(threat(1-security))] Threat : Probability that an attack of specific type will occur within a given time Security : Probability that an attack of a specific type will be repelled 12
  • 13. Metrics for Software Quality 4. Usability: Ease of use 5. Defect Removal Efficiency(DRE) DRE=E/(E+D) E is the no. of errors found before delivery and D is no. of defects reported after delivery Ideal value of DRE is 1 13
  • 14. Risk Management • Risk is an undesired event or circumstance that occur while a project is underway • It is necessary for the project manager to anticipate and identify different risks that a project may be susceptible to. • Risk Management It aims at reducing the impact of all kinds of risk that may effect a project by identifying, analyzing and managing them 14
  • 15. Risk Management Reactive Vs Proactive risk Reactive : It monitors the projects likely risk and resources are set aside. Proactive: Risk are identified, their probability and impact is accessed 15
  • 16. Software Risk • It involve 2 characteristics 1. Uncertainty : Risk may or may not happen 2. Loss : If risk is reality unwanted loss or consequences will occur • It includes 1)Project Risk 2)Technical Risk 3)Business Risk 4)Known Risk 5)Unpredictable Risk 6)Predictable Risk 16
  • 17. Software Risk • Project risk: Threaten the project plan and affect schedule and resultant cost • Technical risk: Threaten the quality and timeliness of software to be produced • Business risk: Threaten the viability of software to be built • Known risk: These risks can be recovered from careful evaluation • Predictable risk: Risks are identified by past project experience • Unpredictable risk: Risks that occur and may be difficult to identify 17
  • 18. Risk Identification • It concerned with identification of risk • Step1: Identify all possible risks • Step2: Create item check list • Step3: Categorize into risk components- Performance risk, cost risk, support risk and schedule risk • Step4: Divide the risk into one of 4 categories • Negligible-0 • Marginal-1 • Critical-2 • Catastrophic-3 18
  • 19. Risk Identification • Risk Identification includes • Product size • Business impact • Development environment • Process definition • Customer characteristics • Technology to be built • Staff size and experience 19
  • 20. Risk Projection • Also called risk estimation • It estimates the impact of risk on the project and the product • Estimation is done by using Risk Table • Risk projection addresses risk in 2 ways • Likelihood or probability that the risk is real(Li) • Consequences(Xi) 20
  • 21. Risk Projection • Steps in Risk projection 1. Estimate Li for each risk 2. Estimate the consequence Xi 3. Estimate the impact 4. Draw the risk table 5. Ignore the risk where the management concern is low i.e., risk having impact high or low with low probability of occurrence 6. Consider all risks where management concern is high i.e., high impact with high or moderate probability of occurrence or low impact with high probability of occurrence 21
  • 22. Risk Projection Risk Category Probability Impact RMMM Size estimate PS 60% 2 may be significantly low Larger no. of PS 30% 3 users than planned Less reuse PS 70% 2 than planned End user BU 40% 3 resist system 22
  • 23. Risk Projection • The impact of each risk is assessed by Impact values Catastrophic-1 Critical-2 Marginal-3 Negligible-4 23
  • 24. Risk Refinement • Also called Risk assessment • Refines the risk table in reviewing the risk impact based on the following three factors a.Nature: Likely problems if risk occurs b.Scope: Just how serious is it? c.Timing: When and how long 24
  • 25. Risk Refinement • It is based on Risk Elaboration • Calculate Risk exposure RE=P*C Where P is probability and C is cost of project if risk occurs 25
  • 26. Risk Mitigation Monitoring And Management (RMMM) • Its goal is to assist project team in developing a strategy for dealing with risk • There are three issues of RMMM 1)Risk Avoidance 2)Risk Monitoring and 3)Risk Management 26
  • 27. Risk Mitigation Monitoring And Management (RMMM) • Risk Mitigation Proactive planning for risk avoidance • Risk Monitoring - Assessing whether predicted risk occur or not - Ensuring risk aversion steps are being properly applied - Collection of information for future risk analysis - Determine which risks caused which problems 27
  • 28. Risk Mitigation Monitoring And Management (RMMM) • Risk Management - Contingency planning - Actions to be taken in the event that mitigation steps have failed and the risk has become a live problem - Devise RMMP(Risk Mitigation Monitoring And Management Plan) 28
  • 29. RMMM plan • It documents all work performed as a part of risk analysis. • Each risk is documented individually by using a Risk Information Sheet. • RIS is maintained by using a database system 29