SlideShare a Scribd company logo
1
Chapter 25Chapter 25
Risk ManagementRisk Management
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
2
Project RisksProject Risks
What can go wrong?What can go wrong?
What is the likelihood?What is the likelihood?
What will the damage be?What will the damage be?
What can we do about it?What can we do about it?
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
3
Reactive Risk ManagementReactive Risk Management
project team reacts to risks when they occurproject team reacts to risks when they occur
mitigationmitigation——plan for additional resources inplan for additional resources in
anticipation of fire fightinganticipation of fire fighting
fix on failurefix on failure——resource are found andresource are found and
applied when the risk strikesapplied when the risk strikes
crisis managementcrisis management——failure does not respondfailure does not respond
to applied resources and project is in dangerto applied resources and project is in danger
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
4
Proactive Risk ManagementProactive Risk Management
formal risk analysis is performedformal risk analysis is performed
organization corrects the root causes of riskorganization corrects the root causes of risk
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
Risk involves two characteristics:Risk involves two characteristics:
UncertaintyUncertainty
LossLoss
5
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
Project risks: threaten the project plan: schedule and costProject risks: threaten the project plan: schedule and cost
Potential budgetary, schedule, personnel, resource, stakeholder,Potential budgetary, schedule, personnel, resource, stakeholder,
and requirements problemsand requirements problems
Technical risks: threaten the quality and appropriatenessTechnical risks: threaten the quality and appropriateness
Potential design, implementation, interface, verification, andPotential design, implementation, interface, verification, and
maintenance problems + technical uncertainty (leading edge)maintenance problems + technical uncertainty (leading edge)
Business risks: threaten the practicalityBusiness risks: threaten the practicality
6
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
Business risks: threaten the practicalityBusiness risks: threaten the practicality
Market risk: no one really wantsMarket risk: no one really wants
Strategic risk: no longer fits into the overall business strategStrategic risk: no longer fits into the overall business strategy fory for
companycompany
Sales risk: sales force doesnSales risk: sales force doesn’’t understand how to sellt understand how to sell
Management risk: losing the support of managementManagement risk: losing the support of management
Budget risk: losing budgetaryBudget risk: losing budgetary
Personal risk: losing personnel commitmentPersonal risk: losing personnel commitment
7
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
8
Seven Principles of SEISeven Principles of SEI (Software Engineering Institute)(Software Engineering Institute)
for effective risk managementfor effective risk management
Maintain a global perspectiveMaintain a global perspective
view software risks within the context of system and the businesview software risks within the context of system and the business problems problem
Take a forwardTake a forward--looking viewlooking view
think about the risks that may arise in the future; establish cthink about the risks that may arise in the future; establish contingency plansontingency plans
Encourage open communicationEncourage open communication
if someone states a potential risk, donif someone states a potential risk, don’’t discount it.t discount it.
IntegrateIntegrate
a consideration of risk must be integrated into the software proa consideration of risk must be integrated into the software processcess
Emphasize a continuous processEmphasize a continuous process
the team must be alert throughout the software process,the team must be alert throughout the software process,
modifying identified risks as more information is known and addimodifying identified risks as more information is known and adding new onesng new ones
as better insight is achieved.as better insight is achieved.
Develop a shared product visionDevelop a shared product vision
if all stakeholders share the same vision of the software, it liif all stakeholders share the same vision of the software, it likely that better riskkely that better risk
identification and assessment will occur.identification and assessment will occur.
Encourage teamworkEncourage teamwork
the talents, skills and knowledge of all stakeholder should be pthe talents, skills and knowledge of all stakeholder should be pooledooled
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
9
RISK
Risk Management ParadigmRisk Management Paradigm
controlcontrol
identifyidentify
analyzeanalyze
planplan
tracktrack
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
10
Risk Identification: check listRisk Identification: check list
Product size:Product size:
the overall size of the software to be built or modified.the overall size of the software to be built or modified.
Business impact :Business impact :
constraints imposed by management or the marketplace.constraints imposed by management or the marketplace.
Customer characteristicsCustomer characteristics
the sophistication of the customer andthe sophistication of the customer and
the developer's ability to communicate with the customer in a tithe developer's ability to communicate with the customer in a timely manner.mely manner.
Process definitionProcess definition
the degree to which the software process has been defined andthe degree to which the software process has been defined and
is followed by the development organization.is followed by the development organization.
Development environment:Development environment:
the availability and quality of the tools to be used to build ththe availability and quality of the tools to be used to build the product.e product.
Technology to be builtTechnology to be built
complexity of the system to be built andcomplexity of the system to be built and
the "newness" of the technology that is packaged by the system.the "newness" of the technology that is packaged by the system.
Staff size and experience:Staff size and experience:
the overall technical and project experience of the software engthe overall technical and project experience of the software engineers who willineers who will
do the work.do the work.
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
11
Assessing Project RiskAssessing Project Risk--II
Have top software and customer managers formallyHave top software and customer managers formally
committed to support the project?committed to support the project?
Are endAre end--users enthusiastically committed to the projectusers enthusiastically committed to the project
and the system/product to be built?and the system/product to be built?
Are requirements fully understood by the softwareAre requirements fully understood by the software
engineering team and their customers?engineering team and their customers?
Have customers been involved fully in the definition ofHave customers been involved fully in the definition of
requirements?requirements?
Do endDo end--users have realistic expectations?users have realistic expectations?
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
12
Assessing Project RiskAssessing Project Risk--IIII
Is project scope stable?Is project scope stable?
Does the software engineering team have the right mixDoes the software engineering team have the right mix
of skills?of skills?
Are project requirements stable?Are project requirements stable?
Does the project team have experience with theDoes the project team have experience with the
technology to be implemented?technology to be implemented?
Is the number of people on the project team adequate toIs the number of people on the project team adequate to
do the job?do the job?
Do all customer/user constituencies agree on the
importance of the project and on the requirements for
the system/product to be built?
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
13
Risk ComponentsRisk Components
(US Air Force)(US Air Force)
performance riskperformance risk——the degree of uncertainty that thethe degree of uncertainty that the
product will meet its requirements and be fit for itsproduct will meet its requirements and be fit for its
intended use.intended use.
cost riskcost risk——the degree of uncertainty that the projectthe degree of uncertainty that the project
budget will be maintained.budget will be maintained.
support risksupport risk——the degree of uncertainty that the resultantthe degree of uncertainty that the resultant
software will be easy to correct, adapt, and enhance.software will be easy to correct, adapt, and enhance.
schedule riskschedule risk——the degree of uncertainty that the projectthe degree of uncertainty that the project
schedule will be maintained and that the product will beschedule will be maintained and that the product will be
delivered on time.delivered on time.
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
Risk category:Risk category:
CatastrophicCatastrophic
CriticalCritical
MarginalMarginal
NegligibleNegligible
A table based on components and categories: Fig. 25A table based on components and categories: Fig. 25--11
14
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
15
Risk ProjectionRisk Projection
Risk projectionRisk projection, also called, also called risk estimation,risk estimation, attempts to rateattempts to rate
each risk in two wayseach risk in two ways
the likelihood or probability that the risk is realthe likelihood or probability that the risk is real
the consequences of the problems associated with the risk,the consequences of the problems associated with the risk,
should it occur.should it occur.
The are four risk projection steps:The are four risk projection steps:
establish a scale that reflects the supposed likelihood of a risestablish a scale that reflects the supposed likelihood of a riskk
define the consequences of the riskdefine the consequences of the risk
estimate the impact of the risk on the project and the product,estimate the impact of the risk on the project and the product,
note the overall accuracy of the risk projection so that there wnote the overall accuracy of the risk projection so that there will beill be
no misunderstandings.no misunderstandings.
Helps to prioritize risksHelps to prioritize risks
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
16
Building a Risk TableBuilding a Risk Table
RiskRisk ProbabilityProbability ImpactImpact RMMMRMMM
RiskRisk
MitigationMitigation
MonitoringMonitoring
&&
ManagementManagement
Larger
number of
users than
planned
Staff
inexperienced
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
17
Building the Risk TableBuilding the Risk Table
Estimate theEstimate the probabilityprobability of occurrenceof occurrence
Estimate theEstimate the impactimpact on the project on a scale of 1on the project on a scale of 1
to 5, whereto 5, where
1 = low impact on project success1 = low impact on project success
5 = catastrophic impact on project success5 = catastrophic impact on project success
sort the table by probability and impactsort the table by probability and impact
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
18
Risk ExposureRisk Exposure
The overall risk exposure, RE, is determined using the
following relationship [HAL98]:
RE = P x C
where
P is the probability of occurrence for a risk, and
C is the cost to the project if the risk occur.
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
19
Risk Exposure ExampleRisk Exposure Example
Risk identification.Risk identification. Only 70 percent of the software components scheduledOnly 70 percent of the software components scheduled
for reuse will, in fact, be integrated into the application. Thefor reuse will, in fact, be integrated into the application. The remainingremaining
functionality will have to be custom developed.functionality will have to be custom developed.
Risk probability.Risk probability. 80% (likely).80% (likely).
Risk impact.Risk impact. 60 reusable software components were planned. If only 7060 reusable software components were planned. If only 70
percent can be used, 18 components would have to be developed frpercent can be used, 18 components would have to be developed fromom
scratch (in addition to other custom software that has been schescratch (in addition to other custom software that has been scheduled forduled for
development). Since the average component is 100 LOC and local ddevelopment). Since the average component is 100 LOC and local dataata
indicate that the software engineering cost for each LOC is $14.indicate that the software engineering cost for each LOC is $14.00, the00, the
overall cost (impact) to develop the components would be 18 x 10overall cost (impact) to develop the components would be 18 x 100 x 14 =0 x 14 =
$25,200.$25,200.
Risk exposure.Risk exposure. RE = 0.80 x 25,200 ~ $20,200.RE = 0.80 x 25,200 ~ $20,200.
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
20
mitigationmitigation——how can we avoid the risk?how can we avoid the risk?
monitoringmonitoring——what factors can we track that willwhat factors can we track that will
enable us to determine if the risk is becoming moreenable us to determine if the risk is becoming more
or less likely?or less likely?
managementmanagement——what contingency plans do we havewhat contingency plans do we have
if the risk becomes a reality?if the risk becomes a reality?
Risk Mitigation, Monitoring,Risk Mitigation, Monitoring,
and Managementand Management
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
21
Risk Due to Product SizeRisk Due to Product Size
•• estimated size of the product in LOC or FP?estimated size of the product in LOC or FP?
•• estimated size of product in number of programs,estimated size of product in number of programs,
files, transactions?files, transactions?
•• percentage deviation in size of product frompercentage deviation in size of product from
average for previous products?average for previous products?
•• size of database created or used by the product?size of database created or used by the product?
•• number of users of the product?number of users of the product?
•• number of projected changes to the requirementsnumber of projected changes to the requirements
for the product? before delivery? after delivery?for the product? before delivery? after delivery?
•• amount of reused software?amount of reused software?
Attributes that affect risk:Attributes that affect risk:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
22
Risk Due to Business ImpactRisk Due to Business Impact
•• affect of this product on company revenue?affect of this product on company revenue?
•• visibility of this product by senior management?visibility of this product by senior management?
•• reasonableness of delivery deadline?reasonableness of delivery deadline?
•• number of customers who will use this productnumber of customers who will use this product
•• interoperability constraintsinteroperability constraints
•• sophistication of end users?sophistication of end users?
•• amount and quality of product documentation thatamount and quality of product documentation that
must be produced and delivered to the customer?must be produced and delivered to the customer?
•• governmental constraintsgovernmental constraints
•• costs associated with late delivery?costs associated with late delivery?
•• costs associated with a defective product?costs associated with a defective product?
Attributes that affect risk:Attributes that affect risk:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
23
Risks Due to the CustomerRisks Due to the Customer
•• Have you worked with the customer in the past?Have you worked with the customer in the past?
•• Does the customer have a solid idea of requirements?Does the customer have a solid idea of requirements?
•• Has the customer agreed to spend time with you?Has the customer agreed to spend time with you?
•• Is the customer willing to participate in reviews?Is the customer willing to participate in reviews?
•• Is the customer technically sophisticated?Is the customer technically sophisticated?
•• Is the customer willing to let your people do theirIs the customer willing to let your people do their
jobjob——that is, will the customer resist looking over yourthat is, will the customer resist looking over your
shoulder during technically detailed work?shoulder during technically detailed work?
•• Does the customer understand the softwareDoes the customer understand the software
engineering process?engineering process?
Questions that must be answered:Questions that must be answered:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
24
Risks Due to Process MaturityRisks Due to Process Maturity
•• Have you established a common process framework?Have you established a common process framework?
•• Is it followed by project teams?Is it followed by project teams?
•• Do you have management support forDo you have management support for
software engineeringsoftware engineering
•• Do you have a proactive approach to SQA?Do you have a proactive approach to SQA?
•• Do you conduct formal technical reviews?Do you conduct formal technical reviews?
•• Are CASE tools used for analysis, design andAre CASE tools used for analysis, design and
testing?testing?
•• Are the tools integrated with one another?Are the tools integrated with one another?
•• Have document formats been established?Have document formats been established?
Questions that must be answered:Questions that must be answered:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
25
Technology RisksTechnology Risks
•• Is the technology new to your organization?Is the technology new to your organization?
•• Are new algorithms, I/O technology required?Are new algorithms, I/O technology required?
•• Is new or unproven hardware involved?Is new or unproven hardware involved?
•• Does the application interface with new software?Does the application interface with new software?
•• Is a specialized user interface required?Is a specialized user interface required?
•• Is the application radically different?Is the application radically different?
•• Are you using new software engineering methods?Are you using new software engineering methods?
•• Are you using unconventional software developmentAre you using unconventional software development
methods, such as formal methods, AImethods, such as formal methods, AI--based approaches,based approaches,
artificial neural networks?artificial neural networks?
•• Are there significant performance constraints?Are there significant performance constraints?
•• Is there doubt the functionality requested is "doIs there doubt the functionality requested is "do--able?"able?"
Questions that must be answered:Questions that must be answered:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
26
Staff/People RisksStaff/People Risks
•• Are the best people available?Are the best people available?
•• Does staff have the right skills?Does staff have the right skills?
•• Are enough people available?Are enough people available?
•• Are staff committed for entire duration?Are staff committed for entire duration?
•• Will some people work part time?Will some people work part time?
•• Do staff have the right expectations?Do staff have the right expectations?
•• Have staff received necessary training?Have staff received necessary training?
•• Will turnover among staff be low?Will turnover among staff be low?
Questions that must be answered:Questions that must be answered:
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net
27
Project:Project: Embedded software for XYZ systemEmbedded software for XYZ system
Risk type:Risk type: schedule riskschedule risk
PriorityPriority (1 low ... 5 critical):(1 low ... 5 critical): 44
Risk factorRisk factor:: Project completion will depend on tests which requireProject completion will depend on tests which require
hardware component under development. Hardware componenthardware component under development. Hardware component
delivery may be delayeddelivery may be delayed
Probability:Probability: 60 %60 %
ImpactImpact:: Project completion will be delayed for each day thatProject completion will be delayed for each day that
hardware is unavailable for use in software testinghardware is unavailable for use in software testing
Monitoring approachMonitoring approach::
Scheduled milestone reviews with hardware groupScheduled milestone reviews with hardware group
Contingency (Emergency) plan:Contingency (Emergency) plan:
Modification of testing strategy to accommodate delay usingModification of testing strategy to accommodate delay using
software simulationsoftware simulation
Estimated resourcesEstimated resources:: 6 additional person months beginning 76 additional person months beginning 7--11--9696
Recording Risk InformationRecording Risk Information
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net

More Related Content

What's hot

Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
Nesma
 
GAFM Academy HOW TO START A PROJECT
GAFM Academy HOW TO START A PROJECTGAFM Academy HOW TO START A PROJECT
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Ahmed Al Enizi
 
Risk Management
Risk ManagementRisk Management
Risk Management
Madhavan Karthikeyan
 
final (2)
final (2)final (2)
final (2)
Vishavjit Singh
 
Risk Analysis Workbook
Risk Analysis WorkbookRisk Analysis Workbook
Risk Analysis Workbook
dmdk12
 
The Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
The Known Unknown - Importance of Project Risk Management by Mr Wissam YaacoubThe Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
The Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
PMILebanonChapter
 
NEGATIVE_RESPONSE_STRATEGIES_V1.1
NEGATIVE_RESPONSE_STRATEGIES_V1.1NEGATIVE_RESPONSE_STRATEGIES_V1.1
NEGATIVE_RESPONSE_STRATEGIES_V1.1
Fahad Saleem
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
SBaasansuren
 
Global Competition with Global Competence
Global Competition with Global CompetenceGlobal Competition with Global Competence
Global Competition with Global Competence
Carlos DaSilva
 
NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5
Future Managers
 
Prm handbook
Prm handbookPrm handbook
Prm handbook
Tebogo Ranyane
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
ijtsrd
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
smumbahelp
 
Example risk check list based on a risk breakdown structure
Example risk check list   based on a risk breakdown structureExample risk check list   based on a risk breakdown structure
Example risk check list based on a risk breakdown structure
manerajp
 
Risk management in a construction projects between knowledge and application ...
Risk management in a construction projects between knowledge and application ...Risk management in a construction projects between knowledge and application ...
Risk management in a construction projects between knowledge and application ...
Waleed Elbasyouni ,PgMP®,P3O®,PMP®,RMP®,KPI-P®,APMG-CH®,TOT®,SSYB™
 
Bilbro james
Bilbro jamesBilbro james
Bilbro james
NASAPMC
 
APM Project magazine TEC Case Study
APM Project magazine TEC Case StudyAPM Project magazine TEC Case Study
APM Project magazine TEC Case Study
Patrick Watson
 
Supplier Selection
Supplier SelectionSupplier Selection
Supplier Selection
Ricardo Viana Vargas
 

What's hot (19)

Iwsm2014 defining technical risk in software development (vard antinyan)
Iwsm2014   defining technical risk in software development (vard antinyan)Iwsm2014   defining technical risk in software development (vard antinyan)
Iwsm2014 defining technical risk in software development (vard antinyan)
 
GAFM Academy HOW TO START A PROJECT
GAFM Academy HOW TO START A PROJECTGAFM Academy HOW TO START A PROJECT
GAFM Academy HOW TO START A PROJECT
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
final (2)
final (2)final (2)
final (2)
 
Risk Analysis Workbook
Risk Analysis WorkbookRisk Analysis Workbook
Risk Analysis Workbook
 
The Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
The Known Unknown - Importance of Project Risk Management by Mr Wissam YaacoubThe Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
The Known Unknown - Importance of Project Risk Management by Mr Wissam Yaacoub
 
NEGATIVE_RESPONSE_STRATEGIES_V1.1
NEGATIVE_RESPONSE_STRATEGIES_V1.1NEGATIVE_RESPONSE_STRATEGIES_V1.1
NEGATIVE_RESPONSE_STRATEGIES_V1.1
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Global Competition with Global Competence
Global Competition with Global CompetenceGlobal Competition with Global Competence
Global Competition with Global Competence
 
NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5
 
Prm handbook
Prm handbookPrm handbook
Prm handbook
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
 
Example risk check list based on a risk breakdown structure
Example risk check list   based on a risk breakdown structureExample risk check list   based on a risk breakdown structure
Example risk check list based on a risk breakdown structure
 
Risk management in a construction projects between knowledge and application ...
Risk management in a construction projects between knowledge and application ...Risk management in a construction projects between knowledge and application ...
Risk management in a construction projects between knowledge and application ...
 
Bilbro james
Bilbro jamesBilbro james
Bilbro james
 
APM Project magazine TEC Case Study
APM Project magazine TEC Case StudyAPM Project magazine TEC Case Study
APM Project magazine TEC Case Study
 
Supplier Selection
Supplier SelectionSupplier Selection
Supplier Selection
 

Viewers also liked

Unit 7 the solar system and beyond-the physics of the universe
Unit 7  the solar system and beyond-the physics of the universeUnit 7  the solar system and beyond-the physics of the universe
Unit 7 the solar system and beyond-the physics of the universe
Ricca Ramos
 
7 Reasons Why We Need to Use Solar Energy
7 Reasons Why We Need to Use Solar Energy7 Reasons Why We Need to Use Solar Energy
7 Reasons Why We Need to Use Solar Energy
Gede Manggala
 
Bits unit 7 energy and environment 2015
Bits   unit 7 energy and environment 2015Bits   unit 7 energy and environment 2015
Bits unit 7 energy and environment 2015
Luis Gutiérrez
 
Power of Setting GOALS
Power of Setting GOALSPower of Setting GOALS
Power of Setting GOALS
Dr Naim R Kidwai
 
Example Sponsor Development Risk Assessment Report
Example Sponsor Development Risk Assessment ReportExample Sponsor Development Risk Assessment Report
Example Sponsor Development Risk Assessment Report
Ronald Moore
 
Business Effectiveness Assignment 2 Report
Business Effectiveness Assignment 2 ReportBusiness Effectiveness Assignment 2 Report
Business Effectiveness Assignment 2 Report
Mohammed Zohaib Munnee
 
Solar Resource Assessment: Why it Matters
Solar Resource Assessment: Why it MattersSolar Resource Assessment: Why it Matters
Solar Resource Assessment: Why it Matters
AWS Truepower
 
Managing Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy ProjectsManaging Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy Projects
Rick Borry
 
Creating a risk focused organisation by peter chisambara
Creating a risk focused organisation by peter chisambaraCreating a risk focused organisation by peter chisambara
Creating a risk focused organisation by peter chisambara
Boris Agranovich
 
Presentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | SolarifPresentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | Solarif
Solar Insurance & finance
 
Entrepreneurship in solar Energy
Entrepreneurship in solar EnergyEntrepreneurship in solar Energy
Entrepreneurship in solar Energy
Dr Naim R Kidwai
 
Best Practices in Board Evaluation and Director Evaluation
Best Practices in Board Evaluation and Director EvaluationBest Practices in Board Evaluation and Director Evaluation
Best Practices in Board Evaluation and Director Evaluation
Beverly Behan
 
SolarCity - The Hot shit!
SolarCity - The Hot shit!SolarCity - The Hot shit!
SolarCity - The Hot shit!
Fridge Organic
 
Management Aspects, project management value engineering
Management Aspects, project management value engineeringManagement Aspects, project management value engineering
Management Aspects, project management value engineering
Dr Naim R Kidwai
 
2016 Survey: Board of Director Evaluation and Effectiveness
2016 Survey: Board of Director Evaluation and Effectiveness 2016 Survey: Board of Director Evaluation and Effectiveness
2016 Survey: Board of Director Evaluation and Effectiveness
Stanford GSB Corporate Governance Research Initiative
 
Risk-management
 Risk-management Risk-management
Risk-management
Umesh Gupta
 
Unit step function
Unit step functionUnit step function
Unit step function
Kifaru Malale
 

Viewers also liked (17)

Unit 7 the solar system and beyond-the physics of the universe
Unit 7  the solar system and beyond-the physics of the universeUnit 7  the solar system and beyond-the physics of the universe
Unit 7 the solar system and beyond-the physics of the universe
 
7 Reasons Why We Need to Use Solar Energy
7 Reasons Why We Need to Use Solar Energy7 Reasons Why We Need to Use Solar Energy
7 Reasons Why We Need to Use Solar Energy
 
Bits unit 7 energy and environment 2015
Bits   unit 7 energy and environment 2015Bits   unit 7 energy and environment 2015
Bits unit 7 energy and environment 2015
 
Power of Setting GOALS
Power of Setting GOALSPower of Setting GOALS
Power of Setting GOALS
 
Example Sponsor Development Risk Assessment Report
Example Sponsor Development Risk Assessment ReportExample Sponsor Development Risk Assessment Report
Example Sponsor Development Risk Assessment Report
 
Business Effectiveness Assignment 2 Report
Business Effectiveness Assignment 2 ReportBusiness Effectiveness Assignment 2 Report
Business Effectiveness Assignment 2 Report
 
Solar Resource Assessment: Why it Matters
Solar Resource Assessment: Why it MattersSolar Resource Assessment: Why it Matters
Solar Resource Assessment: Why it Matters
 
Managing Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy ProjectsManaging Risks in Large Solar Energy Projects
Managing Risks in Large Solar Energy Projects
 
Creating a risk focused organisation by peter chisambara
Creating a risk focused organisation by peter chisambaraCreating a risk focused organisation by peter chisambara
Creating a risk focused organisation by peter chisambara
 
Presentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | SolarifPresentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | Solarif
 
Entrepreneurship in solar Energy
Entrepreneurship in solar EnergyEntrepreneurship in solar Energy
Entrepreneurship in solar Energy
 
Best Practices in Board Evaluation and Director Evaluation
Best Practices in Board Evaluation and Director EvaluationBest Practices in Board Evaluation and Director Evaluation
Best Practices in Board Evaluation and Director Evaluation
 
SolarCity - The Hot shit!
SolarCity - The Hot shit!SolarCity - The Hot shit!
SolarCity - The Hot shit!
 
Management Aspects, project management value engineering
Management Aspects, project management value engineeringManagement Aspects, project management value engineering
Management Aspects, project management value engineering
 
2016 Survey: Board of Director Evaluation and Effectiveness
2016 Survey: Board of Director Evaluation and Effectiveness 2016 Survey: Board of Director Evaluation and Effectiveness
2016 Survey: Board of Director Evaluation and Effectiveness
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Unit step function
Unit step functionUnit step function
Unit step function
 

Similar to Unit 7 risk

Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
gnitu
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
yenohhoney
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
Invensis Learning
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
AyidAlmgati
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
DorraLamouchi1
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
avisha23
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
BetshaTizazu2
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
ShudipPal
 
Risk
RiskRisk
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Inflectra
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
KhajaPasha33
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
MuhammadKashif703372
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
deep sharma
 
SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
Amr E. Mohamed
 
Risk Management
Risk ManagementRisk Management
Risk Management
Hinal Lunagariya
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Andersson Lujan Ojeda
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
Najmul Hussain
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
Muhammad Alhalaby
 
R1
R1R1

Similar to Unit 7 risk (20)

Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Risk
RiskRisk
Risk
 
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk management in software engineering
Risk management in software engineeringRisk management in software engineering
Risk management in software engineering
 
SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
R1
R1R1
R1
 

More from Azhar Shaik

Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
Azhar Shaik
 
Unit 6
Unit 6Unit 6
Unit 6
Azhar Shaik
 
SOFTWARE ENGINEERING UNIT 6 Ch22
SOFTWARE ENGINEERING UNIT 6 Ch22SOFTWARE ENGINEERING UNIT 6 Ch22
SOFTWARE ENGINEERING UNIT 6 Ch22
Azhar Shaik
 
SOFTWARE ENGINEERING UNIT 6 Ch14
SOFTWARE ENGINEERING UNIT 6 Ch14SOFTWARE ENGINEERING UNIT 6 Ch14
SOFTWARE ENGINEERING UNIT 6 Ch14
Azhar Shaik
 
SOFTWARE ENGINEERING UNIT 6 Ch 13
SOFTWARE ENGINEERING UNIT 6 Ch 13SOFTWARE ENGINEERING UNIT 6 Ch 13
SOFTWARE ENGINEERING UNIT 6 Ch 13
Azhar Shaik
 
Object oriented design-UNIT V
Object oriented design-UNIT VObject oriented design-UNIT V
Object oriented design-UNIT V
Azhar Shaik
 
Performing user interface design v
Performing user interface design vPerforming user interface design v
Performing user interface design v
Azhar Shaik
 
S.e material2 DESIGN ENGINEERING
S.e material2 DESIGN ENGINEERINGS.e material2 DESIGN ENGINEERING
S.e material2 DESIGN ENGINEERING
Azhar Shaik
 
Unit 4
Unit 4Unit 4
Unit 4
Azhar Shaik
 
Unit 3 requirements engineering processes
Unit 3 requirements engineering processesUnit 3 requirements engineering processes
Unit 3 requirements engineering processes
Azhar Shaik
 
Unit 3 system models
Unit 3 system modelsUnit 3 system models
Unit 3 system models
Azhar Shaik
 
Unit 2
Unit 2Unit 2
Unit 2
Azhar Shaik
 
Unit 2 analysis and software requirements
Unit 2 analysis and software requirementsUnit 2 analysis and software requirements
Unit 2 analysis and software requirements
Azhar Shaik
 
S.e material
S.e materialS.e material
S.e material
Azhar Shaik
 
Unit 1 se
Unit 1 seUnit 1 se
Unit 1 se
Azhar Shaik
 

More from Azhar Shaik (15)

Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
 
Unit 6
Unit 6Unit 6
Unit 6
 
SOFTWARE ENGINEERING UNIT 6 Ch22
SOFTWARE ENGINEERING UNIT 6 Ch22SOFTWARE ENGINEERING UNIT 6 Ch22
SOFTWARE ENGINEERING UNIT 6 Ch22
 
SOFTWARE ENGINEERING UNIT 6 Ch14
SOFTWARE ENGINEERING UNIT 6 Ch14SOFTWARE ENGINEERING UNIT 6 Ch14
SOFTWARE ENGINEERING UNIT 6 Ch14
 
SOFTWARE ENGINEERING UNIT 6 Ch 13
SOFTWARE ENGINEERING UNIT 6 Ch 13SOFTWARE ENGINEERING UNIT 6 Ch 13
SOFTWARE ENGINEERING UNIT 6 Ch 13
 
Object oriented design-UNIT V
Object oriented design-UNIT VObject oriented design-UNIT V
Object oriented design-UNIT V
 
Performing user interface design v
Performing user interface design vPerforming user interface design v
Performing user interface design v
 
S.e material2 DESIGN ENGINEERING
S.e material2 DESIGN ENGINEERINGS.e material2 DESIGN ENGINEERING
S.e material2 DESIGN ENGINEERING
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 3 requirements engineering processes
Unit 3 requirements engineering processesUnit 3 requirements engineering processes
Unit 3 requirements engineering processes
 
Unit 3 system models
Unit 3 system modelsUnit 3 system models
Unit 3 system models
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2 analysis and software requirements
Unit 2 analysis and software requirementsUnit 2 analysis and software requirements
Unit 2 analysis and software requirements
 
S.e material
S.e materialS.e material
S.e material
 
Unit 1 se
Unit 1 seUnit 1 se
Unit 1 se
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 

Unit 7 risk

  • 1. 1 Chapter 25Chapter 25 Risk ManagementRisk Management www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 2. 2 Project RisksProject Risks What can go wrong?What can go wrong? What is the likelihood?What is the likelihood? What will the damage be?What will the damage be? What can we do about it?What can we do about it? www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 3. 3 Reactive Risk ManagementReactive Risk Management project team reacts to risks when they occurproject team reacts to risks when they occur mitigationmitigation——plan for additional resources inplan for additional resources in anticipation of fire fightinganticipation of fire fighting fix on failurefix on failure——resource are found andresource are found and applied when the risk strikesapplied when the risk strikes crisis managementcrisis management——failure does not respondfailure does not respond to applied resources and project is in dangerto applied resources and project is in danger www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 4. 4 Proactive Risk ManagementProactive Risk Management formal risk analysis is performedformal risk analysis is performed organization corrects the root causes of riskorganization corrects the root causes of risk www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 5. Risk involves two characteristics:Risk involves two characteristics: UncertaintyUncertainty LossLoss 5 www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 6. Project risks: threaten the project plan: schedule and costProject risks: threaten the project plan: schedule and cost Potential budgetary, schedule, personnel, resource, stakeholder,Potential budgetary, schedule, personnel, resource, stakeholder, and requirements problemsand requirements problems Technical risks: threaten the quality and appropriatenessTechnical risks: threaten the quality and appropriateness Potential design, implementation, interface, verification, andPotential design, implementation, interface, verification, and maintenance problems + technical uncertainty (leading edge)maintenance problems + technical uncertainty (leading edge) Business risks: threaten the practicalityBusiness risks: threaten the practicality 6 www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 7. Business risks: threaten the practicalityBusiness risks: threaten the practicality Market risk: no one really wantsMarket risk: no one really wants Strategic risk: no longer fits into the overall business strategStrategic risk: no longer fits into the overall business strategy fory for companycompany Sales risk: sales force doesnSales risk: sales force doesn’’t understand how to sellt understand how to sell Management risk: losing the support of managementManagement risk: losing the support of management Budget risk: losing budgetaryBudget risk: losing budgetary Personal risk: losing personnel commitmentPersonal risk: losing personnel commitment 7 www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 8. 8 Seven Principles of SEISeven Principles of SEI (Software Engineering Institute)(Software Engineering Institute) for effective risk managementfor effective risk management Maintain a global perspectiveMaintain a global perspective view software risks within the context of system and the businesview software risks within the context of system and the business problems problem Take a forwardTake a forward--looking viewlooking view think about the risks that may arise in the future; establish cthink about the risks that may arise in the future; establish contingency plansontingency plans Encourage open communicationEncourage open communication if someone states a potential risk, donif someone states a potential risk, don’’t discount it.t discount it. IntegrateIntegrate a consideration of risk must be integrated into the software proa consideration of risk must be integrated into the software processcess Emphasize a continuous processEmphasize a continuous process the team must be alert throughout the software process,the team must be alert throughout the software process, modifying identified risks as more information is known and addimodifying identified risks as more information is known and adding new onesng new ones as better insight is achieved.as better insight is achieved. Develop a shared product visionDevelop a shared product vision if all stakeholders share the same vision of the software, it liif all stakeholders share the same vision of the software, it likely that better riskkely that better risk identification and assessment will occur.identification and assessment will occur. Encourage teamworkEncourage teamwork the talents, skills and knowledge of all stakeholder should be pthe talents, skills and knowledge of all stakeholder should be pooledooled www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 9. 9 RISK Risk Management ParadigmRisk Management Paradigm controlcontrol identifyidentify analyzeanalyze planplan tracktrack www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 10. 10 Risk Identification: check listRisk Identification: check list Product size:Product size: the overall size of the software to be built or modified.the overall size of the software to be built or modified. Business impact :Business impact : constraints imposed by management or the marketplace.constraints imposed by management or the marketplace. Customer characteristicsCustomer characteristics the sophistication of the customer andthe sophistication of the customer and the developer's ability to communicate with the customer in a tithe developer's ability to communicate with the customer in a timely manner.mely manner. Process definitionProcess definition the degree to which the software process has been defined andthe degree to which the software process has been defined and is followed by the development organization.is followed by the development organization. Development environment:Development environment: the availability and quality of the tools to be used to build ththe availability and quality of the tools to be used to build the product.e product. Technology to be builtTechnology to be built complexity of the system to be built andcomplexity of the system to be built and the "newness" of the technology that is packaged by the system.the "newness" of the technology that is packaged by the system. Staff size and experience:Staff size and experience: the overall technical and project experience of the software engthe overall technical and project experience of the software engineers who willineers who will do the work.do the work. www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 11. 11 Assessing Project RiskAssessing Project Risk--II Have top software and customer managers formallyHave top software and customer managers formally committed to support the project?committed to support the project? Are endAre end--users enthusiastically committed to the projectusers enthusiastically committed to the project and the system/product to be built?and the system/product to be built? Are requirements fully understood by the softwareAre requirements fully understood by the software engineering team and their customers?engineering team and their customers? Have customers been involved fully in the definition ofHave customers been involved fully in the definition of requirements?requirements? Do endDo end--users have realistic expectations?users have realistic expectations? www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 12. 12 Assessing Project RiskAssessing Project Risk--IIII Is project scope stable?Is project scope stable? Does the software engineering team have the right mixDoes the software engineering team have the right mix of skills?of skills? Are project requirements stable?Are project requirements stable? Does the project team have experience with theDoes the project team have experience with the technology to be implemented?technology to be implemented? Is the number of people on the project team adequate toIs the number of people on the project team adequate to do the job?do the job? Do all customer/user constituencies agree on the importance of the project and on the requirements for the system/product to be built? www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 13. 13 Risk ComponentsRisk Components (US Air Force)(US Air Force) performance riskperformance risk——the degree of uncertainty that thethe degree of uncertainty that the product will meet its requirements and be fit for itsproduct will meet its requirements and be fit for its intended use.intended use. cost riskcost risk——the degree of uncertainty that the projectthe degree of uncertainty that the project budget will be maintained.budget will be maintained. support risksupport risk——the degree of uncertainty that the resultantthe degree of uncertainty that the resultant software will be easy to correct, adapt, and enhance.software will be easy to correct, adapt, and enhance. schedule riskschedule risk——the degree of uncertainty that the projectthe degree of uncertainty that the project schedule will be maintained and that the product will beschedule will be maintained and that the product will be delivered on time.delivered on time. www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 14. Risk category:Risk category: CatastrophicCatastrophic CriticalCritical MarginalMarginal NegligibleNegligible A table based on components and categories: Fig. 25A table based on components and categories: Fig. 25--11 14 www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 15. 15 Risk ProjectionRisk Projection Risk projectionRisk projection, also called, also called risk estimation,risk estimation, attempts to rateattempts to rate each risk in two wayseach risk in two ways the likelihood or probability that the risk is realthe likelihood or probability that the risk is real the consequences of the problems associated with the risk,the consequences of the problems associated with the risk, should it occur.should it occur. The are four risk projection steps:The are four risk projection steps: establish a scale that reflects the supposed likelihood of a risestablish a scale that reflects the supposed likelihood of a riskk define the consequences of the riskdefine the consequences of the risk estimate the impact of the risk on the project and the product,estimate the impact of the risk on the project and the product, note the overall accuracy of the risk projection so that there wnote the overall accuracy of the risk projection so that there will beill be no misunderstandings.no misunderstandings. Helps to prioritize risksHelps to prioritize risks www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 16. 16 Building a Risk TableBuilding a Risk Table RiskRisk ProbabilityProbability ImpactImpact RMMMRMMM RiskRisk MitigationMitigation MonitoringMonitoring && ManagementManagement Larger number of users than planned Staff inexperienced www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 17. 17 Building the Risk TableBuilding the Risk Table Estimate theEstimate the probabilityprobability of occurrenceof occurrence Estimate theEstimate the impactimpact on the project on a scale of 1on the project on a scale of 1 to 5, whereto 5, where 1 = low impact on project success1 = low impact on project success 5 = catastrophic impact on project success5 = catastrophic impact on project success sort the table by probability and impactsort the table by probability and impact www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 18. 18 Risk ExposureRisk Exposure The overall risk exposure, RE, is determined using the following relationship [HAL98]: RE = P x C where P is the probability of occurrence for a risk, and C is the cost to the project if the risk occur. www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 19. 19 Risk Exposure ExampleRisk Exposure Example Risk identification.Risk identification. Only 70 percent of the software components scheduledOnly 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application. Thefor reuse will, in fact, be integrated into the application. The remainingremaining functionality will have to be custom developed.functionality will have to be custom developed. Risk probability.Risk probability. 80% (likely).80% (likely). Risk impact.Risk impact. 60 reusable software components were planned. If only 7060 reusable software components were planned. If only 70 percent can be used, 18 components would have to be developed frpercent can be used, 18 components would have to be developed fromom scratch (in addition to other custom software that has been schescratch (in addition to other custom software that has been scheduled forduled for development). Since the average component is 100 LOC and local ddevelopment). Since the average component is 100 LOC and local dataata indicate that the software engineering cost for each LOC is $14.indicate that the software engineering cost for each LOC is $14.00, the00, the overall cost (impact) to develop the components would be 18 x 10overall cost (impact) to develop the components would be 18 x 100 x 14 =0 x 14 = $25,200.$25,200. Risk exposure.Risk exposure. RE = 0.80 x 25,200 ~ $20,200.RE = 0.80 x 25,200 ~ $20,200. www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 20. 20 mitigationmitigation——how can we avoid the risk?how can we avoid the risk? monitoringmonitoring——what factors can we track that willwhat factors can we track that will enable us to determine if the risk is becoming moreenable us to determine if the risk is becoming more or less likely?or less likely? managementmanagement——what contingency plans do we havewhat contingency plans do we have if the risk becomes a reality?if the risk becomes a reality? Risk Mitigation, Monitoring,Risk Mitigation, Monitoring, and Managementand Management www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 21. 21 Risk Due to Product SizeRisk Due to Product Size •• estimated size of the product in LOC or FP?estimated size of the product in LOC or FP? •• estimated size of product in number of programs,estimated size of product in number of programs, files, transactions?files, transactions? •• percentage deviation in size of product frompercentage deviation in size of product from average for previous products?average for previous products? •• size of database created or used by the product?size of database created or used by the product? •• number of users of the product?number of users of the product? •• number of projected changes to the requirementsnumber of projected changes to the requirements for the product? before delivery? after delivery?for the product? before delivery? after delivery? •• amount of reused software?amount of reused software? Attributes that affect risk:Attributes that affect risk: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 22. 22 Risk Due to Business ImpactRisk Due to Business Impact •• affect of this product on company revenue?affect of this product on company revenue? •• visibility of this product by senior management?visibility of this product by senior management? •• reasonableness of delivery deadline?reasonableness of delivery deadline? •• number of customers who will use this productnumber of customers who will use this product •• interoperability constraintsinteroperability constraints •• sophistication of end users?sophistication of end users? •• amount and quality of product documentation thatamount and quality of product documentation that must be produced and delivered to the customer?must be produced and delivered to the customer? •• governmental constraintsgovernmental constraints •• costs associated with late delivery?costs associated with late delivery? •• costs associated with a defective product?costs associated with a defective product? Attributes that affect risk:Attributes that affect risk: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 23. 23 Risks Due to the CustomerRisks Due to the Customer •• Have you worked with the customer in the past?Have you worked with the customer in the past? •• Does the customer have a solid idea of requirements?Does the customer have a solid idea of requirements? •• Has the customer agreed to spend time with you?Has the customer agreed to spend time with you? •• Is the customer willing to participate in reviews?Is the customer willing to participate in reviews? •• Is the customer technically sophisticated?Is the customer technically sophisticated? •• Is the customer willing to let your people do theirIs the customer willing to let your people do their jobjob——that is, will the customer resist looking over yourthat is, will the customer resist looking over your shoulder during technically detailed work?shoulder during technically detailed work? •• Does the customer understand the softwareDoes the customer understand the software engineering process?engineering process? Questions that must be answered:Questions that must be answered: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 24. 24 Risks Due to Process MaturityRisks Due to Process Maturity •• Have you established a common process framework?Have you established a common process framework? •• Is it followed by project teams?Is it followed by project teams? •• Do you have management support forDo you have management support for software engineeringsoftware engineering •• Do you have a proactive approach to SQA?Do you have a proactive approach to SQA? •• Do you conduct formal technical reviews?Do you conduct formal technical reviews? •• Are CASE tools used for analysis, design andAre CASE tools used for analysis, design and testing?testing? •• Are the tools integrated with one another?Are the tools integrated with one another? •• Have document formats been established?Have document formats been established? Questions that must be answered:Questions that must be answered: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 25. 25 Technology RisksTechnology Risks •• Is the technology new to your organization?Is the technology new to your organization? •• Are new algorithms, I/O technology required?Are new algorithms, I/O technology required? •• Is new or unproven hardware involved?Is new or unproven hardware involved? •• Does the application interface with new software?Does the application interface with new software? •• Is a specialized user interface required?Is a specialized user interface required? •• Is the application radically different?Is the application radically different? •• Are you using new software engineering methods?Are you using new software engineering methods? •• Are you using unconventional software developmentAre you using unconventional software development methods, such as formal methods, AImethods, such as formal methods, AI--based approaches,based approaches, artificial neural networks?artificial neural networks? •• Are there significant performance constraints?Are there significant performance constraints? •• Is there doubt the functionality requested is "doIs there doubt the functionality requested is "do--able?"able?" Questions that must be answered:Questions that must be answered: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 26. 26 Staff/People RisksStaff/People Risks •• Are the best people available?Are the best people available? •• Does staff have the right skills?Does staff have the right skills? •• Are enough people available?Are enough people available? •• Are staff committed for entire duration?Are staff committed for entire duration? •• Will some people work part time?Will some people work part time? •• Do staff have the right expectations?Do staff have the right expectations? •• Have staff received necessary training?Have staff received necessary training? •• Will turnover among staff be low?Will turnover among staff be low? Questions that must be answered:Questions that must be answered: www.jntuworld.com www.jntuworld.com www.jwjobs.net
  • 27. 27 Project:Project: Embedded software for XYZ systemEmbedded software for XYZ system Risk type:Risk type: schedule riskschedule risk PriorityPriority (1 low ... 5 critical):(1 low ... 5 critical): 44 Risk factorRisk factor:: Project completion will depend on tests which requireProject completion will depend on tests which require hardware component under development. Hardware componenthardware component under development. Hardware component delivery may be delayeddelivery may be delayed Probability:Probability: 60 %60 % ImpactImpact:: Project completion will be delayed for each day thatProject completion will be delayed for each day that hardware is unavailable for use in software testinghardware is unavailable for use in software testing Monitoring approachMonitoring approach:: Scheduled milestone reviews with hardware groupScheduled milestone reviews with hardware group Contingency (Emergency) plan:Contingency (Emergency) plan: Modification of testing strategy to accommodate delay usingModification of testing strategy to accommodate delay using software simulationsoftware simulation Estimated resourcesEstimated resources:: 6 additional person months beginning 76 additional person months beginning 7--11--9696 Recording Risk InformationRecording Risk Information www.jntuworld.com www.jntuworld.com www.jwjobs.net