Software Project Management
Software Project Management
Software Project Management approaches – Project Acquisition – Initiation – Planning – PERTExecution and
Control – CPM – Change Management – Project Closure – Agile SPM Problems in Software Estimation –
Algorithmic Cost Estimation Process, Function Points, COCOMO II (Constructive Cost Model) – Estimating
Web Application Development – Concepts of Finance, Activity Based Costing and Economic Value Added
(EVA) – Balanced Score Card.
1. Waterfall methodology
The Waterfall method is a traditional approach to project management. In it, tasks and phases are completed in a
linear, sequential manner, and each stage of the project must be completed before the next begins.
The stages of Waterfall project management generally follow this sequence:
Requirements
Analysis
Design
Construction
Testing
Deployment & maintenance
Progress flows in one direction, like a real waterfall.
Also like a real waterfall, though, this can quickly get dangerous. Since everything is mapped out at the
beginning, there’s a lot of room for error if expectations don’t match up with reality. And there’s no going back
to a previous stage once it’s completed (just imagine trying to swim against a waterfall — not fun).
Try this project management methodology if:
The end goal of your project is clearly defined — and isn’t going to change.
The stakeholders know exactly what they want (and it isn’t going to change).
Your project is consistent and predictable (i.e. isn’t going to change).
You’re working in a regulated industry that needs extensive project tracking or documentation.
You might need to bring new people into the project midway through and get them up to speed quickly.
This project management methodology might not be for you if:
Your project is liable to change.
You don’t have a full picture of all the requirements before you start.
You need to do continuous testing or adapt to feedback during the process.
2. Agile methodology
The agile project management methodology came from a growing dissatisfaction with the linear approach of
traditional project management methodologies.
Frustrated with the limitations of project management methods that couldn’t adapt with a project as it
progressed, the focus began to shift to more iterative models that allowed teams to revise their project as needed
during the process instead of having to wait until the end to review and amend.
The concept of agile project management has gone on to spark several specific sub-frameworks and
methodologies, such as scrum, kanban, and lean. But what do they all have in common? The key principles of
agile project management methodologies are:
It’s collaborative.
It’s quick.
It’s open to data-driven change.
As such, agile project management methodologies usually involve short phases of work with frequent testing,
reassessment, and adaptation throughout.
In many agile methods, all of the work to be done is added to a backlog that teams can work through in each
phase or cycle, with project managers or product owners prioritizing the backlog so teams know what to focus
on first.
Try this project management methodology if:
Your project is liable to change.
You’re not sure at the outset what the solution will look like.
You need to work quickly, and it’s more important that you see speedy progress than perfect results.
Your stakeholders or client needs (or wants) to be involved at every stage.
This project management methodology isn’t for you if:
You need a lot of documentation (for example, if you’ll be bringing new people on-board during the
project).
You need a predictable deliverable, and you need to be crystal clear about what that looks like from the
outset.
Your project can’t afford to change during its course.
You don’t have self-motivated people.
You have strict deadlines or deliverables that you need to stay on top of.
3. Scrum methodology
Scrum is a form of agile project management. You can think of it more like a framework than as a project
management methodology in itself.
With Scrum, work is split into short cycles known as “sprints”, which usually last about 1-2 weeks. Work is
taken from the backlog (see: Agile project management, above) for each sprint iteration,
Small teams are led by a Scrum Master (who is not the same as the project manager) for the duration of the
sprint, after which they review their performance in a “sprint retrospective” and make any necessary changes
before starting the next sprint.
Try this project management methodology if:
You’re striving for continuous improvement.
This project management methodology might not be for you if:
You don’t have the full commitment from the team needed to make it work.
4. Kanban methodology
Kanban is another method within agile project management.
Originating from the manufacturing industry, the term “kanban” has evolved to denote a framework in which
tasks are visually represented as they progress through columns on a kanban board. Work is pulled from the
predefined backlog on a continuous basis as the team has capacity and moved through the columns on the
board, with each column representing a stage of the process.
Kanban is great for giving everyone an immediate visual overview of where each piece of work stands at any
given time. (You can use kanban boards for everything from your content marketing process to hiring and
recruitment.)
It also helps you to see where bottlenecks are at risk of forming — if you notice one of your columns getting
clogged, for example, you’ll know that that’s a stage of your process that needs to be examined.
When used as part of an agile project management methodology, it’s also common to implement work in
progress (WIP) limits. Work in progress limits restrict the amount of tasks in play at any given time, meaning
that you can only have a certain number of tasks in each column (or on the board overall).
This prevents your team from spreading their energy across too many tasks, and instead ensures that they can
work more productively by focusing on each task individually.
Try this project management methodology if:
You’re looking for a visual representation of your project’s progress.
You want at-a-glance status updates.
You want to encourage using WIP limits so your team can stay focused.
You prefer to work on a continuous “pull” basis.
This project management methodology might not be for you if:
Your process is super complex or has tons of stages.
You want a push system instead of a pull system.
5. Scrumban methodology
It’s the answer to the age-old question: what if scrum and kanban had a baby?
Scrumban is a hybrid agile project management methodology that has scrum’s nose and kanban’s eyes.
The main benefit of scrumban as a method is that instead of deciding which task from the backlog to work on in
each sprint at the outset (like you would in a “traditional” scrum framework), scrumban allows teams to
continuously “pull” from the backlog based on their capacity (like they would in a kanban framework).
And using work in progress limits (from kanban) during your sprint cycle (from scrum), you can keep a
continuous flow while still incorporating project planning, reviews and retrospectives as needed.
Try this project management methodology if:
You’ve ever looked at scrum and kanban and thought “I wish those two crazy kids would get together”.
This project management methodology might not be for you if:
You’ve ever looked wistfully out the window and thought, “Oh, scrum is scrum, and kanban is kanban,
and never the twain shall meet”.
8. Lean methodology
Resources are very important to deliver projects and they include types of machinery, people, technology,
property and other materials that are necessary to deliver work—which can also imply the cost of resources but
not automatically in financial terms. The resources may be acquired from both internal and external sources.
The project management term, Acquisition, is part of resource management and together with deployment, it is
necessary to deliver the final outcome of the project. It is crucial for the owner of the project to identify the
different resources that are needed to deliver work as well as the scheduling of the acquisition of the resources.
Acquisition is all about setting up a project management infrastructure that can mobilize the resources.
This infrastructure is also necessary to create policies for the acquisition as well as the deployment of
resources so that the projects will proceed as planned.
What is PERT in Project Management?
Program Evaluation Review Technique (PERT) is a project management planning tool used to calculate the
amount of time it will take to realistically finish a project. PERT charts are used to plan tasks within a project —
making it easier to schedule and coordinate team members.
PERT charts were created in the 1950s to manage the creation of weapons and defense projects for the US
Navy. While PERT was being introduced in the Navy, the private sector simultaneously gave rise to a similar
method called critical path. PERT is similar to critical path in that they are both used to visualize the timeline
and the work that must be done for a project. However with PERT, you create three different time estimates for
the project:
Change management is defined as the methods and manners in which a company describes and implements
change within both its internal and external processes. This includes preparing and supporting employees,
establishing the necessary steps for change, and monitoring pre- and post-change activities to ensure successful
implementation.
Significant organizational change can be challenging. It often requires many levels of cooperation and may
involve different independent entities within an organization. Developing a structured approach to change is
critical to help ensure a beneficial transition while mitigating disruption.
Changes usually fail for human reasons: the promoters of the change did not attend to the healthy, real and
predictable reactions of normal people to disturbance of their routines. Effective communication is one of the
most important success factors for effective change management. All involved individuals must understand the
progress through the various stages and see results as the change cascades.
HOW TO IMPLEMENT CHANGE MANAGEMENT
Resistance to change can be defined as any obstacle that becomes an impediment to implementing change. The
source of resistance is often individuals or groups, but it can also be systems or processes that are outdated or
that fail to fit current business conditions.
Figure 1 depicts the elements of a change management model and the sequence in which they occur.
In the center of the change management model figure, all changes move from the current state, through a
transition phase, and into the desired improvement state.
In the beginning, it is important to create, or affirm, a broadly understood need for the change (creating a
shared need).
It is equally important to create and share an idea of what the outcome will look like (shaping a vision).
Throughout the change effort, there must always be sufficient resources dedicated to it (mobilizing
commitment).
There must be a way to track the change efforts (monitoring progress).
A person or team must ensure that the change reaches completion (finishing the job).
From the very beginning until the end, the change effort must have the backing of management, and
leadership from an accountable person or people (leading change)
Figure 2 Elements of the change management model
Project Closing Phase
Overview
Concludes all project activities
Administratively closes the project
Turns the delivered product or service over to customer or a support group
Assesses project outcomes and team performance
Documents best practices and lessons learned
Celebrates project success
Description
The purpose of the closing phase in the project management lifecycle is to confirm completion of project
deliverables to the satisfaction of the project sponsor, and to communicate final project disposition and status to
all participants and stakeholders.
The PMO Director can provide Project Managers various levels of service in the Closing Phase including:
Consult with appropriate teams to transition the project to operations
Facilitate Project Closure/Lessons Learned Meetings
Consult on completing the Project Closure Report
Brainstorm team celebration ideas
Critical Success Factors
Pre-defined user acceptance criteria
Business objectives and anticipated benefits are achieved
Project objectives are achieved
Knowledge transfer is achieved
Project materials are archived
Closing Processes Activities
Obtain acceptance of the project deliverables.
Hand off operations and support responsibilities.
Document the lessons learned over the course of the project.
Formalize closure. Obtain sign-off from project sponsor and project manager.
Duties of the Project Manager in the Closing Phase
For a completed project, the Project Manager is responsible to:
Schedule and conduct a Project Closure/Lessons Learned Meeting
Complete the Project Closure Report with input from the project team. The report will confirm in
writing from the project sponsor and/or customers that the project is complete
Complete the Project Closeout Checklist
Complete a Service Transition Report (if applicable)
Conduct the Project Satisfaction Survey (Appendix F) and review results.
Close and deactivate the project in ServiceNow (Required)
Arrange for an appropriate celebration of the work completed. Remember to have fun! (Optional ,
but recommended)
1. Stage-I:
It supports estimation of prototyping. For this it uses Application Composition Estimation Model.
This model is used for the prototyping stage of application generator and system integration.
2. Stage-II:
It supports estimation in the early design stage of the project, when we less know about it. For this it
uses Early Design Estimation Model. This model is used in early design stage of application
generators, infrastructure, system integration.
3. Stage-III:
It supports estimation in the post architecture stage of a project. For this it uses Post Architecture
Estimation Model. This model is used after the completion of the detailed architecture of application
generator, infrastructure, system integration.
How to Estimate Web App Development Project | Web App Development Cost Calculator
Share
Reading time about 12 minutes
The importance of web applications cannot be denied even when we are staying in a mobile dominant world. Web
applications have a significant impact on the user’s mind and act as an integral part of a business’s presence
online. It turns out to be an online brochure or marketing forefront of any company.
Hundreds of web applications are launched every month. Surprisingly, the enigma no longer exists whether you
need a web application for your business or not. But the question is that the cost to build a web application fits
your company’s budget and meets business requirements.
Many businesses hire web & app development companies to create intuitive web apps that help them to reach
their goals faster. The cost of developing web apps depends on various factors that we’ll discuss in this blog.
Which Factors are affecting the Development Cost to Create a Web App?
How Much Does It Cost To Build a Web Application? It is the most common question that comes to your mind
before building a web app for your business. Many factors impact the development cost of the app. Hiring a cheap
development team can hamper not just the quality of the app but also lead to poor customer experiences.
To help in planning your budget better with a brief idea of estimated cost, we have listed some of the hand-picked
factors that hugely affect the web application development cost.
1. Functionality
Another factor that may raise the cost of the web app is the number of functionalities and the complexity of each
feature. Some features can be developed quickly without effort, while others may take time to build.
One of the simplest websites is the one that is developed without any support of integrations or payments and is
usually managed by a single person for any content update/change. A basic informational website takes lesser
time to build & needs a lower budget.
2. Complexity of App
One aspect that can impact the web development estimation is the complexity of the web app. The more complex
your app is, the more expensive it will take to develop it. We should be aware that the total cost is calculated as
per the number of working hours spent and the hourly rates of each web developer involved in the process. Web
apps with more complex features will take more working hours to build. Additionally, the number of custom
features you want in your app also defines its complexity.
Evaluating Costs by Project Complexity
Basic Web Apps
The simplest version of a web application with basic functionality is called basic web apps. It generally includes
simple landing webpages or informational websites.
Development Time – Around 3 to 4 weeks
Approximate Development Cost $5000 to $17,000
Built with predefined template layouts
Small online catalogs
Calculator pages
Widgets or additional features to the existing web apps
Custom Web Apps
Professionally designed with interactive UI/UX are custom web apps. It is one of the most suitable options for
mid-scale business or e-commerce sites with moderate complexity.
Development Time – Around 12 weeks
Approximate Development Cost $17,000 – $55,000
E-commerce stores
Marketplace-based web apps
Modules or additional parts for existing web apps
Complex Web Apps
Complex web apps have a high complexity level with exclusive CMS features. It includes various features like
payment gateways, social media integration, checkout carts, and much more.
Development Time – Around 24 weeks
Approximate Development Cost $55,000 – $2,50,000
Automated billing systems
Payment processing apps
Enterprise-grade Web Apps
Development Time – Around 24 weeks
Approximate Development Cost around $2,50,000 or More
The companies that need large software system platform designed to operate effortlessly in a corporate
environment use enterprise-level web apps. It includes various functionalities like automated billing systems,
ERP, e-mail marketing systems, CMS, business intelligence, and much more. It can cost around $2,50,000 and
more, depending on the list of features that needs to be integrated into the platform.
3. Custom Designs
A web app with standard design is what we suggest if you are a startup or a budget-company, as it comes with
several pre-built themes & templates. The more custom designs you want in your app, the more additional charges
you need to spend on the development cost. Go for an advanced web app with a fully customized user interface
design when you have good money to spend. A number of screens are also a factor that can impact the website
development cost.
4. Location of Developers
Development costs may indeed differ location wise. One of the most significant factors that can impact the
development cost is the physical location of the development company. It is because the wages of web app
developers may vary from one country to another. Developers in software companies based in advanced
countries with a higher cost of living usually have higher earnings.
5. Strict Deadlines
Maintaining the quality of the project and handling strict deadlines can be difficult. Also, it will cost you more
since you need a higher number of resources working dedicatedly for the fast development process. It is always
advisable to plan the project because a tight schedule task involves higher risks that may increase the
developmental cost.
6. Hourly Rates
In today’s global IT market, there is an enormous number of web application designers that work as per diverse
business models, and the value ranges are related to each type. The hourly developmental rates will be distributed
to different types of professionals involved in the whole development cycle i.e. manager, developer, and QA team.
Talking about high-profile clients with budgets starting at six figures will prefer to work with enterprise-level
developers while startups would go for mid-level developers.
7. Maintenance Charges
We know that the cost involved in making a successful web app doesn’t end with its development cost, as post-
release expenses will be there to fix the bugs and maintain the infrastructure. Even if you are working with the
top developers in the town, bugs can pop up after the launch of the website.
We advise you to have a clear discussion with the development team to make sure that the cost involves the
maintenance and bug fixing charges. Save a part of your budget and be ready to fix the issues that may arise after
the development phase and keep the app updated to engage customers with evolving trends.
Activity-based costing (ABC) is a method of assigning overhead and indirect costs—such as salaries
and utilities—to products and services.
The ABC system of cost accounting is based on activities, which are considered any event, unit of
work, or task with a specific goal.
An activity is a cost driver, such as purchase orders or machine setups.
The cost driver rate, which is the cost pool total divided by cost driver, is used to calculate the amount
of overhead and indirect costs related to a particular activity.
ABC is used to get a better grasp on costs, allowing companies to form a more appropriate pricing strategy.
This costing system is used in target costing, product costing, product line profitability analysis, customer
profitability analysis, and service pricing. Activity-based costing is used to get a better grasp on costs,
allowing companies to form a more appropriate pricing strategy.
The formula for activity-based costing is the cost pool total divided by cost driver, which yields the cost driver
rate. The cost driver rate is used in activity-based costing to calculate the amount of overhead and indirect
costs related to a particular activity.
The ABC calculation is as follows:
Economic value added (EVA), also known as economic profit, aims to calculate the true economic
profit of a company.
EVA is used to measure the value a company generates from funds invested in it.
However, EVA relies heavily on invested capital and is best used for asset-rich companies, where
companies with intangible assets, such as technology businesses, may not be good candidates.
1. Learning and growth are analyzed through the investigation of training and knowledge resources.
This first leg handles how well information is captured and how effectively employees use that
information to convert it to a competitive advantage within the industry.
2. Business processes are evaluated by investigating how well products are manufactured. Operational
management is analyzed to track any gaps, delays, bottlenecks, shortages, or waste.
3. Customer perspectives are collected to gauge customer satisfaction with the quality, price, and
availability of products or services. Customers provide feedback about their satisfaction with current
products.
4. Financial data, such as sales, expenditures, and income are used to understand financial performance.
These financial metrics may include dollar amounts, financial ratios, budget variances, or income
targets.
V Model
The V-model represents a development process that may be considered an extension of the waterfall model
and is an example of the more general V-model. Instead of moving down in a linear way, the process steps
are bent upwards after the coding phase, to form the typical V shape. The V-Model demonstrates the
relationships between each phase of the development life cycle and its associated phase of testing. The
horizontal and vertical axes represent time or project completeness (left-to-right) and level of abstraction
(coarsest-grain abstraction uppermost), respectively.
Incremental model
The incremental build model is a method of software development where the model is designed, implemented
and tested incrementally (a little more is added each time) until the product is finished. It involves both
development and maintenance. The product is defined as finished when it satisfies all of its requirements.
Each iteration passes through the requirements, design, coding and testing phases. And each subsequent
release of the system adds function to the previous release until all designed functionally has been
implemented. This model combines the elements of the waterfall model with the iterative philosophy of
prototyping.
Iterative Model
An iterative life cycle model does not attempt to start with a full specification of requirements by first
focusing on an initial, simplified set user features, which then progressively gains more complexity and a
broader set of features until the targeted system is complete. When adopting the iterative approach, the
philosophy of incremental development will also often be used liberally and interchangeably.
In other words, the iterative approach begins by specifying and implementing just part of the software, which
can then be reviewed and prioritized in order to identify further requirements. This iterative process is then
repeated by delivering a new version of the software for each iteration. In a light-weight iterative project the
code may represent the major source of documentation of the system; however, in a critical iterative project a
formal software specification may also be required.
RAD model
Rapid application development was a response to plan-driven waterfall processes, developed in the 1970s and
1980s, such as the Structured Systems Analysis and Design Method (SSADM). Rapid application
development (RAD) is often referred as the adaptive software development. RAD is an incremental
prototyping approach to software development that end users can produce better feedback when examining a
live system, as opposed to working strictly with documentation. It puts less emphasis on planning and more
emphasis on an adaptive process.
RAD may resulted in a lower level of rejection when the application is placed into production, but this
success most often comes at the expense of a dramatic overruns in project costs and schedule. RAD approach
is especially well suited for developing software that is driven by user interface requirements. Thus, some
GUI builders are often called rapid application development tools.
Spiral model
The spiral model, first described by Barry Boehm in 1986, is a risk-driven software development process
model which was introduced for dealing with the shortcomings in the traditional waterfall model. A spiral
model looks like a spiral with many loops. The exact number of loops of the spiral is unknown and can vary
from project to project. This model supports risk handling, and the project is delivered in loops. Each loop of
the spiral is called a Phase of the software development process.
The initial phase of the spiral model in the early stages of Waterfall Life Cycle that is needed to develop a
software product. The exact number of phases needed to develop the product can be varied by the project
manager depending upon the project risks. As the project manager dynamically determines the number of
phases, so the project manager has an important role to develop a product using a spiral model.
Agile model
Agile is an umbrella term for a set of methods and practices based on the values and principles expressed in
the Agile Manifesto that is a way of thinking that enables teams and businesses to innovate, quickly respond
to changing demand, while mitigating risk. Organizations can be agile using many of the available
frameworks available such as Scrum, Kanban, Lean, Extreme Programming (XP) and etc.
The Agile movement proposes alternatives to traditional project management. Agile approaches are typically
used in software development to help businesses respond to unpredictability which refer to a group of
software development methodologies based on iterative development, where requirements and solutions
evolve through collaboration between self-organizing cross-functional teams.
The primary goal of being Agile is empowered the development team the ability to create and respond to
change in order to succeed in an uncertain and turbulent environment. Agile software development approach
is typically operated in rapid and small cycles. This results in more frequent incremental releases with each
release building on previous functionality. Thorough testing is done to ensure that software quality is
maintained.
Adaptive Software Development (ASD)
Adaptive Software Development is a method to build complex software and system. ASD focuses on human
collaboration and self-organization. ASD “life cycle” incorporates three phases namely:
1. Speculation
2. Collaboration
3. Learning
These are explained as following below.
History
FDD was first applied in the year 1997 on a real-world application by Jeff De Luca for large software
development with specific needs of 15-month and 50 persons and published as a discussion in book Java
Modeling in Color with UML in the year 1999.
FDD Lifecycle
Build overall model
Build feature list
Plan by feature
Design by feature
Build by feature
Characteristics of FDD
Short iterative: FDD lifecycle works in simple and short iterations to efficiently finish the work on
time and gives good pace for large projects.
Customer focused: This agile practice is totally based on inspection of each feature by client and
then pushed to main build code.
Structured and feature focused: Initial activities in lifecycle builds the domain model and features
list in the beginning of timeline and more than 70% of efforts are given to last 2 activities.
Frequent releases: Feature-driven development provides continuous releases of features in the
software and retaining continuous success of the project.
Advantages of FDD
Reporting at all levels leads to easier progress tracking.
FDD provides continuous success for larger size of teams and projects.
Reduction in risks is observed as whole model and design is build in smaller segments.
FDD provides greater accuracy in cost estimation of the project due to feature segmentation.
Disadvantages of FDD
This agile practice is not good for smaller projects.
There is high dependency on lead programmers, designers and mentors.
There is lack of documentation which can create an issue afterwards.
SPICE (Software Process Improvement and Capability Determination) in software engineering
SPICE (Software Process Improvement and Capability Determination) is an international framework for
assessment of software processes developed jointly by the ISO (International Organization for Standardization)
and the IEC (International Electrotechnical Commission). SPICE is laid out in ISO/IEC 15504. It’s a group of
technical standards documents for the pc software development process and related business management
functions.
The process is assessed to guage methods, tools, and practices, which are wont to develop and test the software.
The aim of process assessment is to spot the areas for improvement and suggest an idea for creating that
improvement. The main focus areas of process assessment are listed below
• Obtaining guidance for enhancing software development and test processes
• Obtaining an independent and impartial review of the process
• Obtaining a baseline (defined as a group of software components and documents that are formerly reviewed
and accepted; that is the idea for further development) for improving quality and productivity of processes.
The functions of SPICE (ISO/IEC 15504) are listed below
• To develop process-rating profiles rather than pass or fail criteria
• To consider the environment during which the assessed process operates
• To facilitate self assessment
To ensure suitability for all applications and all sizes of organizations.
What is Six Sigma?
Six Sigma is a process that makes use of statistics and data analysis to analyze and reduce errors or defects. In
this process, the purpose is to improve cycle times while reducing manufacturing defects to no more than 3.4
defects per million units or events.
SIS SIGMA is a set of management tools and techniques designed to improve the capability of the business
process by reducing the likelihood of error. Six sigma is a data-driven approach that uses a statistical
methodology for eliminating defects, defect reduction and profits improvement.
The 5 Key Principles of Six Sigma
The concept of Six Sigma has a simple goal – delivering near-perfect goods and services for business
transformation for optimal customer satisfaction (CX).
Goals are achieved through a two-pronged approach:
The Six Sigma Process of the DMAIC method has five phases:
Six Sigma Techniques
The Six Sigma methodology also uses a mix of statistical and data analysis tools such as process mapping and
design and proven qualitative and quantitative techniques, to achieve the desired outcome.
1. It provides a set of software development management tools that support the entire program life cycle.
2. Offers value-added planning.
3. It simplifies strategic decision making.
4. Supports "what-if" analysis.
5. It allows report and graph generation.
6. To consider the development constraints on both the cost and effort linear programming is used.
7. It has a few parameters which are required to generate an estimate over the COCOMO'81 and
COCOMO'II.
Disadvantages:
1. Concept and design: The ideation phase, where a product’s requirements are
defined based on factors including competitor analysis, gaps in the market, or
customer needs.
2. Develop: The detailed design of the product will be created, along with any
necessary tool designs. This phase includes validation and analysis of the
planned product, as well as prototype development and piloting in the field.
This generates vital feedback on how the product is used and what further
refinements are needed.
3. Production and launch: Feedback from the pilot is used to adjust the design
and other components to produce a market-ready version. The production of
the new product is scaled – followed by launch and distribution to the market.
4. Service and support: Following the launch of the new product, the period of
time when service and support is offered.
5. Retirement: At the end of the product’s lifecycle, its withdrawal from the
market must be managed – along with any retrials or absorption into new
concept ideas.
What is PDM?
Product data management (PDM) is a system for managing design data and engineering processes in one central
location. Engineering teams use PDM software to organise product-related information, track revisions,
collaborate, manage change orders, generate Bills of Materials (BOMs) and more. With a single source for
project data, engineers save time and avoid mistakes.
Benefits of PDM
According to a Tech-Clarity report, world-class manufacturers are 30 per cent more likely to use PDM or
product lifecycle management (PLM) to manage their design data.
Improved design workflows
Experience direct CAD integration, fast data searching, easy file replacement and reuse, and safe
simultaneous access to data. With PDM, your design workflow has never been smoother.
Enhanced collaboration
Share 2D or 3D views of your work with others (even those outside your company's firewall) and get
comments and feedback directly inside your product.
Streamlined processes
Get automated engineering change order, revision control, BOM management and more. Keep your
engineering processes under control with PDM software.
Shared knowledge
You don't have to reinvent the wheel. Instead, leverage existing design data. Easily access and configure
files you want to replace, reuse or copy to use in new designs.
Drive Engineering Efficiencies
Increase Global Collaboration
Improve Data Quality
Greater Document Control
Better IP Protection
Decrease Time Searching for Data
Maintain legacy information and manage new product data, providing full digital traceability. Ensure everyone
is using the right version for development, analysis, manufacturing, and procurement.
Control CAD data: Easy HTML UI and CAD tool integrations including Creo, Creo Elements/Direct
Modeling/Drafting, CATIA V5, NX, SolidWorks, Inventor, AutoCAD
Secure collaboration: Fast and secure role-based access to product data by disbursed teams and value
chain partners
Role-based apps: Self-service, out-of-the-box role and task-based apps that provide contextualized
information for non-CAD users
Release and change process: Simple workflow capabilities to route documents for approval and/or
review
ECAD data management: Synchronize ECAD libraries with PLM Parts and MCAD models (Zuken,
Cadence, Altium and more). Provide easy and accurate enterprise access to complex electronic design
data.
Generate viewables: Publishing of CAD to lightweight viewables for review and consumption outside
of engineering
Multi-CAD editing: Edit product data within major CAD systems using check-in check-out,
downloads, family tables, virtual components, and save-as
Lifecycle management: Control CAD data status from WIP (work-in-progress) to release
Microsoft Office integration: Initiate promotion, version comparison, and link to detailed information
in GUI and web browsers
Create new documents: Drag and drop using Windows File Explorer or browse the PDM system as a
folder structure
1. Upchain
2. Autodesk Vault
3. Solidworks PDM
4. Siemens Teamcenter
5. OpenBOM
What is change management?
Change management is a systematic approach to dealing with the transition or transformation of an
organization's goals, processes or technologies. The purpose of change management is to implement strategies
for effecting change, controlling change and helping people to adapt to change.
How does change management work?
To understand how change management works, it helps to apply its concepts and tools to specific areas of
business. Below are examples of how change management works for project management, software
development and IT infrastructure.
Change management for project management
Change management plays an important role in project management because each change request must be
evaluated for its impact on the project. Project managers, or the senior executives in charge of change control,
must examine how a change in one area of the project could affect other areas and what impact that change
could have on the project as a whole. Project areas that change control experts should pay particular attention to
include the following:
Scope. Change requests must be evaluated to determine how they will affect the project scope.
Schedule. Change requests must be assessed to determine how they will alter the project schedule.
Costs. Change requests must be evaluated to determine how they will affect project costs. Labor is
typically the largest expense on a project, so overages on completing project tasks can quickly drive
changes to the project costs.
Quality. Change requests must be evaluated to determine how they will affect the quality of the
completed project. An acceleration of the project schedule, in particular, can affect quality as defects
can occur if work is rushed.
Human resources. Change requests must be evaluated to determine if additional or specialized
labor is required. When the project schedule changes, the project manager may lose key resources to
other assignments.
Communications. Approved change requests must be communicated to the appropriate
stakeholders at the appropriate time.
Risk. Change requests must be evaluated to determine what risks they pose. Even minor changes
can have a domino effect on the project and introduce logistical, financial or security risks.
Procurement. Changes to the project may affect procurement of materials and contract labor.
Change management for software development
In software development project management, change management strategies and tools help developers manage
changes to code and its associated documentation and enable chief information officers (CIOs) to keep projects
on track. Agile software development environments encourage changes that are made to satisfy requirements
and/or adjust the user interface. Change is not addressed in the middle of an iteration, however; changes are
scheduled as stories or features for future iterations.
Version control software tools assist with documentation and prevent more than one person from making
changes to code at the same time. Such tools have capabilities to track changes and back out changes when
necessary.
Change management for IT infrastructure
Change management tools are also used to track changes made to an IT department's hardware infrastructure.
As with other types of change management, standardized methods and procedures ensure every change made to
the infrastructure is assessed, approved, documented, implemented and reviewed in a systematic manner.
Changes made to hardware settings are also referred to as configuration management (CM). Technicians use
CM tools to review the entire collection of related systems and verify the effects that a change in one system has
on other systems.
Types of organizational change
Change management can be used to manage many types of organizational change. The three most common
types are the following:
1. Developmental change. Any organizational change that improves on previously established
processes and procedures.
2. Transitional change. Change that moves an organization away from its current state to a new state
to solve a problem, such as implementing a merger and acquisition or automating a task or process.
3. Transformational change. Change that radically and fundamentally alters the culture and operation
of an organization. In transformational change, the end result might not be known. For example, a
company may pursue entirely different products or markets.
Popular models for managing change
Best practice models can provide guiding principles and help managers align the scope of proposed changes
with available digital and nondigital tools. Popular models include the following:
ADKAR. The ADKAR model, created by Prosci founder Jeff Hiatt, consists of five sequential steps:
1. Awareness of the need for change;
2. Desire to participate and support the change;
3. Knowledge on how to change;
4. Ability to implement desired skills and behaviors; and
5. Reinforcement to sustain the change.
Bridges' Transition Model. Change consultant William Bridges' model focuses on how people
adjust to change. The model features three stages: a stage for letting go, a stage of uncertainty and
confusion and a stage for acceptance. Bridges' model is sometimes compared to the Kübler-Ross
five stages of grief -- denial, anger, bargaining, depression, and acceptance.
IT Infrastructure Library (ITIL). The ITIL framework offers detailed guidance for managing
change in IT operations and infrastructure. It is owned by Axelos, a joint venture between Capita
and the U.K. Cabinet Office.
Kotter's 8-Step Process for Leading Change. Harvard University professor John Kotter's model
has eight steps:
1. Create a sense of urgency.
2. Build a guiding coalition.
3. Form a strategic vision and initiatives.
4. Enlist a volunteer army.
5. Enable action by removing barriers.
6. Generate short-term wins.
7. Sustain acceleration.
8. Institute change.
Lewin's Change Management Model. Psychologist Kurt Lewin created a three-step framework
that is also referred to as the Unfreeze-Change-Refreeze
McKinsey 7-S. Business consultants Robert H. Waterman Jr. and Tom Peters designed a model to
look holistically at seven factors that affect change:
1. shared values
2. strategy
3. structure
4. systems
5. style
6. staff
7. skills
In addition, here are some ways that change management can help add structure to IT and operations:
improved documentation of enterprise systems;
greater alignment between suggested change and what gets implemented;
better starting point for automation initiatives;
understanding of why systems were made;
ability to reverse-engineer changes made to existing business processes and infrastructure; and
better ability to identify what can be safely eliminated or updated.
What are the challenges of change management?
Companies developing a change management program from the ground up often face daunting challenges. In
addition to a thorough understanding of company culture, the change management process requires an accurate
accounting of the systems, applications and employees to be affected by a change. Additional change
management challenges include the following:
Resource management. Managing the physical, financial, human, informational, and intangible
assets and resources that contribute to an organization's strategic plan becomes increasingly difficult
when implementing change.
Resistance. The executives and employees who are most affected by a change may resist it. Since
change may result in unwanted extra work, ongoing resistance is common. Transparency, training,
planning and patience can help quell resistance and improve overall morale.
Communication. Companies often fail to consistently communicate change initiatives or include
employees in the process. Change-related communication requires an adequate number of messages,
the involvement of enough stakeholders to get the message out and multiple communication
channels.
New technology. The application of new technologies can disrupt an employee's entire workflow.
Companies can improve adoption of new technology by creating a network of early learners who
champion the new technology to colleagues.
Multiple points of view. In any change initiative, success factors differ for people based on their
roles in the organization and incentives. Managing these various priorities is challenging.
Scheduling issues. Deciding whether a change program will be long or short term and clearly
defining milestone deadlines are complicated. Some organizations believe that shorter change
programs are most effective. Others believe a more gradual approach to change reduces resistance
and errors.
Risk Management
A software project can be concerned with a large variety of risks. In order to be adept to systematically identify
the significant risks which might affect a software project, it is essential to classify risks into different classes.
The project manager can then check which risks from each class are relevant to the project.
There are three main classifications of risks which can affect a software project:
1. Project risks
2. Technical risks
3. Business risks
1. Project risks: Project risks concern differ forms of budgetary, schedule, personnel, resource, and customer-
related problems. A vital project risk is schedule slippage. Since the software is intangible, it is very tough to
monitor and control a software project. It is very tough to control something which cannot be identified. For any
manufacturing program, such as the manufacturing of cars, the plan executive can recognize the product taking
shape.
2. Technical risks: Technical risks concern potential method, implementation, interfacing, testing, and
maintenance issue. It also consists of an ambiguous specification, incomplete specification, changing
specification, technical uncertainty, and technical obsolescence. Most technical risks appear due to the
development team's insufficient knowledge about the project.
3. Business risks: This type of risks contain risks of building an excellent product that no one need, losing
budgetary or personnel commitments, etc.
The objective of risk assessment is to division the risks in the condition of their loss, causing potential. For risk
assessment, first, every risk should be rated in two methods:
o The possibility of a risk coming true (denoted as r).
o The consequence of the issues relates to that risk (denoted as s).
Based on these two methods, the priority of each risk can be estimated:
p=r*s
Where p is the priority with which the risk must be controlled, r is the probability of the risk becoming true, and
s is the severity of loss caused due to the risk becoming true. If all identified risks are set up, then the most likely
and damaging risks can be controlled first, and more comprehensive risk abatement methods can be designed for
these risks.
1. Risk Identification: The project organizer needs to anticipate the risk in the project as early as possible so that
the impact of risk can be reduced by making effective risk management planning.
A project can be of use by a large variety of risk. To identify the significant risk, this might affect a project. It is
necessary to categories into the different risk of classes.
There are different types of risks which can affect a software project:
1. Technology risks: Risks that assume from the software or hardware technologies that are used to develop
the system.
2. People risks: Risks that are connected with the person in the development team.
3. Organizational risks: Risks that assume from the organizational environment where the software is being
developed.
4. Tools risks: Risks that assume from the software tools and other support software used to create the
system.
5. Requirement risks: Risks that assume from the changes to the customer requirement and the process of
managing the requirements change.
6. Estimation risks: Risks that assume from the management estimates of the resources required to build
the system
2. Risk Analysis: During the risk analysis process, you have to consider every identified risk and make a
perception of the probability and seriousness of that risk.
There is no simple way to do this. You have to rely on your perception and experience of previous projects and
the problems that arise in them.
It is not possible to make an exact, the numerical estimate of the probability and seriousness of each risk. Instead,
you should authorize the risk to one of several bands:
1. The probability of the risk might be determined as very low (0-10%), low (10-25%), moderate (25-50%),
high (50-75%) or very high (+75%).
2. The effect of the risk might be determined as catastrophic (threaten the survival of the plan), serious
(would cause significant delays), tolerable (delays are within allowed contingency), or insignificant.
Risk Control
It is the process of managing risks to achieve desired outcomes. After all, the identified risks of a plan are
determined; the project must be made to include the most harmful and the most likely risks. Different risks need
different containment methods. In fact, most risks need ingenuity on the part of the project manager in tackling
the risk.
Risk Leverage: To choose between the various methods of handling risk, the project plan must consider the
amount of controlling the risk and the corresponding reduction of risk. For this, the risk leverage of the various
risks can be estimated.
Risk leverage is the variation in risk exposure divided by the amount of reducing the risk.
Risk leverage = (risk exposure before reduction - risk exposure after reduction) / (cost of reduction)
1. Risk planning: The risk planning method considers each of the key risks that have been identified and develop
ways to maintain these risks.
For each of the risks, you have to think of the behavior that you may take to minimize the disruption to the plan
if the issue identified in the risk occurs.
You also should think about data that you might need to collect while monitoring the plan so that issues can be
anticipated.
Again, there is no easy process that can be followed for contingency planning. It rely on the judgment and
experience of the project manager.
2. Risk Monitoring: Risk monitoring is the method king that your assumption about the product, process, and
business risks has not changed.
Financial Risks: Financial risks involve a project’s monetary factors. These might include the rising
costs of materials, unrealistic budgets, higher-than-expected time or labor requirements, lower-than-
expected sales numbers, or the failure to secure sufficient funding.
Strategic Risks: Strategic risks involve the strategies chosen to complete a project. These might include
your project management methodology, project planning techniques, daily operations, company culture,
employee satisfaction and retention rates, project dependencies, or investment in technology.
“The risks you might encounter can vary greatly in the chaos of our culture and environment,” says
Donald Bloom, the CEO of Prime Retail Services, “but the greatest risks each company faces are the
actions of the people in project authority. Their training and attention to planning a project completely
and executing according to the company processes is the cornerstone for success.”
Performance Risks: Performance risks involve the overall project performance. These might include
unclear expectations for deliverables, undefined KPIs, outdated market research, or underperforming
product lines.
“Some projects have emerging requirements, meaning there is no way to get all the requirements at the
beginning of the project because people are still figuring out what they want,” explains Angela
Druckman, Owner of The Druckman Company. Projects with clear guidelines and requirements will run
into fewer performance risks than those without them.
External Risks: External risks come from less predictable outside sources. External risks might affect
performance and results at the project or business level, depending on their severity. These might
include employee illness, major weather events or emergencies, legal decisions, market volatility, and
supply chain risks.
REQUIREMENTS TECHNIQUES
There are five basic techniques of risk management:
Avoidance
Retention
Spreading
Loss Prevention and Reduction
Transfer (through Insurance and Contracts)
Avoidance: Many times it is not possible to completely avoid risk but the possibility should not be
overlooked. For example, at the height of a thunderstorm, Physical Plant may not release vehicles for travel
until the weather begins to clear, thus avoiding the risk of auto accidents during severe weather. Some
buildings on campus have had repeated water problems in some areas. By not allowing storage of records or
supplies in those areas, some water damage claims may be avoided.
Retention: At times, based on the likely frequency and severity of the risks presented, retaining the risk or a
portion of the risk may be cost-effective even though other methods of handling the risk are available. For
example, the University retains the risk of loss to fences, signs, gates and light poles because of the difficulty
of enumerating and evaluating all of these types of structures. When losses occur, the cost of repairs is
absorbed by the campus maintenance budget, except for those situations involving the negligence of a third
party. Although insurance is available, the University retains the risk of loss to most University personal
property.
Spreading: It is possible to spread the risk of loss to property and persons. Duplication of records and
documents and then storing the duplicate copies in a different location is an example of spreading risk. A
small fire in a single room can destroy the entire records of a department's operations. Placing people in a
large number of buildings instead of a single facility will help spread the risk of potential loss of life or injury.
Loss Prevention and Reduction: When risk cannot be avoided, the effect of loss can often be minimized in
terms of frequency and severity. For example, Risk Management encourages the use of security devices on
certain audio visual equipment to reduce the risk of theft. The University requires the purchase of health
insurance by students who are studying abroad, so that they might avoid the risk of financial difficulty, should
they incur medical expenses in another country.
Transfer: In some cases risk can be transferred to others, usually by contract. When outside organizations use
University facilities for public events, they must provide evidence of insurance and name the University as an
additional insured under their policy, thereby transferring the risk of the event from the University to the
facility user. The purchase of insurance is also referred to as a risk transfer since the policy actually shifts the
financial risk of loss, contractually, from the insured entity to the insurance company. Insurance should be the
last option and used only after all other techniques have been evaluated.
Contracts: Often vendors and service providers will attempt through a contract to release themselves from all
liability for their actions relating to the contract. These are often referred to as "hold harmless or
indemnification" clauses. Due to the complexity of interpreting these provisions, the President has
delegated contracting authority for the University solely to staff in Contracts & Procurement. The
Office of University Risk Management reviews contracts and agreements as requested by Contracts &
Procurement to identify and assess risks, evaluate insurance standards, and review hold harmless and
indemnification provisions. The Chancellor's Office requires that the University obtain in most instances not
only a Certificate of Insurance, but also an Endorsement. Collecting these documents is often the most time
consuming aspect of the contracting process.
Risk analysis is the process that figures out how likely risk will arise in a project. It studies the uncertainty of
potential risks and how they would impact the project in terms of schedule, quality and costs if, in fact, they
were to show up. Two ways to analyze risk are quantitative and qualitative. But it’s important to know that risk
analysis is not an exact science, so it’s important to track risks throughout the project life cycle.
Types of Risk Analysis
There are two main types of risk analysis, qualitative and quantitative risk analysis. Let’s learn about these two
approaches.
Qualitative Risk Analysis
The qualitative risk analysis is a risk assessment done by experts on the project teams, who use data from past
projects and their expertise to estimate the impact and probability value for each risk on a scale or a risk matrix.
The scale used is commonly ranked from zero to one. That is, if the likelihood of the risk happening in your
project is .5, then there is a 50 percent chance it will occur. There is also an impact scale, which is measured
from one to fine, with five being the most impact on the project. The risk will then be categorized as either
source- or effect-based.
Once risks are identified and analyzed, a project team member is designated as a risk owner for each risk.
They’re responsible for planning a risk response and implementing it.
Qualitative risk analysis is the base for quantitative risk analysis, and it’s beneficial because not only do you
reduce uncertainty in the project, but you also focus mostly on high-impact risks, for which you can assign a
risk owner and plan out an appropriate risk response. Get started with qualitative risk analysis with our free risk
assessment template.
Quantitative Risk Analysis
By contrast, quantitative risk analysis is a statistical analysis of the effect of those identified risks on the overall
project. This helps project managers and team leaders to make decisions with reduced uncertainty and supports
the process of controlling risks.
Quantitative risk analysis counts the possible outcomes for the project and figures out the probability of still
meeting project objectives. This helps with decision-making, especially when there is uncertainty during the
project planning phase. It helps project managers create cost, schedule or scope targets that are realistic.
The Monte Carlo simulation is an example of a quantitative risk analysis tool. It’s a probability technique that
uses a computerized method to estimate the likelihood of a risk. It’s used as input for project
management decision-making.
Risk Analysis Methods
There are several risk analysis methods that are meant to help managers through the analysis and decision-
making process. Some of these involve the use of risk analysis tools such as charts and documents. Let’s dive
into these risk analysis methods and how they can help you.
Bow Tie Analysis
This qualitative risk analysis method is used to identify causes and consequences for all potential project risks.
The project management team must first identify risks that might affect the project and then think about causes,
consequences and more importantly, a risk mitigation strategy for them. It’s a very versatile method that can be
used in any industry.
Risk Analysis Matrix
The risk analysis matrix assesses the likelihood and the severity of risks, classifying them by order of
importance. It’s main purpose is to help managers prioritize risks and create a risk management plan that has the
right resources and strategies to properly mitigate risks. Risk likelihood is measured on a relative scale, not a
statistical one, which makes it a qualitative risk analysis tool.
Risk Register
A risk register is a crucial project management tool to document project risks. It’s a document that lists all the
potential risks that could occur during the project execution phase, as well as critical information about them.
It’s meant to be used as an input for the risk management plan, which describes who’s responsible for those
risks, the risk mitigation strategies and the resources needed. Creating a risk register usually involves several,
reliable information sources such as the project team, subject matter experts and historical data.
SWIFT Analysis
SWIFT stands for Structured What If Technique. It’s a risk analysis method that focuses on identifying
potential risks associated with changes made to a project plan. As its name suggests, team members have to
come up with any “what if” questions they can to find out all the potential risks that could arise.
Risk Analysis Templates
There are several quantitative and qualitative risk analysis methods and that can be confusing. On top of that
there are several tools that can be used for different purposes. For those reasons, we’ve prepared some free risk
analysis templates to help you through the risk analysis process.
Risk Register Template
This risk register template has everything you need to keep track of all the potential risks that might affect your
project as well as their probability, impact, status and more.
This risk matrix template lets you visualize all your project risks in one color-coded graph to classify them by
likelihood and severity. This will allow you to better understand what are the most critical risks for your project.
So let’s look at where and when the risk analysis is done. Well, if we look at the project management process
groups, the planning process is where we start looking at the risk, and it’s done throughout the entire project. So
we develop our risk management plan, identify the risks, and those are captured in our risk register.
So as a reminder, the risk register identifies all the risks, the impacts, the risk response, and the risk level. We’re
ultimately looking at what the potential impacts to the activity resource estimates, the activity duration
estimates, possibly the schedule, the cost estimates, budgets, quality, and even the procurements.
So when we take the risk register, then we take those items and that’s where we do the detailed analysis. We do
that in two parts. In the first part, we perform a qualitative risk analysis, and there what we’re doing is that’s a
process of prioritizing the risk for further analysis or action, depending upon the probability and the impact of
those risks. The benefit of that is it helps to reduce the level of uncertainty of those risks on the project and
allows us to focus on the high priority risk.
The second piece is performing the quantitative risk analysis, and what that is, it’s a process for numerically
analyzing the effect of those risks on the project. The benefit of that is it helps support decision-making to
reduce the project uncertainty. Again, that can help us, number one, plan the risk responses and control those
risks.
Benefits of Risk Analysis
To understand risk analysis, note the importance of examining risk in methodical detail. Why? There are several
reasons.
Avoid potential litigation
Address regulatory issues
Comply with new legislation
Reduce exposure
Minimize impact
Risk analysis is an important input for decision-making during all the stages of the
project management cycle
Project managers who have some experience with risk management in projects are a great resource. We culled
some advice from them, such as:
There’s no lack of information on risk
Much of that information is complex
Most industries have best practices
Many companies have risk management framework
Risk analysis is done in extremes
Risk Identification & Management
People frequently confuse risk analysis with risk identification and risk management. Let’s clear these project
management concepts up before we continue.
What Is Risk Identification?
Risk identification is also a risk management process, but in this case, it lists all the potential project risks and
their characteristics would be. If this sounds like a risk register, that’s because your findings are collected there.
This information will then be used for your risk analysis. Though this process starts at the beginning of the
project planning phase, it’s an iterative process and continues throughout the project life cycle.
What Is Risk Management?
Finally, risk management is the overall process that project managers use to minimize and manage risk. It
includes risk identification, risk assessment, risk response development and risk response control.
Risk transfer refers to a risk management technique in which risk is transferred to a third party. In other words,
risk transfer involves one party assuming the liabilities of another party. Purchasing insurance is a common
example of transferring risk from an individual or entity to an insurance company.
1. Insurance policy
As outlined above, purchasing insurance is a common method of transferring risk. When an individual or entity
is purchasing insurance, they are shifting financial risks to the insurance company. Insurance companies
typically charge a fee – an insurance premium – for accepting such risks.
Contracts can also be used to help an individual or entity transfer risk. Contracts can include
an indemnification clause – a clause that ensures potential losses will be compensated by the opposing party. In
simplest terms, an indemnification clause is a clause in which the parties involved in the contract commit to
compensating each other for any harm, liability, or loss arising out of the contract.
For example, consider a client that signs a contract with an indemnification clause. The indemnification clause
states that the contract writer will indemnify the client against copyright claims. As such, if the client receives a
copyright claim, the contract writer would (1) be obliged to cover the costs related to defending against the
copyright claim, and (2) be responsible for copyright claim damages if the client is found liable for copyright
infringement.
Risk Transfer by Insurance Companies
Although risk is commonly transferred from individuals and entities to insurance companies, the insurers are
also able to transfer risk. This is done through an insurance policy with reinsurance companies. Reinsurance
companies are companies that provide insurance to insurance firms.
Similar to how individuals or entities purchase insurance from insurance companies, insurance companies can
shift risk by purchasing insurance from reinsurance companies. In exchange for taking on this risk, reinsurance
companies charge the insurance companies an insurance premium.
Risk transfer is commonly confused with risk shifting. To reiterate, risk transfer is passing on (“transferring”)
risk to a third party. On the other hand, risk shifting involves changing (“shifting”) the distribution of risky
outcomes rather than passing on the risk to a third party.
For example, an insurance policy is a method of risk transfer. Purchasing derivative contracts is a method of
risk shifting.
What is Risk Retention?
Risk retention is the practice of setting up a self-insurance reserve fund to pay for losses as they occur,
rather than shifting the risk to an insurer or using hedging instruments. A business is more likely to engage
in risk retention when it determines that the cost of self-insurance is lower than the insurance payments or
hedging costs required to transfer the risk to a third party. A large deductible on an insurance policy is
also a form of risk retention.
Failure Modes and Effects Analysis (FMEA) Tool
Institute for Healthcare Improvement
Boston, Massachusetts, USA
Failure Modes and Effects Analysis (FMEA) is a systematic, proactive method for evaluating a process to
identify where and how it might fail and to assess the relative impact of different failures, in order to identify
the parts of the process that are most in need of change. FMEA includes review of the following:
When a process, product, or service is being designed or redesigned, after quality function deployment
(QFD)
When an existing process, product, or service is being applied in a new way
Before developing control plans for a new or modified process
When improvement goals are planned for an existing process, product, or service
When analyzing failures of an existing process, product, or service
Periodically throughout the life of the process, product, or service
What Is Operational Risk Management?
Operational risk is the risk of loss resulting from ineffective or failed internal processes, people,
systems, or external events that can disrupt the flow of business operations. The losses can be directly or
indirectly financial. For example, a poorly trained employee may lose a sales opportunity, or indirectly a
company’s reputation can suffer from poor customer service.