Risk Management, Resource Allocation, Software Project Testing
Risk Management, Resource Allocation, Software Project Testing
MCA II SEM
1
Business risks can occur due to the unavailability of a purchase order, contracts in the initial stage of a
project, delay in the attainment of inputs from clients and customers, etc.
#6 – Information Security Risk
It is concerned with the breach of the confidentiality of a company’s or clients’ sensitive data. The
violation of such data can be a huge risk for an organization, and it might not just cause financial losses
but also result in loss of goodwill.
#7 – Technology Risk
Technology risks occur due to sudden or complete change in technology.
#8 – Supplier Risk
This risk occur when third-party supplier interference in the development of a particular project.
#9 – Resource Risk
Resource risk occurs due to improper management of a company’s resources such as its staff, budget, etc.
#10 – Quality and Process Risk
Quality and process risk occurs due to improper hiring of staff that is not well trained.
#11 – Project Planning
Project planning risks arises due to lack of proper planning concerning a project. This lack of project
planning can cost the project to sink and fail to meet the expectations of the clients as well.
Checklists are simply lists of the risks that have been found to occur regularly. A list of software
development risks by Barry Boehm is shown in Table. A group of project stakeholders examines a
checklist. Often the checklist suggests potential solution for each risk.
Brainstorming
When the project plan is prepared then the main stakeholders identify (using their individual knowledge
of different parts of the project) the problems that might occur. This collaborative approach may generate
a sense of ownership in the project.
2
[5]. Assessment of Risks
A common problem with risk identification is that a list of risks is potentially endless. A way is needed
of distinguishing the damaging and likely risks. This can be done by estimating the risk exposure for each
risk using the formula:
risk exposure = (potential damage) X (probability of occurrence)
Generally, the potential damage is assessed as a money value. For example, let a project depended on a
data centre which is vulnerable to fire. If a fire occurred then we need a new computer configuration of
cost £500,000. The chances of a fire actually happening is a 1 in 1000 chance, that is a probability of
0.001.
In this case the risk exposure would be:
£500,000 x 0.001 = £500
The calculation of risk exposure above assumes that the amount of damage sustained will always be the
same. However, it is not true. For example, as software development proceeds, more software is created,
and more time would be needed to re-create it if it were lost.
With some risks, there could be not only damage but also gains. Ex- The testing of a software component
is scheduled to take six days, but is actually done in three days.
Most managers need very precise estimates of loss or the probability of occurring. Barry Boehm
suggested that, both the risk losses and the probabilities can be assessed using relative scales (0 to 10).
The two figures could then be multiplied to get a risk exposure. Table provides an example.
3
Risks can be assessed using qualitative descriptions of the possible impact and the likelihood of each risk.
The following tables shows this method.
TABLE: Qualitative descriptors of risk probability and associated range values
4
Calculate the standard deviation
The degree of uncertainty may be obtained by calculating the standard deviation s of an activity time,
using the formula
The standard deviation is proportional to the difference between the optimistic and pessimistic estimates
(a~b). It defines the degree of uncertainty or risk for each activity.
Calculating the z values
The z value is calculated for each node that has a target date. It is equivalent to the number of standard
deviations between the node’s expected and target dates. It is calculated using the formula
Example: A project composed of eight activities whose durations have been estimated as shown in the
table A. Prepare a PERT chart for it.
Table A
5
Table B
Table B provides additional information for the network. Calculate the expected duration, te, for each activity.