Unit V
Unit V
UNIT-V
Risk Management: Reactive vs Proactive Risk Strategies, software risks, Risk
Identification, Risk Projection, Risk Refinement, RMMM, RMMM Plan.
It is necessary for the project manager to anticipate and identify different risks
that a project may be susceptible to.
Risk Management aims at reducing the impact of all kinds of risk that may
affect a project by identifying, analyzing and managing them
Reactive Risks:
The team flies into action in an attempt to correct the problem rapidly.
This is often called a fire fighting mode.
When this fails, ―crisis management‖ takes over and the project is in
real jeopardy.
Proactive Risks
Potential risks are identified, their probability and impact are assessed,
and they are ranked by importance.
The primary objective is to avoid risk, but because not all risks can be
avoided, the team works to develop a contingency plan that will enable
it to respond in a controlled and effective manner.
Software Risks
Characteristics
Types of Risks
Project risk: Threaten the project plan and affect schedule and resultant cost
Risks Identification
Two distinct types of risks for each category of risks specified above
Product size
Business impact .
Customer characteristics
Process definition
Development environment
Technology to be built
The following questions have been derived from risk data obtained by
surveying experienced software project managers in different parts of the world. The
questions are ordered by their relative importance to the success of a project.
Does the software engineering team have the right mix of skills?
Does the software engineering team have the right mix of skills?
The U.S. Air Force has written a pamphlet that contains excellent guidelines
for software risk identification and abatement.
The Air Force approach requires that project manager identify the risk drivers
that affect software risk components.
Performance risk - the degree of uncertainty that the product will meet
its requirements and be fit for its intended use.
Cost risk - the degree of uncertainty that the project budget will be
maintained.
Support risk - the degree of uncertainty that the resultant software will
be easy to correct, adapt, and enhance.
Schedule risk - the degree of uncertainty that the project schedule will
be maintained and that the product will be delivered on time.
The impact of each risk driver on the risk component is divided into one
of four impact categories—negligible, marginal, critical, or catastrophic.
Impact Assessment
Risks Projection:
Risk Estimation
The project planner, along with other managers and technical staff, performs
four risk projection steps:
estimate the impact of the risk on the project and the product.
note the overall accuracy of the risk projection so that there will be no
misunderstandings.
No software team has the resources to address every possible risk with the
same degree of rigor.
By prioritizing risks, you can allocate resources where they will have the most
impact.
A risk table provides a project manager with a simple technique for risk
projection
Once the first four columns of the risk table have been completed, the table is
sorted by probability and by impact.
The project manager studies the resultant sorted table and defines a cutoff
line.
The cutoff line (drawn horizontally at some point in the table) implies
that only risks that lie above the line will be given further attention. Risks that fall
below the line are re-evaluated to accomplish second-order prioritization.
The overall risk exposure, RE, is determined using the following relationship
RE = P x C
For example, assume that the software team defines a project risk in the
following manner:
Risk identification.
Only 70 percent of the software components scheduled for reuse will, in fact,
be integrated into the application. The remaining functionality will have to be
custom developed.
Risk impact.
Risks Refinement:
condition-transition-consequence (CTC).
Risk avoidance,
Actions to be taken in the event that mitigation steps have failed and
the risk has become a live problem
RMMM Plan:
Risk Monitoring what factors can we track that will enable us to determine
if the risk is becoming more or less likely?
Contingency planning
Control of all software work products and the changes made to them
Quality Concepts
One goal is to ensure that the variance in the number of bugs is also
minimized from one release to another
Quality of design
Quality Control
Includes a feedback loop to the process that created the work product
Quality Assurance
Provides management personnel with data that provides insight into the
quality of the products
Alerts management personnel to quality problems so that they can apply the
necessary resources to resolve quality issues
Cost of Quality
Is studied to
Prevention costs
Appraisal costs
Failure costs – subdivided into internal failure costs and external failure
costs
SQA Activities:
• Ensures that deviations in software work and work products are documented
and handled according to a documented procedure
Software Reviews:
Purpose of Reviews
Catch large classes of errors that escape the originator more than other
practitioners
Require the software engineers to expend time and effort, and the
organization to cover the costs
Each reviewer spends one to two hours reviewing the product and
making notes before the actual review meeting
The review leader establishes an agenda for the review meeting and
schedules the time and location
The meeting is attended by the review leader, all reviewers, and the
producer
One of the reviewers also serves as the recorder for all issues and
decisions concerning the product
The recorder notes any valid problems or errors that are discovered; no
time or effort is spent in this meeting to solve any of these problems or
errors
Reject the product due to severe errors (After these errors are
corrected, another review will then occur)
All attendees then complete a sign-off in which they indicate that they
took part in the review and that they concur with the findings
Review Guidelines:
Enunciate problem areas, but don't attempt to solve the problem noted
Develop a checklist for each product in order to structure and focus the
review
Process Steps:
1. Collect and categorize information (i.e., causes) about software defects that
occur
3. Using the Pareto principle (80% of defects can be traced to 20% of all causes),
isolate the 20% (the ―vital few‖ ).
4. Once the vital few causes have been identified, move to correct the problems
that have caused the defects.
Miscellaneous (MIS).
Six Sigma
The "Six Sigma" refers to six standard deviations (3.4 defects per a million
occurrences) implying an extremely high quality standard.
Control the process to ensure that future work does not reintroduce
the causes of defects.
Verify that the process model will, in fact, avoid defects and meet
customer requirements.
Software reliability:
Software Failure:
Given a set of valid requirements, all software failures can be traced to design
or implementation problems (i.e., nothing wears out like it does in hardware)
Software Reliability
Software Availability
Software Safety
ISO 9000 describes quality assurance elements in generic terms that can be
applied to any business regardless of the products or services offered
SQA Plan Provides a road map for instituting software quality assurance in an
organization
Developed by the SQA group to serve as a template for SQA activities that are
instituted for each software project in an organization
Structured as follows:
All applicable standards and practices that are applied during the
software process
SQA actions and tasks (including reviews and audits) and their
placement throughout the software process
The tools and methods that support SQA actions and tasks