4.2 Risk Management
4.2 Risk Management
- INTRODUCTION
- RISK IDENTIFICATION
- RISK PROJECTION (ESTIMATION)
- RISK PLANNING
- RISK MITIGATION, MONITORING, AND MANAGEMENT
SOME DEFINITIONS OF RISK
4
CATEGORIES OF RISK -
CONTINUED
• This is based on Lyytinen’s sociotechnical model of risk
• Actors relate to all those involved in the project including both developers, users and managers
e.g. a risk could be that high staff turnover leads to information of importance to the project
being lost
• Technology – both that used to implement the project and that embedded in the project
deliverables – risk could be that the technologies selected are not in fact appropriate.
• Structure – this includes management procedures, risk here is that a group who need to carry
out a particular project task are not informed of this need because they are not part of the
project communication network
• Tasks – the work to be carried out. A typical risk is that the amount of effort needed to carry out
the task is underestimated.
• A risk could be well belong to more than one of the four areas – for example, estimates being
wrong could be influenced by problems with actors (e.g. lack of experience with a technical
domain) or the structure (over optimism of managers keen to win work).
• Exercise 7.2 in the text will be some practice in identifying and categorizing risks 5
RISK CATEGORIZATION –
APPROACH #1
• Project risks
• They threaten the project plan
• If they become real, it is likely that the project schedule will slip
and that costs will increase
• Technical risks
• They threaten the quality and timeliness of the software to be
produced
• If they become real, implementation may become difficult or
impossible
• Business risks
• They threaten the viability of the software to be built
• If they become real, they jeopardize the project or the product
6
RISK CATEGORIZATION – APPROACH #1
(CONTINUED)
• Sub-categories of Business risks
• Market risk – building an excellent product or system that no one
really wants
• Strategic risk – building a product that no longer fits into the
overall business strategy for the company
• Sales risk – building a product that the sales force doesn't
understand how to sell
• Management risk – losing the support of senior management due
to a change in focus or a change in people
• Budget risk – losing budgetary or personnel commitment
7
RISK CATEGORIZATION –
APPROACH #2
• Known risks
• Those risks that can be uncovered after careful evaluation of the
project plan, the business and technical environment in which the
project is being developed, and other reliable information sources
(e.g., unrealistic delivery date)
• Predictable risks
• Those risks that are extrapolated from past project experience (e.g.,
past turnover)
• Unpredictable risks
• Those risks that can and do occur, but are extremely difficult to
identify in advance
8
REACTIVE VS. PROACTIVE RISK
STRATEGIES
• Reactive risk strategies
• "Don't worry, I'll think of something"
• The majority of software teams and managers rely on this
approach
• Nothing is done about risks until something goes wrong
• The team then flies into action in an attempt to correct the problem
rapidly (fire fighting)
• Crisis management is the choice of management techniques
• Proactive risk strategies
• Steps for risk management are followed
• Primary objective is to avoid risk and to have a contingency plan in
place to handle unavoidable risks in a controlled and effective
9
manner
A FRAMEWORK FOR DEALING
WITH RISK
10
STEPS FOR RISK
MANAGEMENT
Personnel shortfalls Staffing with top talent; job matching; teambuilding; training
and career development; early scheduling of key personnel
Unrealistic time and cost Multiple estimation techniques; design to cost; incremental
estimates development; recording and analysis of past projects;
standardization of methods
16
RISK ITEM CHECKLIST
17
KNOWN AND PREDICTABLE RISK
CATEGORIES
• Product size – risks associated with overall size of the software to be built
• Business impact – risks associated with constraints imposed by management
or the marketplace
• Customer characteristics – risks associated with sophistication of the
customer and the developer's ability to communicate with the customer in a
timely manner
• Process definition – risks associated with the degree to which the software
process has been defined and is followed
• Development environment – risks associated with availability and quality of
the tools to be used to build the project
• Technology to be built – risks associated with complexity of the system to be
built and the "newness" of the technology in the system
• Staff size and experience – risks associated with overall technical and project
experience of the software engineers who will do the work
18
QUESTIONNAIRE ON PROJECT RISK
(Questions are ordered by their relative importance to project success)
19
QUESTIONNAIRE ON PROJECT RISK
(CONTINUED)
7) Does the software engineering team have the right mix of skills?
8) Are project requirements stable?
9) Does the project team have experience with the technology to be
implemented?
10) Is the number of people on the project team adequate to do the
job?
11) Do all customer/user constituencies agree on the importance of
the project and on the requirements for the system/product to be
built?
20
RISK COMPONENTS AND
DRIVERS
• The project manager identifies the risk drivers that affect the
following risk components
• Performance risk - the degree of uncertainty that the product will meet
its requirements and be fit for its intended use
• Cost risk - the degree of uncertainty that the project budget will be
maintained
• Support risk - the degree of uncertainty that the resultant software will
be easy to correct, adapt, and enhance
• Schedule risk - the degree of uncertainty that the project schedule will
be maintained and that the product will be delivered on time
• The impact of each risk driver on the risk component is divided
into one of four impact levels
• Negligible, marginal, critical, and catastrophic
• Risk drivers can be assessed as impossible, improbable, probable,
21
and frequent
RISK PROJECTION
(ESTIMATION)
BACKGROUND
24
CONTENTS OF A RISK TABLE
• A risk table provides a project manager with a simple technique for
risk projection
• It consists of five columns
• Risk Summary – short description of the risk
• Risk Category – one of seven risk categories (slide 12)
• Probability – estimation of risk occurrence based on group input
• Impact – (1) catastrophic (2) critical (3) marginal (4) negligible
• RMMM – Pointer to a paragraph in the Risk Mitigation, Monitoring, and
Management Plan
25
DEVELOPING A RISK TABLE
• List all risks in the first column (by way of the help of the
risk item checklists)
• Mark the category of each risk
• Estimate the probability of each risk occurring
• Assess the impact of each risk based on an averaging of
the four risk components to determine an overall impact
value (See next slide)
• Sort the rows by probability and impact in descending
order
• Draw a horizontal cutoff line in the table that indicates the
risks that will be given further attention 26
Risks Category Probability Impact RMMM
30
QUALITATIVE DESCRIPTORS OF IMPACT ON COST AND
ASSOCIATED RANGE VALUES
31
PROBABILITY IMPACT MATRIX
32
RISK PLANNING
• Risk acceptance – the cost of avoiding the risk may be greater than the
actual cost of the damage that might be inflicted
• Risk avoidance – avoid the environment in which the risk occurs e.g.
buying an OTS application would avoid a lot of the risks associated with
software development e.g. poor estimates of effort.
• Risk reduction – the risk is accepted but actions are taken to reduce its
likelihood e.g. prototypes ought to reduce the risk of incorrect
requirements
• Risk mitigation – tries to reduce the impact if the risk does occur e.g. taking
backups to allow rapid recovery in the case of data corruption
• Risk transfer – the risk is transferred to another person or organization.
The risk of incorrect development estimates can be transferred by
negotiating a fixed price contract with an outside software supplier. 34
RISK REDUCTION LEVERAGE
36
A CHAIN OF ACTIVITIES
Task a m b te s
A 10 12 16 ? ?
B 8 10 14 ? ?
C 20 24 38 ? ?
37
A CHAIN OF ACTIVITIES
38
ASSESSING THE LIKELIHOOD OF
MEETING A TARGET
• Say the target for completing A+B+C was 52 days
(T)
• Calculate the z value thus
z = (T – te)/s
• In this example z = (52-48.33)/3.32 i.e. 1.01
• Look up in table of z values
39
RISK MITIGATION, MONITORING,
AND MANAGEMENT
BACKGROUND
• An effective strategy for dealing with risk must consider
three issues
(Note: these are not mutually exclusive)
• Risk mitigation (i.e., avoidance)
• Risk monitoring
• Risk management and contingency planning
• Risk mitigation (avoidance) is the primary strategy and is
achieved through a plan
• Example: Risk of high staff turnover
41
BACKGROUND (CONTINUED)
Strategy for Reducing Staff Turnover
Meet with current staff to determine causes for turnover (e.g., poor working
conditions, low pay, competitive job market)
Mitigate those causes that are under our control before the project starts
Once the project commences, assume turnover will occur and develop techniques
to ensure continuity when people leave
Organize project teams so that information about each development activity is
widely dispersed
Define documentation standards and establish mechanisms to ensure that
documents are developed in a timely manner
Conduct peer reviews of all work (so that more than one person is "up to speed")
Assign a backup staff member for every critical technologist
42
BACKGROUND (CONTINUED)
• During risk monitoring, the project manager monitors
factors that may provide an indication of whether a risk is
becoming more or less likely
• Risk management and contingency planning assume that
mitigation efforts have failed and that the risk has become
a reality
• RMMM steps incur additional project cost
• Large projects may have identified 30 – 40 risks
• Risk is not limited to the software project itself
• Risks can occur after the software has been delivered to the user
43
SOFTWARE SAFETY AND
HAZARD ANALYSIS
• Risks are also associated with software failures that occur
in the field after the development project has ended.
• Computers control many mission critical applications today
(weapons systems, flight control, industrial processes,
etc.).
• These are software quality assurance activities that focus
on the identification and assessment of potential hazards
that may affect software negatively and cause an entire
system to fail
• If hazards can be identified early in the software process,
software design features can be specified that will either
eliminate or control potential hazards
44
THE RMMM PLAN
• The RMMM plan may be a part of the software development plan or
may be a separate document
• Once RMMM has been documented and the project has begun, the risk
mitigation, and monitoring steps begin
• Risk mitigation is a problem avoidance activity
• Risk monitoring is a project tracking activity
• Risk monitoring has three objectives
• To assess whether predicted risks do, in fact, occur
• To ensure that risk aversion steps defined for the risk are being properly
applied
• To collect information that can be used for future risk analysis
• The findings from risk monitoring may allow the project manager to
ascertain what risks caused which problems throughout the project
45
46
47
SEVEN PRINCIPLES OF RISK
MANAGEMENT
• Maintain a global perspective
• View software risks within the context of a system and the business problem that is intended
to solve
• Take a forward-looking view
• Think about risks that may arise in the future; establish contingency plans
• Encourage open communication
• Encourage all stakeholders and users to point out risks at any time
• Integrate risk management
• Integrate the consideration of risk into the software process
• Emphasize a continuous process of risk management
• Modify identified risks as more becomes known and add new risks as better insight is achieved
• Develop a shared product vision
• A shared vision by all stakeholders facilitates better risk identification and assessment
• Encourage teamwork when managing risk
48
• Pool the skills and experience of all stakeholders when conducting risk management activities
SUMMARY