Risk Analysis and Managementc
Risk Analysis and Managementc
Risk Analysis and Managementc
Source:
1. Roger S. Pressman, Software Engineering A
Practitioners Approach, 5th Edition, ISBN 0-07365578-3, McGraw-Hill, 2001 (Chapter 6)
2. Bob Hughes and Mike Cotterell, Software Project
Management, 4th edition
Risk management
Categories of risk
Overvie
problemsw
that might
Risk Management
Reactive
project team reacts to risks
when they occur
mitigationplan for
additional resources in
anticipation of fire fighting
fix on failureresource are
found and applied when the
risk strikes
crisis managementfailure
does not respond to applied
resources and project is in
jeopardy
Proactive
formal risk analysis is
performed
organization corrects the
root causes of risk
TQM concepts and
statistical SQA
examining risk sources
that lie beyond the
bounds of the software
developing the skill to
manage change
Exampl
Assume that the software team
e defines a project risk in
the following manner:
Risk Assessment
For assessment to be useful,
a risk referent level must be
defined.
In the context of software
risk analysis, a risk referent
level has a single point,
called the referent point or
break point, at which the
decision to proceed with the
project or terminate it
(problems are just too great)
are equally weighted.
The risk decision tree is shown below. Both games total to $0.50. Thus, each
time you play, your average again is 50cents. No matter which game you
choose.
Risk
Approaches to identifyingide
risks include:
ntifi
based on the experience
Use of checklists usually
of past projects (previous
slides)
cati
stakeholders
Brainstorming getting knowledgeable
on
together to pool concerns
Causal mapping identifying possible chains of
cause and effect
Riskreductiontechniques
Personnelshortfalls
Staffingwithtoptalent;jobmatching;
teambuilding;trainingandcareerdevelopment;
earlyschedulingofkeypersonnel
Unrealistictimeand
costestimates
Multipleestimationtechniques;designtocost;
incrementaldevelopment;recordingandanalysis
ofpastprojects;standardizationofmethods
Developingthewrong Improvedsoftwareevaluation;formal
softwarefunctions
specificationmethods;usersurveys;prototyping;
earlyusermanuals
Developingthewrong Prototyping;taskanalysis;userinvolvement
userinterface
design to cost
Late changes to
Change control, incremental
requirements
development
Shortfalls in externally Benchmarking, inspections, formal
supplied
specifications, contractual agreements,
components
quality controls
Shortfalls in externally Quality assurance procedures,
performed tasks
competitive design etc
Real time
Simulation, prototyping, tuning
performance
problems
Development
Technical analysis, cost-benefit analysis,
technically too
prototyping , training
difficult
Causal mapping
Risk prioritization
Risk exposure (RE) = (potential damage) x (probability of
occurrence)
Ideally
Potential damage: a money value e.g. a flood would cause
$0.5 millions of damage
Probability 0.00 (absolutely no chance) to 1.00 (absolutely
certain) e.g. 0.01 (one in hundred chance)
RE = $0.5m x 0.01 = $5,000
Crudely analogous to the amount needed for an insurance
premium
Changes to requirements
specification during coding
Specification takes longer than
expected
Significant staff sickness
affecting critical path activities
Significant staff sickness
affecting non-critical activities
Module coding takes longer
than expected
Module testing demonstrates
errors or deficiencies in design
Likelihoo
d
8
Impac Risk
t
Exposure
8
64
21
35
10
30
20
32
Probabilitylevel
High
Significant
Moderate
Low
Risk
prob
Range
abilit
y:
qual
Greaterthan50%chanceofhappening
itativ
e
3050%chanceofhappening
des
1029%chanceofhappening
cript
ors
Lessthan10%chanceofhappening
Qualitativedescriptorsofimpactoncostandassociated
rangevalues
Impactlevel
Range
High
Greaterthan30%abovebudgetedexpenditure
Significant
20to29%abovebudgetedexpenditure
Moderate
10to19%abovebudgetedexpenditure
Low
Within10%ofbudgetedexpenditure.
Risk planning
Risks can be dealt with by:
Risk acceptance (previous slides)
Risk avoidance (previous slides)
Risk reduction
Risk transfer
Risk mitigation/contingency measures
Probability chart
A chain of activities
Task A
Task B
Task C
Task
te
10
12
16
10
14
20
24
38
A chain of activities
What would be the expected duration of the chain
A + B + C?
Answer: 12.66 + 10.33 + 25.66 i.e. 48.65
What would be the standard deviation for A + B+
C?
Answer: square root of (12 + 12 + 32) i.e. 3.32
likely
Standard
(a)
(m)
(b)
(te)
deviation
(s)
6.17
0.50
4.00
0.33
2.83
0.17
3.5
4.08
0.25
2.83
0.50
10
15
10.50
1.17
3.00
0.33
2.5
2.08
0.08
Activity
Graph of z values
Technology Risks
Questions that must be answered:
Is the technology new to your organization?
Are new algorithms, I/O technology required?
Is new or unproven hardware involved?
Does the application interface with new software?
Is a specialized user interface required?
Is the application radically different?
Are you using new software engineering methods?
Are you using unconventional software development
methods, such as formal methods, AI-based approaches,
artificial neural networks?
Are there significant performance constraints?
Is there doubt the functionality requested is "do-able?"