Software Project Management
Software Project Management
2. Technology Context
a. A system view of project management
b. Understanding organizations
c. Stakeholder management
d. Project phases and the project life cycle
e. The context of information technology projects
3. Introduction
a. Developing the project schedule
b. Project management software tools
c. Developing the project budget
d. Finalizing the project schedule and budget
e. Monitoring and controlling the project
f. The project communications plan
g. Project metrics
h. Reporting performance and progress
i. Information distribution
6. Change management
8. Introduction
a. Project implementation
b. Administrative closure
c. Project evaluation
References:
1. Information Technology Project Management: Kathy Schwalbe
Thomson Publication.
2. Information Technology Project Management providing
measurable organizational value Jack Marchewka Wiley
India.
3. Applied software project management Stellman & Greene
SPD.
4. Software Engineering ProjectManagement by
Richard Thayer, Edward Yourdon WILEY INDIA.
1
INTRODUCTION
Unit Structure:
1.1 What is a project?
1.1.1 Project Definition
1.2 Project Attributes
1.3 Project Constraints
1.3.1 Time
1.3.2 Cost
1.3.3 Scope
1.4 What is Project Management
1.4.1 Features of projects
1.4.2 Project Classification
1.4.3 Project Management Tools and techniques
1.4.4 Project Success Factors
3
1.3.1 Time:
1.3.2 Cost:
1.3.3 Scope:
• Projects are often carried out by a team of people who have been
assembled for that specific purpose. The activities of this team
may be co-ordinated by a project manager.
• Project teams may consist of people from different backgrounds
and different parts of the organisation. In some cases project
teams may consist of people from different organisations.
8
path analysis. Table 1.1 lists some commonly used tools and
techniques by knowledge area.
Knowledge Area Tools & Techniques
Integration Project selection methods, project
management management
methodologies, stakeholder analyses,
project charters, project management
plans, project management software,
change requests, change control boards,
project review meetings, lessons-learned
reports
Scope management Scope statements, work breakdown
structures,
mind maps, statements of work,
requirements analyses, scope
management plans, scope verification
techniques, and scope change controls
- Satisfies the project sponsor (the person who is providing the project
budget), end user, and business requirements.
Over the course of any IT project, the work scope may change.
Change is normal and expected part of the process. Changes can be
the result of necessary design modifications, differing site conditions,
material availability, client-requested changes, value engineering and
impacts from third parties, to name a few. Beyond executing the
change in the field, the change normally needs to be documented to
show what was actually developed. This is referred to as Change
Management. Hence, the owner usually requires a final record to
show all changes or, more specifically, any change that modifies the
tangible portions of the finished work. The record is made on the
contract documents – usually, but not necessarily limited to, the
design drawings. The end product of this effort is what the industry
terms as-built drawings, or more simply, “as built.”
1.6.4 Closure:
Sample Questions
2. What is a project, and what are its main attributes? How is aproject
different from what most people do in their day-to-day jobs? What
is the triple constraint?
2
TECHNOLOGY CONTEXT
Unit Structure:
2.1 A systems view of project management.
2.1.1 The Three Sphere model for Systems management
2.1.2 A Case
2.2 Understanding Organisations
2.2.1 The key roles
2.2.1.1 Top management
2.2.1.2 The Project Board
2.2.1.3 Project Manager
2.3 Stakeholder Management
2.3.1 Stakeholder Agreements
2.4 The Context of Information Technology Projects
2.4.1. Software Projects
2.4.2 Software Development Process
2.4.3 Requirements Engineering
2.1.2 A Case:
Business issues:
Technological issues:
Organizational issues:
TopManagement
ProjectBoard&
otherfunctionaries
Projectmanager
Projectteam
28
3
PROJECT SCHEDULING
Unit Structure:
3.1 Developing the Project Schedule
1.1 3.1.1. Schedule Inputs
1.2 3.1.2. Scheduling Tools
3.2 Project Management Software Tools
1.3 3.2.1. Allocate Resources to the Tasks
1.4 3.2.2. Identify Dependencies
1.5 3.2.3 Create the Schedule
2 3.2.4 RISK PLAN 3.3
Developing the Project Budget.
3.3.1 Costing
3.3.2 Budgeting
3.4 Monitoring and Controlling the Project
3.4.1 Checkpoints
3.4.1.1 Checkpoint design
3.4.2 Handling significant deviations from plan
3.4.3 Monitoring System Performance
3.5. The Project Communication Plan
3.5.1 Two Types of Communications Plans for Your Project
3.5.2 Building Your Plan
3.6 Project Metrics
2.1.1 3.6.1 Reasons for Project Metrics
3.6.2 Key Project Metrics
3.6.3 Developing Project Metrics
3.7 Reporting Performance & Progress
Here are some tools and techniques for combining these inputs
to develop the schedule:
Figure3.3GanttChart drawnusingMicrosoftProject.
4
5
Once the project team has generated a final set of risks, they
have enough information to estimate two things: a rough estimate of
the probability that the risk will occur, and the potential impact of that
risk on the project if it does eventually materialize. The risks must then
34
This can be very easily done using tools like Microsoft Project
or even by using any spreadsheet package that provides some basic
statistical functions.
best possible financial position. It’s the old maxim: promise lowdeliver
/ high once again
3.3.1 Costing:
Tangible costs:
• Lease costs – some assets are not purchased outright but are
leased to spread the cost over the life of the project. These should be
accounted for separately to capital expenditure since the project or
company does not own these assets.
• Staff costs – all costs for staff must be accounted for and this
includes (but is not limited to): salary and pension (superannuation)
costs; insurance costs; recruitment costs; anything which can be tied
directly to employing, training and retaining staff.
Intangible costs
It has become fashionable to account for “intangible” assets on the
balance sheets of companies and possibly also projects. The
argument goes like this: some contributions to a project are extremely
valuable but cannot necessarily have a tangible value associated with
them. Should you then account for them in the budget or costing? The
“prudence” principle says yes but practicality says “no”. If you are
delving this murky area of accountancy you should seek professional
help and advice.
Typical things you might place in the budget under intangibles are
“goodwill” and “intellectual property”. Personnel-related figures are a
frequent source of intangible assets and so you might find things like
“management team”, “relationships” and “contacts” on an intangibles
balance sheet.
3.3.2 Budgeting:
Once you have costed your project you can then prepare an
appropriate budget to secure the requisite funds and plan your cash
flow over the life of the project. An accurate cost model will of course
entail a fairly detailed design or at the very least requirement
specification so that you can determine your scope of work. This is
normally completed well into the design phase of the project.
software purchase) falls due in the month after it was scheduled. This
can wreck your carefully planned cash flow. But if you have carefully
budgeted your project then variations should be relatively easy to spot
and cope with as they arise.
This doesn’t mean that you will fail to achieve the objectives of
the plan – on the contrary, you must have a very high level of
confidence that you can achieve those objectives and deliver the full
scope, fit for purpose, on time and to budget.
The plan describes what you would like to do but it models just
one of the infinite number of routes from where you are now to where
you want to be. In practice your project will follow a different route to
the one shown in your plan, you don’t know which one, but you will
need control to make sure it is a route that takes you to where you
need to be, when you need to be there, and at a cost you can afford.
3.4.1 Checkpoints:
When developing your communications plan keep in mind that the key
is to always have the receiver as the focal point—not the sender.
Make your communications deliberate and focused. By making sure
that your plan is clear and thoroughly outlined, you can help reduce
the number of problems and surprises that pop-up and have a project
as successful as a perfect soufflé.
Project metrics require time and effort and so that work is done for
usually one of these reasons:
work since they have a better insight into the day-to-day activities of
their team members.
4
PROJECT RISK MANAGEMENT
Unit Structure:
4.0 Objectives
4.1 Introduction
4.2 The Importance of Project Risk Management
4.2.1 Processes and outputs
4.3 Risk Management Planning
4.4 Common Sources of Risk in Information Technology projects
4.4.1 Categories of Risk
4.4.2 Risk Breakdown Structure
4.5 Risk Identification
4.5.1 Suggestions For Identifying Risks
4.5.2The Risk Register
4.6 Qualitative Risk Analysis
4.6.1 Using Probability/Impact Matrix To
Calculate Risk Factors
4.6.2 Top Ten Risk Item Tracking
4.6.3 Expert Judgment
4.7 Quantitative Risk Analysis
4.7.1 Decision Trees and Expected monetary
Value
4.7.2 Simulation
4.7.3 Sensitivity Analysis
48
4.1 INTRODUCTION
Managing risk is an integral part of good management and is
something many managers do already in one form or another.
Budget and schedule: What are the estimated costs and schedules
for performing risk related activities?
Risk Categories: What are the main categories of risk that should be
addressed on this project?. Is there a risk breakdown structure for the
project
Risk Probability and Impact: How will the probabilities and impacts
of risk items be assessed?. What scoring and interpretation methods
will be used for the qualitative and quantitative analysis of risks?
Fallback plans are developed for risks that have a high impact
on meeting project objectives and are put in to effect if attempts to
reduce risks are not effective. For example , a new college graduate
might have a main plan and several contingency plans on where to
live after graduation, but if none of the plans work out a fallback plan
might be to live at home for a while. Sometimes contingency plans and
fallback plans are used interchangeably.
53
People risk: Does the organization have or can they find people with
appropriate skills to complete the project successfully?. Do they have
enough experience?. Does senior management support the project?.
Is the organization familiar sponsor/customer for the project?. How
good is the relationship with the sponsor/customer?
Structure/process risk: What is the degree of change the new
project will introduce into user areas and business procedures? How
many distinct user groups does the project need to satisfy? With how
many other systems does the project need to interact? Does the
organization have processes in place to complete the project
successfully?
A risk break down structure is a useful tool that can help project
managers consider potential risks in different categories. The highest
level categories are business, technical, and organizational and
project management. Competitors suppliers, and cash flow are
categories that fall under business risks. Under technical risk are the
categories h/w, s/w, and network.
4.5 RISKIDENTIFICATION
1. Brain Storming:
It is a technique by which a team attempt to generate ideas or
find solutions for a specific by amassing ideas spontaneously and with
out judgment . This approach can help the group create a
comprehensive list of risks to address later in the qualitative and
quantitative risk analysis process. An experienced facilitator should
run the brainstorming session and introduce new categories of
potential risks to keep the ideas flowing . After the ideas are collected
,the facilitator can group and categorize the ideas to make them more
manageable
2. Delphi Technique:
The Delphi Technique is used to derive a consensus among a
panel of experts who make predictions about future developments. It
Provides independent and anonymous input regarding future events.
Uses repeated rounds of questioning and written responses and
avoids the biasing effects possible in oral methods, such as
brainstorming.
3. Interviewing:
Interviewing is a fact-finding technique for collecting
information in face-to-face, phone, e-mail, or instant messaging
discussions. Interviewing people with similar project experience is an
important tool for identifying potential risks.
4. SWOT Analysis:
• SWOT analysis (strengths, weaknesses, opportunities,and
threats) can also be used during risk identification.
5. Use of checklists :
The list of risks that have been encountered in previous
projects provide meaningful template for understanding risks in
current projects.
6. Diagramming Technique:
58
SampleRiskRegister
4.6 QUALITATIVERISKANALYSIS
• List the risks and then label each one as high, medium, or low
in terms of its probability of occurrence and its impact if it did
occur.
4.7.2 Simulation:
A specialized Monte Carlo simulation software program runs
(iterates) the project schedule or cost estimate many times, drawing
duration or cost values for each iteration at random from the
probability distribution derived from the 3-point estimates and
probability distribution types selected for each element. The Monte
Carlo software develops from the results of the simulation a probability
distribution of possible completion dates and project costs. From this
distribution it is possible to answer such questions as:
• How likely is the current plan to come in on schedule or on budget?
• How much contingency reserve of time or money is needed
toprovide the agency with a sufficient degree of certainty?
Risk mitigation may take resources or time and hence may represent
a tradeoff of one objective for another. However, it may still be
preferable to going forward with an unmitigated risk. Monitoring the
deliverables closely, increasing the number of parallel activities in
the schedule, early involvement of regulatory agencies in the project,
early and continuous outreach to communities/advocacy groups,
implementing value engineering, performing corridor studies,
adopting less complex processes, conducting more tests, or
choosing a more stable supplier are examples of mitigation actions.
i. Workaround:
Workaround is distinguished from contingency plan in that a
workaround is a recovery plan that is implemented if the event occurs,
whereas a contingency plan is to be implemented if a trigger event
indicates that the risk is very likely to occur.
Risk monitoring and control continues for the life of the project.
The list of project risks changes as the project matures, new risks
develop, or anticipated risks disappear.
Sample Questions
1. Discuss the common sources of risk on information technology
projects and suggestions for managing them. (Ans:section 4.4)
2. Explain how to use decision trees and Monte Carlo analysis for
quantifying risk. (Ans Hint: section 4.7.1)
Suggested Readings:
1. Boehm ,Barry W. “ Software Risk management: Principles and
practices”
2. Kathy Schwalbe : Information Technology project management
3. Hillson , David. : The risk breakdown structure as an aid to
effective risk management
4. DeMarco,Tom and Timothy Lister: Managing Risk on software
projects
4. www.risksig.com
5
PROJECT PROCUREMENT
MANAGEMENT
Unit Structure:
5.0 Objectives
5.1 Introduction
5.2 Planning Purchases and Acquisitions (Procurement Planning)
5.2.1 Inputs to Procurement Planning
5.2.2 Tools and Techniques for Procurement Planning
5.2.3 Outputs from Procurement Planning
5.3 Solicitation Planning (Planning Contracting)
5.3.1 Tools and Techniques for Solicitation Planning
5.3.2 Outputs from Solicitation Planning
5.4 Requesting Seller Responses (Solicitation)
5.4.1 Inputs to Solicitation
5.4.2 Tools and Techniques for Solicitation
5.4.3 Outputs from Solicitation
5.5 Source Selection (Selecting Sellers)
5.5.1 Inputs to Source Selection
5.5.2 Tools and Techniques for Source Selection
71
5.0 OBJECTIVES
These processes interact with each other and with the processes
in the other knowledge areas as well. Each process may involve effort
from one or more individuals or groups of individuals based on the
needs of the project. Although the processes are presented here as
discrete elements with well-defined interfaces, in practice they may
overlap and interact in ways not detailed here.
The seller will typically manage their work as a project. In such cases:
• The buyer becomes the customer and is thus a key stakeholder for
the seller.
• The terms and conditions of the contract become a key input tomany
of the seller’s processes. The contract may actually contain the input
(e.g., major deliverables, key milestones, cost objectives) or it may
limit the project team’s options (e.g., buyer approval of staffing
decisions is often required on design projects).
Figure5.1
When the project does not obtain products and services from
outside the performing organization, the processes from solicitation
planning through contract close-out would not be performed. This
often occurs on research and development projects when the
performing organization is reluctant to share project technology, and
on many smaller, in-house projects when the cost of finding and
managing an external resource may exceed the potential savings.
Make-or-Buy Example:
Assume you can lease an item you need for a project for $150/day.
To purchase the item, the cost is $1,000 plus a daily operational cost
of $50/day.
How long will it take for the purchase cost to be the same as the lease
cost?
If you need the item for 12 days, should you lease it or purchase it?
Steps in solicitation
If such lists are not readily available, the project team will have
to develop its own sources. General information is widely available
through library directories, relevant local associations, trade catalogs,
and similar sources. Detailed information on specific sources may
require more extensive effort, such as site visits or contact with
previous customers.
4. Seller invoices. The seller must submit invoices from time to time
to request payment for work performed. Invoicing requirements,
including necessary supporting documentation, are usually defined
in the contract.
Processes include:
• Planning purchases and acquisitions
• Planning contracting
• Requesting seller responses
• Selecting sellers
• Administering contracts
• Closing contracts
Sample questions
1. What is involved in the process of requesting seller
responses?. How do organizations decide whom to send RFPs
or RFQs?.(ANS: See section 5.3)
Suggested Readings.
90
6
CHANGE MANAGEMENT
Unit Structure:
6.0 Objectives
6.1 Introduction
6.2 The Nature of Change
6.2.1 The ADKAR Model
6.2.2 Change is a process
6.2.3 Change can be emotional
6.3 Change Management Plan
6.3.1 Develop a Strategy for Change
6.3.2Implement Change Plan and Track
Management
progress
6.4 Dealing with resistance and
Conflict
6.4.1 Polarity Management
6.5 Summary
6.0 OBJECTIVES
After reading this chapter, you will be able to
6.1 INTRODUCTION
The five key goals as shown in figure 7.1 form the basis of the
ADKAR model.
Desire: After making employees aware about the change, the next
step will be making them have the desire to support and actively
participate in the forthcoming changes.
E.g., fear of job loss, incentive or
compensation, career advancement.
Figure 6.1
Figure 6.2
The model has five stages, if people are not allowed to suffer
and go through the first four stages, then going to fifth stage is
extremely difficult. The human being we have a mechanism we do use
grief counselors to varying extent in our day to day life. If we as change
agents know this we can make sure that people we do experience
some of these stage have information readily available to enable to
progress. The Kubler-Ross model is a useful for understanding
people's emotional reaction to personal trauma and change,
irrespective of cause. The six stages include:
Figure 6.3
require support from the appropriate sponsor who can approve the
change. Any individual within an organization who has a good idea
and the ability to communicate it can be a change advocate.
Change at any one point will impact some or all of the others.
Thus, a changed task will necessarily affect the people involved in it,
the structure in which they work, and the technology that they use.
Failure to manage these interdependencies at critical times of change
can create problems.
98
Rational-Empirical Approach
Normative-Reeducation Approach:
99
Power-Coercive Approach:
Environmental-Adaptive Approach:
Time frames are not a factor. This strategy can work under
short time frames or longer ones. However, under short time frames,
a key issue will be that of managing what could be explosive growth
in the new organization and, if it is not adequately seeded with new
folks, the rapid influx of people from the old culture can infuse the new
organization with the old culture.
Resistance:
Conflict:
Figure 6.5
Polarity mapping helps people “get away” from seeing their current
initiative as being the only “solution to the problem” and not a case of
choosing one idea over another.
105
6.5 SUMMARY
Sample Questions:
References:
Information Technology ProjectManagement – Providing
measurable organizational value by Jack T. Marchewka.
http://home.att.net/~OPSINC/four_strategies.pdf
http://www.valuebasedmanagement.net/methods_kotter_change_a
pproaches.html
http://www.pcrest.com/centers/hinds/FI_reading.htm
http://www.businessballs.com/elisabeth_kubler_ross_five_stages_o
f_grief.htm
http://www.pcrest.com/centers/hinds/FI_reading.htm
Schein, E. H. (1995). Kurt Lewin’s change theory in the field and in the
classroom: Notes toward a model of managed learning [WWW
document] (74 paragraphs). URL
http://www.solne.org/res/wp/10006.html [2002, March 20].
http://www.a2zpsychology.com/articles/kurt_lewin's_change_theory
.htm [2004, September 9].
106
7
PROJECT IMPLEMENTATION
Unit Structure:
7.0 Objectives
7.1 Introduction
7.2 Project Implementation
7.2.1 Direct Cutover
7.2.2 Parallel
7.2.3 Pilot
7.2.4 Phased
7.3 Administrative Closure
7.3.1 Project Sponsor Acceptance
7.3.2 The Final Project Report
7.3.3 The Final Meeting and Presentation
7.3.4 Closing the Project
7.4 Project Evaluation
7.5 Chapter Summary
7.0 OBJECTIVES
Figure 7.1
7.2.2 Parallel:
Figure 7.2
Data is input in both system and the results are verified. This
approach is impractical if the systems are dissimilar or does not
support each other. The cost using this approach is relatively high,
because both systems are operating requiring more man power in
terms of management. Using this approach provides confidence that
the new system is functioning and performing properly before relying
on it entirely. It is also impractical to use this approach as the new
system and old system technically incompatible.
7.2.3 Pilot:
7.2.4 Phased:
Figure 7.3
Although the phased approach may take more time than the
direct cutover approach, it may be less risky and much manageable.
After all the modules have been tested independently it is possible to
implement the new system in the organization, which would be error
free. Also, overly optimistic target dates or problems experienced
during the early phases of implementation may create a chain reaction
that pushes back the scheduled dates of the remaining planned
implantations.
Frame (1998) points out, the project manager and team should be
prepared to deal with the following realities:
• Bugs still exist. Software quality testing may not find all the
defects, and certain bugs may not become known until after
the system has been implemented. Unless these defects and
bugs are promptly addressed and fixed, the project sponsor’s
satisfaction with the project team and the information system
may become an issue.
that the project was under control form the beginning through to its
end (Frame 1998)
Postmortem Review:
The postmortem review should be done before the project team
is released from the current project. Phillips says. For most projects,
the post-mortem review should be done at final acceptance of the
project, as soon as possible to the final sign-off. The reasons for this
are simple: members of the team are going to move on to other
projects; and the experience of working on the project will be fresh in
everyone's mind soon after it's done. Exactly what goes into a post-
mortem varies greatly from organization to organization.
Project Audit:
116
Sample questions:
References:
http://www.projectauditors.com/Papers/Your_Project_Has_Been_S
elected_for_an__Audit.pdf
Information Technology ProjectManagement – Providing
measurable organizational value by Jack T. Marchewka.
http://www.spottydog.u-net.com/guides/close/frameset.html
http://ivythesis.typepad.com/term_paper_topics/2009/10/examquesti
on.html
http://facweb.cs.depaul.edu/yele/Course/IT215/Chapter%2009.ppt#
570,41,System Changeover http://gauravgupta28.wordpress.com/
http://www.cioupdate.com/reports/article.php/2202921/PostMortems-
Key-to-Successful-Future-Projects.htm
http://www.cis.gsu.edu/~mkeil/cis8150/post-project%20audits.pdf
118