M.C.a (Sem - IV) Paper - Software Project Management
M.C.a (Sem - IV) Paper - Software Project Management
2. Technology Context
a. A system view of project management
b. Understanding organizations
c. Stakeholder management
d. Project phases and the project life cycle
e. The context of information technology projects
3. Introduction
a. Developing the project schedule
b. Project management software tools
c. Developing the project budget
d. Finalizing the project schedule and budget
e. Monitoring and controlling the project
f. The project communications plan
g. Project metrics
h. Reporting performance and progress
i. Information distribution
6. Change management
2
8. Introduction
a. Project implementation
b. Administrative closure
c. Project evaluation
References:
1. Information Technology Project Management: Kathy
Schwalbe Thomson Publication.
2. Information Technology Project Management providing
measurable organizational value Jack Marchewka Wiley
India.
3. Applied software project management Stellman & Greene
SPD.
4. Software Engineering Project Management by Richard
Thayer, Edward Yourdon WILEY INDIA.
3
1
INTRODUCTION
Unit Structure:
1.1 What is a project?
1.1.1 Project Definition
1.2 Project Attributes
1.3 Project Constraints
1.3.1 Time
1.3.2 Cost
1.3.3 Scope
1.4 What is Project Management
1.4.1 Features of projects
1.4.2 Project Classification
1.4.3 Project Management Tools and techniques
1.4.4 Project Success Factors
1.5 The Role of Project Manager
1.5.1 Responsibilities of a Project Manager.
1.6 Project Life Cycle
1.6.1 Project Initiation
1.6.2 Planning & Design
1.6.3 Execution & Controlling
1.6.4 Closure
1.3.1 Time:
1.3.2 Cost:
1.3.3 Scope:
1.6.4 Closure:
Sample Questions
2
TECHNOLOGY CONTEXT
Unit Structure:
2.1 A systems view of project management.
2.1.1 The Three Sphere model for Systems management
2.1.2 A Case
2.2 Understanding Organisations
2.2.1 The key roles
2.2.1.1 Top management
2.2.1.2 The Project Board
2.2.1.3 Project Manager
2.3 Stakeholder Management
2.3.1 Stakeholder Agreements
2.4 The Context of Information Technology Projects
2.4.1. Software Projects
2.4.2 Software Development Process
2.4.3 Requirements Engineering
2.1.2 A Case:
Business issues:
Technological issues:
Organizational issues:
side – it’s doomed to fail if that is the case. Among the three, I
guess the technological issues are the easiest to resolve.
Top Management
Project manager
Project team
document for the project. The users should share with the
developers the responsibility for the requirements' completeness
and consistency. It is the project managers' duty to establish and
maintain good relations with the users throughout the development
process, as well as to consult them whenever the project gets stuck
due to the development team's lack of domain understanding.
It is essential to make as explicit as possible all the
requirements that reflect the user's work and the tasks that the
software system under development is supposed to automate. Any
situation in which users can find themselves when doing their job is
the context that must be taken into account through requirements
engineering. It is equally important not to concentrate on a single
user's task, but to cover communication between users when the
task requires collaboration.
3
PROJECT SCHEDULING
Unit Structure:
3.1 Developing the Project Schedule
1.1 3.1.1. Schedule Inputs
1.2 3.1.2. Scheduling Tools
3.2 Project Management Software Tools
1.3 3.2.1. Allocate Resources to the Tasks
1.4 3.2.2. Identify Dependencies
1.5 3.2.3 Create the Schedule
2 3.2.4 RISK PLAN
3.3 Developing the Project Budget.
3.3.1 Costing
3.3.2 Budgeting
3.4 Monitoring and Controlling the Project
3.4.1 Checkpoints
3.4.1.1 Checkpoint design
3.4.2 Handling significant deviations from plan
3.4.3 Monitoring System Performance
3.5. The Project Communication Plan
3.5.1 Two Types of Communications Plans for Your Project
3.5.2 Building Your Plan
3.6 Project Metrics
2.1.1 3.6.1 Reasons for Project Metrics
3.6.2 Key Project Metrics
3.6.3 Developing Project Metrics
3.7 Reporting Performance & Progress
32
The most common form for the schedule to take is a Gantt chart.
The following figure shows an example:
4
5
Once the project team has generated a final set of risks, they
have enough information to estimate two things: a rough estimate
of the probability that the risk will occur, and the potential impact of
that risk on the project if it does eventually materialize. The risks
38
3.3.1 Costing:
Tangible costs:
• Lease costs – some assets are not purchased outright but are
leased to spread the cost over the life of the project. These should
be accounted for separately to capital expenditure since the project
or company does not own these assets.
• Staff costs – all costs for staff must be accounted for and this
includes (but is not limited to): salary and pension (superannuation)
40
Intangible costs
It has become fashionable to account for “intangible” assets on the
balance sheets of companies and possibly also projects. The
argument goes like this: some contributions to a project are
extremely valuable but cannot necessarily have a tangible value
associated with them. Should you then account for them in the
budget or costing? The “prudence” principle says yes but
practicality says “no”. If you are delving this murky area of
accountancy you should seek professional help and advice.
Typical things you might place in the budget under intangibles are
“goodwill” and “intellectual property”. Personnel-related figures are
a frequent source of intangible assets and so you might find things
like “management team”, “relationships” and “contacts” on an
intangibles balance sheet.
3.3.2 Budgeting:
Once you have costed your project you can then prepare an
appropriate budget to secure the requisite funds and plan your cash
41
flow over the life of the project. An accurate cost model will of
course entail a fairly detailed design or at the very least
requirement specification so that you can determine your scope of
work. This is normally completed well into the design phase of the
project.
This doesn’t mean that you will fail to achieve the objectives
of the plan – on the contrary, you must have a very high level of
confidence that you can achieve those objectives and deliver the
full scope, fit for purpose, on time and to budget.
3.4.1 Checkpoints:
Project metrics require time and effort and so that work is done for
usually one of these reasons:
business metrics. Typically there is no one metric that fits all the
requirements for a particular situation.
53
4
PROJECT RISK MANAGEMENT
Unit Structure:
4.0 Objectives
4.1 Introduction
4.2 The Importance of Project Risk Management
4.2.1 Processes and outputs
4.3 Risk Management Planning
4.4 Common Sources of Risk in Information Technology projects
4.4.1 Categories of Risk
4.4.2 Risk Breakdown Structure
4.5 Risk Identification
4.5.1 Suggestions For Identifying Risks
4.5.2The Risk Register
4.6 Qualitative Risk Analysis
4.6.1 Using Probability/Impact Matrix To Calculate Risk
Factors
4.6.2 Top Ten Risk Item Tracking
4.6.3 Expert Judgment
4.7 Quantitative Risk Analysis
4.7.1 Decision Trees and Expected monetary Value
4.7.2 Simulation
4.7.3 Sensitivity Analysis
4.8 Risk Response Planning
4.9 Risk Monitoring and Control
4.10. Using Software to Assist in Project Risk Management
4.11 Summary
4.0 OBJECTIVES
4.1 INTRODUCTION
Process Output(deliverables)
Risk Categories: What are the main categories of risk that should
be addressed on this project?. Is there a risk breakdown structure
for the project
Ownership 6
Clear Visions and Objectives 3
Hard-Working, Focused Staff 3
Total 100
The Standish Group provides specific questions for each
success criterion to help decide the number of points to assign to a
project. For example the five questions related to user involvement
include the following
Do I have the right user(s)?
Did I involve the users early and often?
Do I have a quality relationship with user(s)?
Do I make involvement easy
Did I find out what the user(s) need(s)?
� People risk: Does the organization have or can they find people
with appropriate skills to complete the project successfully?. Do
they have enough experience?. Does senior management support
the project?. Is the organization familiar sponsor/customer for the
project?. How good is the relationship with the sponsor/customer?
� Structure/process risk: What is the degree of change the new
project will introduce into user areas and business procedures?
How many distinct user groups does the project need to satisfy?
With how many other systems does the project need to interact?
Does the organization have processes in place to complete the
project successfully?
1. Brain Storming:
It is a technique by which a team attempt to generate ideas
or find solutions for a specific by amassing ideas spontaneously
and with out judgment . This approach can help the group create a
comprehensive list of risks to address later in the qualitative and
quantitative risk analysis process. An experienced facilitator should
run the brainstorming session and introduce new categories of
potential risks to keep the ideas flowing . After the ideas are
collected ,the facilitator can group and categorize the ideas to make
them more manageable
2. Delphi Technique:
The Delphi Technique is used to derive a consensus among
a panel of experts who make predictions about future
developments. It Provides independent and anonymous input
regarding future events. Uses repeated rounds of questioning and
written responses and avoids the biasing effects possible in oral
methods, such as brainstorming.
3. Interviewing:
Interviewing is a fact-finding technique for collecting
information in face-to-face, phone, e-mail, or instant messaging
discussions. Interviewing people with similar project experience is
an important tool for identifying potential risks.
4. SWOT Analysis:
SWOT analysis (strengths, weaknesses, opportunities,and
threats) can also be used during risk identification.
64
5. Use of checklists :
The list of risks that have been encountered in previous
projects provide meaningful template for understanding risks in
current projects.
6. Diagramming Technique:
This method include using cause and effect diagrams or
fishbone diagrams ,flow charts and influence diagrams .Fishbone
diagrams help you trace problems back to their root cause. Process
flow charts are diagrams that show how different parts of the
system interrelate.
List the risks and then label each one as high, medium, or
low in terms of its probability of occurrence and its impact if it
did occur.
66
4.7.2 Simulation:
A specialized Monte Carlo simulation software program runs
(iterates) the project schedule or cost estimate many times, drawing
duration or cost values for each iteration at random from the
probability distribution derived from the 3-point estimates and
probability distribution types selected for each element. The Monte
Carlo software develops from the results of the simulation a
probability distribution of possible completion dates and project
costs. From this distribution it is possible to answer such questions
as:
• How likely is the current plan to come in on schedule or on
budget?
• How much contingency reserve of time or money is needed to
provide the agency with a sufficient degree of certainty?
71
i. Workaround:
Workaround is distinguished from contingency plan in that a
workaround is a recovery plan that is implemented if the event
occurs, whereas a contingency plan is to be implemented if a
trigger event indicates that the risk is very likely to occur.
4.11 SUMMARY
CLUSIONS
Risk Management is always forgotten when managing
projects but the irony is that all projects have risk. People in general
think that risk management is just a blaming session to uncover
flaws in a particular project. This perception has to be abolished.
77
Sample Questions
1. Discuss the common sources of risk on information technology
projects and suggestions for managing them. (Ans:section 4.4)
2. Explain how to use decision trees and Monte Carlo analysis for
quantifying risk. (Ans Hint: section 4.7.1)
Suggested Readings:
1. Boehm ,Barry W. “ Software Risk management: Principles and
practices”
2. Kathy Schwalbe : Information Technology project management
3. Hillson , David. : The risk breakdown structure as an aid to
effective risk management
4. DeMarco,Tom and Timothy Lister: Managing Risk on software
projects
4. www.risksig.com
78
5
PROJECT PROCUREMENT
MANAGEMENT
Unit Structure:
5.0 Objectives
5.1 Introduction
5.2 Planning Purchases and Acquisitions (Procurement Planning)
5.2.1 Inputs to Procurement Planning
5.2.2 Tools and Techniques for Procurement Planning
5.2.3 Outputs from Procurement Planning
5.3 Solicitation Planning (Planning Contracting)
5.3.1 Tools and Techniques for Solicitation Planning
5.3.2 Outputs from Solicitation Planning
5.4 Requesting Seller Responses (Solicitation)
5.4.1 Inputs to Solicitation
5.4.2 Tools and Techniques for Solicitation
5.4.3 Outputs from Solicitation
5.5 Source Selection (Selecting Sellers)
5.5.1 Inputs to Source Selection
5.5.2 Tools and Techniques for Source Selection
5.5.3 Outputs from Source Selection
5.6 Contract Administration
5.6.1 Inputs to Contract Administration
5.6.2 Suggestions for Change Control in Contracts
5.6.3 Tools and Techniques for Contract Administration
5.6.4 Outputs from Contract Administration
5.7 Contract Close-Out
5.7.1 Inputs to Contract Close-out
5.7.2 Tools and Techniques for Contract Close-out
5.7.3 Outputs from Contract Close-out
5.8 Using Software to Assist in Project Procurement Management
5.9 Out Sourcing
5.9.1 Benefits of outsourcing
5.10 Summary
79
5.0 OBJECTIVES
5.1 INTRODUCTION
Figure 5.1
When the project does not obtain products and services from
outside the performing organization, the processes from solicitation
planning through contract close-out would not be performed. This
often occurs on research and development projects when the
performing organization is reluctant to share project technology,
and on many smaller, in-house projects when the cost of finding
and managing an external resource may exceed the potential
savings.
Make-or-Buy Example:
� Assume you can lease an item you need for a project for
$150/day. To purchase the item, the cost is $1,000 plus a daily
operational cost of $50/day.
84
� How long will it take for the purchase cost to be the same as the
lease cost?
� If you need the item for 12 days, should you lease it or purchase
it?
Steps in solicitation
If such lists are not readily available, the project team will
have to develop its own sources. General information is widely
available through library directories, relevant local associations,
trade catalogs, and similar sources. Detailed information on specific
sources may require more extensive effort, such as site visits or
contact with previous customers.
5.10 SUMMARY
Processes include:
Planning purchases and acquisitions
Planning contracting
Requesting seller responses
Selecting sellers
Administering contracts
Closing contracts
99
Sample questions
1. What is involved in the process of requesting seller
responses?. How do organizations decide whom to send
RFPs or RFQs?.(ANS: See section 5.3)
Suggested Readings.
100
6
CHANGE MANAGEMENT
Unit Structure:
6.0 Objectives
6.1 Introduction
6.2 The Nature of Change
6.2.1 The ADKAR Model
6.2.2 Change is a process
6.2.3 Change can be emotional
6.3 Change Management Plan
6.3.1 Develop a Strategy for Change
6.3.2Implement Change Management Plan and Track
progress
6.4 Dealing with resistance and Conflict
6.4.1 Polarity Management
6.5 Summary
6.0 OBJECTIVES
6.1 INTRODUCTION
The five key goals as shown in figure 7.1 form the basis of
the ADKAR model.
Desire: After making employees aware about the change, the next
step will be making them have the desire to support and actively
participate in the forthcoming changes.
E.g., fear of job loss, incentive or compensation, career
advancement.
Figure 6.1
Figure 6.2
105
The model has five stages, if people are not allowed to suffer
and go through the first four stages, then going to fifth stage is
extremely difficult. The human being we have a mechanism we do
use grief counselors to varying extent in our day to day life. If we as
change agents know this we can make sure that people we do
experience some of these stage have information readily available
to enable to progress. The Kubler-Ross model is a useful for
understanding people's emotional reaction to personal trauma and
change, irrespective of cause. The six stages include:
Figure 6.3
107
Task
Technology People
Structure
Figure 7.4
Rational-Empirical Approach
Normative-Reeducation Approach:
110
Power-Coercive Approach:
Environmental-Adaptive Approach:
Time frames are not a factor. This strategy can work under
short time frames or longer ones. However, under short time
frames, a key issue will be that of managing what could be
explosive growth in the new organization and, if it is not adequately
seeded with new folks, the rapid influx of people from the old
culture can infuse the new organization with the old culture.
Resistance:
Conflict:
Figure 6.5
6.5 SUMMARY
Sample Questions:
References:
Information Technology Project Management – Providing
measurable organizational value by Jack T. Marchewka.
http://home.att.net/~OPSINC/four_strategies.pdf
http://www.valuebasedmanagement.net/methods_kotter_change_a
pproaches.html
http://www.pcrest.com/centers/hinds/FI_reading.htm
http://www.businessballs.com/elisabeth_kubler_ross_five_stages_o
f_grief.htm
http://www.pcrest.com/centers/hinds/FI_reading.htm
Schein, E. H. (1995). Kurt Lewin’s change theory in the field and in
the classroom: Notes toward a model of managed learning [WWW
document] (74 paragraphs). URL http://www.sol-
ne.org/res/wp/10006.html [2002, March 20].
http://www.a2zpsychology.com/articles/kurt_lewin's_change_theory
.htm [2004, September 9].
118
7
PROJECT IMPLEMENTATION
Unit Structure:
7.0 Objectives
7.1 Introduction
7.2 Project Implementation
7.2.1 Direct Cutover
7.2.2 Parallel
7.2.3 Pilot
7.2.4 Phased
7.3 Administrative Closure
7.3.1 Project Sponsor Acceptance
7.3.2 The Final Project Report
7.3.3 The Final Meeting and Presentation
7.3.4 Closing the Project
7.4 Project Evaluation
7.5 Chapter Summary
7.0 OBJECTIVES
7.1 INTRODUCTION
Figure 7.1
7.2.2 Parallel:
Figure 7.2
Data is input in both system and the results are verified. This
approach is impractical if the systems are dissimilar or does not
support each other. The cost using this approach is relatively high,
because both systems are operating requiring more man power in
terms of management. Using this approach provides confidence
that the new system is functioning and performing properly before
relying on it entirely. It is also impractical to use this approach as
the new system and old system technically incompatible.
7.2.3 Pilot:
7.2.4 Phased:
Figure 7.3
Although the phased approach may take more time than the
direct cutover approach, it may be less risky and much
manageable. After all the modules have been tested independently
it is possible to implement the new system in the organization,
which would be error free. Also, overly optimistic target dates or
problems experienced during the early phases of implementation
may create a chain reaction that pushes back the scheduled dates
of the remaining planned implantations.
Bugs still exist. Software quality testing may not find all the
defects, and certain bugs may not become known until after
the system has been implemented. Unless these defects
and bugs are promptly addressed and fixed, the project
sponsor’s satisfaction with the project team and the
information system may become an issue.
124
Postmortem Review:
The postmortem review should be done before the project
team is released from the current project. Phillips says. For most
projects, the post-mortem review should be done at final
acceptance of the project, as soon as possible to the final sign-off.
The reasons for this are simple: members of the team are going to
move on to other projects; and the experience of working on the
project will be fresh in everyone's mind soon after it's done. Exactly
what goes into a post-mortem varies greatly from organization to
organization.
Project Audit:
7.5 SUMMARY
Sample questions:
References:
http://www.projectauditors.com/Papers/Your_Project_Has_Been_S
elected_for_an__Audit.pdf
Information Technology Project Management – Providing
measurable organizational value by Jack T. Marchewka.
http://www.spottydog.u-net.com/guides/close/frameset.html
http://ivythesis.typepad.com/term_paper_topics/2009/10/exam-
question.html
http://facweb.cs.depaul.edu/yele/Course/IT215/Chapter%2009.ppt#
570,41,System Changeover
http://gauravgupta28.wordpress.com/
http://www.cioupdate.com/reports/article.php/2202921/Post-
Mortems-Key-to-Successful-Future-Projects.htm
http://www.cis.gsu.edu/~mkeil/cis8150/post-project%20audits.pdf