Notes Lecture9
Notes Lecture9
Lecture # 9
Outline
Chapter 25 – risk management (contd)
Risk Identification
Risk Components and Drivers
Risk Projection
Developing a Risk table
Assessing risk impact
Risk Refinement
What is RMMM?
RMMM Plan
Risk Components and Drivers (1)
The U.S. Air force has published an excellent
guideline for software risk identification and
abatement.
Their approach requires project manager to
identify risks drivers that affect software risk
components
Following are the Risk Components
Performance
Cost
Support
Schedule
Risk Components and Drivers (2)
These risk components are defined as follows in
context of these guidelines:
Performance risk
The degree of uncertainty that the product will meet its
requirements and be fit for its intended use
Cost risk
The degree of uncertainty that the project budget will be
maintained
Support risk
The degree of uncertainty that the resultant software will
be easy to correct, adapt and enhance
Schedule risk
The degree of uncertainty that the project schedule will be
maintained and that the product will be delivered on time
Risk Components and Drivers (3)
The impact of each risk driver on the risk
component is determined. This impact can
be any of these four impact categories
Negligible
Marginal
Critical
Catastrophic
Risk Projection (1)
Risk Projection is also known as Risk Estimation
Risk projection rates each risk in two ways:
the probability that the risk is real and
the consequences of the problems associated with the
risk, should it occur
4 Risk projection steps performed by project
planner along with other managers & tech staff
1. Establish a scale that reflects the perceived likelihood of a
risk
2. Delineate the consequences of the risk
3. Estimate the impact of the risk on the project and the
product
4. Note overall accuracy of the risk projection so that there
will be no misunderstandings
Risk Projection (2)
The aim of these steps is to eventually
determine prioritization of the risk
By prioritizing risks, the software team can
allocate resources where they will have the
most impact.
Developing a Risk Table (1)
A risk table provides a project manager with a
simple technique for risk projection (estimation)
The risk table can be implemented as a spread
sheet model (enabling easy manipulation & sorting
of entries)
The table has the following content:
1st column: list of all risks
2nd column: categorization of risks, e.g., PS
(Project Size risk), BU (Business risk)
3rd column: probability of risk occurrence
4th column: risk impact category
determined by averaging the impact categories of the 4
risk components – performance, support, cost, schedule)
Developing a Risk Table (2)
After the first four columns are completed, the table is
sorted by probability and by impact.
High probability and high impact risks move to the top
of the table and low ones drop to bottom
Project Manager studies the resultant (1 st order risk
prioritization) table and defines a cutoff line.
Risks above the cutoff line must be managed
Risks below cutoff line are reevaluated for 2nd order
prioritization.
5th column: contains a pointer into a Risk Mitigation,
Monitoring and Management Plan (RMMM) or
alternatively, a collection of risk information sheets
developed for all risks above the cutoff
Assessing Risk Impact
If a risk does occur, then the consequences (that are likely)
are affected by 3 factors
nature of risk
scope (severity & its distribution) of risk
timing of risk
Following are the recommended steps to determine overall
consequences of risk
Determine the avg probability of occurrence value for each risk
component
Using impact assessment (fig. 25.1), determine impact for each
component based on the criteria.
Complete the risk table & analyze the results as described in the
preceding sections.
The overall risk exposure RE is determined using the
following relationship:
RE = P x C
where P = probability of occurrence for risk
C = cost to the project, if risk occurs
Risk Refinement (1)
During early stages of the project, a risk is
stated generally
As time passes, learning about project work
and related risks improves
Hence, risks stated earlier can be refined,
making them more detailed so that they are
easier to handle
Risk can be represented in condition-transition-
consequence (CTC) format
Given that <condition> then there is a concern that
(possibly) <consequence>
Risk Refinement (2)
Example:
Given that all reusable components must conform to specific design
standards and that some do not conform, then there is a concern that
possibly only 70 percent of the planned reusable modules may actually
be integrated into the as-built system, resulting in the need to custom
engineer the remaining 30 percent of components
Refinement:
Subcondition1
Certain reusable components were developed by a third party with no
knowledge of internal design standards
Subcondition2
The design standard for component interfaces has not been solidified and
may not conform to certain existing reusable components
Subcondition3
Certain reusable components have been implemented in a language that is
not supported on target environment
The consequence (of custom engg of 30% components) remains
same for all refined subconditions but refinement helps in easy risk
analysis
What is RMMM?
RMMM = Risk Mitigation, Monitoring and
Management
An effective strategy to deal with risks must
consider issues such as:
Risk avoidance
Risk monitoring
Risk management and contingency planning
RMMM steps incur additional project cost
Example Scenario of a RISK…
Scenario
Assume that high staff turnover is a project risk r1.
Based on past history, the likelihood l1, of high turnover is
estimated to be 70%
The impact x1, is projected as critical
So, high turnover will have a critical impact on project cost
and schedule
Steps to mitigate r1:
Meet the staff to find the causes of turnover (poor working
conditions, low pay, etc.)
Try to reduce the causes of turnover (if possible) before
project starts
Once project starts, assume turnover will occur and
develop techniques to ensure continuity when people
leave
Example Scenario of a RISK…
Organize project teams so that information about each
development activity is widely dispersed.
Define documentation standards & establish mechanisms
to ensure that documents are timely developed.
Conduct peer reviews of all work.
Assign backup staff member for every critical technologist.