Skip to:Content
|
Bottom
Cover image for Applied software risk management : a guide for software project managers
Title:
Applied software risk management : a guide for software project managers
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach/Taylor & Francis, 2007
ISBN:
9780849305245

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010132689 QA76.76.D47 P364 2007 Open Access Book Book
Searching...
Searching...
30000010196979 QA76.76.D47 P364 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis.

Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.

Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.


Author Notes

Pandian\, C. Ravindranath


Table of Contents

1 Risk Culturep. 1
1.1 Risk Thinkingp. 1
1.2 What Is Risk?p. 2
1.3 A Boundary Problemp. 3
1.4 Expressing Risk: The Basic Termsp. 6
1.4.1 Additional Termsp. 6
1.5 Risk Vocabularyp. 6
1.6 Risk-Driven Project Managementp. 7
1.6.1 Project Visibilityp. 7
1.6.2 Goal Settingp. 7
1.6.3 Product Developmentp. 7
1.6.4 Developmentp. 8
1.6.5 Maintenancep. 9
1.6.6 Supply Chainp. 9
1.7 Controlling the Process, Environment, and Riskp. 10
1.7.1 Process Management and Risk Managementp. 10
1.7.2 SPC and Riskp. 10
1.7.3 Five S and Riskp. 10
1.7.4 Defect Prevention and Risk Managementp. 11
1.8 Maturity in Risk Culturep. 11
1.9 Risk Scalep. 13
1.9.1 Case Studyp. 14
1.9.1.1 Background Datap. 14
1.9.1.2 Commentsp. 14
1.9.1.3 What Do We Learn from This Example?p. 15
1.10 Preparing for Riskp. 15
1.10.1 Peoplep. 15
1.10.2 Communicationp. 16
1.10.3 Body of Knowledgep. 16
1.10.4 Metricsp. 16
1.10.5 Estimation Modelsp. 17
1.10.6 Detailed Planningp. 17
1.10.7 Effective Defect Managementp. 17
2 Risk Management Processp. 19
2.1 What Is Risk Management?p. 19
2.1.1 Risk or Opportunity?p. 20
2.2 Risk Management Paradigmsp. 21
2.3 Is There a Process?p. 23
2.4 In Real Lifep. 23
2.5 Five Models for Risk Managementp. 24
2.5.1 The Core Modelsp. 24
2.5.2 Superstructure Modelsp. 24
2.5.3 Application of the Modelsp. 24
2.6 Model 1: The Organic Risk Management Processp. 25
2.6.1 An Analogyp. 25
2.6.2 Commentsp. 26
2.7 Model 2: Goal Selectionp. 26
2.8 Thinking about Less Risky Alternativesp. 27
2.8.1 Category 1 Risk-Informed Project Objectivesp. 27
2.8.2 Category 2 Risk-Informed Product Goalsp. 27
2.8.3 Category 3 Risk-Informed Requirement Managementp. 27
2.8.4 Category 4 Risk-Informed Milestone. Designp. 28
2.8.5 Category 5 Risk-Informed WBSp. 28
2.9 Model 3: Minimum Risk Managementp. 28
2.9.1 Creating Risk Awareness Is Risk Managementp. 29
2.10 Model 4: Medium-Scale Risk Managementp. 29
2.10.1 Risk Management Is Acting upon Risk Awarenessp. 31
2.11 Model 5: IAMT Cyclep. 31
2.12 Model 6: Full-Scale Risk Managementp. 31
2.12.1 Initiative 1p. 33
2.12.2 Initiative 2p. 33
2.12.3 Initiative 3p. 33
2.13 Risk Management at Different Levelsp. 33
2.13.1 The Mixupp. 35
2.13.2 External Risks and Layersp. 35
2.13.3 Can We Manage Subprocess Risks?p. 35
2.13.4 Project-Level Risk Managementp. 36
2.13.5 Program-Level Risk Managementp. 36
2.13.6 SBU-Level Risk Managementp. 36
2.13.7 Enterprise Risk Managementp. 36
2.14 Risk Escalationp. 37
2.14.1 Risk Elevationp. 37
2.14.2 Troubleshooting Movep. 37
2.14.3 Lack of Cooperationp. 38
3 Risk Attributesp. 41
3.1 Risk Classificationp. 41
3.2 Risk Attributesp. 41
3.3 Risk Originp. 44
3.3.1 Internal Risksp. 44
3.3.2 External Risksp. 44
3.3.3 Drawing the Boundary Line between Internal and Externalp. 44
3.3.4 Break Boundaries Withinp. 45
3.3.5 External Risks: A Class Apartp. 45
3.3.6 Vendor Risksp. 46
3.4 Screening the Risksp. 46
3.4.1 Hazard Risksp. 46
3.4.2 Constraint Risksp. 47
3.4.3 Nominal Risksp. 47
3.4.4 Trivial Risksp. 47
3.5 Three P'sp. 47
3.5.1 Project Risksp. 48
3.5.2 Process Risksp. 49
3.5.3 Product Risksp. 49
3.6 Risk Severityp. 50
3.7 SEI Risk Taxonomyp. 51
3.8 Risk Levelsp. 52
3.9 Time Elementp. 52
3.10 Affected Process Areasp. 54
3.11 Affected Key Result Areas (KRA)p. 54
3.12 Affected Goalsp. 54
3.13 Affected Requirementsp. 54
3.14 Risk Namep. 54
3.15 Who Will Assign the Attributes?p. 55
3.15.1 Extension of Attributesp. 55
3.15.2 Risk Record Structurep. 55
3.15.3 Risk Classification Is Risk Measurementp. 56
4 Risk Identificationp. 57
4.1 The Meaning of Risk Identificationp. 57
4.2 Risk Identification Methodsp. 58
4.2.1 Type I: Intuitive Methodsp. 59
4.2.1.1 Mind Mappingp. 59
4.2.1.2 Brainstormingp. 60
4.2.1.3 Out-of-the-Box Thinkingp. 60
4.2.1.4 Analogyp. 61
4.2.2 Type I: History-Based Methodsp. 61
4.2.2.1 Top Ten Risksp. 61
4.2.2.2 Risk Checklistp. 63
4.2.2.3 Taxonomy-Based Questionnairep. 63
4.2.3 Type II: Project-Specific Risk Identificationp. 65
4.2.3.1 Phase I: Context Settingp. 65
4.2.3.2 Phase II: Data Gatheringp. 65
4.2.3.3 Phase III: Risk Discoveryp. 67
4.2.3.4 Phase IV: Assigning Attributesp. 69
4.2.3.5 Phase V: Validationp. 70
4.2.3.6 Phase VI: Listp. 72
4.3 Levels in Identificationp. 72
4.3.1 Process-Level Risk Identificationp. 72
4.3.2 Project-Level Risk Identificationp. 72
4.3.3 Enterprise-Level Risk Identificationp. 72
4.4 Identifying Product Risksp. 73
4.4.1 Distinguishing Product Risks from Process Risksp. 73
4.4.2 Distinguishing Product Risks from Product Defectsp. 73
4.4.3 Product Risk Management versus Defect Managementp. 74
4.5 Implementing Risk Identification Processesp. 74
5 Risk Analysisp. 81
5.1 Scope and Purpose of Risk Analysisp. 81
5.1.1 Bias for Actionp. 81
5.1.2 Risk Selectionp. 82
5.1.3 Types of Risk Analysisp. 82
5.2 First-Order Analysisp. 83
5.2.1 Analysis 1: Risk Screeningp. 83
5.2.2 Analysis 2: Quadrant Mapp. 84
5.2.3 Analysis 3: Top Ten Risks Listp. 86
5.3 Useful Risk Distribution Analysisp. 87
5.3.1 Analysis 4: Internal-External Risk Distributionp. 87
5.3.2 Analysis 5: Project, Product, Process Risk Distributionp. 88
5.3.3 Analysis 6: Process Risk Signaturep. 88
5.3.4 Analysis 7: Time Analysisp. 89
5.3.5 Analysis 8: Causal Analysisp. 90
5.4 Seeing the Larger Picturep. 92
5.4.1 Analysis 9: The Process Mapp. 92
5.4.2 Analysis 10: Performance Area Mapp. 93
5.5 Risk Levels and Analysis Effortp. 93
5.6 Ownerless Risksp. 94
5.7 Putting Together the Preliminary Analysesp. 94
5.8 The Analysis Reportp. 94
5.9 More Analysisp. 95
5.10 How to Implement Analysisp. 95
6 Responding to Riskp. 97
6.1 Getting Started 7p. 97
6.2 Special Treatment for Catastrophic Risksp. 98
6.2.1 Communicate Risksp. 98
6.2.2 Find Solutionsp. 98
6.2.3 Carry People Alongp. 99
6.2.4 The Action Planp. 99
6.2.5 Organizational Response to Hazardp. 100
6.2.6 Fallacy of Risk Ranksp. 100
6.2.7 Beyond Statisticsp. 100
6.3 The Constraint Risksp. 100
6.4 Responding to Ordinary Threatsp. 101
6.5 A Comparison of Two Levels of Responsep. 101
6.6 Risk Response Plansp. 102
6.7 Risk Avoidancep. 102
6.8 Risk Transferp. 102
6.9 Risk Acceptancep. 103
6.10 Risk Monitoringp. 103
6.11 Risk Mitigationp. 103
6.11.1 The Questionsp. 104
6.11.2 A Risk Mitigation Plan Case Studyp. 105
6.12 Contingency Plansp. 107
6.12.1 Continuous Monitoringp. 107
6.12.2 Triggersp. 107
6.12.3 The Onsetp. 108
6.13 Strategic Planp. 109
6.14 Risk Escalationp. 109
6.15 Implementing Risk Responsep. 110
6.15.1 Suggestionsp. 112
7 Risk Trackingp. 113
7.1 What Do We Track in Risks?p. 113
7.2 A Moving Targetp. 113
7.3 Tracking Risk Response Plansp. 114
7.4 Tracking the Bigger Response: Auditsp. 115
7.5 Tracking Hazard Risksp. 116
7.6 Trigger Levelsp. 116
Case Study: How Wrong Triggers Fail Risk Managementp. 117
7.7 Tracking Project Risksp. 118
7.7.1 Tracking until Project Endsp. 118
7.7.2 Milestone Risk Reviewp. 119
7.7.3 Performance Targets and Risksp. 119
7.8 Tracking Operational Risksp. 119
7.8.1 Tracking Risk Exposurep. 119
7.8.2 Categorywise RENp. 120
7.8.3 Risk Metricp. 120
7.8.4 Risk Closurep. 120
7.9 Tracking Enterprise Risksp. 120
7.10 Learning by Trackingp. 121
7.10.1 Tracking Improves Risk Managementp. 121
7.10.2 Surprisesp. 121
7.10.2.1 Surprise 1: No Real Riskp. 122
7.10.2.2 Surprise 2: Other Forces in Actionp. 122
7.10.2.3 Surprise 3: True Risk Definitionp. 122
7.11 Risk Tracker Toolp. 122
7.12 The Hardening of Risksp. 123
7.12.1 Hardening of Business Risksp. 123
7.12.2 Hardening of Product Risksp. 124
7.12.3 Hardening of Process Risksp. 125
7.12.4 Hardening of Project Risksp. 125
7.13 Implementing Risk Trackingp. 125
7.13.1 Suggestionsp. 125
8 Risk Modelsp. 127
8.1 Why Models?p. 127
8.1.1 Models Connectp. 127
8.1.2 Models Enable Risk Discoveryp. 127
8.1.3 Models Integratep. 128
8.1.4 Models Give Visibilityp. 128
8.1.5 Types of Modelsp. 129
8.2 Simple Risk Modelsp. 129
8.2.1 Matrix Modelsp. 129
8.2.2 Tree Modelsp. 130
8.2.3 Failure Mode Effects Analysis (FMEA)p. 132
8.2.3.1 Managing Product Risk Using FMEAp. 134
8.2.4 Affinity Diagramp. 137
8.2.5 Risk Linep. 139
8.2.6 Probability Density Function (pdf)p. 140
8.2.7 Risk Simulationp. 142
8.3 Implementing Risk Modelsp. 143
9 Risk Intelligencep. 145
9.1 Natural Warning Systemsp. 145
9.2 Metrics Modelsp. 146
9.2.1 Metrics Choicep. 146
9.2.2 Product Risk Metrics: An Examplep. 146
9.2.3 Early Indicatorsp. 147
9.2.4 Control Chartsp. 147
9.2.5 Scorecardp. 147
9.3 Earned Value Modelp. 148
9.4 Estimation Modelp. 149
9.4.1 Using COCOMO to Study Riskp. 149
9.5 Requirement Modelp. 151
9.5.1 Kano Modelp. 151
9.6 Critical Path Modelp. 154
9.7 WBS Modelp. 156
9.8 PERT Model of Riskp. 157
9.8.1 Task Network Scenario Ap. 157
9.8.2 Task Network Scenario Bp. 157
9.8.3 Task Network Scenario Cp. 158
9.9 Implementing Risk Intelligencep. 159
10 Feed Forwardp. 161
10.1 Beyond Risk-Reportsp. 161
10.2 Passing Knowledge Forwardp. 162
10.3 Risk Communication: The Critical Needp. 163
10.4 Ten Barriers to Risk Communicationp. 164
10.5 Risk Dashboardp. 165
10.5.1 Traffic Lightsp. 165
10.5.2 Risk Scorecardp. 166
10.6 Analytical Viewsp. 166
10.7 Use of Modelsp. 167
10.8 The Toolp. 167
10.8.1 Risk Reportsp. 169
10.9 Risk Closure Reportp. 170
10.10 Better Than SPCp. 171
10.11 Incorporating FFL in Risk Managementp. 171
11 Integrated Risk Managementp. 173
11.1 Economy Drivep. 173
11.1.1 A Problemp. 173
11.1.2 The Need for an Integrated Approachp. 173
11.1.3 Interfacesp. 174
11.1.4 Collaborationp. 174
11.2 The Visible and the Invisiblep. 175
11.2.1 Two Worldsp. 175
11.2.2 Connecting Threadsp. 175
11.2.3 An Examplep. 176
11.3 The Positive and the Negativep. 176
11.4 Program-Level Integrationp. 177
11.4.1 Artifacts for Risk Integrationp. 177
11.4.2 Decision Analysisp. 178
11.5 Strategic Business Unit (SBU)-Level Integrationp. 178
11.6 Enterprise-Level Integrationp. 178
11.7 Integrated Plansp. 178
11.7.1 Transfer to Other Plansp. 179
11.8 Integrated Risk Management: An Agile Processp. 179
11.9 How to Establish Integrated Risk Managementp. 180
12 Risk Management: Draft Proceduresp. 183
12.1 Can There Be a Procedure?p. 183
12.1.1 Dangers of the Stereotypep. 183
12.1.2 Procedure Is Only a Toolp. 183
12.1.3 Risk Is a Gamep. 184
12.2 The Risk Arenap. 184
12.3.1 Culture versus Procedurep. 184
12.3 Symptoms of Not Having a Formal Risk Management Procedurep. 184
12.4 The Anatomy of a Risk Management Procedurep. 185
12.4.1 Evolutionp. 185
12.4.2 Empathetic Initiativep. 186
12.4.3 The Layersp. 186
12.5 For Whom?p. 186
12.6 Implementing the Proceduresp. 187
12.7 Procedure 1: Risk Management at Project and Operations Levelp. 188
12.8 Procedure 2: Enterprise Risk Managementp. 196
Appendix A Caper Jones's Riskp. 203
Appendix B Rex Black's Quality Risk Listp. 205
Appendix C SEI Risk Taxonomyp. 207
Appendix D Top N Software Risksp. 211
Appendix E PMI, Risk Management Processp. 213
Appendix F IRM, Risk Management Standardp. 217
Appendix G Continuous Risk Management (CRM) Paradigmp. 219
Appendix H Barry Boehm's Risk Management Processp. 221
Appendix I Risk Management in CMMip. 223
Appendix J Requirement Risk versus Measurable Quality Attributesp. 225
Appendix K Diary of a Risk Managerp. 227
Risk Glossaryp. 237
Referencesp. 239
Indexp. 243
Go to:Top of Page