Software Development Risk

Size: px
Start display at page:

Download "Software Development Risk"

Transcription

1 Software Development Risk Assessment: A multidimensional, Quantitative & Continuous Approach Theme: STRATEGIC & INNOVATIVE PRACTICES PORTFOLIO, PROGRAMS & PROJECT (PPP) MANAGEMENT FOR REDEFINING INDIA 6/18/2015 PMI India National Conference 2015 Mona Mahatha

2 Abstract Software Risk management has emerged as one of most critical areas of project management and indicator of project outcome. Formal risk analysis and management is a key focus area for project managers these days as it is intended to yield significant benefits and determine project success. Risks are also inevitably linked to cost. In large and complex projects, risks linked additional costs assume higher magnitude and are seen to have considerable impact on project budgets. In actual practice of risk management, the focus and effort is more on identifying comprehensive set of risk factors, creating mitigation and/or contingency plans to manage these risks, and there is considerably lesser understanding and practice of evaluating costs linked to risks and monitoring these costs over the risk management cycle. This paper intends to fulfill this gap by providing project managers with a re-usable, intuitive and easy to use framework to enable them to list software project risk factors, to categorize risks as per their dominant risk outcomes and evaluate associated cost impacts quantitatively and continuously over the project life-cycle. Monitoring and recording absolute impact of risks will also help create an organizational baseline and valuable database to assess risk linked costs and utilizing it for more realistic effort estimations for later projects or release cycles. Keywords Software Risk Management, Software Risk Assessment, Risk Assessment Framework, Risk Exposure

3 Contents 1 Introduction Risks & Risk Management: Background and related studies Risk Impact Assessment Challenges in Risk Assessment and Recommendations in Proposed framework Determining combined risk exposure of project in view of overlapping or linked risk events Distinction between current and incurred risk exposure in projects Integrating multiple impact dimensions of risks Proposed Risk Assessment Framework Summary & Conclusion References... 14

4 1 Introduction Software development projects are endeavors which involve interaction of several human and non-human factors leading to complex inter-dependencies and making them susceptible to failures. It is also observed that despite growing levels of project management maturity and evolution of varied project management models, a software project s predictability remains elusive and impacted by certain events that can change the course of project execution and its outcome. As a result several software projects suffer multiple points of failures such as schedule slippages, cost overruns or failures to meet their project goals[7]. Chaos Report of 2009 (The Standish Group 2009), finds that only 32% of the software projects are successful (i.e., delivered on time, within budget & with quality) and the trend remains the same throughout the decade from Year 2000 to 2009[9]. Thus, it becomes critical to have enhanced focus on timely identifications of factors that can impact project, their realistic assessment in terms of its impact on project and identifying action plans which contain their impacts. Risk Identification, assessment and tracking are usually the scope of software risk management. Software risk management helps identify all such factors which can impact project outcomes, assess their impacts and plan for addressing these factors so that their negative impacts on project outcomes can be nullified or minimized. It is important to evaluate the overall risk exposure to the project in terms of some critical dimensions like costs, time and customer satisfaction. Due to its close linkage with project outcomes, software risk management is one of the most widely researched topics of software engineering by both researchers of software engineering and practitioners in industry. But while there have been many studies around the initial phase of risk identification, there are relatively lesser incidences of studies indicating methods for assessment of risk impacts on project outcomes. The objective of this paper is to focus on this gap and present a method of impact assessment of risk factors in quantitative terms wherever possible. The effect of risk factors on project in quantitative terms will help in better prioritization and planning leading to more favorable project outcomes. The paper is organized as follows: section 1 provides a brief background & overview of the current state of risks and risk management approaches, section 2 explains the risk assessment methodology, section 3 illustrates the challenges faced in risk assessment and recommendations presented in this paper, section 4 illustrates framework with a reference, and finally section 5 highlights the key differentiation and benefits of utilizing this framework.

5 2 Risks & Risk Management: Background and related studies Software risks are incidents that endanger a successful development process leading to wrong or inadequate software operation, software rework, implementation difficulty, delay or uncertainty [7]. In one of the pioneering studies done by Boehm identified following 10 key risks faced by software projects. After this pioneering study by Boehm, more studies have been done to identify the various risks sources and critical risks that can impact the outcomes of project. These studies were done by eminent scholars in this area and these studies have focused on identifying latest risk factors based on extensive surveys done on experiences of project managers and IT projects. It has helped identify checklists for risks and their categorization across key dimensions like people, management, business, technology, tools etc. These studies have also lead to identification of context specific risk factors such as those applicable in off shoring /outsourcing models, risk factors from different perspectives customer side or vendor side perspective. These checklists are useful as they help identify potential risks common to new projects at their start; however it is also worthwhile to note that software risks lists and their impact factors have changed over time owing to changing contexts, processes and evolution of technologies as well as changing cultural dynamics. Some process based risk management frameworks are the Software Engineering Institute (SEI) Technical Report [2], the capability maturity model integration, CMMI Institute (CMMI 2010), and PMBOK formulated by Project Management Institute. As per PMBOK and most other process based models of risk management, key processes associated with risk management are risk assessment & risk control. Risk assessment includes risk identification, qualitative and quantitative analysis and prioritization. Risk control includes risk management planning, risk monitoring and risk resolution. Further risk management planning strategies are varied including those of transferring the risk, avoiding the risk, reducing the negative effect of risk or at times accepting some of the risk. These are different choices depending on project situations and types of risks (positive or negative risks) However in this paper we shall focus more on risk impact assessment, its analysis and integration to risk management framework to allow for better evaluation of impacts of risks on project outcomes. 3 Risk Impact Assessment A risk assessment method is used to quantify the degree of importance of software risks to project performance. Most commonly risk impact is measured in terms of exposure to specific factors that present a threat to achieving the expected outcomes of a project. On this basis, risk in software projects is usually defined as the probability-weighted impact of an event on a project. Risk exposure is usually measured in dollars or time in software projects for effort/cost and schedule linked risks respectively.

6 Risk Exposure (Risk Event) = Probability (Risk Event) * Loss (Risk Event) For a project facing a number of risk events/factors, the individual impacts for each risk event can be calculated by assessing their individual probabilities of risk factors and associated costs. A summation of these risk impact values derived from all risk events facing the project will provide overall risk exposure of the project. Risk Exposure = Σ risk events [Probability (Risk Event) * Loss (Risk Event)] The project manager attempts to identify all potential risk events at the start of the project. The risk exposure for each event is then estimated and the exposures are quantified. Risk mitigation strategies/contingency plans are developed to control and manage the risks or reduce their risk exposures. Realization of a risk is often recognized through the onset of a predefined risk trigger or the reaching of a predetermined risk threshold, at which time predefined contingency plans are activated to minimize the impact Three well-known software risk assessment methods in the literature are PRA, SRE, SERIM and DoD Guide. Probabilistic Risk Assessment (PRA) is a systematic and comprehensive methodology to evaluate risks associated with a complex engineered technological entity (such as an airliner or a nuclear power plant). In a PRA, risk is characterized by two quantities: the magnitude (severity) of the possible adverse consequence(s), and the likelihood (probability) of occurrence of each consequence. Consequences are expressed numerically (e.g., the number of people potentially hurt or killed) and their likelihoods of occurrence are expressed as probabilities or frequencies (i.e., the number of occurrences or the probability of occurrence per unit time). The total risk is the expected loss: the sum of the products of the consequences multiplied by their probabilities. However this model is criticized for it cannot account for the indirect, non-linear, and feedback relationships that characterize many accidents in complex systems The Software Risk Evaluation (SRE) method was developed by the Software Engineering Institute (SEI) to identify, analyze, and develop mitigation strategies for controlling risks. SRE Method, describes the rating of the probability of occurrence on a scale of one to three, while the impact was defined by four components: cost, schedule, support and technical performance

7 Software Engineering Risk Management (SERIM) is used to predict risks and to provide corrective action in the software development phase. The SERIM identified 10 software risks and came up with 81 related questions that contained metrics to measure the software risks. The relationship between software risks were identified using three of the risk elements: cost, schedule and technical performance The Risk Management Guide for DOD Acquisition (2003), released by the Secretary of Defense and the Defense Acquisition University (DAU), proposed a risk process model for how an organization identifies, assesses, and manages risks during software development. In this method, five levels were identified to assess the probability of occurrence of software risks namely, Remote, Unlikely, Likely, Highly likely and Near certainty. The impact of software risks represents the degree of influence on project performance. The types of impact of software risks on project performance in the DoD Guide includes technical performance, cost, schedule and team RiskAoA is United States Department of Defense (USDoD) project Risk Management tool, allowing the instantaneous review of portfolio (see Project Portfolio Management), proposal or alternatives Risk. RiskAoA is proprietary to the United States Government and is generally used for evaluation of alternatives and capital planning decisions. Of all the risk management frameworks, the RiskAoA seems most advanced from its brief description available publicly, however it is proprietary and not available for common use. 3.1 Challenges in Risk Assessment and Recommendations in Proposed framework The simple approach of quantifying risk impact by the use of probability of risk event and risk costs, though useful as starting base for identifying a project s risk exposure is beset with few challenges and problems which need to be addressed to arrive at a more realistic quantification of risk exposure facing the project. This section presents some of the common challenges and recommendations from the framework proposed in this paper Determining combined risk exposure of project in view of overlapping or linked risk events. In situations where most of the risk events are completely independent, combined risk exposure can be calculated by adding the risk exposure of individual risk events. However in practical situations not all risk events are independent and simple summation of all risk exposures to determine overall risk exposure

8 will give an erroneous picture. Thus challenge is in determining ways to combine risk impacts from individual risk events and arrive at overall project risk exposure that reflects the project situation more accurately. This kind of relationship is also explored in ProRisk framework [6], however this paper augments it further by illustrating additional risk relationship types. To explain the linkages between risk events, some illustrative cases are given as below:- Some risk events may be overlapping in risk effects For example: - A risk event linked to loss of key personnel of project may lead to deficient design and further defects from final testing phase. Thus if three risk items are defined viz. Loss of Key personnel mid-way in project, decrease in problem fixing rate and defects from final testing phase, the risk exposure due to each of these risk events may vary, but since due to their overlapping nature, further evaluation is needed to understand the extent of linkage between these three risks Loss of key personnel More defects from final testing phase Decrease in problemfixing rate Risk Exposure due to above risks is to be calculated as sum of individual risk exposures and adjusted by effect of common risk exposure due to their overlapping effect. Risk Exposure = Σ Risk Exposure (all overlapping risks) Common risk exposure of overlapping risks. Some risk events may be related and may get subsumed in some other risks. For example: In the event of two risks, one linked to unavailability of test equipment in lab and other linked to availability of a specific lab equipment, it is apparent that this case unavailability of lab is primary risk which if materializes renders the second risk linked to unavailability of a test equipment inconsequential.

9 Unavailability of lab Unavailbility of a specific test equipment In the above case, total risk exposure due to risks falling in this category could be taken as the risk exposure due to the main container risk. However if the main container risk is managed and its risk exposure decreases to the level of individual contained risk events, then it is better to discard this relationship and start treating these risks as individual risk events for the purpose of calculating their combined risk exposure. Risk Exposure = Probability (Container Risk) * Risk Cost (Container Risk) Assuming that both risk cost and probability of container risk is higher than that of contained risks. Some risk events may be dependent on other risk events as pre-conditions. For example risk events customer raises on-site support requirement and on-site support travel impeded due to visa regulations have conditional relationship. The risk of on-site support travel being impacted due to visa regulations arises only if the earlier risk of customer raising on-site support requirements materializes. Customer raises on-site support requirement on-site support impeded by visa regulations In the above case, risk exposure of contingent risks should be determined using the principles of conditional probabilities i.e probability of contingent risk is conditional to its pre-condition risk. Risk Exposure = Probability (Conditional Risk Pre-condition Risk)*Risk Costs (Conditional Risk) Recommendation in proposed framework in this paper is to evaluate risks linkages by creating risk and effects dependency models/graphs (as suggested in few examples above). Modeling multiple risk

10 events in such graphs, would help cluster risks in few specific categories and deal with their risk impacts accordingly. The possible categories are:- Fully independent risks A set of orthogonal risks whose risk impacts can simply be added, Partially overlapping risks These have partially overlapping effects and for overall risk exposure the risk exposure due to interfering portion should be quantified and not double accounted. Container risks These risks are umbrella risk which if materialized will render many other smaller related risks inapplicable. Thus for project risk exposure purposes, only the larger of the risk effect of main container risk should be considered. As the exposure of umbrella risk reduces, the individual risk effects of risks contained within umbrella risks should be monitored and should separately quantified. Conditional risks These risks are contingent to materialization of some other risk events. Thus their risk exposure is to be determined based on conditional probabilities of the risk event Distinction between current and incurred risk exposure in projects Typically risk exposure is derived from magnitude of risk events facing the project and is combined to provide the current risk exposure. The assessment of risk exposure is generally done for evaluation of impact due to risks yet to be faced by projects, but the evaluation of costs incurred due to risks to which projects was already exposed needs to be quantified and tracked too. Recommendation in proposed framework includes two metrics to be concurrently monitored in the framework by projects managers. Future Risk Exposure (FRE): Indicates the total probabilistically evaluated risks which may yet materialize in project. Materialized Risk Exposure (MRE): Indicates the impact of risks already materialized and impacted the project. This may be on account of o Risks which were accepted in the project risk and their risk impact has added to project costs o Risks which were handled through risk mitigation or contingency plan. The cost of risk mitigation and contingency efforts needs to be included as part of MRE.

11 The proposed framework suggests continuous tracking of both these metrics. Initially all risks would be indicated as future risk exposure (FRE) and gradually as risks materialize, materialized risk exposure (MRE) would start increasing and FRE should decrease. Total Project Risk Exposure = MRE + FRE The above risk exposure indicates a more comprehensive view of impact of all risks current and past faced by project. The framework proposes continuous evaluation of these metrices on weekly (or as necessary) for the project, and ensure that as project progresses future risk exposure is on decline as that shall highlight the efficacy of risk management strategies undertaken in project. MRE is likely to increase as project progresses; however it should be project manager s endeavor to minimize MRE to minimize additional actual costs incurred in project due to risks management Integrating multiple impact dimensions of risks The main dimensions for management of a software development are with respect to its budget (cost), availability (schedule), quality, and some other key intangibles like customer satisfaction, business confidence. Likewise risks also have impacts along these multiple dimensions, but the magnitude or severity of impact may vary across these dimensions. Most of the risk assessment done is usually with respect to impact being measured in loss or additional cost due to risk. This approach makes the impact linked to schedule delays, or customer satisfaction becoming obscure and less prominent as compared to risks whose impact can be quantified in terms of cost. Recommendation in proposed framework: In order to have a balanced perspective of risk impacts, the framework proposes that all risk be evaluated in terms of cost, schedule and intangible impacts such as

12 customer satisfaction. Risk assessment from different perspectives is also explored in ProRisk framework [6], however it does not make it clear whether each risk needs to be categorized on only one dimension. The framework here allows a risk to be categorized along multiple dimensions and risk exposure from each dimension is evaluated separately. A risk may be evaluated to have impact on either one or more of these dimensions, and it should be noted. This makes it imperative that risk exposure will be measured in different units for these different dimensions. Risk impact on schedule Risk Exposure or Impact should be measured in terms of days Risk impact on budget Risk exposure or impact will be measured in terms of cost, as per usual assessment methods Risk impact on intangibles (quality/customer satisfaction) Risk exposure cannot be quantified in numeric scales and hence a Likert scale should be utilized ranking the risks on five-point or seven-point scale (eg: Very Low, Low, Med, High, Very High, Extra High) The distinction of risk impacts across multiple dimensions helps give a more holistic risk assessment and understanding to project management team to address the right areas for risks carrying both severe impacts by combining quantitative and qualitative aspects. 4 Proposed Risk Assessment Framework The proposed risk assessment framework with recommendations given in earlier section has been implemented using a simple excel based spreadsheet. The sheet is devised to be a comprehensive risk management sheet and is utilized for: Risk Identifications: All risks being faced or already faced by project are identified and captured in the sheet as risk events. Some key risks may result due to several constituent risk factors and thus all sub-risk factors are listed as risk causes. Risk Impact Key Area Categorization: As per recommendations of framework and to highlight all possible risk impacts, each risk is assessed for key risk dimension it may be impacting and those are listed (eg: cost, cost and schedule, cost and quality etc). Inter-risks Relationship Determination: All risk causes need to be examined with respect to other risks to determine inter-risk relationships. The risks need to be categorized as Independent, Container, Contained, Overlapping, Conditional and Pre-condition risks. It is important to identify which risks are overlapping with which other risks, also clearly note which risks are precondition to other conditional risks. Being a simple excel based tool, this implies that such

13 relationships are to be noted manually in sheet and this would be later used for determining combined risk exposure. Risk Probability Determination: Subjective assessment of each risk cause is recommended to be done by relevant SMEs (Subject Matter Expert). Delphi technique is recommended to get a more accurate assessment of probability of each risk situation occurring in project. Risk Impact Assessment: Individual risks are evaluated for applicable risk dimension (cost, delay etc) and their impact is to be quantified in monetary terms for cost or days for delay. For intangible aspects, qualitative scale is used. For quantitative impacts, based on risk linkages or inter-risks relationships determined earlier, combined risk exposure is calculated. Continuous Evaluation of Project Risk Exposure: Combined risk exposure is differentiated between incurred risk costs or impact and future risk exposure. This differentiation is used further to define risk management strategies for high and medium range risks in project. A reference excel based framework with proposed recommendations to arrive at more realistic and holistic risk assessment is provided. Sample_Risk_Assess ment 5 Summary & Conclusion The main objective of this paper was to focus on the area of risk impact assessment among all the areas of risk management. This area is not dealt so much in detail in the area of software risk management as compared to other area of risk identification and risk management strategies. While focusing on risk impact assessment, the paper deals with multiple challenges at conceptual level (detailed in section 3.1 above) and also provides a sample framework /template to manage these challenges at practical level (refer section 4 above). The key benefits that this framework provides:- Manage risks more holistically by providing flexibility to assess risk impacts on multiple dimensions (cost, schedule, customer satisfaction, quality etc.). Evaluate risk impact/exposure on project quantitatively by using classical probabilistic impact based assessment i.e PRA (Probabilistic Risk Assessment) method

14 Enhances above method by allowing exploration of inter-risk relationships/dependencies and adjusting risk exposure as per these relationships. Adjusted risk exposure is net risk costs or impact facing by project. Continuous risk assessment and clear distinction between already materialized risk exposure (MRE) and futuristic (yet to be borne) risk exposure (MRE). It helps in identifying correct risk management strategies to minimize future risk exposure to project. For practical evaluation of this framework, the framework was utilized for risk assessment in complex, fixed price software development projects with a scale of budget in millions Euros and duration of over one year as well, and managers using the framework found the assessment of risk exposure more objective, accurate and also helped give clear indication to management on efficacy of risk management strategies deployed in project by continuously evaluating risk impacts to projects. 6 References 1. Srikrishnan Sundararajan, Bhasi M., Pramod K.V., Empirical Study of Industry Practice in Software Development Risk Management, International Journal of Scientific and Research Publications, Volume 3, Issue 6, June ISSN Marvin J. Carr, Suresh L. Konda, Ira Monarch, F. Carol Ulrich, Clay F. Walker, Taxonomy Based Risk Identification, CMU/SEI-93-TR-006, Pittsburgh, PA, Software Engineering Institute, 1993, [SEI-93] 3. Barry W. Boehm, Tutorial: Software Risk Management, Les Alamitos, CA, IEEE Computer Society,1989, [Boehm-89] 4. Y.H. Kwak, J. Stoddard, Project risk management: lessons learned from software development environment, Technovation 24 (2004) Project Management Institute, A Guide to the Project Management Body of Knowledge (PMBoK), 3rd Ed. ANSI/PMI , PMI, Newton Square, PA, Geoffrey G. Roy, A Risk Management Framework for Software Engineering Practice 7. Boehm B., Software Risk Management: Principles and Practices. IEEE Software, Vol. 8 (1), 1991, pp Wallace L. and Keil M., Software Project Risks and Their Effect on Outcomes. Communications of the ACM Vol. 47(4), 2004, pp

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized

More information

SOFTWARE RISK MANAGEMENT

SOFTWARE RISK MANAGEMENT SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team westfall@idt.net PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic

More information

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : ens03dse@cs.umu.se Computing Science Department Umea University, Umea, Sweden Abstract. During software development,

More information

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco

More information

Risk Knowledge Capture in the Riskit Method

Risk Knowledge Capture in the Riskit Method Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili jyrki.kontio@ntc.nokia.com / basili@cs.umd.edu University of Maryland Department of Computer Science A.V.Williams Building

More information

Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management

Negative Risk. Risk Can Be Positive. The Importance of Project Risk Management The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests t of

More information

Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge

Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge 1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project

More information

CPM -100: Principles of Project Management

CPM -100: Principles of Project Management CPM -100: Principles of Project Management Lesson E: Risk and Procurement Management Presented by Sam Lane samlane@aol.com Ph: 703-883-7149 Presented at the IPM 2002 Fall Conference Prepared by the Washington,

More information

Palisade Risk Conference, 2014

Palisade Risk Conference, 2014 Advanced Risk Management to Improve Cost and Schedule Performance on EPC Projects Risk-Management Best Practices from Nuclear Experience Palisade Risk Conference, 2014 Sola Talabi PhD MBA MSc BSc RMP Project

More information

Fundamentals of Measurements

Fundamentals of Measurements Objective Software Project Measurements Slide 1 Fundamentals of Measurements Educational Objective: To review the fundamentals of software measurement, to illustrate that measurement plays a central role

More information

Software Risk Management Practice: Evidence From Thai Software Firms

Software Risk Management Practice: Evidence From Thai Software Firms , March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced

More information

Project Management. [Student s Name] [Name of Institution]

Project Management. [Student s Name] [Name of Institution] 1 Paper: Assignment Style: Harvard Pages: 10 Sources: 7 Level: Master Project Management [Student s Name] [Name of Institution] 2 Project Management Introduction The project management also known as management

More information

INTEGRATING CMMI MATURITY LEVEL-3 IN TRADITIONAL SOFTWARE DEVELOPMENT PROCESS

INTEGRATING CMMI MATURITY LEVEL-3 IN TRADITIONAL SOFTWARE DEVELOPMENT PROCESS INTEGRATING CMMI MATURITY LEVEL-3 IN TRADITIONAL SOFTWARE DEVELOPMENT PROCESS Dr. Reena Dadhich 1 and Ujala Chauhan 2 1 Associate Professor, Govt. Engineering College, Ajmer (RTU, Kota) reena.dadhich@gmail.com

More information

An Approach to Proactive Risk Classification

An Approach to Proactive Risk Classification An Approach to Proactive Risk Classification M.S. Rojabanu 1, Dr. K. Alagarsamy 2 1 Research Scholar, Madurai Kamaraj Universtiy, Madurai,India. 2 Associate Professor, Computer Centre, Madurai Kamaraj

More information

Measurement Information Model

Measurement Information Model mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides

More information

Using Rational Software Solutions to Achieve CMMI Level 2

Using Rational Software Solutions to Achieve CMMI Level 2 Copyright Rational Software 2003 http://www.therationaledge.com/content/jan_03/f_cmmi_rr.jsp Using Rational Software Solutions to Achieve CMMI Level 2 by Rolf W. Reitzig Founder, Cognence, Inc. Over the

More information

Leveraging CMMI framework for Engineering Services

Leveraging CMMI framework for Engineering Services Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering

More information

[project.headway] Integrating Project HEADWAY And CMMI

[project.headway] Integrating Project HEADWAY And CMMI [project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper

More information

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first

More information

Guidelines for a risk management methodology for product design

Guidelines for a risk management methodology for product design Guidelines for a risk management methodology for product design Viviane Vasconcellos Ferreira Federal University of Santa Catarina viviane@nedip.ufsc.br André Ogliari Federal University of Santa Catarina

More information

Project Risk Management

Project Risk Management Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

Project Management Challenges in Software Development

Project Management Challenges in Software Development Abstract Research Journal of Management Sciences ISSN 2319 1171 Project Management Challenges in Software Development Uma Sankar S.S. 1 and R. Jubi 2 1 Research and Development Centre, Bharathiar University,

More information

RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS

RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS ABSTRACT Emanuel Herteliu 1 Mihai Liviu Despa 2 This paper tackles the subject of risk management in the specific context of

More information

Risk Management Framework

Risk Management Framework Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT PROJECT RISK MANAGEMENT http://www.tutorialspoint.com/pmp-exams/project_risk_management.htm Copyright tutorialspoint.com Here is a list of sample questions which would help you to understand the pattern

More information

In control: how project portfolio management can improve strategy deployment. Case study

In control: how project portfolio management can improve strategy deployment. Case study Case study In control: how project portfolio can improve strategy deployment Launching projects and initiatives to drive revenue and achieve business goals is common practice, but less so is implementing

More information

Section 7 RFP reference: 7.2.7 Quality Assurance, Page 64

Section 7 RFP reference: 7.2.7 Quality Assurance, Page 64 Section 1 Transmittal Letter Section 2 Introduction (Executive Summary) Section 3 Summary of the Bidder s Understanding of the Project Scope Section 4 Bidder s Products, Methodology, and Approach to the

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Measurement Strategies in the CMMI

Measurement Strategies in the CMMI Measurement Strategies in the CMMI International Software Measurement & Analysis Conference 9-14 September 2007 Rick Hefner, Ph.D. Director, Process Management Northrop Grumman Corporation One Space Park,

More information

Risk Workshop Overview. MOX Safety Fuels the Future

Risk Workshop Overview. MOX Safety Fuels the Future Risk Workshop Overview RISK MANAGEMENT PROGRAM SUMMARY CONTENTS: Control Account Element Definition ESUA Form Basis of Estimate Uncertainty Calculation Management Reserve 1. Overview 2. ESUA Qualification

More information

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002 DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN April 2009 SLAC I 050 07010 002 Risk Management Plan Contents 1.0 INTRODUCTION... 1 1.1 Scope... 1 2.0 MANAGEMENT

More information

Step by Step Project Planning

Step by Step Project Planning Step by Step Project Planning Contents Introduction The Planning Process 1 Create a Project Plan...1 Create a Resource Plan...1 Create a Financial Plan...1 Create a Quality Plan...2 Create a Risk Plan...2

More information

White Paper from Global Process Innovation. Fourteen Metrics for a BPM Program

White Paper from Global Process Innovation. Fourteen Metrics for a BPM Program White Paper from Global Process Innovation by Jim Boots Fourteen Metrics for a BPM Program This white paper presents 14 metrics which may be useful for monitoring progress on a BPM program or initiative.

More information

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements. CAPACITY AND AVAILABILITY MANAGEMENT A Project Management Process Area at Maturity Level 3 Purpose The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision

More information

Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1. Ecole Centrale Paris, FRANCE

Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1. Ecole Centrale Paris, FRANCE INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1 1 Ecole Centrale

More information

A Taxonomy of Operational Risks

A Taxonomy of Operational Risks Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty

More information

SWEBOK Certification Program. Software Engineering Management

SWEBOK Certification Program. Software Engineering Management SWEBOK Certification Program Software Engineering Management Copyright Statement Copyright 2011. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Document Purpose The purpose of this document is to provide guidance on the practice of Quality Management and to describe the practice overview, requirements, best practices, activities, and key terms

More information

Incorporating Risk Assessment into Project Forecasting

Incorporating Risk Assessment into Project Forecasting Incorporating Risk Assessment into Project Forecasting Author: Dione Palomino Conde Laratta, PMP Company: ICF International - USA Phone: +1 (858) 444-3969 Dione.laratta@icfi.com Subject Category: Project

More information

IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security

IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment

More information

Checklist for Operational Risk Management

Checklist for Operational Risk Management Checklist for Operational Risk Management I. Development and Establishment of Comprehensive Operational Risk Management System by Management Checkpoints - Operational risk is the risk of loss resulting

More information

Assessing the Appropriate Level of Project, Program, and PMO Structure

Assessing the Appropriate Level of Project, Program, and PMO Structure PMI Virtual Library 2011 Daniel D. Magruder Assessing the Appropriate Level of Project, Program, and PMO Structure By Daniel D. Magruder, PMP Executive Summary Does your organization have in-flight projects

More information

IA Metrics Why And How To Measure Goodness Of Information Assurance

IA Metrics Why And How To Measure Goodness Of Information Assurance IA Metrics Why And How To Measure Goodness Of Information Assurance Nadya I. Bartol PSM Users Group Conference July 2005 Agenda! IA Metrics Overview! ISO/IEC 21827 (SSE-CMM) Overview! Applying IA metrics

More information

Blend Approach of IT Service Management and PMBOK for Application Support Project

Blend Approach of IT Service Management and PMBOK for Application Support Project Blend Approach of IT Service and PMBOK for Application Support Project Introduction: This paper addresses the process area, phases and documentation to be done for Support Project using Project and ITSM

More information

Issues in Information Systems

Issues in Information Systems TAXONOMY OF MULTIPLE LEVELS OF SWOT ANALYSIS IN PROJECT MANAGEMENT Ganesh Vaidyanathan, Indiana University South Bend, gvaidyan@iusb.edu Asghar Sabbaghi, Indiana University South Bend, sabbaghi@iusb.edu

More information

EFFORT ESTIMATION IN QUOTATION PHASE OF COMPLEX PROJECTS DEVELOPMENT

EFFORT ESTIMATION IN QUOTATION PHASE OF COMPLEX PROJECTS DEVELOPMENT EFFORT ESTIMATION IN QUOTATION PHASE OF COMPLEX PROJECTS DEVELOPMENT Daniel TIUC 1,2, George DRAGHICI 1 1 Polytechnic University Timisoara, Integrated Engineering Research Center, george.draghici@upt.ro

More information

Software Engineering Compiled By: Roshani Ghimire Page 1

Software Engineering Compiled By: Roshani Ghimire Page 1 Unit 7: Metric for Process and Product 7.1 Software Measurement Measurement is the process by which numbers or symbols are assigned to the attributes of entities in the real world in such a way as to define

More information

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business

More information

Risk Management Primer

Risk Management Primer Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders

More information

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

PMI Risk Management Professional (PMI-RMP) Exam Content Outline PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,

More information

Project Knowledge Areas

Project Knowledge Areas From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.

More information

Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering Dr. Shareeful Islam and Dr. Anca-Juliana Stoica

Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering Dr. Shareeful Islam and Dr. Anca-Juliana Stoica Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering Dr. Shareeful Islam and Dr. Anca-Juliana Stoica INTRODUCTION Every software development project has unique

More information

Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas)

Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas) Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas) Nutek, Inc. 3829 Quarton Road, Suite 102 Bloomfield Hills, Michigan 48302, USA. Phone: 248-540-4827, Email: Support@Nutek-us.com

More information

Defining Indicators for Risk Assessment in Software Development Projects

Defining Indicators for Risk Assessment in Software Development Projects Defining Indicators for Risk Assessment in Software Development Projects Júlio Menezes Jr. Centro de Informática, Universidade Federal de Pernambuco, Recife, Brazil, 50740-560 jvmj@cin.ufpe.br Cristine

More information

Evaluating project manager performance: a case study

Evaluating project manager performance: a case study Evaluating project manager performance: a case study Veridiana Rotondaro Pereira, Marly Monteiro de Carvalho University of São Paulo e-mail: veridiana.pereira@poli.usp.br; marlymc@usp.br Abstract: A project

More information

FUNBIO PROJECT RISK MANAGEMENT GUIDELINES

FUNBIO PROJECT RISK MANAGEMENT GUIDELINES FUNBIO PROJECT RISK MANAGEMENT GUIDELINES OP-09/2013 Responsible Unit: PMO Focal Point OBJECTIVE: This Operational Procedures presents the guidelines for the risk assessment and allocation process in projects.

More information

Project Management Framework

Project Management Framework Project Management Framework Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Please

More information

Operational Risk Management Program Version 1.0 October 2013

Operational Risk Management Program Version 1.0 October 2013 Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are

More information

Risk Management 102. Mike Helton Senior Risk Manager July 23, 2013. ASQ Software SIG. Enterprise Risk Management

Risk Management 102. Mike Helton Senior Risk Manager July 23, 2013. ASQ Software SIG. Enterprise Risk Management Risk 102 ASQ Software SIG Mike Helton Senior Risk Manager July 23, 2013 Agenda Fundamentals of Risk (RSKM). Advised preparations for doing Risk. Brief guidelines for identifying the right risks in any

More information

Finally, Article 4, Creating the Project Plan describes how to use your insight into project cost and schedule to create a complete project plan.

Finally, Article 4, Creating the Project Plan describes how to use your insight into project cost and schedule to create a complete project plan. Project Cost Adjustments This article describes how to make adjustments to a cost estimate for environmental factors, schedule strategies and software reuse. Author: William Roetzheim Co-Founder, Cost

More information

Project Risk Management. Presented by Stephen Smith

Project Risk Management. Presented by Stephen Smith Project Risk Management Presented by Stephen Smith Introduction Risk Management Insurance Business Financial Project Risk Management Project A temporary endeavour undertaken to create a unique product

More information

Business Architecture Scenarios

Business Architecture Scenarios The OMG, Business Architecture Special Interest Group Business Architecture Scenarios Principal Authors William Ulrich, President, TSG, Inc. Co chair, OMG BASIG wmmulrich@baymoon.com Neal McWhorter, Principal,

More information

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History

More information

Risk Management. Software SIG. Alfred (Al) Florence. The MITRE. February 26, 2013. MITRE Corporation

Risk Management. Software SIG. Alfred (Al) Florence. The MITRE. February 26, 2013. MITRE Corporation Risk Management Software SIG MITRE Corporation February 26, 2013 The MITRE Alfred (Al) Florence MITRE Corporation The MITRE Agenda Introduction Risk Management References Contact Information Al Florence

More information

CS3012 Software Engineering. Risk Management. Nicolás Cardozo Lloyd 1.17 cardozon@scss.tcd.ie

CS3012 Software Engineering. Risk Management. Nicolás Cardozo Lloyd 1.17 cardozon@scss.tcd.ie Risk Management Nicolás Cardozo Lloyd 1.17 cardozon@scss.tcd.ie 1 Risk management 2 Risk management A chance of possibility of danger, loss, injury or adverse consequences Oxford Reference English dictionary

More information

Presented by Frank V. Payne, PMP

Presented by Frank V. Payne, PMP Presented by Frank V. Payne, PMP 1 Meet Your Speaker Frank V. Payne, PMP MBA/HRM, MBA/TM, CPME, CFPM Project Management Evangelist TM 2 Learning Objectives By the end of this presentation, you will be

More information

Chapter 7: Project Cost Management. Munawar moenawar@gmail.com

Chapter 7: Project Cost Management. Munawar moenawar@gmail.com Chapter 7: Project Cost Management Munawar moenawar@gmail.com Learning Objectives Understand the importance of project cost management. Explain basic project cost management principles, concepts, and terms.

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

PROJECT MANAGEMENT INFORMATION SYSTEMS FOR CONSTRUCTION MANAGERS (CM): CURRENT CONSTITUENTS AND FUTURE EXTENSIONS

PROJECT MANAGEMENT INFORMATION SYSTEMS FOR CONSTRUCTION MANAGERS (CM): CURRENT CONSTITUENTS AND FUTURE EXTENSIONS PROJECT MANAGEMENT INFORMATION SYSTEMS FOR CONSTRUCTION MANAGERS (CM): CURRENT CONSTITUENTS AND FUTURE EXTENSIONS Youngsoo Jung 1 *, Heea Kim 1, and Mihee Joo 2 1 College of Architecture, Myongji University,

More information

Risk Management in Software Engineering An overview of technology and its practice

Risk Management in Software Engineering An overview of technology and its practice Risk Management in Software Engineering An overview of technology and its practice Jyrki Kontio Nokia Telecommunications jyrki.kontio@nokia.com Helsinki University of Technology http://wwwseg.cs.hut.fi

More information

pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage

More information

Risk Management for IT Projects

Risk Management for IT Projects Introduction There are a variety of standards associated with risk management including PMI s Project Management Body of Knowledge (PMBOK), Australia-New Zealand ANZ- 4360, International Standards Organization

More information

DESCRIPTION OF COURSES

DESCRIPTION OF COURSES DESCRIPTION OF COURSES MGT600 Management, Organizational Policy and Practices The purpose of the course is to enable the students to understand and analyze the management and organizational processes and

More information

ITS Project Management Methodology

ITS Project Management Methodology ITS Project Management Methodology Information Technology Services Project Management Group 11/17/2014 Version 2.1 Author: ITS Project Management Group Document Control Change Record Date Author Version

More information

Know Your Enemy: Software Risk Management 1

Know Your Enemy: Software Risk Management 1 Know Your Enemy: Software Risk Management 1 Karl E. Wiegers Process Impact 716-377-5110 www.processimpact.com Software engineers are eternal optimists. When planning software projects, we often assume

More information

Software Risk Management Practice: Evidence From Thai Software Industry

Software Risk Management Practice: Evidence From Thai Software Industry INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon

More information

Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk

Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will

More information

Capability Maturity Model Integration (CMMI)

Capability Maturity Model Integration (CMMI) COPYRIGHT 2011 IJCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 02, ISSUE 01, MANUSCRIPT CODE: IJCIT-110748 Capability Maturity Model Integration (CMMI) Anasis Majumdar, Muhammad Ashiqe-Ur-Rouf,

More information

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010 Dallas IIA Chapter / ISACA N. Texas Chapter Auditing Tuesday, October Project 20, 2009 Management Controls January 7, 2010 Table of Contents Contents Page # Project Management Office Overview 3 Aligning

More information

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com.

Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com. Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 ferraiolo@arca.com This tutorial

More information

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL

More information

SOFTWARE PROJECT MANAGEMENT

SOFTWARE PROJECT MANAGEMENT SOFTWARE PROJECT MANAGEMENT http://www.tutorialspoint.com/software_engineering/software_project_management.htm Copyright tutorialspoint.com The job pattern of an IT company engaged in software development

More information

Application of software product quality international standards through software development life cycle

Application of software product quality international standards through software development life cycle Central Page 284 of 296 Application of software product quality international standards through software development life cycle Mladen Hosni, Valentina Kirinić Faculty of Organization and Informatics University

More information

PMP Examination Tasks Puzzle game

PMP Examination Tasks Puzzle game PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in

More information

EFFECTIVE RISK MANAGEMENT: RISK ANALYSIS USING AN ENHANCED FMEA TECHNIQUE

EFFECTIVE RISK MANAGEMENT: RISK ANALYSIS USING AN ENHANCED FMEA TECHNIQUE EFFECTIVE RISK MANAGEMENT: RISK ANALYSIS USING AN ENHANCED FMEA TECHNIQUE Abstract Vijaya Deepti Nimmagadda Ramanamurthy and K. Uma Balasubramanian Tata Consultancy Services Bangalore, Karnataka India

More information

Software Risk Management

Software Risk Management Software Risk Management Former US Deputy Assistant Secretary of the Air Force Lloyd Mosemann said: Software is so vital to military system that, without it, most could not operate at all. Its importance

More information

Application Research of CMM in Real Estate Entreprise Management

Application Research of CMM in Real Estate Entreprise Management International Journal of Business and Management July, 2009 Application Research of CMM in Real Estate Entreprise Management Linjie Chen Nanjing Institute of Industry Technology Nanjing 210046, China E-mail:

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information

Project Risk Management in Automotive Industry. A Case Study

Project Risk Management in Automotive Industry. A Case Study 6th International Conference on Industrial Engineering and Industrial Management. XVI Congreso de Ingeniería de Organización. Vigo, July 18-20, 2012 Project Risk Management in Automotive Industry. A Case

More information

Project Management Professional (PMP) Examination Content Outline

Project Management Professional (PMP) Examination Content Outline Project Management Professional (PMP) Examination Content Outline Project Management Institute Project Management Professional (PMP) Examination Content Outline June 2015 Published by: Project Management

More information

Cyber-Insurance Metrics and Impact on Cyber-Security

Cyber-Insurance Metrics and Impact on Cyber-Security Cyber-Insurance Metrics and Impact on Cyber-Security Sometimes we can... be a little bit more vigorous in using market-based incentives, working with the insurance industry, for example... DHS Secretary

More information

Project Cost Management

Project Cost Management Project Cost Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points To Note Please

More information

TOWARD AN EFFORT ESTIMATION MODEL FOR SOFTWARE PROJECTS INTEGRATING RISK

TOWARD AN EFFORT ESTIMATION MODEL FOR SOFTWARE PROJECTS INTEGRATING RISK TOWARD AN EFFORT ESTIMATION MODEL FOR SOFTWARE PROJECTS INTEGRATING RISK S. Laqrichi, D. Gourc, F. Marmier Université de Toulouse, Mines Albi, Centre Génie Industriel Route de Teillet, Campus Jarlard,

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Benefit Analysis Guidebook

Benefit Analysis Guidebook Benefit Analysis Guidebook A Reference to Assist the Department of Defense Acquisition Strategy Teams in Performing a Benefit Analysis before Consolidating or Bundling Contract Requirements Department

More information