Effecting and Measuring Risk Reduction in Software Development
|
|
|
- Allen Lawson
- 9 years ago
- Views:
Transcription
1 Abstract Effecting and Measuring Risk Reduction in Software Development Desmond GREER *, David W. BUSTARD * and Toshihiko SUNAZUKA This paper describes an application of SERUM, a risk management methodology, to the definition and prioritisation of changes in a network management system at NEC Corporation. SERUM makes use of two risk reduction strategies: (i) performing a business analysis as the means of establishing required system changes and (ii) using an evolutionary delivery mechanism as means to implement those changes. SERUM also makes use of explicit risk management techniques. These are effected right at the start in the business analysis stage and through to the stage where evolutionary system changes are planned. As part of the planning process, SERUM uses a metric, Relative Risk Reduction Efficacy (RRRE), which helps to assess the risk-reducing effect of a system change. This metric, along with assessments of costs, benefits and development risks, enables system changes to be prioritised in preparation for implementing them in an evolutionary fashion. Keywords: Software risk, Risk management, Project management, SERUM, Risk reduction, Evolutionary development, Soft Systems Methodology 1. Introduction There are inherent risks in all software development projects. If those risks are not handled properly, a project may exceed its schedule or budget, or the resulting product fails to meet the needs of the organisation in which it is used. SERUM (Software Engineering Risk: Understanding and Management) is a risk management methodology that has been developed to help identify and control such risks (Greer, 1997). SERUM assumes that system change is evolutionary. In evolutionary development (Gilb, 1998), parts of a system are developed and delivered in phases. Each delivery is a complete system that is of value to the client. The delivered system is evaluated by the client and the results fed back to the developers who then take that information into account when implementing subsequent phases. This may lead to large or small adjustments to objectives after each delivery. SERUM helps define the change increments through an analysis of the associated costs, benefits and risks. This paper describes and discusses the results of applying SERUM to the definition and prioritisation of changes in the NEC Corporation s network management system. This example emerged from an action research study (Susman, 1978) at NEC undertaken by the first named author during a visiting fellowship in the summer of 1998 (Greer, 1998). In the next section, a model of the NMS system is developed in a form suitable for SERUM analysis (diagnosing stage). The third section then considers how changes to the NMS system can be identified through this model (action planning and action taking). In this section, the SERUM method as applied to the NMS system is described. The paper then shows how the identified changes are refined through risk analysis, and then prioritised taking account of cost, benefit and risk factors. During the application of SERUM, a new metric was introduced, the Relative Risk Reduction Efficacy (RRRE), to help compare system changes in terms of their effectiveness in reducing overall risk. A concluding section evaluates the approach and describes lessons learned from the research (Evaluating and Specifying learning stage). Directions for future research and development are identified. 2. The Management System Case Study The Management System (NMS) is used by large telecommunications and Internet service providers for centralised management of networks distributed across cities, countries or even continents. Physically, the NMS consists of at least one server and several workstations connected to the managed network. The NMS software allows a network to be modelled. The main functions of the model cover standard concerns such as network performance, fault handling, configuration management, accounting and security. The managed network is modelled graphically for user convenience. The diagram in Figure 1 is derived from a Soft Systems Methodology (Checkland, 1990; Wilson, 1990) analysis and shows the activities required to implement the NMS. The text in the ellipses represents activities and the arrows represent dependencies between these activities. The thick arrow indicates a dependency with all of the other activities and TCA stands for a standard activity, Take Control Action. One of the activities, A2: Model can be further defined at a lower level as shown in Figure 2. * University of Ulster, School of Information and Software Engineering, Coleraine, County Londonderry, UK SPEED Technology Lab., Software Design Labs., NEC Corporation 1
2 TCA TCA A7: M onitor accuracy of M odel A 17: D eterm ine Users priviledges A18: Define users for NM S A 20: M onitor U s er A c tivity to ensure security A 3: K now about Objects A 2: M odel A19: A ccept/deny User A 1 0 : C o lle c t P erform ance Data A8: Receive P erform ance Data A12: Collect Fault Data A 16: M onitor that all faults found a nd re p o rte d A 11: Request perform ance data A 9: S chedule perform ance data collection A 14: N otify engineer of fault/perfo rm ac e data TCA Figure 1: Conceptual Model for NMS A3 A1: M odel Structure A6: Define Elem ent Connections A7 A4: M odel Connections and Paths A3 A 21: Determ ine how to define Netwo rk P aths A5: Define Paths Figure 2: Lower level Conceptual model for NMS A10 SSM supports a goal driven approach to systems analysis. This is achieved by first documenting each intended purpose of a system as a root definition. For example, the following is a simple root definition for the NMS. NMS Root Definition A telecommunications-provider owned system to manage a network, on behalf of engineers, by modelling the network and responding to information on performance and faults collected using the model, taking into account the need for security and accountability. A root definition identifies a central goal or purpose of a system and the transformation it performs (to manage a network). It may also, optionally, include the owner of the system (telecommunications provider), the customer for the system (same as owner here), the actors of the transformation (engineers) and any environmental constraints (security and accountability). A conceptual model is constructed from a root definition identifying the activities stated or implied in that definition. Systems often have several root definitions as there may be different goals identified. As a simplification only one model is developed here. Where there are multiple conceptual models they can be merged to form a single system model, introducing activities as necessary to resolve any conflicts that arise. Comparing the activities in a conceptual model with the current implementation will identify differences. Typically, this will highlight activities where improvement is desirable. Also, some required activities may currently be missing altogether and others appear unnecessary in relation to the stated purpose. An analysis of these differences leads to recommendations for system improvement. 3. Risk Management Risk is the potential for realisation of unwanted, negative consequences of an event [Rowe, 1988]. Thus, risk has two aspects: Probability and Loss. Risks to an organisation can arise from several sources. There may be technical risks in the organisation s ongoing operations. Software technical risks are those arising specifically due to software malfunction or any unexpected behaviour in the software concerned [Chittister & Haimes, 1994]. Software development risk is any possibility of failure in the software development process. This includes project risks such as those relating to schedule or budget. Risk Management covers the activities necessary to analyse and control risk. Boehm (1989) breaks risk management into six stages: Identification, Assessment, Prioritisation, Management Planning, Resolution and Monitoring. The first three stages are concerned with analysis and the latter three with reduction and control. This is explicit risk management but risk can also be reduced implicitly through appropriate design of the software development process (Greer, 1997(1)). For example, testing and inspections are risk reduction techniques in that they lower technical risk. 2
3 The identification of risk has been the subject of many studies (e.g. Down, 1994), the most popular method being the use of a checklist. In the NMS case study, a checklist based on the activity model (Figures 1 & 2) was derived from a consideration of the inputs, outputs and transformation in each activity in the model. Risk Exposure (RE) is the product of the probability of a risk occurring and the associated loss. RE = Prob(Risk) * Loss associated with Risk (Boehm, 1989) The choice of unit for loss can be difficult. It may be estimated in financial terms, for example, but other units such as time may be more appropriate in some circumstances. In fact, for high-level planning, it can be more convenient to score the probability and loss on a cardinal scale (e.g. 1 to 5) or even replace the scale with more meaningful explanatory terms. Table 1, for example, illustrates the approach found most useful in the NMS study. Loss is given in terms of down-time, ranging from > 2-days to < 1-hour. Probability ranges from almost certain to very unlikely. The product risk exposure similarly covers a five-point scale from very high to very low. Probability Loss (down-time) Table 1: Risk Exposure Table for Technical Risk in the NMS project almost certain (>85%) very likely (60-84%) likely (40-59%) unlikely (20-39%) very unlikely (< 20%) > 2-days Very high Very high High Medium Medium 2-days Very High High High Medium Medium 1-day High High Medium Low Low 1-hour Medium Medium Low Low Very low < 1-hour Medium Medium Low Very low Very low Figure 3 shows the results of one such assessment in the NMS case study. Activity:A1- Model Structure Current mechanism: Create root and submaps. Add symbols by dragging from template, set the selection name linking to the parent symbol, then domains, then office, then NE, each time entering the parent details Risk Probability Impact Reduction Strategy Contingency grows so that adding Likely (3) < 1hr Advise users to create Remodel to it becomes difficult loss (1) excess capacity when Because of a deep hierarchy in the model, it becomes difficult to split domains Unlikely (2) A similar approach is used in identifying and assessing risk in the proposed mechanisms relating to each activity in the model. Hence, there is an assessment of risks in the current mechanism and in the proposed mechanism for each activity. Proposed changes can then be assessed in their efficacy in reducing this risk. 4. SERUM The SERUM methodology (Software Engineering Risk: Understanding and Management) combines two inherent risk-reducing techniques: Business Analysis and Evolutionary Development. The Business Analysis approach is based on Soft Systems Methodology (Checkland, 1990, Wilson, 1990) and Evolutionary Development on Gilb s (1988) Evolutionary Delivery. Software risk and business risks are intertwined. While much work has been done on risks associated with software development and on risks associated with the operation of computing systems, little attention has been paid to the relationship between risks to a business through software systems. This is despite the fact that computing solutions are increasingly used in Business 2-day loss (4) Figure 3: Sample Risk Assessment in NMS study 3 modelling in first instance Advise users to create excess capacity when modelling in first instance Remodel Process Reengineering [Hammer, 1993] which is by nature high risk. SERUM uses a top-down approach of first analysing the business before considering computing support within that business. Risk is examined at each level. Starting with a business analysis was found to offer several risk-reducing benefits. Firstly, the risk of placing an undue reliance on a computing system to bring about improvement is avoided. In traditional systems analysis, there is a tendency to assume at the outset that computing facilities are needed. SSM instead focuses on business needs, without any assumptions about how those needs will be met. In this way the business can be improved in whatever way is considered appropriate and may not involve computing development at all. Secondly, the risk that system changes do not achieve potential benefit (or that the solution is merely a computerised version of the current system) is reduced since the first models developed in SSM (root definitions and conceptual models) describe an ideal world and consider the activities that should be carried out rather than those that are currently performed.
4 Thirdly, allowing multiple perspectives on the purpose of the system reduces the risk that system changes will fail to satisfy those in the problem situation. SSM allows several conceptual models to be produced, each with a different central purpose. Fourthly, the inclusion of monitoring activities measure the effectiveness, efficacy and economy reducing the risk that system changes do not have the effect predicted or that the system deteriorates over time. While all process models should implicitly reduce risk, the evolutionary development model offers further advantages [Greer, 1997(2)]. Firstly, proposed changes can be prioritised according to their user-value to development cost ratio [Gilb, 1988] so that the initial changes, at least, should provide a good return for the costs involved. Hence the risk of losing user support is abated since users get a return early on in the process and have the opportunity, via feedback to the next stage to influence the development process. Secondly, if a change proves to be unsatisfactory, the cost is not so severe if the evolutionary steps are small. Thirdly, there is some flexibility in the changes implemented at each stage so if an overrun seems likely some aspects of the change can be deferred to a later release. Thus late delivery of a version of the software need never occur. Fourthly, the risk of budget overrun is reduced because the stages are relatively small and consequently easier to analyse and cost. Fifthly, the risk of environmental changes invalidating the system changes is reduced since the changes are scheduled relatively frequently so that environmental changes can be detected and responded to relatively quickly. On completing a business analysis through SSM the problem is then to decide which changes to include in each delivered phase. The hypothesis tested in this study is that the priority of evolutionary steps can be determined using the following criteria: The estimated cost of the development necessary to implement the change; The estimated benefits arising from implementing the change; The risks and/or problems abated by delivering the change; The risks that may be introduced by implementing a change; and The risks in the process of implementing a change. The approach is based on a combined cost-benefit and risk analysis of the current system, the proposed system and the change process. It is summarised in Figure 4. recommendations from business analysis change plan 1. Refine proposed system by assessing risks in the current system 2. Refine proposed system by assessing risks in the proposed system Risk current system Risk proposed system Risk development 7. Develop change p lan 8. Develop risk control plan 6. Refine change p riority using risk assessment in the current sy stem, proposed system and in the development 3. Define changes 4. Perform costbenefit analysis Costs Benefits 5. Prioritise changes Its input is a proposed new system and its output is a change plan, with associated risk control plan. Figure 4: Overview of SERUM The basis of the SERUM method is that the order in which a proposed system should be delivered may, initially, be considered as a function of five variables. Implementation Priority = f ( cost, benefit, risk current system, risk proposed system, risk development ) In order to consider which system changes are the most effective in reducing risk, it is necessary to establish some measurement for comparing their risk reducing efficacy. Risk Reduction Efficacy (RRE) which is a metric for defining the effectiveness of a system change for reducing risk, was established as a result of this experiment. RRE for a given system change may defined as RRE = ( RE contribution) where All Technical Risks 4
5 RE is risk exposure for a risk identified in the current or proposed system, contribution is a factor for the increase or decrease in risk exposure due to the change, being positive or negative respectively, and All Technical Risks refers to each instance of a risk defined in the current and proposed system. Relative Risk Reduction Efficacy (RRRE) for a system change may then be defined as follows: RRRE = ( RE contributi on) All Technical Risks RE C All Current TechnicalR isks Using RRRE, it is then possible to compare system changes for efficacy in risk reduction and to use this data in prioritising system changes for an evolutionary delivery plan. Figure 5 illustrates the type of relationship that can exist between system changes, activities in the current system, and the risks associated with those activities. In each case, risk exposure may be reduced or increased. Change C1 affects activities A1 and A2; change C2 affects A2 and A3. Activity A1 has associated risks R1 and R2; A2 has risk R3; and A3 has risks R4 and R5. To find how much a given system change reduces risk, it is necessary to assess its contribution to each individual risk exposure for each of the activities affected. For change C2, there is a contribution from R3, R4 and R5, with R4 and R5 reduced and R3 increased. RRE will then be the sum of the three products combining exposure and contribution. If, say, C2 reduces risk exposure R4 by 50% and R5 by 40% and that C2 increases the risk exposure R3 by 20%, the RRE would be (R4*0.5) +(R5*0.4) + (R3*-(0.2)) C1 A1 A2 R1 (reduced by C1) R2 (reduced by C1) R3 (reduced by C1 and increased by C2) C2 A3 R4(reduced by C2) R5(reduced by C2) Figure 5. Illustration of the relationship between changes, activities and risks. Specific development risks must also be identified and assessed. A risk reduction in introducing a system change may well be negated by a high risk in the development process. Established risk identification techniques such as the SEI s taxonomy approach may be used. The SEI taxonomy in some cases requires detailed knowledge about the development tools and techniques. Since the SERUM approach is at a higher level and at the planning stage, some of the SEI items are not applicable and so a checklist derived from the SEI taxonomy was used instead. Figure 6 shows a ranking of evolutionary changes (only the top three are shown here) as derived in this case study. The ranking in this case is primarily by most beneficial changes first. As can be seen, where two changes are ranked the same a further sort on a different parameter may be used. For example, the changes ranked 2 and 3 are distinguished only by the measure of development risk involved. Similarly, the analyst may choose to take the information in a column not the primary sort column, to make adjustments to the ranking. Nms - Change Plan 29/7/1998 Last Sort: 1. Descending Benefit 2. Ascending Cost 3. Descending Change s Risk Reduction Efficacy 4. Ascending Development Risk Exposure Rank Change Description Cost Benefit 1 Improve the speed of communication between Elements and NMS ( A6 ) 2 Develop an interface to an intelligent route planning tool ( A22 A5 ) 3 Improve alarm system between NMS and Elements i.e. gateways, routers, Ethernet etc ( A6 ) 5. Lessons Learned In this paper we have used action research to investigate the application of the SERUM method. SERUM combines the use of business analysis and evolutionary delivery and complements these implicitly risk-reducing techniques with explicit risk management techniques. The SERUM method considers system changes in terms of their costs and benefits and also their effects on overall risk exposure due to their implementation. To 1 Month ( 4 ) 2-3 Months ( 5 ) 2-3 Months ( 5 ) Figure 6: Ranked changes 5 Very High (5) Very High (5) Very High (5) Cost- Benefit OK (0.8) OK (1) OK (1) RRRE Total Dev. Risk Score 0.44 % % % 47 achieve this, risks are explicitly identified and measured for the current system, the proposed system and the development effort. The method has found to be a useful means for introducing risk management to the software development process. A number of developments have arisen, as a direct result of the trial. Firstly, it was found much easier to assess risk probability and impact in terms of words rather than numbers. In previous descriptions of SERUM we have used abstract phrases
6 such as Very High to describe a loss associated with a risk. However in practice, it was found much more convenient to use terms such as 1 day loss which actually meant something to the project manager. The same is true of assessing probability. Secondly, a metric has been defined: Risks Reduction Efficacy, which aids the decision- maker in prioritising system changes. This was necessary so that changes could be assessed in terms of their risk reducing ability and allows information gathered from the Soft System Methodology to be used in a consistent manner. Thirdly, the main criterion for prioritisation in this study was found to be cost, whereas cost-benefit ratio might have been expected. This indicates that the ranking criteria may change from project to project. Fourthly, evidence for the usefulness of the method was obtained from informal discussions with the company participants. This was further reinforced by the fact that the final ranked list matched a ranking produced by one of the key members of the team based on his experience. Fifthly, tool support for the SERUM method has been refined based on user feedback. Future research will concentrate on improving the evolutionary planning part of the methodology. At present the method uses a sort followed by the analysts manual adjustments to obtain the required ranking of system changes. The intention is to automate this process further, by ranking the criteria used for the plan. ACKNOWLEDGEMENTS NEC Corp. are gratefully acknowledged for their support in carrying out the trial of the SERUM method at their plants in Tokyo. Funding and support in respect of travel and subsistence by The Great Britain Sasakawa Foundation and The British Council are also acknowledged. REFERENCES 1. Boehm, B.W., Software Risk Management, IEEE Computer Society Press Washington D.C, Brooks, F. The Mythical Man-Month, Addison-Wesley, MA, Checkland P.B. and Scholes, J: Soft Systems Methodology in Action, Wiley, Chittister, C. and Haimes, Y.Y., Assessment and Management of Software Technical Risk, IEEE Transaction on Systems, Man, and Cybernetics, vol. 24, no. 2, Feb., Down, A., Coleman, M., Absalon, P., Risk Management for Software Projects, McGraw-Hill, London, Gilb, T., Principles of Software Engineering Management, Addison-Wesley, Greer, D. and Bustard, D.W., Risk Management: Implicit and Explicit, Proceedings of the 5th SEI conference on Risk Management, April, 1997(1). 8. Greer, D. and Bustard, D.W., SERUM - Software Engineering Risk: Understanding and Management, The International Journal of Project & Business Risk, vol. 1, Issue 4, winter, pp , Project Manager Today Publications, 1997(2). 9. Greer, D., Report on SERUM trial at NEC Corp., University of Ulster, Hammer, M and Champy, J., Reengineering the Corporation - A Manifesto for Business Revolution, Nicholas Brealey Publishing, Rowe, W.D., An Anatomy of Risk, Robert E. Krieger Pub Co, FL, Susman, G.I., and Evered, R.D, An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly, vol. 23, pp , Dec Wilson B: Systems: Concepts, Methodologies and Applications, 2nd Edition, Wiley, * * * * * * * * * * * * * * * Des GREER is a lecturer in the School of Information and Software Engineering at the University of Ulster in Northern Ireland. He has been lecturing in Software Engineering related topics for the past 7 years. Prior to this he was an analyst/programmer at Short Bros., a Belfast aerostructures company. His research area is in Software Engineering with a particular interests in Software Risk Analysis and Requirements Engineering. * * * David BUSTARD is a Professor of Computing Science and Head of the School of Information and Software Engineering at the University of Ulster in Northern Ireland. His research area is software engineering, with particular emphasis on requirements engineering at the business analysis level. This work involves the integration of various techniques including Soft Systems Methodology, Object-Oriented Development, Risk Management and Formal Methods. Prof. Bustard is a Chartered Engineer, a member of the British Computer Society and a member of the IEEE. * * * Toshihiko SUNAZUKA received his B.E. and M.S. degrees in industrial engineering from Waseda University in 1980 and 1982, respectively. He joined NEC Corporation in 1982, and is now Manager of SPEED Technology Lab., Software Design Labs. He is engaged in the research and development of software engineering. His research interests include software process assessment and improvement (SPA/I), software metrics and software quality assurance. Mr. Sunazuka is a member of the Information Processing Society of Japan and the Japanese Society for Quality Control. * * * * * * * * * * * * * * * 6
SERUM - Software Engineering Risk: Understanding and Management
SERUM - Software Engineering Risk: Understanding and Management D. Greer and D.W. Bustard Faculty of Informatics, University of Ulster, Cromore Road, Coleraine, BT52 1SA, Northern Ireland. Email: [email protected],
REVIEW OF RISK MANAGEMENT METHODS
2011 Robert Stern, José Carlos Arias 59 REVIEW OF RISK MANAGEMENT METHODS Robert Stern (MBA), José Carlos Arias (PhD, DBA) Abstract Project development, especially in the software related field, due to
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Prioritisation of knowledge required for ERP implementations: client and implementation partner perspective
Prioritisation of knowledge required for ERP implementations: client and implementation partner perspective By Uchitha Jayawickrama, Shaofeng Liu and Melanie Hudson Smith Overview This article identifies
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Development models. 1 Introduction. 2 Analyzing development models. R. Kuiper and E.J. Luit
Development models R. Kuiper and E.J. Luit 1 Introduction We reconsider the classical development models: the Waterfall Model [Bo76], the V-Model [Ro86], the Spiral Model [Bo88], together with the further
Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note
Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note Text book of CPET 545 Service-Oriented Architecture and Enterprise Application: SOA Principles of Service Design, by Thomas Erl, ISBN
The use of generic process models for process transformation
The use of generic process models for process transformation S J Childe, P A Smart, A M Weaver University of Plymouth Plymouth, PL4 8AA, U.K., Tel. +44 1752 232618, Fax +44 1752 232540, Email [email protected]
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.
Quality Standard Customer Service Complaints Handling
Quality Standard Customer Service Complaints Handling Version 1 Date:- 2 nd December 2010 Page 1 Contents INTRODUCTION 4 OVERVIEW OF THE COMPLAINTS STANDARD 5 FRAMEWORK 6 MANDATORY SECTIONS 7 SECTION 1
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
ITAG RESEARCH INSTITUTE
ITAG RESEARCH INSTITUTE Control and Governance Maturity Survey Establishing a reference benchmark and a self-assessment tool Erik Guldentops Wim Van Grembergen Steven De Haes Control and Governance Maturity
Session 6. Microsoft Project. Emanuele Della Valle. http://home.dei.polimi.it/dellavalle Lecturer: Dario Cerizza
Session 6 Microsoft Project Emanuele Della Valle http://home.dei.polimi.it/dellavalle Lecturer: Dario Cerizza Credits 2 This slides are largely based on CEFRIEL s slides for PMI Certification and Prof.
The Development of a Supply Chain Management Process Maturity Model Using the Concepts of Business Process Orientation
The Development of a Supply Chain Management Process Maturity Model Using the Concepts of Business Process Orientation Dr. Kevin McCormack Instructor, University of Alabama at Birmingham, School of Business
Project Management Process
Project Management Process Description... 1 STAGE/STEP/TASK SUMMARY LIST... 2 Project Initiation 2 Project Control 4 Project Closure 5 Project Initiation... 7 Step 01: Project Kick Off 10 Step 02: Project
Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem
Using Analytic Hierarchy Process (AHP) Method to Raymond Ho-Leung TSOI Software Quality Institute Griffith University *Email:[email protected] Abstract In general, software project development is often
How To Monitor A Project
Module 4: Monitoring and Reporting 4-1 Module 4: Monitoring and Reporting 4-2 Module 4: Monitoring and Reporting TABLE OF CONTENTS 1. MONITORING... 3 1.1. WHY MONITOR?... 3 1.2. OPERATIONAL MONITORING...
Reducing operational planning cycle time using BPR
Reducing operational planning cycle time using BPR Tim Grant Professor, Operational ICT & Communications Netherlands Defence Academy [email protected] tel: +31 638 193 749 1 Outline Goal: To report on-going
Umbrella: A New Component-Based Software Development Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Umbrella: A New Component-Based Software Development Model Anurag Dixit and P.C.
Merging of Data Flow Diagram with Unified Modeling Language
International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 1 Merging of Data Flow with Unified Modeling Language Kirti Tiwari, Alpika Tripathi, Shipra Sharma, Vandana
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING Ramesh Babu Palepu 1, Dr K V Sambasiva Rao 2 Dept of IT, Amrita Sai Institute of Science & Technology 1 MVR College of Engineering 2 [email protected]
<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
Business Process Reengineering (BPR) for Engineering Management (EM) Majors: Industry Perspective and Students Feedback
Business Process Reengineering (BPR) for Engineering Management (EM) Majors: Industry Perspective and Students Feedback Rashmi Jain, PhD Associate Professor Stevens Institute of Technology [email protected]
Information Security and Risk Management
Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742
Lifecycle Models: Waterfall / Spiral / EVO
Lifecycle Models: Waterfall / Spiral / EVO Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 Lifecycle The sequence of actions that must be performed in order to build a software
Project Planning With IT
Unit 17: Project Planning With IT Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose Y/601/7321 BTEC National The aim of this unit is to ensure learners understand the processes
Requirements Management In Action. A beginners guide to Requirements Management
Requirements Management In Action A beginners guide to Requirements Management Table of Contents Introduction How to Capture Requirements What is Traceability? Tips to Capture Better Requirements Conclusion
GFMAM Competency Specification for an ISO 55001 Asset Management System Auditor/Assessor First Edition, Version 2
GFMAM Competency Specification for an ISO 55001 Asset Management System Auditor/Assessor First Edition, Version 2 English Version PDF format only ISBN 978-0-9871799-5-1 Published April 2014 www.gfmam.org
An Activity-Based Costing Assessment Task: Using an Excel Spreadsheet
e-journal of Business Education & Scholarship of Teaching Vol. 3, No. 1, 2009, pp:25-35. http://www.ejbest.org Instructional Note An Activity-Based Costing Assessment Task: Using an Excel Spreadsheet Damian
Fault Slip Through Measurement in Software Development Process
Fault Slip Through Measurement in Software Development Process Denis Duka, Lovre Hribar Research and Development Center Ericsson Nikola Tesla Split, Croatia [email protected]; [email protected]
Risk Analysis: a Key Success Factor for Complex System Development
Risk Analysis: a Key Success Factor for Complex System Development MÁRCIO DE O. BARROS CLÁUDIA M. L. WERNER GUILHERME H. TRAVASSOS COPPE / UFRJ Computer Science Department Caixa Postal: 68511 - CEP 21945-970
White Paper. PPP Governance
PPP Governance The Governance of Projects, Programs and Portfolios (PPP) (sometimes called project governance for convenience) is the sub-set of corporate and organisational governance 1 focused on assisting
54 Robinson 3 THE DIFFICULTIES OF VALIDATION
SIMULATION MODEL VERIFICATION AND VALIDATION: INCREASING THE USERS CONFIDENCE Stewart Robinson Operations and Information Management Group Aston Business School Aston University Birmingham, B4 7ET, UNITED
ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi
Proceedings of the 10 th International Conference on Manufacturing Research ICMR 2012 ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING Mehran G.
A Case Study in Software Enhancements as Six Sigma Process Improvements: Simulating Productivity Savings
A Case Study in Software Enhancements as Six Sigma Process Improvements: Simulating Productivity Savings Dan Houston, Ph.D. Automation and Control Solutions Honeywell, Inc. [email protected] Abstract
Learning about the influence of certain strategies and communication structures in the organizational effectiveness
Learning about the influence of certain strategies and communication structures in the organizational effectiveness Ricardo Barros 1, Catalina Ramírez 2, Katherine Stradaioli 3 1 Universidad de los Andes,
EU ETS Database. User s Manual. Version: 2.0
EU ETS Database User s Manual Version: 2.0 Last updated: 14 May 2007 TABLE OF CONTENTS 1. GETTING STARTED...4 1.1 Introduction... 4 1.2 How this manual is organised... 5 1.2.1 Notes for the user... 5 2.
A Project Manager's Book of Forms. A Companion to the PMBOK Guide. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2326795/ A Project Manager's Book of Forms. A Companion to the PMBOK Guide. 2nd Edition Description: A compendium of ready made
BUSINESS PROCESS MODELING AND SIMULATION. Geoffrey Hook. Lanner Group The Oaks, 5 Clews Road Redditch. B98 7ST UK
Proceedings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, and M. Fu, eds. BUSINESS PROCESS MODELING AND SIMULATION Geoffrey Hook Lanner Group The Oaks, 5 Clews
A guide to strategic human resource planning
A guide to strategic human resource planning By Workinfo.com, www.workinfo.com 1. Introduction A comprehensive Human Resource Strategy plays a vital role in the achievement of an organisation's overall
Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.
: Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Information Technology Project Oversight Framework
i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11
A Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY
Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY This chapter highlights on supply chain performance measurement using one of the renowned modelling technique
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 EXAMINERS REPORT Friday 2 nd October 2015 Answer any THREE
Relationship Manager (Banking) Assessment Plan
1. Introduction and Overview Relationship Manager (Banking) Assessment Plan The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It forms a key
Implementing the Balanced Scorecard Checklist 154
Implementing the Balanced Scorecard Checklist 154 Introduction Traditionally, managers have used a series of indicators to measure how well their organisations are performing. These measures relate essentially
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
Evaluating Data Warehousing Methodologies: Objectives and Criteria
Evaluating Data Warehousing Methodologies: Objectives and Criteria by Dr. James Thomann and David L. Wells With each new technical discipline, Information Technology (IT) practitioners seek guidance for
Measurement and Metrics Fundamentals. SE 350 Software Process & Product Quality
Measurement and Metrics Fundamentals Lecture Objectives Provide some basic concepts of metrics Quality attribute metrics and measurements Reliability, validity, error Correlation and causation Discuss
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS Umamaheswari E. 1, N. Bhalaji 2 and D. K. Ghosh 3 1 SCSE, VIT Chennai Campus, Chennai, India 2 SSN College of
DEVELOPING REQUIREMENTS FOR DATA WAREHOUSE SYSTEMS WITH USE CASES
DEVELOPING REQUIREMENTS FOR DATA WAREHOUSE SYSTEMS WITH USE CASES Robert M. Bruckner Vienna University of Technology [email protected] Beate List Vienna University of Technology [email protected]
The following criteria have been used to assess each of the options to ensure consistency and clarity:
4 Options appraisal 4.1 Overview We have appraised each of the options identified in section 3: Maintain the status quo Implement organisational change and service improvement Partner / collaborate with
Business Process Re-engineering (Elective)
Post-Graduate Diploma in Business Management Business Process Re-engineering (Elective) Institute of Management Technology Ghaziabad Course Background and Objectives: Business Process Re-engineering 2
Process Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
A Security Approach in System Development Life Cycle
A Security Approach in System Development Life Cycle (1) P.Mahizharuvi, Research Scholar, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai. [email protected] (2) Dr.K.Alagarsamy,
Business Process Change and the Role of the Management Accountant
Butler University Digital Commons @ Butler University Scholarship and Professional Work - Business College of Business 1998 Business Process Change and the Role of the Management Accountant Sakthi Mahenthiran
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM)
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Pankaj Jalote 1 Infosys Technologies Ltd. Bangalore 561 229 Fax: +91-512-590725/590413 [email protected], [email protected]
IndigoBlue Governance Framework
Overview IndigoBlue IndigoBlue Winner of Agile Consultancy of the Year 2011/12, IndigoBlue is one of the leading consultancies in the UK focused on Agile processes for strategic consultancy, and programme
The Transport Business Cases
Do not remove this if sending to pagerunnerr Page Title The Transport Business Cases January 2013 1 Contents Introduction... 3 1. The Transport Business Case... 4 Phase One preparing the Strategic Business
Managing Risk Control Environment and Responsibilities
Managing Risk Page 1 of 8 Contents Introduction...3 Risk...3 Risk management - using the framework...3 Source of risk...3 Likelihood and impact...3 Inherent risk...4 Risk-reducing measures...4 Effectiveness...5
2. Basic Relational Data Model
2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that
A Case Retrieval Method for Knowledge-Based Software Process Tailoring Using Structural Similarity
A Case Retrieval Method for Knowledge-Based Software Process Tailoring Using Structural Similarity Dongwon Kang 1, In-Gwon Song 1, Seunghun Park 1, Doo-Hwan Bae 1, Hoon-Kyu Kim 2, and Nobok Lee 2 1 Department
The profile of your work on an Agile project will be very different. Agile projects have several things in common:
The Agile Business Analyst IT s all about being Agile? You re working as a Business Analyst in a traditional project environment, specifying the requirements for IT Developers to build. Suddenly everyone
A Software Development Simulation Model of a Spiral Process
A Software Development Simulation Model of a Spiral Process ABSTRACT: There is a need for simulation models of software development processes other than the waterfall because processes such as spiral development
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Going Agile A Case Study
Going Agile A Case Study Dwayne Read Software Process Consultant Strategic Systems [email protected] Grey Properjohn Systems Analyst Snowden Technologies [email protected] Abstract This case
Integration of Usability Techniques into the Software Development Process
Integration of Usability Techniques into the Software Development Process Xavier Ferre Universidad Politecnica de Madrid [email protected] Abstract Software development organisations are paying more and
PROJECT MANAGEMENT PLAN CHECKLIST
PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
Model-Based Conceptual Design through to system implementation Lessons from a structured yet agile approach
Model-Based Conceptual Design through to system implementation Lessons from a structured yet agile approach Matthew Wylie Shoal Engineering Pty Ltd [email protected] Dr David Harvey Shoal Engineering
Chapter 3 Managing the Information Systems (IS) Project
Content Chapter 3 Managing the Information Systems (IS) Project Process of managing IS projects Skills required to be an effective project manager Skills and activities of a project manager during project
DPLS 722 Quantitative Data Analysis
DPLS 722 Quantitative Data Analysis Spring 2011 3 Credits Catalog Description Quantitative data analyses require the use of statistics (descriptive and inferential) to summarize data collected, to make
