A new approach to teaching software risk management with case studies
|
|
|
- Amberlynn Bates
- 9 years ago
- Views:
Transcription
1 University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2002 A new approach to teaching software risk management with case studies A. Fuller University of Wollongong, [email protected] P. Croll University of Wollongong L. Dei University of Wollongong Publication Details This article was originally published as: Fuller, A, Croll P & Dei, L, A new approach to teaching software risk management with case studies, Proceedings 15th Conference on Software Engineering Education and Training, February 2002, Copyright IEEE Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected]
2 A new approach to teaching software risk management with case studies Abstract Software development is inherently risky, however the need to adapt processes intended for larger organisations introduces a new element of risk. In addition, the nature of many new software products can be described as "critical" and therefore should undergo a formal risk assessment procedure. Despite the majority of software projects involving these additional elements of risk, risk management planning is virtually nonexistent, as managers have not been trained in risk management. Few current software engineering curricula provide comprehensive coverage of risk, nor any practical experience in risk assessment. In this paper we propose that risk be repositioned in the software engineering core body of knowledge, and discuss preliminary requirements for a one semester course on risk. As experience is considered an essential element of successful risk assessment, a feature of the course is the use of case studies based on real projects to simulate an historical perspective for students. Disciplines Physical Sciences and Mathematics Publication Details This article was originally published as: Fuller, A, Croll P & Dei, L, A new approach to teaching software risk management with case studies, Proceedings 15th Conference on Software Engineering Education and Training, February 2002, Copyright IEEE This conference paper is available at Research Online:
3 A New Approach to Teaching Software Risk Management with Case Studies Anne Fuller, Peter Croll, Limei Di University of Wollongong {annef, croll, Abstract Software Engineering research has traditionally focused on the needs of very large corporations undertaking equally mammoth and complex development projects, consequently, current curricula tend to focus on this model. Yet by far the majority of software development is undertaken by Small to Medium Enterprises. Software development is inherently risky, however the need to adapt processes intended for larger organisations introduces a new element of risk. In addition, the nature of many new software products can be described as critical and therefore should undergo a formal risk assessment procedure. Despite the majority of software projects involving these additional elements of risk, risk management planning is virtually non-existent, as managers have not been trained in risk management. Few current software engineering curricula provide comprehensive coverage of risk, nor any practical experience in risk assessment. In this paper we propose that risk be repositioned in the software engineering core body of knowledge, and discuss preliminary requirements for a one semester course on risk. As experience is considered an essential element of successful risk assessment, a feature of the course is the use of case studies based on real projects to simulate an historical perspective for students. 1. Introduction For the more than 30 years since its birth, Software Engineering (SE), has been generally concerned with the production of custom software under contract for large corporations. Software development methodologies were created to offer an engineering-like development environment, with the adoption of a software development methodology seen as a major factor in reducing the risks associated with shortcuts and mistakes and ensure the quality of the software product [1]. Although SE research has produced many such processes and supporting tools, these have mainly benefited those few companies large enough to take advantage of these advances [2]. Yet most of today s software is being developed by Small to Medium Enterprises (SMEs) rather than large companies. Fewer than 6% of all software houses in the United States have more than 50 employees [3] and we have previously shown that this situation is similar in other countries, including Australia [4][5]. This results in the situation where most software development projects not only face the risks normally associated with any business project, but also additional risks introduced by the necessity to adapt processes developed without consideration for the constraints and difficulties confronting smaller enterprises [3]. The advent of methodologies such as Extreme Programming and adaptable process models such as that described by [6] are attempts to redress this situation. However, these approaches do not
4 give any guidance for decision makers with regard to the risk associated with any tailoring of the process [4]. In this paper we discuss the changing nature of today s software products, and describe particular areas where the developer is now even more exposed to risk. We then discuss shortcomings in SE curricula leaving software engineers ill-prepared to manage the risks facing today s software projects. One of the reasons advanced for lack of coverage of risk management at the undergraduate level is the notion that risks cannot be adequately assessed without prior experience. We do not dispute the importance of having some historical basis for an assessment. Rather, the course we propose overcomes this by using real and relevant case studies that allow the students to compare their assessments against actual outcomes. Effectively the students build up their project experience as the course progresses. 2. Software Risks There is a growing dependence on computers for business and life-critical functions thus it is essential that such applications offer some guarantee of integrity and that risk techniques formerly confined to safety critical systems are now more broadly applicable [7]. Businesses, governments, other institutions and individuals now use the Internet for purchasing, sales, and communications and personal development or recreation. All expect that the systems with which they interact be reliable and secure [8][9][10]. However, there is a lack of e-commerce standards accepted by either businesses or consumers [11] and a growing concern that in the rush to get a product online, quality may be compromised [12][13]. The medical profession s growing reliance on electronic medical databases not only requires security guarantees [14] [15][16] but introduces safety hazards as well [17]. With the safety of patients at risk it becomes even more critical the software developer be familiar with risk assessment techniques. For example, with a distributed database of medical records a risk analysis may identify that incorrect linkage to somebody else s medical record may be considered catastrophic. The incorrect link is itself not necessarily harmful provided data in the original record does not get corrupted. The hazard occurs when a patient gets incorrectly diagnosed based on the incorrect or incomplete data supplied. In today s economic climate it is no longer cost effective to build entire systems from scratch, and more and more software is being constructed from Commercial Off The Shelf (COTS) components. However, a number of authors have cautioned that the increasing use of COTS components also introduces a new set of possible risks. Components often provide more functionality than is actually required, and these unneeded services may interfere with intended functions [7][18]. As the source code may not be available, it is impossible to check if there is any malicious code such as viruses present [18][19]. Boehm [20] argues that rapid changes associated with COTS releases and internet and web-based systems makes it impossible to produce "air-tight" requirements, while [21] suggests that combining COTS and internet connectivity generates the potential for adverse impacts on the security of the system. In addition, both Lindsay & Smith [22] and McDermid [23] point out that COTS components are usually designed for other, more generic purposes and are unlikely to have been subjected to the level of verification and validation required for safety critical systems. This affects a large class of applications given that an increasing number of today s applications may be classified as critical. Thus exposure to risk is multi-faceted. In addition to project management or business risks, the SMEs software developer must also deal with risk associated with their development
5 process and with the need for greater attention to integrity levels brought about by changing nature of today s software product. 3. Risk in the Current Curriculum The IEEE Computer Society and the Association for Computing Machinery co-operative effort to establish a Software Engineering Body of Knowledge (SWEBOK) aims, among other objectives, to characterize the contents of the software engineering discipline and provide a foundation for curriculum development. SWEBOK proposes Software Engineering Management as a core component of the curriculum and includes risk management as one element of this knowledge area. [24] Direct linkages can be made between the simplified spiral model and the IEEE/ACM topic areas with the notable exception of risk analysis [6]. Despite its perceived importance in an accepted SE model, (the spiral model), risk is not afforded a corresponding place among topic areas for SE education, but instead is buried inside project management. This neglect of the significance of risk pervades SE education. Standard software engineering texts such as Sommerville [25] and Pressman [26] provide minimal coverage of risk. Pressman includes a chapter on risk, but does not show how risk can be integrated across the entire process. Somerville concentrates on risk analysis in terms of safety critical systems, and also includes a brief introduction to risk management as part of his discussion of the Spiral Model of the software process. Jacobsen [27] discusses risk in terms of moving from some other process to his Object Oriented Software Engineering process. MacDonell and Gray [28] also imply that risk management enjoys limited treatment in standard SE texts by suggesting the use of [29] to provide a more general and comprehensive text on risk management. Karolak [29] cites both the failure by the university education system to adequately address risk management for software projects and the view that risk management should be integrated into the entire software development lifecycle among the motivations for his work. With so little significance given to risk management in current SE syllabi, is it any wonder that today s software engineers fail to make more than a casual pass at this task. 4. Re-emphasising risk in the syllabus Bagert [30] provide comprehensive guidelines for development of software engineering programs. Risk analysis is included as part of the Software Management Component of their suggested core knowledge areas. (The body of knowledge on which their proposed curriculum is predicated was developed independently of the work of the SWEBOK committee.) The curriculum comprises nine modules with an introduction to project planning and risk management one topic out of a list of 13 topics comprising one of these modules. Risk analysis is also listed in the content of the Module the authors title Senior Design Project. A recent updating of the description of SWEBOK S software engineering management knowledge area presents an alternative breakdown of topics, separating generic management issues from the more specific software engineering management and places risk management firmly in the area of generic management, quite distinct from software engineering management [28]. This insistence that risk be part of management has contributed to its inadequate coverage in most SE curricula. In a one semester course, comprising 13 or 14 weeks, management per se is often relegated to 1 week or less, with risk management a minor component. As we have shown, today s software projects are facing increased risk exposure, yet little attention is paid
6 to risk management, particularly on the large majority of projects being undertaken by SMEs. The main reason for this is that there is little to instruct software project managers on how to handle risk [31]. Even the Spiral Model, which recognizes that risk plays a vital role in the SE process, uses risk analysis as a generic term, giving no specifics regarding what is/should be part of the process [29] [32]. The obvious solution, therefore, is to ensure risk is given more appropriate coverage when educating potential software engineers. Consider again the three dimensions of risk exposure for SME software developers: business, process and integrity. A risk management curriculum for educating software engineers to handle these risks should include among its expected outcomes the demonstrated ability to: 1. identify risks (business, process and integrity) 2. calculate risk probabilities for quantitative assessments and to set realistic bands for qualitative assessments 3. calculate quantitative and determine qualitative risk impacts 4. determine when applying qualitative versus quantitative assessment is appropriate 5. perform safety and hazard analysis of a software product 6. prepare and carry out risk mitigation, monitoring and management strategies. It is imperative that risk be considered throughout the software process and not just as one minor aspect of project management. Any part of the process may be risk driven. For example, Boehm [20] advocates a risk-driven approach to deciding what should and shouldn't form part of a requirements specification and argues that rapid changes associated with COTS releases and internet and web-based systems makes it impossible to produce "air-tight" requirements. Case studies should be used to demonstrate the assessment of risk factors arising at various stages and their impact on the project. Most importantly, students need the opportunity to apply the methods to identifying, analysing and tracking risks associated with their own software projects. A number of authors have presented checklists to facilitate the identification and classification of risks [26][33][34]. However, these are mainly concerned with managing those risks we have classified as project or business risks and do not examine risks associated with deployment of the finished product i.e. integrity risks. This has formerly been the realm of safety critical systems, but, as we have shown, more and more software products these days can, and should, be classified as critical. It is therefore vital that students be familiar with methods for determining the safety integrity level of a given product The need for experience In the world of safety critical systems, risks can be categorised in terms of Safety Integrity Levels (SIL) (i.e. a SIL is a measure of the amount of risk reduction required for a safetyrelated system to an acceptable/tolerable level of risk). Table 1 shows SIL 1 to 4 and their associated target failure rates. Safety Level Integrity to < to < to < to <10-4 Demand Mode Of Operation (Probability of failure to perform its design function on demand) Table 1. Safety Integrity Levels: Target Failure Measures (taken from IEC 1508 Part 1, shows the target failure rates and related safety integrity levels)
7 For a given application a SIL can be derived using either a qualitative (i.e. graphs and look-up tables) or quantitative measures. SIL 1 is the lowest risk while SIL 4 is the highest. Examples of low SIL applications might include a machine control system where there is only a remote possibility that a single person receives a negligible injury. A high SIL example would be a power station or weapons system that has the potential to kill hundreds of people in a single incident. These are generalisations since the actual SIL will always have to be calculated for any given application, its location and usage. The traditional assessment methods for risk and hazard analysis [35][36][37] all rely on people making judgments based on their experience. For safety systems a detailed knowledge of what can go wrong is an essential prerequisite to any meaningful predictions regarding the cause and effects of systems failures. Petroski takes this argument further by stating that teaching history of engineering failures should be a core requirement in any engineering syllabus and take the same importance as the teaching of modern technology [35]. At present, the emphasis on technology is evident in all realms of engineering in particular with the advances in computing. Without an understanding of history or direct experience for a given application then more is unknown and hence the risks are higher [36]. This is demonstrated in Figure 1 where the need for both experience and skills is highlighted. The rationale is that it is unacceptable to be developing a high integrity level system unless the teams involved have both sufficient technical skills and experience. Figure 1. Skills vs Experience Requirements for SIL projects 4.2. Bringing experience into the classroom Clearly the importance of relevant experience to successful risk assessment is a problem for undergraduate teaching. Many students lack such experience and it can easily become a paper exercise of little direct relevance to them at this stage. It is necessary to develop a mechanism whereby this lack of experience can be addressed and the lessons learned can be retained by the students. Stratton [37] have shown that relating real world experiences is the most effective. We propose the use of case studies, based on the history of real projects. The case studies will be drawn from industry and students will be asked to perform risk assessments based on data that was available at certain times throughout the project. The students assessments can then be compared with actual outcomes. In this way the student constructs their own experiential background, becoming progressively more familiar with all kinds of risks and their impacts on particular types of projects.
8 Three such case studies that might be considered by students in the course are discussed below. All are (unfortunately) synopses of real situations. Case 1: A project is estimated to be finished in one year, using two programmers. However, due to a change in circumstances, it is desirable that the project be speeded up. A proposal is put forward to increase the number of programmers to six, thus allowing the project to be completed in 4 months. Students are asked to estimate the risks involved in either of these two scenarios. After estimating the above, what is the risk of losing the contract if the company cannot finish the project in 4 month? Ultimately the risk boils down to a choice between producing a more professional product with the possibility of losing the contract or, a guaranteed contract under conditions that may adversely affect the quality of the product and thus cost more in the long run. Case 2: A company has developed a very comprehensive software product for a particular target industry. However, most of the users in the industry cannot afford the costs of deploying the product. The software is too complex for simple users to handle, and potential clients must dedicate a team of people with knowledge of the industry and advanced computer skills if they are to successfully adopt the package. Thus the developers need to scale down the original product in order to increase market share. They are considering two options: to block out some modules in the original system and thus disable some functionality, or to write another small system from scratch, reusing some code from the old system. The first option retains the stable structure of the original system, but results in a larger system than necessary. Such a system might be slow and will occupy an unnecessarily large amount disk space, but the risk of bugs creeping into the system appears minimal. The second choice would provide a more usable system, but, as it is essentially a new software product, there is a higher risk of production errors. Again students are to estimate the risks involved with each option. Issues to be considered include whether either method is more likely to compromise the quality of the final product and the cost of the effort involved in coding, setup, training and after sales support. Case 3: A local area public health service collects data from patient visits to a number of hospitals and community health centres. Currently the data recorded is used only for statistical purposes. The hospitals and community health services issue different Medical Reference Numbers (MRNs), thus there is no unique identifier for patients. While this may slightly skew statistical results, it does not, of itself, pose a danger to the well being of patients. The health service wishes to use the current system as a basis for establishing a Case History database. The database will provide both hospital and community health staff with access to patient case histories, thus allowing decisions to be made immediately without waiting for detailed medical records to be transferred. The health service intends to migrate all existing data into the new Case History database system. Once the new system is deployed, it is intended that all patients receiving treatment will be issued with a unique MRN to be used at any centre or hospital in the system. Students are asked to assess the safety integrity level of this system. There are a number of safety risks inherent in the proposed system. Examples include the risk that crucial data from the preexisting system is mis-identified, and thus cannot be matched to the correct patient or a patient under the new system is issued a new MRN and their previous history is not linked correctly. In both these situations a mis-diagnosis may occur or incorrect treatment undertaken, as the full history is not available.
9 5. Conclusion Instead of playing a minor role as a sub-component of software project management, risk can and should be given status as a complete subject in its own right and integrated across all phases of the SE curriculum. The need to re-emphasise risk is largely due to much of the software development effort shifting from large organisations to small teams employed largely by SMEs. Such projects involve three dimensions of risk, generic project risks, risks associated with adapting processes intended for larger teams and risks inherent in the nature of the product, however, risk management is at best cursory, at worst non-existent, mostly due to lack of risk management education. This deficiency is often attributed to the notion that risks cannot be adequately assessed without prior experience. The course we have proposed overcomes this by using real and relevant case studies that allow the students to compare their assessments against actual outcomes. Effectively the students develop their own experience as the course progresses. 6. References [1] Roberts Tom (1999) Why Can t we Implement This SDM? IEEE Software, Nov/Dec 1999, pp [2] Moitra D. (1999) Software Engineering in the Small. IEEE Computer, 32:10 pp [3] Fayad M. E., Laitinen M. & Ward R. P. (2000) Software Engineering in the Small. Communications of the ACM 43:3 pp [4] Fuller A., Croll P. & Garcia O. (2001) Why Software engineering is riskier than ever. To be presented at the 2nd Asia Pacific Conference on Quality Software (APAQS 2001), Hong Kong, Dec 10 11, 2001 [5] Fuller A, Croll P., Awyzio G. & Garcia O, Re-emphasising risk in the Software Engineering Syllabus, Proceedings of the Fifth IASTED International Conference on Software Engineering and Applications (SEA 2001) [6] Pressman Roger S. (2001) Adaptable Process Model. Hypertext version, accessed 4 April [7] McDermid, J.A. (2000) Complexity: concept, causes and control. Proceedings. Sixth IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2000, pp 2 9 [8] Shimeall Timothy J. & McDermott John J. (1999) Software Security in an Internet World: an Executive Summary. IEEE Software, July/August 1999, pp [9] Ahuja, V. (2000) Building trust in electronic commerce, IT Professional, 2 : 3, pp [10] Manchala, Daniel W. (2000) E-commerce Trust Metrics and Models. IEEE Internet Computing, March-April 2000, pp [11] Yan, G.; Paradi, J.C. (1999) Success criteria for financial institutions in electronic commerce. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, HICSS-32. [12] Platt, A.-B. (1999) The usability risk. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, pp [13] Kornbluh, Ken (2000) Technical Software, IEEE Spectrum, 37:1, pp [14] McCandless M. (1998) Staying Healthy in a Wired World, IEEE Intelligent Systems, Jan/Feb 1998, pp 2-3 [15] Anderson R. J. (2000) Privacy Lessons from Healthcare, S&P Proceedings of 2000 IEEE Symposium on Security and Privacy pp [16] Smith E. & Eloff J. (2000) Cognitive Fuzzy Modelling for Enhanced Risk Assessment in a Health Care Institution, IEEE Intelligent Systems, March-April 1998, pp 69-75
10 [17] Heard S., Grival T., Schloeffel P. & Doust J. (2000) The benefits and difficulties introducing a national approach to electronic health records in Australia. Report to the Electronic Records task Force, Commonwealth Dept. of Aged and Health Care, Australia Industry Science Resources (2001) Issues Paper - Expansion of the CRC Program [18] Longstaff, T.A.; Chittister, C.; Pethia, R.; Haimes, Y.Y. (2000) Are we forgetting the risks of information technology? Computer, Volume: 33 Issue: 12, pp [19] Devanbu, P.; Fong, P.W.-L.; Stubblebine, S.G. (1998) Techniques for trusted software engineering. Proceedings of the 1998 International Conference on Software Engineering, pp [20] Boehm B. (2000) Requirements that Handle IKIWIS, COTS, and Rapid Change. IEEE- Computer, 33:7 pp [21] Lindquist U. & Jonsson E. (1998) A Map of Security Risks Associated with Using COTS, IEEE Computer, June 1998, pp [22] Lindsey P. & Smith G. (2000) Safety Assurance of Commercial-Off-The-Shelf Software, Accessed 29/6/00, [23] McDermid, J.A. (1996) COTS: the expensive solution? IEE Colloquium on COTS and Safety Critical Systems (Digest No. 1997/013), pp 1/1-1/4 [24] Bourque P., Depuis R., Abran A., Moore J. W. & Tripp L. (1999) The Guide to the Software Engineering Body of Knowledge, IEEE Software Vol 16 No [25] Sommerville 1. (2001) Software Engineering. (6 th Edition) Addison Wesley [26] Pressman Roger S. (2000) Software Engineering: A Practitioner s Approach. (5 th Edition) McGraw Hill [27] Jacobsen Ivar (1992) Object Oriented Software Engineering: A Use Case Driven Approach, Addison Wesley [28] Macdonell S. G. & Gray A. R. (1999) SWEBOK: Software engineering management knowledge area description version 0.6 SWEBOK, [29] Karolak D W (1996) Software engineering risk management. IEEE Computer Society Press [30] Bagert D., Hilburn T. B., Hislop G., Lutz M., MeCracken M. & Mengel S. (1999) Guidelines for Software Engineering Education Version 1.0, CMU/SEI-99-TR-032, Carnegie-Mellon University/Software Engineering Institute, [31] Fairley, R. (1994) Risk management for software projects. IEEE Software 11:3 pp [32] Myerson M. (1996) Risk Management Processes for Software Engineering Models. Artech House [33] SEI (1993) Taxonomy -Based Risk Identification Software Engineering Institute, CMU/SEI-93-TR-6 [34] Collofello J. (2000) Question List for Software Risk Identification in the classroom, Arizona State University Software Risk Management Home Page [35] Petroski Henry (1994) "Design Paradigms: Case Histories of error and judgment in Engineering", Cambridge University Press [36] Croll PR, Chambers C, Bowell M and Chung PWH (1997) Towards Safer Industrial Computer Control Systems, SAFECOM'97, York Univ. 1, pp [37] Stratton, M Holcombe & PR Croll, Improving the Quality of Software Engineering Courses through University based Industrial Projects, Project'98, HEFCE workshop on the projects in the Computing Curriculum, Univ. of Sheffield, April 1998, pp
White paper: Comprehensive Review and Implementation of Risk Management Processes in Software Development
White paper: Comprehensive Review and Implementation of Risk Management Processes in Software Development This paper reviews the principles of risk management in software development of GxP systems, elaborates
Comprehensive Review and Implementation of Risk Management Processes in Software Development
Comprehensive Review and Implementation of Risk Management Processes in Software Development This paper reviews the principles of risk management in software development of GxP systems, elaborates on the
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective
Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT
A Comparison of Computer Science and Software Engineering Programmes in English Universities
A Comparison of Computer Science and Software Engineering Programmes in English Universities Farid Meziane and Sunil Vadera School of Computing, Science and Engineering University of Salford, Salford M5
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Software Engineering from an Engineering Perspective: SWEBOK as a Study Object
Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Alain Abran a,b, Kenza Meridji b, Javier Dolado a a Universidad del País Vasco/Euskal Herriko Unibertsitatea b Ecole de technologie
The Role of Modelling in Teaching Formal Methods for Software Engineering
The Role of Modelling in Teaching Formal Methods for Software Engineering A. J. Cowling Department of Computer Science University of Sheffield Sheffield, England [email protected] Abstract. This
Data Quality Assurance: Quality Gates Framework for Statistical Risk Management
Data Quality Assurance: Quality Gates Framework for Statistical Risk Management Narrisa Gilbert Australian Bureau of Statistics, 45 Benjamin Way, Belconnen, ACT, Australia 2615 Abstract Statistical collections
Recommended Skills and Knowledge for Software Engineers -Steve Tockey
Recommended Skills and Knowledge for Software Engineers -Steve Tockey Software Engineering: The Development Process, Vol I, Chapter 1 Presented by Gargi Chipalkatti (Software Engineering II - EEL 6883)
Chapter 1 Introduction
Chapter 1 Introduction Chapter 1 Introduction Slide 1 Topics covered Professional software development What is meant by software engineering. Addendum to Sommerville s FAQs Software engineering ethics
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
THE PSYCHOLOGICAL SOCIETY OF IRELAND CUMANN SÍCEOLAITHE ÉIREANN
THE PSYCHOLOGICAL SOCIETY OF IRELAND CUMANN SÍCEOLAITHE ÉIREANN GUIDELINES ON THE ACCREDITATION OF COURSES LEADING TO A FIRST QUALIFICATION IN PSYCHOLOGY Ratified by Council: November 2004 1. Rationale
A Life-Cycle Engineering Case Study
A Life-Cycle Engineering Case Study Thomas B. HILBURN, Massood TOWHIDNEJAD, Salamah SALAMAH Department of Electrical, Computer, Software, and Systems Engineering Embry-Riddle Aeronautical University Daytona
HRD - much more than just training!
HRD - much more than just training! Cec Pedersen* Department of Human Resource Management & Employment Relations University of Southern Queensland. Paper presented at Australian Institute of Training &
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 EXAMINERS REPORT Friday 2 nd October 2015 Answer any THREE
The SWEBOK Initiative and Software Measurement Intentions
The SWEBOK Initiative and Software Measurement Intentions Abstract ALAIN ABRAN Executive Co-editor, SWEBOK Project Pierre Bourque, Robert Dupuis (Co-editors) Articulating a body of knowledge is an essential
Software Quality Assurance in Agile, XP, Waterfall and Spiral A Comparative Study
Software Quality Assurance in Agile, XP, Waterfall and Spiral A Comparative Study S. Vijayakumar [email protected] School of Computer and Information Science University of South Australia,
Document Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.0 Document Status Document Owner Prepared By ITIL Service Management Practices: V3 Qualifications
TEACHING QUALITY ASSURANCE AND PROJECT MANGEMENT TO UNDERGRDUATE COMPUTING STUDENTS IN PAKISTAN
TEACHING QUALITY ASSURANCE AND PROJECT MANGEMENT TO UNDERGRDUATE COMPUTING STUDENTS IN PAKISTAN ABSTRACT Zaigham Mahmood University of Derby, UK School of Computing, University of Derby, Derby, DE22 1GB,
Developing In-House Vs. Off the Shelf. - A white paper by Clydebuilt Business Solutions Ltd
Developing In-House Vs. Off the Shelf - A white paper by Clydebuilt Business Solutions Ltd Developing In House vs. Off the Shelf Naturally, as a software development company that operates solely within
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
Bringing Real-life Practice in Software Project Management Training Through a Simulation-based Serious Game
Bringing Real-life Practice in Software Project Management Training Through a Simulation-based Serious Game Alejandro Calderón and Mercedes Ruiz Department of Computer Science and Engineering, University
Introduction to Software Engineering
What is Software Engineering Introduction to Software Engineering Prof. Lyle N. Long [email protected] http://www.personal.psu.edu/lnl Sources of Material What is software? Software Engineering, 7 th Edition,
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION TECHNOLOGY IN EDUCATION (MSc[ITE])
229 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION TECHNOLOGY IN EDUCATION (MSc[ITE]) (See also General Regulations) Any publication based on work approved for a higher degree should contain
CHAPTER 01 THE SCOPE OF SOFTWARE ENGINEERING
Lecture Software Engineering CHAPTER 01 THE SCOPE OF SOFTWARE ENGINEERING Lecture Software Engineering Topics Introduction Historical Aspects Economic Aspects Requirements, Analysis, and Design Aspects
A Risk Management Capability Model for use in Medical Device Companies
A Risk Management Capability Model for use in Medical Device Companies John Burton Vitalograph Ltd. Gort Rd. Business Park Ennis Ireland 353.65.686471 [email protected] Fergal Mc Caffery Lero
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Embedding Digital Continuity in Information Management
Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Chapter 1- Introduction. Lecture 1
Chapter 1- Introduction Lecture 1 Topics covered Professional software development What is meant by software engineering. Software engineering ethics A brief introduction to ethical issues that affect
Identifying & Managing IT Risks to Your Business
Identifying & Managing IT Risks to Your Business In a competitive business environment, every organization operates in a climate of risk. It is never possible to remove all risk from a business, but it
Introduction to Software Engineering
CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study
Chapter 1- Introduction. Lecture 1
Chapter 1- Introduction Lecture 1 Topics covered Professional software development What is meant by software engineering. Software engineering ethics A brief introduction to ethical issues that affect
An Analysis of Accidents Caused by Improper Functioning of Machine Control Systems
International Journal of Occupational Safety ANALYSIS and Ergonomics OF ACCIDENTS (JOSE) CAUSED 2004, Vol. BY CS 10, FAILURE No. 2, 129 136 An Analysis of Accidents Caused by Improper Functioning of Machine
Quality Management. Lecture 12 Software quality management
Quality Management Lecture 12 Software quality management doc.dr.sc. Marko Jurčević prof.dr.sc. Roman Malarić University of Zagreb Faculty of Electrical Engineering and Computing Department of Fundamentals
Application of software product quality international standards through software development life cycle
Central Page 284 of 296 Application of software product quality international standards through software development life cycle Mladen Hosni, Valentina Kirinić Faculty of Organization and Informatics University
Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form
Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form Student Name: Jane Doe Date: 9/19/2002 Project Title: Re-Engineer
TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW
Year 2014, Vol. 1, issue 1, pp. 49-56 Available online at: http://journal.iecuniversity.com TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Singh RANDEEP a*, Rathee AMIT b a* Department of
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM)
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Pankaj Jalote 1 Infosys Technologies Ltd. Bangalore 561 229 Fax: +91-512-590725/590413 [email protected], [email protected]
Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
Factors that Influence the Occupational Health and Safety Curricula. Jeffery Spickett. Division of Health Sciences Curtin University Australia
Factors that Influence the Occupational Health and Safety Curricula Jeffery Spickett Division of Health Sciences Curtin University Australia 1.0 INTRODUCTION Occupational health and safety has undergone
1. Software Engineering Overview
1. Overview 1. Overview...1 1.1 Total programme structure...1 1.2 Topics covered in module...2 1.3 Examples of SW eng. practice in some industrial sectors...4 1.3.1 European Space Agency (ESA), software
A Case study based Software Engineering Education using Open Source Tools
A Case study based Software Engineering Education using Open Source Tools Sowmya B J Dept. of CSE M. S. Ramaiah Institute of Technology [email protected] Srinidhi Hiriyannaiah Dept. of CSE M.S. Ramaiah
IT SPIRAL: A Case Study in Scalable Software Engineering Education
22nd Conference on Software Engineering Education and Training IT SPIRAL: A Case Study in Scalable Software Engineering Education Michael Barker, Katsuro Inoue Nara Institute of Science and Technology,
The Software Engineering Competency Model (SWECOM)
The Software Engineering Competency Model (SWECOM) presented by Dick Fairley Software and Systems Engineering Associates (S2EA) [email protected] Copyright Dick Fairley 2014 slide 1 Presentation Agenda
Mobile Device and Technology Characteristics Impact on Mobile Application Testing
13 Mobile Device and Technology Characteristics Impact on Mobile Application Testing TINA SCHWEIGHOFER AND MARJAN HERIČKO, University of Maribor Mobile technologies have a significant impact on processes
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
The Emergence of Software Engineering Professionalism
The Emergence of Software Engineering Professionalism The Role of Professional Societies in the Emergence of Software Engineering Professionalism in the United States and Canada Stephen B. Seidman University
Technology management in warship acquisition
management in warship acquisition A J Shanks B.Eng(Hons) MIET BMT Defence Services Limited SYNOPSIS Today s warship designers and engineers look to technology to provide warships and systems better, cheaper
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains Mary J. Simpson System Concepts 6400 32 nd Northwest, #9 Seattle, WA 98107 USA Joseph J. Simpson System Concepts
Security Risk Assessment of Software Architecture
Security Risk Assessment of Software Architecture Fadi HajSaid 1, Yousef Hassouneh 2, Hany Ammar 1, 1 West Virginia University, USA; 2 Birzeit University, Palestine [email protected], [email protected],
Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets
Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets Franklin Wabwoba, Anselimo Peters Ikoha Masinde Muliro University of Science and Technology, Computer
Towards Web Design Frameworks (Wdfs)
14 Towards Web Design Frameworks (Wdfs) Rehema Baguma, Faculty of Computing and IT, Makerere University. [email protected]; Ogao Patrick, Department of Information Systems, Faculty of Computing and
6. Software Lifecycle Models. A software lifecycle model is a standardised format for planning organising, and running a new development project.
6. Software Lifecycle Models A software lifecycle model is a standardised format for planning organising, and running a new development project. Hundreds of different kinds of models are known and used.
Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture
5 th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics January 25-26, 2007 Poprad, Slovakia Knowledge-based Approach in Information Systems Life Cycle and Information
SWEBOK Certification Program. Software Engineering Management
SWEBOK Certification Program Software Engineering Management Copyright Statement Copyright 2011. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted
Real-World Object-Oriented Design Experience for Computer Science Students
Real-World Object-Oriented Design Experience for Computer Science Students Abstract Due to the limitations of time and resources, many undergraduate Software Engineering courses provide a survey of a broad
Designing Programming Exercises with Computer Assisted Instruction *
Designing Programming Exercises with Computer Assisted Instruction * Fu Lee Wang 1, and Tak-Lam Wong 2 1 Department of Computer Science, City University of Hong Kong, Kowloon Tong, Hong Kong [email protected]
ADVANCES IN TECHNOLOGY-BASED EDUCATION: TOWARDS A KNOWLEDGE BASED SOCIETY
ADVANCES IN TECHNOLOGY-BASED EDUCATION: TOWARDS A KNOWLEDGE BASED SOCIETY Proceedings of the II International Conference on Multimedia and Information & Communication Technologies in Education m-icte2003
COURSE CODE : 4072 COURSE CATEGORY : A PERIODS / WEEK : 4 PERIODS / SEMESTER : 72 CREDITS : 4
COURSE TITLE : SOFTWARE ENGINEERING COURSE CODE : 4072 COURSE CATEGORY : A PERIODS / WEEK : 4 PERIODS / SEMESTER : 72 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Software engineering discipline evolution
Software-based medical devices from defibrillators
C O V E R F E A T U R E Coping with Defective Software in Medical Devices Steven R. Rakitin Software Quality Consulting Inc. Embedding defective software in medical devices increases safety risks. Given
Processing Requirements by Software Configuration Management
Processing Requirements by Software Configuration Management Ivica Crnkovic 1, Peter Funk 1, Magnus Larsson 2 1 Mälardalen University, Department of Computer Engineering, S-721 23 Västerås, Sweden {ivica.crnkovic,
Introduction to Software Engineering Professional Issues SWENET OSE2 Module June 2003
Introduction to Software Engineering Professional Issues SWENET OSE2 Module June 2003 Developed with support from the National Science Foundation OSE2-1 Overview The Software Engineering Profession Professional
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.
CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping
How do you test to determine which backup and restore technology best suits your business needs?
KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers
Document management concerns the whole board. Implementing document management - recommended practices and lessons learned
Document management concerns the whole board Implementing document management - recommended practices and lessons learned Contents Introduction 03 Introducing a document management solution 04 where one
Unit 15: Risk Management
Unit 15: Risk Management Objectives Ð To explain the concept of risk & to develop its role within the software development process Ð To introduce the use of risk management as a means of identifying &
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.
Information Technology An Academic Discipline
Information Technology An Academic Discipline This document represents a summary of the following two publications defining Information Technology (IT) as an academic discipline. IT 2008: Curriculum Guidelines
Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.
: Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks
KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity
INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION TECHNOLOGY IN EDUCATION (MSc[ITE]) *
260 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN INFORMATION TECHNOLOGY IN EDUCATION (MSc[ITE]) * (See also General Regulations) Any publication based on work approved for a higher degree should
Knowledge Infrastructure for Project Management 1
Knowledge Infrastructure for Project Management 1 Pankaj Jalote Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur, India 208016 [email protected] Abstract In any
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
SILs and Software. Introduction. The SIL concept. Problems with SIL. Unpicking the SIL concept
SILs and Software PG Bishop Adelard and Centre for Software Reliability, City University Introduction The SIL (safety integrity level) concept was introduced in the HSE (Health and Safety Executive) PES
The Impact of Software Process Improvements in Small and Medium Scale Enterprises
The Impact of Software Process Improvements in Small and Medium Scale Enterprises G.K.Viju, Mohammed Merghany Abd Elsalam, Khalid Ahmed Ibrahim, Mohammed Jassim Mohammed Jassim Abstract Most of the software
