SOFTWARE RISK MANAGEMENT
|
|
|
- Juniper Mitchell
- 10 years ago
- Views:
Transcription
1 SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team PMB 383, 3000 Custer Road, Suite 270 Plano, TX (voice) (fax) SUMMARY This paper reviews the basic concepts, terminology, and techniques of Software Management. It teaches readers how to identify and analyze software risks on their projects. Readers then learn techniques for planning and acting to mitigate risks so that the overall impact of those risks on their projects is minimized. KEY WORDS Analysis, Identification, Software Project Management DEFINING SOFTWARE RISK MANAGEMENT There are many risks involved in creating high quality software on time and within budget. However, in order for it to be worthwhile to take these risks, they must be compensated for by a perceived reward. The greater the risk, the greater the reward must be to make it worthwhile to take the chance. In software development, the possibility of reward is high, but so is the potential for disaster. The need for software risk management is illustrated in Gilb s risk principle. If you don t actively attack the risks, they will actively attack you" [Gilb-88]. In order to successfully manage a software project and reap our rewards, we must learn to identify, analyze, and control these risks. This paper focuses on the basic concepts, processes, and techniques of software risk management. There are basic risks that are generic to almost all software projects. Although there is a basic component of risk management inherent in good project management, risk management differs from project management in the following ways: Project Management Designed to address general or generic risks Looks at the big picture and plans for details Plans what should happen and looks for ways to make it happen Plans for success Management Designed to focus on risks unique to each project Looks at potential problems and plans for contingencies Evaluates what could happen and looks for ways to minimize the damage Plans to manage and mitigate potential causes of failure Within risk management the emphasis is shifted from crisis management to anticipatory management [Down-94]. Boehm defines four major reasons for implementing software risk management [Boehm-89]: 1. Avoiding software project disasters, including run away budgets and schedules, defect-ridden software products, and operational failures. 2. Avoiding rework caused by erroneous, missing, or ambiguous requirements, design or code, which typically consumes 40-50% of the total cost of software development. 3. Avoiding overkill with detection and prevention techniques in areas of minimal or no risk. 4. Stimulating a win-win software solution where the customer receives the product they need and the vendor makes the profits they expect. Copyright 2001 The Westfall Team. All Rights Reserved Page 1
2 DEFINING RISK So, what are risks? s are simply potential problems. For example, every time we cross the street, we run the risk of being hit by a car. The risk does not start until we make the commitment, until we step in the street. It ends when the problem occurs (the car hits us) or the possibility of risk is eliminated (we safely step onto the sidewalk of the other side of the street). A software project may encounter various types of risks: Technical risks include problems with languages, project size, project functionality, platforms, methods, standards, or processes. These risks may result from excessive constraints, lack of experience, poorly defined parameters, or dependencies on organizations outside the direct control of the project team. Management risks include lack of planning, lack of management experience and training, communications problems, organizational issues, lack of authority, and control problems. Financial risks include cash flow, capital and budgetary issues, and return on investment constraints. Contractual and legal risks include changing requirements, market-driven schedules, health & safety issues, government regulation, and product warranty issues. Personnel risks include staffing lags, experience and training problems, ethical and moral issues, staff conflicts, and productivity issues. Other resource risks include unavailability or late delivery of equipment & supplies, inadequate tools, inadequate facilities, distributed locations, unavailability of comp uter resources, and slow response times. RISK MANAGEMENT PROCESS Figure 1 illustrates the risk management process. This process starts with the identification of a list of potential risks. Each of these risks is then analyzed and prioritized. A risk management plan is created that identifies containment actions that will reduce the probability of the risk occurring and/or reduce the impact if the risk turns into a problem. The plan also includes contingency actions that will be taken if the risk turns into a problem and the associated triggers (indicators that the risk is turning into a problem). The containment part of the plan is then implemented and actions are taken. The tracking step involves monitoring the status of known risks as well as the results of risk reduction actions. If a trigger indicates the onset of a problem, the corresponding contingency plans are implemented. As new status and information are obtained, the risk management plans are updated accordingly. Tracking may also result in the addition of newly identified risks or in the closure of known risks. Prioritized s Plan Management Plan Analyze Information Containment Actions Status s Identify New / Closed s Track Trigger Status Contingency Actions Figure 1 - Management Process Copyright 2001 The Westfall Team. All Rights Reserved Page 2
3 The risk management process is an on-going part of managing the software development process. It is designed to be a continuous feedback loop where additional information and risk status are utilized to refine the project's risk list and risk management plans. Let's use the crossing the street analogy to examine the risk management process. First we identify the risk: we want to cross the street and know there is a possibility of traffic. We analyze the risk. What is the probability of being hit by the car? How much is it going to hurt if we are hit? How important is it that we cross this street at this time? We look both ways, we see the on-coming car, and we judge its rate of speed. We form a plan to reduce the risk and decide to wait until the car has passed. We implement the plan and wait. We track the situation by watching the car and we see it pull into a driveway. We change our plan and proceed across the street. We step onto the curb across the street and stop thinking about crossing the street (i.e., we close the risk). RISK IDENTIFICATION During the first step in the software risk management process, risks are identified and added to the list of known risks. The output of this step is a list of project-specific risks that have the potential of compromising the project's success. There are many techniques for identifying risks, including interviewing, reporting, decomposition, assumption analysis, critical path analysis, and utilization of risk taxonomies. Interviewing/Brainstorming: One technique for identifying risks is interviewing or brainstorming with project personnel, customers, and vendors. Open-ended questions such as the following can help identify potential areas of risk. What new or improved technologies does this project implement? What interfaces issues still need to be defined? What requirements exist that we aren t sure how to implement? What concerns do we have about our ability to meet the required quality and performance levels? Voluntary Reporting: Another risk identification technique is voluntary reporting, where any individual who identifies a risk is encouraged and rewarded for bringing that risk to management s attention. This requires the complete elimination of the shoot the messenger syndrome. It avoids the temptation to assign risk reduction actions to the person who identified the risk. s can also be identified through required reporting mechanisms such as status reports or project reviews. Decomposition: As the product is being decomposed during the requirements and design phases, another opportunity exists for risk identifications. Every TBD ("To Be Done/Determined") is a potential risk. As Ould states, The most important thing about planning is writing down what you don t know, because what you don t know is what you must find out [Ould-90]. Decomposition in the form of work breakdown structures during project planning can also help identify areas of uncertainty that may need to be recorded as risks. Assumption Analysis: Process and product assumptions must be analyzed. For example, we might assume the hardware would be available by the system test date or three additional experienced C++ programmers will be hired by the time coding starts. If these assumptions prove to be false, we could have major problems. Critical Path Analysis: As we perform critical path analysis for our project plan, we must remain on the alert to identify risks. Any possibility of schedule slippage on the critical path must be considered a risk because it directly impacts our ability to meet schedule. Taxonomies: taxonomies are lists of problems that have occurred on other projects and can be used as checklists to help ensure all potential risks have been considered. An example of a risk taxonomy can be found in the Software Engineering Institute s Taxonomy -Based Identification report that covers 13 major risk areas with about 200 questions [SEI-93]. Copyright 2001 The Westfall Team. All Rights Reserved Page 3
4 RISK ANALYSIS During the risk analysis step, each risk is assessed to determine: Likelihood: the probability that the risk will result in a loss Impact: the size or cost of that loss if the risk turns into a problem Timeframe: when the risk needs to be addressed (i.e., risk associated with activities in the near future would have a higher priority then similar risks in later activities) Additionally, the interrelationships between risks are assessed to determine if compounding risk conditions magnify losses. The following is an example of risk analysis. During our analysis, we determine that there is a 30% probability the Test Bed will be available one week later than scheduled and a 10% probability it will be a month late. If the Test Bed is one week late, the testers can use their time productively by using the simulators to test other aspects of the software (loss = $0). The simulator can be utilized for up to two weeks. However, if the Test Bed delivery is one month late, there are not enough productive activities to balance the loss. Losses include unproductive testers for two weeks, overtime later, morale problems, and delays in finding defects for a total estimated loss of $100,000. In addition to the dollar loss, the testing is on the critical path and not all of the lost testing time can be made up in overtime (loss estimated at two week schedule slippage). Boehm defines the Exposure equation to help quantitatively establish risk priorities [Boehm-89]. Exposure measures the impact of a ris k in terms of the expected value of the loss. Exposure (RE) is defined as the probability of an undesired outcome times the expected loss if that outcome occurs. RE = Probability(UO) * Loss (UO), where UO = Unexpected outcome Given the example above, the Exposure is 10% x $100,000 = $10,000 and 10% x 2 calendar week = 0.2 calendar week. Comparing the Exposure measurement for various risks can help identify those risks with the greatest probable negative impact to the project or product and thus help establish which risks are candidates for further action. The list of risks is then prioritized based on the results of our risk analysis. Since resource limitations rarely allow the consideration of all risks, the prioritized list of risks is used to identify risks requiring additional planning and action. Other risks are documented and tracked for possible future consideration. Based on changing conditions, additional information, the identification of new risks, or the closure of existing risks, the list of risks requiring additional planning and action may require periodic updates. RISK MANAGEMENT PLANNING Taking the prioritized risk list as input, plans are developed for the risks chosen for action. Figure 2 illustrates the specific questions that can be asked to help focus on the type of planning required. We will use the following two risks to illustrate the types of actions that might be taken using each risk handling technique: The subcontractor may not deliver the software at the required reliability level and as a result the reliability of the total system may not meet performance specifications. The interface with the new Is it to big a risk? No Do we know enough? Yes Can we transfer the risk? No Yes No Yes Avoid the Obtain Additional Information Transfer the Figure 2 - Techniques for Handling s Should we take action? Yes Control : Containment Plan Accept : Contingency Plan No Copyright 2001 The Westfall Team. All Rights Reserved Page 4
5 control device is Is it too big a risk? If the risk is too big for us to be willing to accept, we can avoid the risk by changing our project strategies and tactics to choose a less risky alternate or we may decide not to do the project at all. For example, if our project has tight schedule constraints and includes state of the art technology, we may decide to wait until a future project to implement our newly purchased CASE tools. Things to remember about avoiding risks include: Avoiding risks may also mean avoiding opportunities Not all risks can be avoided Avoiding a risk in one part of the project may create risks in other parts of the project Avoid the Develop all software in-house. Switch to a subcontractor with a proven reliability track record even though they are more expensive. Negotiate with the customer to move the implementation of this control device into a future software release. Replace the selected control device with an older device that has a well-defined interface. Do we know enough? If we don t know enough, we can plan to buy additional information through mechanisms such as prototyping, modeling, simulation, or conducting additional research. Obtain Additional Information Perform a capability assessment of the subcontractor. Ask for references from past customers and check on the reliability of previous products. Establish a communications link with device provider to obtain early design specifications for the device. Research interface specifications for other similar control devices by the same provider. Can we transfer the risk? If it is not our risk or if it is economically feasible to pay someone else to assume all or part of the risk, we can plan to transfer the risk to another organization. For example we can contract with a disaster recovery firm to provide backup computer facilities that will allow continuation of the project in case a fire or other disaster destroys the project's work environment. Transfer the Transfer the risk to the subcontractor by building penalties into the contract for delivered software that does not have the required reliability. Transfer the risk to the customer by building additional charges to the customer and/or late delivery alternatives into the contract if the customer does not supply the specification by its due date. Copyright 2001 The Westfall Team. All Rights Reserved Page 5
6 Should action be taken now? If we decide to attack the risk directly, we typically start with creating a list of possible risk reduction actions that can be taken for the risk. Two major types of risk reduction actions should be considered: 1. Actions that reduce the likelihood that the risk will occur 2. Actions that reduce the impact of the risk should it occur These may include actions such as establishing a liaison with the customer to insure adequate communications, conducting a performance simulation, or buying additional equipment for the test bed to duplicate the operational environment. Control the / Containment Plan Assign a project engineer to participate in the requirements & design inspection and to conduct alpha testing at the subcontractor s site. Require defect data reports from the subcontractor on a weekly basis during integration and system test. Assign a senior software engineer who has experience with similar control devices to the design task. Move the design task later in the schedule and increase its effort estimate. From the list of possible risk reduction actions, we must select those that we are actually going to implement. When considering which risk reduction activities to select, a cost/benefit analysis should be performed. Boehm defines the Reduction Leverage equation to help quantitatively establish the cost/benefit of implementing a risk reduction action. [Boehm-89]. Reduction Leverage measures the return on investment of the available risk reduction techniques. Reduction Leverage (RRL) is defined as the difference between the Exposure before and after the reduction activity divided by the cost of that activity. RRL = (RE before - RE after ) / Reduction Cost If the Reduction Leverage is less than one, it means that the cost of the risk reduction activity outweighs the probable gain from implementing the action. Contingency plans: If immediate risk reduction actions are not taken or if those actions reduce but do not eliminate the risk, it may be appropriate to develop risk contingency plans. Contingency plans are plans that are implemented only if the risk actually turns into a problem. Examples of contingency plans include disaster recovery plans, contacting a consulting firm to establish a fallback position if key personnel are not available, or selecting an alternative design approach if the new technology is not delivered as promised. Each risk that has a contingency plan should also have a trigger. A trigger is a time or event in the future that is the earliest indication that the risk will turn into a problem. For example, if there is a risk that outsourced software will not be delivered on schedule, the trigger could be whether the critical design review was held on schedule. A trigger can also be a relative variance or threshold metric. For example, if the risk is the availability of key personnel for the coding phase, the trigger could be a relative variance of more than 10% between actual and planned staffing levels. By default, all of the risks that didn t have a high enough priority to warrant action planning are risks that we have assumed. We should also consider assigning triggers to these risks as indicators that detect status or priority changes. For example, because the probability of both the test bed and simulator hardware not being delivered in time for System Test is so small, we did not select this risk for action. However, we may want to set a trigger at the Integration Test Readiness Review to reexamine that risk. s that are assigned triggers can be set at a "monitor only" status until the trigger occurs. At that time, the risk analysis step should be repeated to determine if risk reduction action is needed or if the contingency plan should be implemented. Copyright 2001 The Westfall Team. All Rights Reserved Page 6
7 There are trade-offs in utilizing triggers in risk management. We want to set the trigger as early as possible in order to ensure that there is plenty of time to implement risk reduction actions. We also want to set the trigger as late as possible because the longer we wait, the more information we have to make a correct decision and not implement unnecessary actions. Assume the / Contingency Plans Assumption: This is the best subcontractor for the job and we will trust them to deliver reliable software. Early Trigger (reassessment of risk indicated): Completion of Critical Design Review (CDR) later than June 1 st. Contingency Plan Trigger: More that 2 critical and 25 major defects detected during second pass of system test. Contingency Plan: Assign an engineer to liaison with the subcontractor on defect resolution and implement our regression test plan for maintenance releases from the subcontractor. Assumption: This new technology will greatly improve the usability of the system. We will assume that the interface definition will be available by the time we are ready to design the driver. Early Trigger (reassessment of risk indicated): Interface definition not received by start of Preliminary Design Review (PDR). Contingency Plan Trigger: Interface definition not received by start of CDR. Contingency Plan: Hold CDR with a To Be Done and hold a second CDR for just the subsystem that uses the device. Adjusting the project plan: Each selected action in the risk handling plans must include a description of the action and a list of tasks with assigned responsibilities and due dates. These actions must be integrated into the project plan with effort and cost estimations. Project schedules must be adjusted to include these new actions. For example, new tasks such as creating prototypes, doing research or conducting alpha testing at the customer s site must be included in the project plan. TAKING ACTION During the action step, we implement the risk reduction plan. Individuals execute their assigned tasks. Project effort estimations are adjusted to take into consideration additional effort needed to perform risk reduction activities or to account for projected additional effort if the risk turns into a problem. Some tasks may be moved forward in the schedule to ensure adequate time to deal with problems if they occur. Other tasks may be moved back in the schedule to allow time for additional information to be obtained. Budgets must also be adjusted to consider risk reduction activities. Copyright 2001 The Westfall Team. All Rights Reserved Page 7
8 TRACKING Results and impacts of the risk reduction implementation must be tracked. The tracking step involves gathering data, compiling that data into information, and then reporting and analyzing that information. This includes measuring known risks and monitoring triggers, as well as measuring the impacts of risk reduction activities. The results of the tracking can be: Identification of new risks that need to be added to the risk list. Validation of known risk resolutions so risks can be removed from the risk list because they are no longer a threat to project success. Information that dictates additional planning requirements Implementation of contingency plan Many of the software metrics typically used to manage software projects can also be used to track risks. For example, Gantt charts, earned value measures, and budget and resource metrics can help identify and track risks involving variances between plans and actual performance. Requirements churn, defect identification rates, and defect backlogs can be used to track rework risks, risks to the quality of the delivered product, and even schedule risks. CONCLUSIONS With ever-increasing complexity and increasing demand for bigger, better, and faster, the software industry is a highrisk business. When teams don't manage risk, they leave projects vulnerable to factors that can cause major rework, major cost or schedule over-runs, or complete project failure. Adopting a Software Management Program is a step every software manager can take to more effectively manage software development initiatives. management is an ongoing process that is implemented as part of the initial project planning activities and utilized throughout all of the phases of the software development lifecycle. management requires a fear-free environment where risks can be identified and discussed openly. Based on a positive, proactive approach, risk management can greatly reduce or even eliminate the need for crisis management within our software projects. REFERENCES [Boehm-89] [Down-94] [Gilb-88] [Ould-90] [SEI-93] Barry W. Boehm, Tutorial: Software Management, Les Alamitos, CA, IEEE Computer Society, Alex Down, Michael Coleman, Peter Absolon, Management for Software Projects, London, McGraw-Hill Book Company, Tom Gilb, Principles of Software Engineering Management, Wokingham, England: Addison- Wesley, Martyn Ould, Strategies For Software Engineering: The Management of and Quality, Chichester, England, John Wiley & Sons, Marvin J. Carr, Suresh L. Konda, Ira Monarch, F. Carol Ulrich, Clay F. Walker, Taxonomy -Based Identification, CMU/SEI-93-TR-006, Pittsburgh, PA, Software Engineering Institute, Copyright 2001 The Westfall Team. All Rights Reserved Page 8
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
Introduction to the ITS Project Management Methodology
Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
Managing Successful Software Development Projects Mike Thibado 12/28/05
Managing Successful Software Development Projects Mike Thibado 12/28/05 Copyright 2006, Ambient Consulting Table of Contents EXECUTIVE OVERVIEW...3 STATEMENT OF WORK DOCUMENT...4 REQUIREMENTS CHANGE PROCEDURE...5
Develop Project Charter. Develop Project Management Plan
Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs
Risk Assessment Worksheet and Management Plan
Customer/Project Name: The Basics There are four steps to assessing and managing risks, and effective risk management requires all four of them. 1. Identify the risks 2. Qualify the risks a. Assess each
Input, Output and Tools of all Processes
1 CIS12-3 IT Project Management Input, Output and Tools of all Processes Marc Conrad D104 (Park Square Building) [email protected] 26/02/2013 18:22:06 Marc Conrad - University of Luton 1 2 Mgmt /
Unit 15: Risk Management
Unit 15: Risk Management Objectives Ð To explain the concept of risk & to develop its role within the software development process Ð To introduce the use of risk management as a means of identifying &
Project Management Office (PMO)
Contents I. Overview of Project Management...4 1. Project Management Guide (PMG)...4 1.1 Introduction...4 1.2 Scope...6 1.3 Project Types...6 2. Document Overview, Tailoring, and Guidance...7 3. The Project
The 10 Knowledge Areas & ITTOs
This document is part of a series that explain the newly released PMBOK 5th edition. These documents provide simple explanation and summary of the book. However they do not replace the necessity of reading
PROJECT MANAGEMENT PLAN CHECKLIST
PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,
Knowledge Area Inputs, Tools, and Outputs. Knowledge area Process group/process Inputs Tools Outputs
HUMAN RESOURCE MANAGEMENT Organizational planning Staff Acquisition Project interfaces such as organizational interfaces, technical interfaces and interpersonal interfaces. Staffing requirements Staffing
Appendix V Risk Management Plan Template
Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
Integration Mgmt / Initiating Process Group 4.1 Develop Project Charter
1 Mgmt / Initiating Process Group 4.1 Develop Project Charter Project statement of work Business case Agreements Facilitation techniques Project charter 26/02/2013 18:23:36 1 2 Mgmt / Planning Process
Quick Reference Guide Interactive PDF Project Management Processes for a Project
Project Processes for a Project Click the Knowledge Area title (below and left in blue underline) to view the details of each Process Group. Project Process Groups and Knowledge Areas Mapping Project Process
RISK MANAGEMENT OVERVIEW - APM Project Pathway (Draft) RISK MANAGEMENT JUST A PART OF PROJECT MANAGEMENT
RISK MANAGEMENT OVERVIEW - APM Project Pathway (Draft) Risk should be defined as An uncertain event that, should it occur, would have an effect (positive or negative) on the project or business objectives.
HOW TO CREATE USEFUL SOFTWARE PROCESS DOCUMENTATION ABSTRACT
HOW TO CREATE USEFUL SOFTWARE PROCESS DOCUMENTATION Linda Westfall The Westfall Team [email protected] 3000 Custer Road, Suite 270, PMB 383 Plano, TX 75075 ABSTRACT Whether our organization is
Project Zeus. Risk Management Plan
Project Zeus Risk Management Plan 1 Baselined: 5/7/1998 Last Modified: N/A Owner: David Jones/Zeus Project Manager Page Section 1. Introduction 3 1.1 Assumptions, Constraints, and Policies 3 1.2 Related
Project Integration Management
Integration Initiating ning Executing Monitoring & Controlling Closing 4.1 Develop Charter Statement Of Work Business Case 4.2 Develop 4.3 Direct and Manage Work 4.4 Monitor and Control Work 4.5 Perform
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
SWEBOK Certification Program. Software Engineering Management
SWEBOK Certification Program Software Engineering Management Copyright Statement Copyright 2011. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted
Project Knowledge Areas
From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.
Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas)
Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas) Nutek, Inc. 3829 Quarton Road, Suite 102 Bloomfield Hills, Michigan 48302, USA. Phone: 248-540-4827, Email: [email protected]
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
PMP Project Management Professional Study Guide, Third Edition
PMP Project Management Professional Study Guide, Third Edition Joseph Phillips McGraw-Hill is an independent entity from the Project Management Institute, Inc. and is not affiliated with the Project Management
Managing IT Projects. Chapter 2 The PMI Framework
Managing IT Projects Chapter 2 The PMI Framework The PMI Framework The Project Management Institute,USA is an internationally acclaimed organization Devoted to Creation & sharing of knowledge in the area
Crosswalk Between Current and New PMP Task Classifications
Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the
Software Risk Management
Software Risk Management Former US Deputy Assistant Secretary of the Air Force Lloyd Mosemann said: Software is so vital to military system that, without it, most could not operate at all. Its importance
Project Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
PROJECT RISK MANAGEMENT
11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
Development and Acquisition D&A
Federal Financial Institutions Examination Council FFIEC Development and Acquisition D&A APRIL 2004 IT EXAMINATION H ANDBOOK Development and Acquisition Booklet April 2004 TABLE OF CONTENTS INTRODUCTION...
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge
1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project
The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.
CAPACITY AND AVAILABILITY MANAGEMENT A Project Management Process Area at Maturity Level 3 Purpose The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management 8. What is the principle of prototype model? A prototype is built to quickly demonstrate
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
PMP Examination Tasks Puzzle game
PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in
Risk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
Metadata-Based Project Management System. A Case Study at M-Files Corporation. Iulia Adomnita
Metadata-Based Project Management System. A Case Study at M-Files Corporation Iulia Adomnita University of Tampere School of Information Sciences Computer Science M.Sc. Thesis Supervisors: Timo Poranen,
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN April 2009 SLAC I 050 07010 002 Risk Management Plan Contents 1.0 INTRODUCTION... 1 1.1 Scope... 1 2.0 MANAGEMENT
10.1 Communications Planning 10.2 Information Distribution Figure 10 1 10.3 Performance Reporting 10.1 Communications Planning 10.
PROJECT 10 COMMUNICATIONS MANAGEMENT Project Communications Management includes the processes required to ensure timely and appropriate generation, collection, dissemination, storage, and ultimate disposition
ICT Project Management
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact
Know Your Enemy: Software Risk Management 1
Know Your Enemy: Software Risk Management 1 Karl E. Wiegers Process Impact 716-377-5110 www.processimpact.com Software engineers are eternal optimists. When planning software projects, we often assume
Project Management. [Student s Name] [Name of Institution]
1 Paper: Assignment Style: Harvard Pages: 10 Sources: 7 Level: Master Project Management [Student s Name] [Name of Institution] 2 Project Management Introduction The project management also known as management
Introduction to Software Engineering. 9. Project Management
Introduction to Software Engineering 9. Project Management Roadmap > Risk management > Scoping and estimation > Planning and scheduling > Dealing with delays > Staffing, directing, teamwork 2 Literature
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
PROJECT MANAGEMENT PLAN <PROJECT NAME>
PROJECT MANAGEMENT PLAN TEMPLATE This Project Management Plan Template is free for you to copy and use on your project and within your organization. We hope that you find this template useful and welcome
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
An Approach to Proactive Risk Classification
An Approach to Proactive Risk Classification M.S. Rojabanu 1, Dr. K. Alagarsamy 2 1 Research Scholar, Madurai Kamaraj Universtiy, Madurai,India. 2 Associate Professor, Computer Centre, Madurai Kamaraj
Establishing your Automation Development Lifecycle
Establishing your Automation Development Lifecycle Frequently I engage clients in assessing and improving their automation efforts. The discussion normally starts from a position of frustration We ve invested
Project Audit & Review Checklist. The following provides a detailed checklist to assist the PPO with reviewing the health of a project:
Project Audit & Review Checklist The following provides a detailed checklist to assist the PPO with reviewing the health of a project: Relevance (at this time) Theory & Practice (How relevant is this attribute
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
Continuous Risk Management at NASA
Continuous Risk Management at NASA Ted Hammer GSFC NASA 301-286-7123 [email protected] Control Identify Track Dr. Linda Rosenberg SATC NASA 301-286-0087 [email protected] Communicate
Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk
Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will
Project management. Organising, planning and scheduling software projects. Ian Sommerville 2000 Software Engineering, 6th edition.
Project management Organising, planning and scheduling software projects Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 4 Slide 1 Objectives To introduce software project management and
TECH. Tracking Progress. Project Schedule PHASE 1 STEP 1 ACTIVITY 1.1. Activity and Milestone STEP 1 STEP 2 : ACTIVITY 2.2 : ACTIVITY 1.
CH03 Planning and Managing the Project * Tracking Progress * Project Personnel * Effort Estimation * Risk Management * The Project Plan * Process Models and Project Management Tracking Progress Questions
In initial planning phases In monitoring and execution phases
Project management What is it? Project management is a framework for a range of tools for helping plan and implement development and change projects. A range of tools exist, including: Gantt charts (bar
The What, Why, Who, When and How of Software Requirements
SUMMARY The What, Why, Who, When and How of Software Requirements Linda Westfall President The Westfall Team 3000 Custer Road, Suite 270, PMB 101 Plano, TX 75075 [email protected] www.westfallteam.com
BETTER BUYING POWER 2.0 INITIATIVES DESCRIPTIONS
BETTER BUYING POWER 2.0 INITIATIVES DESCRIPTIONS Achieve Affordable Programs Mandate affordability as a requirement: The initiative to provide affordability caps for unit production cost and sustainment
Risk Management for IT Projects
Introduction There are a variety of standards associated with risk management including PMI s Project Management Body of Knowledge (PMBOK), Australia-New Zealand ANZ- 4360, International Standards Organization
PROJECT MANAGEMENT METHODOLOGY SECTION 3 -- PLANNING PHASE
PROJECT MANAGEMENT METHODOLOGY SECTION 3 -- PLANNING PHASE Table of Contents Introduction...3-1 Overview...3-1 The Process and the Project Plan...3-1 Project Objectives and Scope...3-1 Work Breakdown Structure...3-1
THE PROJECT MANAGEMENT KNOWLEDGE AREAS
THE PROJECT MANAGEMENT KNOWLEDGE AREAS 4. Project Integration Management 5. Project Scope Management 6. Project Time Management 7. Project Cost Management 8. Project Quality Management 9. Project Human
Project Risk Management
Project Risk Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Risk Management
Project Management Plan for the VDI Data Center Project
Project Management Plan for the VDI Data Center Project Prepared by: Moe Yousof A paper submitted to the Project Management Training Program in partial fulfillment of the requirements for the Project Management
Certificate In Project Management (CIPM)
Conceptualize Plan Plan & Deliver Organize Implement Control Change if Required Integrate Deliver & Closeout Knowledge Leverage Certificate In Project Management (CIPM) Course Overview The Certificate
Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com [email protected]
Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?
PROJECT TIME MANAGEMENT
6 PROJECT TIME MANAGEMENT Project Time Management includes the processes required to ensure timely completion of the project. Figure 6 1 provides an overview of the following major processes: 6.1 Activity
MNLARS Project Audit Checklist
Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?
Essential Elements for Any Successful Project
In this chapter Learn what comprises a successful project Understand the common characteristics of troubled projects Review the common characteristics of successful projects Learn which tools are indispensable
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
NEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
RETTEW Associates, Inc. RISK MANAGEMENT PLAN. for. (client project/rfp number) (date of proposal submission)
RISK MANAGEMENT PLAN for (client project/rfp number) (date of proposal submission) This proposal includes data that shall not be disclosed outside the government and shall not be duplicated, used, or disclosed
Introduction to the OCTAVE Approach
Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee
SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities
Crossing the DevOps Chasm
SOLUTION BRIEF Application Delivery Solutions from CA Technologies Crossing the DevOps Chasm Can improved collaboration and automation between Development and IT Operations deliver business value more
Summary of GAO Cost Estimate Development Best Practices and GAO Cost Estimate Audit Criteria
Characteristic Best Practice Estimate Package Component / GAO Audit Criteria Comprehensive Step 2: Develop the estimating plan Documented in BOE or Separate Appendix to BOE. An analytic approach to cost
Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news. Define a strategy early in your project
1 Problems that haven t happened yet Why is it hard? Some are wary of bearing bad news No one wants to be the messenger Or seen as a worrier Define a strategy early in your project 2 Identification, Analysis,
PMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
Certified Software Quality Engineer (CSQE) Body of Knowledge
Certified Software Quality Engineer (CSQE) Body of Knowledge The topics in this Body of Knowledge include additional detail in the form of subtext explanations and the cognitive level at which the questions
Disaster Recovery Planning Process
Disaster Recovery Planning Process By Geoffrey H. Wold Part I of III This is the first of a three-part series that describes the planning process related to disaster recovery. Based on the various considerations
Introduction to Risk Management for Software Projects. Peter Kolb. Distributed and Outsourced Software Engineering, - 1 - ETH Zurich
Introduction to Risk Management for Software Projects Peter Kolb Distributed and Outsourced Software Engineering, - 1 - ETH Zurich Purpose of Presentation To provide an Overview of the Risk Management
The Project Planning Process Group
3 The Project Planning Process Group............................................... Terms you ll need to understand: Activity Activity attributes Activity list Activity on arrow diagram (AOA) Activity
TenStep Project Management Process Summary
TenStep Project Management Process Summary Project management refers to the definition and planning, and then the subsequent management, control, and conclusion of a project. It is important to recognize
SERUM - Software Engineering Risk: Understanding and Management
SERUM - Software Engineering Risk: Understanding and Management D. Greer and D.W. Bustard Faculty of Informatics, University of Ulster, Cromore Road, Coleraine, BT52 1SA, Northern Ireland. Email: [email protected],
Software Risk Management
A Calculated Gamble Hans Schaefer [email protected] How to manage risk Not only in testing 2006 Hans Schaefer page 1 Hazard and Risk A Hazard is Any real or potential condition that can cause injury,
CONTRACT MANAGEMENT COURSES
CONTRACT MANAGEMENT COURSES Principles and Practices Administration of Commercial Contracts Commercial Applications Risk Management in the Sourcing Environment TM Principles and Practices Identify contract
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
