DIFFERENT TECHNIQUES FOR RISK MANAGEMENT IN SOFTWARE ENGINEERING: A REVIEW
|
|
|
- Veronica Hopkins
- 10 years ago
- Views:
Transcription
1 ASAC 2006 Banff, Alberta Subhas C. Misra Vinod Kumar Uma Kumar Eric Sprott School of Business Carleton University DIFFERENT TECHNIQUES FOR RISK MANAGEMENT IN SOFTWARE ENGINEERING: A REVIEW In this article, we introduce the principles of risk management, elaborate on the wellknown risk management approaches, and summarize some of the important concepts of each approach. Almost all of them encompass the basic steps of risk management, i.e., identifying the risks, analyzing them, planning mitigation strategies, and controlling them. Introduction The last few decades especially the end of 20 th century, and the beginning of 21 st century has shown an increase in the interest in automation of different activities. Automation is dependent in its core on sound functional software. The complexity of software development has increased significantly over the years. Articles showing the failure of projects in the software industry are not surprising. Standish Group reports (Standish Group, 1994) show that about 53% of projects get completed, but they do not meet the cost, and schedule requirements, and about 31% are canceled before the completion of the projects. These failure reports are significantly alarming. McManus (2004) identified that 65% of the project failures are accounted by management issues, and 35% by technical issues. Managerial issues include problems with project structure, project resources, planning methodologies, customer buy-in, and inadequate risk management. Technical issues include poor software design, non-adherence to software requirements, improper technical reviews, and incorrect development, and testing methodologies (McManus, 2004). It is conjectured that the management of risks can lead to the success of projects. Risk management has been popular in non-software domains for several decades. However, it is primarily in the last few years that risk management in software domains has become popular. However, at present risk management in software is a developing discipline it is poorly understood, and practiced. Compared to the risk management literature available in other disciplines (e.g., insurance, and manufacturing), the volume of risk management literature available in software is scarce. In this article, we attempt to review the fundamentals of software risk management, the different popular risk management process models, and the recent research trends in the area of software engineering risk management. Software engineering risk management activities are conducted at the project level, process level, and product level. However, in this article, we focus primarily on project-level, and process-level risk management. Practitioners and researchers poorly understand the area of software engineering risk management, even though the management of risks in software projects is an important issue, which can save millions of dollars in the projects. We also realized the scarcity of review articles in this area. This prompted us to exhaustively review the work done in this area, and prepare this article describing the important fundamental concepts in the area, the different important process models for risk management 196
2 that have become popular in the last 1.5 decades, and the recent research advances that have taken place in the last few years. This article should help the academicians, researchers, and practitioners interested in the area of risk management in software engineering to gain an overall understanding of the area. This article should be of immense help to the software engineering community, because to the best of our knowledge there is no such recent article that reviews the above. WHAT IS RISK? Principles The dictionary meaning of risk is the possibility of loss or injury (Source: Merriam-Webster Dictionary). The term risk has its Etymological origin in the Latin word resceare, which means to cutoff. It has evolved since then as the French word risqué, and the Italian word risco. The term risk is used universally in different contextual domains. For example, it is used in the financial sector to mean the possibility of incurring financial loss, and in the medical sector to mean the possibility of physiological loss to life. In the software world, risk is an important issue often referring to the sources of danger to software development, acquisition, procurement, or maintenance. One of the important considerations challenging any risk management researcher is the definition of risk. In other words, before proposing any risk management framework one needs to specify/quantify the dimensions of risks. This is because it is a challenge to unanimously agree on the definition of risk. There are several formal definitions of risk available in literature, few of which are presented below. A possible future event that, if it occurs, will lead to an undesirable outcome (Leishman and VanBuren, 2003). Risk is a combination of an abnormal event or failure, and the consequences of that event or failure to a system s operators, users, or environment. A risk can range from catastrophic (loss of an entire system, loss of life, or permanent disability) to negligible (no system damage or injury) (Glutch, 1994). Risk refers to a possibility of loss, the loss itself, or any characteristic, object, or action that is associated with that possibility (Kontio, 2001). WHAT IS RISK MANAGEMENT? Simply put, risk management is a way to manage risks. In other words, it concerns all activities that are performed to reduce the uncertainties associated with certain tasks, or events. In the context of projects, risk management reduces the impacts of undesirable events on a project. Risk management in any project requires undertaking decision-making activities. ORIGIN OF RISK MANAGEMENT Risk management has its roots in probability theory, and decision making under uncertainty. Three well-known theories in these areas expected utility theory (Bernoulli, 1954; Hogarth 1987), theory of bounded rationality (Simon, 1979), and prospect theory (Kahneman and Tversky, 1973; Kaheman et al., 1982) were of the greatest influence. These theories may be considered as disciplines by themselves. Therefore, to put our discussions on risk management in context, we briefly state below only what each of these theories propose. 197
3 In brief, the expected utility theory discusses how people make choices from different alternatives, based on their expected utility. The theory of bounded rationality states that for real life events, the outcomes, and their associated probabilities are very limitedly understood by people to make the required decisions to maximize their expected utility. Therefore, people have a tendency to set up targets of aspiration in life by eliminating alternatives from the different options they have. This theory is useful for modeling the behavior of project management personnel in charge of risk management. Prospect theory, which has its origin in Psychology, helps to model how the perceptions of human beings influence their choices from the given options. It, thus, helps for understanding, and estimating the utility losses of different alternatives while analyzing risks in risk management. PURPOSE OF SOFTWARE ENGINEERING RISK MANAGEMENT Risk management in software projects has different uses. It helps to save projects from failing due to different factors such as non-completion of projects within the specified schedule, and budget constraints, and not meeting customer expectations. Risk management looks at projects from different perspectives to ensure that the threats to the projects are identified, and analyzed, and appropriate strategies are undertaken to mitigate, and control risks. The mitigation strategies may not necessarily mean the cancellation of tasks that involve risks. Many tasks are undertaken in the software industries even after knowing that undertaking them involves taking high risks. The high-risk tasks are sometimes important to provide the industries a leading edge over their competitors. The main purpose of risk management is to know all possible risks to a project, assess their severity, and consequence, and then determine resolution steps depending on the nature of the risks. The idea is to minimize any unforeseen, and unexpected issues arising during the course of the project by properly planning for eventualities. Proper planning leads to minimizing uncertainties, which might lead to a turbulent completion, or a complete cancellation of the projects. Software engineering risk management takes a preventative approach leading to completion of projects within predictable time, and money. In fact, risk-managed projects have the ability to reduce project costs, and time of completion, and increase the overall quality of the project deliverables. Without these, projects could risk loss of revenue, and customer trust in an average case, or a complete bankruptcy of the participating organizations in the worst. RISK MANAGEMENT IN SOFTWARE ENGINEERING Risk management in software has been in existence for many decades. However, as mentioned earlier, it is only in the last decade, and a half or so that it has gained widespread importance in the software community. The software development projects in the early years of the last century conducted risk management using different ad hoc approaches, without following any systematic methodologies. However, with the increasing complexity of software development, industries have realized the importance of risk management, because it helps in reducing the uncertainties involved in developing software, and decreasing the chances of project failures. Before applying any risk management process, the project team members should be clear about the following dimensions of risks in their projects (Smith and Pichler, 2005): The nature of uncertainty involved, and the likelihood with which the risk will occur. The loss that will be incurred if the risk occurs. Loss in software projects can take many forms including loss of revenue, loss of market share, and loss of customer goodwill. The severity of the loss. The duration of the risks. 198
4 Research on Risk Management in Software Engineering POPULAR SOFTWARE RISK MANAGEMENT MODELS Several software risk management approaches have been proposed in the past, most of which assess risks during all the phases of software development, by integrating risk management practices along with the software development process. As a result, in these approaches, the risk management models follow a disciplined process. These approaches are listed below. Boehm s Risk Management Model (Win-Win) (Boehm, 1988; Boehm and Ross, 1989; Boehm and Bose, 1994; Boehm et al., 1998) SEI s Software Risk Management Model (SRE Version 2.0) (Williams et al., 1999) Hall s Risk Management Model (P 2 I 2 ) (Hall, 1998) Karolak s Risk Management Model (Just-In-Time Software) (Karolak, 1998) Kontio s Riskit Methodology (Kontio, 1997; Kontio, 2001) These approaches are summarized below. A horizontal comparison of all of these approaches may not be fair because, although each of them address risk management, they were developed under different circumstances for solving may be related but different issues. For example, Hall s P 2 I 2 was developed from a risk management capability modeling perspective. On the other hand, Boehm s Win- Win model was developed primarily as a novel software development process model ( spiral development) taking a risk-based approach. We provide below a high-level overview of these approaches. Boehm s Foundational Contributions: Boehm proposed a software development model that was riskdriven. The strength of his model, referred to as the Original Spiral Model (Boehm, 1988), eliminates risks from the early stages of software development, instead of encountering project barriers at the later stages. Boehm extended his Original Spiral Model using the Theory W (Win-Win) Model (Boehm and Ross, 1988; Boehm and Bose, 1994), which aims at satisfying the objectives, and concerns of the stakeholders. The Win-Win Model also supports risk identification, resolution, and continuous monitoring of risks. Although the strategy taken by Win-Win may not always be attainable in practice, it is an important contribution towards engaging stakeholders in the risk management process. Boehm (1991) also proposed a risk management framework, which helps to identify the primary sources of risk, analyze, and resolve them. This risk management framework can be integrated into the Original Spiral, or the Win-Win Model. SEI s Software Risk Management Approach: SEI provided a comprehensive risk management framework comprising of the following three groups of practices: Software Risk Evaluation, Continuous Risk Management, and Team Risk Management. The Software Risk Evaluation approach concerns the identification, analysis, communication, and mitigation strategies for software risk management. The approach depends on, amongst other elements, the risk taxonomy, which consists of constructs used for organizing risk information. The taxonomy helps in providing with an instrument (questionnaire) to elicit different classes of risks. The entire taxonomy of risks can be found in (Higuera and Haimes, 1996), and is omitted from here. The taxonomy has classification of risks into categories such as Requirements risks, Design risks, Coding and testing risks, Contract risks, Resource risks, and so on. Continuous risk management takes a principle-based approach for providing processes, methods, and tools for continuously managing risks during all the phases of software lifecycle. 199
5 Team risk management, on the other hand, is also a principle-based practice, but concerns the development of methodologies, processes, and tools for developing working relationships between the customers, and suppliers. All these three groups of practices are helpful to each other. For instance, taking a team-oriented approach for risk management helps in continuously managing risks. Hall s P 2 I 2 Approach: Hall (1998) approached risk management by identifying four different factors that have the potential to alter the expected results in any project. These factors are People, Process, Infrastructure, and Implementation. The People factor is concerned with human resource aspects for risk management. This is important because the success of any risk management activities is dependent on the successful communication of different issues arising while conducting risk management activities. The Process factor defines the processes that should be taken to manage risks for minimizing uncertainties involved in the project. The Infrastructure factor defines the requirements, resources, and results required to perform risk management activities in an organization. The Implementation factor concerns the actual implementation of risk management activities such as, establishing the initiatives for risk management, developing the plan, customizing the standard processes to meet the requirements of the project, assessing risks, and controlling risks. Karolak s Approach: Karolak (1998) took a Just-In-Time approach for risk management in software engineering. The Just-In-Time approach attempts to minimize the amount of risks involved, while optimizing the contingency strategies for problematic situations. It takes a risk-driven approach, and advocates the principle of managing risk during the early phases of software development lifecycle to reduce project cost, and time, and improving customer expectations. In his approach, he first identifies a set of high-level risk categories. Then he associates these risk categories to risk factors, risk metrics, and questions to be asked to project stakeholders. These questions are useful as checklists for identifying different classes of risks. Kontio s Riskit Approach: Kontio (2001) proposed the Riskit methodology, which provides a complete conceptual framework for risk management using a goal-, and stakeholder-oriented approach. It attempts to manage risks by capturing the intentions of stakeholders in the risk management process. The implementation of the Riskit methodology helps project managers with the accurate and timely dissemination of project information, opportunity, and risk to different stakeholders, thereby enabling to make critical decisions for the overall success of the project. Riskit also helps for systematically managing the project starting from identification, and analysis of risk to the monitoring, and control of them. At the heart of the Riskit approach is the designing of the Riskit Analysis Graph for analyzing risk factors, risk events, risk outcomes, risk counter-actions, risk effects, and utility loss that would occur due to a risk event. Kontio also proposed a risk management process improvement framework using concepts from Victor Basili s Experience Factory (Basili, 1993). Therefore, the actual understanding of the Riskit 200
6 Process Management Improvement (PMI) Framework requires an understanding of Experience Repository. Without getting into the details of the Experience Repository, we mention that the essential idea underlying Kontio s Riskit PMI Framework is utilizing experience, and information from previous software development projects for managing risks in the current project. RECENT ADVANCES After discussing the important software risk management process models, we discuss below five recent contributions in the area. They primarily propose risk analysis methodologies, and not a complete risk management framework, unlike the approaches we have seen in Section 3.1. Foo and Murugananthan s Approach: Foo and Murugananthan (2000) proposed a questionnaire-based approach for analyzing risks to provide their quantitative assessment. Their approach can be used to quantify risk elements, and use them to estimate a normalized value of the overall project risk. Their model, called the software risk assessment model (SRAM), is based on the use of situational factors to predict project risks. In other words, risk assessment in this model is dependent on the nature of the project, and the situations facing it. Their model is questionnaire based, and analyzes risks to provide their quantitative assessment. In their model, they consider nine critical risk elements: software complexity, project staff, targeted reliability, product requirements, estimation methodology, monitoring methodology, development process adopted, usability of development software, and tools. Thereafter, they frame a list of questions for the risk assessor, by providing three choices for each of the above critical risk elements. The answers of the assessors are assessed, and sorted according to their increasing risk-levels. Deursen and Kuipers Approach: Deursen and Kuipers (2003) proposed a novel risk assessment methodology by identifying the different primary facts, and secondary facts in a project. The primary facts are obtained by analyzing the system, and the secondary facts are obtained by interviewing different stakeholders, reviewing contract documents, project plans, requirements specifications, and design documents. Finally, the primary facts, and the secondary facts are taken in tandem, and compared to observe whether the risks perceived from both the angles are consistent with each other. This software risk assessment methodology is different from the traditional extremes of product risk management, and process risk management. The advantage of it is that it builds on the advantages of both the above-mentioned extremes to resolve risks having conflicting viewpoints amongst stakeholders. Roy s Approach: Roy (2004) developed the ProRisk management framework by extending the AS/NZS 4350 standard. It categorizes the risk management activities into the business domain, and the operational domain. It performs different activities such as, identifying the stakeholders, identifying the risks factors, constructing a risk-free model, calibrating the risk-free model, estimating the probabilities of risk events, evaluating the combined values of risk, developing action plans, and monitoring the progress. The ProRisk framework identifies two important focal points for risk management in projects: Business domain: Focuses on the organization and the project domain perspectives. It identifies the business parameters of the environment in which the project is conducted. Operational domain: It focuses on the formal modeling of different aspects of risk management in the project. Typical activities constituting the operational domain are measurement of risk values, 201
7 performing risk assessments, identifying, and proposing action plans for mitigating risks, implementing them, and continuously managing them. Tiwana and Keil s Approach: Recently, Tiwana, and Keil (2004) developed a handy software development risk assessment tool (methodology) that project managers could use to quickly assess some of the important project risks, and their effects. This tool, and the questions in it were developed as a result of risk management data collected from the IT managers of 60 companies. The important achievement of this tool is that it can help in quickly assessing the important risks threatening a project, instead of deploying a full-fledged, time, and budget consuming risk management methodology. Misra et al s Approach: Misra et al. (2005) have also proposed an approach for software engineering risk management. This approach could be used by project managers to model, and control risks in software projects. There are no similar approaches on modeling software project risks in the existing pieces of literature. The approach is, thus, novel to the area of software risk management. The approach is helpful to project managers for performing means-end analysis, thereby uncovering the structural origin of risks in a project, and how the root-causes of such risks can be controlled from the early stages of the projects. Though some attempt has been made to model risk management in enterprise information systems using conventional modeling techniques, like data flow diagrams, and UML, the previous works have analyzed, and modeled the same just by addressing what a process is like. However, they do not address why the process is the way it is. Our proposed approach addresses this limitation of the existing software project risk management models by exploring the strategic dependencies between the actors of a project, and analyzing the motivations, intents, and rationales behind the different entities, and activities in a project. The concept of strategic dependencies between the actors of a project is not new. A good review of the concept can be found in Chung et al. (2000). This approach is restricted to providing a methodology that one could use in the existing risk management lifecycle models to analyze, and uncover the structural origin of the risks, and control the risks from the early phases of a project. OTHER RELATED WORKS The approaches described above do not help in predicting the reliability of the final products. Another class of researchers approached risk management from a product reliability viewpoint. They took a probabilistic approach for assessing software risk by measuring reliability of the products. Specifically, they do not solve the problem of managing risks in project failure due to its inability to complete within the required budget, and schedule. Therefore, as mentioned before, in this article we intentionally omit discussing such approaches here, and limit the scope of this article to the discussions of project, and process risk management methodologies. However, for the sake of completeness, we mention that some of the excellent works on product risk management (specifically, software reliability) can be found in Karunanithi and Whitley (1992), Lanning (1995), Lyu (1995), and Musa (1998). Conclusions In this article, we attempted to present an overview of the fundamental concepts on risk management in software engineering and important research conducted in the area, and then evaluated them. Although the work in risk management in other disciplines started more than a century ago, most of the important works in the area of risk management in software engineering were published in the last 15 years. Still there is a lack of understanding of the area amongst the software engineering practitioners. This review article should help the academicians, researchers, and practitioners. It should help the software project managers to quickly grasp the fundamentals in the area, and quickly decide which methodology they should use in their organization for specific projects. However, it should be noted that the article is aimed to provide only an overview of the different concepts, and methodologies. For 202
8 obtaining a detailed understanding of how each of the methodologies works, one needs to refer to the corresponding articles that published the methodology. The graduate students in advanced software engineering, project management, information systems courses, and other researchers in these areas will find this article invaluable, to learn about the different concepts in software engineering risk management. Many of the approaches discussed in this article are limited by the lack of empirical evidences supporting them. This is an important area in which future work should be targeted. Focus should be made on comparing the competing approaches with respect to a predefined set of evaluation criteria. For most of the proposed approaches we need controlled case studies, and actual field trials for assessing their effectiveness, and applicability under modern contexts, and shifting paradigms. References Basili, V.R The Experience Factory and its Relationship to Other Improvement Paradigms. Proceedings of the 1993 European Software Engineering Conference, Springer-Verlag. Bernoulli, D Exposition of New Theory on the Measurement of Risk, Econometrica, 22: Boehm, B. W A Spiral Model of Software Development and Enhancement, Computer, May, Boehm, B. W Software Risk Management: Principles and Practices, IEEE Software, 8(1): Boehm, B. W. et al Using the Win-Win Spiral Model: A Case Study, IEEE Computer, 31(7), Boehm, B. W. and Bose, P A Collaborative Spiral Software Process Model Based on Theory W, Proceedings of the 1994 International Conference on Software Process, IEEE Computer Society, Washington. Boehm, B.W. and Ross, R Theory-W Software Project Management: A Case Study, Proceedings of the 1988 International Conference on Software Engineering, Singapore, Boehm, B.W.and Ross,R Theory W Software Project Management: Principles and Examples. IEEE Transactions on Software Engineering. 15(7): Chung, L, Nixon, B.A.,Yu, E. and Mylopoulos J Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers. Deursen, A. v. and Kuipers, T Source-Based Software Risk Assessment. Proceedings of the 2003 International Conference on Software Maintenance, Amsterdam, Netherlands. Donzelli, P Agents, Goals, and Quality in a Structured Requirements Engineering Framework - A Case Study. Proceedings of 2002 CAiSE'02, Toronto, Ontario. Dorofee, A. J. et al Continuous Risk Management Guide Book, SEI, Carnegie Mellon University, Pittsburgh, PA, USA. 203
9 Foo, S. -W. and Muruganantham, A Software Risk Assessment Model. Proc. of the 2000 IEEE International Conference on Management of Innovation and Technology, 2, Giunchiglia, F., Mylopoulos, J., and Perini, A The Tropos Software Development Methodology: Processes, Models and Diagrams. Proceedings of AOSE-2002, Bologna, Italy. Glutch, D. P A Construct for Describing Software Risks, Technical Report, Report # CMU/SEI-94- TR-14, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA. Hall, E. M Managing Risk: Methods for Software Systems Development, Addison-Wesley, Reading, U.K. Hogarth, R. M Judgment and Choice, John Wiley & Sons, New York, USA. Higuera R. P. and Haimes, Y. Y Software Risk Management, Technical Report, Report # CMU/SEI-96-TR-012, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA. Kahneman D., and Tversky A On the Psychology of Prediction, Psychology Review, 80, Kahneman, D., Slovic, P., and Tversky, A Judgment under Uncertainty: Heuristics and Biases, Cambridge University Press, New York. Karolak, D Software Engineering Risk Management, IEEE Computer Society Press, Los Alamitos, CA, USA. Karolak, D Software Engineering Risk and Just-In-Time Development, International Journal of Computer Science and Information Management, 1 (4). Karunanithi, N., and Whitley, D Using Neural Networks in Reliability Prediction, IEEE Software. Kontio, J The Riskit Method for Software Risk Management. Version 1.00, Technical Report, CS- TR-3782/UMIACS-TR-97-38, University of Maryland, Computer Science, College Park, MD, USA. Kontio, J Software Engineering Risk Management: A Method, Improvement Framework, and Empirical Evaluation. Ph.D. Thesis, Department of Computer Science and Engineering, Hensinki University of Technology, Finland, Lanning, D. L A Neural Network Approach for Early Detection of Program Modules Having High Risk in the Maintenance Phase, Journal of Systems and Software, 29. Leishman, T. R., and VanBuren, J The Risk of Not Being Risk Conscious: Software Risk Management Basics, STSC Seminar Series, Hill AFB, UT. Lyu, M Software Reliability Engineering, IEEE Computer Society Press. McManus J Risk Management in Software Development Projects, Elsevier. Misra, S. C., Kumar V., and Kumar, U Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects. Proceedings of the 2005 International Conference on Enterprise Information Systems, Miami, Florida, USA, May 25-28,
10 Musa, J Software Reliability Engineering: More Reliable Software, Faster Development and Testing, McGraw Hill. Roy, G.G A Risk Management Framework for Software Engineering Practice, Proceedings of the 2004 Australian Software Engineering Conference (AAWEC 04), IEEE Computer Society, April, Melbourne, Australia. Simon, H. A Rational Decision Making in Business Organizations. The American Economic Review, 69 (4), Smith P. G., and Pichler R Agile Risks/Agile Rewards, Software Development Magazine, Standards Australia AS/NZS 4360: 1999, Risk Management. Standish Group The Chaos Report, Tiwana, A., and Keil. M The One-Minute Risk Assessment Tool. Communications of the ACM, 47 (11), Williams, R.C, et al Software Risk Evaluation (SRE) Method Description (Version 2.0), Technical Report, Report # CMU/SEI-99-TR-029, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA. 205
White paper: Comprehensive Review and Implementation of Risk Management Processes in Software Development
White paper: Comprehensive Review and Implementation of Risk Management Processes in Software Development This paper reviews the principles of risk management in software development of GxP systems, elaborates
Software Risk Management Practice: Evidence From Thai Software Firms
, March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Comprehensive Review and Implementation of Risk Management Processes in Software Development
Comprehensive Review and Implementation of Risk Management Processes in Software Development This paper reviews the principles of risk management in software development of GxP systems, elaborates on the
Software Risk Management Practice: Evidence From Thai Software Industry
INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
Lowering business costs: Mitigating risk in the software delivery lifecycle
August 2009 Lowering business costs: Mitigating risk in the software delivery Roberto Argento IBM Rational Business Development Executive Valerie Hamilton IBM Rational Solution Marketing Manager and Certified
Success Factors of Agile Software Development
Success Factors of Agile Software Development Subhas C. Misra, Vinod Kumar, and Uma Kumar Carleton University, Ottawa, Canada Abstract Agile software development methodologies have recently gained widespread
Redesigned Framework and Approach for IT Project Management
Vol. 5 No. 3, July, 2011 Redesigned Framework and Approach for IT Project Management Champa Hewagamage 1, K. P. Hewagamage 2 1 Department of Information Technology, Faculty of Management Studies and Commerce,
Partnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
Project Management: Back to Basics
About this research note: Technology Insight notes describe emerging technologies, tools, or processes as well as analyze the tactical and strategic impact they will have on the enterprise. Project Management:
Software Risk Management: a Process Model and a Tool
Software Risk Management: a Process Model and a Tool Tereza G. Kirner 1, Lourdes E. Gonçalves 1 1 Graduate Program in Computer Science Methodist University of Piracicaba SP, Brasil [email protected];
Risk Management Adoption Framework for Software Projects: A Case Study for Kenyan Software Project Managers and Developers
www.ijcsi.org 365 Risk Management Adoption Framework for Software Projects: A Case Study for Kenyan Software Project Managers and Developers Noela Jemutai Kipyegen 1, Waweru Mwangi 2 and Stephen Kimani
Practical Experiences of Agility in the Telecom Industry
Practical Experiences of Agility in the Telecom Industry Jari Vanhanen 1, Jouni Jartti 2, and Tuomo Kähkönen 2 1 Helsinki University of Technology, Software Business and Engineering Institute, P.O. Box
Risk Analysis: a Key Success Factor for Complex System Development
Risk Analysis: a Key Success Factor for Complex System Development MÁRCIO DE O. BARROS CLÁUDIA M. L. WERNER GUILHERME H. TRAVASSOS COPPE / UFRJ Computer Science Department Caixa Postal: 68511 - CEP 21945-970
A Variability Viewpoint for Enterprise Software Systems
2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,
Elicitation and Modeling Non-Functional Requirements A POS Case Study
Elicitation and Modeling Non-Functional Requirements A POS Case Study Md. Mijanur Rahman and Shamim Ripon, Member IACSIT Abstract Proper management of requirements is crucial to successful development
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
An Approach to Proactive Risk Classification
An Approach to Proactive Risk Classification M.S. Rojabanu 1, Dr. K. Alagarsamy 2 1 Research Scholar, Madurai Kamaraj Universtiy, Madurai,India. 2 Associate Professor, Computer Centre, Madurai Kamaraj
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
P3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
AN EVALUATION OF SOFTWARE PROJECT RISK MANAGEMENT IN SOUTH AFRICA
N EVLUTION OF SOFTWRE PROJECT RISK MNGEMENT IN SOUTH FRIC B. de Wet 1 & J.K. Visser 2 Department of Engineering and Technology Management Graduate School of Technology Management University of Pretoria,
PMI Risk Management Professional (PMI-RMP) Exam Content Outline
PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,
Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk
Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will
Developing CMMI in IT Projects with Considering other Development Models
Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology
An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology A.Fatemi 1, N.NematBakhsh 2,B. Tork Ladani 3 Department of Computer Science, Isfahan University,
Defining Indicators for Risk Assessment in Software Development Projects
Defining Indicators for Risk Assessment in Software Development Projects Júlio Menezes Jr. Centro de Informática, Universidade Federal de Pernambuco, Recife, Brazil, 50740-560 [email protected] Cristine
EMPIRICAL STUDY OF THE EVOLUTION OF AGILE-DEVELOPED SOFTWARE SYSTEM IN JORDANIAN'S TELECOM
EMPIRICAL STUDY OF THE EVOLUTION OF AGILE-DEVELOPED SOFTWARE SYSTEM IN JORDANIAN'S TELECOM Dr.Walid Qassim Qwaider Majmaah University College of Science and Humanities in Ghat Management Information Systems
Issues in Information Systems
TAXONOMY OF MULTIPLE LEVELS OF SWOT ANALYSIS IN PROJECT MANAGEMENT Ganesh Vaidyanathan, Indiana University South Bend, [email protected] Asghar Sabbaghi, Indiana University South Bend, [email protected]
Develop Project Charter. Develop Project Management Plan
Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs
Appendix V Risk Management Plan Template
Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
REVIEW OF RISK MANAGEMENT METHODS
2011 Robert Stern, José Carlos Arias 59 REVIEW OF RISK MANAGEMENT METHODS Robert Stern (MBA), José Carlos Arias (PhD, DBA) Abstract Project development, especially in the software related field, due to
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives
Elicitation and Modeling Non-Functional Requirements A POS Case Study
Elicitation and Modeling Non-Functional Requirements A POS Case Study Md. Mijanur Rahman and Shamim Ripon, Member IACSIT Abstract Proper management of requirements is crucial to successful development
Palisade Risk Conference, 2014
Advanced Risk Management to Improve Cost and Schedule Performance on EPC Projects Risk-Management Best Practices from Nuclear Experience Palisade Risk Conference, 2014 Sola Talabi PhD MBA MSc BSc RMP Project
Reaching CMM Levels 2 and 3 with the Rational Unified Process
Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project
T T. Think Together 2011. Sandra Milena Choles Arvilla THINK TOGETHER. Srovnávání řízení rizik pro softwarové projekty
Česká zemědělská univerzita v Praze Provozně ekonomická fakulta Doktorská vědecká konference 7. února 2011 T T THINK TOGETHER Think Together 2011 Srovnávání řízení rizik pro softwarové projekty Comparative
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division
Risk Model For Software Development Personnel
, March 18-20, 2015, Hong Kong Risk Model For Software Development Personnel Esiefarienrhe Michael Bukohwo Abstract Availability of adequate personnel to commence and sustain a software project is a vital
TenStep Project Management Process Summary
TenStep Project Management Process Summary Project management refers to the definition and planning, and then the subsequent management, control, and conclusion of a project. It is important to recognize
Current Research Topic In Software Engineering
Current Research Topic In Software Engineering A PROJECT REPORT Submitted by MD. Mithun Ahamed Id: 13-96937-2 Under the guidance of DR. Dip Nandi in partial fulfillment for the award of the degre of Master
Project Management and Scrum A Side by Side Comparison by Anne Loeser, October 2006
Project Management and Scrum A Side by Side Comparison by Anne Loeser, October 2006 For decades, software development projects have followed the classic waterfall method in which software development initiatives
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
The use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
Space project management
ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards
A comparison of supply chain risk perceptions in Original Equipment Manufacturers and Tier One suppliers: A case-study in the aerospace industry.
011-0290 A comparison of supply chain risk perceptions in Original Equipment Manufacturers and Tier One suppliers: A case-study in the aerospace industry. Naomi Brookes Amrik Singh Aston Business School
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
[project.headway] Integrating Project HEADWAY And CMMI
[project.headway] I N T E G R A T I O N S E R I E S Integrating Project HEADWAY And CMMI P R O J E C T H E A D W A Y W H I T E P A P E R Integrating Project HEADWAY And CMMI Introduction This white paper
Project Management Guidebook
METHOD 12 3 empowering managers to succeed Project Management Guidebook ISBN 0-473-10445-8 A bout this e-book This e-book was created by Method123 (see www.method123.com) to help provide you with a simple
11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
Software Project Management. Objective. Course Objectives. Introduction to SPM
Software Project Management Lecture 01 Introduction to SPM 1 Objective Course Introduction (learning objectives) Course Contents & Grading Policy Motivation of Studying SPM What is Project What is Project
Software Risk Management
Software Risk Management Former US Deputy Assistant Secretary of the Air Force Lloyd Mosemann said: Software is so vital to military system that, without it, most could not operate at all. Its importance
feature requirements engineering
feature requirements engineering Exploring Alternatives during Requirements Analysis John Mylopoulos, University of Toronto Goal-oriented requirements analysis techniques provide ways to refine organizational
Story Card Based Agile Software Development
Story Card Based Agile Software Development Chetankumar Patel, and Muthu Ramachandran Leeds Metropolitan University, UK [email protected] Abstract The use of story cards for user stories in many Extreme
CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.
CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge
1 Extreme Heritage, 2007 Australia, 19-21 July 2007, James Cook University, Cairns, Australia Theme 6: Heritage disasters and risk preparedness approach for Cultural Heritage Projects Based on Project
A software for project management process
MPRA Munich Personal RePEc Archive A software for project management process Logica Banica and Doina Rosca and Cristian Stefan University of Pitesti, Faculty of Economics, University of Craiova, Faculty
Software Requirements Specification (SRS)
Software Requirements Specification (SRS) Meeting Scheduler MANISH BANSAL ABHISHEK GOYAL NIKITA PATEL ANURAG MAHAJAN SMARAK BHUYAN - 1 - VERSION RECORD Version record showing the amendments effected to
An Enterprise Framework for Evaluating and Improving Software Quality
An Enterprise Framework for Evaluating and Improving Software Quality Abstract Philip Lew [email protected] With the world s economy increasingly driven by software products, there has been a relentless
Surveying and evaluating tools for managing processes for software intensive systems
Master Thesis in Software Engineering 30 Credits, Advanced Level Surveying and evaluating tools for managing processes for software intensive systems Anuradha Suryadevara IDT Mälardalen University, ABB
SOFTWARE RISK MANAGEMENT
SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team [email protected] PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic
Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
Specialists in Strategic, Enterprise and Project Risk Management. PROJECT RISK MANAGEMENT METHODS Dr Stephen Grey, Associate Director
BROADLEAF CAPITAL INTERNATIONAL PTY LTD ACN 054 021 117 23 Bettowynd Road Tel: +61 2 9488 8477 Pymble Mobile: +61 419 433 184 NSW 2073 Fax: + 61 2 9488 9685 Australia www.broadleaf.com.au [email protected]
An Introduction to Risk Management. For Event Holders in Western Australia. May 2014
An Introduction to Risk Management For Event Holders in Western Australia May 2014 Tourism Western Australia Level 9, 2 Mill Street PERTH WA 6000 GPO Box X2261 PERTH WA 6847 Tel: +61 8 9262 1700 Fax: +61
Introduction to Software Engineering
CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study
Salion s Experience with a Reactive Software Product Line Approach
Salion s Experience with a Reactive Software Product Line Approach Ross Buhrdorf Dale Churchett Salion, Inc., 720 Brazos St., Ste. 700 Austin TX 78701 USA [email protected] [email protected]
Lifecycle Models: Waterfall / Spiral / EVO
Lifecycle Models: Waterfall / Spiral / EVO Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 Lifecycle The sequence of actions that must be performed in order to build a software
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
Software Quality Assurance in Agile, XP, Waterfall and Spiral A Comparative Study
Software Quality Assurance in Agile, XP, Waterfall and Spiral A Comparative Study S. Vijayakumar [email protected] School of Computer and Information Science University of South Australia,
Project Management Practices: The Criteria for Success or Failure
234 Iman Attarzadeh Siew Hock Ow Department of Software Engineering Faculty of Computer Science & Information Technology University of Malaya, 50603 Kuala Lumpur, MALAYSIA Email: [email protected],
Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects
State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement
Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management
Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management Approach Project management solutions for the Smart Grid
Using Rational Software Solutions to Achieve CMMI Level 2
Copyright Rational Software 2003 http://www.therationaledge.com/content/jan_03/f_cmmi_rr.jsp Using Rational Software Solutions to Achieve CMMI Level 2 by Rolf W. Reitzig Founder, Cognence, Inc. Over the
White Paper. PPP Governance
PPP Governance The Governance of Projects, Programs and Portfolios (PPP) (sometimes called project governance for convenience) is the sub-set of corporate and organisational governance 1 focused on assisting
Use a Risk Breakdown Structure (RBS) to Understand Your Risks
Use a Risk Breakdown Structure (RBS) to Understand Your Risks David Hillson, PhD, PMP, FAPM, MIRM, MCMI, Director of Consultancy, Management Professional Solutions Limited Introducing the Risk Breakdown
