Software Risk Management Practice: Evidence From Thai Software Industry



Similar documents
Software Risk Management Practice: Evidence From Thai Software Firms

Top Ten Lists of Software Project Risks : Evidence from the Literature Survey. Tharwon Arnuphaptrairong

Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504

An Approach to Proactive Risk Classification

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis

The Journal of Systems and Software

RISK MANAGEMENT AND TACIT KNOWLEDGE IN IT PROJECTS: MAKING THE IMPLICIT EXPLICIT

Partnering for Project Success: Project Manager and Business Analyst Collaboration

A Variability Viewpoint for Enterprise Software Systems

Project Risk Management

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance

Issues in Information Systems

Measuring Service Supply Chain Management Processes: The Application of the Q-Sort Technique

CONTENTS. Preface. Acknowledgements. 1. Introduction and Overview 1 Introduction 1 Whatis the CMMI"? 2 What the CMMI* is Not 3 What are Standards?

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

CONTENTS Preface xv 1 Introduction

Study on Risk Approaches in Software Development Projects

Agile Project Management: Massive Open Online Networked Learning for Thai Education

The Neglected Management Activity: Software Risk Management

RISK MANAGEMENT FOR INFRASTRUCTURE

Risk Knowledge Capture in the Riskit Method

A Risk Management Standard

PROJECT RISK MANAGEMENT

MBA Dissertation Summary

The Impact of Software Process Improvements in Small and Medium Scale Enterprises

A software for project management process

Integrated Risk Management As A Framework For Organisational Success. Abstract

The Role and the Effects of Risk Management in IT Projects Success

Strength and Weakness of Software Risk Assessment Tools

Risk Management. Software SIG. Alfred (Al) Florence. The MITRE. February 26, MITRE Corporation

Risk Management approach for Cultural Heritage Projects Based on Project Management Body of Knowledge

Palisade Risk Conference, 2014

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection;

Program Management Professional (PgMP) Examination Content Outline

Requirements Engineering for Software

FUNBIO PROJECT RISK MANAGEMENT GUIDELINES

Exhibit 1: Structure of a heat map

FACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS

Develop Project Charter. Develop Project Management Plan

Leveraging Expertise: What Every Project Manager Really Needs to Know about Risk Management

Influence of Tactical Factors on ERP Projects Success

CHANGE MANAGEMENT PRINCIPLES AND PRACTICES IN ORGANISATION

Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 9, March 2015

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.

Two broad dimensions of program management

Project Zeus. Risk Management Plan

Capability Maturity Model Integration (CMMI)

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

Project Management Professional (PMP) Examination Content Outline

Software Risk Factors in Developing E-Governance Projects

Nydia González 1, Franck Marle 1 and Jean-Claude Bocquet 1. Ecole Centrale Paris, FRANCE

PMP Examination Tasks Puzzle game

Incorporating Risk Assessment into Project Forecasting

Key Factors for Developing a Successful E-commerce Website

Project Management Body of Knowledge (PMBOK) (An Overview of the Knowledge Areas)

What are the critical factors that measure the success of capital projects?

Measuring Quality in Graduate Education: A Balanced Scorecard Approach

Elicitation and Modeling Non-Functional Requirements A POS Case Study

DIFFERENT TECHNIQUES FOR RISK MANAGEMENT IN SOFTWARE ENGINEERING: A REVIEW

IMPACT OF TQM IMPLEMENTATION ON PRODUCTIVITY AND QUALITY - A STUDY AT GENARAL MOTORS

Towards a new approach of continuous process improvement based on CMMI and PMBOK

IT Project Management Methodology. Project Risk Management Guide. Version 0.3

Blended Training Model with Knowledge Management and Action Learning Principles to Develop Training Program Design Competencies

TABLE OF CONTENTS CHAPTER TITLE PAGE

by Heather Oppenheimer and Steve Baldassano

Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation

The Way of Establishment of the Organization s Project Management Process 1

Improving Organizational Project Management Maturity A Siemens Case Study

Curricularneed evaluation for studentspursuing Masters in Hospital &Healthcare Management at an Indian University. Abstract: Keywords: Introduction

Recent Advances in Automatic Control, Information and Communications

7.1 QUESTION 1: HOW TO CHANGE ORGANIZATIONAL CULTURE IN SMSH

Dealing with digital Information richness in supply chain Management - A review and a Big Data Analytics approach

Project Risk Management Single Subject Certificate Syllabus Levels 1&2 4 th Edition

WCO Customs Risk Management Compendium

Applying Integrated Risk Management Scenarios for Improving Enterprise Governance

An Assessment of Risk Identification in Large Construction Projects in Iran

[project.headway] Integrating Project HEADWAY And CMMI

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

Project Management Professional (PMP) Examination Content Outline

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

Project Scope Management in PMBOK made easy

Transcription:

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced in mainstream of software management process, in 1989 [1]-[3] but little has been reported about its industrial practice [4]-[6]. This paper reports the current software risk management practice in Thai software industry. A questionnaire survey was designed to capture the information of the software project risk management practice. The questionnaire was sent to 141 companies and received a response rate 28 percent. The findings indicate that Thai software firms do not neglect software risk management. However, the results also show the discrepancy between standard risk model and industrial practice. The industrial has not implemented all the risk management activities prescribed in the standard risk model. Thai software firms seem to give more attention to risk identification, risk analysis, risk management planning, and risk monitoring and control but left out other two phrases--risk sign-off, and risk post-mortem analysis. This is similar to the findings of Kajko-Mattsson and Nyfjord [5]. Regarding the software risk management barriers, only two barriers --1) mitigation actions may require organization or process changes, and 2) visible management cost get more attention than intangibles were rated higher than 3 out of 5 point scale. These reported barriers reaffirm that we need to provide evidence for Thai software industry to justify the risk management effort, and the linkage with the project success to encourage the motive. Index Terms software risks, software risk management, software risk practice, software risk management practice, software risk barriers, software risk management problems software risk evidence. S I. INTRODUCTION OFTWARE risk management is a complex activity and also a major contributor to the software project success. Since it was introduced in mainstream of software management process, in 1989 [1]-[3], both the academic and the software industry are well aware of its significance. Research about risk dimensions, risk factors, top ten risk management and a number of established standard models, frameworks and theories have been suggested. However, very a little empirical evidence about the status of its practice has been reported [4]-[6]. The objective of this research is to study the state of the practice of software risk management including problems and barriers facing the Thai software industry. Understanding the state of the practice and the barriers will give incitements which hopefully will help closing the gap Manuscript received December, 24, 2013. Tharwon Arnuphaptrairong, Department of Statistics, Faculty of Commerce and Accountancy, Chulalongkorn University, Thailand between theories and practices, and lead to the software project success. This paper is organized as follows. Section II gives the review of software risks fundamental suggested in the literature. Section III discusses the research methodology. Section IV presents the findings of the survey and the conclusion and discussion are given in section V. II. OVERVIEW OF RELATED LITERATURE This section reviews the literature related to the proposed research objectives i.e., software risks, software risk management, software risk management process model, roles and responsibility, software risk management problems and barriers, and empirical study in software risk management practice and barriers. A. Software Risks The term risk is generally used in many different domains. In the software context, several definitions can be found. For example, Leihman and VaanBuren [7] defines risk as A possible future event that, if it occurs, will lead to an undesirable outcomes. PM-BOK (Project Management Body of Knowledge) defines risk as: an uncertain event or condition that, if it occurs, has a positive or negative effect on a project s objectives [8]. Whereas PRINCE2, the UK government sponsored project management standard defines risk as: the chance of exposed to the adverse consequences of future events. And in all, risks are related to 2 key elements: future events, and may cause effects [9]. Software risk management is a complex activity. It has to deal with uncertain events of the software project and their causes. Researchers have tried to overcome this obstacle by suggesting the fundamental steps or phrases to handle them. This is known as software risk management process model. B. Software Risk Management Software risk management can be defined as the way to handle risks in a software project. Its objective is to reduce uncertainties and impacts associated with certain tasks in the project. The fundamental software risk management consists of 4 major processes: 1) risk identification, 2) risk analysis, 3) risk planning, and 4) risk monitoring and control [5], [8], [10]. 1) Risk Identification Risk identification deals with the process of determining which software risk factors that might affect the software project. The software risk factors can be elicited using various

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 11 techniques. These include: a) interviewing/brainstorming with project team members, experts, customers, and other stakeholders, or b) Delphi method a technique to reach the consensus of participants on software risk factors anonymously. In the elicitation process, in order to determine the related risk factors, the process may use various tools, including risk checklists [11-13], the top ten software risks check lists [1], or risks dimensions/categories [14]. One may use the risk checklists available from the literature or from organization own repository of risk lists. Many risk checklists can be found in the literature [15]. In their recent experimental study, Han and Huang [11] gave a comprehensive review on software risk lists. Risks were reviewed from 12 studies. Table I shows the details of the studies and number of risks reviewed from [11]. TABLE I SUMMARY OF SOFTWARE RISK RESEARCH [11] AUTHOR(YEAR) DIMENSION OF RISKS NUMBER OF SOFTWARE RISKS McFarlan (1981) 3 54 Boehm (1991) 0 10 Barki et al. (1993) 5 55 Summer (2000) 6 19 Longstaff et al.(2000) 7 32 Cule et al. (2000) 4 55 Kliem (2001) 4 38 Schmidt et al. (2001) 14 33 Houston et al. (2001) 0 29 Murti (2002) 0 12 Addision (2003) 10 28 Carney et al. (2003) 4 21 Finally, the software risk factors that all the parties involved agreed upon should be produced and recorded in a risk register. 2) Risk Analysis The next process is to analyze and prioritized the identified software risk factors. The process is to assess the impact and the probability that the identified risk will lead to the undesirable outcomes. The risk exposure is then obtained by multiplying the risk impact with its probability. The analysis may use other techniques such as risk sensitivity analysis, decision tree and scenario analysis [8]. The identified risks are then ranked according to the risk exposure calculated to create the prioritized risk list and confirmed by the stakeholders [5], [8], [10]. 3) Risk Planning The next step is the process of developing a risk response or risk management plan. The risk response plan consists of strategies, options or alternative actions and actions in response to the prioritized risks. Generally the risk response strategies aim at reducing or eliminating the probability of the prioritized risks, or minimize the impact of the risks if they are realized. There are four common strategies in response to the software risks --acceptance, avoidance, mitigation, and transference. Risk acceptance is to accept or do nothing to deal with a particular risk. Risk avoidance is to take action to prevent risk events from occurring so that if they occur there will be little impact. Risk mitigation is to take early action to reduce the risk probability or to protect from its impacts. Risk transference is to shift the responsibility of the consequences of a risk to a third party. Besides the risk response plan, control and monitoring plan and contingency plan may be included in the risk planning process. The control and monitoring plan describes relevant procedures and measures in order to control and monitor the risks. Contingency plan defines a secondary or alternative course of action to be taken in the event that the primary approach fails to function as it should. 4) Risk Monitoring and Control Risk monitoring and control is the process of keeping track of the registered risks according to the control and monitoring plan. The purpose is to make sure that all risk responses have been implemented, observe the risk status and take action as specified in the risk response plan and record the risk status in the risk register. However, in addition to these 4 steps above, two more process are also suggested --5) risk sign-off and 6) risk post-mortem analysis [5]. 5) Risk Sign-off The status of the risk likelihood and its impact should be monitored onto the risk register. For the risk that is mitigated, this process is to update the status and remove it from the risk list and sign it off. Sometimes, this step may be seen as a part of the risk monitoring and control. 6) Risk Post-Mortem Analysis This process is to evaluate the risk management process and its results when a project has been completed. Review should be conducted to see the effectiveness on how the risks identified, analyzed, planed, managed and monitored. The lessons learned can then be used on other projects to aid their risk management. C. Software Risk Management Process Model or Framework Software risk management process models specify stepwise tasks in order to manage risks of the software project [4]. There are various software risk management models. They usually centered around the principle and practice of four major processes mentioned before 1) risk identification, 2) risk analysis, 3) risk planning, and 4) risk monitoring and control. Whilst the software risk management process model in Kajko-Mattsson and Nyfjord [5] comprises of 6 phrases 1) risk identification, 2) risk analysis, 3) risk planning, 4) risk monitoring and control, 5) risk sign-off and 6) risk post-mortem analysis. Well known risk management model or framework includes Boehm [1], SEI s software management model [16] and Kontio s Riskit methodology [17, 18]. According to Boehm [1] risk management consists of two steps risk assessment and risk control. Risk assessment contains risk identification, risk analysis, risk prioritization

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 12 whereas risk control involves risk management planning, risk resolution procedure, and risk monitoring. Riskit [18] consists of risk management mandate, goal review, risk identification, risk analysis, risk control planning, risk control and risk monitoring. SEI s software management model [16] encompasses identify, analyze, plan, track, control, and communicate. These frameworks also recommend different techniques, for example, to identify risks for software project, Boehm [1] recommended risk checklists, decision drivers, assumption analysis, or decomposition. Riskit [18] recommended brainstorming, checklist or benchmarking whereas SEI recommended risk taxonomy questionnaire method [16]. There are many prominent risk management standards, models, or guidelines available in literature and practice. Example models are CMMI (RSKM model), Continuous risk management (CRM), ISO/IEC guide, ISO 9000, ISO 9001:2000, Project Management Body of Knowledge (PMBOK), Prince 2, and IEEE [4, 5]. D. Roles and Responsibility Project managers are generally responsible for the whole software risk management process. After risks are identified and prioritized they may be assigned to the responsible persons or risk owners [5]. E. Software Risks Management Problems and Barriers Odzaly et al. [6] showed evidence from reviewing of the literature that risks are not well understood, there are too many risks to manage, risk management is difficult due to complexity and there is a lack of motivation to perform risk management. Odzaly et al. [6] found 4 reported problems in the literature. 1. Handling risk is difficult due to complexity, 2. Risks are not well understood, 3. There are too many risks to manage within resource limitation, 4. A lack of motivation among developers to perform risk management. In his survey, Odzaly et al. [6] used Dedolph s reported 9 barriers [19]. The respondents were asked to rank the following nine barriers: 1. Visible management cost get more attention than intangibles, 2. The value of risk management cannot easily be proved; the saving do not seem real, 3. Project teams are too busy fire-fighting; there are no resources available for any extra work, 4. Risk management particularly formal methods with a high initial overhead seems difficult, 5. Project teams and managers are rewarded for problem-solving, not prevention, 6. Mitigation actions may require organization or process changes, 7. Discussing risks goes against cultural norms (brining up potential issues is viewed as negative thinking or as causing conflict within the group), 8. Overconfidence (e.g. risks are already taken care of, implicitly), 9. Fatalism (e.g. software is always late anyway; there is no way to change that. F. Empirical Study in Software Risk Management Practice and Barriers Lack of empirical study in software risk management practice was discussed in the literature [4] [6], [17]. In their review of literature of different techniques for risk management in the area of software engineering, Misra et al. [17] concluded that there is a lack of understanding of the area amongst the software engineering practitioner and many of the approaches discuss in this article are limited by the lack of empirical study Kajko-Mattsson and Nyfjord [5] stated that Despites the fact that risk management has been with us for some time, little has been reported about its industrial status. Bannerman [4] and Odzaly et al [6] also called for more empirical software risk management practical evidence. In Kajko-Mattsson and Nyfjord [5], by using a convenience sampling, international master program students were asked to choose to interview an organization that has risk management process in place, in their home country. Data from 37 organizations were collected and analyzed. The results show discrepancies between industrial practices and the standard models prescribed in the literature. Organizations studied did not implement important process as prescribed in the literature. On the other hand, standard model fails to identify some important risk management activities. Only a few have implemented the entire process of software risk management. Organizations mainly implemented risk identification and risk analysis process. Many problems were indicated. The first mentioned problem was with employees attitude toward risk management. Employees were described as do not take the risk management seriously. Other problems were related to experience of risk managers, tools, resources, formal procedure, process standardization, knowledge management, and documentation. Suggestions regarding risk categorization, roles, risk activities and phrases, risk recording, risk for specific type and organization were introduced. Bannerman [4] studied risk management practice in government sector in an Australian state. Structured interview with 23 informants from 17 organizations on 17 projects were conducted. The findings were similar to the study of Kajko-Mattsson and Nyfjord [5], as he put software risk management is under-performed in practice. The findings challenge some conventional concepts of risk management and project management. For example, it was found that software projects do not conform to a uniform structure, as assume in much of the literature and as they mentioned Risk management research lags the needs of practice, and risk management as practiced lags the prescription of research. Odzaly et al. [6] showed evidence from reviewing of the literature that risks are not well understood, there are too many risks to manage, risks management is difficult due to complexity

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 13 and there is a lack of motivation to perform risk management. They used an on-line questionnaire to study Dedolph s reported 9 barriers of software risk management. The perception data of 18 project managers from 12 companies about the nine barriers was collected. The research showed a good awareness of software risk management but with low tool usage. The main barriers of software risk management are related to perception of its high cost but low value. Risk identification and risk analysis are especially perceived as effort extensive and costly. They suggested the values of cost ratio for software risk management needed to be proved. A. Survey Design III. THE PROPOSED METHODOLOGY The survey method was used to obtain the information of the software risk management practice from the Thai software industry. About 200 software companies that joined Software industry club of The Federation of Thai Industries (FTI) were used for the survey frame. In the data collection process, names, addresses and contacts of software firms were obtained from FTI. An officer at The Federation of Thai Industries (FTI) was asked to help in contacting and solicitation in order to increase the response rates. The software firms were contacted by e-mail and asked to participate in the research. If the software company agreed to participate, the questionnaire was sent for the software project risk management data needed. 141 companies agreed and 40 questionnaires were returned. This is a response rate of 28 percent. B. Questionnaire Design General information about the software firms and the respondents were obtained from the first part of the questionnaire. The second part of the questionnaire was designed to obtain the information regarding the software risk management practice of the software firms. 15 questions included in the questionnaire are shown in Table II. C. The Profile of the Respondents As shown in Table III, of the 40 questionnaires returned, 31 companies (77.5%) answered that their organizations have a software risk management process. Therefore the other 9 organizations that answered that they do not have software management process were excluded from further analysis. Profile of the 31 companies and respondents are given in Table IV. Most of the companies are of small to medium size. 48.39 percent of the companies have the number of employees of 1 to 16 and 29.03 percent of the companies have the number of employees of 17 to 32. The average number of employee is 70.26. 48.39 percent of the companies the companies have the number of developers from 1 to 6, and 25.81% percent of the companies the companies have the number of developers from 7 to 12. The average number of developer is 9.7. TABLE II QUESTIONS Part 1: General information 1. Organization Name: Organizational Size (Number of employee) (Number of developers) 2. Respondent Position Experience (number of year) in project management Part 2: Software Risk Management Practice 3. Does your organization follow/ use/ have a software risk management process? 4. Is there any standard Risk Management Model in place? 5. Does your organization carries out (please rate how widespread in your in your projects?) 6. If you perform risk identification in you organization, in the risk identification process, which of the following techniques your organization utilizes (can check more than one item)? 7. If you perform risk analysis in you organization, in the risk analysis process, which of the following techniques your organization utilizes? 8. Who is responsible for software project risk management? 9. Does your organization assigned software to risk owners? 10. Does your organization follow/ have any risk management standard or model? 11. Does your organization use any tool to support the following step? 12. Does your organization use risk register? 13. Does your organization record risk management at the following step? Part 3: Software Risk Management Problems and Barriers 14. Please rate the following statement (risk barriers) where most appropriate to your organization practice from 1.Strongly disagree (SD) 2. Disagree (D) 3. Indifferent (IND) 4. Agree (A) 5. Strongly agree (SA) 15. To what degree you agree on the following software risk problems, please circle the response that the best represents you opinion where 1. Strongly disagree (SD) 2. Disagree (D) 3. Indifferent (IND) 4. Agree (A) 5. Strongly agree (SA) TABLE III THE NUMBER OF FIRMS WITH RISK MANAGEMENT PRACTICE Risk management Practice Frequency Percentage Risk management process is embedded 29 72.5 in the project management process Risk management process is 2 5.0 maintained as a separate process Do not have risk management process 9 22.5 Total 40 100.0 TABLE IV THE COMPANIES AND RESPONDENTS PROFILE Frequency Percentage Number of Employees 1-16 15 48.39 17-32 9 29.03 more than 32 6 19.35 missing 1 3.23 Number of Developers 1-6 15 48.39 17-12 8 25.81 more than 12 8 25.81 Position manager 14 45.16 committee 1 3.23 consultant 2 6.45 employee 13 41.94 missing 1 3.23 Work Experience (Years) 1 5 17 54.84 6-10 9 29.03 more than 10 2 6.45 missing 3 9.68

Risk Sign-off Risk Post- INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 14 Most of the respondents are project managers (45.16%). 54.84 percent have the experience in project management from 1 to 5 years and 29.03 percent have the experience in project management from 6 to 10 years. The average years of work experience is 5.54 years. IV. FINDINGS The findings are reported in two sections. The first section discusses the findings of the state of practice of software risk management, which includes the adoption software risk management processes --the risk identification, risk analysis, risk prioritization, risk management planning, risk resolution, risk monitoring, risk sign-off and risk post-mortem analysis; risk roles and responsibility; risk owner; risk management standard or model; risk management tools; and risk documentation. The second section discusses the perceptions on the problems and barriers reported in the survey. A. The Software Risk Management State of Practice Table V and Figure 1 shows the state of practice software project risk management process of all of the 31 companies. From observation of the frequency, the state of practice can be divided of three groups. The first group --risk identification, risk Analysis and risk management planning, the frequency is about 30 out of 31 while the second group -- risk prioritization, risk resolution and risk monitoring, the frequency is about 25 out of 31. The last group --risk sign-off and risk post-mortem analysis the frequency are 20 and 15 out of 31 respectively. TABLE V THE SOFTWARE RISK MANAGEMENT PRACTICE Phrase Frequency Percentage Risk Identification 30 96.8 Risk Analysis 31 100.0 Risk Prioritization 24 77.4 Risk Management Planning 30 96.8 Risk Resolution 25 80.6 Risk Monitoring 26 83.9 Risk Sign-off 20 64.5 Risk Post-Mortem Analysis 15 48.4 1) Risk Identification Practice To identify software risks, 22 and 21 out of the 30 respondents answered that they use brainstorming and check lists techniques respectively while the least used techniques are Delphi method and risk dimensions respectively (Table VII). 2) Risk Analysis To performing risk analysis, decision analysis is the most use method (22 out of 31) while risk exposure is second (14 out of 31) (Table VIII). 3) Risk Management Planning Regarding risk management planning process, risk plan and contingency plan are the two most popular planning tools used (Table IX). 15 companies (48.4%) used risk plan and 14 companies (45.2%) used contingency plan. 40 30 20 10 0 RISK MANAGEMNT PRACTICE Fig. 1. Software Risk Management Practice Table VI, where: a is every project (100%), b is almost all (80 99 %), c is some (60 79 %), d is a few (40 59 %), and e is very few (less than 40 %), shows that the robustness of the practice of software risk process. Most of the answer of these phrases fall into a (every project), b (almost all), and c (some) except the practices of risk sign-off and risk post-mortem are spread out. TABLE VI SOFTWARE RISK MANAGEMENT PRACTICE Phrase a b c d e Identification 12 7 6 2 1 Analysis 11 9 4 2 2 Prioritization 9 4 5 2 1 Management Planning 9 9 4 3 3 Resolution 7 6 5 1 4 Monitoring and Control 8 8 3 2 4 Sign-off 6 5 5-3 Post-Mortem Analysis 2 2 3 4 3 TABLE VII THE USE OF IDENTIFICATION TECHNIQUES Technique Frequency Percentage Check Lists 21 70.0 Top Ten Lists 5 16.7 Risk Dimensions 3 10.0 Interview 7 23.3 Brain Storming 22 73.3 Delphi Method 1 3.3 TABLE VIII THE USE OF RISK ANALYSIS TECHNIQUES Technique Frequency Percentage Risk Exposure 14 45.2 Decision analysis 22 71.0 Others 4 12.9 TABLE IX THE USE OF RISK MANMENT PLANNING TECHNIQUES Technique Frequency Percentage Risk Plan 15 48.4 Risk resolution/ Strategy 10 32.3 Contingency Plan 14 45.2 Others 1 3.2

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 15 4) Risk Roles and Responsibility Regarding risk roles, 25 out of 31 respondents (80.6%) identified project manager as the person responsible for software project risk management. The other 6 respondents answered that there are more than one person responsible for the software project risk management. They are project manager and client manager, project manager and teamwork, project manager, project coordinator and developer, and project manager, executive and development managers. 5) Risk Owner Concerning risk owner, 19 out of 31 respondents (61%) identified that they assigned software risks to risk owners while 12 (38.7%) did not have risk owners. 6) Risk Management Standards or Models 12 out of 31 respondents (38.7%) identified that they followed some risk management standards or models while 18 out of 31 respondents (58%) did not have any risk standard or model. 5 out of the 12 respondents reported that they used CMMI (RSKM) and 4 respondents used ISO/IEC 29110, 1 respondent reported that it used CRM, 1 answered that it used all ISO/IEC guide, ISO9000, and ISO 9001:2000 and 1 answered that it used both CRM and PMBOK. 7) Risk Management Tools Table X shows that about 13 out of 31 the respondents (41.94%) used some tools in managing risks except for risk sign-off and risk post-mortem analysis. There are only 8 (or 25.8%) and 6 (or 19.4%) out of 31 respondents reported the use of risk management tools. Reported tools vary. Microsoft excel is the most frequent reported tools with frequency of only 2, for every phrase of the software risk management phrases. 8) Risk Documentation 16 out of 31 respondents (51.61%) answered that they used risk register in their companies. Table XI shows the frequency and percentage of the risk recording for each software risk management phrases. The frequency varies from 20 to 26 except at the risk sign-off and risk post-mortem analysis phrase. TABLE X RISK MANAGEMNT TOOLS Phrase Frequency Percentage Risk Identification 13 41.9 Risk Analysis 13 41.9 Risk Prioritization 13 41.9 Risk Management Planning 14 45.2 Risk Resolution 13 41.9 Risk Monitoring 14 45.2 Risk Sign-off 8 25.8 Risk Post-Mortem Analysis 6 19.4 TABLE XI RECODRING RISK Phrase Frequency Percentage Risk Identification 24 77.42 Risk Analysis 26 83.87 Risk Prioritization 20 64.52 Risk Management Planning 24 77.42 Risk Resolution 23 74.19 Risk Monitoring 23 74.19 Risk Sign-off 17 54.84 Risk Post-Mortem Analysis 14 45.16 B. Risk Management Problems and Barriers Table XII shows mixed perception on all the four problems 1) Handling risk is difficult due to complexity, 2) Risks are not well understood, 3) There are too many risks to manage within resource limitation, and 4) A lack of motivation among developers to perform risk management. For example, for the first problem -- Handling risk is difficult due to complexity, while 7 out of 31 or about one fourth perceived as disagree, 11 out of 31 or about half perceived as agreed or strongly agree. There are also 8 out of 31 or another one fourth showed indifferent. The data exhibits the same pattern for the other three problems with average perception of about 3.34 and there is no statistical significant different. It may be concluded that on all four problems the majority of the respondents trend to agree that these are software risk management problems facing their organization. But the data do not show strong consensus. TABLE XII FREQUENCY OF THE RESPONDENTS ON LEVEL OF THE PERCEPTION OF THE PROBLEMS SD D IND A SA n/a Mean Problems Handling risk is -- 7 8 11 3 2 3.34 difficult due to complexity Risks are not well 1 5 9 14 -- 2 3.24 understood There are too -- 5 12 9 3 2 3.34 many risks to manage within resource limitation A lack of motivation among developers to perform risk management 1 6 7 11 4 2 3.38 Table XIII shows that only two barriers 1) Mitigation actions may require organization or process changes and 2) Visible management cost get more attention than intangibles have the mean value higher than 3. In other words, the respondents trend to agree with the two barriers while they disagreed or strongly disagreed with the other seven barriers. For these seven barriers, the average perception ranges from 1.41 to 2.83. For the first barriers --Mitigation actions may require organization or process changes with the average perception of 3.45, 15 out of 31 or about half perceived as agreed or strongly agreed and 11 out of 31 or about one third perceived as indifferent. For the second barriers -- Visible management cost get more attention than intangibles with the average perception of 3.41, 15 out of 31 or about half perceived as agreed or strongly agreed and 8 out of 31 or about one third perceived as disagreed.

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 16 V. CONCLUSION AND DISCUSSION In 2003, Deldolph [19] discussed a number of reasons why software risk management is neglected. However, this study uncovers a different evidence in Thai software industry. From the 40 questionnaires returned, 31 companies (77.5%) answered that their organizations have a software risk management process. After 10 years, this may indicate that software risk management is not anymore ignored. The general picture of the software risk management of Thai software firms can be concluded as the followings: 1. Of the 40 questionnaires returned, 77.5% answered their organization have a software risk management process. 2. The state of practice are of three groups. About 30 out of 31 perform risk identification, risk analysis and risk management planning while about 25 out of 31 practice risk prioritization, risk resolution and risk monitoring and the least practice phrases are risk sign-off and risk post-mortem analysis with the frequency of 20 and 15 out of 31 respectively. 3. 22 and 21 out of the 30 respondents (73.3% and 70%) identified that they use brainstorming and check lists techniques respectively. 4. In performing risk analysis, decision analysis is the most used method (71.0%). 5. Regarding risk management planning process, risk plan and contingency plan are the two most popular planning tools used (48.4% and 45.2% respectively). 6. 80.6% of the respondents identified project manager as the person responsible for software project risk management. 7. 61% of the respondents identified that they assigned software to risk owners. 8. 12 out of 31 respondents (38.7%) identified that they followed some risk management standards or models while 18 out of 31 respondents (58%) did not have any risk standard or model. 9. Only 13 out of 31 the respondents (41.94%) used some software tools in managing risk. 10. 16 out of 31 respondents (51.61%) answered that they used risk register in their companies. The general picture above shows that Thai software firms seem to give more attention to risk identification, risk analysis, risk management planning, risk monitoring and control and left out other two phrases -risk sign-off, and risk post-mortem analysis. Figure 2 shows that it is more or less similar to the findings of Kajko-Mattsson and Nyfjord [5]. This indicates the discrepancy between theory and practice as suggested in Kajko-Mattsson and Nyfjord [5], as they put it that the industry studied has not implemented all the activities prescribed by model found in the literature. To explain this phenomenon, it is hypothesized that the two phrases -risk sign-off, and risk post-mortem analysis are seen from the industry as less significant. This is because most of the literature covered only four major processes 1) risk identification, 2) risk analysis, 3) risk planning, and 4) risk monitoring and control and similarly left out risk sign-off, and risk post-mortem analysis. However, Kajko-Mattsson and Nyfjord [5] indicated that these two processes are of great important for the long term effective software risk management. Regarding risk management problems and barriers, for all four problems reviewed from the literature, the majority of the respondents from Thai software industry trend to agree that these are software risk management problems facing their organizations but the data do not show strong agreement. The perceived agreement on the barriers ranges from 3.24 to 3.28 out of 5. TABLE XIII FREQUENCY OF THE RESPONDENTS ON LEVEL OF THE PERCEPTION OF THE BARRIERS SD D IND A SA n/a Mean Problems Visible management 1 8 3 9 6 4 3.41 cost get more attention than intangibles The value of risk 6 10 8 5 -- 2 2.41 management cannot easily be proved; the saving do not seem real Project teams are too 2 13 7 7 -- 2 2.66 busy fire-fighting; there are no resources available for any extra work Risk 2 10 10 6 1 2 2.79 management partic ularly formal methods with a high initial overhead seems difficult Project teams and 7 5 9 7 1 2 2.66 managers are rewarded for problem-solving, not prevention. Mitigation actions 1 2 11 13 2 2 3.45 may require organization or process changes Discussing risks goes 10 13 3 3 -- 2 1.97 against cultural norms (brining up potential issues is viewed as negative thinking or as causing conflict within the group) Overconfidence (e.g. 2 8 12 7 -- 2 2.83 risks are already taken care of, implicitly) Fatalism (e.g. 21 5 2 1 -- 2 1.41 software is always late anyway; there is no way to change that Others reasons (there are errors anyway after the software is completed ) -- -- -- -- 1 30 1

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 17 Fig. 2. Comparison between findings Regarding barrier perception, the findings of this study in Table XIV demonstrate a comparable pattern compare to results from Odzaly et al. [6]. Odzaly et al. [6] argued that barriers A to F are cost related while barriers G to risk I are behavior related or attitude related risks. The findings shows that cost related barriers (A-F) are ranked higher than behavior related risks (G I). The difference in this study to the findings of Odzaly et al. [6] is that barrier G (Overconfidence e.g. risks are already taken care of, implicitly) is ranked third in this study while it was rank seventh in Odzaly et al. [6]. In the ranking view, the findings show most cost related barriers (A-F) are ranked higher than behavior related risks (G I). This indicates that the value to cost ratio is perceived as major difficulty. In other words, the barriers of risk management process is the perception of its values to its costs justification. TABLE XIV RANKED BARRIERS Rank Barriers Mean Odzaly [6] (Rank) 1 Mitigation actions may require 3.45 3(C) organization or process changes 2 Visible management cost get 3.41 1(A) more attention than intangibles 3 Overconfidence (e.g. risks are 2.83 7(G) already taken care of, implicitly) 4 Project teams are too busy 2.79 2(B) fire-fighting; there are no resources available for any extra work 5 Risk management particularly 2.66 4(D) formal methods with a high initial overhead seems difficult 6 Project teams and managers are 2.66 6(F) rewarded for problem-solving, not prevention. 7 The value of risk management 2.41 5(E) cannot easily be proved; the saving do not seem real 8 Discussing risks goes against 1.97 8(H) cultural norms (brining up potential issues is viewed as negative thinking or as causing conflict within the group) 9 Fatalism (e.g. software is always 1.41 9(I) late anyway; there is no way to change that Average 2.62 But when considering the weight of the perception, only two out of nine barriers 1) Mitigation actions may require organization or process changes, and 2) Visible management cost get more attention than intangibles, have the mean perception value higher than 3. The most important barrier perceived in Thai software firms is mitigation actions may require organization or process changes. It implies an unacceptable cost to management in implementing risk management process. Mitigation actions may require organization or process changes. This also suggests that resistance to change may be a bigger problems in the risk management process. The second most important barriers --visible management cost get more attention than intangibles, implies that when compare to other activities that perceived as higher values, risk management can be sacrificed for them. These reported barriers reaffirm that we need to uncover evidence for Thai software industry in order to justify the risk management effort and to encourage for the motive. REFERENCES. [1] B.W. Boehm. Software Risk Management: Principles and Practices, IEEE Software, vol. 8, number 1, pp.32-41, 1991. [2] R.N. Charette. Software Risk Analysis and management, McGraw-Hill, New York, 1989. [3] B. Freimut, S. Kartkopf, J. Kontio, and W. Kobitzsch. An Industrial Case Study of Implementing Software Risk Management, ESEC/FSE 2001, Vienna, Austria, 2001. [4] P.L. Bannerman. Risk and Risk Management in Software Projects: A reassessment, The Journal of Systems and Software, vol. 81, pp.2118-2133, 2008. [5] M. Kejko-Mattson and J. Nyfjord. State of Software Risk Management Practice, IAENG International Journal of Computer Science, vol. 35, number 4, November 2008. [6] E. E. Odzaly, D. Greer, and P. Sage. Software Risk Management Barriers: an Empirical Study, in Third International Symposium on Empirical Software Engineering and Measurement, Florida, pp. 418 421, 2009. [7] R. Leihman, and J. VaanBuren. "The Risk of Not being Risk Conscious: Software Risk Management Basics, STSC Seminar Series, Hill AFB, UT. [8] Project Management Institute, A Guide to the Project management Body of Knowledge (PMBOK), 3rd Ed. ANSI/PMI 99-001-2004, PMI, Newton Square, PA, 2004. [9] B. Hughes, and M. Cotterell. Software Project Management 5th ed, pp. 163, McGraw-Hill (UK), 2009. [10] IEEE 1540, IEEE 1540 Standard for Lifecycle Process-Risk Management, IEEE New York, NY, 2001. [11] W.M. Han and S.J. Huang. An Empirical Analysis of Risk Components and Performance on Software Projects, The Journal of Systems and Software, vol. 80, number 1, pp. 42-50, 2007. [12] L. Wallace and M. Keil. Software Project Risk and their Effect on Outcomes, Communication of the ACM, vol. 47 number 4, pp. 68-73, 2004. [13] R. Schmidt, K. Lyytinen, M. Keil, M. and P. Cule. Identifying Software Project Risks: An International Delphi Study, Journal of Management Information Systems, vol. 17, number 4, pp. 5-36, 2001. [14] K. Lyytinen, L. Mathisen, and J. Ropponen. "A Framework for Risk Management," Journal of Information Technology, vol. 11 number 4, pp.275-285, 1996. [15] T. Arnuphaptrairong. Top ten lists of software project risks: Evidence from the literature survey, Proceedings of The International Multi-Conference of Engineers and Computer Scientists 2011, pp.732-737, 2011. [16] Software Engineering Institute/Canegie Melon University (CMI/SEI), "Software Risk Management,"

INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 18 URL:http://www.sei.cmu.edu/library/abstracts/reports/96tr012.cfm, Access May 2011. [17] S. C. Misra, V. Kumar, and U. Kumar. "Different Techniques for Risk Management in Software Engineering: A Review," SAC Conference, pp.196-205, 2006. [18] J. Konito. Software Engineering Risk Management: A Method Improvement Framework, and Empirical Evaluation, Ph.D. Thesis, Department of Computer Science and Engineering, Hensinki University of Technology, Finland, 2001. [19] F.M. Dedolph. The Neglected Management Activity: Software Risk Management, Bell Labs Technical Journal, vol. 8, Issue 3, pp.91-955, 2003. Tharwon Arnuphaptrairong is An Assistant Professor in Business Information Technology at the Department of Statistics, Faculty of Commerce and Accountancy, Chulalongkorn University, Thailand. He received a B.Sc. Degree in Statistics from Chulalongkorn University, a M.Sc. in Computer Applications from Asian Institute of Technology, Bangkok, Thailand, and a Ph.D. Degree in Management Sciences from University of Waterloo, Canada. His research interests include Software Project Management, Software Risk Management, Software Cost Estimation and Empirical Software Engineering.