cse 7315 - sw project management / module 26 - risk management process, in detail copyright ©...

Post on 17-Jan-2018

220 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

CSE7315M26 Slide # 3 January 10, 2004 CSE SW Project Management / Module 26 - Risk Management Process, In Detail Copyright © , Dennis J. Frailey, All Rights Reserved The Risk Management Process In Detail Risk Assessment – Risk Identification – Risk Analysis – Risk Prioritization – Risk Planning & Mitigation (contingency planning) Risk Control – Risk Monitoring – Risk Abatement

TRANSCRIPT

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In DetailCopyright © 1995-2004, Dennis J. Frailey, All Rights Reserved Slide 1

CSE7315M26

January 10, 2004

SMU CSE 7315 / NTU SE 584-NPlanning and Managing a

Software Project

Module 26The Risk Management

Process, In Detail

Slide # 2 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Objective of This Module• To discuss the details of the risk

management process

Slide # 3 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning & Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 4 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Assessment• Goal: understand what the risks are, what

they mean, and how best to manage them• Method: develop a risk management plan -- documents your risks -- documents your plans for managing them -- communicates responsibilities to all

affected parties• The plan must be updated as new risks are

identified• For each risk, the likelihood and impact

change over time

Slide # 5 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 6 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk IdentificationThe First Step of Risk Assessment• We have seen how all management

activities, especially planning activities, serve to identify risks

• And we discussed the value of a risk identification brainstorming meeting

• It helps if you know what to look for• Several authors have talked about risks

associated with software development

Slide # 7 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm’s Top Ten Software Risks (and management techniques for mitigating

them)• This is Boehm’s list, based on

experience with many projects in the 1960-1980 time period

• Your project must define its own list• But this is a good place to start looking

Slide # 8 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Possible Exam Question Consider a particular situation (provided with the exam). What risks

apply? (careful analysis shows that these three risks are of greatest concern . . .) List of Boehm’s top ten risks

Slide # 9 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 1: Personnel Shortfalls

Mitigation Techniques:• Use top talent• Use people who are well matched

to the problem (i.e., they know the application, tools, etc.)

• Pre-schedule the key people• Cross training -- so you don’t

depend on heroes• Team building

Slide # 10 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 2: Unrealistic Schedules and Budgets

Mitigation Techniques:• Good estimating techniques– Know before you commit

• Incremental development cycles• Detailed milestones within each phase– Spot trouble early– Provide evidence of progress

• Software reuse– Don’t build what was built before

• Requirements scrubbing– Don’t build what is not required

Slide # 11 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 3: Developing the Wrong Software Functions

Mitigation Techniques:• Mission analysis– Understand what is supposed to happen

• User surveys and communication– Know what the user needs and is expecting

• Prototyping– Try it out - a prototype is worth a million bytes

• Write end-user documentation early in the project and use as requirements documents

Slide # 12 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 4: Developing the Wrong User Interface

Mitigation Techniques:• Prototyping• Task analysis• Scenario models• etc,

Slide # 13 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 5: Gold PlatingMitigation Techniques:• Requirements scrubbing– Don’t build what is not required

• Cost-benefit analysis– Determine what counts the most

• Design-to-cost– Development costs include debugging, error

correction• Design to life-cycle-cost– Life cycle costs include maintenance,

debugging, etc.

Slide # 14 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 6: Continuing Stream of Requirements Changes

Mitigation Techniques:• Establish a high change threshold – Make it costly to make a change

• Information hiding– Minimize the impact of change

• Incremental development– Do the stable requirements first

• Establish bounds for requirements– Limit the scope of changes

• Monitor requirements stability and completion– Know the risk of proceeding

Slide # 15 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Information Hiding• A programming technique whereby

information is made available only where it is required

• This minimizes the impact of change

Student Records

(details known only to access program)

AccessProgram

Student Data Base

Update ..

Display..

Examine..

Compute..

Slide # 16 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Requirements Bounds

Device Fog

Requirement: “device must find target in fog of density TBD.”Bounded Requirement: “TBD will range from .02 to 1.7 densograms”

When you know therange of the “TBD”

requirement, you canmake many software

design decisions.

Target

Slide # 17 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Requirements Stability Monitoring

Requirements Stability

020406080

100120140160

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec

TotalTBDChanges

CDRPDR

Slide # 18 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 7: Shortfalls in Purchased

Software/HardwareMitigation Techniques:• Benchmarking– Learn what is the best

• Inspections– Make sure it is in good shape before you buy it

• Reference Checking– Are they able to do the work?– Do they deliver?

• Compatibility Analysis– Make sure it fits with your standards, tools,

documentation requirements, etc.

Slide # 19 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 8: Shortfalls in Externally-performed Tasks

Mitigation Techniques:• Subcontract management (a KPA for Level

2 in the SEI CMM)• Reference checking• Pre-award audits and capability

evaluations• Award fee contracts– Reward or bonus if satisfied

• Competitive design or prototyping• Team building– Make them want you to succeed

Slide # 20 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 9: Real-time Performance Shortfalls

Mitigation Techniques:• Simulation• Benchmarking• Modeling• Prototyping• Instrumentation• Tuning

Slide # 21 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Boehm 10: Straining the Limits of Computer ScienceMitigation Techniques:• Technical analysis• Cost-benefit analysis• Prototyping• Reference Checking

Slide # 22 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Possible Exam Question

List four of Boehm’s “top ten” risks. For each of the above, list three methods of risk

mitigation Explain each of the risks and each of the mitigation

techniques

Slide # 23 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Possible Exam Question

Consider the risk mitigation technique of prototyping. Describe this technique, and list three risks that this technique helps to mitigate. For each explain how prototyping mitigates the risk.

Slide # 24 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning & Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 25 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Analysis & Prioritization

Which Risks are Most Important?• A popular method is to compute two

numbers for each risk:– How likely is it to happen (a probability from 0

to 1 or a ranking from low to high)– How much will it cost if it happens (dollars,

impact)• Then make a table showing risks,

likelihood, cost, and weighted cost (likelihood * cost)

Slide # 26 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Analysis TableRisk Likelihood Cost Weighted Cost

Building hit by plane 0% 50,000,000 50Sub-Contractor Failure 20% 250,000 50,000Late Hardware 75% 100,000 75,000Test Equipment Delay 30% 40,000 12,000Requirements Changes 99% 5,000 4,950Memory Size 50% 50,000 25,000

Slide # 27 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Prioritized Risk Analysis TableRisk Likelihood Cost Weighted Cost

Late Hardware 75% 100,000 75,000Sub-Contractor Failure 20% 250,000 50,000Memory Size 50% 50,000 25,000Test Equipment Delay 30% 40,000 12,000Requirements Changes 99% 5,000 4,950Building hit by plane 0% 50,000,000 50

Slide # 28 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Alternative Risk Analysis Table

Risk Likelihood I mpact WeightedLate Hardware 7 6 42Sub-Contractor Failure 2 7 14Memory Size 5 4 20Test Equipment Delay 3 3 9Requirements Changes 8 2 16Building hit by plane 1 9 9

Note that this method produced a different ordering, but the extreme cases came out in the same order.

Slide # 29 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

WARNINGThis method of risk prioritization has

many risks itself!• Not all risks can be quantified in terms

of dollar impact• Estimates of impact and probability are

highly subjective• Impacts change over time -- must be

revisited• Risk mitigation techniques may have

risks of their own

Slide # 30 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning & Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 31 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Mitigation

Minimizing the Impact• Taking actions to reduce the likelihood

or net impact of a risk• We saw many such actions in reviewing

Boehm’s list of risks• Each potential action must be evaluated

in terms of its cost vs. the potential impact

Slide # 32 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

This is the Step Where You Impact the Planning Process

Manage Risks

Definethe Approach

GenerateDetailed Plans

Understandthe Need

Execute and Monitor

Slide # 33 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Mitigation ExampleRisk: Project delay or failure becausesubcontractor will fail to deliver Weighted Cost: $50,000 Mitigation Options:

•Do it in-house -- Costs $100,000 extra•Send staff to live with subcontractor -- $50,000•Monthly visits -- $12,000

Slide # 34 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Table After MitigationRisk Likelihood Cost Weighted Cost

Late Hardware 75% 100,000 75,000Memory Size 50% 50,000 25,000Sub-Contractor Failure 5% 250,000 12,500+12,000Test Equipment Delay 30% 40,000 12,000Requirements Changes 99% 5,000 4,950Building hit by plane 0.0001% 50,000,000 50

Slide # 35 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Plan May Include Tables of Mitigation, Contingency,

etc.Methods

Risks

Memory Size

Benchmark

ExtraHardware

Backup

etc.Prototype

SubcontractorDelayed

Late Test Equip.

etc.

Late Hardware X

X

X

X

X

X

Slide # 36 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning & Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 37 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Control• Monitoring– Watch what is happening– Watch for signs of danger

• Risk Abatement– Applying contingency plans– Minimizing impact

Slide # 38 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk MonitoringMethods of monitoring:• Reviews - periodic status reports– Must be honest reviews, not “dog and pony

shows”• Metrics - data to compare actuals with

plans and past performanceWhat to monitor:• All high priority risk items• Consider cost of monitoring - only

monitor what is worthwhile

Slide # 39 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

How Often to Monitor• It depends on priority - you must

plan. For example:– Critical items daily or weekly– Normal items weekly or monthly– Minor items quarterly

• Monitoring too often costs money and slows down the process

Slide # 40 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Watch Known Danger Points

• Monitor status at key milestones or progress points– Are we where we should be by

now?

We always have a flurry of changes prior to CDR

Slide # 41 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Don’t Monitor Too Often or in Too Much Detail

• Too often– De-motivates people– Costs a lot – Robs resources from productive activities

• Too much detail (overly precise)– Costs a lot– Does not give significant additional information– May generate a lot of misleading numbers

Late by 2.7321 weeks is not much different from late by 3 weeks

Slide # 42 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - IHiding the facts to save face– The purpose of monitoring is to manage

properly, not to find fault with individuals– Individuals must trust that you will use the

metrics properly to fix the process, not to punish the messengers

– One solution is self-measurement -- have the individuals measure and monitor themselves without communicating higher except on an aggregate scale or with big problems that they cannot handle

Slide # 43 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - IIHiding the facts to save the project–Egos and jobs of technical staff vs.

judgment of management vs. pocketbook of sponsor–This can get very political and very

complex

Slide # 44 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - IIIFailure to get the data because of

fear, overconfidence, or other psychological factors–Be careful of human nature–Focus on teaming, responsibility, and

professional behavior

Slide # 45 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - IVFailing to get the data because of

high overhead– Automate collection– Consider using a separate metrics

collection/analysis staff to minimize impact on development staff • but not if it destroys teamwork

Slide # 46 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - VMisinterpretation of data–Any number can be interpreted in

many ways• The “three ways to get it wrong” rule

–Be prepared to ask lots of questions–Define standard measures and

methods of graphing data to minimize unintentional misinterpretation–Educate everyone in statistics

Slide # 47 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Things to Watch Out For - VI

Failure to trust past performance–Your “track record” is your most

reliable indicator

Slide # 48 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Learning ProcessInformation is Communicated

Information isReceived

Information isAnalyzedAction

Each step offers many opportunities for error

Slide # 49 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Example of MisinterpretationProductivity is

Low

Not EnoughWork Being

Done

Not WorkingHard Enough

MoreOvertime

Perhaps the Real Problem is Too Much Overtime Already

Slide # 50 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Rate ChartActual vs. Plan

• A Rate Chart shows actual vs. planned progress for some artifact being produced– Coded units– Tested units– Inspected units– Specifications – Requirements defined– Requirements tested– etc.– etc.

• It works for anything that has discrete, measurable units

Units Tested

01020304050607080

1 2 3 4 5 6 7 8 9 10 11

PlanActualHistory

Slide # 51 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Testing Rate Chart

Units Tested

01020304050607080

1 2 3 4 5 6 7 8 9 10 11

PlanHistory

Slide # 52 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Testing Rate Chart

Units Tested

01020304050607080

1 2 3 4 5 6 7 8 9 10 11

PlanActualHistory

Slide # 53 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Testing Rate Chart

Units Tested

01020304050607080

1 2 3 4 5 6 7 8 9 10 11

PlanActualHistoryProjected

Slide # 54 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Testing Rate Chart

Units Tested

01020304050607080

1 2 3 4 5 6 7 8 9 10 11

PlanActualHistoryProjectedLikely

Slide # 55 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Another Rate Chart

0

5

10

15

20

25

30

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Historical AveragePlanActualProjected

Slide # 56 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

The Risk Management Process In Detail

• Risk Assessment – Risk Identification– Risk Analysis– Risk Prioritization– Risk Planning & Mitigation (contingency planning)

• Risk Control– Risk Monitoring– Risk Abatement

Slide # 57 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Abatement• Establish thresholds so you know when to

act– Beware of the “frog in the water” problem

– Historical experience is a good basis to judge when things are getting out of hand

Slide # 58 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Abatement (continued)

• Act promptly when necessary– Establish action plans before they are

needed – Learn the plan (fire drills) -- there may

be no time in an emergency• Use backup plans if needed– Develop them during the planning phase– Practice them too!

Slide # 59 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Risk Abatement (continued)

• Let the team participate in the planning–Their cooperation is necessary for

success–Their ownership of the plan will

improve chances of cooperation

Slide # 60 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Summary of Module1) Risk Assessment – Done as part of project planning– Continues throughout the project– Includes planning for risk control

2) Risk Control – Done as part of project execution– You must respond promptly when

monitoring indicates a problemA risk management plan is an

important part of planning

Slide # 61 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

Possible Exam Questions Explain the difference between risk mitigation and risk abatement (risk

contingency) Explain why a risk management plan should be documented Explain why a risk management plan should be periodically revisited Explain why one would go to all the trouble to write a risk management plan

when it tells your manager and your customer that you have a risky project

Slide # 62 January 10, 2004

CSE 7315 - SW Project Management / Module 26 - Risk Management Process, In

DetailCopyright © 1995-2004, Dennis J. Frailey,

All Rights ReservedCSE7315M26

END OFMODULE 26

top related