SlideShare une entreprise Scribd logo
1  sur  31
CBAM (Cost Benefit Analysis Method)
Presented By
Asim Shahzad
MCS02121005
Agenda
CBAM, Cost Benefit Analysis Method.
Decision Making Context.
The Basics of CBAM.
CBAM Steps.
CBAM Outcomes and Strengths
Cost-Benefit Analysis Method (CBAM)
CBAM an architecture for analyzing the costs,

benefits and schedule implications of architectural
decisions.
ATAM (Architecture Trade-off Analysis Method)
considered the design decisions with respect to
architectural quality attributes like modifiability,
performance, availability, usability, and so on.
CBAM is different from the former method, it add the
costs (and implicit budgets or money) as quality
attributes.
Cont..
The biggest tradeoffs in large, complex systems

usually have to do with finance.
How should an organization invest its resources in a
manner that will maximize its gains and minimize its
risk?
“…perhaps more important than costs, are the
benefits than an architecture decision may bring to an
organization.”
CBAM provides an assessment of the technical and
economic issues and architectural decisions
Decision-Making Context
The CBAM does not make decisions for the stakeholders. It

simply aids in the documentation of the costs and benefits
analysis.
The

CBAM can aid the stakeholders in choosing
architectural strategies based on their return on investment
(ROI) – the ratio of benefit to cost.
Calculating ROI
R (ROI) = (B (Benefit) / C (Cost))*100
This can be used to determine the optimal order for

implementation the various strategies.

Investment= $2000
Benefit = $500
R (ROI)=(B(benefit)/C(cost))*100
R(ROI)=($500/$2000)*100= 25%
Context of CBAM
The Basis for the CBAM
Variations of Scenarios
 a way to strongly express and represent specific quality attributes

(performance, cost, trademark etc. )

Utility-Response
 Every incentive in a scenario provides some utility to the

stakeholders.

Priorities of Scenarios
 Different scenarios within a given system have different levels of

importance to the stakeholders and hence different utilities.
 To characterize the relative importance of each scenario, a weigh is
assigned through a two-step voting exercise.
The Basis for the CBAM {2}
Architectural Strategies
In order to move from the current

utility attribute response level to the
desired or even best-case level.
Side

Effects
Impact of the changes
The importance of Cost Modeling
“How do I convince my boss to investing in

availability ?”
Maintain high availability requires a high level of
redundancy(duplication) with a rollover capability
This takes time an personnel
Personnel cost money as do purchasing highly available

software and adapting it for particular needs

Cost models are imperfect for a wide variety of

reasons, but they are the only tools available to
constrain requirements.
The CBAM steps:
This section first describes the steps of the CBAM
and then explores how to quantify uncertainty
to aid in making decisions.
Iteration I: Establish an Initial
Ranking
In the first iteration of the CBAM, each step is executed
to establish an initial ranking that will then be refined
in the second iteration. These steps serve to reduce the
size of the decision space, refine the scenarios, collect
sufficient information for decision making, and
establish an initial ranking of ASs.
Step 1:
Collate scenarios
Collate the scenarios elicited during the ATAM
exercise, and allow stakeholders to contribute new
ones. Prioritize these scenarios based on satisfying the
business goals of the system and choose the top onethird for further study.
Step 2:
Refine scenarios
Refine the scenarios by focusing on their
stimulus/response measures. Elicit the worst, current,
desired, and best-case QA response level for each
scenario.
Step 3:
Prioritize scenarios
Allocate 100 votes to each stakeholder and have them
distribute the votes among the scenarios by considering
the desired response value for each scenario. Total the
votes and choose the top 50% of the scenarios for
further analysis. Assign a weight of 1.0 to the highest
rated scenario, and assign the other scenarios a weight
relative to that scenario. This becomes the scenario
weight that appears in the calculation of the overall
benefit of an AS. Make a list of the QAs that concern
the stakeholders
Step 4:
Assign utility.
Determine the utility for each QA response level
(worst-case, current, desired, or best-case) for all
scenarios. The QAs of concern are the ones in the list
generated in step
Step 5:
Develop ASs for scenarios and determine their
expected QA response levels.
Develop (or capture the already-developed) ASs that
address the top 50% of the scenarios chosen in step 3,
and determine the expected QA response levels that
will result from implementing these ASs. Given that an
AS may affect multiple scenarios, this calculation must
be performed for each affected scenario.
Step 6:
Determine the utility of the expected QA response
level by interpolation.
Using the elicited utility values (that form a utility
curve) determine the utility of the “expected” QA
response level. We perform this calculation for each
affected scenario.
Step 7:
Calculate the total benefit obtained from an AS.
Subtract the utility value of the “current” level from the
“expected” level and normalize it using the votes
elicited in step 3. Sum the benefit of a particular AS
across all scenarios and across all relevant QAs
Step 8
Choose ASs based on ROI, subject to cost and
schedule constraints.
Determine the cost and schedule implications of each
AS. Calculate the ROI value for each remaining AS as a
ratio of benefit to cost. Rank order the ASs according to
their ROI values, and choose the top ones until the
budget or schedule is exhausted.
Step 9:
Confirm the results with intuition.
Of the chosen ASs, consider whether these seem to
align with the organization’s business goals. If not,
consider issues that may have been overlooked during
the analysis. If significant issues exist, perform another
iteration of these steps.
AS (Architecture
strategies)
QA (Quality
Attribute)
Iteration II: Incorporating
Uncertainty
A more sophisticated and realistic version of the CBAM
can be created by expanding on the steps enumerated
above. Secondary information can be added about risk
estimation and uncertainty and the allocation of
development resources. Each category of secondary
information may potentially affect the investment
decisions under consideration. Therefore, the ways they
augment the steps of the method must be considered
carefully for correctness and for practicality
Iteration II: Incorporating
Uncertainty(cont.…)
Augmenting the Steps.
The CBAM relies on stakeholder judgments for its
valuations of software benefits and costs. But these
judgments will naturally be uncertain, due to
differences in beliefs and experiences. One way to think
rigorously about the uncertainty of the results collected
in Iteration I is to collect and consider the risks
inherent in the estimates that have been made. To do
this, some kind of risk assessment exercise must be
performed. The risks typically fall into these four
categories.
Cont.….
Risks that affect the cost estimate of a strategy
under consideration
2. Risks that affect a stimulus-response characteristic
or a utility estimate of a strategy in the context of a
scenario.
3. Risks that affect stimulus-response characteristics
of other scenarios or QAs not previously considered.
These risks pertain to the side effects (rather than
the intended effects) of an AS.
1.
Cont.….
4. Risks that are related to project management and

schedule
CBAM Outcomes and Strengths
solving a problem in theory is very different from
solving one in practice.
The method provides values as a basis for a rational

decision making process in applying certain
architectural strategies
The method provides a business measure that can
determine the level of return on investment of a
particular change to the system.
Cont.…
The method will help organizations in analyzing and

pre-evaluating the resource investment in different
directions by adopting those architectural strategies
that are maximizing the gains and minimize the risks.
CBAM tells us that giving people the appropriate
tools to frame and structure their decision-making
process in relation to costs and benefits and
encouraging the right kind of dialogue among the
stakeholders are beneficial to the development of the
soft-ware system.
Questions??
 CBAM

Contenu connexe

Tendances

Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
Kittitouch Suteeca
 
Delphi cost estimation model
Delphi cost estimation modelDelphi cost estimation model
Delphi cost estimation model
Shashwat Shriparv
 
Unit 5 testing -software quality assurance
Unit 5  testing -software quality assuranceUnit 5  testing -software quality assurance
Unit 5 testing -software quality assurance
gopal10scs185
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
koolkampus
 

Tendances (20)

Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentation
 
Staffing level estimation
Staffing level estimation Staffing level estimation
Staffing level estimation
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
 
5 architecture
5 architecture5 architecture
5 architecture
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factors
 
Software Cost Estimation Techniques
Software Cost Estimation TechniquesSoftware Cost Estimation Techniques
Software Cost Estimation Techniques
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And Activities
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Software Engineering by Pankaj Jalote
Software Engineering by Pankaj JaloteSoftware Engineering by Pankaj Jalote
Software Engineering by Pankaj Jalote
 
Delphi cost estimation model
Delphi cost estimation modelDelphi cost estimation model
Delphi cost estimation model
 
Unit 5 testing -software quality assurance
Unit 5  testing -software quality assuranceUnit 5  testing -software quality assurance
Unit 5 testing -software quality assurance
 
CMMI staged and continuous
CMMI staged and continuousCMMI staged and continuous
CMMI staged and continuous
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
 
Chapter 1 2 - some size factors
Chapter 1   2 - some size factorsChapter 1   2 - some size factors
Chapter 1 2 - some size factors
 
Checkpoints of the Process
Checkpoints of the ProcessCheckpoints of the Process
Checkpoints of the Process
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 

En vedette (10)

Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testing
 
Architecture Review
Architecture ReviewArchitecture Review
Architecture Review
 
Software reliability tools and common software errors
Software reliability tools and common software errorsSoftware reliability tools and common software errors
Software reliability tools and common software errors
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
Abc
AbcAbc
Abc
 
Saam
SaamSaam
Saam
 
Importance of software architecture
Importance of software architectureImportance of software architecture
Importance of software architecture
 
Structural patterns
Structural patternsStructural patterns
Structural patterns
 
Software archiecture lecture07
Software archiecture   lecture07Software archiecture   lecture07
Software archiecture lecture07
 

Similaire à CBAM

Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
Erik De Monte
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
cherishwinsland
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
smumbahelp
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
Maanbahadurkhadka
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
Vinoth Kumar
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
christinemaritza
 

Similaire à CBAM (20)

IM426 3A G5.ppt
IM426 3A G5.pptIM426 3A G5.ppt
IM426 3A G5.ppt
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit Analysis
 
Quality - An Introduction-170715
Quality - An Introduction-170715Quality - An Introduction-170715
Quality - An Introduction-170715
 
Making Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI AdoptionMaking Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI Adoption
 
Return on-investment (roi)
Return on-investment (roi)Return on-investment (roi)
Return on-investment (roi)
 
Agile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementAgile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value Management
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk management
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
 
Feasibility_Study
Feasibility_StudyFeasibility_Study
Feasibility_Study
 
Savi chapter9
Savi chapter9Savi chapter9
Savi chapter9
 
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
 
Ch09
Ch09Ch09
Ch09
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGN
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

CBAM

  • 1.
  • 2. CBAM (Cost Benefit Analysis Method) Presented By Asim Shahzad MCS02121005
  • 3. Agenda CBAM, Cost Benefit Analysis Method. Decision Making Context. The Basics of CBAM. CBAM Steps. CBAM Outcomes and Strengths
  • 4. Cost-Benefit Analysis Method (CBAM) CBAM an architecture for analyzing the costs, benefits and schedule implications of architectural decisions. ATAM (Architecture Trade-off Analysis Method) considered the design decisions with respect to architectural quality attributes like modifiability, performance, availability, usability, and so on. CBAM is different from the former method, it add the costs (and implicit budgets or money) as quality attributes.
  • 5. Cont.. The biggest tradeoffs in large, complex systems usually have to do with finance. How should an organization invest its resources in a manner that will maximize its gains and minimize its risk? “…perhaps more important than costs, are the benefits than an architecture decision may bring to an organization.” CBAM provides an assessment of the technical and economic issues and architectural decisions
  • 6. Decision-Making Context The CBAM does not make decisions for the stakeholders. It simply aids in the documentation of the costs and benefits analysis. The CBAM can aid the stakeholders in choosing architectural strategies based on their return on investment (ROI) – the ratio of benefit to cost.
  • 7. Calculating ROI R (ROI) = (B (Benefit) / C (Cost))*100 This can be used to determine the optimal order for implementation the various strategies. Investment= $2000 Benefit = $500 R (ROI)=(B(benefit)/C(cost))*100 R(ROI)=($500/$2000)*100= 25%
  • 9. The Basis for the CBAM Variations of Scenarios  a way to strongly express and represent specific quality attributes (performance, cost, trademark etc. ) Utility-Response  Every incentive in a scenario provides some utility to the stakeholders. Priorities of Scenarios  Different scenarios within a given system have different levels of importance to the stakeholders and hence different utilities.  To characterize the relative importance of each scenario, a weigh is assigned through a two-step voting exercise.
  • 10. The Basis for the CBAM {2} Architectural Strategies In order to move from the current utility attribute response level to the desired or even best-case level. Side Effects Impact of the changes
  • 11. The importance of Cost Modeling “How do I convince my boss to investing in availability ?” Maintain high availability requires a high level of redundancy(duplication) with a rollover capability This takes time an personnel Personnel cost money as do purchasing highly available software and adapting it for particular needs Cost models are imperfect for a wide variety of reasons, but they are the only tools available to constrain requirements.
  • 12. The CBAM steps: This section first describes the steps of the CBAM and then explores how to quantify uncertainty to aid in making decisions.
  • 13. Iteration I: Establish an Initial Ranking In the first iteration of the CBAM, each step is executed to establish an initial ranking that will then be refined in the second iteration. These steps serve to reduce the size of the decision space, refine the scenarios, collect sufficient information for decision making, and establish an initial ranking of ASs.
  • 14. Step 1: Collate scenarios Collate the scenarios elicited during the ATAM exercise, and allow stakeholders to contribute new ones. Prioritize these scenarios based on satisfying the business goals of the system and choose the top onethird for further study.
  • 15. Step 2: Refine scenarios Refine the scenarios by focusing on their stimulus/response measures. Elicit the worst, current, desired, and best-case QA response level for each scenario.
  • 16. Step 3: Prioritize scenarios Allocate 100 votes to each stakeholder and have them distribute the votes among the scenarios by considering the desired response value for each scenario. Total the votes and choose the top 50% of the scenarios for further analysis. Assign a weight of 1.0 to the highest rated scenario, and assign the other scenarios a weight relative to that scenario. This becomes the scenario weight that appears in the calculation of the overall benefit of an AS. Make a list of the QAs that concern the stakeholders
  • 17. Step 4: Assign utility. Determine the utility for each QA response level (worst-case, current, desired, or best-case) for all scenarios. The QAs of concern are the ones in the list generated in step
  • 18. Step 5: Develop ASs for scenarios and determine their expected QA response levels. Develop (or capture the already-developed) ASs that address the top 50% of the scenarios chosen in step 3, and determine the expected QA response levels that will result from implementing these ASs. Given that an AS may affect multiple scenarios, this calculation must be performed for each affected scenario.
  • 19. Step 6: Determine the utility of the expected QA response level by interpolation. Using the elicited utility values (that form a utility curve) determine the utility of the “expected” QA response level. We perform this calculation for each affected scenario.
  • 20. Step 7: Calculate the total benefit obtained from an AS. Subtract the utility value of the “current” level from the “expected” level and normalize it using the votes elicited in step 3. Sum the benefit of a particular AS across all scenarios and across all relevant QAs
  • 21. Step 8 Choose ASs based on ROI, subject to cost and schedule constraints. Determine the cost and schedule implications of each AS. Calculate the ROI value for each remaining AS as a ratio of benefit to cost. Rank order the ASs according to their ROI values, and choose the top ones until the budget or schedule is exhausted.
  • 22. Step 9: Confirm the results with intuition. Of the chosen ASs, consider whether these seem to align with the organization’s business goals. If not, consider issues that may have been overlooked during the analysis. If significant issues exist, perform another iteration of these steps.
  • 24. Iteration II: Incorporating Uncertainty A more sophisticated and realistic version of the CBAM can be created by expanding on the steps enumerated above. Secondary information can be added about risk estimation and uncertainty and the allocation of development resources. Each category of secondary information may potentially affect the investment decisions under consideration. Therefore, the ways they augment the steps of the method must be considered carefully for correctness and for practicality
  • 25. Iteration II: Incorporating Uncertainty(cont.…) Augmenting the Steps. The CBAM relies on stakeholder judgments for its valuations of software benefits and costs. But these judgments will naturally be uncertain, due to differences in beliefs and experiences. One way to think rigorously about the uncertainty of the results collected in Iteration I is to collect and consider the risks inherent in the estimates that have been made. To do this, some kind of risk assessment exercise must be performed. The risks typically fall into these four categories.
  • 26. Cont.…. Risks that affect the cost estimate of a strategy under consideration 2. Risks that affect a stimulus-response characteristic or a utility estimate of a strategy in the context of a scenario. 3. Risks that affect stimulus-response characteristics of other scenarios or QAs not previously considered. These risks pertain to the side effects (rather than the intended effects) of an AS. 1.
  • 27. Cont.…. 4. Risks that are related to project management and schedule
  • 28. CBAM Outcomes and Strengths solving a problem in theory is very different from solving one in practice. The method provides values as a basis for a rational decision making process in applying certain architectural strategies The method provides a business measure that can determine the level of return on investment of a particular change to the system.
  • 29. Cont.… The method will help organizations in analyzing and pre-evaluating the resource investment in different directions by adopting those architectural strategies that are maximizing the gains and minimize the risks. CBAM tells us that giving people the appropriate tools to frame and structure their decision-making process in relation to costs and benefits and encouraging the right kind of dialogue among the stakeholders are beneficial to the development of the soft-ware system.

Notes de l'éditeur

  1. To earn profit of $50000000 in the year. To open 20 branches all over the world till 2020. Predictive Analysis, Security Method