SlideShare une entreprise Scribd logo
1  sur  17
RISK
MANAGEMENT
• Risk management is to solve the problem of
identifying & managing the risks associated
with software projects.
• The basic goal of risk management is to avoid
disasters or heavy losses.
• Risk management can be divided into 3
categories :
• Project risks
• Product risks
• Business risks
Overview of risk management
Overview of risk management
Project risks
• Risks that affect the project schedule or resources.
Examples:
Staff turnover: An experienced employee leaves the
project before its completion.
Hardware unavailability: Essential hardware is not
developed on time.
Size underestimate: size of the software system is
underestimated.
Requirements Change: A large number of changes to
the requirements are made.
Overview of risk management
Product risks
• Affect the quality or the performance of the
software being developed.
Examples:
Specification delays: essential interface
specifications are not available on time.
CASE tools poor performance: case tools
supporting the project do not perform as
expected. (development and maintenance of
software projects with help of various automated
software tools).
Overview of risk management
Business risks
• Affect the organizations developing or
purchasing the software.
Examples:
Technology change: The main technology on
which the system is built is replaced by new
technology.
Product competition: A competitor markets a
new product before the software system is
completed.
Risk management process
The process of risk management involves the following
important stages:
Risk identification:
• It is the first step in risk assessments which identifies
all the possible project, product and business risks in
a particular project.
• In addition, identifying the risks early provides the
management with a lot of time to handle the risks.
Risk analysis:
• Analyze the probability of the undesirable event
occurring and the loss that will occur if that event
occurs.
Continued….
Risk planning:
• By performing risk assessment (Risk
identification and analysis), a properly
prioritized list of the project risks will become
available.
• Therefore plans of avoiding or minimizing the
effects of the risks could be made.
Risk monitoring:
• This must be a continuous process. Each
identified risk is regularly assessed.
• Finally the outcome of the risk management
process must be documented.
• It should include the risks faced by the project,
analysis of those risks and plans required to
manage the risks.
Continued….
Process Visibility
• Processes should not only be designed and
implemented but should also be visible.
• The documentation of software systems makes
the software process visible.
• A key step is to ensure that the processes are
visible to all employees and managers who will
be able to implement processes effectively.
Steps required for process visibility
Documentation:
• It offers the most efficient and simple way to
document any process within an organization.
• This could be a process manual or even a simple
list of tasks that need to be performed.
• Process documentation can then be sent to all
employees and decision makers who are involved
in implementing the processes, and kept on
record, to be updated as changes are required.
Continued…
Diagrams
• Diagrams offer a visual representation of the
process steps.
• By adding visual representations within the
process documentation, process steps can also be
simplified and made clearer to all involved.
Sharing
• The most effective way to ensure total visibility
and understanding of processes is done through
training, one-on-one facilitation and through
tools that make it easier for employees to access
the process and understand them fully.
Continued…
Process model Process visibility
Waterfall model Good visibility. Each activity produces
specific deliverables or output.
Evolutionary model Poor visibility. Uneconomic to produce
documents during rapid iterations.
Spiral model Good visibility. Each spiral produces some
document with risk assessment.
Continued…
Advantages
• Process visibility helps everyone - employees,
customers to see and understand an
organization’s operations from beginning to
end.
• Competency spreads throughout the
organization.
• collaboration increases, and problem solving
becomes easier as a company’s supporting
resources such as training, tools, and policies
become readily available to all.
Continued…
Disadvantages
• The time schedule for management
requirements may not correspond with time
required to complete an activity. This will lead
to extra documents to be produced adding to
the cost of the process.
• Sometimes development continues before the
previous phase documents are completed,
affecting review and approval process.
• Software engineering is bounded by local,
national and international laws.
• Software engineers should uphold normal
standards of honesty and integrity.
• They should not use their skills and abilities to
behave in a dishonest way.
Professional Responsibility
Some of the professional responsibilities are:
1. Confidentiality : Engineers should respect
the confidentiality of their employers or
clients irrespective of whether a
confidentiality agreement has been signed or
not.
2. Competence: They should not misrepresent
their level of competence. They should not
accept work which is outside their
competence.
Continued …
Intellectual property rights:
They should be aware of local laws governing
the use of intellectual property such as patents,
copyright, etc. They should ensure that the
intellectual property of employers and clients is
protected.
Computer misuse:
They should not use their technical skills to
misuse other people’s computers.

Contenu connexe

Similaire à 6.RISK MANAGEMENT.pptx

Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
AbcXyz302255
 
UNIT V - 1 SPM.pptx
UNIT V - 1 SPM.pptxUNIT V - 1 SPM.pptx
UNIT V - 1 SPM.pptx
Devnath13
 

Similaire à 6.RISK MANAGEMENT.pptx (20)

Introduction to Software engineering ch03
Introduction to Software engineering ch03Introduction to Software engineering ch03
Introduction to Software engineering ch03
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 
Creating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxCreating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptx
 
An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
 
Introduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptxIntroduction Software Engineering Basics-Module(01).pptx
Introduction Software Engineering Basics-Module(01).pptx
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 
Software testing introduction
Software testing  introductionSoftware testing  introduction
Software testing introduction
 
SPM_UNIT-1(1).pptx
SPM_UNIT-1(1).pptxSPM_UNIT-1(1).pptx
SPM_UNIT-1(1).pptx
 
Proj Mgmt.ppt
Proj Mgmt.pptProj Mgmt.ppt
Proj Mgmt.ppt
 
Software engineering 11 software quality assurance plans
Software engineering 11 software quality assurance plansSoftware engineering 11 software quality assurance plans
Software engineering 11 software quality assurance plans
 
Software System Engineering - Chapter 1
Software System Engineering - Chapter 1Software System Engineering - Chapter 1
Software System Engineering - Chapter 1
 
Software Process
Software ProcessSoftware Process
Software Process
 
Process models
Process modelsProcess models
Process models
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )
 
Chapter 1_Introduction sunorganisedASE_finalised.pptx
Chapter 1_Introduction sunorganisedASE_finalised.pptxChapter 1_Introduction sunorganisedASE_finalised.pptx
Chapter 1_Introduction sunorganisedASE_finalised.pptx
 
UNIT V - 1 SPM.pptx
UNIT V - 1 SPM.pptxUNIT V - 1 SPM.pptx
UNIT V - 1 SPM.pptx
 
223417 Diploma_Sem4_software_engg-chap-05.ppt
223417 Diploma_Sem4_software_engg-chap-05.ppt223417 Diploma_Sem4_software_engg-chap-05.ppt
223417 Diploma_Sem4_software_engg-chap-05.ppt
 
Review se
Review seReview se
Review se
 

Plus de SATHYABAMAMADHANKUMA (15)

1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
 
Client Side Scripting.pptx
Client Side Scripting.pptxClient Side Scripting.pptx
Client Side Scripting.pptx
 
2. Relational Algebra.ppt
2. Relational Algebra.ppt2. Relational Algebra.ppt
2. Relational Algebra.ppt
 
1. UNIT - III.ppt
1. UNIT - III.ppt1. UNIT - III.ppt
1. UNIT - III.ppt
 
OK_Unit - I Multidisciplinary nature of environmental studies.ppt
OK_Unit - I Multidisciplinary nature of  environmental studies.pptOK_Unit - I Multidisciplinary nature of  environmental studies.ppt
OK_Unit - I Multidisciplinary nature of environmental studies.ppt
 
Unit - II - Eco Systems.ppt
Unit - II - Eco Systems.pptUnit - II - Eco Systems.ppt
Unit - II - Eco Systems.ppt
 
Unit - III Natural Resources.ppt
Unit - III Natural Resources.pptUnit - III Natural Resources.ppt
Unit - III Natural Resources.ppt
 
WP - Unit I.ppt
WP - Unit I.pptWP - Unit I.ppt
WP - Unit I.ppt
 
5-Recovery.ppt
5-Recovery.ppt5-Recovery.ppt
5-Recovery.ppt
 
DBMS-CPD.ppt
DBMS-CPD.pptDBMS-CPD.ppt
DBMS-CPD.ppt
 
system prgramming - loaders-linkers.pdf
system prgramming - loaders-linkers.pdfsystem prgramming - loaders-linkers.pdf
system prgramming - loaders-linkers.pdf
 
SystemProgramming 2017.pdf
SystemProgramming 2017.pdfSystemProgramming 2017.pdf
SystemProgramming 2017.pdf
 
System-Programming 2018.pdf
System-Programming 2018.pdfSystem-Programming 2018.pdf
System-Programming 2018.pdf
 
ELNA6eCh21.ppt
ELNA6eCh21.pptELNA6eCh21.ppt
ELNA6eCh21.ppt
 
DBMS - Introduction.ppt
DBMS - Introduction.pptDBMS - Introduction.ppt
DBMS - Introduction.ppt
 

Dernier

Dernier (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

6.RISK MANAGEMENT.pptx

  • 2. • Risk management is to solve the problem of identifying & managing the risks associated with software projects. • The basic goal of risk management is to avoid disasters or heavy losses. • Risk management can be divided into 3 categories : • Project risks • Product risks • Business risks Overview of risk management
  • 3. Overview of risk management Project risks • Risks that affect the project schedule or resources. Examples: Staff turnover: An experienced employee leaves the project before its completion. Hardware unavailability: Essential hardware is not developed on time. Size underestimate: size of the software system is underestimated. Requirements Change: A large number of changes to the requirements are made.
  • 4. Overview of risk management Product risks • Affect the quality or the performance of the software being developed. Examples: Specification delays: essential interface specifications are not available on time. CASE tools poor performance: case tools supporting the project do not perform as expected. (development and maintenance of software projects with help of various automated software tools).
  • 5. Overview of risk management Business risks • Affect the organizations developing or purchasing the software. Examples: Technology change: The main technology on which the system is built is replaced by new technology. Product competition: A competitor markets a new product before the software system is completed.
  • 6. Risk management process The process of risk management involves the following important stages: Risk identification: • It is the first step in risk assessments which identifies all the possible project, product and business risks in a particular project. • In addition, identifying the risks early provides the management with a lot of time to handle the risks. Risk analysis: • Analyze the probability of the undesirable event occurring and the loss that will occur if that event occurs.
  • 7. Continued…. Risk planning: • By performing risk assessment (Risk identification and analysis), a properly prioritized list of the project risks will become available. • Therefore plans of avoiding or minimizing the effects of the risks could be made.
  • 8. Risk monitoring: • This must be a continuous process. Each identified risk is regularly assessed. • Finally the outcome of the risk management process must be documented. • It should include the risks faced by the project, analysis of those risks and plans required to manage the risks. Continued….
  • 9. Process Visibility • Processes should not only be designed and implemented but should also be visible. • The documentation of software systems makes the software process visible. • A key step is to ensure that the processes are visible to all employees and managers who will be able to implement processes effectively.
  • 10. Steps required for process visibility Documentation: • It offers the most efficient and simple way to document any process within an organization. • This could be a process manual or even a simple list of tasks that need to be performed. • Process documentation can then be sent to all employees and decision makers who are involved in implementing the processes, and kept on record, to be updated as changes are required.
  • 11. Continued… Diagrams • Diagrams offer a visual representation of the process steps. • By adding visual representations within the process documentation, process steps can also be simplified and made clearer to all involved. Sharing • The most effective way to ensure total visibility and understanding of processes is done through training, one-on-one facilitation and through tools that make it easier for employees to access the process and understand them fully.
  • 12. Continued… Process model Process visibility Waterfall model Good visibility. Each activity produces specific deliverables or output. Evolutionary model Poor visibility. Uneconomic to produce documents during rapid iterations. Spiral model Good visibility. Each spiral produces some document with risk assessment.
  • 13. Continued… Advantages • Process visibility helps everyone - employees, customers to see and understand an organization’s operations from beginning to end. • Competency spreads throughout the organization. • collaboration increases, and problem solving becomes easier as a company’s supporting resources such as training, tools, and policies become readily available to all.
  • 14. Continued… Disadvantages • The time schedule for management requirements may not correspond with time required to complete an activity. This will lead to extra documents to be produced adding to the cost of the process. • Sometimes development continues before the previous phase documents are completed, affecting review and approval process.
  • 15. • Software engineering is bounded by local, national and international laws. • Software engineers should uphold normal standards of honesty and integrity. • They should not use their skills and abilities to behave in a dishonest way. Professional Responsibility
  • 16. Some of the professional responsibilities are: 1. Confidentiality : Engineers should respect the confidentiality of their employers or clients irrespective of whether a confidentiality agreement has been signed or not. 2. Competence: They should not misrepresent their level of competence. They should not accept work which is outside their competence.
  • 17. Continued … Intellectual property rights: They should be aware of local laws governing the use of intellectual property such as patents, copyright, etc. They should ensure that the intellectual property of employers and clients is protected. Computer misuse: They should not use their technical skills to misuse other people’s computers.