SlideShare a Scribd company logo
1 of 14
138
UNIT – 7 [Part -1]
METRICS FOR PROCESS AND PRODUCTS
Introduction:
* Consider simple example that two different team’s record and categorize all errors
during software process
* Team – A found 342 errors
* Team – B found 184 errors, other things being equal
* Which team is more effective in uncovering errors throughout the process? We can’t
answer…
* If measures are normalized it is possible to create metrics that enable comparison
* The size and function oriented metrics are normalized in this manner
7.1 Size - Oriented Metrics:
* These are derived by normalizing quality and productivity measures by considering the
size of the software that has been produced
* The organization maintains simple records, table of size oriented measures
* The table list each software development project that has been completed and measures
for that project

Project
Alpha
Beta
Gamma
.
.
.

LOC
12100
27200
20200
.
.
.

Effort
24
62
43
.
.
.

$ (000)
168
440
314
.
.
.

PP.doc
365
1224
1050
.
.
.

Errors
134
321
256
.
.
.

Defects
29
86
64
.
.
.

People
3
5
6
.
.

* Size oriented metrics are not universally accepted
Size Oriented Metrics
7.2 Function – Oriented Metrics:
* It use the measure of the functionality delivered by the application as a normalized
value
* The most widely used function Oriented metric is Function Point [FP]
139
* The computation of the function point is based on the characteristics of the software
information domain and complexity
Programming
Language
Access
Ada
Asp
.
.

AVG

LOC per Function Point
MEDIAN
LOW

HIGH

35
154
650
.
.

38
315
.
.

47
200
64
.
.

15
104
91
.
.

7.3 Metrics for Software Quality:
(i) Correctness: It is the degree to which the software performs its required function
* The most common measure for the correctness is defect per KLOC
* For quality assessment purpose defects are counted over a standard period of time,
typically one year
(ii) Maintainability: It is the degree to which a program can be corrected, if an error is
encountered, adapted if its environment changes (Or) enhanced
is the customer desires a change in requirements
* We measure maintainability using Indirect method, a simple time oriented metric is
Mean – Time – To – Change [MTTC]
* i.e. The time it takes to analyze the change request design an appropriate modification,
implement the change, test it and distribute the change to all users
* Low MTTC = Low Maintainability
(iii) Integrity: This attributes measures a system’s ability to with stand attacks to its
security
* Attacks can be made on all three components programs, data, and documents
* Two attributes are defined to measure integrity
(a) Threat – It is the probability that an attack of a specific type will occur within a given
time
(b) Security – It is the probability that the attack of a specific type will be repelled
Integrity = ∑ [1 – (Threat * (1 – Security))]
140

(iv) Usability: It is an attempt to quantify ease of use
(2) Defect Removal Efficiency [DRE]:
* It is a measure of the filtering ability of quality assurance and control activities as they
are applied throughout all process framework activities
DRE = E / [E + D]
Where,
E => Number of errors found before delivery of the software to end – Users
D => umber of defects found after delivery
* The ideal value for DRE is 1. [i.e. no defects are found in the software]

UNIT – 7 [Part – II]
RISK MANAGEMENT
7.4 Introduction:
141
* The risk analysis and management are a series of steps that help a software team to
understand and manage Uncertainty
* A risk is a potential problem – it might happen, it might not
* But it is really good idea to identify it, assess its probability of occurrence, estimate its
impact
7.5 Reactive VS Proactive Risk strategies:
(i) Reactive risk Strategies:
* The software team does nothing about risks until something goes wrong
* If problem occurs then the team files into action in an attempt to correct the problem
rapidly. This is often called Fire – Fighting Mode
* It is sometimes laughingly called “Indiana Jones School of risk management”
* i.e. Indian Jones faced with over whelming difficulty would invariably say “ Don’t
worry I’ll think of something !” never worry about problems until they happened
(ii) Proactive Risk Strategies:
* This strategy begins long before technical work initiated. Here
=> The potential risks are identified
=> Their probability and impact are assessed
=> and they are ranked by importance
* Then software team establishes a plan for managing risks
* The primary objective is to avoid risk, but because all risks are not avoided
* The team work to develop a contingency plan that will enable it to respond in a
controlled and effective manner

7.6 Software Risks: Risk Characteristics:
(1) Uncertainty: The risk may (Or) may not happen, that is there are no 100% probable
risks
(2) Loss: If a risk became a reality, unwanted consequences (Or) losses will occur
142
* When risks are analyzed it is important to quantify;
=> the level of uncertainty and
=> the degree of loss associated with each risk
7.7 Risk Categories:
(i) Project Risk:
* It affects the project Plan
* If projects risks become real, it is likely that;
=> Project schedule will slip &
=> Cost will increase
* Project risks identify
=> Potential Budgetary
=> Schedule
=> Personnel [Staffing and organization]
=> Resource
=> Stakeholder
=> Requirement Problems..
(ii) Technical Risks:
* It threaten the quality and timeliness of the software to be produced
* If a technical risk become reality, implementation may become difficult
* Technical Risks identify
=> Potential Design
=> Implementation
=> Interface
=> Verification
=> Maintenance problems
* Technical risks occur because, the problem is harder to solve than what we thought it
would be
(iii) Business Risks:
* It affects the viability of the software to be built
* Top Five business risks are;
(i) Building an excellent product (Or) System that no one really wants
143
[Market Risks]
(ii) Building a product that no longer fits into the overall business strategy
for the company [Strategic risks]
(iii) Building a product that the sales force doesn’t understand how to sell
[Sales Risks]
(iv) Losing the support of the senior management due to change in focus
(Or) change in people [Management Risks]
(v) Losing Budgetary (Or) Personnel commitment [Budget Risks]
(iv) Known Risks:
* These risks can be uncovered after careful evolution of the project plan, the business
and technical environment in which project is being developed
* Other reliable information sources are;
=> Unrealistic delivery date
=> Lack of document requirements
=> Poor development environment
(v) Predictable Risks:
* These risks are extrapolated from past project experience
Example:
=> Staff turnover
=> Poor communication with the customer
=> Dilution of staff effort as ongoing maintenance requests are serviced
(vi) Unpredictable Risks:
* These risks are the joker in the deck, they can and do occur. But extremely difficult to
identify in advance

7.8 Risk Identification:
* It is a systematic attempt to specify threats to the project plan [i.e. estimates, schedules,
resource loading]
144
* By identifying a known and predictable risk, project manager take a first step toward
avoiding them, when possible and controlling them when necessary
There are two distinct types of risks:
(i) Generic Risks – These are potential threat to every software project
(ii) Product – Specific Risks – These can be identified only by those, who with a clear
understanding of the technology, the people, and the environment that is specific to the
software that is to be built
* One method of risk identification is to create a risk item check list
* The checklist can be used for risk identification and focus on some subset of known and
predictable risks in the following generic subcategories:
Product Size => Risk associated with the overall size of the software to
be built (Or) modified
Business impact => Risk associated with the constraints imposed by
management (Or) the market place
Customer Characteristic => Risk associated with the sophistication of
the customer and developers’ ability to
communicate with the customer in a
timely manner
Process Definition => Risks associated with the degree to which the
software process has been defined and is followed
by the development Organization
Development Environment => Risks associated with the quant ability
and quality of the tools to be used to built
the product
Technology to built => Risk associated with the complexity of the system
to be built and the “Newness” of the technology
that is packaged by the System
Staff Size & experience => Risks associated with the overall technical
and project experience of the software
engineers who will do the work
145
7.9 Assessing Overall Project Risks:
* The following questions have been derived from risk data, obtained from experienced
software project managers
* The questions are ordered by relative importance to the success of as project
Questions:
(1) Have top software and customer managers formally committed to support the project?
(2) Are end users enthusiastically committed to the project and the system / product to be
built?
(3) Are requirements fully understood by the software engineering team and its
customers?
(4) Have customers been involved fully in the definition of requirements?
(5) Do end-Users have realistic expectations?
(6) Is project scope Stable?
(7) Does the software engineering team have the right mix of skills?
(8) Are project requirements are stable?
(9) Does the project team have experience with the technology to be implemented?
(10) Is the number of people on the project team adequate to do the job?
(11) Do all customer / User constituencies agree on the importance of the project and on
the requirements for the system / product to be built?
* The degree to which the project is at risk is directly proportional to the number of
negative responses to these questions
7.10 Risk Components and Drivers:
* The risk components are defined in the following manner:
(1) Performance Risks => The degree of uncertainty that the product will meet its
requirements and be fit for its intended use
(2) Cost Risks => The degree of uncertainty that the project budget will be maintained
(3) Support Risks => The degree of uncertainty that the resultant software will be easy
to correct, adapt and enhance
(4) Schedule Risks => The degree of uncertainty that the project schedule will be
maintained and that the product will be delivered on time
146
* The Impact of each risk driver on risk component is divided into four categories:
=> Negligible
=> Marginal
=> Critical
=> Catastrophic
7.11 Risk Projection:
* It is also referred as Risk Estimation
* It attempts to rate each risk in two ways:
(i) the likelihood (Or) probability that the risk is real
(ii) the consequences of the problem associated with the risk should it
occur
* The project planner and technical staff perform four risk projection steps:
(1) Establish a scale, which reflects the perceived likelihood of a risk
(2) Delineate the consequence of the risk
(3) Estimate the impact of the risk on the project and product
(4) Note the over all accuracy of the risk projection, so that there will be no
misunderstanding
7.12 Risk Table:
*A risk table provides a project manager with a simple technique for risk projection

Risks
Category
Size estimate PS
may
significantly

be

Probability
60%

Impact
2

RMMM
147
low
Large number PS

30%

3

planned
Less reuse than PS

70%

2

planned
Delivery

BU

50%

2

be tightened
Customer will PS

80%

2

30%

2

of users than

deadline

will

change
requirements
Staff

ST

Inexperienced
* Impact values
1 – Catastrophic
2 – Critical
3 – Marginal
4 – Negligible
* The project team list all risks in the first column of the table
* Each risk is categorized in second column
e.g. PS => Project Size risk
BU => Business risk
* Third column contains the probability of occurrence of each risk
* Fourth column contains impact of each risk
* After first four column, the risk table has been completed; the table is sorted by
probability and by impact
* High probability and high impact risks moves to top of table
* Low probability risk moves to bottom of table
* The project manager studies he resultant sorted table and defines a “Cut Off Line”
* The Cut Off line drawn horizontally at some point of table implies that, only risks that
lie above the line will be given further attention
148
* All risks lie above the Cut Off Line must be managed
* Fifth Column, RMMM contains a pointer into a risk mitigation, monitoring and
management plan
Example:
High

Very
High

Management
Concern

Impact

Disregard
risk factor

Very Low

0
Probability of
occurrence

1.0

* In the above figure a risk factor that has a high impact, but a low probability of
occurrence, should not absorb a significant amount of management time
* High impact risks with moderate to high probability and low impact risks with high
probability should be carried out forward into risk analysis steps that follow

7.13 Risk Refinement:
* As time passes and more is learned about the project and the risk it may be possible to
refine the risk into a set of more detailed risks
* One way to do refine is represent the risk in Condition – Transition – Consequence
[CTC] format
* The risk is stated in the following form
Given that <condition> then there is concern
149
That (possibly) <Consequence>
7.14 Risk Mitigation, Monitoring and management [RMMM]:
* If a software team adopts a proactive approach, to risk avoidance is always the best
* The possible steps taken to avoid the risks are
Mitigation Strategy:
=> meet with current staff to determine causes for turnover
Example:
* Poor working condition, Low pay, Competitive job market
=> Avoid those causes that are under our control before the project starts
=> Once the project commences assume turnover will occur and develop techniques to
ensure continuity when people leave
=> Organize project team so that information about each development activity is widely
dispersed
=> Define documentation standards and establish mechanism to ensure that documents
are developed in a timely manner
=> Conduct peer reviews of all work [so that more than one person is up to speed]
=> Assign a backup staff member for every critical technologist
=> As projects precede risk monitoring activities commence
=> The factors that can be monitored are:

Monitoring Strategy:
=> General attitudes of team members based on the project pressures
=> The degree to which the team has jelled
=> Interpersonal relationship among the team members
=> Potential problems with compensation and benefits
=> The qualitative of jobs with in the company and outside it
150
Risk Management and Contingency Planning:
* The project is well underway and number of people announce that they will leaving
* Suppose if the mitigation strategy has been followed then
=> Back up is available
=> Information is documented
=> Knowledge has been dispersed across team
=> In addition the manager may temporarily read just the project schedule
* It is noted that, RMMM steps leads to additional project cost
7.15 RMMM – Plan:
* The RMMM plan, documents all work performed as part of risk analysis
* It is used by project manager as part of the overall project plan
* Some Software teams do not develop a formal RMMM document; rather each risk is
documented individually using Risk Information Sheet [RIS]

RISK INFORMATION SHEET
Risk Id: CSE -06
Date: 11/12/2006
Probability: 80%
Impact: High
Description: Only 70% of the software components scheduled for reuse will in fact
be integrated into the application
Refinement / Context:
Sub Condition 1: Certain reusable components were developed by a third party with
no knowledge of internal design standards
151
Sub Condition 2: The design components for component interfaces have not been
solidified
Sub Condition 3: Certain reusable components have been implemented in a language
that is not supported on the target environment
Mitigation / Monitoring:
(1) Contact third party to determine conformance with design issues
(2) Press for interface standard completion
Management / Contingency Plan / Trigger:
Recomputed to be 30, 300. Allocate his amount within project contingency cost.
Develop revised schedule, allocate staff accordingly
Trigger: Mitigation steps unproductive as of 10 / 3 / 06
Current Status: 15/3/2007 : Mitigation steps Initiated
Originator: Arivu
Assigned: Selvan

More Related Content

What's hot

Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product DevelopmentAmandeep Midha
 
SE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsSE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsAmr E. Mohamed
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfPriyanshTan
 
Spm unit v-software reliability-
Spm unit v-software reliability-Spm unit v-software reliability-
Spm unit v-software reliability-Kanchana Devi
 
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...ijpla
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth modelHimanshu
 
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSijcsa
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk AnalysisBrett Leonard
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
SE_Lec 04_Agile Software Development
SE_Lec 04_Agile Software DevelopmentSE_Lec 04_Agile Software Development
SE_Lec 04_Agile Software DevelopmentAmr E. Mohamed
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software EngineeringDrishti Bhalla
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approachajeetmnnit
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-managementzeeshanwrch
 

What's hot (18)

Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
SE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of EthicsSE18_Lec 11_ Software Code of Ethics
SE18_Lec 11_ Software Code of Ethics
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
Spm unit v-software reliability-
Spm unit v-software reliability-Spm unit v-software reliability-
Spm unit v-software reliability-
 
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth model
 
14 software technical_metrics
14 software technical_metrics14 software technical_metrics
14 software technical_metrics
 
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
SE_Lec 04_Agile Software Development
SE_Lec 04_Agile Software DevelopmentSE_Lec 04_Agile Software Development
SE_Lec 04_Agile Software Development
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software Engineering
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approach
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 

Viewers also liked

Unit 4 final
Unit 4 finalUnit 4 final
Unit 4 finalsietkcse
 
Unit 6 final
Unit 6 finalUnit 6 final
Unit 6 finalsietkcse
 
Unit 3 final
Unit 3 finalUnit 3 final
Unit 3 finalsietkcse
 
Unit 2 final
Unit 2 finalUnit 2 final
Unit 2 finalsietkcse
 
Unit 5 final
Unit 5 finalUnit 5 final
Unit 5 finalsietkcse
 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineeringPreeti Mishra
 
Unit 8 final
Unit 8 finalUnit 8 final
Unit 8 finalsietkcse
 
Unit 1 final
Unit 1 finalUnit 1 final
Unit 1 finalsietkcse
 
Models and methods of explanation: dynamical systems, agent models, reflexive
Models and methods of explanation: dynamical systems, agent models, reflexiveModels and methods of explanation: dynamical systems, agent models, reflexive
Models and methods of explanation: dynamical systems, agent models, reflexiveJohn Bradford
 
Lecture 13 requirements modeling - flow & behavior (2)
Lecture 13   requirements modeling - flow &  behavior (2)Lecture 13   requirements modeling - flow &  behavior (2)
Lecture 13 requirements modeling - flow & behavior (2)IIUI
 
architectural design
 architectural design architectural design
architectural designPreeti Mishra
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principlessaurabhshertukde
 

Viewers also liked (16)

Unit 4 final
Unit 4 finalUnit 4 final
Unit 4 final
 
Unit 6 final
Unit 6 finalUnit 6 final
Unit 6 final
 
Unit 3 final
Unit 3 finalUnit 3 final
Unit 3 final
 
Unit 2 final
Unit 2 finalUnit 2 final
Unit 2 final
 
Unit 5 final
Unit 5 finalUnit 5 final
Unit 5 final
 
Slides chapter 8
Slides chapter 8Slides chapter 8
Slides chapter 8
 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineering
 
Unit 8 final
Unit 8 finalUnit 8 final
Unit 8 final
 
Unit 1 final
Unit 1 finalUnit 1 final
Unit 1 final
 
Models and methods of explanation: dynamical systems, agent models, reflexive
Models and methods of explanation: dynamical systems, agent models, reflexiveModels and methods of explanation: dynamical systems, agent models, reflexive
Models and methods of explanation: dynamical systems, agent models, reflexive
 
Lecture 13 requirements modeling - flow & behavior (2)
Lecture 13   requirements modeling - flow &  behavior (2)Lecture 13   requirements modeling - flow &  behavior (2)
Lecture 13 requirements modeling - flow & behavior (2)
 
unit 5 lesson 03 - Grammar- LP
unit 5 lesson 03 - Grammar- LPunit 5 lesson 03 - Grammar- LP
unit 5 lesson 03 - Grammar- LP
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
architectural design
 architectural design architectural design
architectural design
 
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principles
 

Similar to Unit 7 final

OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxRanjitKdk
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materialssmruti sarangi
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfWilliamTom9
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptMuhammadKashif703372
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering JayaKamal
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineeringBhagyashriMore10
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and managementyenohhoney
 
Week_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.pptWeek_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.ppt23017156038
 
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...Waqas Tariq
 
ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfVijayakumarKadumbadi
 
Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)YamunaP6
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptxvishnupriyapm4
 

Similar to Unit 7 final (20)

OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materials
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
Spm unit1
Spm unit1Spm unit1
Spm unit1
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Risk
RiskRisk
Risk
 
Cost estamition
Cost estamitionCost estamition
Cost estamition
 
Week_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.pptWeek_01-Intro to Software Engineering-1.ppt
Week_01-Intro to Software Engineering-1.ppt
 
SE
SESE
SE
 
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...Proposed an Integrated Model to Detect The Defect in Software Development Pro...
Proposed an Integrated Model to Detect The Defect in Software Development Pro...
 
ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdf
 
Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)Software engineering (Unit-1 Introduction)
Software engineering (Unit-1 Introduction)
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Unit 7 final

  • 1. 138 UNIT – 7 [Part -1] METRICS FOR PROCESS AND PRODUCTS Introduction: * Consider simple example that two different team’s record and categorize all errors during software process * Team – A found 342 errors * Team – B found 184 errors, other things being equal * Which team is more effective in uncovering errors throughout the process? We can’t answer… * If measures are normalized it is possible to create metrics that enable comparison * The size and function oriented metrics are normalized in this manner 7.1 Size - Oriented Metrics: * These are derived by normalizing quality and productivity measures by considering the size of the software that has been produced * The organization maintains simple records, table of size oriented measures * The table list each software development project that has been completed and measures for that project Project Alpha Beta Gamma . . . LOC 12100 27200 20200 . . . Effort 24 62 43 . . . $ (000) 168 440 314 . . . PP.doc 365 1224 1050 . . . Errors 134 321 256 . . . Defects 29 86 64 . . . People 3 5 6 . . * Size oriented metrics are not universally accepted Size Oriented Metrics 7.2 Function – Oriented Metrics: * It use the measure of the functionality delivered by the application as a normalized value * The most widely used function Oriented metric is Function Point [FP]
  • 2. 139 * The computation of the function point is based on the characteristics of the software information domain and complexity Programming Language Access Ada Asp . . AVG LOC per Function Point MEDIAN LOW HIGH 35 154 650 . . 38 315 . . 47 200 64 . . 15 104 91 . . 7.3 Metrics for Software Quality: (i) Correctness: It is the degree to which the software performs its required function * The most common measure for the correctness is defect per KLOC * For quality assessment purpose defects are counted over a standard period of time, typically one year (ii) Maintainability: It is the degree to which a program can be corrected, if an error is encountered, adapted if its environment changes (Or) enhanced is the customer desires a change in requirements * We measure maintainability using Indirect method, a simple time oriented metric is Mean – Time – To – Change [MTTC] * i.e. The time it takes to analyze the change request design an appropriate modification, implement the change, test it and distribute the change to all users * Low MTTC = Low Maintainability (iii) Integrity: This attributes measures a system’s ability to with stand attacks to its security * Attacks can be made on all three components programs, data, and documents * Two attributes are defined to measure integrity (a) Threat – It is the probability that an attack of a specific type will occur within a given time (b) Security – It is the probability that the attack of a specific type will be repelled Integrity = ∑ [1 – (Threat * (1 – Security))]
  • 3. 140 (iv) Usability: It is an attempt to quantify ease of use (2) Defect Removal Efficiency [DRE]: * It is a measure of the filtering ability of quality assurance and control activities as they are applied throughout all process framework activities DRE = E / [E + D] Where, E => Number of errors found before delivery of the software to end – Users D => umber of defects found after delivery * The ideal value for DRE is 1. [i.e. no defects are found in the software] UNIT – 7 [Part – II] RISK MANAGEMENT 7.4 Introduction:
  • 4. 141 * The risk analysis and management are a series of steps that help a software team to understand and manage Uncertainty * A risk is a potential problem – it might happen, it might not * But it is really good idea to identify it, assess its probability of occurrence, estimate its impact 7.5 Reactive VS Proactive Risk strategies: (i) Reactive risk Strategies: * The software team does nothing about risks until something goes wrong * If problem occurs then the team files into action in an attempt to correct the problem rapidly. This is often called Fire – Fighting Mode * It is sometimes laughingly called “Indiana Jones School of risk management” * i.e. Indian Jones faced with over whelming difficulty would invariably say “ Don’t worry I’ll think of something !” never worry about problems until they happened (ii) Proactive Risk Strategies: * This strategy begins long before technical work initiated. Here => The potential risks are identified => Their probability and impact are assessed => and they are ranked by importance * Then software team establishes a plan for managing risks * The primary objective is to avoid risk, but because all risks are not avoided * The team work to develop a contingency plan that will enable it to respond in a controlled and effective manner 7.6 Software Risks: Risk Characteristics: (1) Uncertainty: The risk may (Or) may not happen, that is there are no 100% probable risks (2) Loss: If a risk became a reality, unwanted consequences (Or) losses will occur
  • 5. 142 * When risks are analyzed it is important to quantify; => the level of uncertainty and => the degree of loss associated with each risk 7.7 Risk Categories: (i) Project Risk: * It affects the project Plan * If projects risks become real, it is likely that; => Project schedule will slip & => Cost will increase * Project risks identify => Potential Budgetary => Schedule => Personnel [Staffing and organization] => Resource => Stakeholder => Requirement Problems.. (ii) Technical Risks: * It threaten the quality and timeliness of the software to be produced * If a technical risk become reality, implementation may become difficult * Technical Risks identify => Potential Design => Implementation => Interface => Verification => Maintenance problems * Technical risks occur because, the problem is harder to solve than what we thought it would be (iii) Business Risks: * It affects the viability of the software to be built * Top Five business risks are; (i) Building an excellent product (Or) System that no one really wants
  • 6. 143 [Market Risks] (ii) Building a product that no longer fits into the overall business strategy for the company [Strategic risks] (iii) Building a product that the sales force doesn’t understand how to sell [Sales Risks] (iv) Losing the support of the senior management due to change in focus (Or) change in people [Management Risks] (v) Losing Budgetary (Or) Personnel commitment [Budget Risks] (iv) Known Risks: * These risks can be uncovered after careful evolution of the project plan, the business and technical environment in which project is being developed * Other reliable information sources are; => Unrealistic delivery date => Lack of document requirements => Poor development environment (v) Predictable Risks: * These risks are extrapolated from past project experience Example: => Staff turnover => Poor communication with the customer => Dilution of staff effort as ongoing maintenance requests are serviced (vi) Unpredictable Risks: * These risks are the joker in the deck, they can and do occur. But extremely difficult to identify in advance 7.8 Risk Identification: * It is a systematic attempt to specify threats to the project plan [i.e. estimates, schedules, resource loading]
  • 7. 144 * By identifying a known and predictable risk, project manager take a first step toward avoiding them, when possible and controlling them when necessary There are two distinct types of risks: (i) Generic Risks – These are potential threat to every software project (ii) Product – Specific Risks – These can be identified only by those, who with a clear understanding of the technology, the people, and the environment that is specific to the software that is to be built * One method of risk identification is to create a risk item check list * The checklist can be used for risk identification and focus on some subset of known and predictable risks in the following generic subcategories: Product Size => Risk associated with the overall size of the software to be built (Or) modified Business impact => Risk associated with the constraints imposed by management (Or) the market place Customer Characteristic => Risk associated with the sophistication of the customer and developers’ ability to communicate with the customer in a timely manner Process Definition => Risks associated with the degree to which the software process has been defined and is followed by the development Organization Development Environment => Risks associated with the quant ability and quality of the tools to be used to built the product Technology to built => Risk associated with the complexity of the system to be built and the “Newness” of the technology that is packaged by the System Staff Size & experience => Risks associated with the overall technical and project experience of the software engineers who will do the work
  • 8. 145 7.9 Assessing Overall Project Risks: * The following questions have been derived from risk data, obtained from experienced software project managers * The questions are ordered by relative importance to the success of as project Questions: (1) Have top software and customer managers formally committed to support the project? (2) Are end users enthusiastically committed to the project and the system / product to be built? (3) Are requirements fully understood by the software engineering team and its customers? (4) Have customers been involved fully in the definition of requirements? (5) Do end-Users have realistic expectations? (6) Is project scope Stable? (7) Does the software engineering team have the right mix of skills? (8) Are project requirements are stable? (9) Does the project team have experience with the technology to be implemented? (10) Is the number of people on the project team adequate to do the job? (11) Do all customer / User constituencies agree on the importance of the project and on the requirements for the system / product to be built? * The degree to which the project is at risk is directly proportional to the number of negative responses to these questions 7.10 Risk Components and Drivers: * The risk components are defined in the following manner: (1) Performance Risks => The degree of uncertainty that the product will meet its requirements and be fit for its intended use (2) Cost Risks => The degree of uncertainty that the project budget will be maintained (3) Support Risks => The degree of uncertainty that the resultant software will be easy to correct, adapt and enhance (4) Schedule Risks => The degree of uncertainty that the project schedule will be maintained and that the product will be delivered on time
  • 9. 146 * The Impact of each risk driver on risk component is divided into four categories: => Negligible => Marginal => Critical => Catastrophic 7.11 Risk Projection: * It is also referred as Risk Estimation * It attempts to rate each risk in two ways: (i) the likelihood (Or) probability that the risk is real (ii) the consequences of the problem associated with the risk should it occur * The project planner and technical staff perform four risk projection steps: (1) Establish a scale, which reflects the perceived likelihood of a risk (2) Delineate the consequence of the risk (3) Estimate the impact of the risk on the project and product (4) Note the over all accuracy of the risk projection, so that there will be no misunderstanding 7.12 Risk Table: *A risk table provides a project manager with a simple technique for risk projection Risks Category Size estimate PS may significantly be Probability 60% Impact 2 RMMM
  • 10. 147 low Large number PS 30% 3 planned Less reuse than PS 70% 2 planned Delivery BU 50% 2 be tightened Customer will PS 80% 2 30% 2 of users than deadline will change requirements Staff ST Inexperienced * Impact values 1 – Catastrophic 2 – Critical 3 – Marginal 4 – Negligible * The project team list all risks in the first column of the table * Each risk is categorized in second column e.g. PS => Project Size risk BU => Business risk * Third column contains the probability of occurrence of each risk * Fourth column contains impact of each risk * After first four column, the risk table has been completed; the table is sorted by probability and by impact * High probability and high impact risks moves to top of table * Low probability risk moves to bottom of table * The project manager studies he resultant sorted table and defines a “Cut Off Line” * The Cut Off line drawn horizontally at some point of table implies that, only risks that lie above the line will be given further attention
  • 11. 148 * All risks lie above the Cut Off Line must be managed * Fifth Column, RMMM contains a pointer into a risk mitigation, monitoring and management plan Example: High Very High Management Concern Impact Disregard risk factor Very Low 0 Probability of occurrence 1.0 * In the above figure a risk factor that has a high impact, but a low probability of occurrence, should not absorb a significant amount of management time * High impact risks with moderate to high probability and low impact risks with high probability should be carried out forward into risk analysis steps that follow 7.13 Risk Refinement: * As time passes and more is learned about the project and the risk it may be possible to refine the risk into a set of more detailed risks * One way to do refine is represent the risk in Condition – Transition – Consequence [CTC] format * The risk is stated in the following form Given that <condition> then there is concern
  • 12. 149 That (possibly) <Consequence> 7.14 Risk Mitigation, Monitoring and management [RMMM]: * If a software team adopts a proactive approach, to risk avoidance is always the best * The possible steps taken to avoid the risks are Mitigation Strategy: => meet with current staff to determine causes for turnover Example: * Poor working condition, Low pay, Competitive job market => Avoid those causes that are under our control before the project starts => Once the project commences assume turnover will occur and develop techniques to ensure continuity when people leave => Organize project team so that information about each development activity is widely dispersed => Define documentation standards and establish mechanism to ensure that documents are developed in a timely manner => Conduct peer reviews of all work [so that more than one person is up to speed] => Assign a backup staff member for every critical technologist => As projects precede risk monitoring activities commence => The factors that can be monitored are: Monitoring Strategy: => General attitudes of team members based on the project pressures => The degree to which the team has jelled => Interpersonal relationship among the team members => Potential problems with compensation and benefits => The qualitative of jobs with in the company and outside it
  • 13. 150 Risk Management and Contingency Planning: * The project is well underway and number of people announce that they will leaving * Suppose if the mitigation strategy has been followed then => Back up is available => Information is documented => Knowledge has been dispersed across team => In addition the manager may temporarily read just the project schedule * It is noted that, RMMM steps leads to additional project cost 7.15 RMMM – Plan: * The RMMM plan, documents all work performed as part of risk analysis * It is used by project manager as part of the overall project plan * Some Software teams do not develop a formal RMMM document; rather each risk is documented individually using Risk Information Sheet [RIS] RISK INFORMATION SHEET Risk Id: CSE -06 Date: 11/12/2006 Probability: 80% Impact: High Description: Only 70% of the software components scheduled for reuse will in fact be integrated into the application Refinement / Context: Sub Condition 1: Certain reusable components were developed by a third party with no knowledge of internal design standards
  • 14. 151 Sub Condition 2: The design components for component interfaces have not been solidified Sub Condition 3: Certain reusable components have been implemented in a language that is not supported on the target environment Mitigation / Monitoring: (1) Contact third party to determine conformance with design issues (2) Press for interface standard completion Management / Contingency Plan / Trigger: Recomputed to be 30, 300. Allocate his amount within project contingency cost. Develop revised schedule, allocate staff accordingly Trigger: Mitigation steps unproductive as of 10 / 3 / 06 Current Status: 15/3/2007 : Mitigation steps Initiated Originator: Arivu Assigned: Selvan