SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
i
ResearchColab
Risk Management
Team: Reckless 7
Institute of Information Technology
University of Dhaka
25th November, 2016
Contents
1.1 Introduction.....................................................................................................3
1.2 Project Risk Management...............................................................................3
1.3 Risk Identification...........................................................................................3
Risk Category................................................................................................4
Schedule........................................................................................................4
Requirement Risk..........................................................................................4
Project Management Risk.............................................................................4
Product/Technology Risk..............................................................................4
Customer Risk...............................................................................................4
Human Resources & Contractors Risk .........................................................5
1.4 Risk Register...................................................................................................5
1.5 Heat Map.........................................................................................................8
1.6 Evaluating Risks .............................................................................................9
1.7 Monitoring and Review ..................................................................................9
1.8 Conclusion ....................................................................................................10
3
1.1 Introduction
Risk is inevitable in a business organization when undertaking projects. However, the project
manager needs to ensure that risks are kept to a minimal. Risks can be mainly divided
between two types, negative impact risk and positive impact risk.
Not all the time would project managers be facing negative impact risks as there are positive
impact risks too. Once the risk has been identified, project managers need to come up with a
mitigation plan or any other solution to counter attack the risk.
1.2 Project Risk Management
Managers can plan their strategy based on four steps of risk management which prevails in an
organization. Following are the steps to manage risks effectively in an organization:
 Risk Identification
 Risk Quantification
 Risk Response
 Risk Monitoring and Control
1.3 Risk Identification
Managers face many difficulties when it comes to identifying and naming the risks that occur
when undertaking projects. These risks could be resolved through structured or unstructured
brainstorming or strategies. It's important to understand that risks pertaining to the project can
only be handled by the project manager and other stakeholders of the project.
Risks, such as operational or business risks will be handled by the relevant teams. The risks
that often impact a project are supplier risk, resource risk and budget risk. Supplier risk
would refer to risks that can occur in case the supplier is not meeting the timeline to supply
the resources required.
The common Project Risk List Reference below which are divided into a number of risk
categories are samples of potential risks of a project may be exposed to and should only be
used by the Project Team as a reference and starting point for risk identification during the
project risk management planning.
The category of risks identification is listed below-
4
Risk Category Risks
Schedule 1. Schedule not realistic, only "best case".
2. Important task missing from the schedule.
3. A delay in one task causes cascading delays in
dependent tasks.
4. Unfamiliar areas of the product take more time than
expected to design and implement
Requirement Risk 1. Requirements have been base lined but continue to
change.
2. Requirements are poorly defined, and further definition
expands the scope of the project
3. Specified areas of the product are more time-consuming
than expected.
4. Requirements are only partly known at project start
5. The total features requested may be beyond what the
development team can deliver in the time available.
Project
Management Risk
1. PM has little authority in the organization structure and
little personal power to influence decision-making and
resources
2. Priorities change on existing program
3. Project key success criteria not clearly defined to verify
the successful completion of each project phase.
4. Projects within the program often need the same
resources at the same time
5. Date is being totally driven by need to meet marketing
demo, trade show, or other mandate; little consideration
of project team estimates
Product/Technology
Risk
1. Development of the wrong user interface results in
redesign and implementation.
2. Development of extra software functions that are not
required (gold plating) extends the schedule.
3. Requirements for interfacing with other systems are not
under the team’s scope.
4. Dependency on a technology that is still under
development lengthens the schedule.
5. Selected technology is a poor match to the problem or
customer
Customer Risk 1. Customer insists on new requirements.
2. Customer review/decision cycles for plans, prototypes,
and specifications are slower than expected.
3. Customer insists on technical decisions that lengthen the
5
schedule.
4. Customer will not accept the software as delivered even
though it meets all specifications.
5. Customer has expectations for development speed that
developers cannot meet.
Human Resources
& Contractors Risk
1. Critical development work is being performed by one
developer
2. Some developers may leave the project before it is
finished.
3. Hiring process takes longer than expected.
4. Personnel need extra time to learn unfamiliar software
tools, hardware and programming language.
5. Contract personnel leave before project is complete.
6. Conflicts among team members result in poor
communication, poor designs, interface errors and extra
rework.
7. Personnel with critical skills needed for the project
cannot be found.
8. Contractor does not deliver components when promised.
1.4 Risk Register
A risk register or risk log is a scatter plot used as risk management tool and to fulfill
regulatory compliance acting as a repository for all risks identified and includes additional
information about each risk, e.g. nature of the risk, reference and owner, mitigation measures.
Severity and likelihood of the project will be scaled in the following ways-
Categorized Harm
Severity
Severity Level Risk
Normal 1 Very Low
Negligible 2 Low
Marginal 3 Moderate
Critical 4 High
Catastrophic 5 Extreme
Where,
 Catastrophic – Multiple Deaths
 Critical – One Death or Multiple Severe Injuries
 Marginal – One Severe Injury or Multiple Minor Injuries
 Negligible – One Minor Injury
 Normal - Less Than Injury
6
Likelihood Category Likelihood Level
Less Likely 1
Likely 2
Very Likely 3
A table of Risk Register is given below-
Potenti
al Risk
Dimen
sion
Ref
.
No
Risk
Scope
(Inter
nal/E
xtern
al)
Attribut
es
Description Sever
ity
Like
liho
od
Risk Plan Priorit
y
Status
Requ
ireme
nts
1.1 Exte
rnal
Maintai
nability
Continually
changing
requirements
5 3 Add effort
on
requirement
analysis
with
collaboratio
n.
High Closed
1.2 Inter
nal
Plannin
g
System
requirement
not
adequately
identified
4 2 Give a
dummy
project view
at first.
High Closed
1.3 Exte
rnal
Plannin
g
Unclear
system
requirements
5 2 More
meeting
required
with
stockholders
High Closed
1.4 Inter
nal
Depend
encies
Project
involves the
use of new
technology
3 1 Required
experts or
train
existing tem
members
Medi
um
Closed
Team 2.1 Inter
nal
Depend
encies
Inexperience
team
members
4 1 Assign
experienced
project
manager
Medi
um
Closed
2.2 Inter
nal
Depend
encies
Inadequately
trained
development
team
members
3 2 More
meeting
required
with
stockholders
High Closed
2.3 Inter
nal
Depend
encies
Team
members
lack
of
specialized
skill required
5 1 Continuous
meeting and
monitoring
High Closed
7
by the
project
User 3.1 Exte
rnal
Maintai
nability
Users
resistance to
change
3 2 Consult
with User
and project
team
Medi
um
Closed
3.2 Exte
rnal
Maintai
nability
Users with
negative
attitudes
toward the
project
3 1 Consult
with User
and project
team
Medi
um
Closed
3.3 Exte
rnal
Maintai
nability
Conflicts
between
users
4 1 Consult
with User
and project
team
High Closed
Proje
ct
comp
lexity
Plann
ing &
Cont
rol
4.1 Inter
nal
Resour
ces
Lack of
effective
project
management
technology
4 2 Project
planning
should be
done
keeping in
mind about
existing
tools and
technology
Medi
um
Closed
4.2 Inter
nal
Monito
ring
Project
progress not
monitored
closely
enough
5 1 Project
managemen
t and team
collaboratio
n should be
increased
Medi
um
Closed
4.3 Inter
nal
Plannin
g
Inadequate
estimation of
required
resources
3 2 Backup
equipment
should be
ready
Low Closed
4.4 Inter
nal
Plannin
g
Poor project
planning
5 1 Assign
experienced
project
manage
Medi
um
Closed
Orga
nizati
onal
Envir
onme
nt
5.1 Inter
nal
Maintai
nability
Change in
organizationa
l
management
during the
project
4 1 Consult
with User
and project
team
Medi
um
Closed
8
5.2 Exte
rnal
Depend
encies
Corporate
politics with
negative
effect on the
project
2 2 Continuous
meeting and
monitoring
Low Open
5.3 Inter
nal
Monito
ring
Unstable
Internal
Communicati
on
environment
3 3 Signed off
the
agreement
with
detailed.
Medi
um
Closed
1.5 Heat Map
Visualization is a powerful tool for simple information risk analysis. The simple of act of
placing risks in special relationship to each other allows a quick overview of essential
elements of your risk profile. As importantly, it allows you to communicate that simple risk
profile to others that aren’t as versed in information security, IT, and information
management. A popular risk visualization tool is an information risk heat map. The heat map
for our project is given below-
Figure1.5: Heat Map
CatastrophicCritical
1.15.3
5.2 1.32.2, 3.1, 4.3 1.2, 4.1
2.3, 4.2,
5.1, 5.2
1.4, 3.2 2.1, 3.3
High
Medium
Low
Normal Negligible Marginal
PotentialImpact
Probability
9
1.6 Evaluating Risks
The risk evaluation step involves deciding whether the identified risk is acceptable,
after considering:-
 The controls already in place
 The cost impact of managing the risks or leaving them untreated
 Benefits and opportunities presented by the risk
 The risks borne by other stakeholders
During this process, the risk rating identified during the analysis step, is compared against all
other risks and assigned priority for each risk.
1.7 Monitoring and Review
Regular monitoring and review of risks is an important part of the ResearchColab program. It
ensures that new risks are; detected; added to the Risk Register, managed and that action
plans are implemented and progressed effectively. The key to the monitoring process is to
establish a cost, schedule, and performance management indicator system over the entire
program that the PM uses to evaluate the status of the program. The indicator system should
be designed to provide early warning of potential problems to allow management actions.
Risk monitoring is not a problem-solving technique, but rather, a proactive technique to
observe the results of risk handling and identify new risks.
Test and Evaluation (T&E), Earned Value (EV), Technical Performance Measurement,
Program Metrics & Schedule Performance Monitoring are Some monitoring techniques
which can be adapted to become part of a risk indicator system.
Risk mitigation strategies and specific action plans should be incorporated in the project
execution plan, or risk analyses are just so much wallpaper. Risk mitigations was planned and
has been executed according to given below-
 Characterized the root causes of risks that had been identified and quantified in
earlier phases of the risk management process.
 Evaluated risk interactions and common causes.
 Identified alternative mitigation strategies, methods, and tools for each major
risk.
 Assessed and prioritized mitigation alternatives.
 Selected and committed the resources required for specific risk mitigation
alternatives.
 Communicated planning results to all project participants for implementation.
10
Although risk mitigation plans developed in detail and executed by project manager
and team members, the project management developed standards for a consistent risk
mitigation planning process. Risk mitigation planning was continued beyond the end
of the “ResearchColab” project by capturing data and lessons learned that can benefit
for our future projects.
1.8 Conclusion
In fine it can be added that, software risk management, risks classification in this project, are
clearly described. If risk management process is in place for each and every software
development process then future problems could be minimized or completely eradicated.
Hence, understanding various factors under risk management process and focusing on risk
management strategies explained above could help in building risk free products in future.
Risk management is an on-going process, and is a combination of proactive management
directed activities within a program that are intended to accommodate the possibility of
failures. So, it should be controlled in standard way.

Weitere ähnliche Inhalte

Was ist angesagt?

Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9
Ian Sommerville
 
Software project management
Software project managementSoftware project management
Software project management
R A Akerkar
 

Was ist angesagt? (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Software project management
Software project managementSoftware project management
Software project management
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9
 
Basic Software Effort Estimation
Basic Software Effort EstimationBasic Software Effort Estimation
Basic Software Effort Estimation
 
RMMM Plan
RMMM PlanRMMM Plan
RMMM Plan
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project Management
 
Ch 9 project monitoring & control updated
Ch 9 project monitoring & control updatedCh 9 project monitoring & control updated
Ch 9 project monitoring & control updated
 
Spm project planning
Spm project planning Spm project planning
Spm project planning
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
 
Stepwise planning
Stepwise planningStepwise planning
Stepwise planning
 
Software project management
Software project managementSoftware project management
Software project management
 
MG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTMG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENT
 
Selection of an appropriate project approach
Selection of an appropriate project approachSelection of an appropriate project approach
Selection of an appropriate project approach
 
Software Project Management chapter-1
Software Project Management chapter-1Software Project Management chapter-1
Software Project Management chapter-1
 
Software Project Management (monitoring and control)
Software Project Management (monitoring and control)Software Project Management (monitoring and control)
Software Project Management (monitoring and control)
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Software project estimation
Software project estimationSoftware project estimation
Software project estimation
 
Software project management- Software Engineering
Software project management- Software EngineeringSoftware project management- Software Engineering
Software project management- Software Engineering
 

Andere mochten auch

Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
Krishnasai Gudavalli
 

Andere mochten auch (20)

Software Project Management: Testing Document
Software Project Management: Testing DocumentSoftware Project Management: Testing Document
Software Project Management: Testing Document
 
Project Proposal: Bengali Braille to Text Translation
Project Proposal: Bengali Braille to Text TranslationProject Proposal: Bengali Braille to Text Translation
Project Proposal: Bengali Braille to Text Translation
 
Software Project Management: Configuration Management
Software Project Management: Configuration ManagementSoftware Project Management: Configuration Management
Software Project Management: Configuration Management
 
Proposal: A Study on Business Communucation System of KAZ Software
Proposal: A Study on Business Communucation System of KAZ SoftwareProposal: A Study on Business Communucation System of KAZ Software
Proposal: A Study on Business Communucation System of KAZ Software
 
Software Project Management: Release Notes
Software Project Management: Release NotesSoftware Project Management: Release Notes
Software Project Management: Release Notes
 
Software Requirements Specification on Bengali Braille to Text Translator
Software Requirements Specification on Bengali Braille to Text TranslatorSoftware Requirements Specification on Bengali Braille to Text Translator
Software Requirements Specification on Bengali Braille to Text Translator
 
Software Project Management: Project Planning
Software Project Management: Project PlanningSoftware Project Management: Project Planning
Software Project Management: Project Planning
 
Software Project Management: Change Control
Software Project Management: Change ControlSoftware Project Management: Change Control
Software Project Management: Change Control
 
Software Project Management: Project Summary
Software Project Management: Project SummarySoftware Project Management: Project Summary
Software Project Management: Project Summary
 
Software Project Management: Budget
Software Project Management: BudgetSoftware Project Management: Budget
Software Project Management: Budget
 
Software Project Management Presentation Final
Software Project Management Presentation FinalSoftware Project Management Presentation Final
Software Project Management Presentation Final
 
Software Project Management: Project Initiation
Software Project Management: Project InitiationSoftware Project Management: Project Initiation
Software Project Management: Project Initiation
 
Software Project Proposal: Bengali Braille to Text Translation
Software Project Proposal: Bengali Braille to Text TranslationSoftware Project Proposal: Bengali Braille to Text Translation
Software Project Proposal: Bengali Braille to Text Translation
 
Software Project Management: Project Charter
Software Project Management: Project CharterSoftware Project Management: Project Charter
Software Project Management: Project Charter
 
Software Project Management: Business Case
Software Project Management: Business CaseSoftware Project Management: Business Case
Software Project Management: Business Case
 
Final Internship Report
Final Internship ReportFinal Internship Report
Final Internship Report
 
Letter of Endorsement Sample
Letter of Endorsement SampleLetter of Endorsement Sample
Letter of Endorsement Sample
 
Report Acknowledgement Sample
Report Acknowledgement SampleReport Acknowledgement Sample
Report Acknowledgement Sample
 
Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)Software Requirements Specification on Student Information System (SRS on SIS)
Software Requirements Specification on Student Information System (SRS on SIS)
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 

Ähnlich wie Software Project Management: Risk Management

Software Project Risks Management (1).pdf
Software Project Risks Management (1).pdfSoftware Project Risks Management (1).pdf
Software Project Risks Management (1).pdf
ShivareddyGangam
 
8.project management chapter 8
8.project management chapter 88.project management chapter 8
8.project management chapter 8
Warui Maina
 
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbbUnit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
manisha61981
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
Abdul Naqashbandi
 
Mandarkulkarni 111003065827-phpapp01
Mandarkulkarni 111003065827-phpapp01Mandarkulkarni 111003065827-phpapp01
Mandarkulkarni 111003065827-phpapp01
PMI_IREP_TP
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Nimat Khattak
 

Ähnlich wie Software Project Management: Risk Management (20)

Software Project Risks Management (1).pdf
Software Project Risks Management (1).pdfSoftware Project Risks Management (1).pdf
Software Project Risks Management (1).pdf
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk management
Risk managementRisk management
Risk management
 
8.project management chapter 8
8.project management chapter 88.project management chapter 8
8.project management chapter 8
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
Session 10 gdas pmp study group presentation
Session 10   gdas pmp study group presentationSession 10   gdas pmp study group presentation
Session 10 gdas pmp study group presentation
 
Table of contents
Table of contentsTable of contents
Table of contents
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Online exam
Online examOnline exam
Online exam
 
Risk management-plan template
Risk management-plan templateRisk management-plan template
Risk management-plan template
 
JBC BoNA Zeta Project (Risk Management Plan)
JBC BoNA Zeta Project (Risk Management Plan)JBC BoNA Zeta Project (Risk Management Plan)
JBC BoNA Zeta Project (Risk Management Plan)
 
Presentation-RA-R1-30-10-2022.pptx
Presentation-RA-R1-30-10-2022.pptxPresentation-RA-R1-30-10-2022.pptx
Presentation-RA-R1-30-10-2022.pptx
 
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbbUnit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
Unit-3.pptx jhhhbhhghhgghhhhjjjjjjjjjjhhbbb
 
Project risk management
Project risk managementProject risk management
Project risk management
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
 
Mandarkulkarni 111003065827-phpapp01
Mandarkulkarni 111003065827-phpapp01Mandarkulkarni 111003065827-phpapp01
Mandarkulkarni 111003065827-phpapp01
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
 

Mehr von Minhas Kamal

Mehr von Minhas Kamal (12)

Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Deep Learning - Exploring The Magical World of Neural Network
Deep Learning - Exploring The Magical World of Neural NetworkDeep Learning - Exploring The Magical World of Neural Network
Deep Learning - Exploring The Magical World of Neural Network
 
Machine Learning - Entering into The Wonderful Galaxy of Machine Learning
Machine Learning - Entering into The Wonderful Galaxy of Machine LearningMachine Learning - Entering into The Wonderful Galaxy of Machine Learning
Machine Learning - Entering into The Wonderful Galaxy of Machine Learning
 
Artificial Intelligence - Staring at The Grand Universe of AI (1)
Artificial Intelligence - Staring at The Grand Universe of AI (1)Artificial Intelligence - Staring at The Grand Universe of AI (1)
Artificial Intelligence - Staring at The Grand Universe of AI (1)
 
Final Project Report- Bengali Braille to Text Translator
Final Project Report- Bengali Braille to Text TranslatorFinal Project Report- Bengali Braille to Text Translator
Final Project Report- Bengali Braille to Text Translator
 
Abstract- Bengali Braille to Text Translator
Abstract- Bengali Braille to Text TranslatorAbstract- Bengali Braille to Text Translator
Abstract- Bengali Braille to Text Translator
 
Software Project Management: Software Architecture
Software Project Management: Software ArchitectureSoftware Project Management: Software Architecture
Software Project Management: Software Architecture
 
Software Project Management: Software Requirement Specification
Software Project Management: Software Requirement SpecificationSoftware Project Management: Software Requirement Specification
Software Project Management: Software Requirement Specification
 
Software Design: User Interface Design
Software Design: User Interface DesignSoftware Design: User Interface Design
Software Design: User Interface Design
 
Business Communication System: KAZ Software
Business Communication System: KAZ SoftwareBusiness Communication System: KAZ Software
Business Communication System: KAZ Software
 
Final Internship Presentation
Final Internship Presentation Final Internship Presentation
Final Internship Presentation
 
Letter of Transmittal
Letter of TransmittalLetter of Transmittal
Letter of Transmittal
 

Kürzlich hochgeladen

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Kürzlich hochgeladen (20)

tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 

Software Project Management: Risk Management

  • 1. i ResearchColab Risk Management Team: Reckless 7 Institute of Information Technology University of Dhaka 25th November, 2016
  • 2. Contents 1.1 Introduction.....................................................................................................3 1.2 Project Risk Management...............................................................................3 1.3 Risk Identification...........................................................................................3 Risk Category................................................................................................4 Schedule........................................................................................................4 Requirement Risk..........................................................................................4 Project Management Risk.............................................................................4 Product/Technology Risk..............................................................................4 Customer Risk...............................................................................................4 Human Resources & Contractors Risk .........................................................5 1.4 Risk Register...................................................................................................5 1.5 Heat Map.........................................................................................................8 1.6 Evaluating Risks .............................................................................................9 1.7 Monitoring and Review ..................................................................................9 1.8 Conclusion ....................................................................................................10
  • 3. 3 1.1 Introduction Risk is inevitable in a business organization when undertaking projects. However, the project manager needs to ensure that risks are kept to a minimal. Risks can be mainly divided between two types, negative impact risk and positive impact risk. Not all the time would project managers be facing negative impact risks as there are positive impact risks too. Once the risk has been identified, project managers need to come up with a mitigation plan or any other solution to counter attack the risk. 1.2 Project Risk Management Managers can plan their strategy based on four steps of risk management which prevails in an organization. Following are the steps to manage risks effectively in an organization:  Risk Identification  Risk Quantification  Risk Response  Risk Monitoring and Control 1.3 Risk Identification Managers face many difficulties when it comes to identifying and naming the risks that occur when undertaking projects. These risks could be resolved through structured or unstructured brainstorming or strategies. It's important to understand that risks pertaining to the project can only be handled by the project manager and other stakeholders of the project. Risks, such as operational or business risks will be handled by the relevant teams. The risks that often impact a project are supplier risk, resource risk and budget risk. Supplier risk would refer to risks that can occur in case the supplier is not meeting the timeline to supply the resources required. The common Project Risk List Reference below which are divided into a number of risk categories are samples of potential risks of a project may be exposed to and should only be used by the Project Team as a reference and starting point for risk identification during the project risk management planning. The category of risks identification is listed below-
  • 4. 4 Risk Category Risks Schedule 1. Schedule not realistic, only "best case". 2. Important task missing from the schedule. 3. A delay in one task causes cascading delays in dependent tasks. 4. Unfamiliar areas of the product take more time than expected to design and implement Requirement Risk 1. Requirements have been base lined but continue to change. 2. Requirements are poorly defined, and further definition expands the scope of the project 3. Specified areas of the product are more time-consuming than expected. 4. Requirements are only partly known at project start 5. The total features requested may be beyond what the development team can deliver in the time available. Project Management Risk 1. PM has little authority in the organization structure and little personal power to influence decision-making and resources 2. Priorities change on existing program 3. Project key success criteria not clearly defined to verify the successful completion of each project phase. 4. Projects within the program often need the same resources at the same time 5. Date is being totally driven by need to meet marketing demo, trade show, or other mandate; little consideration of project team estimates Product/Technology Risk 1. Development of the wrong user interface results in redesign and implementation. 2. Development of extra software functions that are not required (gold plating) extends the schedule. 3. Requirements for interfacing with other systems are not under the team’s scope. 4. Dependency on a technology that is still under development lengthens the schedule. 5. Selected technology is a poor match to the problem or customer Customer Risk 1. Customer insists on new requirements. 2. Customer review/decision cycles for plans, prototypes, and specifications are slower than expected. 3. Customer insists on technical decisions that lengthen the
  • 5. 5 schedule. 4. Customer will not accept the software as delivered even though it meets all specifications. 5. Customer has expectations for development speed that developers cannot meet. Human Resources & Contractors Risk 1. Critical development work is being performed by one developer 2. Some developers may leave the project before it is finished. 3. Hiring process takes longer than expected. 4. Personnel need extra time to learn unfamiliar software tools, hardware and programming language. 5. Contract personnel leave before project is complete. 6. Conflicts among team members result in poor communication, poor designs, interface errors and extra rework. 7. Personnel with critical skills needed for the project cannot be found. 8. Contractor does not deliver components when promised. 1.4 Risk Register A risk register or risk log is a scatter plot used as risk management tool and to fulfill regulatory compliance acting as a repository for all risks identified and includes additional information about each risk, e.g. nature of the risk, reference and owner, mitigation measures. Severity and likelihood of the project will be scaled in the following ways- Categorized Harm Severity Severity Level Risk Normal 1 Very Low Negligible 2 Low Marginal 3 Moderate Critical 4 High Catastrophic 5 Extreme Where,  Catastrophic – Multiple Deaths  Critical – One Death or Multiple Severe Injuries  Marginal – One Severe Injury or Multiple Minor Injuries  Negligible – One Minor Injury  Normal - Less Than Injury
  • 6. 6 Likelihood Category Likelihood Level Less Likely 1 Likely 2 Very Likely 3 A table of Risk Register is given below- Potenti al Risk Dimen sion Ref . No Risk Scope (Inter nal/E xtern al) Attribut es Description Sever ity Like liho od Risk Plan Priorit y Status Requ ireme nts 1.1 Exte rnal Maintai nability Continually changing requirements 5 3 Add effort on requirement analysis with collaboratio n. High Closed 1.2 Inter nal Plannin g System requirement not adequately identified 4 2 Give a dummy project view at first. High Closed 1.3 Exte rnal Plannin g Unclear system requirements 5 2 More meeting required with stockholders High Closed 1.4 Inter nal Depend encies Project involves the use of new technology 3 1 Required experts or train existing tem members Medi um Closed Team 2.1 Inter nal Depend encies Inexperience team members 4 1 Assign experienced project manager Medi um Closed 2.2 Inter nal Depend encies Inadequately trained development team members 3 2 More meeting required with stockholders High Closed 2.3 Inter nal Depend encies Team members lack of specialized skill required 5 1 Continuous meeting and monitoring High Closed
  • 7. 7 by the project User 3.1 Exte rnal Maintai nability Users resistance to change 3 2 Consult with User and project team Medi um Closed 3.2 Exte rnal Maintai nability Users with negative attitudes toward the project 3 1 Consult with User and project team Medi um Closed 3.3 Exte rnal Maintai nability Conflicts between users 4 1 Consult with User and project team High Closed Proje ct comp lexity Plann ing & Cont rol 4.1 Inter nal Resour ces Lack of effective project management technology 4 2 Project planning should be done keeping in mind about existing tools and technology Medi um Closed 4.2 Inter nal Monito ring Project progress not monitored closely enough 5 1 Project managemen t and team collaboratio n should be increased Medi um Closed 4.3 Inter nal Plannin g Inadequate estimation of required resources 3 2 Backup equipment should be ready Low Closed 4.4 Inter nal Plannin g Poor project planning 5 1 Assign experienced project manage Medi um Closed Orga nizati onal Envir onme nt 5.1 Inter nal Maintai nability Change in organizationa l management during the project 4 1 Consult with User and project team Medi um Closed
  • 8. 8 5.2 Exte rnal Depend encies Corporate politics with negative effect on the project 2 2 Continuous meeting and monitoring Low Open 5.3 Inter nal Monito ring Unstable Internal Communicati on environment 3 3 Signed off the agreement with detailed. Medi um Closed 1.5 Heat Map Visualization is a powerful tool for simple information risk analysis. The simple of act of placing risks in special relationship to each other allows a quick overview of essential elements of your risk profile. As importantly, it allows you to communicate that simple risk profile to others that aren’t as versed in information security, IT, and information management. A popular risk visualization tool is an information risk heat map. The heat map for our project is given below- Figure1.5: Heat Map CatastrophicCritical 1.15.3 5.2 1.32.2, 3.1, 4.3 1.2, 4.1 2.3, 4.2, 5.1, 5.2 1.4, 3.2 2.1, 3.3 High Medium Low Normal Negligible Marginal PotentialImpact Probability
  • 9. 9 1.6 Evaluating Risks The risk evaluation step involves deciding whether the identified risk is acceptable, after considering:-  The controls already in place  The cost impact of managing the risks or leaving them untreated  Benefits and opportunities presented by the risk  The risks borne by other stakeholders During this process, the risk rating identified during the analysis step, is compared against all other risks and assigned priority for each risk. 1.7 Monitoring and Review Regular monitoring and review of risks is an important part of the ResearchColab program. It ensures that new risks are; detected; added to the Risk Register, managed and that action plans are implemented and progressed effectively. The key to the monitoring process is to establish a cost, schedule, and performance management indicator system over the entire program that the PM uses to evaluate the status of the program. The indicator system should be designed to provide early warning of potential problems to allow management actions. Risk monitoring is not a problem-solving technique, but rather, a proactive technique to observe the results of risk handling and identify new risks. Test and Evaluation (T&E), Earned Value (EV), Technical Performance Measurement, Program Metrics & Schedule Performance Monitoring are Some monitoring techniques which can be adapted to become part of a risk indicator system. Risk mitigation strategies and specific action plans should be incorporated in the project execution plan, or risk analyses are just so much wallpaper. Risk mitigations was planned and has been executed according to given below-  Characterized the root causes of risks that had been identified and quantified in earlier phases of the risk management process.  Evaluated risk interactions and common causes.  Identified alternative mitigation strategies, methods, and tools for each major risk.  Assessed and prioritized mitigation alternatives.  Selected and committed the resources required for specific risk mitigation alternatives.  Communicated planning results to all project participants for implementation.
  • 10. 10 Although risk mitigation plans developed in detail and executed by project manager and team members, the project management developed standards for a consistent risk mitigation planning process. Risk mitigation planning was continued beyond the end of the “ResearchColab” project by capturing data and lessons learned that can benefit for our future projects. 1.8 Conclusion In fine it can be added that, software risk management, risks classification in this project, are clearly described. If risk management process is in place for each and every software development process then future problems could be minimized or completely eradicated. Hence, understanding various factors under risk management process and focusing on risk management strategies explained above could help in building risk free products in future. Risk management is an on-going process, and is a combination of proactive management directed activities within a program that are intended to accommodate the possibility of failures. So, it should be controlled in standard way.