SlideShare ist ein Scribd-Unternehmen logo
1 von 37
The Risks of Risk-Based
Testing
© 2007, Rice Consulting Services, Inc.
At The Outset
• We believe in risk-based testing!
• We have designed and applied risk-based test
approaches for the past 20+ years.
However…
• We have been fooled by risk
assessments before.
• Some risks were higher than
assessed and have exhibited
more defects than expected.
• Other risks were lower than
expected and it wasn’t clear if
the tests were weak or if the
software was better than
expected.
Questions to Ponder
• How can we be “fooled” by
inaccurate risk assessments?
• How reliable is risk-based
testing?
• How can we build a safety net
in case of inaccurate risk
assessments?
• What can we learn about risk
from other risk-based
industries?
Risk AssessmentRisk Assessment
InformalInformal FormalFormal
Prediction ModelsPrediction Models
Checklists/RankingsChecklists/Rankings
InterviewsInterviews
TaxonomiesTaxonomies
Based on intuition
and experience
Formal vs. Informal Methods
Causes of Missing Risks
• Unexpected events
• That’s why insurance policies
have clauses for “Acts of God”,
war and terrorism, to keep from
paying claims far outside the
norm.
• In software, however, we can’t
transfer the risk that easily.
May 3, 1999 Oklahoma City
Tornado
Randy’s House
Causes of Missing Risks (2)
• Incorrect information
• People sometimes provide
inaccurate information (lie) on
insurance applications, just like they
do in software risk assessments.
• In the insurance business, the
company is protected by the policy
contract against false statements
used to obtain coverage.
• In the software business, we have
no such protection.
Causes of Missing Risks (3)
• Flawed assumptions
• Professional risk assessors, such as insurance underwriters,
actuaries, and loan officers have significant experience in
assessing risk.
• Their methods are pretty solid, although not perfect.
• In the software business, our assumptions tend to depend on
the situation at hand.
Ways We Can Be “Fooled” by
Inaccurate Risk Assessments
1
#1 – No Software “Physics” for
Defects
• Just because our risk assessment may
indicate a software function should not
fail, the software may not behave that
way.
• An example of this is the complexity of
software.
• As testers, we need to understand that all
the tricks and techniques we use may be
helpful, but are not guaranteed to be
totally accurate or effective.
2
#2 - We Can't Think of Everything
• Unexpected things can happen that can
change the risk equation by a little or a lot.
• Risk, by its very nature, implies a degree of
uncertainty.
• To address this risk, always remember that you
don’t know everything.
• Use the “Columbo” approach and ask questions even
when the answers may seem obvious.
• Obtain other perspectives in the risk assessment to
evaluate your own conclusions.
3
#3 - People Do Not Always
Provide Accurate Information
• When we base a risk assessment on
information obtained from people, there
is always the possibility the information
could be skewed, inaccurate, or
misleading.
• Ask multiple people the same questions in the
same way.
• Ask the same question in a slightly different way.
• Look for inconsistencies and similarities to
determine a confidence level.
4
#4 - The "I Want to Believe" Syndrome
• There are times that we don't have a
rational reason to believe in
something, but we would really would
like to.
• Risk denial is one approach to dealing
with risk, just not a good one.
5
#5 - The "High Risk" Effect
• This is the opposite of the "I
Want to Believe" syndrome.
• So many things are seen as
high risks that the value of
risk assessment is lost.
• To deal with this problem we
must find ways to make the
assessment criteria more
specific, objective and
detailed.
6
#6 - Flawed Risk
Assessment Methods
• Applying someone else's methods that don't
fit your context
• Devising an inaccurate and unproven method
on your own
• Misapplying a good method incorrectly
because of a lack of understanding
7
#7 – Using Informal Methods
• You can be fooled by informal risk assessment
methods, but at least you are aware that the
assessment may be a guess
• Perhaps an informed one, but still a guess.
• A major problem is that you have nothing upon
which to base risk assumptions.
• To balance this risk, add some structure to your
risk assessment.
• You don’t have to eliminate intuition and experience, just
document your rationale for your risk-based decisions.
8
#8 - Failing to Incorporate
Intuition
• Many times I followed a hunch and found
defects even when the risk assessment
indicated a low risk of failure.
• To address this risk, take a step back from
any risk assessment and ask critical
questions, such as:
• “What looks odd about this?”
• “What looks too good to be true?”
• “What am I not seeing or hearing?”
9
#9 - Only Performing the
Risk Assessment Once
• Risk assessment is a
snapshot taken at a given
point in time.
• The problem is that risks change
throughout a project.
• Ideally, there should be pre-
defined risk assessment
checkpoints throughout the
project.
• concept stage, requirements,
design, code, test and deployment.
0
#10 - Failing to Report Risk Assessment
Results Correctly and Timely
• The longer a known risk remains
unreported, the less time is available to
address it.
• The risk may increase or decrease over time.
• Risk assessment results are like any
other form of measurement and can be
manipulated to suit the objectives of
the presenter or the receiver.
• Example: The situation where the presenter of
the results is fearful of giving bad news for
political or legal reasons.
1
#11 - Failing to Act on Assessment
Results
• Unless you take action on a
risk, the risk assessment is
little more than an exercise.
• To address this risk, your
testing process should
specifically include the
results from your risk
assessment.
2
#12 - A Limited View of
Risk
• If you view the project from
only one perspective (the
“seasoned veteran user”
perspective or the “novice”
perspective), then you will
only identify risks in that
profile.
• Remember to view risk from
multiple perspectives to get
an accurate assessment.
3
#13 – The “Cry Wolf” Effect
• In this scenario, a risk is raised so many
times without incident that people start
to disregard it.
• Then, when the risk actually manifests,
people are unprepared.
4
Example: Adjusting Your
Risk Assessment Methods
Likelihood of Failure
ImpactofFailure
Low High
High
• ACB001
• ACB002
• ACB003
4 - Very High Risk
3 - High Risk
2 - Moderate Risk1 - Low Risk
• ACB004
• ACB005
5
Example: Adjusting Your Risk
Assessment Methods (2)
Likelihood of Failure
ImpactofFailure
Low High
High
RCS
4 - Very High Risk
Complete regression testing,
100% path coverage
3 - High Risk
High level of regression testing,
100% path coverage
2 - Moderate Risk
Partial regression testing,
100% branch coverage
1 - Low Risk
Test changes plus the
most critical cases,
Moderate code coverage
6
The Safety Net
• There is a word that is often used
in conjunction with risk, that
people sometimes omit -
"contingency“
• a possibility that must be prepared for.
• Contingencies are needed
because we have a rich history of
seeing how real life events may
not match the risk assessment.
• Think of a contingency as your "Plan B"
in case the unexpected happens.
7
An Example From the
Insurance Industry
• Reserves are established to
cover higher levels of loss
than normal premiums would
cover.
• Minimal reserve levels are set
by law.
• An insurer may set higher levels if
they need more assurance they
can cover unexpected losses.
8
However, in the Software
Industry…
• There are no regulations about such reserves for projects.
• To make matters worse, in software projects, people tend
to be optimists that reserves won’t be needed.
• “In fact,” some will say, “we will beat our estimates and finish
the project early. That will get us bonuses for sure!”
9
What About “Padding”
Estimates?
• Some feel that the estimate
should be carefully calculated
as accurately as possible and
that should be the actual
working estimate.
• Others feel that this approach
is a recipe for disaster because
there is no room for dealing
with contingencies.
0
Reframing the Debate
• Instead of “padding”, let’s call these "project reserves".
• When used as intended, project reserves help us deal with
the unexpected.
• Problems arise, however, when people abuse reserves.
Project reserves are vital for
times when we are fooled
by risk.
2
Plan “B”
• Reserves are just time and money - they don't tell you what
to do, but a contingency plan does.
• Contingency plans can be created for just about any project
activity.
3
Major Project Activities
Deserve Priority
Consideration
• What if…
• The requirements are inadequate?
• The degree of requirements
change is excessive?
• High levels of defects are
discovered during testing or
reviews?
• Severe problems are encountered
during implementation?
4
A Risk Mitigation Strategy
• Should address:
• How risks will be addressed
• Who will address the risks
• When risks will be addressed
• When risks will be reassessed
A reasonable conclusion is
that every risk assessment
should also address project
reserves and contingencies.
6
Summary
• Hopefully, this doesn’t frighten
you from applying risk-based
testing.
• Many times our biases form
the basis of our perceptions.
• This causes us to fail to recognize
important risks, and in some
cases, entire classes of risks.
7
Summary (2)
• The key to dealing with risk is not to
rely on just one aspect of the risk
picture.
• We must also balance risk with
contingencies to have a safety net for
any risk assessment approach.

Weitere ähnliche Inhalte

Was ist angesagt?

risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testingToshi Patel
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionSune Gynthersen
 
Risk based testing a new case study
Risk based testing   a new case studyRisk based testing   a new case study
Risk based testing a new case studyBassam Al-Khatib
 
John Brennen - Red Hot Testing in a Green World
John Brennen - Red Hot Testing in a Green WorldJohn Brennen - Red Hot Testing in a Green World
John Brennen - Red Hot Testing in a Green WorldTEST Huddle
 
Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success TEST Huddle
 
Kasper Hanselman - Imagination is More Important Than Knowledge
Kasper Hanselman - Imagination is More Important Than KnowledgeKasper Hanselman - Imagination is More Important Than Knowledge
Kasper Hanselman - Imagination is More Important Than KnowledgeTEST Huddle
 
Risk-Based Testing for Agile Projects
Risk-Based Testing for Agile ProjectsRisk-Based Testing for Agile Projects
Risk-Based Testing for Agile ProjectsTechWell
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...TEST Huddle
 
Test beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisTest beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisPractiTest
 
Testing fundamentals in a changing world
Testing fundamentals in a changing worldTesting fundamentals in a changing world
Testing fundamentals in a changing worldPractiTest
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Testing Metrics and why Managers like them
Testing Metrics and why Managers like themTesting Metrics and why Managers like them
Testing Metrics and why Managers like themPractiTest
 
The Risk Questionnaire - by: Adam Knight
  The Risk Questionnaire - by: Adam Knight  The Risk Questionnaire - by: Adam Knight
The Risk Questionnaire - by: Adam KnightPractiTest
 
Better Software Classic Testing Mistakes
Better Software Classic Testing MistakesBetter Software Classic Testing Mistakes
Better Software Classic Testing Mistakesnazeer pasha
 
Risk based testing with Jira and Jubula
Risk based testing with Jira and JubulaRisk based testing with Jira and Jubula
Risk based testing with Jira and JubulaDaniele Gagliardi
 
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!TEST Huddle
 
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010TEST Huddle
 

Was ist angesagt? (20)

risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect Prevention
 
Risk based testing a new case study
Risk based testing   a new case studyRisk based testing   a new case study
Risk based testing a new case study
 
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
 
John Brennen - Red Hot Testing in a Green World
John Brennen - Red Hot Testing in a Green WorldJohn Brennen - Red Hot Testing in a Green World
John Brennen - Red Hot Testing in a Green World
 
Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success Mats Grindal - Risk-Based Testing - Details of Our Success
Mats Grindal - Risk-Based Testing - Details of Our Success
 
Kasper Hanselman - Imagination is More Important Than Knowledge
Kasper Hanselman - Imagination is More Important Than KnowledgeKasper Hanselman - Imagination is More Important Than Knowledge
Kasper Hanselman - Imagination is More Important Than Knowledge
 
Risk-Based Testing for Agile Projects
Risk-Based Testing for Agile ProjectsRisk-Based Testing for Agile Projects
Risk-Based Testing for Agile Projects
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
Advanced Defect Management
Advanced Defect ManagementAdvanced Defect Management
Advanced Defect Management
 
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...
Peter Zimmerer - Establishing Testing Knowledge and Experience Sharing at Sie...
 
Test beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause AnalysisTest beyond the obvious- Root Cause Analysis
Test beyond the obvious- Root Cause Analysis
 
Testing fundamentals in a changing world
Testing fundamentals in a changing worldTesting fundamentals in a changing world
Testing fundamentals in a changing world
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Testing Metrics and why Managers like them
Testing Metrics and why Managers like themTesting Metrics and why Managers like them
Testing Metrics and why Managers like them
 
The Risk Questionnaire - by: Adam Knight
  The Risk Questionnaire - by: Adam Knight  The Risk Questionnaire - by: Adam Knight
The Risk Questionnaire - by: Adam Knight
 
Better Software Classic Testing Mistakes
Better Software Classic Testing MistakesBetter Software Classic Testing Mistakes
Better Software Classic Testing Mistakes
 
Risk based testing with Jira and Jubula
Risk based testing with Jira and JubulaRisk based testing with Jira and Jubula
Risk based testing with Jira and Jubula
 
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!
Gitte Ottosen - Agility and Process Maturity, Of Course They Mix!
 
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010
Derk-Jan de Grood - 9 Causes of losing valuable testing time - EuroSTAR 2010
 

Ähnlich wie Risks of Risk-Based Testing

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and managementONE BCG
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Dhamo daran
 
Learning_Unit_1
Learning_Unit_1Learning_Unit_1
Learning_Unit_1Jack Ong
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.pptumairshams6
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsResolver Inc.
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?easy2comply
 
Integration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John FisherIntegration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John FisherBPUG Congress
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury, LLP
 
Strategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskStrategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskESI14
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222nashaat algrara
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013IT Club GTA
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk ManagementGrafic.guru
 
Presentation on 'Why cant people estimate' event, 23rd June 2016
Presentation on 'Why cant people estimate' event, 23rd June 2016 Presentation on 'Why cant people estimate' event, 23rd June 2016
Presentation on 'Why cant people estimate' event, 23rd June 2016 Association for Project Management
 
UXPA Iowa - How to Fail at Building Websites
UXPA Iowa - How to Fail at Building WebsitesUXPA Iowa - How to Fail at Building Websites
UXPA Iowa - How to Fail at Building WebsitesIan Lintner
 
Taking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalTaking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalProformative, Inc.
 
Financial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxFinancial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxfatin877173
 
Safety and risk
Safety and riskSafety and risk
Safety and riskSKS
 

Ähnlich wie Risks of Risk-Based Testing (20)

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Learning_Unit_1
Learning_Unit_1Learning_Unit_1
Learning_Unit_1
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.ppt
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Problem Solving-MIT.pptx
Problem Solving-MIT.pptxProblem Solving-MIT.pptx
Problem Solving-MIT.pptx
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?
 
Integration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John FisherIntegration Of Prince2® And M O R® 1 John Fisher
Integration Of Prince2® And M O R® 1 John Fisher
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
 
Strategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate riskStrategy Execution - 7 ways to mitigate risk
Strategy Execution - 7 ways to mitigate risk
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk Management
 
Presentation on 'Why cant people estimate' event, 23rd June 2016
Presentation on 'Why cant people estimate' event, 23rd June 2016 Presentation on 'Why cant people estimate' event, 23rd June 2016
Presentation on 'Why cant people estimate' event, 23rd June 2016
 
UXPA Iowa - How to Fail at Building Websites
UXPA Iowa - How to Fail at Building WebsitesUXPA Iowa - How to Fail at Building Websites
UXPA Iowa - How to Fail at Building Websites
 
Taking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to PracticalTaking Enterprise Risk from Theoretical to Practical
Taking Enterprise Risk from Theoretical to Practical
 
Financial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptxFinancial Planning for MasterofComm.pptx
Financial Planning for MasterofComm.pptx
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Risks of Risk-Based Testing

  • 1. The Risks of Risk-Based Testing © 2007, Rice Consulting Services, Inc.
  • 2. At The Outset • We believe in risk-based testing! • We have designed and applied risk-based test approaches for the past 20+ years.
  • 3. However… • We have been fooled by risk assessments before. • Some risks were higher than assessed and have exhibited more defects than expected. • Other risks were lower than expected and it wasn’t clear if the tests were weak or if the software was better than expected.
  • 4. Questions to Ponder • How can we be “fooled” by inaccurate risk assessments? • How reliable is risk-based testing? • How can we build a safety net in case of inaccurate risk assessments? • What can we learn about risk from other risk-based industries?
  • 5. Risk AssessmentRisk Assessment InformalInformal FormalFormal Prediction ModelsPrediction Models Checklists/RankingsChecklists/Rankings InterviewsInterviews TaxonomiesTaxonomies Based on intuition and experience Formal vs. Informal Methods
  • 6. Causes of Missing Risks • Unexpected events • That’s why insurance policies have clauses for “Acts of God”, war and terrorism, to keep from paying claims far outside the norm. • In software, however, we can’t transfer the risk that easily.
  • 7. May 3, 1999 Oklahoma City Tornado Randy’s House
  • 8. Causes of Missing Risks (2) • Incorrect information • People sometimes provide inaccurate information (lie) on insurance applications, just like they do in software risk assessments. • In the insurance business, the company is protected by the policy contract against false statements used to obtain coverage. • In the software business, we have no such protection.
  • 9. Causes of Missing Risks (3) • Flawed assumptions • Professional risk assessors, such as insurance underwriters, actuaries, and loan officers have significant experience in assessing risk. • Their methods are pretty solid, although not perfect. • In the software business, our assumptions tend to depend on the situation at hand.
  • 10. Ways We Can Be “Fooled” by Inaccurate Risk Assessments
  • 11. 1 #1 – No Software “Physics” for Defects • Just because our risk assessment may indicate a software function should not fail, the software may not behave that way. • An example of this is the complexity of software. • As testers, we need to understand that all the tricks and techniques we use may be helpful, but are not guaranteed to be totally accurate or effective.
  • 12. 2 #2 - We Can't Think of Everything • Unexpected things can happen that can change the risk equation by a little or a lot. • Risk, by its very nature, implies a degree of uncertainty. • To address this risk, always remember that you don’t know everything. • Use the “Columbo” approach and ask questions even when the answers may seem obvious. • Obtain other perspectives in the risk assessment to evaluate your own conclusions.
  • 13. 3 #3 - People Do Not Always Provide Accurate Information • When we base a risk assessment on information obtained from people, there is always the possibility the information could be skewed, inaccurate, or misleading. • Ask multiple people the same questions in the same way. • Ask the same question in a slightly different way. • Look for inconsistencies and similarities to determine a confidence level.
  • 14. 4 #4 - The "I Want to Believe" Syndrome • There are times that we don't have a rational reason to believe in something, but we would really would like to. • Risk denial is one approach to dealing with risk, just not a good one.
  • 15. 5 #5 - The "High Risk" Effect • This is the opposite of the "I Want to Believe" syndrome. • So many things are seen as high risks that the value of risk assessment is lost. • To deal with this problem we must find ways to make the assessment criteria more specific, objective and detailed.
  • 16. 6 #6 - Flawed Risk Assessment Methods • Applying someone else's methods that don't fit your context • Devising an inaccurate and unproven method on your own • Misapplying a good method incorrectly because of a lack of understanding
  • 17. 7 #7 – Using Informal Methods • You can be fooled by informal risk assessment methods, but at least you are aware that the assessment may be a guess • Perhaps an informed one, but still a guess. • A major problem is that you have nothing upon which to base risk assumptions. • To balance this risk, add some structure to your risk assessment. • You don’t have to eliminate intuition and experience, just document your rationale for your risk-based decisions.
  • 18. 8 #8 - Failing to Incorporate Intuition • Many times I followed a hunch and found defects even when the risk assessment indicated a low risk of failure. • To address this risk, take a step back from any risk assessment and ask critical questions, such as: • “What looks odd about this?” • “What looks too good to be true?” • “What am I not seeing or hearing?”
  • 19. 9 #9 - Only Performing the Risk Assessment Once • Risk assessment is a snapshot taken at a given point in time. • The problem is that risks change throughout a project. • Ideally, there should be pre- defined risk assessment checkpoints throughout the project. • concept stage, requirements, design, code, test and deployment.
  • 20. 0 #10 - Failing to Report Risk Assessment Results Correctly and Timely • The longer a known risk remains unreported, the less time is available to address it. • The risk may increase or decrease over time. • Risk assessment results are like any other form of measurement and can be manipulated to suit the objectives of the presenter or the receiver. • Example: The situation where the presenter of the results is fearful of giving bad news for political or legal reasons.
  • 21. 1 #11 - Failing to Act on Assessment Results • Unless you take action on a risk, the risk assessment is little more than an exercise. • To address this risk, your testing process should specifically include the results from your risk assessment.
  • 22. 2 #12 - A Limited View of Risk • If you view the project from only one perspective (the “seasoned veteran user” perspective or the “novice” perspective), then you will only identify risks in that profile. • Remember to view risk from multiple perspectives to get an accurate assessment.
  • 23. 3 #13 – The “Cry Wolf” Effect • In this scenario, a risk is raised so many times without incident that people start to disregard it. • Then, when the risk actually manifests, people are unprepared.
  • 24. 4 Example: Adjusting Your Risk Assessment Methods Likelihood of Failure ImpactofFailure Low High High • ACB001 • ACB002 • ACB003 4 - Very High Risk 3 - High Risk 2 - Moderate Risk1 - Low Risk • ACB004 • ACB005
  • 25. 5 Example: Adjusting Your Risk Assessment Methods (2) Likelihood of Failure ImpactofFailure Low High High RCS 4 - Very High Risk Complete regression testing, 100% path coverage 3 - High Risk High level of regression testing, 100% path coverage 2 - Moderate Risk Partial regression testing, 100% branch coverage 1 - Low Risk Test changes plus the most critical cases, Moderate code coverage
  • 26. 6 The Safety Net • There is a word that is often used in conjunction with risk, that people sometimes omit - "contingency“ • a possibility that must be prepared for. • Contingencies are needed because we have a rich history of seeing how real life events may not match the risk assessment. • Think of a contingency as your "Plan B" in case the unexpected happens.
  • 27. 7 An Example From the Insurance Industry • Reserves are established to cover higher levels of loss than normal premiums would cover. • Minimal reserve levels are set by law. • An insurer may set higher levels if they need more assurance they can cover unexpected losses.
  • 28. 8 However, in the Software Industry… • There are no regulations about such reserves for projects. • To make matters worse, in software projects, people tend to be optimists that reserves won’t be needed. • “In fact,” some will say, “we will beat our estimates and finish the project early. That will get us bonuses for sure!”
  • 29. 9 What About “Padding” Estimates? • Some feel that the estimate should be carefully calculated as accurately as possible and that should be the actual working estimate. • Others feel that this approach is a recipe for disaster because there is no room for dealing with contingencies.
  • 30. 0 Reframing the Debate • Instead of “padding”, let’s call these "project reserves". • When used as intended, project reserves help us deal with the unexpected. • Problems arise, however, when people abuse reserves.
  • 31. Project reserves are vital for times when we are fooled by risk.
  • 32. 2 Plan “B” • Reserves are just time and money - they don't tell you what to do, but a contingency plan does. • Contingency plans can be created for just about any project activity.
  • 33. 3 Major Project Activities Deserve Priority Consideration • What if… • The requirements are inadequate? • The degree of requirements change is excessive? • High levels of defects are discovered during testing or reviews? • Severe problems are encountered during implementation?
  • 34. 4 A Risk Mitigation Strategy • Should address: • How risks will be addressed • Who will address the risks • When risks will be addressed • When risks will be reassessed
  • 35. A reasonable conclusion is that every risk assessment should also address project reserves and contingencies.
  • 36. 6 Summary • Hopefully, this doesn’t frighten you from applying risk-based testing. • Many times our biases form the basis of our perceptions. • This causes us to fail to recognize important risks, and in some cases, entire classes of risks.
  • 37. 7 Summary (2) • The key to dealing with risk is not to rely on just one aspect of the risk picture. • We must also balance risk with contingencies to have a safety net for any risk assessment approach.

Hinweis der Redaktion

  1. For many software developers and testers, our view of risk is often shaped by time and resources instead of the nature of the risks themselves. For example, the prospect of meeting an aggressive deadline (with its accompanying bonus) may cause us to take higher risks than we normally would.
  2. For many years, complexity has been considered to be a major contributor to software failure. The premise is that the more complex the code, the harder it is to understand and test completely. However, complex code doesn ’t always fail. On the other hand, I have seen simple code fail in spectacular ways. Like the small code change in a simple software module that implemented incorrect checking account service charges for over 100 banks. The code was simple, the change was simple, but the impact was huge.
  3. After all, if we knew the exact outcome of a future event, there would be no risk at all. We would know exactly which parts of an application would fail and what those failures would be (and we would fix them). Another way to say this is "Sometimes you don't know what you don't know." To address this risk, always remember that you don ’t know everything. Use the
  4. A typical example of this is when the deadline is quickly approaching and we re-prioritize our tests (based on risk, of course), but choose not to test certain aspects of the software because 1) we ’re feeling confident based on past tests (even though the software has been changed), and 2) time is short. Plus, if the software does fail, we’ll let the help desk and developers deal with it.
  5. Nothing falls into the "low" or "moderate" categories of risk. People may tend to favor the importance of their own areas and believe that if that fails, it will be the end of civilization as we know it. If everything is truly a “high” or “very high” risk, the leader of the risk assessment effort should make sure this information is documented in writing (status reports, test plans, etc.) and understood by the project leader and sponsor. In this case, other methods besides testing will be needed to provide a high-level of confidence in the software or system.
  6. It takes time and practice to get good at assessing risk. It ’s not wrong to try new methods or to invent ones on your own. Just realize that any risk assessment method can be flawed, or we can use it in an incorrect way. Always ask yourself if there are things that just don’t look right.
  7. If later you ever need to defend a risk-based decision, without a method you are left with little defense of how you arrived at the decision.
  8. Unfortunately, this is not something that can be easily taught, but must be learned over time. Experience forms the basis of a lot of what we consider intuition and we need to learn how to listen to the inner voice that tells us to consider things perhaps not indicated in a risk assessment.
  9. To get an accurate view of risk, assuming your method is reasonably sound, the assessment should be performed on a regular basis. In fact, the assessment should continue even after system deployment because risks are still present and still changing. The checkpoints shown on the slide are all good times to reassess risk. Some people find that even within each of these project activities multiple risk assessment snapshots may be needed.
  10. When risk assessment results are conveyed with missing, incorrect or ambiguous information, any conclusion based on them is at risk of being incorrect.
  11. For project risk assessments, it ’s helpful if the project manager takes responsibility for the risk assessment since they are often in the best position to take action on the findings.
  12. I blame senior management and customers for the root cause of this debate. The problem is that management and customers are notorious for taking any estimate and reducing it by X%. Some people believe that all estimates contain padding, therefore all estimates can (and must) be reduced to "more reasonable" levels.
  13. An example of this is when people steal time from reserves to compensate for poor project decisions. It's one thing to use a reserve for extra needed time because a supplier is late, but another thing to use the reserve because developers are creating highly defective software.
  14. Whether a beginner or a veteran practitioner, the more we understand about how we can be fooled by risk assessment, the better we can anticipate problems during the testing effort.