SlideShare una empresa de Scribd logo
1 de 24
Prepared by:
Hinal Lunagariya
Risk??
“A risk is a potential future harm that may arise from some present
action”
 Ex. A schedule slip or a cost overrun.
It involves uncertainty and loss.
 The loss is often considered in terms of direct financial loss, but
also can be a loss in terms of credibility, future business, and loss of
property or life.
“Risk in itself is not bad; risk is essential to progress, and failure is
often a key part of learning. But we must learn to balance the
possible negative consequences of risk against the potential benefits
of its associated opportunity.”- Van Scoy
Risk: Good or Bad??
Risk concerns future happenings (what risk might s/w project to go
awry?).
Risk involve changes, such as change of mind, opinion, actions or
places (how will changes in customer requirements, development
technologies, target environments and all other things affect
timeliness and overall success?).
Risk involves choices and the uncertainty that choice itself entails
(what methods and tools you use, how many people should be
involved ?).
Risk involves..
Reactive risk management:
Does nothing about risk until something goes wrong.
Fire-fighting mode.
When this fails, the project is in real jeopardy.
Proactive risk management
Begins long before technical work is initiated.
Potential risks are identified, their probability and impact are
assessed, and they are ranked by importance.
A plan for management is established.
The main concern is to avoid risk.
Risk Management Strategies
Project risk:
Threaten the project plan.
It identifies potential budgetary, schedule, personnel (staffing
and organisation), resource, stakeholder, and requirement
problems and their impact on a software project.
Also involves project complexity, size and the degree of
structural uncertainty.
Technical risk:
Threaten the quality and timeliness of project.
Identifies potential design, implementation, interface,
verification, and maintenance problem.
It occurs because the problem is harder to solve than yuo
thought it would be.ss
Categories of Risks..
Business risk:
Threaten by viability of the software to be built and often
jeopardise the project or the product.
Building excellent product that no one really wants.
That no long fits into overall business strategy for the
company.
That the sales force does not understand how to sell.
Losing the support of senior management due to a change
in focus or a change in people.
Losing budgetary or personnel commitment.
Known risk:
That can be uncovered after careful evaluation of he project
plan, the business and the technical environment and other
reliable information sources.
Categories of Risks..
Predictable risk:
Extrapolated from past project experiences.
Unpredictable risk:
They can and do occur, but extremely difficult to identify in
advance.
Categories of Risks..
Two interrelated phases,
risk assessment
Risk assessment involves risk identification, risk analysis,
and risk prioritization.
risk control
Risk control involves risk planning, risk mitigation, and
risk monitoring.
It is essential that risk management be done iteratively, throughout
the project, as a part of the team’s project management routine.
Risk management
Risk management
By identifying known and predictable risk, steps can be taken to avoid
them when possible and controlling them when necessary.
Generic risks : Potential threat to every software project.
Product-specific risks: can be only identified by those with clear
understanding of technology, the people, and the specific environment.
Risk Identification
Method to identify risks: creating risk item checklist.
Focuses on some subset of known and predictable risks..
Product size
Business impact
Stakeholder characteristics
Process definition
Development environment
Technology to be built
Staff size and experience
Question relevant to each of the topics can be answered for
each software project. This will help in estimating impact of
each risk.
If answers of any of the question is negatively, further steps
should be instituted without fail.
Risk Identification
Risk Identification
A list of risk components and drives are listed along with their
probability of occurrence.
Risk components and drivers:
Performance risk: the degree of uncertainty that the product will
meet its requirements and be fit for its intended use.
Cost risk: the degree of uncertainty that the product budget will be
maintained.
Support risk: that the resultant software will be easy to correct,
adapt and enhance.
Schedule risk: that the product schedule will be maintained and
product will be delivered on time.
Based on impact of risk driver, components can be divided into
four categories: negligible, marginal, critical, catastrophic.
Also called risk estimation.
It attempts to rate each risk in two ways:
1) probability that the risk is real
2) Consequences of the problems associated with them.
Risk Projection steps:
1) Establish a scale that reflects the perceived likelihood of a risk
2) Delineate the consequences of the risk
3) Estimate the impact of the risk on the project and the product.
4) Asses the overall accuracy of the risk projection so that there will
be no misunderstandings.
This helps in prioritization of risk and we can allocate resources
where they will have the most impact.
Risk Projection
Developing a risk table:
a. Risks: list of risks.
b. Category: project size/ business risk etc.
c. Probability is the likelihood of the risk occurring, using either a
numeric or categorical scale, as discussed in the last section.
d. Impact is the magnitude of the loss if the risk were to occur, using
either a numeric or a categorical scale.
The table is sorted according to high probability and high impact basis.
which gives us first order risk prioritization.
Cut-off line is defined for 2nd order prioritization.
Risk Projection
Risk Projection
Risks Category Probability Impact RMMM
Estimated size of project in LOC or FP PS 80% 2 **
Lack of needed specialization increases defects
and reworks
ST 50% 2 **
Unfamiliar areas of the product take more time
than expected to design and implement
DE 50% 2 **
Does the environment make use of a database DE 35% 3
Components developed separately cannot be
integrated easily, requiring redesign
DE 25% 3
Development of the wrong software functions
requires redesign and implementation
DE 25% 3
Development of extra software functions that
are not needed
DE 20% 3
Strict requirements for compatibility with
existing system require more testing, design, and
implementation than expected
DE 20% 3
Operation in unfamiliar software environment
causes unforeseen problems
EV 25% 4
Team members do not work well together ST 20% 4
Key personnel are available only part-time ST 20% 4
Risk Projection
Assessing risk impact
The factors that affect the consequences:
1. Nature of the risk: the problems that are likely if it occurs.
2. Scope of the risk: defines how serious it is?
3. Timing of the risk: when and for how long the impact will be felt.
Steps to determine consequences of a risk:
1. Determine the average probability of occurrence value for each risk
component.
2. Determine the impact for each component based on the criteria.
3. Complete the risk table and analyze the result.
Risk exposure(RE) = Probability(P) * Cost(C)
Risk avoidance strategy/plan.
Risk mitigation produces a situation in which the risk items are eliminated
or otherwise resolved
For ex. High turnover will have a critical impact on cost and schedule.
Steps to mitigate this risk:
Meet with current staff to determine causes for turnover
Mitigate those causes that are under your control before project starts.
Define work product standards and establish mechanisms to be sure
that all models and documents are developed in a timely manner.
Assign a backup staff member for every critical technologist.
Risk Mitigation
Project tracking activity with three primary objectives:
To assess whether predicted risk do occur
To ensure that risk aversion steps defined for the risk are being
properly applied.
To collect information that can be used for future risk analysis.
Risks need to be revisited at regular intervals for the team to re-evaluate
each risk to determine when new circumstances caused its probability and/or
impact to change.
 At each interval, some risks may be added to the list and others taken
away.
Risk Monitoring
Risk Management
Contingency planning
Actions to be taken in the event that mitigation steps have failed
and the risk has become a live problem
RMMM Plan
On-going and effective communication between management, the
development team, marketing, and customer representatives about project
risks is essential for effective risk management.
This communication enables the sharing of all information and is the
cornerstone of effective risk management.
Communicate
“If you know the enemy and know yourself, you need not fear the result of
a hundred battles.”
Risk Management
Risk Management

Más contenido relacionado

La actualidad más candente

Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk ManagementAchmad Solichin
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Navjyotsinh Jadeja
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk ManagementMinhas Kamal
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixEtQ, Inc.
 
Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk ManagementKelvin Fredson
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTContinuity and Resilience
 
software project management Artifact set(spm)
software project management Artifact set(spm)software project management Artifact set(spm)
software project management Artifact set(spm)REHMAT ULLAH
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learningVanita Ahuja
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Risk Analysis and Management
Risk Analysis and ManagementRisk Analysis and Management
Risk Analysis and ManagementGenie
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 

La actualidad más candente (20)

Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk Management
 
Risk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk MatrixRisk Assessment: Creating a Risk Matrix
Risk Assessment: Creating a Risk Matrix
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
Project  Risk ManagementProject  Risk Management
Project Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
 
software project management Artifact set(spm)
software project management Artifact set(spm)software project management Artifact set(spm)
software project management Artifact set(spm)
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learning
 
SPM Evaluation
SPM EvaluationSPM Evaluation
SPM Evaluation
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management in Project Management
Risk Management in Project ManagementRisk Management in Project Management
Risk Management in Project Management
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Risk Analysis and Management
Risk Analysis and ManagementRisk Analysis and Management
Risk Analysis and Management
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 

Similar a Risk Management

Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxRanjitKdk
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdfNmnKmr2
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfWilliamTom9
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptDorraLamouchi1
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptavisha23
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptAyidAlmgati
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptBetshaTizazu2
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptxKamranKhan353531
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering MuhammadTalha436
 
Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Managementabhinayverma
 
NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5Future Managers
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoMatthewTennant613
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfPriyanshTan
 

Similar a Risk Management (20)

Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
 
Project mngmnt risks3.2
Project mngmnt risks3.2Project mngmnt risks3.2
Project mngmnt risks3.2
 
Risk guideline
Risk guidelineRisk guideline
Risk guideline
 
Beyond PMP: Risk Management
Beyond PMP: Risk ManagementBeyond PMP: Risk Management
Beyond PMP: Risk Management
 
NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5NCV 4 Project Management Hands-On Support Slide Show - Module5
NCV 4 Project Management Hands-On Support Slide Show - Module5
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Risk Management

  • 2. Risk?? “A risk is a potential future harm that may arise from some present action”  Ex. A schedule slip or a cost overrun. It involves uncertainty and loss.  The loss is often considered in terms of direct financial loss, but also can be a loss in terms of credibility, future business, and loss of property or life.
  • 3. “Risk in itself is not bad; risk is essential to progress, and failure is often a key part of learning. But we must learn to balance the possible negative consequences of risk against the potential benefits of its associated opportunity.”- Van Scoy Risk: Good or Bad??
  • 4. Risk concerns future happenings (what risk might s/w project to go awry?). Risk involve changes, such as change of mind, opinion, actions or places (how will changes in customer requirements, development technologies, target environments and all other things affect timeliness and overall success?). Risk involves choices and the uncertainty that choice itself entails (what methods and tools you use, how many people should be involved ?). Risk involves..
  • 5. Reactive risk management: Does nothing about risk until something goes wrong. Fire-fighting mode. When this fails, the project is in real jeopardy. Proactive risk management Begins long before technical work is initiated. Potential risks are identified, their probability and impact are assessed, and they are ranked by importance. A plan for management is established. The main concern is to avoid risk. Risk Management Strategies
  • 6. Project risk: Threaten the project plan. It identifies potential budgetary, schedule, personnel (staffing and organisation), resource, stakeholder, and requirement problems and their impact on a software project. Also involves project complexity, size and the degree of structural uncertainty. Technical risk: Threaten the quality and timeliness of project. Identifies potential design, implementation, interface, verification, and maintenance problem. It occurs because the problem is harder to solve than yuo thought it would be.ss Categories of Risks..
  • 7. Business risk: Threaten by viability of the software to be built and often jeopardise the project or the product. Building excellent product that no one really wants. That no long fits into overall business strategy for the company. That the sales force does not understand how to sell. Losing the support of senior management due to a change in focus or a change in people. Losing budgetary or personnel commitment. Known risk: That can be uncovered after careful evaluation of he project plan, the business and the technical environment and other reliable information sources. Categories of Risks..
  • 8. Predictable risk: Extrapolated from past project experiences. Unpredictable risk: They can and do occur, but extremely difficult to identify in advance. Categories of Risks..
  • 9. Two interrelated phases, risk assessment Risk assessment involves risk identification, risk analysis, and risk prioritization. risk control Risk control involves risk planning, risk mitigation, and risk monitoring. It is essential that risk management be done iteratively, throughout the project, as a part of the team’s project management routine. Risk management
  • 11. By identifying known and predictable risk, steps can be taken to avoid them when possible and controlling them when necessary. Generic risks : Potential threat to every software project. Product-specific risks: can be only identified by those with clear understanding of technology, the people, and the specific environment. Risk Identification
  • 12. Method to identify risks: creating risk item checklist. Focuses on some subset of known and predictable risks.. Product size Business impact Stakeholder characteristics Process definition Development environment Technology to be built Staff size and experience Question relevant to each of the topics can be answered for each software project. This will help in estimating impact of each risk. If answers of any of the question is negatively, further steps should be instituted without fail. Risk Identification
  • 13. Risk Identification A list of risk components and drives are listed along with their probability of occurrence. Risk components and drivers: Performance risk: the degree of uncertainty that the product will meet its requirements and be fit for its intended use. Cost risk: the degree of uncertainty that the product budget will be maintained. Support risk: that the resultant software will be easy to correct, adapt and enhance. Schedule risk: that the product schedule will be maintained and product will be delivered on time. Based on impact of risk driver, components can be divided into four categories: negligible, marginal, critical, catastrophic.
  • 14. Also called risk estimation. It attempts to rate each risk in two ways: 1) probability that the risk is real 2) Consequences of the problems associated with them. Risk Projection steps: 1) Establish a scale that reflects the perceived likelihood of a risk 2) Delineate the consequences of the risk 3) Estimate the impact of the risk on the project and the product. 4) Asses the overall accuracy of the risk projection so that there will be no misunderstandings. This helps in prioritization of risk and we can allocate resources where they will have the most impact. Risk Projection
  • 15. Developing a risk table: a. Risks: list of risks. b. Category: project size/ business risk etc. c. Probability is the likelihood of the risk occurring, using either a numeric or categorical scale, as discussed in the last section. d. Impact is the magnitude of the loss if the risk were to occur, using either a numeric or a categorical scale. The table is sorted according to high probability and high impact basis. which gives us first order risk prioritization. Cut-off line is defined for 2nd order prioritization. Risk Projection
  • 16. Risk Projection Risks Category Probability Impact RMMM Estimated size of project in LOC or FP PS 80% 2 ** Lack of needed specialization increases defects and reworks ST 50% 2 ** Unfamiliar areas of the product take more time than expected to design and implement DE 50% 2 ** Does the environment make use of a database DE 35% 3 Components developed separately cannot be integrated easily, requiring redesign DE 25% 3 Development of the wrong software functions requires redesign and implementation DE 25% 3 Development of extra software functions that are not needed DE 20% 3 Strict requirements for compatibility with existing system require more testing, design, and implementation than expected DE 20% 3 Operation in unfamiliar software environment causes unforeseen problems EV 25% 4 Team members do not work well together ST 20% 4 Key personnel are available only part-time ST 20% 4
  • 17. Risk Projection Assessing risk impact The factors that affect the consequences: 1. Nature of the risk: the problems that are likely if it occurs. 2. Scope of the risk: defines how serious it is? 3. Timing of the risk: when and for how long the impact will be felt. Steps to determine consequences of a risk: 1. Determine the average probability of occurrence value for each risk component. 2. Determine the impact for each component based on the criteria. 3. Complete the risk table and analyze the result. Risk exposure(RE) = Probability(P) * Cost(C)
  • 18. Risk avoidance strategy/plan. Risk mitigation produces a situation in which the risk items are eliminated or otherwise resolved For ex. High turnover will have a critical impact on cost and schedule. Steps to mitigate this risk: Meet with current staff to determine causes for turnover Mitigate those causes that are under your control before project starts. Define work product standards and establish mechanisms to be sure that all models and documents are developed in a timely manner. Assign a backup staff member for every critical technologist. Risk Mitigation
  • 19. Project tracking activity with three primary objectives: To assess whether predicted risk do occur To ensure that risk aversion steps defined for the risk are being properly applied. To collect information that can be used for future risk analysis. Risks need to be revisited at regular intervals for the team to re-evaluate each risk to determine when new circumstances caused its probability and/or impact to change.  At each interval, some risks may be added to the list and others taken away. Risk Monitoring
  • 20. Risk Management Contingency planning Actions to be taken in the event that mitigation steps have failed and the risk has become a live problem RMMM Plan
  • 21. On-going and effective communication between management, the development team, marketing, and customer representatives about project risks is essential for effective risk management. This communication enables the sharing of all information and is the cornerstone of effective risk management. Communicate
  • 22. “If you know the enemy and know yourself, you need not fear the result of a hundred battles.”