尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
PRESENTATION
ON
BASICS OF RISK
MANAGEMENT
Presenter
Kumar Bishwakarma
Roll No.:- CMP/076/212
Outline:
Basic of Risk Management
Reactive and Proactive Risk Handling Strategies
Software Risks
Risk Identification
Risk Projection and Risk Table
Risk Assessment
Risk Refinement
RMMM and RMMM Plan
What is risk?
Tomorrow problems are today's risk
 potential problem that may or may not occur in the future
It is the uncertainty, a irrelevant future occurrence or happening
Effects of risks:
 Project diversion from its actual performance
Unable to meet proper time-lines and thus overall success is affected.
Quality degradation
Thus, the overall process of identifying its impact and making plans in advance
is called the risk analysis and management.
Reactive and Proactive Risk Handling Strategies
a)Reactive Risk
concerned with the process of finding solutions once the problem exists, the software team does
nothing about risk until something goes wrong.
The software engineer or team never worry about the problems until they happen, This is often
called a fire-fighting mode
b) Proactive Risk Strategy
In proactive software engineer starts thinking about possible risks in a project before they occur
in the sotfware
begins long before technical work is initiated where potential risks are identified, their probability
and impact are assessed, and they are ranked by importance
the primary objective is to avoid risk, but all risks cannot be avoided, so exercise to make them
minimal.
Software Risks
• Risk concerns the future happening that always involves two characteristics:
• (a) uncertainty—the risk may or may not happen; that is, and
• (b) loss—if the risk becomes a reality, unwanted losses will occur.
different categories of risks are considered as
1) Project risk:- threaten the project plan.
• Project risks identify potential budgetary, schedule, personnel (staffing and
organization), resource, stakeholder, and requirements problems and their
impact on a software project.
2) Technical risks:- threaten the quality and timeliness
• Technical risks identify potential design, implementation, interface,
verification, and maintenance
• problems. In addition, specification ambiguity, technical uncertainty,
technical obsolescence, and
• “leading-edge” technology are also risk factors.
• Technical risks occur because the problem is harder to solve than
expected.
3) Business risks:- threaten the feasibility
It includes the top five business risks which are
i. Market risk: system that no one really wants
ii. Strategic risk: product no longer fits into the overall business
strategy
iii. Sales risk: the sales force doesn’t understand how to sell the
product
iv. Management risk: losing the support of senior management
v. Budget risks: losing budgetary or personnel commitment
4) Known risks
• Risk that can be uncovered after careful evaluation of the project
plan, the business and technical
• environment in which the project is being developed, and other
reliable information sources (e.g., unrealistic delivery date, lack of
documented requirements or software scope, poor development
environment).
5) Predictable risks
• These risks are identified from past project experience (e.g., staff
turnover, poor communication
• with the customer, dilution of staff effort as ongoing maintenance
requests are serviced).
6) Unpredictable risks
• They can and do occur, but they are extremely difficult to identify in
advance
Risk Identification
• Risk identification is a systematic attempt to specify threats to the
project plan (estimates, schedule, resource loading, etc.).
• Risks can be removed or avoided only if they can be identified.
• By identifying known and predictable risks, the project manager takes
a first step toward avoiding them when possible and controlling them
when necessary.
• The different categories of risk (project, technical, business, known,
predictable, and unpredictable) can be further divided as:
i. Generic:-. They are a potential threat to every software project.
ii. Product- Specified-Risk:-that are associated only to certain
products.
Risk Identification
One method for identifying risks is to create a risk item checklist; we need to identify
the following area from where risk will appear:
1. Product size—risks associated with the overall size of the software to be built or
modified.
2. Business impact—risks associated with constraints imposed by management or the
marketplace.
3. Stakeholder characteristics—risks associated with the sophistication of the
stakeholders and the developer’s ability to communicate with stakeholders in a timely
manner.
4. Process definition—risks associated with the degree to which the software process
has been defined and is followed by the development organization.
5. Development environment—risks associated with the availability and quality of the
tools to be used to build the product.
6. Technology to be built—risks associated with the complexity of the
system to be built and the “newness” of the technology that is
packaged by the system.
7. Staff size and experience—risks associated with the overall technical
and project experience of the software engineers who will do the work.
Risk Projection and Risk Table
• Risk Projection (aka Risk Estimation) is the process of rating the risk based
upon its likelihood or probability of occurrence and the consequence of the
problem associated with the risk.
• It is carried out by the project planner along with other managers and
technical staffs.
• During risk estimation, the first step is the prioritizing risks and hence we can
allocate resources where they will have the most impact.
• The process of categorization of various possible risks that may appears in in
project is called risk assessment.
• The analysis of nature, scope and time are main component of risk
assessment
This process involves different activities like:
• Establishing a scale for the likelihood of a risk.
• Determining a scale for the likelihood (probability) of a risk.
• Determining and listing out the consequences of the risk.
Risk Table
• A risk table provides a simple technique for risk projection. The risk
table can be implemented as a spreadsheet model.
• This enables easy manipulation and sorting of the entries.
• Here, at first all risks are listed in the first column of the table. This
can be accomplished with the help of the risk item checklists
reference.
• Each risk is categorized in the second column.
• The probability of occurrence of each risk is entered in the next
column of the table. The probability value for each risk can be
estimated by team members individually.
Risk Table
Risk Refinement
• During early stages of project planning, a risk may be stated quite generally. But as time passes,
we become more familiar learn about the project and risk. It might be possible to refine the risk
into a set of more detailed risks, each somewhat easier to mitigate, monitor and manage.
• One way to do this is to represent the risk in condition-transition-consequence (CTC) format.
That is, the risk is stated in the following form:
• Given that <condition> then there is concern that (possibly) <consequence>.
For example:
• Sub-condition 1. Certain reusable components were developed by a third party with no
knowledge of internal design standards.
• Sub-condition 2. The design standard for component interfaces has not been solidified and may
not conform to certain existing reusable components.
• Sub-condition 3. Certain reusable components have been implemented in a language that is not
supported on the target environment.
RMMM
1. Risk Mitigation (Risk Avoidance)
• It is an activity used to avoid problems (Risk Avoidance).
Steps for mitigating the risks as follows.
• Finding out the risk.
• Removing causes that are the reason for risk creation.
• Controlling the corresponding documents from time to time.
• Conducting timely reviews to speed up the work.
Risk Monitoring :
• It is an activity used for project tracking.
It has the following primary objectives as follows:
• To check if predicted risks occur or not.
• To ensure proper application of risk aversion steps defined for risk.
• To collect data for future risk analysis.
• To allocate what problems are caused by which risks throughout the
project.
Risk Management
• The risk management process can
be broken down into two
interrelated phases, risk assessment
and risk control.
• These phases are further broken
down. Risk assessment involves risk
identification, risk analysis, and risk
prioritization. Risk control involves
risk planning, risk mitigation, and
risk monitoring.
The RMMM plan
• The RMMM plan is a
document in which all the risk
analysis activities are
described.
• In most cases, the risk
information sheet (RIS) is
maintained using a database
system so that creation and
information entry, priority
ordering, searches, and other
analysis may be accomplished
easily.
• Once RMMM has been
documented and the project
has begun, risk mitigation and
monitoring steps commence.
THE END

More Related Content

Similar to OOSE-PRESENTATION.pptx

Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
ShrejalKesharwani
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
zeeshanwrch
 
risk management
risk managementrisk management
risk management
Arti Maggo
 
RMMM
RMMMRMMM
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
Shashi Kumar
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
vishnupriyapm4
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
Priya Tomar
 
Risk management
Risk managementRisk management
Risk management
Naveen Menon
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
TharuniDiddekunta
 
Risk-management
 Risk-management Risk-management
Risk-management
Umesh Gupta
 
lec6.ppt
lec6.pptlec6.ppt
lec6.ppt
NanoSana
 
Risk Management
Risk ManagementRisk Management
Risk Management
Saqib Raza
 
PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdf
MUST
 
Risk management
Risk managementRisk management
Risk management
Usman Mukhtar
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 
Project Management C7 -risk_management
Project Management C7  -risk_managementProject Management C7  -risk_management
Project Management C7 -risk_management
Izah Asmadi
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
PriyanshTan
 
It project risk management
It project risk managementIt project risk management
It project risk management
ssuserab06ad1
 
Software Project Risks Management (1).pdf
Software Project Risks Management (1).pdfSoftware Project Risks Management (1).pdf
Software Project Risks Management (1).pdf
ShivareddyGangam
 
Unit 7
Unit 7Unit 7
Unit 7
anuragmbst
 

Similar to OOSE-PRESENTATION.pptx (20)

Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
risk management
risk managementrisk management
risk management
 
RMMM
RMMMRMMM
RMMM
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Risk management
Risk managementRisk management
Risk management
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
 
Risk-management
 Risk-management Risk-management
Risk-management
 
lec6.ppt
lec6.pptlec6.ppt
lec6.ppt
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
PROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdfPROJECT RISK MANAGEMENT.pdf
PROJECT RISK MANAGEMENT.pdf
 
Risk management
Risk managementRisk management
Risk management
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Project Management C7 -risk_management
Project Management C7  -risk_managementProject Management C7  -risk_management
Project Management C7 -risk_management
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
It project risk management
It project risk managementIt project risk management
It project risk management
 
Software Project Risks Management (1).pdf
Software Project Risks Management (1).pdfSoftware Project Risks Management (1).pdf
Software Project Risks Management (1).pdf
 
Unit 7
Unit 7Unit 7
Unit 7
 

Recently uploaded

Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
sexytaniya455
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
shourabjaat424
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
sonamrawat5631
 
Data Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdfData Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdf
Kamal Acharya
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
dABGO KI CITy kUSHINAGAR Ak47
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
DebendraDevKhanal1
 
Basic principle and types Static Relays ppt
Basic principle and  types  Static Relays pptBasic principle and  types  Static Relays ppt
Basic principle and types Static Relays ppt
Sri Ramakrishna Institute of Technology
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
Kamal Acharya
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Banerescorts
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
nainakaoornoida
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 

Recently uploaded (20)

Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
Call Girls Chandigarh 🔥 7014168258 🔥 Real Fun With Sexual Girl Available 24/7...
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
 
Data Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdfData Communication and Computer Networks Management System Project Report.pdf
Data Communication and Computer Networks Management System Project Report.pdf
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
 
Basic principle and types Static Relays ppt
Basic principle and  types  Static Relays pptBasic principle and  types  Static Relays ppt
Basic principle and types Static Relays ppt
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
❣Independent Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai E...
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 

OOSE-PRESENTATION.pptx

  • 2. Outline: Basic of Risk Management Reactive and Proactive Risk Handling Strategies Software Risks Risk Identification Risk Projection and Risk Table Risk Assessment Risk Refinement RMMM and RMMM Plan
  • 3. What is risk? Tomorrow problems are today's risk  potential problem that may or may not occur in the future It is the uncertainty, a irrelevant future occurrence or happening Effects of risks:  Project diversion from its actual performance Unable to meet proper time-lines and thus overall success is affected. Quality degradation Thus, the overall process of identifying its impact and making plans in advance is called the risk analysis and management.
  • 4. Reactive and Proactive Risk Handling Strategies a)Reactive Risk concerned with the process of finding solutions once the problem exists, the software team does nothing about risk until something goes wrong. The software engineer or team never worry about the problems until they happen, This is often called a fire-fighting mode b) Proactive Risk Strategy In proactive software engineer starts thinking about possible risks in a project before they occur in the sotfware begins long before technical work is initiated where potential risks are identified, their probability and impact are assessed, and they are ranked by importance the primary objective is to avoid risk, but all risks cannot be avoided, so exercise to make them minimal.
  • 5. Software Risks • Risk concerns the future happening that always involves two characteristics: • (a) uncertainty—the risk may or may not happen; that is, and • (b) loss—if the risk becomes a reality, unwanted losses will occur. different categories of risks are considered as 1) Project risk:- threaten the project plan. • Project risks identify potential budgetary, schedule, personnel (staffing and organization), resource, stakeholder, and requirements problems and their impact on a software project.
  • 6. 2) Technical risks:- threaten the quality and timeliness • Technical risks identify potential design, implementation, interface, verification, and maintenance • problems. In addition, specification ambiguity, technical uncertainty, technical obsolescence, and • “leading-edge” technology are also risk factors. • Technical risks occur because the problem is harder to solve than expected.
  • 7. 3) Business risks:- threaten the feasibility It includes the top five business risks which are i. Market risk: system that no one really wants ii. Strategic risk: product no longer fits into the overall business strategy iii. Sales risk: the sales force doesn’t understand how to sell the product iv. Management risk: losing the support of senior management v. Budget risks: losing budgetary or personnel commitment
  • 8. 4) Known risks • Risk that can be uncovered after careful evaluation of the project plan, the business and technical • environment in which the project is being developed, and other reliable information sources (e.g., unrealistic delivery date, lack of documented requirements or software scope, poor development environment).
  • 9. 5) Predictable risks • These risks are identified from past project experience (e.g., staff turnover, poor communication • with the customer, dilution of staff effort as ongoing maintenance requests are serviced). 6) Unpredictable risks • They can and do occur, but they are extremely difficult to identify in advance
  • 10. Risk Identification • Risk identification is a systematic attempt to specify threats to the project plan (estimates, schedule, resource loading, etc.). • Risks can be removed or avoided only if they can be identified. • By identifying known and predictable risks, the project manager takes a first step toward avoiding them when possible and controlling them when necessary. • The different categories of risk (project, technical, business, known, predictable, and unpredictable) can be further divided as: i. Generic:-. They are a potential threat to every software project. ii. Product- Specified-Risk:-that are associated only to certain products.
  • 11. Risk Identification One method for identifying risks is to create a risk item checklist; we need to identify the following area from where risk will appear: 1. Product size—risks associated with the overall size of the software to be built or modified. 2. Business impact—risks associated with constraints imposed by management or the marketplace. 3. Stakeholder characteristics—risks associated with the sophistication of the stakeholders and the developer’s ability to communicate with stakeholders in a timely manner. 4. Process definition—risks associated with the degree to which the software process has been defined and is followed by the development organization. 5. Development environment—risks associated with the availability and quality of the tools to be used to build the product.
  • 12. 6. Technology to be built—risks associated with the complexity of the system to be built and the “newness” of the technology that is packaged by the system. 7. Staff size and experience—risks associated with the overall technical and project experience of the software engineers who will do the work.
  • 13. Risk Projection and Risk Table • Risk Projection (aka Risk Estimation) is the process of rating the risk based upon its likelihood or probability of occurrence and the consequence of the problem associated with the risk. • It is carried out by the project planner along with other managers and technical staffs. • During risk estimation, the first step is the prioritizing risks and hence we can allocate resources where they will have the most impact. • The process of categorization of various possible risks that may appears in in project is called risk assessment. • The analysis of nature, scope and time are main component of risk assessment
  • 14. This process involves different activities like: • Establishing a scale for the likelihood of a risk. • Determining a scale for the likelihood (probability) of a risk. • Determining and listing out the consequences of the risk.
  • 15. Risk Table • A risk table provides a simple technique for risk projection. The risk table can be implemented as a spreadsheet model. • This enables easy manipulation and sorting of the entries. • Here, at first all risks are listed in the first column of the table. This can be accomplished with the help of the risk item checklists reference. • Each risk is categorized in the second column. • The probability of occurrence of each risk is entered in the next column of the table. The probability value for each risk can be estimated by team members individually.
  • 17. Risk Refinement • During early stages of project planning, a risk may be stated quite generally. But as time passes, we become more familiar learn about the project and risk. It might be possible to refine the risk into a set of more detailed risks, each somewhat easier to mitigate, monitor and manage. • One way to do this is to represent the risk in condition-transition-consequence (CTC) format. That is, the risk is stated in the following form: • Given that <condition> then there is concern that (possibly) <consequence>. For example: • Sub-condition 1. Certain reusable components were developed by a third party with no knowledge of internal design standards. • Sub-condition 2. The design standard for component interfaces has not been solidified and may not conform to certain existing reusable components. • Sub-condition 3. Certain reusable components have been implemented in a language that is not supported on the target environment.
  • 18. RMMM 1. Risk Mitigation (Risk Avoidance) • It is an activity used to avoid problems (Risk Avoidance). Steps for mitigating the risks as follows. • Finding out the risk. • Removing causes that are the reason for risk creation. • Controlling the corresponding documents from time to time. • Conducting timely reviews to speed up the work.
  • 19. Risk Monitoring : • It is an activity used for project tracking. It has the following primary objectives as follows: • To check if predicted risks occur or not. • To ensure proper application of risk aversion steps defined for risk. • To collect data for future risk analysis. • To allocate what problems are caused by which risks throughout the project.
  • 20. Risk Management • The risk management process can be broken down into two interrelated phases, risk assessment and risk control. • These phases are further broken down. Risk assessment involves risk identification, risk analysis, and risk prioritization. Risk control involves risk planning, risk mitigation, and risk monitoring.
  • 21. The RMMM plan • The RMMM plan is a document in which all the risk analysis activities are described. • In most cases, the risk information sheet (RIS) is maintained using a database system so that creation and information entry, priority ordering, searches, and other analysis may be accomplished easily. • Once RMMM has been documented and the project has begun, risk mitigation and monitoring steps commence.
  翻译: