Project Scheduling
Project Scheduling
SOFTWARE RISKS
Uncertainty—the risk may or may not happen; that is, there are no 100%
probable risks
Must quantify:
Level of uncertainty
Technical risks threaten the quality and timeliness of the software to be produced
Technical risks occur because the problem is harder to solve than we thought
it would be.
(1) building an excellent product or system that no one really wants (market risk)
(2) building a product that no longer fits into the overall business strategy for the
company (strategic risk)
(3) building a product that the sales force doesn't understand how to sell
(4) losing the support of senior management due to a change in focus or a change
in people (management risk)
Project plan
E.g.,
· staff turnover
RISK IDENTIFICATION
§ Identify by looking at the project plan and the software statement of scope
Risk item checklist
Staff size and experience—risks associated with the overall technical and
project experience of the software engineers who will do the work.
Risk Components and Drivers
The project manager identify the risk drivers that affect software risk components
—performance, cost, support, and schedule.
· Risk components:
(1) Performance risk—the degree of uncertainty that the product will meet its
requirements and be fit for its intended use.
(2) Cost risk—the degree of uncertainty that the project budget will be maintained.
(3) Support risk—the degree of uncertainty that the resultant software will be easy
to correct, adapt, and enhance.
(4) Schedule risk—the degree of uncertainty that the project schedule will be
maintained and that the product will be delivered on time.
· Impact of each risk driver on the risk component is divided into one of four
impact categories—negligible, marginal, critical, or catastrophic
· The consequences of the problems associated with the risk, should it occur.
Project planner, along with other managers and technical staff, performs four risk
projection activities:
(4) note the overall accuracy of the risk projection so that there will be no
misunderstandings.
Risk table provides a project manager with a simple technique for risk projection
(1) Project team begins by listing all risks in the first column of the table.
The probability value for each risk can be estimated by team members
individually.
(1) Each risk component is assessed using the Risk Charcterization Table (Figure
1) and impact category is determined.
(2) Categories for each of the four risk components—performance, support, cost,
and schedule—are averaged to determine an overall impact value.
3. A weighted average can be used if one risk component has more significance
for the project.
(3) Once the first four columns of the risk table have been completed, the table is
sorted by probability and by impact.
· High-probability, high-impact risks percolate to the top of the table, and low-
probability risks drop to the bottom.
(4) Project manager studies the resultant sorted table and defines a cutoff line.
· cutoff line (drawn horizontally at some point in the table) implies that only
risks that lie above the line will be given further attention.
· All risks that lie above the cutoff line must be managed.
O Scope of a risk - combines the severity with its overall distribution (how much
of the project will be affected or how many customers are harmed?).
O Timing of a risk - when and how long the impact will be felt.
2. Using Figure 1, determine the impact for each component based on the
criteria shown.
3. Complete the risk table and analyze the results as described in the preceding
sections.
Example
Assume the software team defines a project risk in the following manner:
Risk identification.
Risk impact.
· Since the average component is 100 LOC and local data indicate that the
software engineering cost for each LOC is $14.00, the overall cost (impact) to
develop the components would be 18 x 100 x 14 = $25,200.
Risk exposure. RE = 0.80 x 25,200 ~ $20,200.
[ Risk Identification:
The software team identifies that only 70 percent of the scheduled software
components for reuse will be integrated into the application.
Risk Probability:
Risk Impact:
If only 70% can be used, this means 30% (100% - 70%) of the components need to
be developed from scratch.
It's given that the average component size is 100 lines of code (LOC).
Risk Exposure:
The risk exposure is calculated by multiplying the risk probability by the estimated
cost impact.
Risk Exposure (RE) = Risk Probability x Impact = 0.80 (80%) x $25,200 =
$20,160 (rounded to the nearest hundred).
Risk Assessment
Where
Ri is risk
O further examine the accuracy of the estimates that were made during risk
projection
O begins thinking about ways to control and/or avert risks that are likely to
occur.
O A risk referent level has a single point, called the referent point or break
point, at which the decision to proceed with the project or terminate it are equally
weighted.
2. Attempt to develop a relationship between each (ri, li, xi) and each of the
referent levels.
3. Predict the set of referent points that define a region of termination, bounded
by a curve or areas of uncertainty.
RISK REFINEMENT
· With time, more is learned about the project and the risk
O may be possible to refine the risk into a set of more detailed risks
Risk avoidance
Risk monitoring
O So… high turnover will have a critical impact on project cost and schedule.
o Meet with current staff to determine causes for turnover (e.g., poor working
conditions, low pay, competitive job market).
o Mitigate those causes that are under our control before the project starts.
o Once the project commences, assume turnover will occur and develop
techniques to ensure continuity when people leave.
o Conduct peer reviews of all work (so that more than one person is "up to
speed").
E.g., the project is underway and a number of people announce that they will be
leaving.
§ backup is available
§ information is documented
· Work performed during earlier risk analysis steps will help the planner to
determine which of the risks that lead to the highest risk exposure).
RIS is maintained using a database system, so that creation and information entry,
priority ordering, searches, and other analysis may be accomplished easily.
Problems that occur during a project can be traced to more than one risk.