Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Assessment and control of software risksJanuary 1994
  • Author:
  • Capers Jones
Publisher:
  • Yourdon Press
  • Imprint of Simon and Schuster One Lake St. Upper Saddle River, NJ
  • United States
ISBN:978-0-13-741406-2
Published:02 January 1994
Pages:
619
Skip Bibliometrics Section
Reflects downloads up to 30 Aug 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Glass R and Land F (2019). Errors in Computing History, ACM SIGSOFT Software Engineering Notes, 43:4, (7-8), Online publication date: 28-Dec-2018.
  2. Ali A, Warren D and Mathiassen L (2017). Cloud-based business services innovation, International Journal of Information Management: The Journal for Information Professionals, 37:6, (639-649), Online publication date: 1-Dec-2017.
  3. Halstead S, Ortiz R, Córdova M and Seguí M The impact of lack in domain or technology experience on the accuracy of expert effort estimates in software projects Proceedings of the 13th international conference on Product-Focused Software Process Improvement, (248-259)
  4. ACM
    Basu V and Lederer A (2011). Agency theory and consultant management in enterprise resource planning systems implementation, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 42:3, (10-33), Online publication date: 27-Sep-2011.
  5. ACM
    Jeet K, Bhatia N and Minhas R (2011). A model for estimating the impact of low productivity on the schedule of a software development project, ACM SIGSOFT Software Engineering Notes, 36:4, (1-6), Online publication date: 4-Aug-2011.
  6. Fernández-Sanz L and Misra S Influence of human factors in software quality and productivity Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V, (257-269)
  7. ACM
    Rost J and Glass R (2009). The impact of subversive stakeholders on software projects, Communications of the ACM, 52:7, (135-138), Online publication date: 1-Jul-2009.
  8. Kino Y, Tsuda K and Tsukahara T Extraction of the Project Risk Knowledge on the Basis of a Project Plan Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II, (1018-1025)
  9. Costa H, Barros M and Travassos G (2007). Evaluating software project portfolio risks, Journal of Systems and Software, 80:1, (16-31), Online publication date: 1-Jan-2007.
  10. Börjesson A Simple indicators for tracking software process improvement progress Proceedings of the 13th European conference on Software Process Improvement, (74-87)
  11. ACM
    Verner J, Cox K and Bleistein S Predicting good requirements for in-house development projects Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering, (154-163)
  12. Stiller E and LeBlanc C (2006). Teaching software development by example, Journal of Computing Sciences in Colleges, 21:6, (228-237), Online publication date: 1-Jun-2006.
  13. Maranzano J, Rozsypal S, Zimmerman G, Warnken G, Wirth P and Weiss D (2005). Architecture Reviews, IEEE Software, 22:2, (34-43), Online publication date: 1-Mar-2005.
  14. Kussmaul C (2005). Using agile development methods to improve student writing, Journal of Computing Sciences in Colleges, 20:3, (148-156), Online publication date: 1-Feb-2005.
  15. Wallace L, Keil M and Rai A (2004). Understanding software project risk, Information and Management, 42:1, (115-125), Online publication date: 1-Dec-2004.
  16. ACM
    Basu V and Lederer A An agency theory model of ERP implementation Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment, (8-13)
  17. ACM
    Shoemaker D, Jovanovic V and Drommi A A case for the study of software management within a broad information technology curriculum Proceedings of the 4th conference on Information technology curriculum, (174-179)
  18. Dalcher D and Drevin L Learning from information systems failures by using narrative and ante-narrative methods Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (137-142)
  19. Kajko-Mattsson M Towards A Business Maintenance Model Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  20. Glassbrook A Evaluating the Predelivery Phase of ISO/IEC FDIS 14764 in the Swedish Context Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  21. Kajko-Mattsson M, Forssander S and Olsson U Corrective maintenance maturity model (CM3) Proceedings of the 23rd International Conference on Software Engineering, (610-619)
  22. El Emam K and Birk A (2000). Validating the ISO/IEC 15504 Measure of Software Requirements Analysis Process Capability, IEEE Transactions on Software Engineering, 26:6, (541-566), Online publication date: 1-Jun-2000.
  23. O'Callaghan A (2018). Focus issue on legacy infomation systems and business process engineering, Communications of the AIS, 2:1es, (3-es), Online publication date: 1-Jul-1999.
  24. ACM
    Keil M, Cule P, Lyytinen K and Schmidt R (1998). A framework for identifying software project risks, Communications of the ACM, 41:11, (76-83), Online publication date: 1-Nov-1998.
  25. ACM
    Glass R (1998). Controlling software diseases, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 29:3, (13-15), Online publication date: 1-Jun-1998.
  26. Charette R, Adams K and White M (2018). Managing Risk in Software Maintenance, IEEE Software, 14:3, (43-50), Online publication date: 1-May-1997.
  27. Blackburn J, Scudder G and Van Wassenhove L (1996). Improving Speed and Productivity of Software Development, IEEE Transactions on Software Engineering, 22:12, (875-885), Online publication date: 1-Dec-1996.
  28. Wasserman A (2018). Toward a Discipline of Software Engineering, IEEE Software, 13:6, (23-31), Online publication date: 1-Nov-1996.
  29. Maxwell K, Van Wassenhove L and Dutta S (1996). Software Development Productivity of European Space, Military, and Industrial Applications, IEEE Transactions on Software Engineering, 22:10, (706-718), Online publication date: 1-Oct-1996.
  30. ACM
    Shoemaker D and Jovanovic V (1996). Educating software executives, ACM SIGSOFT Software Engineering Notes, 21:2, (45-46), Online publication date: 1-Mar-1996.
  31. Brady S and DeMarco T (2018). Management-Aided Software Engineering, IEEE Software, 11:6, (25-32), Online publication date: 1-Nov-1994.
  32. Jones C (2018). Globalization of Software Supply and Demand, IEEE Software, 11:6, (17-24), Online publication date: 1-Nov-1994.
Contributors

Reviews

Christopher Fox

This book is unusual in that it is consciously modeled on the medical text Control of communicable diseases in man [1], which lists and describes the causes, spread, and control of disease. Jones hopes that a book about the detection, control, and prevention of problems that afflict software processes can play as useful a role for the software engineer as its analog does for the medical practitioner. The goal of the book is to identify the most serious software process problems, explain how to recognize and control them, and tell the reader how to prevent them from recurring. The book's format is clearly based on its medical exemplar. The preface and the first 3 chapters are introductory, and the following 60 chapters consider common software process problems, one per chapter alphabetically, just as Control of communicable diseases in man treats diseases. The preface lays out the analogy between disease and software process problems, and explains how the book is modeled on Control of communicable diseases in man . Chapter 1 focuses on diagnosis, emphasizing that treatment must follow accurate diagnosis, and diagnosis of software process problems is done by process assessment. Chapter 2 discusses the most common software project risks. Jones divides projects into six classes: management information systems projects, systems software projects, commercially marketed software projects, military software projects, contract or outsourced software projects, and end-user software projects. Jones illustrates the patterns of risks in each project category by discussing the top five risk factors in each. Surprisingly, almost a third of the most common risk factors in these categories do not appear among the 60 risks discussed in the remainder of the book, and others appear under different names. In the category of end-user software, none of the five most common risks appear later in the book. Some of these most common risks seem to have been ruled out of discussion because their “detailed analysis is not appropriate or possible” (p. 27). That so many of the most common software risks have been left out of the book for this or some other reason raises questions about the state of our ability to analyze software risks, and about the appropriateness of Jones's choice of risks to catalog in the remainder of the book. Chapter 3 discusses the ten most serious software risks, from most to least serious. Each risk is introduced, its overall severity is discussed, and the project typology introduced in chapter 2 is used to rank project types by the likelihood that they will suffer from each risk. All risks mentioned in this chapter are discussed further in the remainder of the book. Chapters 4 through 63 consider individual software risks, from “Ambiguous Improvement Targets” to “Slow Technology Transfer.” The risks that Jones addresses are treated exhaustively: the 60 chapters on individual risks discuss each under the following 20 headings: “Definition,” “Severity,” “Frequency,” “Occurrence,” “Susceptibility and Resistance,” “Root Causes,” “Associated Problems,” “Cost Impact,” “Methods of Prevention,” “Methods of Control,” “Product Support,” “Consulting Support,” “Education Support,” “Publication Support,” “Periodical Support,” “Standards Support,” “Professional Associations,” “Effectiveness of Known Therapies,” “Costs of Known Therapies,” and “Long-range Prognosis.” Clearly Jones was much influenced by his medical model in designing the format for these chapters. The final section of the book is an extensive and well-done glossary of software assessment and management terms. The book has no index and no cumulative bibliography. Chapters are thoroughly cross-referenced in the “Associated Problems” section of each chapter. The glossary and cross-references are helpful, but the book suffers badly from the lack of an index and a cumulative bibliography—the book is 619 pages long, but still lacks important material. The typography, printing, and binding are excellent. Jones assumes the reader has a considerable background in software engineering. Researchers and professionals will want to read the preface and first three chapters, and dip into the remainder of the book as need or curiosity arises (the chapters on management and technical malpractice are likely to interest many readers). The book would not be suitable as a primary textbook, but could be useful as a secondary reference for advanced students in software engineering. Although it breaks no new ground, software engineering researchers and professionals will want to have a copy of this book available for reference. Jones is a principal of Software Productivity Research (SPR), a software process assessment and improvement consulting firm. Most of the empirical claims in the book are based exclusively on software project assessment data collected by SPR under nondisclosure agreements. Consequently, Jones is able to present conclusion based on data, but none of the data or the details of his analysis. On the one hand, the reader is able to benefit from lessons that Jones has drawn from data that only SPR can access; on the other hand, the reader is unable to judge whether these conclusions are warranted, as he or she would be able to do in a typical empirical study. Jones is selective in references to the literature, heavily favoring a few books and papers and completely ignoring other important work; he also often refers to others' work without adequate citation. The reader is left with the feeling that this is decidedly a book incorporating its author's biases and opinions. Jones is a senior and respected member of the software engineering community, and it is interesting and informative to have his views and wisdom on the many issues discussed. But a book that purports to provide a reference on the model of Control of communicable diseases in man should exhibit a higher degree of impartiality and scholarship than is found here.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations