Unit V
Unit V
Unit V
Operational risk refers to the procedural risks means these are the risks which happen in day-to-day operational activities during
project development due to improper process implementation or some external operational risks.
Some reasons for Operational risks –
Insufficient resources
Conflict between tasks and employees
Improper management of tasks
No proper planning about project
Less number of skilled people
Lack of communication and cooperation
Lack of clarity in roles and responsibilities
Insufficient training
Technical Risks :
Technical risks refers to the functional risk or performance risk which means this technical risk mainly
associated with functionality of product or performance part of the software product.
Some reasons for Technical risks –
Frequent changes in requirement
Less use of future technologies
Less number of skilled employee
High complexity in implementation
Improper integration of modules
Programmatic Risks :
Programmatic risks refers to the external risk or other unavoidable risks.
These are the external risks which are unavoidable in nature. These risks come from outside and it is out of
control of programs.
Some reasons for Programmatic risks –
Rapid development of market
Running out of fund / Limited fund for project development
Changes in Government rules/policy
Loss of contracts due to any reason
Other risk categories
1. Known risks: Those risks that can be uncovered after careful assessment of the project program, the
business and technical environment in which the plan is being developed, and more reliable data sources
(e.g., unrealistic delivery date)
2. Predictable risks: Those risks that are hypothesized from previous project experience (e.g., past turnover)
3. Unpredictable risks: Those risks that can and do occur, but are extremely tough to identify in advance.
Principle of Risk Management
Global Perspective: In this, we review the bigger system description, design, and implementation. We look
at the chance and the impact the risk is going to have.
Take a forward-looking view: Consider the threat which may appear in the future and create future plans
for directing the next events.
Open Communication: This is to allow the free flow of communications between the client and the team
members so that they have certainty about the risks.
Integrated management: In this method risk management is made an integral part of project management.
Continuous process: In this phase, the risks are tracked continuously throughout the risk management
paradigm.
Risk Management Activities
Risk management consists of three main activities, as shown in fig:
Risk Assessment
The objective of risk assessment is to division the risks in the condition of their loss, causing potential.
For risk assessment, first, every risk should be rated in two methods:
•The possibility of a risk coming true (denoted as r).
•The consequence of the issues relates to that risk (denoted as s).
Based on these two methods, the priority of each risk can be estimated:
p=r*s
Where p is the priority with which the risk must be controlled, r is the probability of the risk becoming true, and s is
the severity of loss caused due to the risk becoming true. If all identified risks are set up, then the most likely and
damaging risks can be controlled first, and more comprehensive risk abatement methods can be designed for these risks.
The Risk Management Method
It is a simple four step method which is repeated continuously through the project lifecycle.
Once a risk is identified, it is assessed, responses to manage the risk are agreed, and progress is monitored:
Identify – risks are identified on an ongoing basis, through formal risk identification workshops as well as during
day to day activities.
Assess – once identified a risk is assessed to establish the likelihood of it occurring and the impact it will have if
it occurs.
Respond – there several possible actions that can be taken to reduce the likelihood of a risk occurring or the
impact of the risk, for example transferring, avoiding, and mitigating. In this step suitable responses are agreed,
and budget approved if needed.
Monitor - progress of the risk responses needs to be monitored and controlled, with corrective action taken if
needed. Typically, progress is assessed via project team meetings.
1. Risk Identification: The project organizer needs to anticipate the risk in the project as early as possible
so that the impact of risk can be reduced by making effective risk management planning.
A project can be of use by a large variety of risk. To identify the significant risk, this might affect a project.
It is necessary to categories into the different risk of classes.
There are different types of risks which can affect a software project:
Technology risks: Risks that assume from the software or hardware technologies that are used to develop
the system.
People risks: Risks that are connected with the person in the development team.
Organizational risks: Risks that assume from the organizational environment where the software is being
developed.
Tools risks: Risks that assume from the software tools and other support software used to create the system.
Requirement risks: Risks that assume from the changes to the customer requirement and the process of
managing the requirements change.
Estimation risks: Risks that assume from the management estimates of the resources required to build the
system
2. Risk Analysis: During the risk analysis process, you have to consider every identified risk and make a
perception of the probability and seriousness of that risk.
There is no simple way to do this. You have to rely on your perception and experience of previous projects
and the problems that arise in them.
It is not possible to make an exact, the numerical estimate of the probability and seriousness of each risk.
Instead, you should authorize the risk to one of several bands:
The probability of the risk might be determined as very low (0-10%), low (10-25%), moderate (25-50%),
high (50-75%) or very high (+75%).
The effect of the risk might be determined as catastrophic (threaten the survival of the plan), serious (would
cause significant delays), tolerable (delays are within allowed contingency), or insignificant.
Risk Control
It is the process of managing risks to achieve desired outcomes.
After all, the identified risks of a plan are determined; the project must be made to include the most harmful
and the most likely risks.
Different risks need different containment methods.
In fact, most risks need ingenuity on the part of the project manager in tackling the risk.
There are three main methods to plan for risk management:
Avoid the risk: This may take several ways such as discussing with the client to change the requirements to
decrease the scope of the work, giving incentives to the engineers to avoid the risk of human resources
turnover, etc.
Transfer the risk: This method involves getting the risky element developed by a third party, buying
insurance cover, etc.
Risk reduction: This means planning method to include the loss due to risk. For instance, if there is a risk
that some key personnel might leave, new recruitment can be planned.
Risk Leverage: To choose between the various methods of handling risk, the project plan must consider the
amount of controlling the risk and the corresponding reduction of risk. For this, the risk leverage of the
various risks can be estimated.
Risk leverage is the variation in risk exposure divided by the amount of reducing the risk.
Risk leverage = (risk exposure before reduction - risk exposure after reduction) / (cost of reduction)
1. Risk planning:
The risk planning method considers each of the key risks that have been identified and develop ways to
maintain these risks.
For each of the risks, you have to think of the behavior that you may take to minimize the disruption to the
plan if the issue identified in the risk occurs.
You also should think about data that you might need to collect while monitoring the plan so that issues can
be anticipated.
Again, there is no easy process that can be followed for contingency planning.
It rely on the judgment and experience of the project manager.
2. Risk Monitoring: Risk monitoring is the method king that your assumption about the product, process,
and business risks has not changed.
In this stage, risk assessment is done continuously and the risk reduction plan is revised as more information
about risk is available.
RMMM Plan :
A risk management technique is usually seen in the software Project plan.
This can be divided into Risk Mitigation, Monitoring, and Management Plan (RMMM).
In this plan, all works are done as part of risk analysis.
As part of the overall project plan project manager generally uses this RMMM plan.
In some software teams, risk is documented with the help of a Risk Information Sheet (RIS).
This RIS is controlled by using a database system for easier management of information i.e creation, priority
ordering, searching, and other analysis.
After documentation of RMMM and start of a project, risk mitigation and monitoring steps will start.
Risk Mitigation :
It is an activity used to avoid problems (Risk Avoidance).
Steps for mitigating the risks as follows.
Finding out the risk.
Removing causes that are the reason for risk creation.
Controlling the corresponding documents from time to time.
Conducting timely reviews to speed up the work.
Risk Monitoring :
It is an activity used for project tracking.
It has the following primary objectives as follows.
To check if predicted risks occur or not.
To ensure proper application of risk aversion steps defined for risk.
To collect data for future risk analysis.
To allocate what problems are caused by which risks throughout the project.
Risk Management and planning :
It assumes that the mitigation activity failed and the risk is a reality.
This task is done by Project manager when risk becomes reality and causes severe problems.
If the project manager effectively uses project mitigation to remove risks successfully then it is easier to
manage the risks. This shows that the response that will be taken for each risk by a manager.
The main objective of the risk management plan is the risk register.
This risk register describes and focuses on the predicted threats to a software project.
Software Configuration Management
In Software Engineering, Software Configuration Management(SCM) is a process to systematically
manage, organize, and control the changes in the documents, codes, and other entities during the Software
Development Life Cycle.
The primary goal is to increase productivity with minimal mistakes.
SCM is part of cross-disciplinary field of configuration management and it can accurately determine who
made which revision.
Why do we need Configuration management?
The primary reasons for Implementing Technical Software Configuration Management System are:
There are multiple people working on software which is continually updating
It may be a case where multiple version, branches, authors are involved in a software config project, and the
team is geographically distributed and works concurrently
Changes in user requirement, policy, budget, schedule need to be accommodated.
Software should able to run on various machines and Operating Systems
Helps to develop coordination among stakeholders
SCM process is also beneficial to control the costs involved in making changes to a system
Any change in the software configuration Items will affect the final product.
1. Configuration Manager
•Configuration Manager is the head who is Responsible for identifying configuration items.
•CM ensures team follows the SCM process
•He/She needs to approve or reject change requests
2. Developer
•The developer needs to change the code as per standard development activities or change requests. He is
responsible for maintaining configuration of code.
•The developer should check the changes and resolves conflicts
3. Auditor
•The auditor is responsible for SCM audits and reviews.
•Need to ensure the consistency and completeness of release.
4. Project Manager:
Ensure that the product is developed within a certain time frame
Monitors the progress of development and recognizes issues in the SCM process
Generate reports about the status of the software system
Make sure that processes and policies are followed for creating, changing, and testing
5. User
The end user should understand the key SCM terms to ensure he has the latest version of the software
Software Configuration Management Plan
Software Configuration Management Tools
Any Change management software should have the following 3 Key features:
Concurrency Management:
When two or more tasks are happening at the same time, it is known as concurrent operation. Concurrency in context to SCM
means that the same file being edited by multiple persons at the same time.
If concurrency is not managed correctly with SCM tools, then it may create many pressing issues.
Version Control:
SCM uses archiving method or saves every change made to file. With the help of archiving or save feature, it is possible to roll
back to the previous version in case of issues.
Synchronization:
Users can checkout more than one files or an entire copy of the repository. The user then works on the needed file and checks
in the changes back to the repository.They can synchronize their local copy to stay updated with the changes made by other
team members.