Identification and Assessment of Software Project s Risk
|
|
|
- Brianne Butler
- 9 years ago
- Views:
Transcription
1 3 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 Identification and Assessment of Software Project s Risk Prof (Dr) P K Suri 1, Manoj Wadhwa 1 Professor, Dept of Computer Science and Applications Kurukshetra University, Kurukshetra, Haryana,India Assistant Professor and Head, Dept of computer science and Engineering, Shri Krishan Institute of Engineering and Technology Haryana, Kurukshetra India Summary Software Development is fraught with risks from as early as the proposal creation to the actual testing of the application, there are multitude of factors which introduce risk. Major software projects have the highest probability of being cancelled or delayed due to these factors. This paper provides a quantitative means to assess the risk associated with software development, by outlining the different factors which introduce the risk, assigning weightages to each factor, calculating the overall risk score and then categorizing the project risk as low, medium, high or extreme Key words: Software Project, Risk Management. Commercial Low quality 6% Cost overruns 55% Inadequate configuration control Inadequate user documentation Low user satisfaction Excessive time to market 5% 7% 55% 5% 1. Introduction Risk is very important entity in software project development and has impact on organizational objectives or uncertainty caused by likelihood of something happening and severity of the consequences []. Identification of risks and their assessment is very cumbersome task. For controlling risks, Boehm stressed on mitigation of top ten risk factors which are personnel shortfalls, unrealistic schedules and budgets, developing the wrong functions and properties, developing the wrong user interface, gold-plating, continuing stream of requirements changes, shortfalls in externally furnished components, shortfalls in externally performed tasks, realtime performance shortfalls, straining computer-science capabilities etc.[3] and Caper Jones also identified top five risks factors and divided them into two categories [18] as shown in the table: MIS Project Sector Risk Factor Percent of Projects at Risk Creeping user requirements Excessive schedule pressure 8% 65% Harmful competitive actions 45% Litigation expense 3% Table 1 Risk factors for various project types. Identification and Assessment of Software Projects We have found that for the successful completion of software project, a software manager considers only the top risks, other risks are neglected and this may affect the software projects which may be delayed and even cancelled. For the purposes of this paper, the overall project comprises of a set of distinct activities. Each activity has well defined role or service and marked with weighting factor 1,, 3, 4, 5 and 1. It is important to check the importance of each activity before assigning the weighting factor to each. Meaning and value of each weighting factor is illustrated in table and questionnaires related to software project s activity are illustrated after table. Manuscript received August 5, 7. Manuscript revised August, 7.
2 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 33 Weighting Factors: Meaning factor Comment No Corrective Action necessary 1 Corrective Action Recommended 3 4 Corrective Action Required 5 Key Success Factor 1 Life or Death Issue! 1 Risk Determination: Answers Range risk level Mostly "Yes" - 75 Low Medium 51-4 High Mostly "No" 4+ Extreme Answers: Meaning value True / Yes / Mostly / Not Applicable Maybe / Somewhat / Occasionally 1 False / No / Not At All / Don't Know Some questions are True/False, allowing only or. Table Meaning and value of each weighting factor 3. Proposed list of questionnaires related to software project s activity In this questionnaire list, the efforts have been done to identify all possible activities and assign weighting factor to each activity and ensure providing appropriate entry to each activity which may have some risk factor shown in Appendix. Graph1. Bar Chart of risk category of software project 1,, 3, 4, 4. Results and Discussion During assessment, software project scores 386 and falls in medium risk category. In this paper, efforts have been made to assess overall project and consider that each activity has probability of occurrence of risk so can t be ignored otherwise it is likely to affect the category of software project and due to this software project may get cancelled. It is found during assessment of risks that project proposal and approval process has highest possibility of risk occurrence and beside methodology and technology risks has higher possibility of risk occurrence. So meaningful weighing factors assigned to software activity and careful selection of questionnaire list provides opportunity to the project manager and software organization to assess overall activities of the software project within their organization. 5. Conclusion After the emerging of risk management, software organization has become mature and has implemented various risk methodologies in software development but risk still exists with software. It is found that project s proposal and software requirements have highest probability of risk occurrence. Hence it is very important to determine the risk category before controlling the risks. So Organizations make standards and rules for this. References [1] Boehm, "A Spiral Model of Software Development and Enhancement", IEEE Computer, pp. 61-7, May [] B. W. Boehm, "Software Risk Management: Principle and Practices", IEEE Software, vol. 8, no. 1, pp January [3] Boehm, Barry W. Software Risk Management, IEEE Computer Society Press, [4] Carr, Marvin J., Suresh L. Konda, Ira Monarch, F. Carol Ulrich, and Clay F. Walker. "Taxonomy-Based Risk Low Medium Risk High Risk Extreme Risk This Software Project's Risk
3 34 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 Identification", CMU/SEI-93-TR-6. Pittsburgh: Software Engineering Institute, [5] Charette, R.N., Software Engineering risk Analysis and Management, Mcgraw-Hill/Internet 1989 [6] Charette, R.N., Building Bridges over Intelligent Rivers, American Programmer, vol. 5, no. 7, pp. -9, September [7] Chittister, Clyde & Haimes, Yacov. Assessment and Management of Software TechnicalRisk, IEEE Transactions on Systems, Man, and Cybernetics vol. 4, no., pp. 187-, February [8] Edmund H. Conrow, "Managing Risk in Aerospace Programs," Aerospace America, vol. 35, no. 4, pp , April [9] E. Hall, Managing Risk, Methods for Software Systems Development, Addison Wesley, [1] F. Brooks, "The Mythical Man-Month," Addison-Wesley, Reading, MA, [11] Gemmer, Art. "Risk Management: Moving Beyond Process," IEEE Computer, pp (May 1997). [1] Gilb, T., Principles of Software Engineering Management, Addison-Wesley, [13] Grey, Practical Risk Assessment for Project Management, Wiley, 1995 [14] Haimes, Yacov Y. Total Risk Management, Risk Analysis vol. 11, no. pp , June 1991 [15] Hall, Elaine M. Managing Risk: Methods for Software Systems Development. Reading, Mass.: Addison-Wesley, [16] Henri Barki, Suzanne Rivard, Jean Talbot, "Toward an Assessment of Software Development Risk," Journal of Management Information Systems, vol. 1, no., pp. 3-5, Fall [17] Higuera, R.P., Team Risk Management, crosstalk, U.S Dept. of Defense, pp. -4, January [18] Jones, Capers. Assessment and Control of Software Risks Englewood Cliffs, N.J.: PTR Prentice-Hall, [19] J. Reel, Critical Success Factors in Software Projects, IEEE Software, May - June [] R. Charette, K. Adams, & M. White, Managing Risk in Software maintenance, IEEE Software, May-June, 1997 [1] R. Wideman, Risk Management: A Guide to Managing Project Risk Opportunities, Project Management Institute, 199. [] Richard Fairley, "Risk Management for Software Projects," IEEE Software, pp May [3] Rowe, W.D., An Anatomy of Risk, Robert E. Krieger Publishing Co., Malabar, FL,1988. [4] Schultz, Software Management Metrics, USAF, Hanscom AFB, Ma, [5] Software Process Assessment Workshop, R.S Pressman & Associates Inc. Organge, CT, [6] Thomsett, R., The Indiana Jones School of Risk Management, American Programmer, vol. 5, no. 7, pp. 1-18, September 199. [7] Williams, Ray C., Julie A. Walker, and Audrey J. Dorofee. "Putting Risk Management into Practice," IEEE Software pp 75-83, (May/June 1997) Author s Profile Dr. P.K. Suri received his Ph.D. degree from Faculty of Engineering, Kurukshetra University, Kurukshetra, India and Master s degree from Indian Institute of Technology, Roorkee (formerly known as Roorkee University), India. He is working as Professor in the Department of Computer Science and Applications,Kurukshetra University,Kurukshetra (Haryana), India since Oct He has earlier worked as Reader, Computer Sc. & Applications, at Bhopal University, Bhopal from He has supervised five Ph.D. s in Computer Science and thirteen students are working under his supervision. He has more than 1 publications in International / National Journals and Conferences. He is recipient of 'THE GEORGE OOMAN MEMORIAL PRIZE' for the year and a RESEARCH AWARD The Certificate of Merit for the paper entitled ESMD An Expert System for Medical Diagnosis from INSTITUTION OF ENGINEERS, INDIA. His teaching and research activities include Simulation and Modeling, Software Risk Management, Software Reliability, Software Testing & Software Engineering Processes, Temporal Databases, Ad hoc Networks, Grid Computing, and Biomechanics. Manoj Wadhwa received M.Tech in Computer Science and Engineering from Kurukshetra University Kurukshetra India and pursuing Ph.D from Kurukshetra University, Kurukshetra- Haryana (India).Presently, he is working as Assistant Professor and Head of Computer Science and Engineering Department in Shri Krishan Institute of Engineering and Technology, Kurukshetra. He possesses more than ten years experience of Teaching, Research, and Industry. His areas of interest include Software Engineering, Simulation and Modeling and Operating Systems.
4 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 35 Appendix = True / Yes / Mostly / NA 1 = Maybe / Proposal and Initiation Phase Questions: Wght Required Somewhat = False / No Factor Entry / Don't Know SCORE Proposal, and Approval Process Risk 1 Contract type is simple ( Schedules & Deliverables) 1 or All major project assumptions, requirements, schedules, and deliverables 1 or are in a legally binding context. 3 Project budget, if need be, may be adjusted (i.e. is not fixed). 1 or 4 Project completion date, if need be, may be changed. 1 or 5 Project enjoys the highest level of client Support. 1 or 6 Project meets Software Project Specification targets. 1 or 7 Project scope may be adjusted, if necessary, to ensure a timely, onbudget completion. 1 or A successful Software Management planning phase engagement 8 preceded the project. 1 or 9 Client has contracted for large projects before. 1 or 1 All Project Approvals are in place. 5 or 1 11 Client follows an internal quality management system. 5 or 1 Client has contracted before with other company 5 or 1 13 Software project specification management is ready & able to commit to the project. 5, 1, or 1 14 The client has a history of successful projects. 5, 1, or 1 15 The project team enjoys the full support of their sales rep. 5, 1, or 1 16 Project Manager reports directly to the client. 3 or 6 17 Project Manager's company enjoys a good relationship with the client. 3, 1, or 6 18 Funding is for the project and not optional year to year. or 4 19 No special conditions are required, such as clearances or citizenship. or 4 Project Plan Risk Project is fully compliant with SM Deliverables 1 or 1 The need for, and acquiring of, legitimate and substantial test data is 1 or adequately identified in the Project Plan. Project Quality Reviews are in the project schedule. 5 or 1 3 The project team was involved in developing the project plan. 5, 1, or 1 4 The Project Management Office has approved the project plan. 5 or 1 5 The project team owns all critical path tasks and deliverables. 5 or 1 6 Reviewing project deliverables is part of the project schedule. 5 or 1 7 Client fully supports the roles & responsibilities in the Quality Plan. 5 or 1 8 All external dependencies are in the project plan. 5, 1, or 1 9 In the project plan, no task duration is for more than 4 hours. 5, 1, or 1 3 The Project Manager developed the project schedule. 5, 1, or 1 31 Final project acceptance criteria is defined in the contract. 5 or 1 3 Project schedule is for less than 1 months. 3 or 6 33 System acceptance rests with a single user group. 3 or 6 Project Management 34 Project has an assigned, full-time Project Manager. 1 or 35 The Project Manager is experienced at project leadership. 1, 1, or 36 An Executive Steering Committee exists for this project. 1 or 37 Client has a single, assigned, full-time Project Sponsor. 1 or 38 Project Manager has received formal project management training. 1 or 39 Project Team has ready access to experts in all client areas. 1, 1, or 4 The Project Sponsor is empowered to accept deliverables and authorize 1, 1, or payments. 41 Project has a strong technical lead, other than the project manager. 5 or 1
5 36 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 7 4 All other vendors are subcontractors to the Project Mgr's company. 3 or 6 Project Team risk 43 All project hardware and software is installed and ready for use. 5 or 1 44 Project Manager reports directly to his/her client/subordinate/deputy 5 or 1 45 Project turnover is (or is expected to be) less than %. 5 or 1 46 All project personnel are able to be rotated onto other assignments. 3, 1, or 6 47 Client professionals will make up less than 5% of project staffing. 3 or 6 48 This project is solely owned by an software project specification area 3 or 6 49 The project team all work for the same practice., 1, or 4 Development Risk 5 A Software Management Framework is being used. 1 or 51 The development methodology is fully supported by the client. 1 or 5 The development methodology being used is appropriate for this project. 1 or 53 Appropriate documentation standards are being followed. 5 or 1 54 The development methodology is adequately supported with tools. 5 or 1 55 The development methodology being used is reflected in the project plan. 5 or 1 Technology Risk 56 This project has well defined deliverables. 1 or 57 Existing and legacy systems are well documented. 1, 1, or 58 Project team members are experienced with project technologies. 1 or 59 The definition of the development, test, and production environments is 1 or within the project s scope. 6 The performance requirements of the system are realistic. 1 or 61 The project team has built a similar system before. 1 or 6 All hardware & software used on the project is generally available 5 or 1 63 All project personnel are adequately trained for their jobs. 5 or 1 64 All required skill levels exist in the pool of available personnel. 5, 1, or 1 65 Project team has ready access to the development environment. 5, 1, or 1 66 All legacy systems will remain unchanged. 3 or 6 67 All technical solutions were prototyped before being recommended. 3 or 6 68 Client is responsible for deployment, not the project. 3 or 6 69 Project entails 3 or fewer subsystems. 3 or 6 7 Project is able to enhance existing functional systems. 3, 1, or 6 71 System is for non-critical decision support functions only. 3 or 6 7 The deployed system, data and application, will be at a single location. 3 or 6 73 Client, or a separate contract, is responsible for Performance and Tuning. or 4 74 Client, or a separate contract, is responsible for user training. or 4 75 Number of system users will remain small. or 4 76 Client is already experienced using a GUI user interface. 1, 1, or 77 Client is already experienced using Client/Server. 1, 1, or 78 Client is already experienced with Relational Databases. 1, 1, or 79 Project only requires connectivity with legacy systems. 1 or 8 Project requires only a relational and GUI solution. 1 or 81 Project team defines the hardware and software for the system. 1 or Testing, Installation and Maintenance Risks 8 Draw the maintenance plan if project s does not meet requirements 1, 1 or 83 External agencies are decided prior to project 1 or 84 All test cases are decided before testing of software 1 or 85 Assign responsibility to each member and make schedule plan for Installation 5 or 86 Provide Special training for acceptance testing 5 or 386
Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?
Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means
SOFTWARE RISK MANAGEMENT
SOFTWARE RISK MANAGEMENT Linda Westfall The Westfall Team [email protected] PMB 383, 3000 Custer Road, Suite 270 Plano, TX 75075 972-867-1172 (voice) 972-943-1484 (fax) SUMMARY This paper reviews the basic
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
Unit 15: Risk Management
Unit 15: Risk Management Objectives Ð To explain the concept of risk & to develop its role within the software development process Ð To introduce the use of risk management as a means of identifying &
Schedule Risk Analysis Simulator using Beta Distribution
Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) [email protected] Dr. P.K.
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504
Evaluation and Integration of Risk Management in CMMI and ISO/IEC 15504 Dipak Surie, Email : [email protected] Computing Science Department Umea University, Umea, Sweden Abstract. During software development,
Decision Support System for Software Risk Analysis during Software Development
Decision Support System for Software Risk Analysis during Software Development Surbhi Anand Assistance Prof CT Institutes, Jalandhar, Punjab,India. Vinay Chopra Assistance Prof Daviet,Jallandhar, Punjab,India.
Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1
Session 4 System Engineering Management Session Speaker : Dr. Govind R. Kadambi M S Ramaiah School of Advanced Studies 1 Session Objectives To learn and understand the tasks involved in system engineering
SWEBOK Certification Program. Software Engineering Management
SWEBOK Certification Program Software Engineering Management Copyright Statement Copyright 2011. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted
RFP # 21732 Library System Attachment #2 Implementation Services and Project Plan Questionnaire
Each question should be answered fully and concisely. Implementation Services 1. How many total employees in your firm are dedicated to providing implementation services for the proposed Library System?
A Software Development Simulation Model of a Spiral Process
A Software Development Simulation Model of a Spiral Process ABSTRACT: There is a need for simulation models of software development processes other than the waterfall because processes such as spiral development
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Cost Estimation Strategies COST ESTIMATION GUIDELINES
Cost Estimation Strategies Algorithmic models (Rayleigh curve Cost in week t = K a t exp(-a t 2 ) Expert judgment (9 step model presented later) Analogy (Use similar systems) Parkinson (Work expands to
Project Management. Massimo Felici Room 1402, JCMB, KB 0131 650 5899 [email protected]
Project Management Massimo Felici Room 1402, JCMB, KB 0131 650 5899 [email protected] Project Management Software project management is an essential part of software engineering Concerned with activities
Improving Software Project Management Skills Using a Software Project Simulator
Improving Software Project Management Skills Using a Software Project Simulator Derek Merrill and James S. Collofello Department of Computer Science and Engineering Arizona State University Tempe, AZ 85287-5406
Risk. Risk Categories. Project Risk (aka Development Risk) Technical Risk Business Risk. Lecture 5, Part 1: Risk
Risk Lecture 5, Part 1: Risk Jennifer Campbell CSC340 - Winter 2007 The possibility of suffering loss Risk involves uncertainty and loss: Uncertainty: The degree of certainty about whether the risk will
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
A CASE STUDY ON SOFTWARE PROJECT MANAGEMENT IN INDUSTRY EXPERIENCES AND CONCLUSIONS
A CASE STUDY ON SOFTWARE PROJECT MANAGEMENT IN INDUSTRY EXPERIENCES AND CONCLUSIONS P. Mandl-Striegnitz 1, H. Lichter 2 1 Software Engineering Group, University of Stuttgart 2 Department of Computer Science,
Introduction to the ITS Project Management Methodology
Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Software Risk Management
A Calculated Gamble Hans Schaefer [email protected] How to manage risk Not only in testing 2006 Hans Schaefer page 1 Hazard and Risk A Hazard is Any real or potential condition that can cause injury,
LECTURE # 2. 4 P s in Project Management
SOFTWARE PROJECT MANAGEMENT LECTURE # 2 4 P s in Project Management 15 th September, 2011 Contact Information 2 Instructor: Lecturer Department of Software Engineering U.E.T Taxila Email: [email protected]
Project Management Planning
Overview of Resource Planning Every organization has a limited number of resources to perform tasks. A project manager's primary role is to find a way to successfully execute a project within these resource
Software Risk Management: a Process Model and a Tool
Software Risk Management: a Process Model and a Tool Tereza G. Kirner 1, Lourdes E. Gonçalves 1 1 Graduate Program in Computer Science Methodist University of Piracicaba SP, Brasil [email protected];
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements Byron J. Williams Jeffrey Carver Ray Vaughn Department of Computer Science and Engineering Mississippi State University
How To Understand The Limitations Of An Agile Software Development
A Cynical View on Agile Software Development from the Perspective of a new Small-Scale Software Industry Apoorva Mishra Computer Science & Engineering C.S.I.T, Durg, India Deepty Dubey Computer Science
Managing Commercial-Off-the- Shelf (COTS) Integration for High Integrity Systems: How Far Have We Come? Problems and Solutions in 2003
GSAW 2003 Managing Integration Breakout Session Summary Managing Commercial-Off-the- Shelf () Integration for High Integrity Systems: How Far Have We Come? Problems and Solutions in 2003 Karen Owens, Suellen
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
the state of the practice Variations in Software Development Practices
focus the state of the practice invited article Variations in Software Development Practices Capers Jones, Software Productivity Research My colleagues and I at Software Productivity Research gathered
Lifecycle Models: Waterfall / Spiral / EVO
Lifecycle Models: Waterfall / Spiral / EVO Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 Lifecycle The sequence of actions that must be performed in order to build a software
Test Plan Template (IEEE 829-1998 Format)
Test Plan Template (IEEE 829-1998 Format) Test Plan Identifier Some type of unique company generated number to identify this test plan, its level and the level of software that it is related to. Preferably
TECH. Tracking Progress. Project Schedule PHASE 1 STEP 1 ACTIVITY 1.1. Activity and Milestone STEP 1 STEP 2 : ACTIVITY 2.2 : ACTIVITY 1.
CH03 Planning and Managing the Project * Tracking Progress * Project Personnel * Effort Estimation * Risk Management * The Project Plan * Process Models and Project Management Tracking Progress Questions
V. Phani Krishna et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (6), 2011, 2915-2919
Software Quality Assurance in CMM and XP- A Comparative Study CH.V. Phani Krishna and Dr. K.Rajasekhara Rao CSE Department, KL University, Guntur dt., India. Abstract Software Quality Assurance is a planned
Risk Model For Software Development Personnel
, March 18-20, 2015, Hong Kong Risk Model For Software Development Personnel Esiefarienrhe Michael Bukohwo Abstract Availability of adequate personnel to commence and sustain a software project is a vital
ICS 121 Lecture Notes Spring Quarter 96
Software Management Cost Estimation Managing People Management Poor managment is the downfall of many software projects Ð Delivered software was late, unreliable, cost several times the original estimates
SOFTWARE PROJECT MANAGEMENT
SOFTWARE PROJECT MANAGEMENT http://www.tutorialspoint.com/software_engineering/software_project_management.htm Copyright tutorialspoint.com The job pattern of an IT company engaged in software development
Software Project Management. Software Engineering SW Project Management Slide 1
Software Project Management Software Engineering SW Project Management Slide 1 Objectives To introduce software project management and to describe its distinctive characteristics Explain the advantages
Introduction to Software Engineering. 9. Project Management
Introduction to Software Engineering 9. Project Management Roadmap > Risk management > Scoping and estimation > Planning and scheduling > Dealing with delays > Staffing, directing, teamwork 2 Literature
A Process Model for Software Architecture
272 A Process Model for Software A. Rama Mohan Reddy Associate Professor Dr. P Govindarajulu Professor Dr. M M Naidu Professor Department of Computer Science and Engineering Sri Venkateswara University
Software Development Risk Aspects and Success Frequency on Spiral and Agile Model
Software Development Risk Aspects and Success Frequency on Spiral and Agile Model M. Soumya Krishnan Assistant Professor, Department of Computer Science & IT, Amrita School of Arts and Sciences, Amrita
Conceptualizing Total Quality Management (TQM) for Improving Housing Areas for the Urban Poor
Conceptualizing Total Quality Management (TQM) for Improving Housing Areas for the Urban Poor Abstract This paper examines the concept of TQM and investigates and identifies factors in all three phases
Development and Acquisition D&A
Federal Financial Institutions Examination Council FFIEC Development and Acquisition D&A APRIL 2004 IT EXAMINATION H ANDBOOK Development and Acquisition Booklet April 2004 TABLE OF CONTENTS INTRODUCTION...
Risk Analysis: a Key Success Factor for Complex System Development
Risk Analysis: a Key Success Factor for Complex System Development MÁRCIO DE O. BARROS CLÁUDIA M. L. WERNER GUILHERME H. TRAVASSOS COPPE / UFRJ Computer Science Department Caixa Postal: 68511 - CEP 21945-970
Risk Mitigation, Monitoring and Management Plan
Risk Mitigation, Monitoring and Management Plan Introduction Scope and intent of RMMM activities The goal of the risk mitigation, monitoring and management plan is to identify as many potential risks as
Generic Risk Mitigation Framework for Business Process Outsourcing
Generic Risk Mitigation Framework for Business Process Outsourcing Nanayakkara B.S 1, Hirano.M 2, Waseda Business School Abstract Business process outsourcing risk mitigation is a popular topic among the
Estimating Size and Effort
Estimating Size and Effort Dr. James A. Bednar [email protected] http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson [email protected] http://www.inf.ed.ac.uk/ssp/members/dave.htm SAPM Spring 2007:
SOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES
By Linda Wallace and Mark Keil SOFTWARE PROJECT RISKS AND THEIR EFFECT ON OUTCOMES How to identify the risks that interact to pose the most significant threats to successful project outcomes. While many
MNLARS Project Audit Checklist
Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?
PROJECT RISK ASSESSMENT QUESTIONNAIRE
PROJECT RISK ASSESSMENT QUESTIONNAIRE Project Name: Prepared by: Date (MM/DD/YYYY): 1. Instructions for Using this Document Section I Risk Assessment Questionnaire Use Section I of this template to identify
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM)
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Pankaj Jalote 1 Infosys Technologies Ltd. Bangalore 561 229 Fax: +91-512-590725/590413 [email protected], [email protected]
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002
DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN April 2009 SLAC I 050 07010 002 Risk Management Plan Contents 1.0 INTRODUCTION... 1 1.1 Scope... 1 2.0 MANAGEMENT
Network Diagram Critical Path Method Programme Evaluation and Review Technique and Reducing Project Duration
Network Diagram Critical Path Method Programme Evaluation and Review Technique and Reducing Project Duration Prof. M. Rammohan Rao Former Dean Professor Emeritus Executive Director, Centre for Analytical
The Neglected Management Activity: Software Risk Management
The Neglected Management Activity: Software Risk Management F. Michael Dedolph Software risk management is a crucial part of successful project management, yet it is often neglected. Why is it important?
Knowledge Infrastructure for Project Management 1
Knowledge Infrastructure for Project Management 1 Pankaj Jalote Department of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur, India 208016 [email protected] Abstract In any
<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
Introduction to Software Project Management. CITS3220 Software Requirements & Project Management
Introduction to Software Project Management CITS3220 Software Requirements & Project Management "A project gets a year late one day at a time." "Anything that can be changed will be changed until there
Simulating Software Projects An Approach for Teaching Project Management
Simulating Software Projects An Approach for Teaching Project Management P. Mandl-Striegnitz 1, A. Drappa 1, H. Lichter 2 1 University of Stuttgart, Stuttgart, Germany 2 Aachen University of Technology,
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management 8. What is the principle of prototype model? A prototype is built to quickly demonstrate
CUT COSTS, NOT PROJECTS
CUT COSTS, NOT PROJECTS Understanding and Managing Software Development Costs A WEBINAR for State of Washington Agencies Critical Logic, Inc. July 9 2009 Starting at 3pm, Pacific Daylight Time Critical
PROJECT COMMUNICATIONS MANAGEMENT - A WEB BASED CONSTRUCTION MANAGEMENT APPROACH
PROJECT COMMUNICATIONS MANAGEMENT - A WEB BASED CONSTRUCTION MANAGEMENT APPROACH Jagdish J Gavade. 1,Basavraj A.Konnur. 2, Amol S.Thorbole 3 1 Assistant Prof., Civil Engineering Dept, Sanjeevan Engineering
Lecture Notes #27: Software Risk Management
EECS816: Object-Oriented Software Development Slide 2 Lecture Notes #27: Software Risk Management Software risks: What can go wrong? What is the likelihood? What will be the damage? What can be done about
Project management. Objectives
Project management cmsc435-1 Objectives To explain the main tasks undertaken by project managers To introduce software project management and to describe its distinctive characteristics To discuss project
SERUM - Software Engineering Risk: Understanding and Management
SERUM - Software Engineering Risk: Understanding and Management D. Greer and D.W. Bustard Faculty of Informatics, University of Ulster, Cromore Road, Coleraine, BT52 1SA, Northern Ireland. Email: [email protected],
What went wrong? Unsuccessful information technology projects
Brenda Whittaker Senior Consultant, KPMG Consulting, Toronto, Canada words Computer software, Information technology, Project control, Project management, Software development Abstract Information technology
Project Audit & Review Checklist. The following provides a detailed checklist to assist the PPO with reviewing the health of a project:
Project Audit & Review Checklist The following provides a detailed checklist to assist the PPO with reviewing the health of a project: Relevance (at this time) Theory & Practice (How relevant is this attribute
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 14 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
CHARACTERISTICS OF SUCCESSFUL MEGAPROJECTS
Chapter Six CHARACTERISTICS OF SUCCESSFUL MEGAPROJECTS Bibliographic Information: Committee to Assess the Policies and Practices of the Department of Energy to Design, Manage, and Procure Environmental
Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain
GSAW 2004 Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain Richard J. Adams and Suellen Eslinger Software Acquisition and Process Office
Optimization of Software Quality using Management and Technical Review Techniques
Optimization of Software Quality using Management and Technical Review Techniques Inibehe Emmanuel Akpannah Post Graduate Student (MSc. Information Technology), SRM University, Chennai, India Abstract
Principles of Management
Principles of Management 1 Process of management aims at 1 Cooperating with a number of persons pursuing a goal 2 Coordinating work of number of persons to achieve objectives 3 Supervising a number of
USING DEFECT ANALYSIS FEEDBACK FOR IMPROVING QUALITY AND PRODUCTIVITY IN ITERATIVE SOFTWARE DEVELOPMENT
USING DEFECT ANALYSIS FEEDBACK FOR IMPROVING QUALITY AND PRODUCTIVITY IN ITERATIVE SOFTWARE DEVELOPMENT Pankaj Jalote Department of Computer Science and Engineering Indian Institute of Technology Kanpur
Project Management. Software Projects vs. Engineering Projects
Read Chapters (a) Project Management, (b) Project Scheduling and (c) Risk Management from Pressman for this lecture. Project Management Rahul Premraj + Andreas Zeller reliability of data questioned! Software
PROJECT PLAN TEMPLATE
Treasury Board of Canada Secretariat Secrétariat du Conseil du Trésor du Canada Enhanced Management Framework for Information Management/Information Technology PROJECT PLAN TEMPLATE Document Revision Draft
Phases, Activities, and Work Products. Object-Oriented Software Development. Project Management. Requirements Gathering
Object-Oriented Software Development What is Object-Oriented Development Object-Oriented vs. Traditional Development An Object-Oriented Development Framework Phases, Activities, and Work Products Phases,
Continuous Risk Management Guidebook
Carnegie Mellon Software Engineering Institute Continuous Guidebook Audrey J. Dorofee Julie A. Walker Christopher J. Alberts Ronald P. Higuera Richard L. Murphy Ray C. Williams The ideas and findings in
