550 likes | 648 Views
Week 5 – Special Topics. Risk Management Best Practices. Traps, Alarms & Escapes. From Navy Best Practices Traps - think have risks covered by following procedures Alarms – assumptions that cause trouble Consequences – if nothing is done. Risk Checklist. Risk Management Training.
E N D
Traps, Alarms & Escapes • From Navy Best Practices • Traps - think have risks covered by following procedures • Alarms – assumptions that cause trouble • Consequences – if nothing is done
Why RM Training is Needed • Weak backgrounds in risk management • Mistaken concepts • Assessment is RM – skip planning & monitoring • Mitigation is only handling strategy • All risk can be eliminated • Focus on performance, omit cost & schedule
Tailoring RM Training • Adjust to different project team groups • Sr. management • Working level engineers • Address issues each group is likely to face • Address tailoring RM activities to meet program needs – not one-size fits all
SW Risk as a Special Case • Virtual • Can’t physically touch/feel to assess • History of latent defects • Many interfaces • Hardware-to-software • Operating system-to-operating code • Incompatible combinations • Update frequency • Multiple versions • Upward/downward compatibility
Identification Strategies • Review Schedule & Networks • Review Cost Estimation Parameters • Perform Interviews • Revisit Lessons Learned • Develop a Risk taxonomy • Brainstorm and play “what if” • Re-sort the watch list (e.g., by source)
Identification- Schedule Risks • Use the planning or baseline schedule • Evaluate the activity network view • Look for nodes with: • High fan-in (many activities terminate at a single node) • High fan-out (many activities emanate from a single node) • No predecessors
ID- Cost Risk Drivers • Consider specific areas of concern that can lead to problems: • Personnel experience, availability • Requirement complexity, firmness • Scheduling and prediction of task and partition times • Hardware requirements, interfaces, constraints
SW Risk Handling • Avoidance - de-scoping objectives • Assumption – latent defects • Control – user acceptance testing • Transfer – from software to firmware or hardware
Commercial vs. Gov’t Perspective • Different market conditions • Different best practices • Different likelihoods for similar issues As always, tailor RM to program needs
Market Differences • How is risk impacted?
SW Development Best Practices • How is risk impacted?
Overview of Risk Management Tools
Cautions in Tool Selection • A good tool for one organization may not be a good match for another • Tailor RM to the program needs • The tool should never dictate the process • Define process, then choose compatible tool • Be compatible with program culture
Effective Use of a Tool • RM is more than using a RM tool • Tool must efficiently & effectively integrate into program • Resources required • Level of detail, complexity • Focus of tool – e.g., program phase
RM Data Base Considerations • Provide sufficient configuration control • Accessible to all team members • Ability to accept anonymous comments • Support program needs • Reporting • Monitoring • Captures lessons learned • Fulfills contractual requirements • Balance costs/value
Tools Comparison • @Risk & Crystal Ball – licensed software • Monte Carlo simulation add-in for Excel • Select desired distribution function & define parameters • Provide data and generate a plausible distribution function • Provides statistics and graphical output • User provides risk analysis structure
Probability-Consequence Screening • Developed by the Air Force • Risk events assigned a probability & consequence for performance, schedule & cost • Position in consequence screening matrix determines risk score • User assigns Hi, Med, Low ranges • Generates reports and graphical output • www.pmcop.dau.mil
Risk Matrix • Excel – based model • Collects inputs in watch list format • Uses best practices (ordinal) breakout for probability & consequence • Orders events by Borda rank & assigns risk level • Generates action plan reports and graphical output • www.mitre.org
Risk Radar • Access – based, licensed software • Can establish standard values for risk categorization • Manual or automatic risk prioritization • Complies with ISO, SEI CMMI & Government standards • Generates detailed, summary & metrics reports • Demo available: www.iceincusa.com/products_tools.htm
TRIMS Technical Risk ID & Mitigation • Knowledge-based system • Utilizes SEI & Navy Best Practices to collect data on past experiences • Measures technical risk rather than cost & schedule • Most applicable to design efforts • Can tailor categories, templates & questions • Generates status, next action & overdue action reports • www.bmpcoe.org