University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510, CS 577a Fall 2015 Software Risk Management : Overview.

Slides:



Advertisements
Similar presentations
Project management.
Advertisements

Software Process Models
University of Southern California Center for Systems and Software Engineering Risk Calculation Case Studies CS 510 Software Engineering Supannika Koolmanojwong.
Project What is a project A temporary endeavor undertaken to create a unique product, service or result.
R i s k If you don’t attack risks, they will attack you.
University of Southern California Center for Systems and Software Engineering A Look at Software Engineering Risks in a Team Project Course Sue Koolmanojwong.
Using UML, Patterns, and Java Object-Oriented Software Engineering Royce’s Methodology Chapter 16, Royce’ Methodology.
W5HH Principle As applied to Software Projects
Rational Unified Process
University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC USC-CSE Executive Workshop March 15, 2006 Processes for Human.
Software Risk Management and the COCOMO Model
University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510 Lecture Fall 2011 Value-Based Software Engineering.
University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510, CS 577a Fall,2005 (
1 SOFTWARE PRODUCTION. 2 DEVELOPMENT Product Creation Means: Methods & Heuristics Measure of Success: Quality f(Fitness of Use) MANAGEMENT Efficient &
“If You Don’t Actively Attack the Risks,
University of Southern California Center for Software Engineering C S E USC Agile and Plan-Driven Methods Barry Boehm, USC USC-CSE Affiliates’ Workshop.
Software Project Risk Management
Project Risk Management Risk Mitigation. Risk Management  The prime objective of risk management is to minimize the impact and probability of the occurrence.
Software Evolution Planning CIS 376 Bruce R. Maxim UM-Dearborn.
Upstream Prerequisites
Introduction to RUP Spring Sharif Univ. of Tech.2 Outlines What is RUP? RUP Phases –Inception –Elaboration –Construction –Transition.
SPEAKER : KAI-JIA CHANG ADVISER : QUINCY WU DATA : Spiral Model.
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
ECE450 - Software Engineering II1 ECE450 – Software Engineering II Today: Risk.
 CS 5380 Software Engineering Chapter 2 – Software Processes Chapter 2 Software Processes1.
Software Engineering Management Lecture 1 The Software Process.
1 Project Risk Management Project Risk Management Dr. Said Abu Jalala.
1 Chapter 5 Project management. 2 Project management : Is Organizing, planning and scheduling software projects.
Chapter 3 Project Management Details Tracking Project Progress Project Estimation Project Risk Analysis Project Organization RUP Project Management Workflow.
Yazd University, Electrical and Computer Engineering Department Course Title: Advanced Software Engineering By: Mohammad Ali Zare Chahooki The Project.
© The McGraw-Hill Companies, Software Project Management 4th Edition Risk management Chapter 7.
Introduction to Software Engineering ECSE-321 Unit 4 – Project Management 10/19/2015Introduction to Software Engineering – ECSE321Unit 4 – Project Management/1.
13-January-2003cse LifeCycle © 2003 University of Washington1 Lifecycle CSE 403, Winter 2003 Software Engineering
CSEM01 - wk8 - Software Planning1 Software Planning CSEM01 SE Evolution & Management Anne Comer Helen Edwards.
Chapter 3 Project Management Chapter 3 Project Management Organising, planning and scheduling software projects.
University of Southern California Center for Systems and Software Engineering 09/02/09©USC-CSSE1 OCD Risk Management & DART CS 577a, Fall 2009 September.
CS 577b Software Engineering II -- Introduction
Pre-Project Components
Ch 10 - Risk Management Learning Objectives You should be able to: List and describe risk management processes, inputs, outputs, and tools List and describe.
An Introduction to Software Engineering
J. Scott Hawker p. 1Some material © Rational Corp. Rational Unified Process Overview See and use the RUP Browser on lab machines.
1 Project management. 2 Topics covered Management activities Project planning Project scheduling Risk management.
Risk Management ©USC-CSSE.
Software Project Management Lecture 5 Software Project Risk Management.
Chap 4. Project Management - Organising, planning and scheduling
Yazd University, Electrical and Computer Engineering Department Course Title: Advanced Software Engineering By: Mohammad Ali Zare Chahooki The Project.
University of Southern California Center for Systems and Software Engineering Risk Management CS 577a, Fall 2010 November 24, /24/2010©USC-CSSE1.
Risk Analysis 19 th September, Risk vs. Problem Risk  An “uncertain event that “may” happen with some probability Problem  The above event.
1 Software Risk Management : Overview and Recent Developments LiGuo Huang Computer Science and Engineering Southern Methodist University.
Illuminating Britelite’s Internal Services for Success Strategy for Process Improvement.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Welcome to Software Project Management. CONVENTIONAL SOFTWARE MANAGEMENT The BEST and WORST thing about software is its flexibility. 1.Software development.
R i s k If you don’t attack risks, they will attack you.
Copy of the slides: (will also be put on the esse3 website)
Project management. Software project management ■It is the discipline of planning, organizing and managing resources to bring about the successful completion.
Chapter 3 Project Management Parts of this presentation is extracted from Ian Sommerville’s slides located at
Slide 3.1 © The McGraw-Hill Companies, 2002 SOFTWARE LIFE-CYCLE MODELS.
Software Development Process includes: all major process activities all major process activities resources used, subject to set of constraints (such as.
CS 577b: Software Engineering II
Methodologies and Algorithms
Software Engineering Management
소프트웨어공학 원리 (SEP521) Risk Management - II Jongmoon Baik.
소프트웨어공학 원리 (SEP521) Risk Management - I Jongmoon Baik.
Software Risk Management : Overview and Recent Developments
Software Risk Management : Overview and Recent Developments
Software Risk Management : Overview and Recent Developments
Risk Management ©USC-CSSE.
Software Risk Management : Overview and Recent Developments
Presentation transcript:

University of Southern California Center for Software Engineering C S E USC Barry Boehm, USC CS 510, CS 577a Fall 2015 Software Risk Management : Overview and Recent Developments

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE2 Outline What is Software Risk Management? What can it help you do? When should you do it? How should you do it? What are its new trends and opportunities? Conclusions Top-10 Risk Survey

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE3 Is This A Risk? We just started integrating the software –and we found out that COTS* products A and B just can’t talk to each other We’ve got too much tied into A and B to change Our best solution is to build wrappers around A and B to get them to talk via CORBA** This will take 3 months and $300K It will also delay integration and delivery by at least 3 months *COTS: Commercial off-the-shelf **CORBA: Common Object Request Broker Architecture

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE4 Is This A Risk? We just started integrating the software –and we found out that COTS* products A and B just can’t talk to each other We’ve got too much tied into A and B to change ******* No, it is a problem –Being dealt with reactively Risks involve uncertainties –And can be dealt with pro-actively –Earlier, this problem was a risk

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE5 Earlier, This Problem Was A Risk A and B are our strongest COTS choices –But there is some chance that they can’t talk to each other –Probability of loss P(L) If we commit to using A and B –And we find out in integration that they can’t talk to each other –We’ll add more cost and delay delivery by at least 3 months –Size of loss S(L) We have a risk exposure of RE = P(L) * S(L)

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE6 How Can Risk Management Help You Deal With Risks? Buying information Risk avoidance Risk transfer Risk reduction Risk acceptance

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE7 Risk Management Strategies: Buying Information Let’s spend $30K and 2 weeks prototyping the integration of A and B This will buy information on the magnitude of P(L) and S(L) If RE = P(L) * S(L) is small, we’ll accept and monitor the risk If RE is large, we’ll use one/some of the other strategies

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE8 Other Risk Management Strategies Risk Avoidance –COTS product C is almost as good as B, and it can talk to A –Delivering on time is worth more to the customer than the small performance loss Risk Transfers –If the customer insists on using A and B, have them establish a risk reserve. –To be used to the extent that A and B can’t talk to each other Risk Reduction –If we build the wrappers and the CORBA corrections right now, we add cost but minimize the schedule delay Risk Acceptance –If we can solve the A and B interoperability problem, we’ll have a big competitive edge on the future procurements –Let’s do this on our own money, and patent the solution

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE9 Is Risk Management Fundamentally Negative? It usually is, but it shouldn’t be As illustrated in the Risk Acceptance strategy, it is equivalent to Opportunity Management Opportunity Exposure OE = P(Gain) * S(Gain) = Expected Value Buying information and the other Risk Strategies have their Opportunity counterparts –P(Gain): Are we likely to get there before the competition? –S(Gain): How big is the market for the solution?

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE10 What Else Can Risk Risk Management Help You Do? Determine “How much is enough?” for your products and processes –Functionality, documentation, prototyping, COTS evaluation, architecting, testing, formal methods, agility, discipline, … –What’s the risk exposure of doing too much? –What’s the risk exposure of doing too little? Tailor and adapt your life cycle processes –Determine what to do next (specify, prototype, COTS evaluation, business case analysis) –Determine how much of it is enough –Examples: Risk-driven spiral model and extensions (win-win, anchor points, RUP, MBASE, CeBASE Method) Get help from higher management –Organize management reviews around top-10 risks

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE11 Outline What is Software Risk Management? What can it help you do? When should you do it? How should you do it? What are its new trends and opportunities? Conclusions Top-10 Risk Survey

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE12 Risk Management Starts on Day One Early and Late Risk Resolution –Quotes, Notes, and Data –Temptations to Avoid Early Risk Resolution with the WinWin Spiral Model –Identifying Stakeholders and Win Conditions –Model Clash and Win-Lose Risk Avoidance –Avoiding Cost/Schedule Risks with the SAIV Model

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE13 Early Risk Resolution Quotes “In architecting a new software program, all the serious mistakes are made on the first day.” Robert Spinrad, VP-Xerox, 1988 “If you don’t actively attack the risks, the risks will actively attack you.” Tom Gilb, 1988

University of Southern California Center for Software Engineering C S E USC Risk of Delaying Risk Management: Systems —Blanchard- Fabrycky, 1998

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE15 Risk of Delaying Risk Management: Software Phase in Which defect was fixed Relative cost to fix defect Requirements Design Code Development Acceptance Operation test test Smaller software projects Larger software projects Median (TRW survey) 80% 20% SAFEGUARD GTE IBM-SSD

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE16 Steeper Cost-to-fix for High-Risk Elements % of Software Problem Reports (SPR’s) TRW Project A 373 SPR’s TRW Project B 1005 SPR’s % of Cost to Fix SPR’s Major Rework Sources: Off-Nominal Architecture-Breakers A - Network Failover B - Extra-Long Messages

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE17 Day One Temptations to Avoid - I It’s too early to think about risks. We need to: –Finalize the requirements –Maximize our piece of the pie –Converge on the risk management organization, forms, tools, and procedures. Don’t put the cart before the horse. The real horse is the risks, and it’s leaving the barn –Don’t sit around laying out the seats on the cart while this happens. Work this concurrently.

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE18 Day One Temptations to Avoid - II We don’t have time to think about the risks. We need to: –Get some code running right away –Put on a socko demo for the customers –Be decisive. Lead. Make commitments. The Contrarian’s Guide to Leadership (Sample, 2002) –Never make a decision today that can be put off till tomorrow. –Don’t form opinions if you don’t have to. Think gray.

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE19 Day One Temptations to Avoid - III Unwillingness to admit risks exist –Leaves impression that you don’t know exactly what you’re doing –Leaves impression that your bosses, customers don’t know exactly what they’re doing –“Success-orientation” –“Shoot the messenger” syndrome Tendency to postpone the hard parts –Maybe they’ll go away –Maybe they’ll get easier, once we do the easy parts Unwillingness to invest money and time up front

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE20 Outline What is Software Risk Management? What can it help you do? When should you do it? How should you do it? What are its new trends and opportunities? Conclusions Top-10 Risk Survey

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE21 Software Risk Management Checklists Decision driver analysis Assumption analysis Decomposition Performance models Cost models Network analysis Decision analysis Quality factor analysis Risk exposure Risk leverage Compound risk reduction Buying information Risk avoidance Risk transfer Risk reduction Risk element planning Risk plan integration Prototypes Simulations Benchmarks Analyses Staffing Milestone tracking Top-10 tracking Risk reassessment Corrective action Risk Resolution Risk Assessment Risk Control Risk Identification Risk Analysis Risk Prioritization Risk mgmt Planning Risk Management Risk Monitoring

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE22 Risk Identification Techniques Risk-item checklists Decision driver analysis –Comparison with experience –Win-lose, lose-lose situations Decomposition –Pareto 80 – 20 phenomena –Task dependencies –Murphy’s law –Uncertainty areas Model Clashes

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE23 Top 10 Risk Items: 1989 and Personnel shortfalls 2.Schedules and budgets 3.Wrong software functions 4.Wrong user interface 5.Gold plating 6.Requirements changes 7.Externally-furnished components 8.Externally-performed tasks 9.Real-time performance 10.Straining computer science 1.Personnel shortfalls 2.Schedules, budgets, process 3.COTS, external components 4.Requirements mismatch 5.User interface mismatch 6.Architecture, performance, quality 7.Requirements changes 8.Legacy software 9.Externally-performed tasks 10.Straining computer science

University of Southern California Center for Software Engineering C S E USC Top 10 Risks: 1995 vs Personnel shortfalls1. Customer-developer-user team cohesion 2. Schedules, budgets, process2. Personnel shortfalls 3. COTS, external components3. Architecture complexity; quality tradeoffs 4. Requirements mismatch4. Budget and schedule constraints 5. User interface mismatch 5. COTS and other independently evolving systems 6. Architecture, performance, quality6. Lack of domain knowledge 7. Requirements changes7. Process Quality Assurance 8. Legacy software8. Requirements volatility; rapid change 9. Externally-performed tasks9. User interface mismatch 10. Straining computer science10. Requirements mismatch Fall 2015©USC-CSSE24

University of Southern California Center for Software Engineering C S E USC Top 10 Risks: Inflated expectations 2.Success-critical stakeholder’s lack of involvement or value conflicts 3.Under-defined plans and requirements 4.Architecture/reuse/non-developmental item (ND) conflicts 5.Personnel shortfalls 6.Immature or obsolete processes; unbridled requirements volatility 7.Human-system integration shortfalls 8.Legacy asset incompatibilities 9.Unbalanced nonfunctional requirements (-ilities) 10.Immature Technology Fall 2015©USC-CSSE25

University of Southern California Center for Software Engineering C S E USC Primary Risks in 577ab

University of Southern California Center for Software Engineering C S E USC Personnel Shortfalls Commitment (this is team member’s last course; only needs C to graduate) Compatibility Communication problems Skill deficiencies (management, web design, Java, Perl, CGI, …) Fall 2015©USC-CSSE27

University of Southern California Center for Software Engineering C S E USC Schedule Project scope too large for 24 weeks Initial Operational Capability (IOC) scope/content too big Critical path items that can cause delay: –COTS –Platforms –ARBs Requirements/UI mismatch Fall 2015©USC-CSSE28

University of Southern California Center for Software Engineering C S E USC COTS and External Components COTS –Immaturity of framework –Inexperience of team members –Incompatibility with application, platform or other COTS –Lack of control over COTS development GOTS/ROTS –Compatibility analysis needs to be done –Benchmarking –Inspections –Reference checking Fall 2015©USC-CSSE29

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE30 Example Risk-item Checklist: Staffing Will your project really get all the best people? Are there critical skills for which nobody is identified? Are there pressures to staff with available warm bodies? Are there pressures to overstaff in the early phases? Are the key project people compatible? Do they have realistic expectations about their project job? Do their strengths match their assignment? Are they committed full-time? Are their task prerequisites (training, clearances, etc.) satisfied?

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE31 Risk ID: Examining Decision Drivers Political versus Technical –Choice of equipment – Choice of subcontractor –Schedule, Budget –Allocation of responsibilities Marketing versus Technical –Gold plating –Choice of equipment –Schedule, budget Solution-driven versus Problem-driven –In-house components, tools –Artificial intelligence –Schedule, Budget Short-term versus Long-term –Staffing availability versus qualification –Reused software productions engineering –Premature SRR, PDR Outdated Experience

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE32 Potential Win-lose, Lose-lose Situations Quick, cheap, sloppy product Lots of bells and whistles Driving too hard a bargain Developer Customer “Winner” Developer Customer Developer Customer User Customer Developer Loser Actually, nobody wins in these situations

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE33 Watch Out For Compound Risks Pushing technology on more than one front Pushing technology with key staff shortages Vague user requirements with ambitious schedule Untried hardware with ambitious schedule Unstable interfaces with untried subcontractor Reduce to non-compound risks if possible Otherwise, devote extra attention to compound- risk containment

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE34 The Top Ten Software Risk Items Risk ItemRisk Management Techniques 1. Personnel ShortfallsStaffing with top talent; key personnel agreements; incentives; team-building; training; tailoring process to skill mix; peer reviews 2. Unrealistic schedules and budgets 4. Requirements mismatch; gold plating 5. User interface mismatch Business case analysis; design to cost; incremental development; software reuse; requirements descoping; adding more budget and schedule Stakeholder win-win negotiation; business case analysis; mission analysis; ops-concept formulation; user surveys; prototyping; early users’ manual; design/develop to cost Prototyping; scenarios; user characterization (functionality, style, workload) 3. COTS; external componentsQualification testing; benchmarking; prototyping; reference checking; compatibility analysis; vendor analysis; evolution support analysis

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE35 The Top Ten Software Risk Items (Concluded) 7. Requirements changes 9. Externally-performed tasks 6. Architecture, performance, quality 10. Straining Computer Science capabilities High change threshold; information hiding; incremental development (defer changes to later increments) Reference checking; pre-award audits; award-fee contracts; competitive design or prototyping; team-building Architecture tradeoff analysis and review boards; simulation; benchmarking; modeling; prototyping; instrumentation; tuning Technical analysis; cost-benefit analysis; prototyping; reference checking 8. Legacy softwareDesign recovery; phaseout options analysis; wrappers/mediators; restructuring

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE36 Network Schedule Risk Analysis... EV = 4 months 4 Equally Likely Outcomes 2, p = 0.5 6, p = 0.5 2, p = 0.5 6, p = months _6_ 20 _20_ 4 = 5 MONTHSEV =

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE37 Prioritizing Risks: Risk Exposure Risk Exposure - (Probability) (Loss of Utility) Risk Probability High Low Check Utility - Loss Estimate Little Risk Low Loss of Utility High Check Probability Estimate Major Risk

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE38 Risk Exposure Factors (Satellite Experiment Software) Unsatisfactory Outcome (UO) Prob (UO) Loss (UO) Risk Exposure A. S/ W error kills experiment B. S/ W error loses key data C. Fault tolerance features cause unacceptable performance D. Monitoring software reports unsafe condition as safe E. Monitoring software reports safe condition as unsafe F. Hardware delay causes schedule overrun G. Data reduction software errors cause extra work H. Poor user interface causes inefficient operation I. Processor memory insufficient J. DBMS software loses derived data

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE39 Risk Exposure Factors and Contours: Satellite Experiment Software

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE40 Risk Reduction Leverage (RRL) RRL - RE BEFORE - RE AFTER RISK REDUCTION COST · Spacecraft Example LOSS (UO) PROB (UO) RE B B LONG DURATION TEST $20M 0.2 $4M FAILURE MODE TESTS $20M 0.2 $4M PROB (UO) RE A A 0.05 $1M 0.07 $1.4M COST$2M$0.26M RRL = = 10

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE41 Software Risk Management

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE42 Risk Management Plans For Each Risk Item, Answer the Following Questions: 1. Why? Risk Item Importance, Relation to Project Objectives 2. What, When? Risk Resolution Deliverables, Milestones, Activity Nets 3. Who, Where? Responsibilities, Organization 4. How? Approach (Prototypes, Surveys, Models, …) 5. How Much? Resources (Budget, Schedule, Key Personnel)

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE43 Risk Management Plan: Fault Tolerance Prototyping 1. Objectives (The “Why”) –Determine, reduce level of risk of the software fault tolerance features causing unacceptable performance –Create a description of and a development plan for a set of low-risk fault tolerance features 2. Deliverables and Milestones (The “What” and “When”) –By week 3 1. Evaluation of fault tolerance option 2. Assessment of reusable components 3. Draft workload characterization 4. Evaluation plan for prototype exercise 5. Description of prototype –By week 7 6. Operational prototype with key fault tolerance features 7. Workload simulation 8. Instrumentation and data reduction capabilities 9. Draft Description, plan for fault tolerance features –By week Evaluation and iteration of prototype 11. Revised description, plan for fault tolerance features

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE44 Risk Management Plan: Fault Tolerance Prototyping ( concluded ) Responsibilities (The “Who” and “Where”) –System Engineer: G. Smith Tasks 1, 3, 4, 9, 11, support of tasks 5, 10 –Lead Programmer: C. Lee Tasks 5, 6, 7, 10 support of tasks 1, 3 –Programmer: J. Wilson Tasks 2, 8, support of tasks 5, 6, 7, 10 Approach (The “How”) –Design-to-Schedule prototyping effort –Driven by hypotheses about fault tolerance-performance effects –Use real-time OS, add prototype fault tolerance features –Evaluate performance with respect to representative workload –Refine Prototype based on results observed Resources (The “How Much”) $60K - Full-time system engineer, lead programmer, programmer (10 weeks)*(3 staff)*($2K/staff-week) $0K - 3 Dedicated workstations (from project pool) $0K - 2 Target processors (from project pool) $0K - 1 Test co-processor (from project pool) $10K - Contingencies $70K - Total

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE45 Risk Monitoring Milestone Tracking –Monitoring of risk Management Plan Milestones Top-10 Risk Item Tracking –Identify Top-10 risk items –Highlight these in monthly project reviews –Focus on new entries, slow-progress items Focus review on manger-priority items Risk Reassessment Corrective Action

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE46 Project Top 10 Risk Item List: Satellite Experiment Software Risk Item Mo. Ranking This Last #Mo. Risk Resolution Progress Replacing Sensor-Control Software Top Replacement Candidate Unavailable Developer Target Hardware Delivery Delays Procurement Procedural Delays Sensor Data Formats Undefined Action Items to Software, Sensor Teams; Due Next Month Staffing of Design V&V Team Key Reviewers Committed; Need Fault- Tolerance Reviewer Software Fault-Tolerance May Fault Tolerance Prototype Successful Compromise Performance Accommodate Changes in Data Meeting Scheduled With Data Bus Bus Design Designers Testbed Interface Definitions Some Delays in Action Items; Review Meeting Scheduled User Interface Uncertainties User Interface Prototype Successful TBDs In Experiment Operational TBDs Resolved Concept Uncertainties In Reusable Required Design Changes Small, Monitoring Software Successfully Made

University of Southern California Center for Software Engineering C S E USC Fall 2015©USC-CSSE47 Conclusions Risk management starts on Day One –Delay and denial are serious career risks –Data provided to support early investment Win Win spiral model provides process framework for early risk resolution –Stakeholder identification and win condition reconciliation –Anchor point milestones Risk analysis helps determine “how much is enough” –Testing, planning, specifying, prototyping,… –Buying information to reduce risk