Professional Documents
Culture Documents
Chapter 6: Risk Analysis and Management Introduction According to Robert Charette risk can be defined as follows: 1. Risk concerns future happenings. 2. Risk involves change, such as change of mind, opinion, actions or places. 3. Risk involves choice, and the uncertainty that choice itself entails. Risk strategies: 1. Reactive risk strategy: a. Software team does nothing about risks until something goes wrong. b. At best, monitors the projects for likely risks. 2. Proactive Risk strategy: a. Begins long before technical work is initiated. b. Identification of potential risks (studies of probability, impact and priorities) c. Objective: AVOID RISK
Although there has been considerable debate about the proper definition of software risk, there is general agreement that risk always involves two characteristics: Uncertainty - The risk may or may not happen. There are no 100% probable risks. Loss - If a risk becomes a reality, unwanted consequences or losses will occur. When risks are analyzed, it is important to quantify the level of uncertainty and the degree of loss associated with each risk. To accomplish this different categories of risk are considered. i) Project risks threaten the project plan. If project risks become real, it is likely that the project schedule will slip and that costs will increase. Project risks identify budgetary, schedule, personnel, resource, customer and requirement related problems and their impact on a software project. ii) Technical risk threatens the quality of the software to be produced. If a technical risk becomes a reality, implementation may become difficult or impossible. Technical risks identify design, implementation, interface, verification and maintenance problems. iii) Business risks threaten the viability of the software to be built. Business risk often jeopardizes the project or the product. The most common business risks include: a) Building a product that no one wants (market risk) b) Building a product that no longer fits into the overall business strategy for the company (strategic risk) c) Building a product that the sales force doesnt know how to sell d) Losing the support of management because of a change in focus or change in people (management risk) e) Losing budgetary or personnel commitment (budget risk)
-1-
iii) Unpredictable risks: These are risks that can and do occur, but are extremely difficult to identify in advance.
-2-
CATASTR P IC OH
CR ITICAL
S ignificant N onresponsive or degradation to 2 nonachievem of ent unsupportable technical perform ance software F ailure to m the requirem eet ents would ance to a point 1 degrade systemperform where m isssion success is questionable S e reduction in om M inor delays in 2 technical software perform ance m odifications F ailure to m the requirem eet ents would 1 result in degradation of secondary m isssion M al to sm inim all R esponsive reduction in 2 technical perform ance software support F ailure to m the requirem eet ents would 1 create inconvenience or nonoperational im pact N reduction in o 2 technical perform ance
U nachievable
overrun likely delivery date F ailure results in operational delays and/or increased costs with expected values of $100k to $500k S e shortage of om P ossible slippage financial resources, in delivery date possible overruns C ost, im pacts, and/or recoverable schedule slips with expected value of $1 to $100K S ufficient financial R ealistic, achievable resources schedule E rror in m inor cost and/or schedule im pact with expected value of less than $1k P ossible budget underrun E arly achievable delivery date
MAR IN G AL
N G IB E LIG LE
-3-
Once the first four columns of the risk table have been completed, the table is sorted by probability and by impact. High probability, high impact risks percolate to the top of the table and low probability risks drop to the bottom. This accomplishes first order risk prioritization.
Figure 6.3 Risk and Management Concern. The project manager studies the resultant sorted table and defines a cut-off line. The cut-off line will be given further attention. Risks that fall below the line are re-evaluated to accomplish second order prioritization. A risk factor that has a high impact but a very low probability of occurrence should not absorb significant amount of management time. However, high impact risks with moderate to high probability and low impact risks with high probability should be carried forward into the risk analysis steps that follow. All risks that lie above the cut-off line must be managed. Making individual estimates and then developing a single consensus value can determine risk probability. Although that approach is workable, more sophisticated techniques for determining risk probability have been developed. Risk drivers can be assessed on a qualitative probability scale that has the following values: impossible, improbable, probable and frequent. Mathematical probability can then be associated with each qualitative value. For example, a probability of 0.7 to 1.0 implies a highly probable risk.
-4-
Impact values: 1 . catastrophic 2 . critical 3 . marginal 4 . negligible 4.3.2 Assessing risk impact
Three factors affect the consequences that are likely if a risk does occur: i) Nature of risk: This indicates the problems that are likely if the risk occurs. ii) Scope: This combines the severity of the risk with its overall distribution. iii) Timing: This determines when the impact of the risk will be felt and for how long. The overall risk exposure RE is determined using the following relationship: RE = P X C -------------------Eqn. (4.1) where P is the probability that the risk will occur and C is the cost to the project should the risk occur.
-5-
For assessment to be useful, a risk referent level must be defined. For most software projects, the risk component discussed earlier : performance, cost, support and schedule also represent risk referent levels. That is, there is a level for performance degradation, cost overrun, support difficulty, or schedule slippage (or any combination of the four) that will cause the project to be terminated. If a combination of the problems cause one or more of these reference levels to be exceeded, work will stop. In the context of software risk analysis, a risk referent level has a single point, called the reference point or break point, at which the decision to proceed with the project or terminate it, are equally weighed. Figure 4.2 represents this situation graphically. In reality, the referent level can be rarely be represented as a smooth line on a graph. In most cases it is a region in which there are areas of uncertainty; that is, attempting to predict a management decision based on the combination of referent values is often impossible. Therefore, during risk assessment, we perform the following steps: Define the risk referent levels for the project Attempt to develop a relationship between ri , ii, xi and each of the referent levels Predict the set of referent points that define a region of termination, bounded by a curve or areas of uncertainty Try to predict how compound combinations of risks will affect a referent level
-6-
high turnover is estimated to be 0.7 (70%, rather high) and the impact, xi, is projected at level 2 . That is, high turnover will have a critical impact on project cost and schedule. To mitigate this risk, project management must develop a strategy for reducing turnover. Among the possible steps to be taken are: i) Meet with current staff to determine causes for turnover. (e.g. poor working conditions, low pay, competitive job market, etc.) ii) Mitigate those causes that are under our control before the project starts. iii) Once the project commences, assume turnover will occur and develop techniques to ensure continuity when people leave. iv) Organize project teams so that information about each development activity is widely dispersed. v) Define documentation standards and establish mechanisms to be sure that documents are developed in a timely manner. vi) Conduct peer reviews of all work so that more than one person is up to speed. vii) Assign a backup staff member for every critical technologist. As the project proceeds, risk-monitoring activities commence. The project manager monitors factors that may provide an indication of whether the risk is becoming more or less likely. In case of high staff turnover, the following factors can be monitored: General attitude of team members based on project pressures. The degree to which the team has jelled. Interpersonal relationships among team members. Potential problems with compensation and benefits. The availability of jobs within the company and outside it. In addition to monitoring these factors, the project manager should monitor the effectiveness of risk mitigation steps. For example, risk mitigation steps are mechanisms to be sure that documents are developed in a timely manner. This is one mechanism for ensuring continuity, should a critical individual leave the project. The project manager should monitor documents carefully to ensure that each can stand on its own and that each imparts information that would be necessary if a newcomer were forced to join the software team somewhere in the middle of the project. Risk management and contingency planning assumes that mitigation efforts have failed and that the risk has become a reality. Continuing the example, the project is well underway and a number of people announce that they will be leaving. If the mitigation strategy has been followed, backup is available, information is documented, and knowledge has been dispersed across the team. In addition, the project manager may temporarily refocus resources (and readjust the project schedule) to those functions that are fully staffed, enabling newcomers who must be added to the team to get up to speed. Those individuals who are leaving are asked to stop all work and spend their last weeks in knowledge transfer mode. This might include video-based knowledge capture, the development of commentary documents, and/or meeting with other team members who will remain on the project. It is important to note that RMMM steps incur additional project cost. For example, spending time to backup every critical technologist costs money. Part of risk management, therefore, is to evaluate when the benefits accrued by the RMMM steps are outweighed by the costs associated with implementing them. In essence, the project planner performs a classic cost benefit analysis. If risk aversion steps for high turnover will increase both project cost and duration by an estimated 15 percent, but this predominant cost factor is backup, management may decide not to
-7-
implement this step. On the other hand, if the risk aversion steps are projected to increase costs by 5 percent and duration by only 3 percent management will likely implement it all. For a large project, 30 to 40 days of risk may be identified. If between three and seven risk management steps are identified for each, risk management may become a project in itself.
-8-