waterfall model plus defined artifact deliverable development stage→testing phase
What are the Advantages?
• Simple and easy management
• Rigid and sequential deliverable • Documentation produced
Copyright By PowCoder代写 加微信 powcoder
• Requirements stable and precise
What are the Disadvantages?
• Requires discipline
• Bad news known late in process
• Client feedback known late in process • Discourages change
• Test artifacts are expensive
• Risks and changes have big impact
School of Computing and Information Systems
The University of Melbourne
Copyright University of Melbourne 2021-2022
2022 – Semester 1 Week 3
Software Processes & Project Management
Risk Management Case Study
Risk vs Uncertainty
• Risk is different to uncertainty although they are related.
– Uncertainty that has an impact
– E.g. If you have placed a bet on the sporting event, or have some other personal stake in it, then there is risk associated with the outcome of the sporting event
• Uncertainty:
– Lack of complete certainty about an event/outcome – The event/outcome has a probability of less than 1 – E.g. outcome of a sporting event
Risk is a result of uncertainty but not every uncertainty is a risk.
SWEN90016 Software Processes and Project Management -3- Risk Management
RECAP – Risk Management (Formal)
Kinds of Risks:
Project Product Business
1. Plan Risk Management
2. Identify Risks
3. Perform Qualitative Risk Analysis 4. Perform Quantitative Risk Analysis 5. Plan Risk Responses
6. Control Risks
Identification Techniques:
Risk Planning
Risk Management Plan
Interviewing
Brainstorming
Checklists
SWOT Analysis
SWEN90016 Software Processes and Project Management -4- Risk Management
Kinds of Risk
• Project risks
– Affect the planning of the project
e.g. Budget, Schedule, Scope, Personnel, etc.
• Product risks
– Affect the quality or performance of the outcome being
e.g. Design problems, implementation problems, interface problems, maintenance problems, verification problems
• Business risks
– Affect the economic success of the project
e.g. No demand for product, loss of management support, loss of external funding for the project etc.
SWEN90016 Software Processes and Project Management -5- Risk Management
Delphi Technique
• Delphi Technique
– A group of experts are asked to identify risks and their impact
– The responses are them made available to each other anonymously
– The experts are then asked to update their response based on the responses of others – repeated until consensus is reached
SWEN90016 Software Processes and Project Management -6- Risk Management
Delphi Technique
• Probability of risks
– Risk 1: The Lecture Capture equipment (screen recording, audio) stops working
– Risk 2: Less than half of the students participate in interactive activities
– Risk 3: Lecture theatre is double-booked
SWEN90016 Software Processes and Project Management -7- Risk Management
Agile Risk Management- Identification
Griffiths, M. (Aug 2012). Collaborative Games for Risk Management A walkthrough of the method and games used to implement a whole team approach to proactive risk management. https://leadinganswers.typepad.com/files/collabortive-games-for-agile-risk-management-1.pdf
Agile Risk Management- Analysis
Griffiths, M. (Aug 2012). Collaborative Games for Risk Management A walkthrough of the method and games used to implement a whole team approach to proactive risk management. https://leadinganswers.typepad.com/files/collabortive-games-for-agile-risk-management-1.pdf
Agile Risk Management
Identify – Capture risks in Product Backlog
Analyze – Product Backlog groomed, and priority given to all User
Stories, including those which capture risk
Respond – Mitigate Risk in Sprint
Monitor – During Sprint Review, Retrospective & Planning leadinganswers.typepad.com/leading_answers/2007/09/agile-risk-mana.html
Agile Risk Process
Sprint Review risk evaluation
The format of a risk item in the Product Backlog can vary Optionally use Feature-Driven Development (FDD)
syntax, (when the role is not obvious)
www.mountaingoatsoftware.com/blog/not-everything-needs-to-be-a-user-story-using-fdd-features
Agile Risk Management
An FDD feature is written in this format: [action] the [result] [by|for|of|to] a(n) [object] As examples, consider these:
Estimate the closing price of stock
Generate a unique identifier for a transaction Change the text displayed on a kiosk
Merge the data for duplicate transactions
https://www.mountaingoatsoftware.com/blog/not-everything-needs-to-be-a-user-story-using-fdd-features
Scrum master manages risk daily by removing impediments- just in time
Product owner- Business risk managed by product owner; Add risk items; Prioritisation of Product Backlog
Developers – Cost estimation Story Points
Dev team + Product owner/client – Daily Stand-ups, Sprint planning, Sprint Retrospective and Sprint Review
(Formal) Risk Identification
Risk identification techniques
– Pondering
– Interviewing
– Brainstorming (WBS) learn about in project scheduling! – Checklists:
– Delphi Technique:
– SWOT Analysis
SWEN90016 Software Processes and Project Management -27- Risk Management
SWOT Analysis
• Strengths: characteristics of the business or project that give it an advantage over others
• Weaknesses: characteristics that place the business or project at a disadvantage relative to others
• Opportunities: elements in the environment that the business or project could exploit to its advantage
• Threats: elements in the environment that could cause trouble for the business or project
SWEN90016 Software Processes and Project Management -28- Risk Management
Google Checkout was an
Online payment processing service provided by Google
Aimed at simplifying the process of paying for online purchases
Discontinued on November 20, 2013 and the service moved to Google Wallet (now called Google Pay).[1]
Users would store their credit or debit card and shipping information in their Google account
Purchase at participating stores by clicking an on-screen button.
Google Checkout provided fraud protection and a unified page for tracking purchases and their status.
https://en.wikipedia.org/wiki/Google_Checkout
Risk Analysis
SWOT analysis of Google Checkout. Strengths, Weaknesses, Opportunities and Threats
Fenwick, David & Daim, Tugrul & Gerdsri, Nathasit. (2009). Value Driven Technology Road Mapping (VTRM) process integrating decision making and marketing tools: Case of Internet security technologies. Technological Forecasting and Social Change – TECHNOL FORECAST SOC CHANGE. 76. 1055-1077. 10.1016/j.techfore.2009.04.005.
SWEN90016 Software Processes and Project Management -31- Risk Management
Risk Analysis
SWOT analysis of Google Checkout. Strengths, Weaknesses, Opportunities and Threats
Fenwick, David & Daim, Tugrul & Gerdsri, Nathasit. (2009). Value Driven Technology Road Mapping (VTRM) process integrating decision making and marketing tools: Case of Internet security technologies. Technological Forecasting and Social Change – TECHNOL FORECAST SOC CHANGE. 76. 1055-1077. 10.1016/j.techfore.2009.04.005.
SWEN90016 Software Processes and Project Management -33- Risk Management
Risk Analysis
SWOT analysis of Google Checkout. Strengths, Weaknesses, Opportunities and Threats
Fenwick, David & Daim, Tugrul & Gerdsri, Nathasit. (2009). Value Driven Technology Road Mapping (VTRM) process integrating decision making and marketing tools: Case of Internet security technologies. Technological Forecasting and Social Change – TECHNOL FORECAST SOC CHANGE. 76. 1055-1077. 10.1016/j.techfore.2009.04.005.
SWEN90016 Software Processes and Project Management -35- Risk Management
Risk Analysis
SWOT analysis of Google Checkout. Strengths, Weaknesses, Opportunities and Threats
Fenwick, David & Daim, Tugrul & Gerdsri, Nathasit. (2009). Value Driven Technology Road Mapping (VTRM) process integrating decision making and marketing tools: Case of Internet security technologies. Technological Forecasting and Social Change – TECHNOL FORECAST SOC CHANGE. 76. 1055-1077. 10.1016/j.techfore.2009.04.005.
SWEN90016 Software Processes and Project Management -37- Risk Management
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com