Managing risk : methods for software systems development / Elaine M. Hall.
By: Hall, Elaine M.
Material type: BookSeries: SEI series in software engineering.Publisher: Reading, Mass. ; Harlow, England : Addison-Wesley, c1998Description: xxi, 374 p. : ill. ; 24 cm. + hbk.ISBN: 0201255928.Subject(s): Computer software | Risk managementDDC classification: 005.10681Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
General Lending | MTU Bishopstown Library Lending | 005.10681 (Browse shelf(Opens below)) | 1 | Available | 00086069 | ||
General Lending | MTU Bishopstown Library Lending | 005.10681 (Browse shelf(Opens below)) | 1 | Available | 00086068 |
Enhanced descriptions from Syndetics:
"The increasing rate of technological change we are experiencing in our lifetime yields competitive advantage to organizations and individuals who are willing to embrace risk and the opportunities it presents. Those who choose to minimize or avoid risk, as opposed to managing it, set a course for obsolescence. Hall has captured the essence of risk management and given us a practical guide for the application of useful principles in software-intensive product development. This is must reading for public and private sector managers who want to succeed as we begin the next century." - Daniel P. Czelusniak, Director, Acquisition Program Integration Office of the Under Secretary of Defense (Acquisition and Technology) The Pentagon
"Since it is more than just common sense, the newcomer to risk management needs an intelligent guide. It is in this role that Elaine Hall's book excels. This book provides a set of practical and well-delineated processes for implementation of the discipline." - Tom DeMarco, from the Foreword Risk is inherent in the development of any large software system. A common approach to risk in software development is to ignore it and hope that no serious problems occur. Leading software companies use quantitative risk management methods as a more useful approach to achieve success. Written for busy professionals charged with delivering high-quality products on time and within budget, Managing Risk is a comprehensive guide that describes a success formula for managing software risk. The book is divided into five parts that describe a risk management road map designed to take you from crisis to control of your software project. Highlights include:Six disciplines for managing product development. Steps to predictable risk-management process results. How to establish the infrastructure for a risk-aware culture. Methods for the implementation of a risk management plan. Case studies of people in crisis and in control.
Includes bibliographical references and index.
Part I: Risk Management Discovery -- Software Risk Management -- P2I2 success formula -- Risk management MAP -- Part II: Risk Management Process -- Identify risk -- Analyze risk -- Plan risk -- Track risk -- Resolve risk -- Part III: Risk Management Infrastructure -- Develop the policy -- Define standard process -- Train risk technology -- Verify compliance -- Improve practice -- Part IV: Risk Management Implementation -- Establish the initiative -- Develop the plan -- Tailor the standard process -- Assess risk -- Control risk -- Part V: People in Crisis and Control -- Stage 1: Problem -- Stage 2: Mitigation -- Stage 3: Prevention -- Stage 4: Anticipation -- Stage 5: Opportunity.
Table of contents provided by Syndetics
- Foreword: Running Toward Risk (p. xiii)
- Preface (p. xv)
- About the Author (p. xxi)
- Part I Risk Management Discovery (p. 1)
- Chapter 1 Software Risk Management (p. 3)
- 1.1 Foundations (p. 4)
- 1.2 Risk in the Large (p. 12)
- 1.3 Risk in the Small (p. 17)
- 1.4 Consequences of Knowledge (p. 22)
- 1.5 Consequences of lgnorance (p. 23)
- 1.6 Summary (p. 23)
- 1.7 Questions for Discussion (p. 24)
- 1.8 References (p. 25)
- Chapter 2 P[superscript 2]I[superscript 2] Success Formula (p. 29)
- 2.1 Major Factors in Risk Management Capability (p. 30)
- 2.2 People: The Human Element (p. 32)
- 2.3 Process: The Steps to Manage Risk (p. 39)
- 2.4 Infrastructure: The Organizational Foundation (p. 42)
- 2.5 Implementation: The Project Execution (p. 45)
- 2.6 Summary (p. 47)
- 2.7 Questions for Discussion (p. 48)
- 2.8 References (p. 49)
- Chapter 3 Risk Management Map (p. 51)
- 3.1 The Road to Risk Management Capability (p. 53)
- 3.2 Risk Management Map Directions (p. 54)
- 3.3 Journey from Problem to Opportunity (p. 57)
- 3.4 Journey from Novice to Expert (p. 61)
- 3.5 Summary (p. 62)
- 3.6 Questions for Discussion (p. 64)
- 3.7 References (p. 65)
- Part II Risk Management Process (p. 67)
- Chapter 4 Identify Risk (p. 69)
- 4.1 Define the Risk Identification Process (p. 70)
- 4.2 Develop Risk Checklists (p. 75)
- 4.3 Define the Risk Assessment Method (p. 78)
- 4.4 Develop the Risk Management Form (p. 82)
- 4.5 Establish the Risk Database Schema (p. 82)
- 4.6 Summary (p. 84)
- 4.7 Questions for Discussion (p. 84)
- 4.8 References (p. 85)
- Chapter 5 Analyze Risk (p. 87)
- 5.1 Define the Risk Analysis Process (p. 88)
- 5.2 Define Risk Analysis Techniques (p. 93)
- 5.3 Define Risk Evaluation Criteria (p. 100)
- 5.4 Establish the Risk Prioritization Scheme (p. 102)
- 5.5 Summary (p. 102)
- 5.6 Questions for Discussion (p. 103)
- 5.7 References (p. 104)
- Chapter 6 Plan Risk (p. 107)
- 6.1 Define the Risk Planning Process (p. 108)
- 6.2 Define Risk Resolution Strategies (p. 112)
- 6.3 Define Selection Criteria (p. 115)
- 6.4 Develop the Risk Action Plan Template (p. 116)
- 6.5 Summary (p. 117)
- 6.6 Questions for Discussion (p. 118)
- 6.7 References (p. 119)
- Chapter 7 Track Risk (p. 121)
- 7.1 Define the Risk Tracking Process (p. 122)
- 7.2 Define Risk Tracking Techniques (p. 125)
- 7.3 Define Risk Measures and Metrics (p. 129)
- 7.4 Define Triggering Devices (p. 130)
- 7.5 Summary (p. 131)
- 7.6 Questions for Discussion (p. 132)
- 7.7 References (p. 133)
- Chapter 8 Resolve Risk (p. 135)
- 8.1 Define the Risk Resolution Process (p. 136)
- 8.2 Define Risk Resolution Techniques (p. 141)
- 8.3 Define Risk Management Return on Investment (p. 143)
- 8.4 Develop a Corrective Action Procedure (p. 144)
- 8.5 Summary (p. 145)
- 8.6 Questions for Discussion (p. 146)
- 8.7 References (p. 146)
- Part III Risk Management Infrastructure (p. 149)
- Chapter 9 Develop the Policy (p. 151)
- 9.1 Obtain Commitment (p. 152)
- 9.2 Allocate Resources (p. 153)
- 9.3 Survey Existing Practice (p. 155)
- 9.4 Define Draft Policy (p. 158)
- 9.5 Review Draft Policy (p. 159)
- 9.6 Document Policy (p. 160)
- 9.7 Approve Policy (p. 161)
- 9.8 Communicate Policy (p. 161)
- 9.9 Summary (p. 161)
- 9.10 Questions for Discussion (p. 162)
- 9.11 References (p. 163)
- Chapter 10 Define Standard Process (p. 165)
- 10.1 Establish an Action Team (p. 166)
- 10.2 Develop the Draft Standard Process (p. 171)
- 10.3 Review the Draft Standard Process (p. 177)
- 10.4 Document the Standard Process (p. 178)
- 10.5 Approve the Standard Process (p. 179)
- 10.6 Distribute the Standard Process (p. 179)
- 10.7 Summary (p. 180)
- 10.8 Questions for Discussion (p. 181)
- 10.9 References (p. 181)
- Chapter 11 Train Risk Technology (p. 183)
- 11.1 Prepare for Training (p. 184)
- 11.2 Develop Training Material (p. 184)
- 11.3 Apply Training Metrics (p. 187)
- 11.4 Deliver Training (p. 188)
- 11.5 Obtain Training Feedback (p. 189)
- 11.6 Summary (p. 190)
- 11.7 Questions for Discussion (p. 191)
- 11.8 References (p. 191)
- Chapter 12 Verify Compliance (p. 193)
- 12.1 Review the Risk Management Plan (p. 194)
- 12.2 Audit Agents and Artifacts (p. 195)
- 12.3 Generate an Audit Report (p. 197)
- 12.4 Track Action Items (p. 198)
- 12.5 Summary (p. 199)
- 12.6 Questions for Discussion (p. 199)
- 12.7 References (p. 200)
- Chapter 13 Improve Practice (p. 201)
- 13.1 Develop an Appraisal Method (p. 202)
- 13.2 Assess Risk Practices (p. 204)
- 13.3 Develop an Improvement Plan (p. 205)
- 13.4 Implement the Improvement Plan (p. 206)
- 13.5 Summary (p. 207)
- 13.6 Questions for Discussion (p. 207)
- 13.7 References (p. 208)
- Part IV Risk Management Implementation (p. 209)
- Chapter 14 Establish the Initiative (p. 211)
- 14.1 Review Risk Management Requirements (p. 212)
- 14.2 Plan Risk Management Activities (p. 214)
- 14.3 Budget Risk Management Activities (p. 215)
- 14.4 Schedule Risk Management Activities (p. 215)
- 14.5 Staff Risk Management Activities (p. 217)
- 14.6 Coordinate Risk Management Training (p. 217)
- 14.7 Summary (p. 218)
- 14.8 Questions for Discussion (p. 218)
- 14.9 References (p. 219)
- Chapter 15 Develop the Plan (p. 221)
- 15.1 Outline the Risk Management Plan (p. 222)
- 15.2 Define Risk Management Goals (p. 222)
- 15.3 Define the Risk Management Strategy (p. 223)
- 15.4 Define the Risk Management Process (p. 226)
- 15.5 Define Risk Management Verification (p. 226)
- 15.6 Define Risk Management Mechanisms (p. 226)
- 15.7 Summary (p. 228)
- 15.8 Questions for Discussion (p. 228)
- 15.9 References (p. 229)
- Chapter 16 Tailor the Standard Process (p. 231)
- 16.1 Review the Standard Process (p. 232)
- 16.2 Examine Tailoring Options (p. 233)
- 16.3 List Unique Project Factors (p. 234)
- 16.4 Recommend Process Changes (p. 234)
- 16.5 Document Standard Process Deviations (p. 235)
- 16.6 Summary (p. 236)
- 16.7 Questions for Discussion (p. 237)
- 16.8 References (p. 237)
- Chapter 17 Assess Risk (p. 239)
- 17.1 Conduct a Risk Assessment (p. 240)
- 17.2 Develop a Candidate Risk List (p. 243)
- 17.3 Define Risk Attributes (p. 245)
- 17.4 Document Identified Risk (p. 246)
- 17.5 Communicate Identified Risk (p. 247)
- 17.6 Estimate and Evaluate Risk (p. 247)
- 17.7 Prioritize Risk (p. 247)
- 17.8 Summary (p. 253)
- 17.9 Questions for Discussion (p. 255)
- 17.10 References (p. 255)
- Chapter 18 Control Risk (p. 257)
- 18.1 Develop Risk Resolution Alternatives (p. 258)
- 18.2 Select the Risk Resolution Strategy (p. 259)
- 18.3 Develop the Risk Action Plan (p. 260)
- 18.4 Monitor Risk Status (p. 261)
- 18.5 Execute the Risk Action Plan (p. 265)
- 18.6 Take Corrective Action as Required (p. 265)
- 18.7 Summary (p. 266)
- 18.8 Questions for Discussion (p. 267)
- 18.9 References (p. 267)
- Part V People in Crisis and Control (p. 269)
- Chapter 19 Stage 1: Problem (p. 271)
- 19.1 Problem Project Overview (p. 272)
- 19.2 The Process Improvement Initiative (p. 272)
- 19.3 Process Assessment (p. 277)
- 19.4 Process Assessment Results (p. 281)
- 19.5 Initiative Hindsight (p. 284)
- 19.6 Summary and Conclusions (p. 287)
- 19.7 Questions for Discussion (p. 287)
- 19.8 References (p. 288)
- Chapter 20 Stage 2: Mitigation (p. 289)
- 20.1 Mitigation Project Overview (p. 290)
- 20.2 Risk Assessment Preparation (p. 291)
- 20.3 Risk Assessment Training (p. 293)
- 20.4 Project Risk Assessment (p. 294)
- 20.5 Project Risk Management (p. 299)
- 20.6 Project Risk Retrospective (p. 301)
- 20.7 Summary and Conclusions (p. 304)
- 20.8 Questions for Discussion (p. 305)
- 20.9 References (p. 306)
- Chapter 21 Stage 3: Prevention (p. 307)
- 21.1 Prevention Project Overview (p. 308)
- 21.2 Risk Assessment Results (p. 313)
- 21.3 Risk Manager (p. 317)
- 21.4 Risk Practice Survey (p. 321)
- 21.5 Risk Practice Observations (p. 323)
- 21.6 Summary and conclusions (p. 324)
- 21.7 Questions for Discussion (p. 325)
- 21.8 References (p. 325)
- Chapter 22 Stage 4: Anticipation (p. 327)
- 22.1 Anticipation Project Overview (p. 328)
- 22.2 Proactive Risk Management (p. 328)
- 22.3 Organization Measurement Practices (p. 331)
- 22.4 Risk Management Committee (p. 332)
- 22.5 Living Lifecycle Model (p. 334)
- 22.6 Summary and Conclusions (p. 340)
- 22.7 Questions for Discussion (p. 341)
- 22.8 References (p. 342)
- Chapter 23 Stage 5: Opportunity (p. 343)
- 23.1 Opportunity Project Overview (p. 344)
- 23.2 Fixed-Price Problems (p. 346)
- 23.3 Routine Risk Management (p. 348)
- 23.4 High-Performance Engineering (p. 350)
- 23.5 The Power Pyramid (p. 352)
- 23.6 Summary and Conclusions (p. 354)
- 23.7 Questions for Discussion (p. 355)
- 23.8 References (p. 355)
- Epilogue (p. 357)
- Glossary (p. 359)
- Index (p. 369)
Excerpt provided by Syndetics
Author notes provided by Syndetics
Elaine M. Hall is founder of Level 6 Software, a leading consulting group in discovery methods for software engineering. She conducts training seminars and supports the implementation of software risk management for both government and industry clients worldwide. Dr. Hall is chair of the risk management working group for the International Council on Systems Engineering. She has nearly 20 years of experience in software systems engineering and management.
0201255928AB04062001