rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780849305245

Applied Software Risk Management: A Guide for Software Project Managers

by ;
  • ISBN13:

    9780849305245

  • ISBN10:

    0849305241

  • Format: Hardcover
  • Copyright: 2006-12-15
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $135.00 Save up to $88.82
  • Rent Book $91.13
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Applied Software Risk Management: A Guide for Software Project Managers [ISBN: 9780849305245] for the semester, quarter, and short term or search our site for other textbooks by Pandian; C. Ravindranath. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis.Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.

Table of Contents

Risk Culturep. 1
Risk Thinkingp. 1
What Is Risk?p. 2
A Boundary Problemp. 3
Expressing Risk: The Basic Termsp. 6
Additional Termsp. 6
Risk Vocabularyp. 6
Risk-Driven Project Managementp. 7
Project Visibilityp. 7
Goal Settingp. 7
Product Developmentp. 7
Developmentp. 8
Maintenancep. 9
Supply Chainp. 9
Controlling the Process, Environment, and Riskp. 10
Process Management and Risk Managementp. 10
SPC and Riskp. 10
Five S and Riskp. 10
Defect Prevention and Risk Managementp. 11
Maturity in Risk Culturep. 11
Risk Scalep. 13
Case Studyp. 14
Background Datap. 14
Commentsp. 14
What Do We Learn from This Example?p. 15
Preparing for Riskp. 15
Peoplep. 15
Communicationp. 16
Body of Knowledgep. 16
Metricsp. 16
Estimation Modelsp. 17
Detailed Planningp. 17
Effective Defect Managementp. 17
Risk Management Processp. 19
What Is Risk Management?p. 19
Risk or Opportunity?p. 20
Risk Management Paradigmsp. 21
Is There a Process?p. 23
In Real Lifep. 23
Five Models for Risk Managementp. 24
The Core Modelsp. 24
Superstructure Modelsp. 24
Application of the Modelsp. 24
Model 1: The Organic Risk Management Processp. 25
An Analogyp. 25
Commentsp. 26
Model 2: Goal Selectionp. 26
Thinking about Less Risky Alternativesp. 27
Category 1 Risk-Informed Project Objectivesp. 27
Category 2 Risk-Informed Product Goalsp. 27
Category 3 Risk-Informed Requirement Managementp. 27
Category 4 Risk-Informed Milestone. Designp. 28
Category 5 Risk-Informed WBSp. 28
Model 3: Minimum Risk Managementp. 28
Creating Risk Awareness Is Risk Managementp. 29
Model 4: Medium-Scale Risk Managementp. 29
Risk Management Is Acting upon Risk Awarenessp. 31
Model 5: IAMT Cyclep. 31
Model 6: Full-Scale Risk Managementp. 31
Initiative 1p. 33
Initiative 2p. 33
Initiative 3p. 33
Risk Management at Different Levelsp. 33
The Mixupp. 35
External Risks and Layersp. 35
Can We Manage Subprocess Risks?p. 35
Project-Level Risk Managementp. 36
Program-Level Risk Managementp. 36
SBU-Level Risk Managementp. 36
Enterprise Risk Managementp. 36
Risk Escalationp. 37
Risk Elevationp. 37
Troubleshooting Movep. 37
Lack of Cooperationp. 38
Risk Attributesp. 41
Risk Classificationp. 41
Risk Attributesp. 41
Risk Originp. 44
Internal Risksp. 44
External Risksp. 44
Drawing the Boundary Line between Internal and Externalp. 44
Break Boundaries Withinp. 45
External Risks: A Class Apartp. 45
Vendor Risksp. 46
Screening the Risksp. 46
Hazard Risksp. 46
Constraint Risksp. 47
Nominal Risksp. 47
Trivial Risksp. 47
Three P'sp. 47
Project Risksp. 48
Process Risksp. 49
Product Risksp. 49
Risk Severityp. 50
SEI Risk Taxonomyp. 51
Risk Levelsp. 52
Time Elementp. 52
Affected Process Areasp. 54
Affected Key Result Areas (KRA)p. 54
Affected Goalsp. 54
Affected Requirementsp. 54
Risk Namep. 54
Who Will Assign the Attributes?p. 55
Extension of Attributesp. 55
Risk Record Structurep. 55
Risk Classification Is Risk Measurementp. 56
Risk Identificationp. 57
The Meaning of Risk Identificationp. 57
Risk Identification Methodsp. 58
Type I: Intuitive Methodsp. 59
Mind Mappingp. 59
Brainstormingp. 60
Out-of-the-Box Thinkingp. 60
Analogyp. 61
Type I: History-Based Methodsp. 61
Top Ten Risksp. 61
Risk Checklistp. 63
Taxonomy-Based Questionnairep. 63
Type II: Project-Specific Risk Identificationp. 65
Phase I: Context Settingp. 65
Phase II: Data Gatheringp. 65
Phase III: Risk Discoveryp. 67
Phase IV: Assigning Attributesp. 69
Phase V: Validationp. 70
Phase VI: Listp. 72
Levels in Identificationp. 72
Process-Level Risk Identificationp. 72
Project-Level Risk Identificationp. 72
Enterprise-Level Risk Identificationp. 72
Identifying Product Risksp. 73
Distinguishing Product Risks from Process Risksp. 73
Distinguishing Product Risks from Product Defectsp. 73
Product Risk Management versus Defect Managementp. 74
Implementing Risk Identification Processesp. 74
Risk Analysisp. 81
Scope and Purpose of Risk Analysisp. 81
Bias for Actionp. 81
Risk Selectionp. 82
Types of Risk Analysisp. 82
First-Order Analysisp. 83
Analysis 1: Risk Screeningp. 83
Analysis 2: Quadrant Mapp. 84
Analysis 3: Top Ten Risks Listp. 86
Useful Risk Distribution Analysisp. 87
Analysis 4: Internal-External Risk Distributionp. 87
Analysis 5: Project, Product, Process Risk Distributionp. 88
Analysis 6: Process Risk Signaturep. 88
Analysis 7: Time Analysisp. 89
Analysis 8: Causal Analysisp. 90
Seeing the Larger Picturep. 92
Analysis 9: The Process Mapp. 92
Analysis 10: Performance Area Mapp. 93
Risk Levels and Analysis Effortp. 93
Ownerless Risksp. 94
Putting Together the Preliminary Analysesp. 94
The Analysis Reportp. 94
More Analysisp. 95
How to Implement Analysisp. 95
Responding to Riskp. 97
Getting Started 7p. 97
Special Treatment for Catastrophic Risksp. 98
Communicate Risksp. 98
Find Solutionsp. 98
Carry People Alongp. 99
The Action Planp. 99
Organizational Response to Hazardp. 100
Fallacy of Risk Ranksp. 100
Beyond Statisticsp. 100
The Constraint Risksp. 100
Responding to Ordinary Threatsp. 101
A Comparison of Two Levels of Responsep. 101
Risk Response Plansp. 102
Risk Avoidancep. 102
Risk Transferp. 102
Risk Acceptancep. 103
Risk Monitoringp. 103
Risk Mitigationp. 103
The Questionsp. 104
A Risk Mitigation Plan Case Studyp. 105
Contingency Plansp. 107
Continuous Monitoringp. 107
Triggersp. 107
The Onsetp. 108
Strategic Planp. 109
Risk Escalationp. 109
Implementing Risk Responsep. 110
Suggestionsp. 112
Risk Trackingp. 113
What Do We Track in Risks?p. 113
A Moving Targetp. 113
Tracking Risk Response Plansp. 114
Tracking the Bigger Response: Auditsp. 115
Tracking Hazard Risksp. 116
Trigger Levelsp. 116
Case Study: How Wrong Triggers Fail Risk Managementp. 117
Tracking Project Risksp. 118
Tracking until Project Endsp. 118
Milestone Risk Reviewp. 119
Performance Targets and Risksp. 119
Tracking Operational Risksp. 119
Tracking Risk Exposurep. 119
Categorywise RENp. 120
Risk Metricp. 120
Risk Closurep. 120
Tracking Enterprise Risksp. 120
Learning by Trackingp. 121
Tracking Improves Risk Managementp. 121
Surprisesp. 121
Surprise 1: No Real Riskp. 122
Surprise 2: Other Forces in Actionp. 122
Surprise 3: True Risk Definitionp. 122
Risk Tracker Toolp. 122
The Hardening of Risksp. 123
Hardening of Business Risksp. 123
Hardening of Product Risksp. 124
Hardening of Process Risksp. 125
Hardening of Project Risksp. 125
Implementing Risk Trackingp. 125
Suggestionsp. 125
Risk Modelsp. 127
Why Models?p. 127
Models Connectp. 127
Models Enable Risk Discoveryp. 127
Models Integratep. 128
Models Give Visibilityp. 128
Types of Modelsp. 129
Simple Risk Modelsp. 129
Matrix Modelsp. 129
Tree Modelsp. 130
Failure Mode Effects Analysis (FMEA)p. 132
Managing Product Risk Using FMEAp. 134
Affinity Diagramp. 137
Risk Linep. 139
Probability Density Function (pdf)p. 140
Risk Simulationp. 142
Implementing Risk Modelsp. 143
Risk Intelligencep. 145
Natural Warning Systemsp. 145
Metrics Modelsp. 146
Metrics Choicep. 146
Product Risk Metrics: An Examplep. 146
Early Indicatorsp. 147
Control Chartsp. 147
Scorecardp. 147
Earned Value Modelp. 148
Estimation Modelp. 149
Using COCOMO to Study Riskp. 149
Requirement Modelp. 151
Kano Modelp. 151
Critical Path Modelp. 154
WBS Modelp. 156
PERT Model of Riskp. 157
Task Network Scenario Ap. 157
Task Network Scenario Bp. 157
Task Network Scenario Cp. 158
Implementing Risk Intelligencep. 159
Feed Forwardp. 161
Beyond Risk-Reportsp. 161
Passing Knowledge Forwardp. 162
Risk Communication: The Critical Needp. 163
Ten Barriers to Risk Communicationp. 164
Risk Dashboardp. 165
Traffic Lightsp. 165
Risk Scorecardp. 166
Analytical Viewsp. 166
Use of Modelsp. 167
The Toolp. 167
Risk Reportsp. 169
Risk Closure Reportp. 170
Better Than SPCp. 171
Incorporating FFL in Risk Managementp. 171
Integrated Risk Managementp. 173
Economy Drivep. 173
A Problemp. 173
The Need for an Integrated Approachp. 173
Interfacesp. 174
Collaborationp. 174
The Visible and the Invisiblep. 175
Two Worldsp. 175
Connecting Threadsp. 175
An Examplep. 176
The Positive and the Negativep. 176
Program-Level Integrationp. 177
Artifacts for Risk Integrationp. 177
Decision Analysisp. 178
Strategic Business Unit (SBU)-Level Integrationp. 178
Enterprise-Level Integrationp. 178
Integrated Plansp. 178
Transfer to Other Plansp. 179
Integrated Risk Management: An Agile Processp. 179
How to Establish Integrated Risk Managementp. 180
Risk Management: Draft Proceduresp. 183
Can There Be a Procedure?p. 183
Dangers of the Stereotypep. 183
Procedure Is Only a Toolp. 183
Risk Is a Gamep. 184
The Risk Arenap. 184
Culture versus Procedurep. 184
Symptoms of Not Having a Formal Risk Management Procedurep. 184
The Anatomy of a Risk Management Procedurep. 185
Evolutionp. 185
Empathetic Initiativep. 186
The Layersp. 186
For Whom?p. 186
Implementing the Proceduresp. 187
Procedure 1: Risk Management at Project and Operations Levelp. 188
Procedure 2: Enterprise Risk Managementp. 196
Caper Jones's Riskp. 203
Rex Black's Quality Risk Listp. 205
SEI Risk Taxonomyp. 207
Top N Software Risksp. 211
PMI, Risk Management Processp. 213
IRM, Risk Management Standardp. 217
Continuous Risk Management (CRM) Paradigmp. 219
Barry Boehm's Risk Management Processp. 221
Risk Management in CMMip. 223
Requirement Risk versus Measurable Quality Attributesp. 225
Diary of a Risk Managerp. 227
Risk Glossaryp. 237
Referencesp. 239
Indexp. 243
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program