Pandian | Applied Software Risk Management | E-Book | www.sack.de
E-Book

E-Book, Englisch, 264 Seiten

Pandian Applied Software Risk Management

A Guide for Software Project Managers
1. Auflage 2006
ISBN: 978-0-8493-0531-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

A Guide for Software Project Managers

E-Book, Englisch, 264 Seiten

ISBN: 978-0-8493-0531-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis.

Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.

Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.

Pandian Applied Software Risk Management jetzt bestellen!

Zielgruppe


Software development managers, software project managers, and IT managers.


Autoren/Hrsg.


Weitere Infos & Material


RISK CULTURE

Risk Thinking
What Is Risk?

A Boundary Problem

Expressing Risk: The Basic Terms
Risk Vocabulary
Risk-Driven Project Management

Controlling the Process, Environment, and Risk

Maturity in Risk Culture
Risk Scale

Preparing for Risk

RISK MANAGEMENT PROCESS

What Is Risk Management?
Risk Management Paradigms
Is There a Process?
In Real Life

Five Models for Risk Management

Model 1: The Organic Risk Management Process
Model 2: Goal Selection

Thinking about Less Risky Alternatives
Model 3: Minimum Risk Management
Model 4: Medium-Scale Risk Management

Model 5: IAMT Cycle

Model 6: Full-Scale Risk Management
Risk Management at Different Levels

Risk Escalation

RISK ATTRIBUTES

Risk Classification

Risk Attributes
Risk Origin

Screening the Risks

Three P's

Risk Severity
SEI Risk Taxonomy

Risk Levels

Time Element
Affected Process Areas
Affected Key Result Areas (KRA)
Affected Goals

Affected Requirements

Risk Name
Who Will Assign the Attributes?

RISK IDENTIFICATION

The Meaning of Risk Identification

Risk Identification Methods

Levels in Identification
Identifying Product Risks
Implementing Risk Identification Processes

RISK ANALYSIS
Scope and Purpose of Risk Analysis

First-Order Analysis

Useful Risk Distribution Analysis

Seeing the Larger Picture
Risk Levels and Analysis Effort

Ownerless Risks
Putting Together the Preliminary Analyses

The Analysis Report

More Analysis

How to Implement Analysis

RESPONDING TO RISK

Getting Started

Special Treatment for Catastrophic Risks

The Constraint Risks

Responding to Ordinary Threats
A Comparison of Two Levels of Response

Risk Response Plans
Risk Avoidance

Risk Transfer

Risk Acceptance
Risk Monitoring

Risk Mitigation

Contingency Plans
Strategic Plan

Risk Escalation

Implementing Risk Response

RISK TRACKING
What Do We Track in Risks?

A Moving Target
Tracking Risk Response Plans
Tracking the Bigger Response: Audits

Tracking Hazard Risks

Trigger Levels

Tracking Project Risks
Tracking Operational Risks

Tracking Enterprise Risks

Learning by Tracking

Risk Tracker Tool

The Hardening of Risks
Implementing Risk Tracking

RISK MODELS
Why Models?
Simple Risk Models
Implementing Risk Models

RISK INTELLIGENCE

Natural Warning Systems
Metrics Models
Earned Value Model
Estimation Model
Requirement Model

Critical Path Model
WBS Model

PERT Model of Risk

Implementing Risk Intelligence

FEED FORWARD
Beyond Risk Reports
Passing Knowledge Forward
Risk Communication: The Critical Need

Ten Barriers to Risk Communication
Risk Dashboard

Analytical Views

Use of Models

The Tool

Risk Closure Report
Better Than SPC

Incorporating FFL in Risk Management

INTEGRATED RISK MANAGEMENT
Economy Drive
The Visible and the Invisible

The Positive and the Negative

Program-Level Integration
Strategic Business Unit (SBU)-Level Integration

Enterprise-Level Integration

Integrated Plans

Integrated Risk Management: An Agile Process

How to Establish Integrated Risk Management

RISK MANAGEMENT: DRAFT PROCEDURES
Can There Be a Procedure?
The Risk Arena
Symptoms of Not Having a Formal Risk Management Procedure
The Anatomy of a Risk Management Procedure
For Whom?

Implementing the Procedures

Procedure 1: Risk Management at Project and Operations Level

Procedure 2: Enterprise Risk Management

APPENDIX A: CAPER JONES'S RISK

APPENDIX B: REX BLACK'S QUALITY RISK LIST

APPENDIX C: SEI RISK TAXONOMY

APPENDIX D: TOP N SOFTWARE RISKS

APPENDIX E: PMI, RISK MANAGEMENT PROCESS

APPENDIX F: IRM, RISK MANAGEMENT STANDARD

APPENDIX G: CONTINUOUS RISK MANAGEMENT (CRM) PARADIGM

APPENDIX H: BARRY BOEHM'S RISK MANAGEMENT PROCESS

APPENDIX I: RISK MANAGEMENT IN CMMI

APPENDIX J: REQUIREMENT RISK VERSUS MEASURABLE
QUALITY ATTRIBUTES

APPENDIX K: DIARY OF A RISK MANAGER

RISK GLOSSARY

REFERENCES

INDEX



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.