Áèáëèîòåêà

9.5. Risk identification techniques

Richard E. (Dick)


Èñòî÷íèê: Richard E. (Dick) Fairley Managing and leading software projects // a John Wiley & Sons, inc., publication. 2009.





As indicated in the various standards and guidelines for risk management, project risk factors must be identifi ed as they develop. Risk factors should be identifi ed, analyzed, prioritized, and mitigation plans developed, to the extent possible, during initial project planning, but risk factors must also be identifi ed, analyzed, prioritized, and mitigated on a continuous, ongoing basis. Some potential problems will not materialize; for example, the hardware you need is delivered on schedule, so the risk of late delivery does not become a problem. Other unforeseen risk factors will arise as the project evolves; for example, your software architect tells you she may be moving to another city for personal reasons, but she is not certain she will and she is not sure when she will move, if she does.

Some risk factors thought to be settled may re-emerge. For example, a former risk of failure to achieve consensus on the layout of the user interface that was previously achieved may now re - emerge because some new users who have recently joined the users ’ organization are saying they want major changes. This re-institutes the risk of late product delivery based on lack of consensus among the users. Some techniques for identifying risk factors are listed in Table 9.4. In general, any technique you use to identify potential problems for your project can be used for risk identifi cation.

9.5.1 Checklists

Checklists are often used to identify risk factors. They can be used by individuals, in group meetings, or as aids to those participating in a Delphi process (see Chapter 6). The risk taxonomy developed at SEI is one of the best-known checklists for risk identifi cation [Carr93] . The taxonomy is a three-level hierarchy of commonly occurring risk factors for software projects. Table 9.5 a lists the top two levels of the hierarchy. Table 9.5 b lists some of the second-level and third-level elements in the hierarchy. The report that contains the full taxonomy and other aspects of risk identifi cation and risk management can be accessed at the URL cited in [Carr93].

Table 9.4 Some techniques for identifying risk factors


1. Checklists
2. Brainstorming
3. Expert judgment
4. SWOT analysis
5. Assumptions analysis
6. Constraints analysis
7. Lessons – learned fi les
8. Cost modeling
9. Schedule analysis
10. Requirements triage
11. Assets inventory
12. Trade-off analysis

Table 9.5a Top levels of the SEI risk taxonomy [Carr93]

Top-Level ElementsSecond-Level Elements
A. Product engineering (technical aspects of the work) A.1. Requirements
A.2. Design
A.3. Code and unit test
A.4. Integration and test
A.5. Engineering specialties
B. Development environment (methods, procedures, and tools to be used) B.1. Development process
B.2. Development system
B.3. Management process
B.4. Management methods
B.5. Work environment
C. Program constraints (contractual, organizational, and operational factors that are outside the control of local management) C.1. Resources
C.2. Contract
C.3. Program interfaces

Table 9.5.B Some second- and third- level elements of the SEI risk taxonomy [Carr93]

Second-Level ElementsThird-Level Elements
A.1. Requirements A.1a. Stability
A.1b. Completeness
A.1c. Clarity
A.1d. Validity
A.1e. Feasibility
A.1f. Precedent
A.1g. Scale
B.1. Development process B.1a. Formality
B.1b. Suitability
B.1c. Process control
B.1d. Familiarity
B.1e. Product control
B.3. Management process B.3a. Planning
B.3b. Project organization
B.3c. Management experience
B.3d. Program interfaces
B.5. Work environment B.5a. Quality attitude
B.5b. Cooperation
B.5c. Communication
B.5d. Morale
C.1. Resources C.1a. Schedule
C.1b. Staff
C.1c. Budget
C.1d. Facilities