Software Engineering Project Management SE603 Unit 6: Risk Management Egypt, 15.6.2015 Tempus Introduction Each software project is subject to various risks that might hinder its progress. This risk might result in severe consequences that could be huge financial loss. In order to manage these risks, risk management framework is adopted. firstly we identify the possible risks that might pop up along the project execution. Secondly, risk are assessed and prioritized according to many attributes such as impact and probability of occurrence. That is done through Risk Analysis and prioritization. Thirdly, certain responses should be considered to mitigate the impact of each risks though Risk Planning. Risk planning must be completed early during the project planning. Finally, along the development life cycle, risks are monitored and updated to make sure they are in control and the steps taken in the risk planning phase are effective and efficient. In this unit, we investigate the risk management framework across its different phases and examine the indicators used to prioritize and asses risks. Besides, going through the 3-point AON Estimation - the modified version of AON illustrated in unit 4 – where this version consider risks in calculations. 2 Objectives • • • To get acquainted with the risk management framework Going through various risk response techniques Be familiar with the modified versions of AON that consider risk in their estimations (3-point AON Estimation) 3 Unit 6: List of topics 1. Risk Types 2. Risk Management Framework 2.1. Risk Identification 2.1.1. Checklists 2.1.2. Brainstorming 2.1.3. Causal Mapping 2.2. Risk Analysis 2.3. Risk Response 2.3.1. Risks Acceptance 2.3.2. Risks Avoidance 2.3.3. Risks Reduction 2.3.4. Risk Transfer 2.3.5 Risk Mitigation 2.3.6. Risk Escalation 2.4. Risk Monitoring 3. 3-point AON Estimation 4 Risk Management In order to handle project risks, step 6 of Step Wise Planning, introduced in Unit 2, is investigated. Step 6 aims to enable project managers to have their risk management plans tuned to their software projects. The managers go through the risk identification process, followed by analyzing these risks. Once they are done of the analysis, they investigate the best possible response for each risk and finally keep an eyes on all risks make sure they are in control. Figure: STEP WISE Planning Steps [1] Step 0 Initiation Step 1: Defining Scope and Objectives Step 2: Understanding Client infrastructure Step 3 Project Characteristics Analysis review Lower level detail Step 4 Identifying deliverables Step 5 Effort Estimation For Each activity Step 6 Handling risks Step 10 Low-Level Planning Step 7 Resources Allocation Step 9 Plans Execution Step 8 Plans Review 5 1. Risk Types (1/3) Risk is unplanned event causing adverse effect on the project course resulting in extending the completion time, amplifying costs and confusing schedules of resources. There are 3 major types of risks [1]: Project Risk Technical Risks Business Risks Definitio n This type hinders achieving the project objectives causing drifts in schedule and budget. This type is related to the software development phases affecting the quality and deadline of the software being developed. This type of risk is related to the possibility of the product not meeting the requirements. Two types of risks: expected and unexpected. Example Unexpected costs Unrealistic schedules Staff problems Hi-end tools and languages imposing high risks such as unknown bugs and the compatibility issues For Expected Risks: Changes in the market, exchange rate variations, taxes, etc. For Unexpected Risks: natural disasters, regulation and legalities changes, etc. 6 1. Risk Types (2/3) Risks could be positive or negative. Negative risks are unwanted event causing adverse effects. Examples of Negative Risk is the main programmer is quitting the job or the unavailability of certain software tool or equipment. Whilst, positive risks, are opportunities that positively affect the project, such as increasing ROI or finishing the project ahead of time. Example of Positive Risks: having number of subscribers on the launch date of a telecom service than expected. 7 1. Risk Types (3/3) Positive risks could create negative risks. In the case of the telecom service, negative risks may arise the time switches were unable to handle the load or the billing system couldn’t process all the calls. Such negative risks can cause the whole service to fail resulting in low customer satisfaction. [12] Negative risks have to be managed to mitigate their effects. However, positive risks are managed to take advantage of their occurrence. [12] 8 2. Risk Management Framework The management framework is tailored to meet the scope of the software project of interest. The stages of the framework are [2]: • Risk Identification • Risk Analysis • Risk Response ( Risk Acceptance / Avoidance / Transfer / Escalation / Mitigation) • Risk Monitor and Control 9 Risk Management Flow Enter Reject Risk No Risk management continues by new owners of the risk Identify Risk Yes Conduct Risk Analysis Transfer No Escalate No Yes Accept Risk Conseq uences No Risk Still Valid Yes Mitigat ion No Strateg ies Requir ed Has Risk been mitigate d Yes No Has risk occur red Execute Mitigation Strategies Develop Contingency Strategies Yes Reject Risk When risks occur they become issues and are managed as issues Yes No Yes Close Risk Due to continuous monitoring is the risk still valid? Transfer or Escalate Initial Accepta nce Is Risk Valid Close Risk Continue Risk Management Develop Mitigation Strategies Go to issue Management Yes Yes Do contingenc y strategies exist No Continge ncy strategi es require d Yes No Continuous Monitor and control Risk Alfred (Al) Florence The MITRE Corporation [2] 2.1. Risk Identification The precaution actions are highly recommended to mitigate and avoid the impact of risks. Therefore, we firstly identify all possible risks that might occur throughout the project course to make sure they are in control. There are many approaches to identify risks such as [1]: • Checklists • Brainstorming • Causal mapping 11 2.1.1. Checklists Risk checklists include all risks with high probability of occurrence collected throughout years of experience in the domain of software development. Such checklists are organized and categorized by the development phases [3,8]: • • • • System Requirements Phase Software Planning Phase Software design phase Implementation phase. 12 2.1.1. Checklists Most technical and managerial related project members such as project manager, system engineer, software technical lead and developers, and the software engineers fill and review these checklists. Checklist must be revisited in each lifecycle stage to make sure that the listed risks are in control and no new risks were developed [3,8]. The following 4 slides display the (SEI) Software Risk Checklist [3], the most famous Software Project Risks [11] and Sample of Boehm’s top 10 development risks [10]. 13 System Requirements Phase RISK Yes/No Accept/ Work Are system-level requirements documented? Is there a project-wide method for dealing with future requirements changes? Example of Have software requirements been clearly delineated/allocated? Software Have the system-level software requirements been reviewed, inspected with system engineers, hardware engineers, and the users to insure clarity Engineering and completeness? Institute (SEI) Is an impact analysis conducted for all changes to baseline requirements? Software Risk Software Planning Phase Checklist – Have the end user requirements been represented in the concept phase? Are roles and responsibilities for software clearly defined and followed? Taxonomy Is the level of expertise for software language, lifecycle, development (1/2) [3] methodology (Formal Methods, Object Oriented, etc.), equipment (new technology), etc. available: Training: Is there enough trained personnel? Is there enough time to train all personnel? on equipment/ software development environment, etc.? Will there be time and resources to train additional personnel as needed? Budget: Is the budget sufficient for: equipment? needed personnel? Training? 14 System Requirements Phase RISK Yes/No Accept/ Work Is the software management plan being followed? Any updates needed? Example of Are standards and guidelines sufficient to produce clear design Software and code? Engineering Will there be a major loss of personnel (or loss of critical personnel)? Institute (SEI) Is there a need to create simulators to test software? Software Risk Software Implementation Phase Checklist – Is there auto-generated code? Taxonomy Are implementation personnel familiar with the development (2/2) [3] environment, language, and tools? Is the software management plan still being used? Is it up-todate? Are there coding standards? Is the schedule being maintained? Have impacts been accounted for (technical, resources, etc.)? Is it still reasonable? 15 Software Project Risks [11] AUTHOR(YEAR) DIMENSION OF RISKS NUMBER OF SOFTWARE RISKS McFarlan (1981) Boehm (1991) Barki et al. (1993) 3 0 5 54 10 55 Summer (2000) Longstaff et al.(2000) 6 7 19 32 Cule et al. (2000) Kliem (2001) 4 4 55 38 Schmidt et al. (2001) Houston et al. (2001) Murti (2002) 14 0 0 33 29 12 Addision (2003) Carney et al. (2003) 10 4 28 21 16 Sample of Boehm’s top 10 development risks [10] Risk Risk Reduction Personnel shortfalls Staffing with top talent; job matching; teambuilding; training & career development; early scheduling of key personnel Unrealistic time & cost estimates Multiple estimation techniques; design to cost; incremental development; recording and analysis of past projects; standardization of methods Developing the wrong software functions Improved software evaluation; formal specification methods; user surveys; prototyping; early user manuals Developing the wrong user interface Prototyping; task analysis; Developing the wrong user interface user involvement Gold plating Requirements scrubbing; prototyping; cost-benefit analysis; design to cost Late changes to requirements Stringent change control procedures; high chance threshold; incremental development (deferring changes) Development technically Technical analysis; cost-benefit analysis; prototyping; staff training too difficult & development 17 2.1.2. Brainstorming Project Stakeholders meet to identify the potential risks powered by by their extensive knowledge regarding the project and suggest the risk reduction solutions. A popular approach for brainstorming is the facilitated workshop [4]. It is a workshop to identify the potential risks where its members are those with full-time engagements in the project with considerable responsibilities and covering critical technologies and commercial issues. Clients and suppliers should be aboard as well. 18 2.1.2. Brainstorming This workshop is managed by a facilitator who ensures that everyone is participant, manage discussion threads and compile outputs into risk list. If the Project Manager has the facilitation skills then he could be a candidate, however, the workshop members may be steered as discussions could go toward certain direction in favor of the PM preferences. It is more convenient to have an independent person of the Project with much knowledge about the nature of such projects to be the facilitator. 19 2.1.3. Causal Mapping (1/4) A causal map is a network diagram depicts causes and effects. Events are the (nodes) and causal relationships are the (links) between nodes representing causality or influence. Events affect each other through positive or negative causal relationship and effect [7]. In the example [5] blow the low staff turnover is a indication that we hire experienced staff (causality relation is positive). The more experienced staff are available, the higher productivity rate is developed (causality relation is positive). Consequently, the deadlines are met (causality relation is positive) and the management pressure tends to be low (causality relation is negative). On the other side, if we don’t have clear user requirements, that would cause running operations in unstable environment (causality relation is positive). Consequently, we hardly meet the deadline (causality relation is negative). 2.1.3. Causal Mapping (2/4) Low staff turnover [5] Uncertain user requirements High productivity + Experien + ced Staff + Unstab le environ ment + - Deadline s met - Heavy Management pressure 22 2.1.3. Causal Mapping (3/4) The simple cause-risk-effect structure depicts the cause that drives a probability of having risk. Once this risk emerged, it will drive the impact of the effect. The impact of the effect is variable depending on the influence of the risk [6]. Cause Drives probability Risk Drives Variable impact Effect simple cause-risk-effect structure 23 2.1.3. Causal Mapping (2/2) A further modification of this structure is the Causal map showing cause–risk–effect multiple relationships - a more complex but more flexible approach to describing composite risks. It expands each element into a network of links, recognizing that cause–risk–effect relationships are usually not singular (1:1:1) but multiple (many : many : many) as shown in the figure behind [6]. This causal map can be useful in generating improved understanding of project risks. Based on maps, policies to reduce the likelihood of undesirable outcomes to the project could be developed [1]. Cause Drives probability Risk Drives Variable impact Effect simple cause-risk-effect structure 24 Causal map of cause–risk–effect multiple relationships [6] Cause Cause Cause Cause Risk Risk Risk Effect Effect Effect Effect(s) [6] 25 2.2. Risk Analysis (1/4) To analyze risks, the probability of occurrence, impact and priority should be assessed for each risk. The probability attribute is the possibility degree that risk could occurs. The probability value is between 0 (very low) and 1 (very high) estimated by subjectmatter experts. (Probability Table) [2] The impact attribute is the consequences or the damage of the risk. The impact value is between 1 (very low) and 5 (very high) assessed against four categories: Cost, Schedule, Scope, Performance [2]. (Impact table). 27 Impact Table [2] 2.2. Risk Analysis (2/4) Program/Pr oject Objective Very Low Minor Low Moderate Medium Serious High Critical Very High Catastrophic Cost Insignificant Increase < 2% of increase budget baseline Increase 2–5% of budget baseline Increase 6–10% of budget baseline Increase > 10% of budget baseline Schedule Insignificant Slippage < 2% of slippage project baseline schedule Slippage 2–5% of project baseline schedule Slippage 6–10% of project baseline schedule Slippage > 10% of project baseline schedule Scope Scope decrease barely noticeable Minor areas of scope affected Major areas of scope affected Scope reduction unacceptable to sponsor Project outcome is effectively useless Performanc e Performanc e degradation barely noticeable Performance Performance degradation reduction requires noticeable, but sponsor approval does not fail acceptance criteria Performance reduction unacceptable to sponsor Project outcome is effectively useless 28 2.2. Risk Analysis (3/4) Probability Table [2] Probability Description Probability of Occurrence Very High (Extremely ≥81% and =100% likely) High (Probable) 61% – 80% Medium (Possible) 41% – 60% Low (Unlikely) 21% – 40% Very Low >l% – ≤20% 29 2.2. Risk Analysis (4/4) To assess the priority of risk, Risk exposure (Risk Priority) is used. Risk Exposure is the result of multiplying the probability of a risk to occur by the impact of occurrence. Prioritizing risks enables project manager to determine the capacity in terms of time and resources needed to manage and monitor the risks. Risk Exposure (Risk Priority) = Impact of Risk x Probability of Occurrence [2] Two ways of calculating the impact of a risk, either by estimating the financial loss in term of cash or on scale of 1 (very low) to 5 (vey high) assessed against four categories: Cost, Schedule, Scope, Performance [2]. (Impact table) on the previous slide. Estimating the impact value is difficult as it isn’t easy to predict the potential loss in the event of risk occurrence; it could be limited or dramatic. The same for the probability as it is difficult to have a unified opinion from various experts to estimate the probability of a risk to occur due to different backgrounds and 30 experiences ; but we could take the average. Risk Exposure (Calculation Method 1) Composite Risk Index values tend to be high at the inception of the project as the probability of expecting risks to occur is high. As soon as we approach finalizing the project, the values drop gradually as the possibility of having risks decrease.[1] Risk Exposure (Risk Priority) = Impact of Risk x Probability of Occurrence Potential damage in terms of financial loss. For example a severe earthquake causes a damage of £0.5 million. Probability 0 (0% chance to happen) to 1 (100% sure of occurrence). For example: 0.01 means one in hundred chance. (check probability of occurrence table) CRI = £0.5m x 0.01 = £5,000 the amount needed for an insurance premium 32 Risk Exposure (Calculation Method 2) [2] Risk Priorities Very High High Medium Low Very Low Very High High Medium Low Very low Very Low Priority Low Priority Medium Priority High Priority Very High Priority Risk Watch List Monitor Monitor Monitor Monitor Develop Mitigation strategy Develop Contingency strategy 33 2.3. Risk Response Risk response is the process of selecting the best possible response for each risk. Responses for negative risks [2, 14]: 1. 2. 3. 4. 5. 6. Risk acceptance Risk avoidance Risk reduction Risk transfer Risk Escalation Risk Mitigation Responses for positive risks [13]: 1. Exploit 2. Share 3. Enhance 35 2.3.1. Risks Acceptance Risk acceptance is a response technique for unavoidable risks or risks we could deal with its impact and keep it in control. Besides the cost of mitigating this risk is accepted. There are two types of risk acceptance strategies: Passive and Active. Passive is about accepting risks that can’t be avoided where project team deal with such risk with no adequate response strategy. Whilst, the active is the same but the project team has a contingency plan to deal with the risk [9]. 36 2.3.1. Risks Acceptance Example of the risk acceptance: the risk of purchasing a defective CD of a ready-made software product. Replacing this copy would cause a delay of 5 days to a task having 25 days slack time. The Passive acceptance is used in this case as It does not worth exerting efforts to anticipate the problem and do something about it. It is simpler to wait and check if something goes wrong with the CD, then, we take corrective action [15]. 37 2.3.2. Risks Avoidance It is the opposite of risk acceptance. It is a response technique that avoids exposure to any risk. Risk Avoidance is the most expensive response as it might make changes to the project management plan to eliminate risks and mitigate their impacts [16,9]. Example of Risk avoidance: purchasing a ready made software product to avoid risks associated with the inhouse development such as poor effort and time estimates, availability of resources, compatibility issues, etc. 38 2.3.3. Risks Reduction Risk avoidance avoids exposure to any risk. Whilst Risk reduction reduces the likelihood and severity of a possible loss, in other words, it limits the exposure to risk by taking some actions. Risk reduction employs a bit of risk acceptance along with a bit of risk avoidance. Example of risk limitation: A company accepts that a hard drive may fail and avoids a long period of failure by having backups [16]. Risk Reduction Leverage (RRL) is an index compares the exposure of a single event BEFORE and AFTER managing the risk. The higher the Leverage, the better the solution [17]. 39 2.3.3. Risks Reduction Risk Reduction Leverage (RRL) = Risk Exposure Before - Risk Exposure After cost of risk reduction Consider the following example: the impact of having severe compatibility issue might add 10,000$ to expenses. The probability of having this risk is 30% before risk reduction and 10% after risk reduction. The cost of making updates to overcome the compatibility issue is 1000$ The Risk Reduction Leverage (RRL) = (0.3x 10,000) – (0.1x x 1000) / 1000 = (3000 1000) / 1000 = 2. If RRL > 1.00 then it worth doing the reduction otherwise the cost of the risk reduction activity outweighs the probable gain from implementing the action [1] 40 2.3.4. Risk Transfer Risk is outsourced to another entity. This is the case of companies outsourcing some of the their operations like cloud computing platforms, backup solutions, infrastructure management, customer service, payroll services, etc. Transferring such risks let entities focus on their core competencies [16,9]. 42 2.3.5. Risk Mitigation While risk reduction reduces the likelihood of a risk to occur, the risk mitigation is concerned with taking early actions to minimize the probability and/or impact of a risk when it occurs. It is far effective than trying to repair the damage after the occurrence of a risk [16,9]. Examples of Risk Mitigation: Adapting less complex processes, conducting more tests, or choosing a more stable suppliers [1]. 43 2.3.6. Risk Escalation Risk escalation is transferring the ownership and accountability of a risk to the senior management, whereas reporting, is about maintaining the ownership and accountability for that risk @ your level, but keep informing the senior management of the current situation and the way of handling [18]. 44 2.3.6. Risk Escalation The reasons to escalate a risk [18]: 1. The risk is above your target level of risk and there is nothing to do to reduce that to your target. Risk is escalated to the senior management that has the authority and the accountability to accept that risk on behalf of the organization. 2. When the treatments you need to do around that risk are outside of the delegation of the original risk. For example If the decision is taken not to spend the money on that, then, risk is going to be accepted at a higher level. 3. Shared risk with other organizational functions or with external entities where you can’t approach an agreement. 45 2.4. Risk Monitoring Risk monitoring and updating is a process concerned with tracking the identified risks and make sure they are in control. It also keeps identifying any new risks that might popup across the project while managing the contingency plans in case they are needed. On top of that, this process collects and captures lessons learned during managing and mitigating risk for the upcoming risk assessments and efforts allocation. This process continues throughout the life of the project. 47 3. 3-point AON Estimation The 3-point AON estimation has an advantage over the previously discussed AON mentioned in unit 4 for the following reasons [21]: • An increased accuracy estimation over the single point estimates • Better commitment from project team members as estimate considers risk in the assignment [20] • Useful information on the risks of each task. 48 3. 3-point AON Estimation To evaluate the impact of risk in AON (mentioned in unit 4), firstly, we create the network of activities. Secondly, we estimate the early and late start of tasks by applying forward and backward path. Thirdly, we calculate the total float time and identify the critical path. Fourthly, we calculate (Most Optimistic, Most pessimistic, Most likely) estimates for each activity and derive the expected task duration, besides calculating the standard Deviation and variance. Finally, we determine probability of meeting expected date 3. 3-point AON Estimation Probability of finishing a task in time t [20] t TO TL TE TP The Expected Task Duration (TE) = (TO + TL x 4 + TP ) / 6 [20] Most Optimistic (TO) – the most optimistic estimate of the task duration Most Likely (TP) - the most pessimistic estimate of the task duration Most Pessimistic (TL) - = the most likely time TE is an estimate from three estimates the team member assigned for their task. It reflects the amount of risk in the task and the severity of the impact of the optimistic and pessimistic risks. Standard deviation (SD) is the average deviation from the estimated time = (TP-T0)/6 The higher SD the greater the amount of uncertainty 50 3-point AON Estimation Example (1/4) Task Name This example below is about planting trees & flowers and installing a fence [22]. Shaded tasks are running concurrently. Normal Time (Days) Crashed Time (Days) Normal Cost ($) Crashed Cost ($) Mark Utilities 3 3 0 0 Dig Holes 2 1 100 200 Buy Trees .5 .5 50 50 Buy Flowers .5 .5 50 50 Plant Trees 2 1 100 200 Plant Flowers 1 .5 50 100 Buy Fence .5 .5 25 25 Install Fence 1 .5 25 50 400 675 total 51 3-point AON Estimation Example (2/4) 3 0.5 3.5 7 Buy Fence 7.5 0.5 8 ES 3 0.5 3.5 3 3 0.5 5 3 2 5 1 Mark Utilities 0 3 3 LS 4.5 5 2 Dig Holes 2 7 5 Plant Trees 3 2 5 3 0.5 3.5 EF Task Name 3 Buy Trees 0 Duration 5 2 7 Duration 1 8 6 Plant Flowers 7 7 1 8 LF 8 1 9 8 Install Fence 8 1 9 4 Buy Flowers 6.5 0.5 7 52 3-point AON Estimation Example (3/4) variance = V = SD2 • Slack time = ES – LS or EF – LF • Tasks with zero slack time are on the critical path The expected task duration = TE = (To + TL x 4+ TP) / 6 TASK 1 2 5 6 8 TOTAL TASK 3 4 7 TOTAL Standard deviation = SD = (TP-T0)/6 CRITICAL PATH TASKS (Longest Duration) TO TL TP TE ES EF LS LF Slack SD 1 3 5 3 0 3 0 3 0 .67 2 4 7 4.17 3 7.17 3 7.17 0 .83 1 3 6 3.17 7 10.17 7 10.17 0 .83 1 3 5 3 10 13 10 13 0 .67 1 2 4 2.17 13 15.17 13 15.17 0 .5 7 15 27 15.51 3.5 OTHER PROJECT TASKS tasks 3, 4 and 7 are concurrent and do not add to the timeline TO TL TP TE ES EF LS LF FLOAT SD .5 1 3 1.25 0 1.25 3 4.25 3 .42 .5 1 3 1.25 0 1.25 3 4.25 3 .42 .5 1 3 1.25 1.25 2.50 4.25 5.50 3 .42 1.5 3 9 3.75 1.26 ES=Earliest Start EF= Earliest Finish LS=Latest Start LF=Latest Finish V .444 .694 .694 .444 .254 2.530 V .17 .17 .17 .51 53 3-point AON Estimation Example (4/4) Task To TL TP Mark Utilities 1 3 5 Dig holes 2 4 7 Plant trees 1 3 6 Plant flowers 1 3 5 Install edging 1 2 4 TOTAL Critical Path Tasks (longest duration) TE ES EF LS LF SLACK =SUM(B3*1+C3*4+D3*1)/ 6 0 3 0 3 =I3-G3 =SUM(B4*1+C4*4+D4*1)/ 6 3 7 3 7 =I4-G4 =SUM(B5*1+C5*4+D5*1)/ 6 7 10.17 7 10.17=I5-G5 =SUM(B6*1+C6*4+D6*1)/ 1 1 6 0 13 0 13 =I6-G6 =SUM(B7*1+C7*4+D7*1)/ 1 1 6 3 15.17 3 15.17=I7-G7 SD V =(D3-B3)/6 =K3*K3 =(D4-B4)/6 =K4*K4 =(D5-B5)/6 =K5*K5 =(D6-B6)/6 =K6*K6 =(D7-B7)/6 =K7*K7 =SUM(L3:L7 ) =SUM(E3:E7) 1 Enter desired time completion date: 5 • • Probability of completion: =NORMDIST(B10,E8,SQRT(L8),TRUE) Set The target for completion is 15 days (T) Calculate the ES=Earliest z value using NORMSDIST in Excel = 37.66 mean there is about a Start EF= Earliest Finish LS=Latest Start which LF=Latest Finish 37.66% chance of not meeting the target of 15 days. 54 Conclusion (1/2) Risk is unplanned event causing adverse effect on the project course resulting in extending the completion time, amplifying costs and confusing schedules of resources. There are 3 major types of risks: Project, Technical and Business and could be positive and negative Risk Management Framework stages include: Risk Identification, Risk Analysis, Risk Response ( Risk Acceptance / Avoidance / Transfer / Escalation / Mitigation) and Risk Monitor and Control To identify risks, we used Checklists, Brainstorming or Causal mapping To analyze risks, the probability of occurrence, impact and priority should be assessed for each risk. To assess the priority of risk, Risk exposure (Risk Priority) is used. Risk Exposure is the result of multiplying the probability of a risk to occur by the impact of occurrence. Prioritizing risks enables project manager to determine the capacity in terms of time and resources needed to manage and monitor the risks. 55 Conclusion (2/2) Risk response is the process of selecting the best possible response for each risk. Responses for negative risks: 1.Risk acceptance 2.Risk avoidance 3.Risk reduction 4.Risk transfer 5.Risk Escalation 6.Risk Mitigation Responses for positive risks: 1.Exploit 2.Share 3.Enhance Risk monitoring and updating is a process concerned with tracking the identified risks and make sure they are in control. The 3-point AON estimation has an advantage over the previously discussed AON for the following reasons: • An increased accuracy estimation over the single point estimates • Better commitment from project team members as estimate considers risk in the assignment • Useful information on the risks of each task. 56 References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. http://www.cdf.toronto.edu/~csc340h/winter/lectures/w5/L5-part1-6up.pdf Alfred (Al) Florence The MITRE Corporation: http://www.asq509.org/ht/a/GetDocumentAction/i/79426 http://sce.uhcl.edu/helm/Risk_Man_WEB/docs%5C46iSWcklist.pdf https://mushcado.wordpress.com/2011/01/11/using-brainstorming-techniques-to-identify-project-risk/ http://www.slideshare.net/sweetyammu/spm-unit-3 https://www.apm.org.uk/sites/default/files/open/Prioritising%20Project%20Risks_.pdf http://www.it.bton.ac.uk/staff/gw4/papers/ECITE%202004%20paper.pdf IEEE Std 1540-2004, IEEE Standard for Software Life Cycle Processes— Risk Management; IEEE http://www.projectmanagementlexicon.com/topics/strategies-for-negative-risks-threats/ http://users.humboldt.edu/smtuttle/f14cs458/458lect10-1/458lect10-1-boehm-top10-risks-to-post.pdf http://www.iaeng.org/publication/IMECS2011/IMECS2011_pp732-737.pdf http://www.projectmanagementlearning.com/what-is-the-difference-between-positive-and-negative-risks.html http://www.brighthubpm.com/risk-management/48400-how-to-respond-to-positive-risks/ Software Project Management: By Bharat Bhushan Agarwal, Shivangi Dhall Sumit Prakash Tayal https://books.google.com.eg/books?id=79Hq5WbyAzkC&pg=PA218&lpg=PA218&dq=risk+avoidance+examples+ software+development&source=bl&ots=i5uxQaR66N&sig=YAbLVopbKFBDE8vZeUvSMM8C1g4&hl=en&sa=X&ve d=0CBsQ6AEwADgKahUKEwjDv7z3zerGAhVLXRQKHT9pDMs#v=onepage&q=risk%20avoidance%20examples%2 0software%20development&f=false http://pmtips.net/Blog/defining-risk-management-part-6-risk-response http://www.mha-it.com/2013/05/four-types-of-risk-mitigation/ http://www.omsar.gov.lb/ICTGPG/Web/20.8_Risk_Reduction_Leverage_(RRL).htm https://www.paladinrisk.com.au/risk-escalation/ http://punsarab.blogspot.com/2012/08/a-project-network-illustrates_30.html http://data.bolton.ac.uk/learningresources/projman/units/u06/u06.html http://4pm.com/3-point-estimating-2/ http://libvolume6.xyz/mechanical/btech/semester7/operationsresearch/pertcpmtechniques/pertcpmtech niquespresentation2.pdf 57 Thank you for your attention. Tempus