SlideShare uma empresa Scribd logo
1 de 34
Software Risk Management
Matakuliah Rekayasa Perangkat Lunak (CS215) – Gasal 2015/2016
Magister Ilmu Komputer - Universitas Budi Luhur
Achmad Solichin, S.Kom, M.T.I (achmatim@gmail.com)
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
A Small Case Study
Lintang adalah seorang freelancer yang tinggal diTangerang. Sebagai web developer, Lintang sudah 4
tahun berpengalaman membangun berbagai aplikasi berbasis web. Saat ini, Lintang juga sedang
terikat kontrak maintenance sebuah sistem HRIS berbasis web di perusahaan XYZ selama setahun
mendatang. Selain itu, Lintang juga sedang melanjutkan studi di Magister Ilmu Komputer, Universitas
Budi Luhur (semester 3).
Suatu hari, seorang kenalan bernama Mulyanto menawarkan sebuah project untuk membangun
sistem informasi laundry berbasis web. Berdasarkan hasil pertemuan antara Lintang dan Mulyanto,
diperoleh beberapa informasi terkait project yg ditawarkan. Mulyanto memiliki 4 usaha laundry yang
tersebar di sejumlah tempat di Jakarta danTangerang. Sebagai pemilik, Mulyanto ingin mengetahui
dan mengontrol dg cepat bagaimana bisnis laundry dijalankan oleh anak buahnya, melalui sebuah
aplikasi berbasis web. Mulai dari proses penyerahan pakaian oleh pelanggan, proses pengerjaan oleh
pegawai hingga pendapatan untuk setiap pegawai harus tercatat dg baik di aplikasi. Selain
berdasarkan kehadiran, pendapatan masing2 pegawai juga dihitung berdasarkan jumlah pekerjaan
yang dilakukan.
Sebagai seorang lulusan kampus ternama, Mulyanto sudah menyusun rancangan aplikasi yang
diinginkan, mulai dari rancangan layar, rancangan masukan, rumus / perhitungan, rancangan basis data
hingga rancangan laporan. Semua disusun berdasarkan pengalaman Mulyanto menangani bisnis
laundry. Memang, Mulyanto termasuk orang yg sangat perfeksionis dan selektif dlm mengerjakan
sesuatu. Kali ini dia mencari seorang programmer berpengalaman yg sanggup mengimplementasikan
rancangannya menjadi sebuah aplikasi yg dapat langsung digunakan setidaknya 2 bulan mendatang.
Mulyanto menjanjikan kompensasi yang cukup besar untuk pekerjaan ini.
Menurut Anda, Lintang harus menerima atau menolak tawaran project dari Mulyanto? Jelaskan!
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Overview
• What is Software Risk Management?
• Risk Management Process
• Risk Management Strategies
• Risk Metrics (Risk Estimation)
• International Risk Management Standards.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Important Goals of Project Management
• Deliver the software to the customer at the agreed time.
• Keep overall costs within budget.
• Deliver software that meets the customer’s expectations.
• Maintain a happy and well-functioning development team.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Project Manager Responsibility
• Project planning. Project managers are responsible for planning, estimating and
scheduling project development, and assigning people to tasks.
• Reporting. Project managers are usually responsible for reporting on the progress
of a project to customers and to the managers of the company developing the
software.
• Risk management. Project managers have to assess the risks that may affect a
project, monitor these risks, and take action when problems arise
• People management. Project managers are responsible for managing a team of
people.
• Proposal writing.The first stage in a software project may involve writing a
proposal to win a contract to carry out an item of work
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management
• Risk management involves anticipating risks that might affect the project
schedule or the quality of the software being developed, and then taking
action to avoid these risks (Hall, 1998; Ould, 1999)
• Three categories of Risk:
• Project risks. Risks that affect the project schedule or resources. Ex: the loss of an
experienced designer.
• Product risks. Risks that affect the quality or performance of the software being
developed. Ex: the failure of a purchased component to perform as expected.
• Business risks. Risks that affect the organization developing or procuring the software.
Ex: a competitor introducing a new product.
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Reactive Risk Management
• Project team reacts to risks when they occur.
• Mitigation—plan for additional resources in anticipation of fire fighting
• Fix on failure—resource are found and applied when the risk strikes
• Crisis management—failure does not respond to applied resources and
project is in jeopardy.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Proactive Risk Management
• Formal risk analysis is performed.
• Organization corrects the root causes of risk
• TQM (total quality management) concepts and statistical SQA
• Examining risk sources that lie beyond the bounds of the software
• Developing the skill to manage change
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Principle of Risk Management
• Maintain a global perspective—view software risks within the context of a system in which it is a
component and the business problem that it is intended to solve
• Take a forward-looking view—think about the risks that may arise in the future (e.g., due to
changes in the software); establish contingency plans so that future events are manageable.
• Encourage open communication—if someone states a potential risk, don’t discount it. If a risk is
proposed in an informal manner, consider it. Encourage all stakeholders and users to suggest
risks at any time.
• Integrate—a consideration of risk must be integrated into the software process.
• Emphasize a continuous process—the team must be vigilant throughout the software process,
modifying identified risks as more information is known and adding new ones as better insight is
achieved.
• Develop a shared product vision—if all stakeholders share the same vision of the software, it is
likely that better risk identification and assessment will occur.
• Encourage teamwork—the talents, skills, and knowledge of all stakeholders should be pooled
when risk management activities are conducted.
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Example of Risks
[Sommerville, 2011]
Risk Affects Description
Staff turnover Project Experienced staff will leave the project before it is finished.
Management change Project There will be a change of organizational management with different
priorities.
Hardware
unavailability
Project Hardware that is essential for the project will not be delivered on schedule.
Requirements change Project and
product
There will be a larger number of changes to the requirements than
anticipated.
Specification delays Project and
product
Specifications of essential interfaces are not available on schedule.
Size underestimate Project and
product
The size of the system has been underestimated.
CASE tool
underperformance
Product CASE tools, which support the project, do not perform as anticipated.
Technology change Business The underlying technology on which the system is built is superseded by
new technology.
Product competition Business A competitive product is marketed before the system is completed.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
The Risk Management Process
[Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Identification
[Sommerville, 2011]
• May be a team activities or based on the individual project manager’s experience.
• Six types of common risk:
1. Technology risks. Risks that derive from the software or hardware technologies that are
used to develop the system.
2. People risks. Risks that are associated with the people in the development team.
3. Organizational risks. Risks that derive from the organizational environment where the
software is being developed.
4. Tools risks. Risks that derive from the software tools and other support software used to
develop the system.
5. Requirements risks. Risks that derive from changes to the customer requirements and the
process of managing the requirements change.
6. Estimation risks. Risks that derive from the management estimates of the resources
required to build the system.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Identification
[Sommerville, 2011]
Risk type Possible risks
Technology The database used in the system cannot process as many transactions per second as expected. (1)
Reusable software components contain defects that mean they cannot be reused as planned. (2)
People It is impossible to recruit staff with the skills required. (3)
Key staff are ill and unavailable at critical times. (4)
Required training for staff is not available. (5)
Organizational The organization is restructured so that different management are responsible for the project. (6)
Organizational financial problems force reductions in the project budget. (7)
Tools The code generated by software code generation tools is inefficient. (8)
Software tools cannot work together in an integrated way. (9)
Requirements Changes to requirements that require major design rework are proposed. (10)
Customers fail to understand the impact of requirements changes. (11)
Estimation The time required to develop the software is underestimated. (12)
The rate of defect repair is underestimated. (13)
The size of the software is underestimated. (14)
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Analysis
[Sommerville, 2011]
• Assess probability and seriousness of each risk.
• Probability may be:Very Low (< 10%), Low (10-25%), Moderate (25-50%),
High (50-75%) orVery High (> 75%).
• Risk consequences might be: Catastrophic (threaten the survival of the
project), Serious (would cause major delays),Tolerable (delays are within
allowed contingency), or Insignificant.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
RiskTypes and Example
[Sommerville, 2011]
Risk Probability Effects
Organizational financial problems force reductions in the project budget (7). Low Catastrophic
It is impossible to recruit staff with the skills required for the project (3). High Catastrophic
Key staff are ill at critical times in the project (4). Moderate Serious
Faults in reusable software components have to be repaired before these
components are reused. (2).
Moderate Serious
Changes to requirements that require major design rework are proposed
(10).
Moderate Serious
The organization is restructured so that different management are
responsible for the project (6).
High Serious
The database used in the system cannot process as many transactions per
second as expected (1).
Moderate Serious
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
RiskTypes and Example
[Sommerville, 2011]
Risk Probability Effects
The time required to develop the software is underestimated (12). High Serious
Software tools cannot be integrated (9). High Tolerable
Customers fail to understand the impact of requirements changes (11). Moderate Tolerable
Required training for staff is not available (5). Moderate Tolerable
The rate of defect repair is underestimated (13). Moderate Tolerable
The size of the software is underestimated (14). High Tolerable
Code generated by code generation tools is inefficient (8). Moderate Insignificant
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Projection
[Pressman, 2010]
• Also called Risk Estimation
• Risk Projection steps:
• Establish a scale that reflects the perceived likelihood of a risk.
• Delineate the consequences of the risk.
• Estimate the impact of the risk on the project and the product.
• Assess the overall accuracy of the risk projection so that there will be no
misunderstandings.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Impact Assessment
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Planning
[Sommerville, 2011]
• Consider each risk and develop a strategy to manage that risk.
• Risk strategies:
• Avoidance strategies.The probability that the risk will arise is reduced.
• Minimization strategies.The impact of the risk on the project or product will be
reduced.
• Contingency plans. If the risk arises, contingency plans are plans to deal with that risk.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management Strategies
[Sommerville, 2011]
Risk Strategy
Organizational financial
problems
Prepare a briefing document for senior management showing how the
project is making a very important contribution to the goals of the business
and presenting reasons why cuts to the project budget would not be cost-
effective.
Recruitment problems Alert customer to potential difficulties and the possibility of delays;
investigate buying-in components.
Staff illness Reorganize team so that there is more overlap of work and people therefore
understand each other’s jobs.
Defective components Replace potentially defective components with bought-in components of
known reliability.
Requirements changes Derive traceability information to assess requirements change impact;
maximize information hiding in the design.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Management Strategies
[Sommerville, 2011]
Risk Strategy
Organizational
restructuring
Prepare a briefing document for senior management showing how the
project is making a very important contribution to the goals of the business.
Database performance Investigate the possibility of buying a higher-performance database.
Underestimated
development time
Investigate buying-in components; investigate use of a program generator.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Monitoring
[Sommerville, 2011]
• Assess each identified risks regularly to decide whether or not it is becoming
less or more probable.
• Also assess whether the effects of the risk have changed.
• Each key risk should be discussed at management progress meetings.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Indicators
[Sommerville, 2011]
Risk type Potential indicators
Technology Late delivery of hardware or support software; many reported technology
problems.
People Poor staff morale; poor relationships amongst team members; high staff
turnover.
Organizational Organizational gossip; lack of action by senior management.
Tools Reluctance by team members to use tools; complaints about CASE tools;
demands for higher-powered workstations.
Requirements Many requirements change requests; customer complaints.
Estimation Failure to meet agreed schedule; failure to clear reported defects.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Developing a RiskTable
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Exposure (RE)
[Pressman, 2010]
𝑅𝐸 = 𝑃 ∗ 𝐶
Dimana:
• RE = Risk Exposure
• P = Probability of occurrence for a risk
• C = cost to the project should the risk occur
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Exposure (RE)
[Pressman, 2010]
• Risk identification. Only 70 percent of the software components scheduled
for reuse will, in fact, be integrated into the application.The remaining
functionality will have to be custom developed.
• Risk probability. 80 percent (likely).
• Risk impact. Sixty reusable software components were planned. If only 70
percent can be used, 18 components would have to be developed from
scratch (in addition to other custom software that has been scheduled for
development). Since the average component is 100 LOC and local data
indicate that the software engineering cost for each LOC is $14.00, the
overall cost (impact) to develop the components would be 18 x 100 x $14 =
$25,200.
• Risk exposure. RE = 0.80 x $25,200 ≈ $20,200.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Risk Information Sheet (RIS)
[Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• COSO ERM (2004)
• Applies to management, directors, regulators, academics and others who are
interested in better understanding enterprise risk management
• COSO ERM is a framework providing integrated principles, common terminology and
practical implementation guidance supporting entities' programs to develop or
benchmark their enterprise risk management processes.
• This standard is voluntary.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO 31000: Risk Management (2009)
• Applies to any public, private or community enterprise, association, group or
individual.Therefore, it is not specific to any industry or sector.
• ISO 31000 provides principles and generic guidelines on risk management.Applies to
any type of risk, whatever its nature, whether having positive or negative
consequences.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO/IEC 31010: Risk Management – Risk AssessmentTechniques (2009)
• Applies to any public, private or community enterprise, association, group or
individual.Therefore, it is not specific to any industry or sector.
• ISO 31010 assists organizations in implementing the risk management principles and
guidelines provided by the recently published ISO 31000:2009, itself complemented by
ISO Guide 73:2009 on risk management vocabulary.This standard deals with risk
assessment concepts, risk assessment process, and selection of risk assessment
techniques.This standard is not intended for certification, regulatory or contractual
use.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• ISO/IEC Guide 73: Risk Management Guidelines (2009)
• Applies to those engaged in managing risks, those who are involved in activities of ISO
and IEC, and developers of national or sector-specific standards, guides, procedures
and codes of practice relating to the management of risk
• The guide provides the definitions of generic terms related to risk management. It
aims to encourage a mutual and consistent understanding of, and a coherent approach
to, the description of activities relating to the management of risk, and the use of
uniform risk management terminology in processes and frameworks dealing with the
management of risk.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
International Risk Management Standards
• BS 31100 (Risk Management)
• Applies to any organization of any size
• BS 31100 provides a foundation for organizations to understand, create, integrate and
maintain risk management programs by giving recommendations on its model,
framework, and process with the goal of increasing the organizations chances of
meeting its objectives.
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
References
• Roger S. Pressman, 2010, Software Engineering: A Practitioner’s Approach
7th edition, McGraw-Hill.
• Ian Sommerville, 2011, Software Engineering 9th edition, Addison-Wesley.
• Other references
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
Thanks
• Achmad Solichin, S.Kom, M.T.I
• achmatim@gmail.com
• Twitter: @achmatim
• Facebook: facebook.com/achmatim
• Web: http://achmatim.net
CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

project planning-estimation
project planning-estimationproject planning-estimation
project planning-estimation
 
UNIT-4design-concepts-se-pressman-ppt.PPT
UNIT-4design-concepts-se-pressman-ppt.PPTUNIT-4design-concepts-se-pressman-ppt.PPT
UNIT-4design-concepts-se-pressman-ppt.PPT
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project Management
 
Software Project Management | An Overview of the Software Project Management
Software Project Management | An Overview of the Software Project ManagementSoftware Project Management | An Overview of the Software Project Management
Software Project Management | An Overview of the Software Project Management
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Software engineering project management
Software engineering project managementSoftware engineering project management
Software engineering project management
 
Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)
 
Software project management- Software Engineering
Software project management- Software EngineeringSoftware project management- Software Engineering
Software project management- Software Engineering
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Ch 9 project monitoring &amp; control updated
Ch 9 project monitoring &amp; control updatedCh 9 project monitoring &amp; control updated
Ch 9 project monitoring &amp; control updated
 
Project Estimation
Project EstimationProject Estimation
Project Estimation
 
Project scheduling
Project schedulingProject scheduling
Project scheduling
 
Software project estimation
Software project estimationSoftware project estimation
Software project estimation
 
Chap 11.7 Monitor Risks
Chap 11.7 Monitor RisksChap 11.7 Monitor Risks
Chap 11.7 Monitor Risks
 
Pressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metricsPressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metrics
 
Software Engineering (Project Planning & Estimation)
Software Engineering (Project Planning &  Estimation)Software Engineering (Project Planning &  Estimation)
Software Engineering (Project Planning & Estimation)
 
Software development process models
Software development process modelsSoftware development process models
Software development process models
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Agile Risk Management
Agile Risk ManagementAgile Risk Management
Agile Risk Management
 

Semelhante a Lecture 03 Software Risk Management

04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
ALI2H
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
Jayakumar PP
 

Semelhante a Lecture 03 Software Risk Management (20)

Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1SE18_SE_Lec 12_ Project Management 1
SE18_SE_Lec 12_ Project Management 1
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
 
lecture 1-5.pdf
lecture 1-5.pdflecture 1-5.pdf
lecture 1-5.pdf
 
Project Planning in Software Engineering
Project Planning in Software EngineeringProject Planning in Software Engineering
Project Planning in Software Engineering
 
04. Project planning and management.pptx
04. Project planning and management.pptx04. Project planning and management.pptx
04. Project planning and management.pptx
 
D0365030036
D0365030036D0365030036
D0365030036
 
Risk analysis and management
Risk analysis and managementRisk analysis and management
Risk analysis and management
 
SE_Lec 11_ Project Management
SE_Lec 11_ Project ManagementSE_Lec 11_ Project Management
SE_Lec 11_ Project Management
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
GER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdfGER_Project_Management_Ch22_summary.pdf
GER_Project_Management_Ch22_summary.pdf
 
4213ijsea08
4213ijsea084213ijsea08
4213ijsea08
 
PROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMIPROJECT PLANNINGMEASURES IN CMMI
PROJECT PLANNINGMEASURES IN CMMI
 
A novel risk management model in the Scrum and extreme programming hybrid me...
A novel risk management model in the Scrum and extreme  programming hybrid me...A novel risk management model in the Scrum and extreme  programming hybrid me...
A novel risk management model in the Scrum and extreme programming hybrid me...
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems“Scrumbear” framework for solving traditional scrum model problems
“Scrumbear” framework for solving traditional scrum model problems
 
ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdf
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 

Mais de Achmad Solichin

Mais de Achmad Solichin (20)

Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
Kuliah Umum - Tips Publikasi Jurnal SINTA untuk Mahasiswa Galau (6 Agustus 2022)
 
Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)Materi Webinar Web 3.0 (16 Juli 2022)
Materi Webinar Web 3.0 (16 Juli 2022)
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
 
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
Webinar PHP-ID: Mari Mengenal Logika Fuzzy (Fuzzy Logic)
 
Webinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHPWebinar PHP-ID: Machine Learning dengan PHP
Webinar PHP-ID: Machine Learning dengan PHP
 
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi LuhurWebinar Data Mining dengan Rapidminer | Universitas Budi Luhur
Webinar Data Mining dengan Rapidminer | Universitas Budi Luhur
 
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARUTREN DAN IDE RISET BIDANG DATA MINING TERBARU
TREN DAN IDE RISET BIDANG DATA MINING TERBARU
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
 
Materi Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHPMateri Seminar: Artificial Intelligence dengan PHP
Materi Seminar: Artificial Intelligence dengan PHP
 
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan RadiasiPercobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
Percobaan Perpindahan Kalor melalui Konduksi, Konveksi dan Radiasi
 
Metodologi Riset: Literature Review
Metodologi Riset: Literature ReviewMetodologi Riset: Literature Review
Metodologi Riset: Literature Review
 
Depth First Search (DFS) pada Graph
Depth First Search (DFS) pada GraphDepth First Search (DFS) pada Graph
Depth First Search (DFS) pada Graph
 
Breadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada GraphBreadth First Search (BFS) pada Graph
Breadth First Search (BFS) pada Graph
 
Binary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur DataBinary Search Tree (BST) - Algoritma dan Struktur Data
Binary Search Tree (BST) - Algoritma dan Struktur Data
 
Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0Computer Vision di Era Industri 4.0
Computer Vision di Era Industri 4.0
 
Seminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web ProgrammerSeminar: Become a Reliable Web Programmer
Seminar: Become a Reliable Web Programmer
 
The Big 5: Future IT Trends
The Big 5: Future IT TrendsThe Big 5: Future IT Trends
The Big 5: Future IT Trends
 
Modern PHP Developer
Modern PHP DeveloperModern PHP Developer
Modern PHP Developer
 
Seminar: PHP Developer for Dummies
Seminar: PHP Developer for DummiesSeminar: PHP Developer for Dummies
Seminar: PHP Developer for Dummies
 
Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1Pertemuan 1 - Algoritma dan Struktur Data 1
Pertemuan 1 - Algoritma dan Struktur Data 1
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Lecture 03 Software Risk Management

  • 1. Software Risk Management Matakuliah Rekayasa Perangkat Lunak (CS215) – Gasal 2015/2016 Magister Ilmu Komputer - Universitas Budi Luhur Achmad Solichin, S.Kom, M.T.I (achmatim@gmail.com) CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 2. A Small Case Study Lintang adalah seorang freelancer yang tinggal diTangerang. Sebagai web developer, Lintang sudah 4 tahun berpengalaman membangun berbagai aplikasi berbasis web. Saat ini, Lintang juga sedang terikat kontrak maintenance sebuah sistem HRIS berbasis web di perusahaan XYZ selama setahun mendatang. Selain itu, Lintang juga sedang melanjutkan studi di Magister Ilmu Komputer, Universitas Budi Luhur (semester 3). Suatu hari, seorang kenalan bernama Mulyanto menawarkan sebuah project untuk membangun sistem informasi laundry berbasis web. Berdasarkan hasil pertemuan antara Lintang dan Mulyanto, diperoleh beberapa informasi terkait project yg ditawarkan. Mulyanto memiliki 4 usaha laundry yang tersebar di sejumlah tempat di Jakarta danTangerang. Sebagai pemilik, Mulyanto ingin mengetahui dan mengontrol dg cepat bagaimana bisnis laundry dijalankan oleh anak buahnya, melalui sebuah aplikasi berbasis web. Mulai dari proses penyerahan pakaian oleh pelanggan, proses pengerjaan oleh pegawai hingga pendapatan untuk setiap pegawai harus tercatat dg baik di aplikasi. Selain berdasarkan kehadiran, pendapatan masing2 pegawai juga dihitung berdasarkan jumlah pekerjaan yang dilakukan. Sebagai seorang lulusan kampus ternama, Mulyanto sudah menyusun rancangan aplikasi yang diinginkan, mulai dari rancangan layar, rancangan masukan, rumus / perhitungan, rancangan basis data hingga rancangan laporan. Semua disusun berdasarkan pengalaman Mulyanto menangani bisnis laundry. Memang, Mulyanto termasuk orang yg sangat perfeksionis dan selektif dlm mengerjakan sesuatu. Kali ini dia mencari seorang programmer berpengalaman yg sanggup mengimplementasikan rancangannya menjadi sebuah aplikasi yg dapat langsung digunakan setidaknya 2 bulan mendatang. Mulyanto menjanjikan kompensasi yang cukup besar untuk pekerjaan ini. Menurut Anda, Lintang harus menerima atau menolak tawaran project dari Mulyanto? Jelaskan! CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 3. Overview • What is Software Risk Management? • Risk Management Process • Risk Management Strategies • Risk Metrics (Risk Estimation) • International Risk Management Standards. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 4. Important Goals of Project Management • Deliver the software to the customer at the agreed time. • Keep overall costs within budget. • Deliver software that meets the customer’s expectations. • Maintain a happy and well-functioning development team. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 5. Project Manager Responsibility • Project planning. Project managers are responsible for planning, estimating and scheduling project development, and assigning people to tasks. • Reporting. Project managers are usually responsible for reporting on the progress of a project to customers and to the managers of the company developing the software. • Risk management. Project managers have to assess the risks that may affect a project, monitor these risks, and take action when problems arise • People management. Project managers are responsible for managing a team of people. • Proposal writing.The first stage in a software project may involve writing a proposal to win a contract to carry out an item of work [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 6. Risk Management • Risk management involves anticipating risks that might affect the project schedule or the quality of the software being developed, and then taking action to avoid these risks (Hall, 1998; Ould, 1999) • Three categories of Risk: • Project risks. Risks that affect the project schedule or resources. Ex: the loss of an experienced designer. • Product risks. Risks that affect the quality or performance of the software being developed. Ex: the failure of a purchased component to perform as expected. • Business risks. Risks that affect the organization developing or procuring the software. Ex: a competitor introducing a new product. [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 7. Reactive Risk Management • Project team reacts to risks when they occur. • Mitigation—plan for additional resources in anticipation of fire fighting • Fix on failure—resource are found and applied when the risk strikes • Crisis management—failure does not respond to applied resources and project is in jeopardy. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 8. Proactive Risk Management • Formal risk analysis is performed. • Organization corrects the root causes of risk • TQM (total quality management) concepts and statistical SQA • Examining risk sources that lie beyond the bounds of the software • Developing the skill to manage change [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 9. Principle of Risk Management • Maintain a global perspective—view software risks within the context of a system in which it is a component and the business problem that it is intended to solve • Take a forward-looking view—think about the risks that may arise in the future (e.g., due to changes in the software); establish contingency plans so that future events are manageable. • Encourage open communication—if someone states a potential risk, don’t discount it. If a risk is proposed in an informal manner, consider it. Encourage all stakeholders and users to suggest risks at any time. • Integrate—a consideration of risk must be integrated into the software process. • Emphasize a continuous process—the team must be vigilant throughout the software process, modifying identified risks as more information is known and adding new ones as better insight is achieved. • Develop a shared product vision—if all stakeholders share the same vision of the software, it is likely that better risk identification and assessment will occur. • Encourage teamwork—the talents, skills, and knowledge of all stakeholders should be pooled when risk management activities are conducted. [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 10. Example of Risks [Sommerville, 2011] Risk Affects Description Staff turnover Project Experienced staff will leave the project before it is finished. Management change Project There will be a change of organizational management with different priorities. Hardware unavailability Project Hardware that is essential for the project will not be delivered on schedule. Requirements change Project and product There will be a larger number of changes to the requirements than anticipated. Specification delays Project and product Specifications of essential interfaces are not available on schedule. Size underestimate Project and product The size of the system has been underestimated. CASE tool underperformance Product CASE tools, which support the project, do not perform as anticipated. Technology change Business The underlying technology on which the system is built is superseded by new technology. Product competition Business A competitive product is marketed before the system is completed. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 11. The Risk Management Process [Sommerville, 2011]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 12. Risk Identification [Sommerville, 2011] • May be a team activities or based on the individual project manager’s experience. • Six types of common risk: 1. Technology risks. Risks that derive from the software or hardware technologies that are used to develop the system. 2. People risks. Risks that are associated with the people in the development team. 3. Organizational risks. Risks that derive from the organizational environment where the software is being developed. 4. Tools risks. Risks that derive from the software tools and other support software used to develop the system. 5. Requirements risks. Risks that derive from changes to the customer requirements and the process of managing the requirements change. 6. Estimation risks. Risks that derive from the management estimates of the resources required to build the system. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 13. Risk Identification [Sommerville, 2011] Risk type Possible risks Technology The database used in the system cannot process as many transactions per second as expected. (1) Reusable software components contain defects that mean they cannot be reused as planned. (2) People It is impossible to recruit staff with the skills required. (3) Key staff are ill and unavailable at critical times. (4) Required training for staff is not available. (5) Organizational The organization is restructured so that different management are responsible for the project. (6) Organizational financial problems force reductions in the project budget. (7) Tools The code generated by software code generation tools is inefficient. (8) Software tools cannot work together in an integrated way. (9) Requirements Changes to requirements that require major design rework are proposed. (10) Customers fail to understand the impact of requirements changes. (11) Estimation The time required to develop the software is underestimated. (12) The rate of defect repair is underestimated. (13) The size of the software is underestimated. (14) CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 14. Risk Analysis [Sommerville, 2011] • Assess probability and seriousness of each risk. • Probability may be:Very Low (< 10%), Low (10-25%), Moderate (25-50%), High (50-75%) orVery High (> 75%). • Risk consequences might be: Catastrophic (threaten the survival of the project), Serious (would cause major delays),Tolerable (delays are within allowed contingency), or Insignificant. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 15. RiskTypes and Example [Sommerville, 2011] Risk Probability Effects Organizational financial problems force reductions in the project budget (7). Low Catastrophic It is impossible to recruit staff with the skills required for the project (3). High Catastrophic Key staff are ill at critical times in the project (4). Moderate Serious Faults in reusable software components have to be repaired before these components are reused. (2). Moderate Serious Changes to requirements that require major design rework are proposed (10). Moderate Serious The organization is restructured so that different management are responsible for the project (6). High Serious The database used in the system cannot process as many transactions per second as expected (1). Moderate Serious CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 16. RiskTypes and Example [Sommerville, 2011] Risk Probability Effects The time required to develop the software is underestimated (12). High Serious Software tools cannot be integrated (9). High Tolerable Customers fail to understand the impact of requirements changes (11). Moderate Tolerable Required training for staff is not available (5). Moderate Tolerable The rate of defect repair is underestimated (13). Moderate Tolerable The size of the software is underestimated (14). High Tolerable Code generated by code generation tools is inefficient (8). Moderate Insignificant CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 17. Risk Projection [Pressman, 2010] • Also called Risk Estimation • Risk Projection steps: • Establish a scale that reflects the perceived likelihood of a risk. • Delineate the consequences of the risk. • Estimate the impact of the risk on the project and the product. • Assess the overall accuracy of the risk projection so that there will be no misunderstandings. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 18. Risk Impact Assessment [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 19. Risk Planning [Sommerville, 2011] • Consider each risk and develop a strategy to manage that risk. • Risk strategies: • Avoidance strategies.The probability that the risk will arise is reduced. • Minimization strategies.The impact of the risk on the project or product will be reduced. • Contingency plans. If the risk arises, contingency plans are plans to deal with that risk. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 20. Risk Management Strategies [Sommerville, 2011] Risk Strategy Organizational financial problems Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business and presenting reasons why cuts to the project budget would not be cost- effective. Recruitment problems Alert customer to potential difficulties and the possibility of delays; investigate buying-in components. Staff illness Reorganize team so that there is more overlap of work and people therefore understand each other’s jobs. Defective components Replace potentially defective components with bought-in components of known reliability. Requirements changes Derive traceability information to assess requirements change impact; maximize information hiding in the design. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 21. Risk Management Strategies [Sommerville, 2011] Risk Strategy Organizational restructuring Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business. Database performance Investigate the possibility of buying a higher-performance database. Underestimated development time Investigate buying-in components; investigate use of a program generator. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 22. Risk Monitoring [Sommerville, 2011] • Assess each identified risks regularly to decide whether or not it is becoming less or more probable. • Also assess whether the effects of the risk have changed. • Each key risk should be discussed at management progress meetings. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 23. Risk Indicators [Sommerville, 2011] Risk type Potential indicators Technology Late delivery of hardware or support software; many reported technology problems. People Poor staff morale; poor relationships amongst team members; high staff turnover. Organizational Organizational gossip; lack of action by senior management. Tools Reluctance by team members to use tools; complaints about CASE tools; demands for higher-powered workstations. Requirements Many requirements change requests; customer complaints. Estimation Failure to meet agreed schedule; failure to clear reported defects. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 24. Developing a RiskTable [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 25. Risk Exposure (RE) [Pressman, 2010] 𝑅𝐸 = 𝑃 ∗ 𝐶 Dimana: • RE = Risk Exposure • P = Probability of occurrence for a risk • C = cost to the project should the risk occur CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 26. Risk Exposure (RE) [Pressman, 2010] • Risk identification. Only 70 percent of the software components scheduled for reuse will, in fact, be integrated into the application.The remaining functionality will have to be custom developed. • Risk probability. 80 percent (likely). • Risk impact. Sixty reusable software components were planned. If only 70 percent can be used, 18 components would have to be developed from scratch (in addition to other custom software that has been scheduled for development). Since the average component is 100 LOC and local data indicate that the software engineering cost for each LOC is $14.00, the overall cost (impact) to develop the components would be 18 x 100 x $14 = $25,200. • Risk exposure. RE = 0.80 x $25,200 ≈ $20,200. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 27. Risk Information Sheet (RIS) [Pressman, 2010]CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 28. International Risk Management Standards • COSO ERM (2004) • Applies to management, directors, regulators, academics and others who are interested in better understanding enterprise risk management • COSO ERM is a framework providing integrated principles, common terminology and practical implementation guidance supporting entities' programs to develop or benchmark their enterprise risk management processes. • This standard is voluntary. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 29. International Risk Management Standards • ISO 31000: Risk Management (2009) • Applies to any public, private or community enterprise, association, group or individual.Therefore, it is not specific to any industry or sector. • ISO 31000 provides principles and generic guidelines on risk management.Applies to any type of risk, whatever its nature, whether having positive or negative consequences. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 30. International Risk Management Standards • ISO/IEC 31010: Risk Management – Risk AssessmentTechniques (2009) • Applies to any public, private or community enterprise, association, group or individual.Therefore, it is not specific to any industry or sector. • ISO 31010 assists organizations in implementing the risk management principles and guidelines provided by the recently published ISO 31000:2009, itself complemented by ISO Guide 73:2009 on risk management vocabulary.This standard deals with risk assessment concepts, risk assessment process, and selection of risk assessment techniques.This standard is not intended for certification, regulatory or contractual use. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 31. International Risk Management Standards • ISO/IEC Guide 73: Risk Management Guidelines (2009) • Applies to those engaged in managing risks, those who are involved in activities of ISO and IEC, and developers of national or sector-specific standards, guides, procedures and codes of practice relating to the management of risk • The guide provides the definitions of generic terms related to risk management. It aims to encourage a mutual and consistent understanding of, and a coherent approach to, the description of activities relating to the management of risk, and the use of uniform risk management terminology in processes and frameworks dealing with the management of risk. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 32. International Risk Management Standards • BS 31100 (Risk Management) • Applies to any organization of any size • BS 31100 provides a foundation for organizations to understand, create, integrate and maintain risk management programs by giving recommendations on its model, framework, and process with the goal of increasing the organizations chances of meeting its objectives. CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 33. References • Roger S. Pressman, 2010, Software Engineering: A Practitioner’s Approach 7th edition, McGraw-Hill. • Ian Sommerville, 2011, Software Engineering 9th edition, Addison-Wesley. • Other references CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur
  • 34. Thanks • Achmad Solichin, S.Kom, M.T.I • achmatim@gmail.com • Twitter: @achmatim • Facebook: facebook.com/achmatim • Web: http://achmatim.net CS215 – Rekayasa Perangkat Lunak – Magister Ilmu Komputer Universitas Budi Luhur

Notas do Editor

  1. LOC = line of code
  2. LOC = line of code