SlideShare uma empresa Scribd logo
1 de 29
Software Engineering
                  B.Tech IT/II Sem-II

                     Term: 2008-2009
                    Unit-7 PPT SLIDES

Text Books:1.Software Engineering, A practitioner’s approach
                   Roger s. Pressman 6th edition McGraw-
  Hill
           2.Software Engineering Somerville 7th edition



                                                          1
Unit 7 Syllabus
• Metrics for Process and Products : Software
  Measurement, Metrics for software quality.
• Risk management : Reactive vs. Proactive Risk
  strategies, software risks, Risk identification,
  Risk projection, Risk refinement, RMMM, RMMM
  Plan.




                                                 2
INDEX
                                       Unit 7
S.No                         Topic Name              Lecture No   Slide No.

 1.    Metrics for process and product: Software        L1           4
             Measurement
 2.    Metrics for software quality                     L2           12

 3.    Risk Management: Reactive VS Proactive risk      L3           14

 4.    Software Risk                                    L4           16

 5.    Risk Identification                              L5           18

 6.    Risk Projection                                  L5           20

 7     Risk Refinement                                  L6           24

 7.    Risk Mitigation Monitoring And Management        L6           26

 8.    RMMM plan                                        L7           29


                                                                              3
Metrics for Process And Product
• Software Measurement:
  Software measurement can be
  categorized as
1)Direct Measure and

2)Indirect Measure


                                4
Metrics for Process And Product
• Direct Measurement
 Direct measure of software process include
  cost and effort
 Direct measure of product include lines of code,
  Execution speed, memory size, defects per
  reporting time period.
• Indirect Measurement
 Indirect measure examines the quality of
  software product itself(e.g. :-functionality,
  complexity, efficiency, reliability and
  maintainability)                                 5
Reasons for measurement
1. To gain baseline for comparison with
   future assessment
2. To determine status with respect to plan
3. To predict the size, cost and duration
   estimate
4. To improve the product quality and
   process improvement

                                              6
Software Measurement
•   The metrics in software Measurement are
   Size oriented metrics
   Function oriented metrics
   Object oriented metrics
   Web based application metric




                                              7
Size Oriented Metrics
• It totally concerned with the measurement
  of software.
• A software company maintains a simple
  record for calculating the size of the
  software.
• It includes LOC, Effort,$$,PP
  document,Error,Defect ,People.


                                              8
Function oriented metrics
• Measures the functionality derived by the
  application
• The most widely used function oriented
  metric is Function point
• Function point is independent of
  programming language
• Measures functionality from user point of
  view
                                              9
Object oriented metric
• Relevant for object oriented programming
• Based on the following
 Number of scenarios(Similar to use cases)
 Number of key classes
 Number of support classes
 Number of average support class per key
  class
 Number of subsystem
                                          10
Web based application metric
• Metrics related to web based application
  measure the following
1.Number of static pages(NSP)
2.Number of dynamic pages(NDP)
     Customization(C)=NSP/NSP+NDP
       C should approach 1


                                             11
Metrics for Software Quality
• Measuring Software Quality
1.Correctness=defects/KLOC
2.Maintainability=MTTC(Mean-time to
  change)
3.Integrity=Sigma[1-(threat(1-security))]
   Threat : Probability that an attack of
  specific type will occur within a given time
   Security : Probability that an attack of a
  specific type will be repelled              12
Metrics for Software Quality
4. Usability: Ease of use
5. Defect Removal Efficiency(DRE)
    DRE=E/(E+D)
    E is the no. of errors found before
   delivery and D is no. of defects reported
   after delivery
    Ideal value of DRE is 1

                                               13
Risk Management
• Risk is an undesired event or circumstance that
  occur while a project is underway
• It is necessary for the project manager to
  anticipate and identify different risks that a
  project may be susceptible to.
• Risk Management
  It aims at reducing the impact of all kinds of risk
  that may effect a project by identifying, analyzing
  and managing them

                                                  14
Risk Management
Reactive Vs Proactive risk
 Reactive :
 It monitors the projects likely risk and
 resources are set aside.
 Proactive:
 Risk are identified, their probability and
 impact is accessed

                                              15
Software Risk
• It involve 2 characteristics
1. Uncertainty : Risk may or may not happen
2. Loss : If risk is reality unwanted loss or
   consequences will occur
• It includes
1)Project Risk
2)Technical Risk
3)Business Risk
4)Known Risk
5)Unpredictable Risk
6)Predictable Risk                              16
Software Risk
• Project risk: Threaten the project plan and affect
  schedule and resultant cost
• Technical risk: Threaten the quality and
  timeliness of software to be produced
• Business risk: Threaten the viability of software
  to be built
• Known risk: These risks can be recovered from
  careful evaluation
• Predictable risk: Risks are identified by past
  project experience
• Unpredictable risk: Risks that occur and may be
  difficult to identify                              17
Risk Identification
•   It concerned with identification of risk
•   Step1: Identify all possible risks
•   Step2: Create item check list
•   Step3: Categorize into risk components-
    Performance risk, cost risk, support risk and
    schedule risk
•   Step4: Divide the risk into one of 4 categories
•   Negligible-0
•   Marginal-1
•   Critical-2
•   Catastrophic-3                                    18
Risk Identification
•   Risk Identification includes
•   Product size
•   Business impact
•   Development environment
•   Process definition
•   Customer characteristics
•   Technology to be built
•   Staff size and experience
                                   19
Risk Projection
• Also called risk estimation
• It estimates the impact of risk on the
  project and the product
• Estimation is done by using Risk Table
• Risk projection addresses risk in 2 ways
• Likelihood or probability that the risk is
  real(Li)
• Consequences(Xi)
                                               20
Risk Projection
• Steps in Risk projection
1. Estimate Li for each risk
2. Estimate the consequence Xi
3. Estimate the impact
4. Draw the risk table
5. Ignore the risk where the management concern
   is low i.e., risk having impact high or low with low
   probability of occurrence
6. Consider all risks where management concern is
   high i.e., high impact with high or moderate
   probability of occurrence or low impact with high
   probability of occurrence                          21
Risk Projection
Risk            Category   Probability   Impact   RMMM
Size estimate PS           60%           2
may be
significantly
low
Larger no. of   PS         30%           3
users than
planned
Less reuse      PS         70%           2
than planned
End user        BU         40%           3
resist system




                                                         22
Risk Projection
• The impact of each risk is assessed by
  Impact values
  Catastrophic-1
  Critical-2
   Marginal-3
   Negligible-4


                                           23
Risk Refinement
• Also called Risk assessment
• Refines the risk table in reviewing the risk
  impact based on the following three
  factors
a.Nature: Likely problems if risk occurs
b.Scope: Just how serious is it?
c.Timing: When and how long


                                                 24
Risk Refinement
• It is based on Risk Elaboration
• Calculate Risk exposure RE=P*C
   Where P is probability and C is cost of
  project if risk occurs




                                             25
Risk Mitigation Monitoring And
       Management (RMMM)
• Its goal is to assist project team in
  developing a strategy for dealing with risk
• There are three issues of RMMM
1)Risk Avoidance

2)Risk Monitoring and

3)Risk Management
                                                26
Risk Mitigation Monitoring And
       Management (RMMM)
• Risk Mitigation
  Proactive planning for risk avoidance
• Risk Monitoring
- Assessing whether predicted risk occur or not
- Ensuring risk aversion steps are being properly
  applied
- Collection of information for future risk analysis
- Determine which risks caused which problems

                                                       27
Risk Mitigation Monitoring And
       Management (RMMM)
• Risk Management
- Contingency planning
- Actions to be taken in the event that
  mitigation steps have failed and the risk
  has become a live problem
- Devise RMMP(Risk Mitigation Monitoring
  And Management Plan)

                                              28
RMMM plan
• It documents all work performed as a part
  of risk analysis.

• Each risk is documented individually by
  using a Risk Information Sheet.

• RIS is maintained by using a database
  system
                                              29

Mais conteúdo relacionado

Mais procurados

Computational Learning Theory
Computational Learning TheoryComputational Learning Theory
Computational Learning Theory
butest
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
Sravanthi Emani
 
Object oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle pptObject oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle ppt
Kunal Kishor Nirala
 

Mais procurados (20)

A generic view of software engineering
A generic view of software engineeringA generic view of software engineering
A generic view of software engineering
 
Control Strategies in AI
Control Strategies in AIControl Strategies in AI
Control Strategies in AI
 
Computational Learning Theory
Computational Learning TheoryComputational Learning Theory
Computational Learning Theory
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
System software - macro expansion,nested macro calls
System software - macro expansion,nested macro callsSystem software - macro expansion,nested macro calls
System software - macro expansion,nested macro calls
 
COCOMO Model By Dr. B. J. Mohite
COCOMO Model By Dr. B. J. MohiteCOCOMO Model By Dr. B. J. Mohite
COCOMO Model By Dr. B. J. Mohite
 
Agile Development | Agile Process Models
Agile Development | Agile Process ModelsAgile Development | Agile Process Models
Agile Development | Agile Process Models
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignment
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 
Context model
Context modelContext model
Context model
 
Improving of software processes
Improving of software processesImproving of software processes
Improving of software processes
 
Object oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle pptObject oriented-systems-development-life-cycle ppt
Object oriented-systems-development-life-cycle ppt
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methods
 
Program security
Program securityProgram security
Program security
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
I. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHMI. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHM
 
RMMM
RMMMRMMM
RMMM
 
PAC Learning
PAC LearningPAC Learning
PAC Learning
 

Semelhante a Unit 7

Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 

Semelhante a Unit 7 (20)

OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk management
Risk managementRisk management
Risk management
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
risk management
risk managementrisk management
risk management
 
Software Quality presentation.pptx
Software Quality presentation.pptxSoftware Quality presentation.pptx
Software Quality presentation.pptx
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk Analysis.pdf
Risk Analysis.pdfRisk Analysis.pdf
Risk Analysis.pdf
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
risk managment and quality
risk managment and qualityrisk managment and quality
risk managment and quality
 

Mais de anuragmbst

Unit 1 watertech1 merged
Unit 1 watertech1 mergedUnit 1 watertech1 merged
Unit 1 watertech1 merged
anuragmbst
 
Unit 7-phaserule
Unit 7-phaseruleUnit 7-phaserule
Unit 7-phaserule
anuragmbst
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resources
anuragmbst
 
Unit 3 polymers
Unit 3 polymersUnit 3 polymers
Unit 3 polymers
anuragmbst
 
Unit 2-science-of-corrosion
Unit 2-science-of-corrosionUnit 2-science-of-corrosion
Unit 2-science-of-corrosion
anuragmbst
 
Unit 3 requirements engineering processes merged
Unit 3 requirements engineering processes mergedUnit 3 requirements engineering processes merged
Unit 3 requirements engineering processes merged
anuragmbst
 

Mais de anuragmbst (20)

Unit 1 watertech1 merged
Unit 1 watertech1 mergedUnit 1 watertech1 merged
Unit 1 watertech1 merged
 
Unit 7-phaserule
Unit 7-phaseruleUnit 7-phaserule
Unit 7-phaserule
 
Unit 6-energy-resources
Unit 6-energy-resourcesUnit 6-energy-resources
Unit 6-energy-resources
 
Unit 3 polymers
Unit 3 polymersUnit 3 polymers
Unit 3 polymers
 
Unit 2-science-of-corrosion
Unit 2-science-of-corrosionUnit 2-science-of-corrosion
Unit 2-science-of-corrosion
 
Unit 3 requirements engineering processes merged
Unit 3 requirements engineering processes mergedUnit 3 requirements engineering processes merged
Unit 3 requirements engineering processes merged
 
Unit 8
Unit 8Unit 8
Unit 8
 
Unit 6
Unit 6Unit 6
Unit 6
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit4
Unit4Unit4
Unit4
 
Unit2
Unit2Unit2
Unit2
 
Unit1
Unit1Unit1
Unit1
 
Unit 01 dbms
Unit 01 dbmsUnit 01 dbms
Unit 01 dbms
 
Unit 08 dbms
Unit 08 dbmsUnit 08 dbms
Unit 08 dbms
 
Unit 07 dbms
Unit 07 dbmsUnit 07 dbms
Unit 07 dbms
 
Unit 06 dbms
Unit 06 dbmsUnit 06 dbms
Unit 06 dbms
 
Unit 05 dbms
Unit 05 dbmsUnit 05 dbms
Unit 05 dbms
 
Unit 04 dbms
Unit 04 dbmsUnit 04 dbms
Unit 04 dbms
 
Unit 03 dbms
Unit 03 dbmsUnit 03 dbms
Unit 03 dbms
 
Unit 02 dbms
Unit 02 dbmsUnit 02 dbms
Unit 02 dbms
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Unit 7

  • 1. Software Engineering B.Tech IT/II Sem-II Term: 2008-2009 Unit-7 PPT SLIDES Text Books:1.Software Engineering, A practitioner’s approach Roger s. Pressman 6th edition McGraw- Hill 2.Software Engineering Somerville 7th edition 1
  • 2. Unit 7 Syllabus • Metrics for Process and Products : Software Measurement, Metrics for software quality. • Risk management : Reactive vs. Proactive Risk strategies, software risks, Risk identification, Risk projection, Risk refinement, RMMM, RMMM Plan. 2
  • 3. INDEX Unit 7 S.No Topic Name Lecture No Slide No. 1. Metrics for process and product: Software L1 4 Measurement 2. Metrics for software quality L2 12 3. Risk Management: Reactive VS Proactive risk L3 14 4. Software Risk L4 16 5. Risk Identification L5 18 6. Risk Projection L5 20 7 Risk Refinement L6 24 7. Risk Mitigation Monitoring And Management L6 26 8. RMMM plan L7 29 3
  • 4. Metrics for Process And Product • Software Measurement: Software measurement can be categorized as 1)Direct Measure and 2)Indirect Measure 4
  • 5. Metrics for Process And Product • Direct Measurement  Direct measure of software process include cost and effort  Direct measure of product include lines of code, Execution speed, memory size, defects per reporting time period. • Indirect Measurement  Indirect measure examines the quality of software product itself(e.g. :-functionality, complexity, efficiency, reliability and maintainability) 5
  • 6. Reasons for measurement 1. To gain baseline for comparison with future assessment 2. To determine status with respect to plan 3. To predict the size, cost and duration estimate 4. To improve the product quality and process improvement 6
  • 7. Software Measurement • The metrics in software Measurement are  Size oriented metrics  Function oriented metrics  Object oriented metrics  Web based application metric 7
  • 8. Size Oriented Metrics • It totally concerned with the measurement of software. • A software company maintains a simple record for calculating the size of the software. • It includes LOC, Effort,$$,PP document,Error,Defect ,People. 8
  • 9. Function oriented metrics • Measures the functionality derived by the application • The most widely used function oriented metric is Function point • Function point is independent of programming language • Measures functionality from user point of view 9
  • 10. Object oriented metric • Relevant for object oriented programming • Based on the following  Number of scenarios(Similar to use cases)  Number of key classes  Number of support classes  Number of average support class per key class  Number of subsystem 10
  • 11. Web based application metric • Metrics related to web based application measure the following 1.Number of static pages(NSP) 2.Number of dynamic pages(NDP) Customization(C)=NSP/NSP+NDP C should approach 1 11
  • 12. Metrics for Software Quality • Measuring Software Quality 1.Correctness=defects/KLOC 2.Maintainability=MTTC(Mean-time to change) 3.Integrity=Sigma[1-(threat(1-security))] Threat : Probability that an attack of specific type will occur within a given time Security : Probability that an attack of a specific type will be repelled 12
  • 13. Metrics for Software Quality 4. Usability: Ease of use 5. Defect Removal Efficiency(DRE) DRE=E/(E+D) E is the no. of errors found before delivery and D is no. of defects reported after delivery Ideal value of DRE is 1 13
  • 14. Risk Management • Risk is an undesired event or circumstance that occur while a project is underway • It is necessary for the project manager to anticipate and identify different risks that a project may be susceptible to. • Risk Management It aims at reducing the impact of all kinds of risk that may effect a project by identifying, analyzing and managing them 14
  • 15. Risk Management Reactive Vs Proactive risk Reactive : It monitors the projects likely risk and resources are set aside. Proactive: Risk are identified, their probability and impact is accessed 15
  • 16. Software Risk • It involve 2 characteristics 1. Uncertainty : Risk may or may not happen 2. Loss : If risk is reality unwanted loss or consequences will occur • It includes 1)Project Risk 2)Technical Risk 3)Business Risk 4)Known Risk 5)Unpredictable Risk 6)Predictable Risk 16
  • 17. Software Risk • Project risk: Threaten the project plan and affect schedule and resultant cost • Technical risk: Threaten the quality and timeliness of software to be produced • Business risk: Threaten the viability of software to be built • Known risk: These risks can be recovered from careful evaluation • Predictable risk: Risks are identified by past project experience • Unpredictable risk: Risks that occur and may be difficult to identify 17
  • 18. Risk Identification • It concerned with identification of risk • Step1: Identify all possible risks • Step2: Create item check list • Step3: Categorize into risk components- Performance risk, cost risk, support risk and schedule risk • Step4: Divide the risk into one of 4 categories • Negligible-0 • Marginal-1 • Critical-2 • Catastrophic-3 18
  • 19. Risk Identification • Risk Identification includes • Product size • Business impact • Development environment • Process definition • Customer characteristics • Technology to be built • Staff size and experience 19
  • 20. Risk Projection • Also called risk estimation • It estimates the impact of risk on the project and the product • Estimation is done by using Risk Table • Risk projection addresses risk in 2 ways • Likelihood or probability that the risk is real(Li) • Consequences(Xi) 20
  • 21. Risk Projection • Steps in Risk projection 1. Estimate Li for each risk 2. Estimate the consequence Xi 3. Estimate the impact 4. Draw the risk table 5. Ignore the risk where the management concern is low i.e., risk having impact high or low with low probability of occurrence 6. Consider all risks where management concern is high i.e., high impact with high or moderate probability of occurrence or low impact with high probability of occurrence 21
  • 22. Risk Projection Risk Category Probability Impact RMMM Size estimate PS 60% 2 may be significantly low Larger no. of PS 30% 3 users than planned Less reuse PS 70% 2 than planned End user BU 40% 3 resist system 22
  • 23. Risk Projection • The impact of each risk is assessed by Impact values Catastrophic-1 Critical-2 Marginal-3 Negligible-4 23
  • 24. Risk Refinement • Also called Risk assessment • Refines the risk table in reviewing the risk impact based on the following three factors a.Nature: Likely problems if risk occurs b.Scope: Just how serious is it? c.Timing: When and how long 24
  • 25. Risk Refinement • It is based on Risk Elaboration • Calculate Risk exposure RE=P*C Where P is probability and C is cost of project if risk occurs 25
  • 26. Risk Mitigation Monitoring And Management (RMMM) • Its goal is to assist project team in developing a strategy for dealing with risk • There are three issues of RMMM 1)Risk Avoidance 2)Risk Monitoring and 3)Risk Management 26
  • 27. Risk Mitigation Monitoring And Management (RMMM) • Risk Mitigation Proactive planning for risk avoidance • Risk Monitoring - Assessing whether predicted risk occur or not - Ensuring risk aversion steps are being properly applied - Collection of information for future risk analysis - Determine which risks caused which problems 27
  • 28. Risk Mitigation Monitoring And Management (RMMM) • Risk Management - Contingency planning - Actions to be taken in the event that mitigation steps have failed and the risk has become a live problem - Devise RMMP(Risk Mitigation Monitoring And Management Plan) 28
  • 29. RMMM plan • It documents all work performed as a part of risk analysis. • Each risk is documented individually by using a Risk Information Sheet. • RIS is maintained by using a database system 29