SlideShare uma empresa Scribd logo
1 de 31
CBAM (Cost Benefit Analysis Method)
Presented By
Asim Shahzad
MCS02121005
Agenda
CBAM, Cost Benefit Analysis Method.
Decision Making Context.
The Basics of CBAM.
CBAM Steps.
CBAM Outcomes and Strengths
Cost-Benefit Analysis Method (CBAM)
CBAM an architecture for analyzing the costs,

benefits and schedule implications of architectural
decisions.
ATAM (Architecture Trade-off Analysis Method)
considered the design decisions with respect to
architectural quality attributes like modifiability,
performance, availability, usability, and so on.
CBAM is different from the former method, it add the
costs (and implicit budgets or money) as quality
attributes.
Cont..
The biggest tradeoffs in large, complex systems

usually have to do with finance.
How should an organization invest its resources in a
manner that will maximize its gains and minimize its
risk?
“…perhaps more important than costs, are the
benefits than an architecture decision may bring to an
organization.”
CBAM provides an assessment of the technical and
economic issues and architectural decisions
Decision-Making Context
The CBAM does not make decisions for the stakeholders. It

simply aids in the documentation of the costs and benefits
analysis.
The

CBAM can aid the stakeholders in choosing
architectural strategies based on their return on investment
(ROI) – the ratio of benefit to cost.
Calculating ROI
R (ROI) = (B (Benefit) / C (Cost))*100
This can be used to determine the optimal order for

implementation the various strategies.

Investment= $2000
Benefit = $500
R (ROI)=(B(benefit)/C(cost))*100
R(ROI)=($500/$2000)*100= 25%
Context of CBAM
The Basis for the CBAM
Variations of Scenarios
 a way to strongly express and represent specific quality attributes

(performance, cost, trademark etc. )

Utility-Response
 Every incentive in a scenario provides some utility to the

stakeholders.

Priorities of Scenarios
 Different scenarios within a given system have different levels of

importance to the stakeholders and hence different utilities.
 To characterize the relative importance of each scenario, a weigh is
assigned through a two-step voting exercise.
The Basis for the CBAM {2}
Architectural Strategies
In order to move from the current

utility attribute response level to the
desired or even best-case level.
Side

Effects
Impact of the changes
The importance of Cost Modeling
“How do I convince my boss to investing in

availability ?”
Maintain high availability requires a high level of
redundancy(duplication) with a rollover capability
This takes time an personnel
Personnel cost money as do purchasing highly available

software and adapting it for particular needs

Cost models are imperfect for a wide variety of

reasons, but they are the only tools available to
constrain requirements.
The CBAM steps:
This section first describes the steps of the CBAM
and then explores how to quantify uncertainty
to aid in making decisions.
Iteration I: Establish an Initial
Ranking
In the first iteration of the CBAM, each step is executed
to establish an initial ranking that will then be refined
in the second iteration. These steps serve to reduce the
size of the decision space, refine the scenarios, collect
sufficient information for decision making, and
establish an initial ranking of ASs.
Step 1:
Collate scenarios
Collate the scenarios elicited during the ATAM
exercise, and allow stakeholders to contribute new
ones. Prioritize these scenarios based on satisfying the
business goals of the system and choose the top onethird for further study.
Step 2:
Refine scenarios
Refine the scenarios by focusing on their
stimulus/response measures. Elicit the worst, current,
desired, and best-case QA response level for each
scenario.
Step 3:
Prioritize scenarios
Allocate 100 votes to each stakeholder and have them
distribute the votes among the scenarios by considering
the desired response value for each scenario. Total the
votes and choose the top 50% of the scenarios for
further analysis. Assign a weight of 1.0 to the highest
rated scenario, and assign the other scenarios a weight
relative to that scenario. This becomes the scenario
weight that appears in the calculation of the overall
benefit of an AS. Make a list of the QAs that concern
the stakeholders
Step 4:
Assign utility.
Determine the utility for each QA response level
(worst-case, current, desired, or best-case) for all
scenarios. The QAs of concern are the ones in the list
generated in step
Step 5:
Develop ASs for scenarios and determine their
expected QA response levels.
Develop (or capture the already-developed) ASs that
address the top 50% of the scenarios chosen in step 3,
and determine the expected QA response levels that
will result from implementing these ASs. Given that an
AS may affect multiple scenarios, this calculation must
be performed for each affected scenario.
Step 6:
Determine the utility of the expected QA response
level by interpolation.
Using the elicited utility values (that form a utility
curve) determine the utility of the “expected” QA
response level. We perform this calculation for each
affected scenario.
Step 7:
Calculate the total benefit obtained from an AS.
Subtract the utility value of the “current” level from the
“expected” level and normalize it using the votes
elicited in step 3. Sum the benefit of a particular AS
across all scenarios and across all relevant QAs
Step 8
Choose ASs based on ROI, subject to cost and
schedule constraints.
Determine the cost and schedule implications of each
AS. Calculate the ROI value for each remaining AS as a
ratio of benefit to cost. Rank order the ASs according to
their ROI values, and choose the top ones until the
budget or schedule is exhausted.
Step 9:
Confirm the results with intuition.
Of the chosen ASs, consider whether these seem to
align with the organization’s business goals. If not,
consider issues that may have been overlooked during
the analysis. If significant issues exist, perform another
iteration of these steps.
AS (Architecture
strategies)
QA (Quality
Attribute)
Iteration II: Incorporating
Uncertainty
A more sophisticated and realistic version of the CBAM
can be created by expanding on the steps enumerated
above. Secondary information can be added about risk
estimation and uncertainty and the allocation of
development resources. Each category of secondary
information may potentially affect the investment
decisions under consideration. Therefore, the ways they
augment the steps of the method must be considered
carefully for correctness and for practicality
Iteration II: Incorporating
Uncertainty(cont.…)
Augmenting the Steps.
The CBAM relies on stakeholder judgments for its
valuations of software benefits and costs. But these
judgments will naturally be uncertain, due to
differences in beliefs and experiences. One way to think
rigorously about the uncertainty of the results collected
in Iteration I is to collect and consider the risks
inherent in the estimates that have been made. To do
this, some kind of risk assessment exercise must be
performed. The risks typically fall into these four
categories.
Cont.….
Risks that affect the cost estimate of a strategy
under consideration
2. Risks that affect a stimulus-response characteristic
or a utility estimate of a strategy in the context of a
scenario.
3. Risks that affect stimulus-response characteristics
of other scenarios or QAs not previously considered.
These risks pertain to the side effects (rather than
the intended effects) of an AS.
1.
Cont.….
4. Risks that are related to project management and

schedule
CBAM Outcomes and Strengths
solving a problem in theory is very different from
solving one in practice.
The method provides values as a basis for a rational

decision making process in applying certain
architectural strategies
The method provides a business measure that can
determine the level of return on investment of a
particular change to the system.
Cont.…
The method will help organizations in analyzing and

pre-evaluating the resource investment in different
directions by adopting those architectural strategies
that are maximizing the gains and minimize the risks.
CBAM tells us that giving people the appropriate
tools to frame and structure their decision-making
process in relation to costs and benefits and
encouraging the right kind of dialogue among the
stakeholders are beneficial to the development of the
soft-ware system.
Questions??
 CBAM

Mais conteúdo relacionado

Mais procurados

Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25
koolkampus
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
Ashita Agrawal
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
koolkampus
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24
koolkampus
 

Mais procurados (20)

Lect4 software economics
Lect4 software economicsLect4 software economics
Lect4 software economics
 
4+1 view model
4+1 view model4+1 view model
4+1 view model
 
Language and Processors for Requirements Specification
Language and Processors for Requirements SpecificationLanguage and Processors for Requirements Specification
Language and Processors for Requirements Specification
 
Software design, software engineering
Software design, software engineeringSoftware design, software engineering
Software design, software engineering
 
Pressman ch-25-risk-management
Pressman ch-25-risk-managementPressman ch-25-risk-management
Pressman ch-25-risk-management
 
Software Engineering Unit 1
Software Engineering Unit 1Software Engineering Unit 1
Software Engineering Unit 1
 
Unified process model
Unified process modelUnified process model
Unified process model
 
Ooad
OoadOoad
Ooad
 
Architectural structures and views
Architectural structures and viewsArchitectural structures and views
Architectural structures and views
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML Designing
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25
 
RMMM Plan
RMMM PlanRMMM Plan
RMMM Plan
 
Design notation
Design notationDesign notation
Design notation
 
Software Designing - Software Engineering
Software Designing - Software EngineeringSoftware Designing - Software Engineering
Software Designing - Software Engineering
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
 
Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24Quality Management in Software Engineering SE24
Quality Management in Software Engineering SE24
 
Uml structural diagrams
Uml structural diagramsUml structural diagrams
Uml structural diagrams
 
UML
UMLUML
UML
 

Destaque (10)

Reliability and its principals
Reliability and its principalsReliability and its principals
Reliability and its principals
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testing
 
Architecture Review
Architecture ReviewArchitecture Review
Architecture Review
 
Software reliability tools and common software errors
Software reliability tools and common software errorsSoftware reliability tools and common software errors
Software reliability tools and common software errors
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
Abc
AbcAbc
Abc
 
Saam
SaamSaam
Saam
 
Importance of software architecture
Importance of software architectureImportance of software architecture
Importance of software architecture
 
Structural patterns
Structural patternsStructural patterns
Structural patterns
 
Software archiecture lecture07
Software archiecture   lecture07Software archiecture   lecture07
Software archiecture lecture07
 

Semelhante a CBAM

Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
Erik De Monte
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
cherishwinsland
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
smumbahelp
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
Maanbahadurkhadka
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
Vinoth Kumar
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
christinemaritza
 

Semelhante a CBAM (20)

IM426 3A G5.ppt
IM426 3A G5.pptIM426 3A G5.ppt
IM426 3A G5.ppt
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
Cost-Benefit Analysis
Cost-Benefit AnalysisCost-Benefit Analysis
Cost-Benefit Analysis
 
Quality - An Introduction-170715
Quality - An Introduction-170715Quality - An Introduction-170715
Quality - An Introduction-170715
 
Making Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI AdoptionMaking Smart Choices: Strategies for CMMI Adoption
Making Smart Choices: Strategies for CMMI Adoption
 
Return on-investment (roi)
Return on-investment (roi)Return on-investment (roi)
Return on-investment (roi)
 
Agile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value ManagementAgile Project Management Meets Earned Value Management
Agile Project Management Meets Earned Value Management
 
Pm0016 project risk management
Pm0016  project risk managementPm0016  project risk management
Pm0016 project risk management
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
OL 325 Final Project Guidelines and Rubric Overvie.docx
OL 325 Final Project Guidelines and Rubric    Overvie.docxOL 325 Final Project Guidelines and Rubric    Overvie.docx
OL 325 Final Project Guidelines and Rubric Overvie.docx
 
Sc0009 supply chain cost management
Sc0009   supply chain cost managementSc0009   supply chain cost management
Sc0009 supply chain cost management
 
Quick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk AssessmentQuick Reference Guide to BSA/AML Risk Assessment
Quick Reference Guide to BSA/AML Risk Assessment
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
 
Feasibility_Study
Feasibility_StudyFeasibility_Study
Feasibility_Study
 
Savi chapter9
Savi chapter9Savi chapter9
Savi chapter9
 
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...Cost Analysis of ComFrame: A Communication Framework for  Data Management in ...
Cost Analysis of ComFrame: A Communication Framework for Data Management in ...
 
Chapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docxChapter16For all types of project and in their different sizes, .docx
Chapter16For all types of project and in their different sizes, .docx
 
Ch09
Ch09Ch09
Ch09
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGN
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

CBAM

  • 1.
  • 2. CBAM (Cost Benefit Analysis Method) Presented By Asim Shahzad MCS02121005
  • 3. Agenda CBAM, Cost Benefit Analysis Method. Decision Making Context. The Basics of CBAM. CBAM Steps. CBAM Outcomes and Strengths
  • 4. Cost-Benefit Analysis Method (CBAM) CBAM an architecture for analyzing the costs, benefits and schedule implications of architectural decisions. ATAM (Architecture Trade-off Analysis Method) considered the design decisions with respect to architectural quality attributes like modifiability, performance, availability, usability, and so on. CBAM is different from the former method, it add the costs (and implicit budgets or money) as quality attributes.
  • 5. Cont.. The biggest tradeoffs in large, complex systems usually have to do with finance. How should an organization invest its resources in a manner that will maximize its gains and minimize its risk? “…perhaps more important than costs, are the benefits than an architecture decision may bring to an organization.” CBAM provides an assessment of the technical and economic issues and architectural decisions
  • 6. Decision-Making Context The CBAM does not make decisions for the stakeholders. It simply aids in the documentation of the costs and benefits analysis. The CBAM can aid the stakeholders in choosing architectural strategies based on their return on investment (ROI) – the ratio of benefit to cost.
  • 7. Calculating ROI R (ROI) = (B (Benefit) / C (Cost))*100 This can be used to determine the optimal order for implementation the various strategies. Investment= $2000 Benefit = $500 R (ROI)=(B(benefit)/C(cost))*100 R(ROI)=($500/$2000)*100= 25%
  • 9. The Basis for the CBAM Variations of Scenarios  a way to strongly express and represent specific quality attributes (performance, cost, trademark etc. ) Utility-Response  Every incentive in a scenario provides some utility to the stakeholders. Priorities of Scenarios  Different scenarios within a given system have different levels of importance to the stakeholders and hence different utilities.  To characterize the relative importance of each scenario, a weigh is assigned through a two-step voting exercise.
  • 10. The Basis for the CBAM {2} Architectural Strategies In order to move from the current utility attribute response level to the desired or even best-case level. Side Effects Impact of the changes
  • 11. The importance of Cost Modeling “How do I convince my boss to investing in availability ?” Maintain high availability requires a high level of redundancy(duplication) with a rollover capability This takes time an personnel Personnel cost money as do purchasing highly available software and adapting it for particular needs Cost models are imperfect for a wide variety of reasons, but they are the only tools available to constrain requirements.
  • 12. The CBAM steps: This section first describes the steps of the CBAM and then explores how to quantify uncertainty to aid in making decisions.
  • 13. Iteration I: Establish an Initial Ranking In the first iteration of the CBAM, each step is executed to establish an initial ranking that will then be refined in the second iteration. These steps serve to reduce the size of the decision space, refine the scenarios, collect sufficient information for decision making, and establish an initial ranking of ASs.
  • 14. Step 1: Collate scenarios Collate the scenarios elicited during the ATAM exercise, and allow stakeholders to contribute new ones. Prioritize these scenarios based on satisfying the business goals of the system and choose the top onethird for further study.
  • 15. Step 2: Refine scenarios Refine the scenarios by focusing on their stimulus/response measures. Elicit the worst, current, desired, and best-case QA response level for each scenario.
  • 16. Step 3: Prioritize scenarios Allocate 100 votes to each stakeholder and have them distribute the votes among the scenarios by considering the desired response value for each scenario. Total the votes and choose the top 50% of the scenarios for further analysis. Assign a weight of 1.0 to the highest rated scenario, and assign the other scenarios a weight relative to that scenario. This becomes the scenario weight that appears in the calculation of the overall benefit of an AS. Make a list of the QAs that concern the stakeholders
  • 17. Step 4: Assign utility. Determine the utility for each QA response level (worst-case, current, desired, or best-case) for all scenarios. The QAs of concern are the ones in the list generated in step
  • 18. Step 5: Develop ASs for scenarios and determine their expected QA response levels. Develop (or capture the already-developed) ASs that address the top 50% of the scenarios chosen in step 3, and determine the expected QA response levels that will result from implementing these ASs. Given that an AS may affect multiple scenarios, this calculation must be performed for each affected scenario.
  • 19. Step 6: Determine the utility of the expected QA response level by interpolation. Using the elicited utility values (that form a utility curve) determine the utility of the “expected” QA response level. We perform this calculation for each affected scenario.
  • 20. Step 7: Calculate the total benefit obtained from an AS. Subtract the utility value of the “current” level from the “expected” level and normalize it using the votes elicited in step 3. Sum the benefit of a particular AS across all scenarios and across all relevant QAs
  • 21. Step 8 Choose ASs based on ROI, subject to cost and schedule constraints. Determine the cost and schedule implications of each AS. Calculate the ROI value for each remaining AS as a ratio of benefit to cost. Rank order the ASs according to their ROI values, and choose the top ones until the budget or schedule is exhausted.
  • 22. Step 9: Confirm the results with intuition. Of the chosen ASs, consider whether these seem to align with the organization’s business goals. If not, consider issues that may have been overlooked during the analysis. If significant issues exist, perform another iteration of these steps.
  • 24. Iteration II: Incorporating Uncertainty A more sophisticated and realistic version of the CBAM can be created by expanding on the steps enumerated above. Secondary information can be added about risk estimation and uncertainty and the allocation of development resources. Each category of secondary information may potentially affect the investment decisions under consideration. Therefore, the ways they augment the steps of the method must be considered carefully for correctness and for practicality
  • 25. Iteration II: Incorporating Uncertainty(cont.…) Augmenting the Steps. The CBAM relies on stakeholder judgments for its valuations of software benefits and costs. But these judgments will naturally be uncertain, due to differences in beliefs and experiences. One way to think rigorously about the uncertainty of the results collected in Iteration I is to collect and consider the risks inherent in the estimates that have been made. To do this, some kind of risk assessment exercise must be performed. The risks typically fall into these four categories.
  • 26. Cont.…. Risks that affect the cost estimate of a strategy under consideration 2. Risks that affect a stimulus-response characteristic or a utility estimate of a strategy in the context of a scenario. 3. Risks that affect stimulus-response characteristics of other scenarios or QAs not previously considered. These risks pertain to the side effects (rather than the intended effects) of an AS. 1.
  • 27. Cont.…. 4. Risks that are related to project management and schedule
  • 28. CBAM Outcomes and Strengths solving a problem in theory is very different from solving one in practice. The method provides values as a basis for a rational decision making process in applying certain architectural strategies The method provides a business measure that can determine the level of return on investment of a particular change to the system.
  • 29. Cont.… The method will help organizations in analyzing and pre-evaluating the resource investment in different directions by adopting those architectural strategies that are maximizing the gains and minimize the risks. CBAM tells us that giving people the appropriate tools to frame and structure their decision-making process in relation to costs and benefits and encouraging the right kind of dialogue among the stakeholders are beneficial to the development of the soft-ware system.

Notas do Editor

  1. To earn profit of $50000000 in the year. To open 20 branches all over the world till 2020. Predictive Analysis, Security Method