Applied Software Risk Management: A Guide for Software Project Managers
By: C. Ravindranath Pandian (author)Hardback
1 - 2 weeks availability
Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.
Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.
RISK CULTURE Risk Thinking What Is Risk? A Boundary Problem Expressing Risk: The Basic Terms Risk Vocabulary Risk-Driven Project Management Controlling the Process, Environment, and Risk Maturity in Risk Culture Risk Scale Preparing for Risk RISK MANAGEMENT PROCESS What Is Risk Management? Risk Management Paradigms Is There a Process? In Real Life Five Models for Risk Management Model 1: The Organic Risk Management Process Model 2: Goal Selection Thinking about Less Risky Alternatives Model 3: Minimum Risk Management Model 4: Medium-Scale Risk Management Model 5: IAMT Cycle Model 6: Full-Scale Risk Management Risk Management at Different Levels Risk Escalation RISK ATTRIBUTES Risk Classification Risk Attributes Risk Origin Screening the Risks Three P's Risk Severity SEI Risk Taxonomy Risk Levels Time Element Affected Process Areas Affected Key Result Areas (KRA) Affected Goals Affected Requirements Risk Name Who Will Assign the Attributes? RISK IDENTIFICATION The Meaning of Risk Identification Risk Identification Methods Levels in Identification Identifying Product Risks Implementing Risk Identification Processes RISK ANALYSIS Scope and Purpose of Risk Analysis First-Order Analysis Useful Risk Distribution Analysis Seeing the Larger Picture Risk Levels and Analysis Effort Ownerless Risks Putting Together the Preliminary Analyses The Analysis Report More Analysis How to Implement Analysis RESPONDING TO RISK Getting Started Special Treatment for Catastrophic Risks The Constraint Risks Responding to Ordinary Threats A Comparison of Two Levels of Response Risk Response Plans Risk Avoidance Risk Transfer Risk Acceptance Risk Monitoring Risk Mitigation Contingency Plans Strategic Plan Risk Escalation Implementing Risk Response RISK TRACKING What Do We Track in Risks? A Moving Target Tracking Risk Response Plans Tracking the Bigger Response: Audits Tracking Hazard Risks Trigger Levels Tracking Project Risks Tracking Operational Risks Tracking Enterprise Risks Learning by Tracking Risk Tracker Tool The Hardening of Risks Implementing Risk Tracking RISK MODELS Why Models? Simple Risk Models Implementing Risk Models RISK INTELLIGENCE Natural Warning Systems Metrics Models Earned Value Model Estimation Model Requirement Model Critical Path Model WBS Model PERT Model of Risk Implementing Risk Intelligence FEED FORWARD Beyond Risk Reports Passing Knowledge Forward Risk Communication: The Critical Need Ten Barriers to Risk Communication Risk Dashboard Analytical Views Use of Models The Tool Risk Closure Report Better Than SPC Incorporating FFL in Risk Management INTEGRATED RISK MANAGEMENT Economy Drive The Visible and the Invisible The Positive and the Negative Program-Level Integration Strategic Business Unit (SBU)-Level Integration Enterprise-Level Integration Integrated Plans Integrated Risk Management: An Agile Process How to Establish Integrated Risk Management RISK MANAGEMENT: DRAFT PROCEDURES Can There Be a Procedure? The Risk Arena Symptoms of Not Having a Formal Risk Management Procedure The Anatomy of a Risk Management Procedure For Whom? Implementing the Procedures Procedure 1: Risk Management at Project and Operations Level Procedure 2: Enterprise Risk Management APPENDIX A: CAPER JONES'S RISK APPENDIX B: REX BLACK'S QUALITY RISK LIST APPENDIX C: SEI RISK TAXONOMY APPENDIX D: TOP N SOFTWARE RISKS APPENDIX E: PMI, RISK MANAGEMENT PROCESS APPENDIX F: IRM, RISK MANAGEMENT STANDARD APPENDIX G: CONTINUOUS RISK MANAGEMENT (CRM) PARADIGM APPENDIX H: BARRY BOEHM'S RISK MANAGEMENT PROCESS APPENDIX I: RISK MANAGEMENT IN CMMI APPENDIX J: REQUIREMENT RISK VERSUS MEASURABLE QUALITY ATTRIBUTES APPENDIX K: DIARY OF A RISK MANAGER RISK GLOSSARY REFERENCES INDEX
Number Of Pages:
- ID: 9780849305245
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36