FIT322: Information System Theory & Practice: Week 8: Risk
FIT322: Information System Theory & Practice: Week 8: Risk
Week 8: Risk
ISD Announcements
Where are we at this stage?
Identified problems/opportunities Defined IS project Determined the client requirements Analysed the requirements To recommend solution(s) - risk assessment To access risk during IS development
Outline
What is risk? Risk exposure
Case studies
Why software failed? (Charette 2005)
What is risk?
Cambridge online dictionary defines risk as:
possibility of something bad happening, and something bad that might happen
Risk exposure: an estimated, relative loss that is caused by the occurrence of a risk event
Risk exposure
there is a probability P of a risk event E happening, which results in a loss L
RE ( E ) = P L
(i.e. loss when compared to other likely events)
(Boehm 1991)
6
to strive for good results to avoid the worst (e.g. loss of income, harms, etc.)
projects each year software are getting increasingly complex: systems of systems 5-15% software projects end prematurely or shortly after delivery (~75billions in US, 2004)
failure: rework exceeds value-added work rework costs 100 x initial development cost
the business environment software complexity (size) software development failure to define a sensible scope (requirements, time and budget) human errors: bugs poor project management: risks, communication, training, reviewing, decision making
causes of failures:
management Risks can occur at any stage of the ISD life cycle Risk management tasks:
identify risks analyse risks prioritise risks determine risk control activities plan risk control activities
Identify IS risks
Keil et al. (1998) studies the common risks in
software development (also applicable to ISD) The top five risks are not related to technology:
lack of top management commitment to the project failure to gain user commitment misunderstand the requirements lack of adequate user involvement failure to manage end user expectations
2010
12
can be used for identifying ISD risks The framework defines four risk quadrants (or categories): customer mandate, scope/requirements, execution, environment Risks related to scope/requirements and execution are more within the control of the ISD team Risks related to customer mandate and scope/requirements are more important ones to manage
Environment
Execution
team have on the risk outcome Importance: the level of importance of a risk as perceived by the ISD team Customer mandate: client's commitment Scope/requirements: project scope and requirements Execution: project management issues Environment: internal and external organisational issues
Customer mandate
Risks related to the lack of or inadequate
customer mandate for completing the project Not controlled but can be influenced by project managers Many of the top-rated risks fall in this quadrant:
lack of top management commitment failure to gain user commitment inadequate user involvement
Scope/requirements risks
Risks arise from the ambiguities and
what is essential and what is desirable? is the scope subject to change over time?
Execution risks
Risks arise from the actual execution of the
project Project managers have reasonable control over these risks Examples:
inappropriate or insufficient staffing lack of effective development methodology poor estimation improper definition of roles and responsibilities
Environment risks
Risks that arise from the project environment
that exists both inside and outside the organization Project managers have little or no control Examples:
Analyse risks
The next step is to analyse the risks to
determine the probabilities of the risks & outcomes determine risk exposures:
with a probability This probability is determined subjectively by the team and past experience in similar projects A probability of a risk is its likelihood of occurrence in relation to other risks in the same risk category The procedure for determining probabilities is described in terms of a DFD
project details
risk quadrants
IS risks classification
2.3
project
Customer mandate:
lack of top management commitment: 1 failure to gain user commitment: 3 lack of adequate user involvement: 6
(1) to plan project risks and (2) to make project decisions involving risks Project risks are analysed and prioritised based on their exposures Project decisions are ranked based on the exposures of the risks involved:
Project decisions
Making project decision involving risks can be
helped by using risk exposures Project decisions are ranked based on their decision risk exposures A decision risk exposure is an aggregated risk exposure of all the risks involved A useful technique for measuring decision risk exposure is decision risk tree:
constructed from the all the risks and the decisions that follow from taking these risks
root node is a decision node that only has risk nodes as children a risk node has decision or outcome nodes as children a decision node has risk or outcome nodes as children all the leaf nodes are outcomes
decision edges (representing decisions) connect a decision node to its child risk nodes risk edges (representing risks) connect a risk node to its child decision nodes outcome edges (representing outcomes) connect outcome nodes to parent
R1: overrun due to failure to fully define user requirements at the start R2: overrun due to insufficient staffing R3: overrun due to significant hardwareimposed R4: overrun due to some modifications
0.6, D3
3
0.5, R1
develop in-house
0.4, R2
1 4
D1
0.1, R3
0.6, D3
5
0.8, R1
purchase
2010
0.2, R4
7
IST332 Information Systems
0.7, D3 0.3, D4
$12,000
30 $75,000
RE ( D ) = RE (E)
The risk exposure of an internal node N, RE(N), is the sum of all the risk exposures of all its child nodes C1, , Cn
RE ( N ) =
2010
RE (Ci )
1
31
$31,100
$32,580
2010
$32,580
$26,400 1 $6,180 4
IST332 Information Systems
0.8 3 4 0.2 3 4
Decision ranking
RE Decisions 1 RE $31,100 Risk Nodes 1 RE $14,500 $12,800 $3,800 1 2 3 Risks 0.5 0.4 0.1 Decisions 3 4 3 4 3 4 0.6 0.4 0.6 0.4 0.6 0.4 0.7 0.3 0.7 0.3 Outcomes $15,000 $50,000 $20,000 $50,000 $30,000 $50,000 $15,000 $75,000 $12,000 $75,000 33
$31,100
$32,580
$26,400 1 $6,180 4
IST332 Information Systems
0.8 3 4 0.2 3 4
Prioritise risks
Project risks are ranked based on their
risk exposures
project actions (or control activities) Risk control activities are proposed and refined through experience in running realworld projects Risk control activities are grouped according to the four risk quadrants
Environment
- contingency plans - scenarios
Execution
- use sound project management - use a disciplined ISD method - test new technologies early - use slack time - parallel change-over
36
convert risk control activities into project tasks construct an item project plan for these tasks organise/combine the item project plans to form a risk project plan merge the risk project plan into the overall project plan
2010
38
2010
39
2010
40
2010
41
Summary
Understand the nature of IS risks and the need to effectively manage them Introduces risk exposure and how to measure Introduces a risk management method in ISD involving identifying, analysing, prioritising, controlling and planning risks
References
Alter S., Information system: Foundation of E-Business, 4th ed. New Jersey: Pearson Education Inc., 2002
Richard L. Van Horn et al., Information System Solutions: A Project Approach, McGraw Hill, 2006
Charette, R.N., Why software failed, IEEE Spectrum, 42(9), 2005 Boehm B. W., Software risk management: principles and practices , IEEE Computer Society, 1991 Keil M., Cule P.E., Lyytinen K., Schmidt R.C., A framework for identifying software project risks, ACM: Communications of ACM, 41(11), 1998