Page 187 -
P. 187

158           PART TWO  MANAGING SOFTWARE PROJECTS


                       well underway and a number of people announce that they will be leaving. If the mit-
                       igation strategy has been followed, backup is available, information is documented,
                       and knowledge has been dispersed across the team. In addition, the project manager
                       may temporarily refocus resources (and readjust the project schedule) to those func-
                       tions that are fully staffed, enabling newcomers who must be added to the team to
                       “get up to speed.” Those individuals who are leaving are asked to stop all work and
                       spend their last weeks in “knowledge transfer mode.” This might include video-based
                       knowledge capture, the development of “commentary documents,” and/or meeting
                       with other team members who will remain on the project.
                          It is important to note that RMMM steps incur additional project cost. For exam-
                       ple, spending the time to "backup" every critical technologist costs money. Part of
         If RE for a specific risk  risk management, therefore, is to evaluate when the benefits accrued by the RMMM
         is less than the cost of  steps are outweighed by the costs associated with implementing them. In essence,
         risk mitigation, don’t  the project planner performs a classic cost/benefit analysis. If risk aversion steps for
         try to mitigate the risk
         but continue to  high turnover will increase both project cost and duration by an estimated 15 per-
         monitor it.   cent, but the predominant cost factor is "backup," management may decide not to
                       implement this step. On the other hand, if the risk aversion steps are projected to
                       increase costs by 5 percent and duration by only 3 percent management will likely
                       put all into place.
                          For a large project, 30 or 40 risks may identified. If between three and seven risk
                       management steps are identified for each, risk management may become a project
                       in itself! For this reason, we adapt the Pareto 80–20 rule to software risk. Experience
                       indicates that 80 percent of the overall project risk (i.e., 80 percent of the potential
                       for project failure) can be accounted for by only 20 percent of the identified risks. The
                       work performed during earlier risk analysis steps will help the planner to determine
                       which of the risks reside in that 20 percent (e.g., risks that lead to the highest risk
                       exposure). For this reason, some of the risks identified, assessed, and projected may
                       not make it into the RMMM plan—they don't fall into the critical 20 percent (the risks
                       with highest project priority).


                 6.7   SAFETY RISKS AND HAZARDS

                       Risk is not limited to the software project itself. Risks can occur after the software
                       has been successfully developed and delivered to the customer. These risks are typ-
                       ically associated with the consequences of software failure in the field.
                          In the early days of computing, there was reluctance to use computers (and soft-
                       ware) to control safety critical processes such as nuclear reactors, aircraft flight con-
                       trol, weapons systems, and large-scale industrial processes. Although the probability
                       of failure of a well-engineered system was small, an undetected fault in a computer-
                       based control or monitoring system could result in enormous economic damage or,
                       worse, significant human injury or loss of life. But the cost and functional benefits of
   182   183   184   185   186   187   188   189   190   191   192