Page 190 -
P. 190
CHAPTER 6 RISK ANALYSIS AND MANAGEMENT 161
[CHA92] Charette, R.N., “Building Bridges over Intelligent Rivers,” American Pro-
grammer, vol. 5, no. 7, September, 1992, pp. 2–9.
[DRU75] Drucker, P., Management, W. H. Heinemann, 1975.
[GIL88] Gilb, T., Principles of Software Engineering Management, Addison-Wesley, 1988.
[GLU94] Gluch, D.P., “A Construct for Describing Software Development Risks,”
CMU/SEI-94-TR-14, Software Engineering Institute, 1994.
[HAL98] Hall, E.M., Managing Risk: Methods for Software Systems Development,
Addison-Wesley, 1998.
[HIG95] Higuera, R.P., “Team Risk Management,” CrossTalk, U.S. Dept. of Defense,
January 1995, p. 2–4.
[KAR96] Karolak, D.W., Software Engineering Risk Management, IEEE Computer Soci-
ety Press, 1996.
[KEI98] Keil, M., et al., “A Framework for Identifying Software Project Risks,” CACM,
vol. 41, no. 11, November 1998, pp. 76–83.
[LEV95] Leveson, N.G., Safeware: System Safety and Computers, Addison-Wesley,
1995.
[ROW88] Rowe, W.D., An Anatomy of Risk, Robert E. Krieger Publishing Co., 1988.
[SEI93] “Taxonomy-Based Risk Identification,” Software Engineering Institute,
CMU/SEI-93-TR-6, 1993.
[THO92] Thomsett, R., “The Indiana Jones School of Risk Management,” American
Programmer, vol. 5, no. 7, September 1992, pp. 10–18.
[WIL97] Williams, R.C, J.A. Walker, and A.J. Dorofee, “Putting Risk Management into
Practice,” IEEE Software, May 1997, pp. 75–81.
PROBLEMS AND POINTS TO PONDER
6.1. Provide five examples from other fields that illustrate the problems associated
with a reactive risk strategy.
6.2. Describe the difference between “known risks” and “predictable risks.”
6.3. Add three additional questions or topics to each of the risk item checklists pre-
sented at the SEPA Web site.
6.4. You’ve been asked to build software to support a low-cost video editing sys-
tem. The system accepts videotape as input, stores the video on disk, and then allows
the user to do a wide range of edits to the digitized video. The result can then be out-
put to tape. Do a small amount of research on systems of this type and then make a
list of technology risks that you would face as you begin a project of this type.
6.5. You’re the project manager for a major software company. You’ve been asked
to lead a team that’s developing “next generation” word-processing software (see
Section 3.4.2 for a brief description). Create a risk table for the project.