risk chapter 2 pages 63 80 n.
Download
Skip this Video
Download Presentation
Risk Chapter 2, pages 63-80

Loading in 2 Seconds...

play fullscreen
1 / 16

Risk Chapter 2, pages 63-80 - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

Risk Chapter 2, pages 63-80. CSSE 372 11.September.2008. “At risk”. Outline. Identification Estimation Mitigation Exercise. Procter & Gamble’s equation: Risk = Hazard + Exposure. From www.pgbeautyscience.com/safety-assessment.html. First CotD. Identification. Technical

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Risk Chapter 2, pages 63-80' - todd


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
risk chapter 2 pages 63 80

RiskChapter 2, pages 63-80

CSSE 372

11.September.2008

“At risk”

outline
Outline
  • Identification
  • Estimation
  • Mitigation
  • Exercise

Procter & Gamble’s equation: Risk = Hazard + Exposure.

From www.pgbeautyscience.com/safety-assessment.html .

identification
Identification
  • Technical
  • Project Management
  • Organizational
  • External
  • Business

 A lot of people use Pressman’s risk list:

  • http://www.rspa.com/checklists/risk.html
  • For example…
technical issues start
Technical Issues (start)…
  • Are facilitated application specification techniques used to aid in communication between the customer and developer?
  • Are specific methods used for software analysis?
  • Do you use a specific method for data and architectural design?
  • Is more than 90 percent of your code written in a high order language?
  • Are specific conventions for code documentation defined and used?
  • Do you use specific methods for test case design?
  • Are software tools used to support planning and tracking activities?
discussion who ll have what risks
Discussion – Who’ll have what risks?
  • Which project manager is likely to have what kinds of risks?
    • Technical
    • Project Management
    • Organizational
    • External

Cody

Shanice

risk response
Risk response
  • Accept
  • Avoid
  • Contingency planning
  • Mitigate
  • Transfer
monitoring controlling
Monitoring/Controlling
  • Risk log
  • ID number
  • Risk description
  • Risk owner
  • Action to be taken
  • Outcome
  • Include Probability/Impact
risk assessments should be contain
Risk assessments should be/contain:
  • In the If _______, then___________ format
  • Clearly tie back to 5 project constraints
  • Include a mitigation strategy
  • Include a time line for revisiting/updating the risks
  • Include key resources
  • Indication of where it falls in the chart
  • Opportunities
discussion problem
Discussion Problem
  • You and 7 others are going to fly 1500 miles in a pedal-powered airplane.
  • The plane can carry 3000 pounds of freight (including passengers) at 30 mph, when powered by 4 pedallers.
  • Each team member can pedal for 4 hours continuously.
  • If you lose power the plane crashes.
activity
Activity
  • Identify the risks
  • For each risk, estimate its probability and impact
  • Prioritize risks
  • Identify mitigation strategies for the most important half of the risks
  • Share your results withrest of class
questions
Questions?

Bike blimp from http://blog.makezine.com/archive/2008/06/bike_blimp_remake.html.