EVERYDAY FREE SHIPPING on $25 & up  Excludes Marketplace items
on $25 & up
 Excludes Marketplace
Managing Risk

Managing Risk - 98 edition

ISBN13: 978-0201255928

Cover of Managing Risk 98 (ISBN 978-0201255928)
ISBN13: 978-0201255928
ISBN10: 0201255928

Cover type: Hardback
Edition: 98
Copyright: 1998
Publisher: Addison-Wesley Longman, Inc.
Published: 1998
International: No

List price: $69.99

Managing Risk - 98 edition

ISBN13: 978-0201255928

Elaine M. Hall

ISBN13: 978-0201255928
ISBN10: 0201255928

Cover type: Hardback
Edition: 98
Copyright: 1998
Publisher: Addison-Wesley Longman, Inc.
Published: 1998
International: No

"Since it is more than just common sense, the newcomer to risk management needs an intelligent guide. It is in this role that Elaine Hall's book excels. This book provides a set of practical and well-delineated processes for implementation of the discipline."

--Tom DeMarco, from the Foreword

Risk is inherent in the development of any large software system. A common approach to risk in software development is to ignore it and hope that no serious problems occur. Leading software companies use quantitative risk management methods as a more useful approach to achieve success.

Written for busy professionals charged with delivering high-quality products on time and within budget, Managing Risk is a comprehensive guide that describes a success formula for managing software risk. The book is divided into five parts that describe a risk management road map designed to take you from crisis to control of your software project.

Highlights include:

  • Six disciplines for managing product development.
  • Steps to predictable risk-management process results.
  • How to establish the infrastructure for a risk-aware culture.
  • Methods for the implementation of a risk management plan.
  • Case studies of people in crisisÐand in control.

Author Bio

Hall, Elaine M. : Level 6 Software

Elaine M. Hall is founder of Level 6 Software, a leading consulting group in discovery methods for software engineering. She conducts training seminars and supports the implementation of software risk management for both government and industry clients worldwide. Dr. Hall is chair of the risk management working group for the International Council on Systems Engineering. She has nearly 20 years of experience in software systems engineering and management.

Table of Contents

(Each chapter concludes with a Summary.)

1. Software Risk Management.

Risk in the Large.
Risk in the Small.
Consequences of Knowledge.
Consequences of Ignorance.

2. P2I2 Sucess Formula.

Major Factors in Risk Management Capability.
People: The Human Element.
Process: The Steps to Manage Risk.
Infrastructure: The Organizational Foundation.
Implementation: The Project Execution.

3. Risk Management Roadmap.

The Road to Risk Management Capability.
Risk Management Roadmap Directions.
Journey from Problem to Opportunity.
Journey from Novice to Expert.

4. Identify Risk.

Define Risk Identification Process.
Develop Risk Checklists.
Define Risk Assessment Method.
Develop Risk Management Form.
Establish Risk-Database Schema.

5. Analyze Risk.

Define Risk Analysis Process.
Define Risk Analysis Techniques.
Define Risk Evaluation Criteria.
Establish Risk Prioritization Scheme.

6. Plan Risk.

Define Risk Planning Process.
Define Risk Resolution Strategies.
Define Selection Criteria.
Develop Risk Action Plan Template.

7. Track Risk.

Define Risk Tracking Process.
Define Risk Tracking Techniques.
Define Risk Tracking Measures.
Define Triggering Devices.

8. Resolve Risk.

Define Risk Resolution Process.
Define Risk Resolution Techniques.
Define Risk Resolution Measures.
Develop Corrective Action Procedure.

9. Develop Policy.

Obtain Commitment.
Survey Existing Practice.
Allocate Resources.
Define Draft Policy.
Review Draft Policy.
Document Policy.
Approve Policy.
Communicate Policy.

10. Define Standard Process.

Establish Action Team.
Develop Draft Standard Process.
Review Draft Standard Process.
Document Standard Process.
Approve Standard Process.
Distribute Standard Process.

11. Train Risk Technology.

Prepare for Training.
Develop Training Material.
Apply Training Metrics.
Deliver Training.
Obtain Training Feedback.

12. Verify Compliance.

Review Risk Management Plan.
Audit Agents and Artifacts.
Generate Audit Report.
Track Action Items.

13. Improve Practice.

Develop Appraisal Method.
Assess Risk Practices.
Develop Improvement Plan.
Implement Improvement Plan.

14. Establish Initiative.

Review Risk Management Requirements.
Plan Risk Management Activities.
Budget Risk Management Activities.
Schedule Risk Management Activities.
Staff Risk Management Activities.
Coordinate Risk Management Training.

15. Develop Plan.

Outline Risk Management Plan.
Define Risk Management Goals.
Define Risk Management Strategy.
Define Risk Management Process.
Define Risk Management Verification.
Define Risk Management Mechanisms.

16. Tailor Standard Process.

Review Standard Process.
Examine Tailoring Options.
List Unique Project Factors.
Recommend Process Changes.
Document Standard Process Deviations.

17. Assess Risk.

Conduct Risk Assessment.
Develop Candidate Risk List.
Define Risk Attributes.
Document Identified Risk.
Communicate Identified Risk.
Estimate and Evaluate Risk.
Prioritize Risk.

18. Control Risk.

Develop Risk Resolution Alternatives.
Select Risk Resolution Strategy.
Develop Risk Action Plan.
Monitor Risk Status.
Execute Risk Action Plan.
Take Corrective Action as Required.

19. Stage 1: Problem.

Problem Project Overview.
Process Improvement Initiative.
Process Assessment.
Process Assessment Results.
Initiative Hindsight.

20. Stage 2: Mitigation.

Mitigation Project Overview.
Risk Assessment Preparation.
Risk Assessment Training.
Project Risk Assessment.
Project Risk Management.
Project Risk Retrospective.

21. Stage 3: Prevention.

Prevention Project Overview.
Risk Assessment Results.
Risk Manager.
Risk Practice Survey.
Risk Practice Observations.

Stage 4: Anticipation.

Anticipation Project Overview.
Proactive Risk Management.
Organization Measurement Practices.
Risk Management Committee.
Living Lifecycle Model.

23. Stage 5: Opportunity.

Opportunity Project Overview.
Fixed Price Problems.
Routine Risk Management.
High Performance Engineering.
The Power Pyramid.


Digital Rights

eBook Requirements
Adobe Digital Editions Minimum System Requirements
Minimum System Requirements:
  • Windows 7/8, or Mac OS X 10.6 or above
  • At least 512 MB RAM, 600 mHZ processor, and 40 MB of hard drive space (75MB for Mac OS)
Software Requirements:

eBooks and eChapters can be viewed by using Adobe Digital Editions eBook Reader.

After purchasing your eBook or eChapter, you will be emailed instructions on where and how to download your free reader.

Download Requirements:

Due to the size of eBooks, a high-speed Internet connection (cable modem, DSL, LAN) is required for download stability and speed. Your connection can be wired or wireless.

Being online is not required for reading an eBook after successfully downloading it. You must only be connected to the Internet during the download process.

User Help:

Click here to access the Adobe Digital Editions FAQ

Digital Rights
Adobe Digital Edition
Copying: Allowed, 30 selections may be copied every 30 days
Printing: Allowed, 30 prints for 30 days
Expires: No Expiration
Reading Aloud: Allowed
Sharing: Not Allowed
Min. Software Version: Adobe Digital Editions eBook Reader
Suitable Devices: PCs, Tablet PCs, Macs, Laptops

Digital Rights Management (DRM) Key

Copying - Books that cannot be copied will show "Not Allowed." Otherwise, this will detail the number of times it can be copied, or "Allowed with no limits."

Printing - Books that cannot be printed will show "Not Allowed." Otherwise, this will detail the number of times it can be printed, or "Allowed with no limits."

Expires - Books that have no expiration (the date upon which you will no longer be able to access your eBook) will read "No Expiration." Otherwise it will state the number of days from activation (the first time you actually read it).

Reading Aloud - Books enabled with the "text-to-speech" feature so that they can be read aloud will show "Allowed."

Sharing - Books that cannot be shared with other computers will show "Not Allowed."

Min. Software Version - This is the minimum software version needed to read this book.

Suitable Devices - Hardware known to be compatible with this book. Note: Reader software still needs to be installed.