Ship-Ship-Hooray! Free Shipping on $25+ Details >
Managing Risk

Managing Risk - 98 edition

Managing Risk - 98 edition

ISBN13: 9780201255928

ISBN10: 0201255928

Managing Risk by Elaine M. Hall - ISBN 9780201255928
Cover type: Hardback
Edition: 98
Copyright: 1998
Publisher: Addison-Wesley Longman, Inc.
Published: 1998
International: No
Managing Risk by Elaine M. Hall - ISBN 9780201255928

ISBN13: 9780201255928

ISBN10: 0201255928

Cover type: Hardback
Edition: 98

List price: $69.99

All of our used books are 100% hand-inspected and guaranteed! Happy you, happy us.

Ships directly from us
You Save $64.64 (92%)

List price: $69.99

Instant access, flexible term options, and deep discounts up to 60% on digital content! Happy you, happy us.

Delivered via email within 1 hour
Use for 365 days
You Save $15.00 (21%)
Format: Digital

Please note: eTextbooks do not come with access codes, CDs/DVDs, workbooks, and other supplemental items.
Well, that's no good. Unfortunately, this edition is currently out of stock. Please check back soon.


"Since it is more than just common sense, the newcomer to risk management needs an intelligent guide. It is in this role that Elaine Hall's book excels. This book provides a set of practical and well-delineated processes for implementation of the discipline."

--Tom DeMarco, from the Foreword

Risk is inherent in the development of any large software system. A common approach to risk in software development is to ignore it and hope that no serious problems occur. Leading software companies use quantitative risk management methods as a more useful approach to achieve success.

Written for busy professionals charged with delivering high-quality products on time and within budget, Managing Risk is a comprehensive guide that describes a success formula for managing software risk. The book is divided into five parts that describe a risk management road map designed to take you from crisis to control of your software project.

Highlights include:

  • Six disciplines for managing product development.
  • Steps to predictable risk-management process results.
  • How to establish the infrastructure for a risk-aware culture.
  • Methods for the implementation of a risk management plan.
  • Case studies of people in crisisÐand in control.

Author Bio

Hall, Elaine M. : Level 6 Software

Elaine M. Hall is founder of Level 6 Software, a leading consulting group in discovery methods for software engineering. She conducts training seminars and supports the implementation of software risk management for both government and industry clients worldwide. Dr. Hall is chair of the risk management working group for the International Council on Systems Engineering. She has nearly 20 years of experience in software systems engineering and management.

Table of Contents

Table of Contents

(Each chapter concludes with a Summary.)

1. Software Risk Management.

Risk in the Large.
Risk in the Small.
Consequences of Knowledge.
Consequences of Ignorance.

2. P2I2 Sucess Formula.

Major Factors in Risk Management Capability.
People: The Human Element.
Process: The Steps to Manage Risk.
Infrastructure: The Organizational Foundation.
Implementation: The Project Execution.

3. Risk Management Roadmap.

The Road to Risk Management Capability.
Risk Management Roadmap Directions.
Journey from Problem to Opportunity.
Journey from Novice to Expert.

4. Identify Risk.

Define Risk Identification Process.
Develop Risk Checklists.
Define Risk Assessment Method.
Develop Risk Management Form.
Establish Risk-Database Schema.

5. Analyze Risk.

Define Risk Analysis Process.
Define Risk Analysis Techniques.
Define Risk Evaluation Criteria.
Establish Risk Prioritization Scheme.

6. Plan Risk.

Define Risk Planning Process.
Define Risk Resolution Strategies.
Define Selection Criteria.
Develop Risk Action Plan Template.

7. Track Risk.

Define Risk Tracking Process.
Define Risk Tracking Techniques.
Define Risk Tracking Measures.
Define Triggering Devices.

8. Resolve Risk.

Define Risk Resolution Process.
Define Risk Resolution Techniques.
Define Risk Resolution Measures.
Develop Corrective Action Procedure.

9. Develop Policy.

Obtain Commitment.
Survey Existing Practice.
Allocate Resources.
Define Draft Policy.
Review Draft Policy.
Document Policy.
Approve Policy.
Communicate Policy.

10. Define Standard Process.

Establish Action Team.
Develop Draft Standard Process.
Review Draft Standard Process.
Document Standard Process.
Approve Standard Process.
Distribute Standard Process.

11. Train Risk Technology.

Prepare for Training.
Develop Training Material.
Apply Training Metrics.
Deliver Training.
Obtain Training Feedback.

12. Verify Compliance.

Review Risk Management Plan.
Audit Agents and Artifacts.
Generate Audit Report.
Track Action Items.

13. Improve Practice.

Develop Appraisal Method.
Assess Risk Practices.
Develop Improvement Plan.
Implement Improvement Plan.

14. Establish Initiative.

Review Risk Management Requirements.
Plan Risk Management Activities.
Budget Risk Management Activities.
Schedule Risk Management Activities.
Staff Risk Management Activities.
Coordinate Risk Management Training.

15. Develop Plan.

Outline Risk Management Plan.
Define Risk Management Goals.
Define Risk Management Strategy.
Define Risk Management Process.
Define Risk Management Verification.
Define Risk Management Mechanisms.

16. Tailor Standard Process.

Review Standard Process.
Examine Tailoring Options.
List Unique Project Factors.
Recommend Process Changes.
Document Standard Process Deviations.

17. Assess Risk.

Conduct Risk Assessment.
Develop Candidate Risk List.
Define Risk Attributes.
Document Identified Risk.
Communicate Identified Risk.
Estimate and Evaluate Risk.
Prioritize Risk.

18. Control Risk.

Develop Risk Resolution Alternatives.
Select Risk Resolution Strategy.
Develop Risk Action Plan.
Monitor Risk Status.
Execute Risk Action Plan.
Take Corrective Action as Required.

19. Stage 1: Problem.

Problem Project Overview.
Process Improvement Initiative.
Process Assessment.
Process Assessment Results.
Initiative Hindsight.

20. Stage 2: Mitigation.

Mitigation Project Overview.
Risk Assessment Preparation.
Risk Assessment Training.
Project Risk Assessment.
Project Risk Management.
Project Risk Retrospective.

21. Stage 3: Prevention.

Prevention Project Overview.
Risk Assessment Results.
Risk Manager.
Risk Practice Survey.
Risk Practice Observations.

Stage 4: Anticipation.

Anticipation Project Overview.
Proactive Risk Management.
Organization Measurement Practices.
Risk Management Committee.
Living Lifecycle Model.

23. Stage 5: Opportunity.

Opportunity Project Overview.
Fixed Price Problems.
Routine Risk Management.
High Performance Engineering.
The Power Pyramid.


Digital Rights

eBook Requirements
VitalSource Bookshelf Reader
Minimum System Requirements:
  • Windows 7/8, or Mac OS X 10.6 or above
Software Requirements:

eTextbooks and eChapters can be viewed by using the free reader listed below.

Be sure to check the format of the eTextbook/eChapter you purchase to know which reader you will need. After purchasing your eTextbook or eChapter, you will be emailed instructions on where and how to download your free reader.

Download Requirements:

Due to the size of eTextbooks, a high-speed Internet connection (cable modem, DSL, LAN) is required for download stability and speed. Your connection can be wired or wireless.

Being online is not required for reading an eTextbook after successfully downloading it. You must only be connected to the Internet during the download process.

User Help:

Click Here to access the VitalSource Bookshelf FAQ

Digital Rights
VitalSource Bookshelf
Copying: Allowed, 2 selections may be copied every 365 days
Printing: Allowed, 2 prints for 365 days
Expires: Yes, may be used for 365 days after activation
Reading Aloud: Allowed
Sharing: Not Allowed
Min. Software Version: VitalSource Bookshelf
Suitable Devices: PCs, Tablet PCs, Macs, Laptops

Digital Rights Management (DRM) Key

Copying - Books that cannot be copied will show "Not Allowed." Otherwise, this will detail the number of times it can be copied, or "Allowed with no limits."

Printing - Books that cannot be printed will show "Not Allowed." Otherwise, this will detail the number of times it can be printed, or "Allowed with no limits."

Expires - Books that have no expiration (the date upon which you will no longer be able to access your eBook) will read "No Expiration." Otherwise it will state the number of days from activation (the first time you actually read it).

Reading Aloud - Books enabled with the "text-to-speech" feature so that they can be read aloud will show "Allowed."

Sharing - Books that cannot be shared with other computers will show "Not Allowed."

Min. Software Version - This is the minimum software version needed to read this book.

Suitable Devices - Hardware known to be compatible with this book. Note: Reader software still needs to be installed.

Top Arrow