MANAJEMEN
RESIKO
Manajemen
resiko adalah proses pengukuran atau penilaian resiko serta pengembangan
strategi pengelolaannya. Strategi yang dapat diambil antara lain adalah
memindahkan resiko kepada pihak lain, menghindari resiko, mengurangi efek
negatif resiko, dan menampung sebagian atau semua konsekuensi resiko tertentu.
Manajemen resiko tradisional terfokus pada resiko-resiko yang timbul oleh
penyebab fisik atau legal (seperti bencana alam atau kebakaran, kematian serta
tuntutan hokum). (Wikipedia)
Manajemen
resiko adalah rangkaian langkah-langkah yang membantu suatu perangkat lunak
untuk memahami dan mengatur ketidak pastian (Roger S. Pressman).
Pada saat kita
mengerjakan pengembangan perangkat lunak sering kita menghadapi berbagai
situasi yang tidak nyaman seperti keterlambatan pengembangan atau pengeluaran
biaya pengembangan yang melebihi anggaran. Hal ini dikarenakan kurang siapnya
kita menghadapi berbagai kemungkinan resiko yang akan terjadi. Untuk itu perlu
dilakukan identifikasi tindakan yang harus dilakukan untuk mencegah ataupun
meminimalkan resiko tersebut.
Mengapa
manajemen resiko itu penting? Sikap orang ketika menghadapi resiko
berbeda-beda. Ada
orang yang berusaha untuk menghindari resiko, namun ada juga yang sebaliknya
sangat senang menghadapi resiko sementara yang lain mungkin tidak terpengaruh
dengan adanya resiko. Pemahaman atas sikap orang terhadap resiko ini dapat
membantu untuk mengerti betapa resiko itu penting untuk ditangani dengan baik.
Beberapa resiko lebih
penting dibandingkan resiko lainnya. Baik penting maupun tidak sebuah resiko
tertentu bergantung pada sifat resiko tersebut, pengaruhnya pada aktifitas
tertentu dan kekritisan aktifitas tersebut. Aktifitas beresiko tinggi pada
jalur kritis pengembangan biasanya merupakan penyebabnya.
Untuk
mengurangi bahaya tersebut maka harus ada jaminan untuk meminimalkan resiko
atau paling tidak mendistribusikannya selama pengembangan tersebut dan idealnya
resiko tersebut dihapus dari aktifitas yang mempunyai jalur yang kritis.
Resiko
dari sebuah aktifitas yang sedang berlangsung sebagian bergantung pada siapa
yang mengerjakan atau siapa yang mengelola aktifitas tersebut. Evaluasi resiko
dan alokasi staf dan sumber daya lainnya erat kaitannya.
Resiko dalam perangkat lunak
memiliki dua karakteristik:
- Uncertainty : tidak ada resiko
yang 100% pasti muncul.
- Loss : resiko berimbas pada
kehilangan.
Dan resiko memiliki tiga
kategori:
- Resiko proyek : berefek pada perencanaan
proyek.
- Resiko teknikal : berefek pada
kualitas dan waktu pembuatan perangkat lunak.
- Resiko bisnis : berefek pada
nilai jual produk
Contoh : Seorang
programmer yang sangat pintar keluar. Resiko yang mana?
Langkah-langkah
dalam manajemen proses adalah :
- Identifikasi resiko
Proses ini meliputi
identifikasi resiko yang mungkin terjadi dalam suatu aktivitas usaha.
Identifikasi resiko secara akurat dan komplit sangatlah vital dalam manajemen
resiko. Salah satu aspek penting dalam identifikasi resiko adalah mendaftar
resiko yang mungkin terjadi sebanyak mungkin. Teknik-teknik yang dapat
digunakan dalam identifikasi resiko antara lain:
- Brainstorming
- Survei
- Wawancara
- Informasi histori
- Kelompok kerja
Tipe-tipe resiko:
Untuk keperluan
identifikasi dan mengelola resiko yang dapat menyebabkan sebuah pengembangan
melampaui batas waktu dan biaya yang sudah dialokasikan maka perlu
diidentifikasikan tiga tipe resiko yang ada yaitu:
- Resiko yang disebabkan karena kesulitan melakukan estimasi.
- Resiko yang disebabkan karena asumsi yang dibuat selama proses perencanaan.
- Resiko yang disebabkan adanya even yang tidak terlihat (atau tidak direncanakan).
Beberapa kategori
faktor yang perlu dipertimbangkan adalah sebagai berikut:
- Application Factor
Sesuatu yang alami
dari aplikasi baik aplikasi pengolahan data yang sederhana, sebuah sistem
kritis yang aman maupun sistem terdistribusi yang besar dengan elemen real time
terlihat menjadi sebuah faktor kritis. Ukuran yang diharapkan dari aplikasi
juga sesuatu yang penting – sistem yang
lebih besar, lebih besar dari masalah error, komunikasi dan manajemennya.
- Staff Factor
Pengalaman dan
kemampuan staf yang terlibat merupakan faktor utama – seorang
programer yang berpengalaman, diharapkan akan sedikit melakukan kesalahan
dibandingkan dengan programer yang sedikit pengalamannya. Akan tetapi kita
harus juga mempertimbangkan ketepatan pengalaman tersebut- pengalaman membuat
modul dengan Cobol bisa mempunyai nilai kecil jika kita akan mengembangkan
sistem kendali real-time yang komplek dengan mempergunakan C++.
Beberapa faktor seperti tingkat kepuasan staf dan
tingkat pergantian dari staf juga penting untuk keberhasilan sebarang
pengembangan – staf yang tidak termotivasi atau person utama keluar dapat
menyebabkan kegagalan pengembangan.
- Project Factor
Merupakan hal yang penting bahwa pengembangan
dan obyektifnya terdefinisi dengan baik dan diketahui secara jelas oleh semua
anggota tim dan semua stakeholder utama. Jika hal ini tidak terlaksana dapat
muncul resiko yang berkaitan dengan keberhasilan pengembangan tersebut. Dengan
cara serupa, perencanaan kualitas yang formal dan telah disepakati harus
dipahami oleh semua partisipan. Jika perencanaan kualitas kurang baik dan
tidak tersosialisasi maka dapat mengakibatkan gangguan pada pengembangan
tersebut.
- Project Methods
Dengan mempergunakan spefikasi dan metode
terstruktur yang baik pada manajemen pengembangan dan pengembangan sistem akan
mengurangi resiko penyerahan sistem yang tidak memuaskan atau terlambat. Akan
tetapi penggunaan metode tersebut untuk pertama kali dapat mengakibatkan
problem dan delay.
- Hardware/software Factor
Sebuah pengembangan yang memerlukan hardware
baru untuk pengembangan mempunyai resiko yang lebih tinggi dibandingkan dengan
software yang dapat dibangun pada hardware yang sudah ada (dan familiar).
Sebuah sistem yang dikembangkan untuk satu jenis hardware atau software
platform tertentu jika dipergunakan pada hardware atau software platform
lainnya bisa menimbulkan resiko tambahan (dan tinggi) pada saat instalasi.
- Changeover Factor
Kebutuhan perubahan “all-in-one” kedalam suatu
sistem baru mempunyai resiko tertentu. Perubahan secara bertahap atau gradual
akan meminimisasi resiko akan tetapi cara tersebut tidak praktis. Menjalankan
secara paralel dapat memberikan solusi yang aman akan tetapi biasanya tidak mungkin
atau terlalu mahal.
- Supplier Factor
Suatu pengembangan yang melibatkan organisasi
eksternal yang tidak dapat dikendalikan secara langsung dapat mempengaruhi
keberhasilan pengembangan. Misal tertundanya instalasi jalur telpon
atau pengiriman peralatan yang sulit dihindari- dapat berpengaruh terhadap
keberhasilan pengembangan.
- Environment Factor
Perubahan pada lingkungan dapat mempengaruhi
keberhasilan pengembangan. Misal terjadi perubahan regulasi pajak, akan
mempunyai dampak yang cukup serius pada pengembangan aplikasi penggajian.
- Health and Safety Factor
Kesalahan estimasi
Beberapa pekerjaan
lebih sulit untuk melakukan estimasi dibandingkan pekerjaan lainnya disebabkan
karena terbatasnya pengalaman pada pekerjaan serupa atau disebabkan karena
jenis pekerjaan tersebut. Pembuatan sebuah user manual merupakan langkah yang
tepat yang dapat dipertanggungjawabkan dan sebagai bukti bahwa kita pernah
mengerjakan tugas yang serupa sebelumnya. Dengan pengalaman itu seharusnya kita
mampu untuk melakukan estimasi dengan lebih tepat mengenai berapa lama
pekerjaan dapat diselesaikan dan berapa besarnya biaya yang dibutuhkan. Selain
itu, waktu yang dibutuhkan untuk melakukan pengujian dan penelusuran program
dapat menjadi sesuatu hal yang sulit diprediksi dengan tingkat keakuratan yang
serupa walaupun kita pernah membuat program yang serupa sebelumnya.
Estimasi dapat
ditingkatkan melalui analisa data historis untuk aktifitas yang serupa dan
untuk sistem yang serupa. Dengan menyimpan perbandingan antara estimasi semula
dengan hasil akhir akan mengakibatkan beberapa tipe pekerjaan sulit diestimasi
secara tepat.
Resiko ini terjadi
jika perkiraan LOC pada kenyataan yang ada jauh melebihi LOC perkiraan pada
perhitungan COCOMO, yang mengakibatkan berubahnya jadwal pengerjaan dan biaya
operasional.
Asumsi perencanaan
Pada setiap tahapan
perencanaan, asumsi perlu dibuat, jika tidak benar maka dapat mengakibatkan
resiko tersebut beresiko. Misal pada jaringan aktifitas, aktifitas dibangun
berdasarkan pada asumsi menggunakan metode desain tertentu dimana memungkinkan
urutan aktifitas diubah. Kita biasanya membuat asumsi bahwa setelah coding,
biasanya sebuah modul akan diuji dan kemudian diintegrasikan dengan modul
lainnya. Akan tetapi kita tidak merencanakan pengujian modul yang dapat
mangakibatkan perubahan desain awal. Hal ini dapat terjadi setiap saat.
Pada setiap tahapan
pada proses perencanaan, sangat penting untuk memeperinci secara eksplisit
semua asumsi yang dibuat dan mengidentifikasi apa pengaruhnya jika ternyata
dalam pelaksanaannya tidak sesuai dengan yang sudah direncanakan.
Kemungkinan
Beberapa kemungkinan
dapat saja tidak pernah terlihat dan kita hanya dapat menyakinkan diri kita
sendiri bahwa ada sesuatu yang tidak dapat dibayangkan, kadang-kadang dapat
terjadi. Akan tetapi biasanya jarang terjadi hal seperti itu. Mayoritas
kejadian yang tidak diharapkan biasanya dapat diidentifikasi beberapa
spesifikasi kebutuhan kemungkinan diubah setelah beberapa modul telah
dikodekan, programmer senior meninggalkan pengembangan, perangkat keras yang
diperlukan tidak dikirim tapat waktu. Beberapa kejadian semacam itu dapat
terjadi sewaktu-waktu dan walaupun kejadian tersebut kemungkinan terjadinya
relatif rendah akan tetapi kejadian tersebut perlu dipertimbangkan dan
direncanakan.
Metode untuk evaluasi
pengaruh ketidakpastian ini terhadap jadwal proyek:
- Penggunaan PERT untuk evaluasi pengaruh ketidakpastian
PERT dikembangkan
untuk menghitung estimasi ketidakpastian lingkungan terhadap durasi pekerjaan.
PERT dikembangkan pada suatu lingkungan proyek yang mahal, beresiko tinggi dan
kompleks. Metode PERT ini memerlukan tiga estimasi:
- Most likely time
Waktu yang diperlukan untuk
menyelesaikan pekerjaan dalam situasi normal dan diberikan simbol m.
- Optimistic time
Waktu tersingkat yang diperlukan
untuk menyelesaikan pekerjaan dan diberi simbol a.
- Pessimistic time
Waktu terlama yang diperlukan
untuk menyelesaikan pekerjaan dikarenakan berbagai kemungkinan yang masuk akal
dan diberikan simbol b.
PERT
mengkombinasikan ketiga estimasi tersebut untuk membentuk durasi tunggal yang
diharapkan, te = a + 4m + b
- Penggunaan durasi yang diharapkan
Durasi yang diharapkan dipergunakan supaya
suatu forward pass dapat melalui sebuah jaringan; dengan mempergunakan metode
yang sama dengan teknik CPM. Akan tetapi dalam hal ini, tanggal aktifitas yang
dihitung bukan merupakan tanggal paling awal akan tetapi merupakan tanggal yang
diharapkan dapat mencapai aktifitas tersebut.
Jaringan PERT yang diperlihatkan pada gambar 3
memperlihatkan bahwa kita berharap proyek tersebut dapat diselesaikan dalam
waktu 13,5 minggu- tidak seperti CPM yang tidak memperlihatkan tanggal paling
awal untuk menyelesaikan proyek tersebut akan tetapi tanggal yang diharapkan
(atau most likely). Salah satu keuntungan dari pendekatan ini adalah
menempatkan sebuah emphasis dalam ketidakpastian di dunia nyata.
Tabel 6.3 berikut ini memperlihatkan contoh
estimasi durasi aktifitas yang memperkirakan durasi secara optimistic(a),
pessimistic(b) dan most likeliy(m).
Tabel 6.3 – Estimasi waktu aktifitas PERT
Aktifitas
|
Durasi Aktifitas (minggu)
|
||
Optimistic (a)
|
Most Likely (m)
|
Pessimistic (b)
|
|
A
|
5
|
6
|
8
|
B
|
3
|
4
|
5
|
C
|
2
|
3
|
3
|
D
|
3.5
|
4
|
5
|
E
|
1
|
3
|
4
|
F
|
8
|
10
|
15
|
G
|
2
|
3
|
4
|
H
|
2
|
2
|
2.5
|
Pendekatan PERT juga difokuskan pada
ketidakpastian estimasi durasi aktifitas. Perlu tiga estimasi untuk masing-masing
aktifitas yang memperlihatkan fakta bahwa kita tidak yakin dengan apa yang akan
terjadi – kita dipaksa untuk menghitung fakta yang diperkirakan akan terjadi.

- Deviasi stándar aktifitas
Perhitungan kuantitatif tingkat ketidakpastian
suatu estimasi durasi aktifitas bisa diperoleh dengan menghitung standar
deviasi s dari sebuah durasi aktifitas dengan mempergunakan rumus:

Standar deviasi aktifitas porporsional dengan
beda antara estimasi optimistic dan pessimistic, dan dapat dipergunakan sebagai
tingkatan ukuran level ketidakpastian atau resiko masing-masing aktifitas.
Durasi yang diharapkan dari masing-masing aktifitas dan standar deviasi dari
proyek tersebut (tabel 3) dapat dilihat pada tabel 4.
Tabel 6.4- Waktu yang diharapkan dan
standar
deviasi
Aktifitas
|
Durasi Aktifitas (minggu)
|
|||||
A
|
m
|
b
|
te
|
s
|
||
A
|
5
|
6
|
8
|
6.17
|
0.50
|
|
B
|
3
|
4
|
5
|
4.00
|
0.33
|
|
C
|
2
|
3
|
3
|
2.83
|
0.17
|
|
D
|
3.5
|
4
|
5
|
4.08
|
0.25
|
|
E
|
1
|
3
|
4
|
2.83
|
0.50
|
|
F
|
8
|
10
|
15
|
10.50
|
1.17
|
|
G
|
2
|
3
|
4
|
3.00
|
0.33
|
|
H
|
2
|
2
|
2.5
|
2.08
|
0.08
|
|
a:
optimistic b: most likely c: pessimistic
te:
expected s: standard deviation
- Likehood target terpenuhi
Keuntungan utama dari teknik PERT adalah
memberikan suatu metode untuk melakukan estimasi probabilitas tanggal target
terpenuhi atau tidak. Teknik ini bisa saja hanya mempunyai tanggal target
tunggal yaitu proyek selesai, akan tetapi kita diharapkan untuk mengatur
tambahan target antara. Misalkan kita harus menyelesaikan proyek dalam waktu 15
minggu. Kita berharap proyek tersebut dapat diselesaikan dalam waktu 13.5
minggu akan tetapi durasinya bisa lebih dan bisa kurang. Misalkan aktifitas C
harus diselesaikan pada minggu ke 10 karena salah satu anggota yang
melaksanakan aktifitas tersebut sudah dijadwalkan untuk bekerja pada proyek
lain dan kejadian 5 memperlihatkan penyerahan produk kepada pelanggan. Untuk
itu diperlukan tiga tanggal target pada jaringan PERT seperti yang
diperlihatkan dalam gambar 4.

Gambar 6.4
Jaringan PERT dengan tiga buah tanggal target dan
perhitungan standar deviasi kejadian
- Analisa resiko
Setelah melakukan identifikasi resiko, maka tahap
berikutnya adalah pengukuran resiko dengan cara melihat potensial
terjadinya seberapa besar severity (kerusakan) dan probabilitas terjadinya
risiko tersebut. Penentuan probabilitas terjadinya suatu event sangatlah subyektif
dan lebih berdasarkan nalar dan pengalaman. Beberapa risiko memang mudah untuk
diukur, namun sangatlah sulit untuk memastikan probabilitas suatu kejadian yang
sangat jarang terjadi. Sehingga, pada tahap ini sangtalah penting untuk
menentukan dugaan yang terbaik supaya nantinya kita dapat memprioritaskan
dengan baik dalam implementasi perencanaan manajemen risiko. Kesulitan dalam
pengukuran risiko adalah menentukan kemungkinan terjadi suatu risiko karena
informasi statistik tidak selalu tersedia untuk beberapa risiko tertentu.
Selain itu, mengevaluasi dampak severity (kerusakan) seringkali cukup sulit
untuk asset immateriil. Dampak adalah efek biaya, waktu dan kualitas yang
dihasilkan suatu resiko.
Dampak
|
Biaya
|
Waktu
|
Kualitas
|
Sangat
rendah
|
Dana
mencukupi
|
Agak
menyimpang dari target
|
Kualitas
agak berkurang namun masih dapat digunakan
|
Rendah
|
Membutuhkan
dana tambahan
|
Agak
menyimpang dari target
|
Gagal
untuk memenuhi janji pada stakeholder
|
Sedang
|
Membutuhkan
dana tambahan
|
Penundaan
berdampak terhadap stakeholder
|
Beberapa
fungsi tidak dapat dimanfaatkan
|
Tinggi
|
Membutuhkan
dana tambahan yang signifikan
|
Gagal
memenuhi deadline
|
Gagal
untuk memenuhi kebutuhan banyak stakeholder
|
Sangat
tinggi
|
Membutuhkan
dana tambahan yang substansial
|
Penundaan
merusak proyek
|
Proyek
tidak efektif dan tidak berguna
|
Setelah mengetahui
probabilitas dan dampak dari suatu resiko, maka kita dapat mengetahui potensi
suatu resiko. Untuk mengukur bobot resiko kita dapat menggunakan skala dari 1 –
5 sebagai berikut seperti yang disarankan oleh JISC InfoNet:
Skala
|
Probabilitas
|
Dampak
|
Sangat
rendah
|
Hampir
tidak mungkin terjadi
|
Dampak
kecil
|
Rendah
|
Kadang
terjadi
|
Dampak
kecill pada biaya, waktu dan kualitas
|
Sedang
|
Mungkin
tidak terjadi
|
Dampak
sedang pada biaya, waktu dan kualitas
|
Tinggi
|
Sangat
mungkin terjadi
|
Dampak
substansial pada biaya, waktu dan kualitas
|
Sangat
tinggi
|
Hampir
pasti terjadi
|
Mengancam
kesuksesan proyek
|
Setelah resiko yang dapat mempengaruhi
pengembangan teridentifikasi maka diperlukan cara untuk menentukan tingkat kepentingan
dari masing-masing resiko. Beberapa resiko secara relatif tidak terlalu fatal
(misal resiko keterlambatan penyerahan dokumentasi) sedangkan beberapa resiko
lainnya berdampak besar. (misal resiko keterlambatan penyerahan
software). Beberapa resiko sering terjadi (salah satu anggota tim sakit
sehingga tidak bisa bekerja selama beberapa hari). Sementara itu resiko lainnya
jarang terjadi (misal kerusakan perangkat keras yang dapat mengakibatkan
sebagian program hilang).
Probabilitas terjadinya resiko sering disebut dengan risk likelihood;
sedangkan dampak yang akan terjadi jika resiko tersebut terjadi dikenal
dengan risk impact dan tingkat kepentingan resiko disebut dengan risk
value atau risk exposure. Risk value dapat dihitung dengan formula :
Risk exposure = risk likelihood x risk impact
Idealnya risk impact diestimasi dalam batas
moneter dan likelihood dievaluasi sebagai sebuah probabilitas. Dalam hal ini
risk exposure akan menyatakan besarnya biaya yang diperlukan berdasarkan perhitungan
analisis biaya manfaat. Risk exposure untuk berbagai resiko dapat dibandingkan
antara satu dengan lainnya untuk mengetahui tingkat kepentingan masing-masing
resiko.
Akan tetapi, estimasi biaya dan probabilitas
tersebut sulit dihitung, subyektif, menghabiskan waktu dan biaya. Untuk
mengatasi hal ini maka diperlukan beberapa pengukuran yang kuantitatif untuk
menilai risk likelihood dan risk impact, karena tanpa ini sulit untuk
membandingkan atau meranking resiko tersebut untuk berbagai keperluan. Akan
tetapi, usaha yang dilakukan untuk medapatkan sebuah estimasi kuantitatif
yang baik akan menghasilkan pemahaman yang mendalam dan bermanfaat atas
terjadinya suatu permasalahan.
Beberapa manajer resiko mempergunakan sebuah
metode penilaian yang sederhana untuk menghasilkan ukuran yang kuantitatif pada
saat mengevaluasi masing-masing resiko. Beberapa manajer memberikan kategori
pada likelihood dan impact dengan high, medium atau low. Akan tetapi bentuk ini
tidak memungkinkan untuk menghitung risk exposure. Sebuah pendekatan yang lebih
baik dan populer adalah memberikan skor pada likelihood dan impact dengan skala
tertentu misal 1-10. Jika suatu resiko kemungkinan besar akan terjadi diberi
skor 10, sedangkan jika kecil jika kemungkinan terjadinya kecil maka akan
diberi nilai 1.
Penilaian likelihood dan impact dengan skala
1-10 relatif mudah, akan tetapi kebanyakan manajer resiko akan berusaha untuk
memberikan skor yang lebih bermakna, misal skor likelihood 8 akan
dipertimbangkan dua kali likelihood dengan skor 4.
Hasil pengukuran impact, dapat diukur
dengan skor yang serupa, harus dimasukkan pada perhitungan total risk dari
proyek tersebut. Untuk itu harus melibatkan beberapa biaya potensial seperti :
·
Biaya yang diakibatkan
keterlambatan penyerahan atas jadwal yang sudah ditentukan
·
Biaya yang berlebihan
dikarenakan harus menambah sumber daya atau dikarenakan mempergunakan sumber
daya yang lebih mahal
·
Biaya yang tidak terlihat
pada beberapa komponen kualitas atau fungsionalitas sistem
Tabel 6.1 berikut ini memperlihatkan contoh
hasil evaluasi nilai resiko. Perhatikan bahwa resiko yang bernilai tertinggi
tidak selalu akan menjadi resiko yang pasti terjadi maupun akan menjadi
resiko dengan potensi impact yang terbesar.
Tabel 6.1 – Contoh evaluasi nilai risk exposure
Hazard
|
L
|
I
|
R
|
|
R1
|
Perubahan spesifikasi kebutuhan selama coding
|
1
|
8
|
8
|
R2
|
Spesifikasi perlu lebih lama dibandingkan
yang diperlukan
|
3
|
7
|
21
|
R3
|
Staf sakit yang berpengaruh pada aktifitas yang
kritis
|
5
|
7
|
35
|
R4
|
Staf sakit yang berpengaruh pada aktifitas yang
tidak kritis.
|
10
|
3
|
30
|
R5
|
Pengkodean modul lebih lama dibandingkan yang
diharapkan
|
4
|
5
|
20
|
R6
|
Pengujian modul memperlihatkan kesalahan atau
ketidakefisiensian dalam desain.
|
1
|
10
|
10
|
Prioritas resiko
Pengelolaan resiko melibatkan penggunaan dua strategi:
· Risk exposure dapat dikurangi dengan mengurangi likehood atau impact
· Pembuatan rencana kontingensi berkaitan dengan kemungkinan resiko yang akan terjadi.
Sebarang usaha untuk mengurangi
sebuah risk exposure atau untuk melakukan sebuah rencana kontigensi akan
berhubungan dengan biaya yang berkaitan dengan usaha tersebut. Merupakan hal
yang penting untuk menjamin bahwa usaha ini dilaksanakan dengan cara yang
paling efektif dan diperlukan cara untuk memprioritaskan resiko sehingga usaha
yang lebih penting dapat menerima perhatian yang lebih besar.
Estimasi nilai
likehood dan impact dari masing-masing usaha tersebut akan menentukan nilai
risk exposure. Setelah risk exposure dapat dihitung maka resiko dapat diberi
prioritas high, medium atau low sesuai dengan besar kecilnya nilai risk
exposure.
Risk exposure yang
berdasarkan pada metode penilaian perlu diberikan beberapa perhatian. Hasil
evaluasi pada tabel 1, contoh, tidak memperlihatkan resiko R5 adalah dua kali
lebih penting dibandingkan R6. Pada kasus ini, kita tidak bias
mengintepretasikan nilai risk exposure secara kuantitatif disebabkan nilai
tersebut didasarkan pada metode penilaian yang non-cardinal. Pada kasus kedua,
nilai exposure yang terlalu berjauhan akan mampu untuk membedakan antara resiko
tersebut. Akan tetapi risk exposure akan memungkinkan kita untuk memperoleh
suatu ranking sesuai dengan kepentingannya. Pertimbangkan resiko pada tabel 1,
R3 dan R4 merupakan resiko yang paling penting dan kita dapat
mengklasifikasikannya dengan high risk. Tingkat kepentingan yang berbeda dapat
membedakan antara skor exposure satu dan dua ini dengan exposure tertinggi
berikutnya yaitu R2. R2 dan R5 mempunyai skor yang hampir sama dan dapat
dikelompokkan pada resiko dengan prioritas medium. Dua resiko lainnya, R1 dan
R6 mempunyai nilai exposure yang rendah sehingga dapat dikelompokan pada
prioritas rendah.
Dalam kenyataannya,
secara umum ada beberapa factor lain, selain nilai risk exposure, yang harus
diperhitungkan pada saat menentukan prioritas resiko.
Kepercayaan terhadap
penilaian resiko
Beberapa penilaian
risk exposure relative kurang. Untuk diperlukan investigasi lebih lanjut
sebelum tindakan diambil.
Penggabungan resiko
Beberapa resiko
saling bergantung dengan lainnya. Dalam hal ini maka beberapa resiko tersebut
perlu dianggap sebagai satu resiko.
Jumlah resiko
Perlu batas jumlah
resiko yang dapat dipertimbangkan secara efektif dan dapat diambil tindakannya
oleh seorang manajer proyek. Untuk itu perlu dibatasi ukuran daftar prioritas.
Biaya tindakan
Beberapa resiko, yang
suatu saat dapat dikenali, dapat dikurangi atau dicegah segera dengan biaya
atau usaha yang sedikit tanpa menganggap nilai resikonya. Untuk resiko lainnya
perlu dilakukan perbandingan antara biaya yang diperlukan dengan benefit yang
diperoleh dengan mengurangi resiko tersebut. Satu metode untuk melaksanakan
perhitungan ini adalah dengan menghitung risk reduction leverage (RRL) dengan
mempergunakan persamaan sebagai berikut:
RRL = REbefore -
REafter
Risk reduction cost
REbefore adalah nilai risk exposure
semula, REafter adalah nilai risk exposure yang diharapkan setelah
diambil tindakan dan risk education cost adalah biaya untuk implementasi
tindakan pengurangan resiko. Risk reduction cost harus dinyatakan dengan unit
yang sama dengan nilai resiko yaitu nilai moneter yang diperlukan atau dengan
nilai skor. Jika nilai yang diharapkan ternyata lebih besar maka RRL yang lebih
besar memperlihatkan bahwa kita perlu berharap untuk meningkatkan rencana
pengurangan resiko disebabkan reduksi risk exposure yang diharapkan lebih besar
dibandingkan dengan biaya rencana.
- Pengelolaan resiko
Jenis-jenis cara
mengelola resiko :
a. Risk
Avoidance
Yaitu memutuskan
untuk tidak melakukan aktivitas yang mengandung resiko sama sekali. Dalam
memutuskan untuk melakukannya, maka harus dipertimbangkan potensial keuntungan
dan potensial kerugian yang dihasilkan oleh suatu aktivitas.
b. Risk
Reduction
Risk
reduction atau disebut
juga risk mitigation yaitu merupakan
metode yang mengurangi kemungkinan terjadinya suatu resiko ataupun mengurangi
dampak kerusakan yang dihasilkan oleh suatu resiko.
c. Risk
Transfer
Yaitu memindahkan
resiko pada pihak lain, umumnya melalui suatu kontrak (asuransi) maupun
hedging.
d. Risk
Deferral
Dampak suatu resiko
tidak selalu konstan. Risk deferral meliputi
menunda aspek suatu proyek hingga saat dimana probabilitas terjadinya resiko
tersebut kecil.
e. Risk
Retention
Walaupun resiko
tertentu dapat dihilangkan dengan cara mengurangi maupun mentransfernya, namun
beberapa resiko harus tetap diterima sebagai bagian penting dari aktivitas.
Penanganan
resiko:
a. High
probability, high impact: resiko
jenis ini umumnya dihindari ataupun ditransfer.
b. Low
probability, high impact:
respon paling tepat untuk tipe resiko ini adalah dihindari. Dan jika masih
terjadi, maka lakukan mitigasi resiko serta kembangkan contingency plan.
c. High
probability, low impact: mitigasi
resiko dan kembangkan contingency plan.
d. Low
probability, low impact: efek
dari resiko ini dapat dikurangi, namun biayanya dapat saja melebihi dampak yang
dihasilkan. Dalam kasus ini mungkin lebih baik untuk menerima efek dari resiko
tersebut.
Contigency
plan
Untuk resiko yang
mungkin terjadi maka perlu dipersiapkan contingency
plan seandainya benar-benar terjadi. Contigency
plan haruslah sesuai dengan proposional terhadap dampak resiko tersebut.
Dalam banyak kasus seringkali lebih efisien untuk mengalokasikan sejumlah
sumber daya untuk mengurangi resiko dibandingkan mengembangkan contingency plan yang jika
diimplementasikan akan lebih mahal. Namun beberapa skenario memang membutuhkan
full contingency plan, tergantung
pada proyeknya. Namun jangan sampai tertukar antara contingency planning dengan re-planning normal yang memang
dibutuhkan karena adanya perubahan dalam proyek yang berjalan.
Tabel resiko proyek software dan
strategi mengurangi resiko
Resiko
|
Teknik mengurangi resiko
|
Kegagalan
pada personil
|
· Memperkerjakan
staf yang handal
· Job
matching
· Membangun
tim
· Mengadakan
pelatihan dan peningkatan karir
· Membuat
jadwal lebih awal bagi personil utama
|
Estimasi
biaya dan waktu yang tidak realistis
|
· Membuat
beberapa estimasi
· Desain
untuk biaya
· Meningkatkan
pengembangan
· Merekam
dan menganalisa proyek sebelumnya
· Standarisasi
metode
|
Mengembangkan
fungsi software yang salah
|
· Evaluasi
proyek ditingkatkan
· Buat
metode spesifikasi yang formal
· Survey
pengguna
· Buat
prototype
· Buat
user manual lebih awal
|
Mengembangkan
antarmuka pengguna yang salah
|
· Membuat
prototype
· Analisis
tugas
· Keterlibatan
pengguna
|
Gold
plating
|
· Mengurangi
kebutuhan
· Membuat
prototype
· Analisis
biaya manfaat
· Desain
biaya
|
Terlambat
untuk mengubah kebutuhan
|
· Mengubah
prosedur kendali
· Membatasi
perubahan yang terlalu banyak
· Meningkatkan
prototype
· Meningkatkan
pengembangan (akibat perubahan)
|
Kegagalan
pada komponen yang disuplai pihak eksternal
|
· Melakukan
benchmarking
· Inspeksi
· Spesifikasi
formal
· Kontrak
perjanjian
· Prosedur
dan sertifikasi jaminan kualitas
|
Kegagalan
menjalankan tugas eksternal
|
· Prosedur
jaminan kualitas
· Desain
/ prototype yang kompetitif
· Membangun
tim
· Kontrak
insentif
|
Kegagalan
kinerja real-time
|
· Simulasi
· Benchmarking
· Prototipe
· Tuning
· Analisis
teknis
|
Pengembangnya
terlalu sulit secara teknis
|
· Analisa
teknis
· Analisis
biaya manfaat
· Prototipe
· Melatih
dan mengembangkan staf
|
- Implementasi manajemen resiko
Setelah memilih
respon yang akan digunakan untuk menangani resiko, maka saatnya untuk
mengimplementasikan metode yang telah direncanakan tersebut.
- Monitoring resiko
Mengidentifikasi,
menganalisa dan merencanakan suatu resiko merupakan bagian penting dalam
perencanaan suatu proyek. Namun, manajemen resiko tidaklah berhenti sampai
disana saja. Praktek, pengalaman dan terjadinya kerugian akan membutuhkan suatu
perubahan dalam rencana dan keputusan mengenai penanganan suatu resiko.
Sangatlah penting untuk selalu memonitor proses dari awal mulai dari
identifikasi resiko dan pengukuran resiko untuk mengetahui keefektifitas respon
yang telah dipilih dan untuk mengidentifikasi adanya resiko yang baru maupun berubah.
Sehingga, ketika suatu resiko terjadi maka respon yang dipilih akan sesuai dan
diimplementasikan secara efektif.
Untuk studi
kasus saya mengambil dari web site http://www.sbl.tkk.fi/teaching/courses/T-128.5300/articles/Esec2001.pdf
An Industrial Case Study of Implementing
Software Risk Management
ABSTRACT
Explicit
risk management is ga ining ground in industrial software development projects.
However, there are few empirical studies that investigate the transfer of
explicit risk management into industry, the adequacy of the risk management
approaches to the constraints of industrial contexts, or their cost-benefit.
This paper presents results from a case study that introduced a systematic risk
management method, namely the Riskit method, into a large German
telecommunication company. The objective of the case study was (1) to analyze
the usefulness and adequacy of the Riskit method and (2) to
analyze the cost-benefit of the Riskit method in this industrial
context. The results of (1) also aimed at improvement and customization of the
Riskit method. Moreover, we compare our findings with results of previous case
studies to obtain more generalized conclusions on the Riskit method. Our results
showed that the Riskit method is practical, adds value to the project, and that
its key concepts are understood and usable in practice. Additionally, many
lessons learned are reported that are useful for the general audience who wants
to transfer risk management into new projects.
Keywords
Risk
Management, Case Study, Lessons Learned, Riskit Method
1.
INTRODUCTION
Since
the introduction of risk management into the mainstream of software engineering
[7][12], the software industry has gradually become more active in using
explicit risk management [13][22]. Also, the increased requirements for risk
management by many assessment standards have increased corporate interest in
risk management.
Risk
management practices have become much more operational and practical, as many
guidelines, textbooks [14][20], and consultants help organizations improve
their risk management practices.
Yet,
while industry is clearly using risk management techniques more actively, there
are only few reports available on experiences of introducing risk management
into an organization. The reports that are available have been conducted as
informal case studies without sufficient attempt to scientific rigor or
empirical research methods [4][9][11][17][29]. However, systematic empirical investigations
are necessary to learn more about the transfer and application of risk
management methods.
To
contribute such a systematic empirical investigation, this paper presents a
carefully designed case study on the implementation of a specific risk
management method, namely the Riskit method, into the telecommunication company
Tenovis.
The
paper builds on a series of three case studies related to the Riskit method
[18][24][27]. The value of replicated case studies of the same method in
varying contexts allows us to generalize our findings with respect to Riskit in
particular and risk management in general. Additionally, replication in
different contexts allows us to identify important context factors affecting
the success of the transfer and implementation of risk management.
The
objectives of the case study presented in this paper were twofold. The first
objective was to characterize the usefulness and adequacy of the Riskit
risk management process from the viewpoint of the risk management
participants. This objective aimed at identifying effective ways of
introducing risk management at the company in question and in general, and of providing
feedback for improving the Riskit method.
The
second objective was to characterize the cost-benefit of the Riskit
risk management process in the context of Tenovis. This objective
was to investigate the economic impact of the Riskit method.
The
remainder of the paper is structured as follows. Section 2 describes the
transferred risk management method. Sections 3 and 4 describe the project
selected for this case study and the transfer of risk management into the
project. Section 5 describes the design of our case study. The results of this
case study are presented and compared with the results of previous case studies
in Section 6. Based on these results, we infer in Section 7 lessons learned
that are relevant for the general community. Section 8 concludes the paper with
a summary.
2.
THE RISK MANAGEMENT METHOD
The
risk management method transferred in this case study is called Riskit. Riskit
is a comprehensive risk management method that is based on sound theoretical
principles, yet it has been designed to have sufficiently low overhead and
complexity so that it can be used in real, time-constrained projects. Because
of its more solid theoretical foundations, it avoids many of the limitations
and problems that are common to many other risk management approaches in
software engineering, such as use of biased ranking tables and expected value
calculations. As Riskit has been extensively presented in other publications [23][24][25][26][27],
we present here only the principles of the method and the features that
distinguish it from other risk management approaches.
Riskit
contains a fully defined process, whose overview is presented in Figure 1 as a
dataflow diagram. The full definition of the Riskit process is available as a
separate report [25].

The
Riskit process includes a specific step for analyzing stakeholder interests and
how they link to risks. These links are visualized in Figure 2: when risks are
defined, their impact on the project is described through the stated project
goals. This allows full traceability between risks and goals and on to
stakeholders: each risk can be described by its potential impact on the agreed
project
goals, and each stakeholder can use this information to rank risks from his
perspective.

In
order to describe risks during Risk analysis, the Riskit method supports
unambiguous definition of risks using the Riskit analysis graph (also
called risk scenario) as a visual formalism. The Riskit analysis graph can be
seen both as a conceptual template for defining risks as well as a well-defined
graphical modeling formalism. An example Riskit analysis graph is presented in Figure
3. The Riskit analysis graph allows visual yet more formal documentation of
risks, resulting in better communications and a comprehensive understanding of
the risks’ context.

In
order to prioritize risks during Risk analysis, the most important risks have
to be selected based on their probability and loss. To perform this
prioritization, most risk management approaches rely on risk estimation
approaches that are either impractical or theoretically questionable. For
example, the expected value calculations (i.e., risk = probability * loss) [7]
are often impractical because accurate estimates of probability and loss are
seldom available and it is difficult to account for multiple goal effects and
for a non-linear utility function.
Riskit
largely avoids these problems by using ranking techniques that are appropriate
for the type of information available. When ratio or distance scale data are
available for probability and loss, expected utility loss calculations are
used. However, often only ordinal scale metrics are available for probability
or utility loss.
For
example, the risk scenarios might be ranked in terms of probability and utility
loss each as shown in Figure 4.

To
select in this case the most important risks based on the combination of probability and utility loss, a specific Riskit
Pareto ranking technique is used. This technique uses a two-dimensional space
to position risk scenarios by their relative probability and utility loss as
shown in Figure 5. Using this technique, the evaluation of the risks is then
based on utility theory [3][16].
The
value of this Riskit Pareto ranking technique is that it provides a reliable
and consistent ranking approach that only ranks risks as far as the input data
allows.

3.
CASE STUDY CONTEXT
Tenovis
is one of Germany ’s
largest companies in the telecommunication market. It is a successor of Bosch
Telecom and has about 8500 employees. Tenovis works in a wide range of telecommunication
areas such as private branch exchanges (PBX), call centers, and IP-based
telephony.
The
project considered in this case study aimed to provide a unified, integrated
tool to support service personnel in their task of administrating all of
Tenovis’ existing PBX platforms. Thus, this project was called Tool Harmonization
Project. Starting at the end of 1999, the project’s duration was planned to be approximately
one year.
In
this project new and challenging technologies were to be applied. Web
technology was to be used in a client-server application context. Additionally,
object-oriented technology was selected for design and implementation. On the
one hand, the new technologies added complexity to the project, on the other
hand, they were expected to increase the project’s productivity. Besides
the
new technologies, a new development process and a new project organization were
introduced, which involved teams from three different locations and time zones
(India ,
France ,
and Germany ).
In the
early stages of the project, risk management was performed in an informal way.
However, this intuitive risk management was considered to be longer appropriate
for a company in the telecommunication market. This market is characterized by
high competition, strong demand for innovative technologies, and a very short
innovation cycle. These factors usually impose risks to telecommunication
projects. The introduction of new technologies and processes imposed additional
risks. Hence this project was seen as particularly risky compared to other
projects at Tenovis.
This
situation made the case for the introduction of explicit, systematic, and
experience-based risk management into this project.
4.
TRANSFER OF RISK MANAGEMENT
The
transfer of risk management to the Tenovis context was entrusted to Fraunhofer
IESE, which served as methodology provider.
The
Riskit method (see Section 2) method was one part of the overall risk
management concept proposed to Tenovis. Additionally, this concept included
methods to support risk management by data and to re-use risk experience in
future projects. Risk management by data uses specific data from a measurement
program to provide status information on a project. Risk management by
experience enables learning from other projects by means of an experience
factory [2]. This paper, however, deals only with the application of Riskit. In
the beginning, a kick-off workshop took place. The participants in this
workshop were the department head, who sponsored the implementation of risk
management, and the project management team. In the workshop, a tutorial on Riskit
was given.
Additionally,
the activities of mandate and goal definition, risk identification, risk
analysis, and risk control planning (cf. Figure 1) were briefly performed for
the concrete project. A similar workshop was later performed for senior developers.
We also defined specific templates for documenting risk information during the
project (see Figure 7).
For
subsequent risk management activities, which were held in separate meetings in
addition to the regular project meetings, a risk management team was
established. This team consisted of the department head and two members of the
project management team. The latter ones changed over time.
The
risk management team was supported by the personnel from Fraunhofer IESE, who
had the role of facilitators in the risk management meetings. In this role they
prepared the meetings by, for example, selecting and preparing the risk
management techniques to be applied, providing the necessary documents, and sending
invitations. During the meetings they moderated the discussions and took care
of the correct applicat ion of the risk management techniques. In addition,
they were responsible for the documentation of the meeting results.
In the
course of the project, the introduction of risk management was negatively affected
by several circumstances. First, the project members regarded risk management
as “yet another new method” besides the new process and technologies, resulting
in low motivation for it. Second, the project manager, who played a very
prominent role in risk management, changed. Third, the company was sold,
resulting in a major restructuring, which made it difficult for some time to
work regularly on risk management.
5.
CASE STUDY DESIGN
The
empirical study reported in this paper is a carefully designed case study with
predefined objectives and some level of control with respect to the overall
arrangements of the study. The authors were observing the study while
facilitating it. The design of the case study started at the beginning of the technology
transfer. We first identified the research goals shown below in the form of a
GQM-goal template [8][33]:
G1:
Characterize the usefulness and adequacy of the Riskit risk management
process from the viewpoint of the risk management participants in
the context of Tenovis.
To us
usefulness and adequacy mean the advantages and drawbacks of risk management
with respect to (1) the Riskit features, (i.e., the techniques used within
Riskit), (2) performing explicit risk management in general, (i.e.,
Riskit-independent issues), and (3) the transfer of the risk management process
and methods into the project.
G2:
Characterize the cost-benefit of the Riskit risk management process from
the viewpoint of the department head and the project manager in
the context of Tenovis. This goal aimed at assessing the economical
impact of the transferred risk management technology. Using the
Goal-Question-Metric Paradigm [8][33], we refined these two goals in questions
characterizing the quality aspects usefulness, adequacy, and cost-benefit.
Subsequently, we refined these questions into metrics defining the data to be
collected to answer the questions and evaluate the research goals. The identified
metrics were of two types: quantitative metrics and qualitative metrics.
The
quantitative metrics included information like the effort spent on risk
management, the number of risks and risk types over time, the number of
controlling actions and their effectiveness over time. We collected data for
these metrics regularly during the performance of risk management. Most of the
data were collected as part of the risk management documentation. The
qualitative metrics included aspects like the benefit of risk management as
perceived by the participants and the advantages and drawbacks of the employed
Riskit process and its techniques as seen by the participants. To collect the
data for these metrics, we prepared a questionnaire containing 33 questions and
an associated interview procedure (cf. Figure 6) for a structured
interview.
Using these materials, we interviewed all five members of the Tenovis risk
management team at the end of the project, with each interview lasting about
one hour. The interviews were held with one interviewer and one scribe who
recorded the interviewees’ answers. The recorded answers were entered into a database
for better analysis. Each interviewee was sent a report
with
his entered answers for review.

The
interview results were combined and analyzed in order to answer the research
goals and identify the strengths and weaknesses of the employed approach. In
addition to the interview results, we also used the observations we made as facilitators
of the risk management meetings. These observations
were
recorded after each meeting in a logbook and mainly referred to practices that
worked well or were unpractical.
Based
on the interview results and the recorded observations we devised a set of
improvement suggestions to improve the risk management process and to better
tailor it to the environment.
To
verify our conclusions and suggested process improvement proposals, a feedback
session with the members of the risk management team (i.e., the interviewees)
was performed. The improved risk management process will form the basis for
future risk management activities at Tenovis.
Empirical
studies in general and case studies in particular are prone to biases and
validity threats that make it difficult to control the quality of the study and
to generalize its results [32][34]. In the following we discuss selected,
relevant validity threats and describe the steps taken to reduce them or their
impact on our study.
The reliability
of our data collection (i.e., its consistency and repeatability) was
improved by documenting the interview questions and interview procedure in
detail and applying them consistently.
The
two main threats to i nternal validity in the study were experimenter
expectation bias and maturation [35]. The experimenter expectation bias could
occur due to the technology providers’ expectations or desire to see positive
results in a study. This bias was reduced by carefully discussing and
evaluating the facilitator observations and findings and emphasizing the
Tenovis participant feedback on them. Also, we kept logbooks after each meeting
to record our observations in their original form, which helped us to remember
the precise observations and their contexts even after some time. The maturation
effect threatens the conclusions of a study when subjects react differently
as time passes. In our case this could have been possible as the participants
were just going up their learning curve on risk management and thus became more
fluent in its activities over time. However, the interviews took place at the end
of the project in a short period of time when the participants were quite
mature in their risk management practices. Therefore,
we
believe that the maturation effect did not significantly affect our study.
The representativeness
of the project and its participants relates to how well we can generalize
the results, i.e., to external validity. The project itself was more risky and
had perhaps higher expectation levels than normal projects in the company. We believe
that this had two impacts: On the one hand, this may have biased the
participants to recognize the need for risk management more clearly, resulting
in a generally positive attitude towards risk management. On the other hand,
the pressures of aggressive project goals may have also reduced the time
available for risk management activities by simultaneously increasing the expectations
from risk management results. This could have resulted in a more negative
attitude towards the impact of risk management on the project. Regarding the
representativeness of the project participants, we have no specific reason or
information to believe that the participants would be different from those of other
projects.
6.
CASE STUDY RESULTS
6.1
Results for Riskit’s Usefulness
In
this section we report the findings of our observations and the interviews.
Section 6.1.1 describes our findings related to the Riskit method itself,
Section 6.1.2 describes our findings related to the performance of the risk
management in the Tenovis project, and Section 6.1.3 describes our findings
related to the transfer of risk management into the context of Tenovis.
6.1.1
Usefulness/Adequacy of the Riskit Process One crucial element in the interviews was the
question: For each activity in the Riskit process, what are the advantages
and problems perceived by the participants? In the following, we report the
most important findings related to the individual activities and techniques in
the Riskit process. Process definition: One feature of Riskit is the
full operational definition of its process. This explicit process was perceived
as
systematic
and very helpful. Unlike “intuitive” risk management, where risks are
unsystematically identified at the beginning and not appropriately tracked, the
process triggers all necessary activities. One positive side effect of the
explicit process is also that the importance of risk management is emphasized
as people dedicate their time to work specifically on risk management activities.
Risk Identification: To identify risks, the Riskit process provides two
techniques, which compensate each other’s biases. The two techniques are brainstorming
and a risk checklist. In this case, we used an excerpt of the SEI checklists
for risks [10].
The
combination of these techniques was appreciated as being systematic and
comprehensive. Retrospectively, the participants noted that most of the project’s
risks were identified during risk identification. Additionally, the composition
of the risk management team of people from different roles (i.e., people with a
different view on the project) was beneficial, as the different views on
potential risks could be exchanged and combined. Consequently, almost all
participants learned about risks that were new to them. Risk Analysis:
As shown in Figure 3, Riskit uses Analysis Graphs to describe and discuss
risks. These Analysis Graphs were rated as very helpful in understanding the
risk, its context, and its consequences. One benefit of these graphs was
clearly the visual representation, which made the risks more explicit and
facilitated discussions about them. Although the development of these graphs
was time consuming (discussion of a risk event and development of the
corresponding scenario took about 17 min on average), participants regarded
this time as well-invested due to the increased understanding of the risks.
Another
feature of the Riskit method is the Pareto ranking technique to rank risks and
select the most important ones. This Pareto ranking technique was perceived as
beneficial and practical as people could easily compare the risks in terms of probability
and utility loss. Especially for the latter it was appreciated that no precise,
quantitative estimate of the loss had to be given but measurement was performed
through ranking the risks (i.e., for two risks it had only to be determined,
which risk had the larger loss). The selection of the most important risks based
on the combination of probability and loss was performed by means of a
Pareto-table [25]. Thi s selection was regarded as comprehensible and thus,
participants appreciated this technique. Documentation: The
documentation of the process activities is performed by means of a set of
forms. These forms serve the communication between different activities of the
process as well as between different meetings. The most central form is the
Risk Scenario Form (cf. Figure 7).
This
form contains a description of the risk in both textual and graphical form, the
risk’s ranking in terms of probability and utility loss, potential and
implemented controlling actions, as well as a history of the risk and its
controlling actions. Thus, it contains complete information both for
operational purposes (i.e., monitoring of controlling actions) and
documentation purposes (which are supposed to enable learning from risks for
future projects).
Based
on the interviews, three disadvantages of the forms were observed. First, the
forms contain too much information for daily work, especially for risk
monitoring. During risk monitoring, participants were only interested in the
graphical description of the risk and the list of controlling actions.
Consequently, the remaining information was seen as superfluous for this
activity.
Second,
the textual description of the risks was kept very short and thus mainly
consisted of keywords. This amount of detail was sufficient as long as the
participants remained the same. However, in the course of the project, new
members joined the risk management team. For them it was difficult to acquire
the necessary understanding of the risks due to their short description. The
lack of clear descriptions has the additional disadvantage of complicating the
re-use of risk experience in future projects.
Third,
the effort for maintaining the documentation was considered too high (cf.
Figure 8). After a risk monitoring meeting, which was to be performed
bi-weekly, the facilitator team spent about two hours on updating the statuses
of the controlling actions as well as the risk and controlling action
histories. Responsible for the high effort was mainly the fact that the update was
performed manually in the entire documentation, which was written in MS-Word
with a complex link structure. This drawback of the process in terms of
documentation overhead can be easily overcome by an appropriate tool support
for the documentation, such as a simple database solution. This solution also
enables project managers to have fast access to risk information.
Summarizing
our findings with respect to the Riskit method, we can conclude:
§ The
explicit process of the Riskit method was regarded as systematic and practical.
§ The
techniques used within the Riskit method were regarded as practical and
understandable. The distinguishing features of Riskit, especially, were
regarded as particularly valuable.

6.1.2
Instantiation of Risk Management at Tenovis
The
crucial question For each activity in the Riskit process, what are the
advantages and problems perceived by the participants?1
also
provided observations that did not directly refer to the Riskit method itself
but more to the way risk management was instantiated at Tenovis. Thus, these
observations are of a more general nature.
Integration
with project management and project work: The activities of the Riskit process were
performed in dedicated meetings with the members of the risk management team.
This was also true for the more frequent risk monitoring meetings. This separation
from the project meetings was retrospectively seen as a drawback, since the
project members (especially sub-project managers but also developers) were not
included in the risk management activities.
To
overcome this problem in the future, a stronger linkage between project work
and risk management is intended. Risk Identification: In this project,
risk identification was performed intensively at the beginning. Yet, although
during risk monitoring, several new risks were identified spontaneously, no risk
identification meeting was performed in the subsequent course of the project.
This fact was seen as a drawback as risks that were 1 This high-level question
was refined in the actual questionnaire and related to all activities and
techniques in the Riskit process. unknown at the beginning of the project were
not systematically included in risk management. Therefore, in the future, risk
identification meetings will be scheduled automatically at pre-defined
milestones.
Risk
Monitoring: Risk
Monitoring is one of the crucial activities in the risk management process. The
importance stems from the fact that this activity has to be performed regularly
within the regular project work (e.g., weekly or bi-weekly) and therefore
should also be as short and concise as possible. Two drawbacks were observed
with our approach. First, although bi-weekly risk monitoring meetings were
intended, it turned out that the intervals between the risk management meetings
were longer due to non-availability of the facilitators and participants. These
long intervals were perceived as too long, as it was not possible to react
quickly enough to changes in the risk and controlling action statuses.
Moreover, due to the long intervals, it was difficult for participants to
remember the context of the risks and their controlling actions.
Second,
it is the task of risk monitoring to assess the status and effectiveness of the
controlling actions. In the project, this was done by asking about the status
of the controlling action, its impact on the risk (where usually a rating of
{high, medium, low} or a short sentence was given), and whether the combination
of controlling actions effectively controls the risk. Retrospectively, the
participants thought that the controlling actions were not performed as planned
and therefore were not as effective as they could have been. This could have
been prevented Graphical representation of scenario
Risk History:
31.3.00: risk probably smaller, because people are
aware of the importance of quality as a result of controlling action 5
17.5.00: risk is still to be considered; there are
new people within the project; and there will be new people coming within near
future
29.5.00: risk unchanged; controlling actions
sufficient
13.6.00: Re-ranking changed probability from 3 to
2, new utility loss for project leader assessed
30.6.00: risk unchanged; controlling actions
sufficient
25.8.00: action 4 was stopped since an evaluation
of a Code Checker was completed
action 5 was stopped because this is an integral part
of the tasks of the project
leader and line managers
Controlling Action History
Controlling
Action Impact
1 29.5.00: introduced; impact: see follow-up
controlling action 6
2 31.3.00: minor
29.5.00: reveals the effectiveness of training
30.6.00: currently no training
25.08.00 effect positive as people do build up know
how; through the monitoring the need for additional training has been detected
Tenovis Risk Scenario Form
ID 1-1 poor quality code –review/tutoring Project: Tool
Harmonization
Owner/Responsible: Date reviewed:
2000-02-01
Timeframe: Priority: Controlled Probability: 2
Stakeholder: Tenovis Mgmt Loss:
3
Stakeholder: Dept. Lead Loss: 4
Stakeholder: Project Leader Loss:
4
Action Respons. State Finish Check
Selected risk
controlling actions
1 Introduce review process Smith done end May ü
6 Perform review process Miller ongoing End Proj.
Oct.
2 Monitor the results of training Miller Ongoing
End Proj. Sept.
3 Develop coding guidelines Architects Ongoing End
Proj. Oct.
4 Evaluate Java code checkers Doe done mid July ü
5 Communicate importance of quality Miller done end
Sep ü
Closing date: Closing Rationale:
Figure
7: Risk Scenario Form for one risk event
by
more strongly questioning the controlling action. Thus, in the future, the
actual implementation of the controlling action (what?) and its impact on the
risk (how good?) has to be more strongly questioned.
Summarizing
our findings related to the instantiation of risk management, we can conclude:
§ Risk
management should be closely integrated with project management and daily
project work to foster the synergy between these activities.
§ Risk
identification should be scheduled automatically at predefined milestones (and,
additionally, whenever it is seen as necessary).
§ Risk
monitoring should be performed regularly with short intervals between two
meetings.
§ Risk
monitoring has to sufficiently question the implementation of controlling
actions and their impact on risks.
6.1.3
Adequacy of the Transfer
The
third set of results refers to the findings related to the transfer of risk
management into the context of Tenovis. To assess the adequacy of the transfer,
the questionnaire contained the questions like How did you perceive the work
split between Tenovis and IESE? and From your point of view, how strong
was the commitment for risk management from the {architects2, management,
yourself}?
Training: The training given to
participants was seen as essential as it provided the necessary background for
risk management and its techniques in general as well as for Riskit in
particular.
In the
future, however, not only the project and department management should take
part in the training but also the developers. The purpose is, on the one hand,
to enable developers to perform risk management activities (as risk management
is to be more included in the project work). On the other hand, the training can
also raise the awareness of risk management and risks.
Process
Ownership: As
described in Section 4, the technology was transferred by the personnel from
IESE, who performed the entire facilitation in the meetings and maintained the
documentation. The facilitators also triggered the risk management meetings.
Initially, it was planned to give this responsibility to the Tenovis personnel in
the course of the project, but due to time restrictions this did not happen as
planned.
Thus,
process ownership remained with the facilitators and not with the project
management team or even the Tenovis company. Consequently, participants often
had the impression that risk management was not part of their daily project
work but rather an additional activity for an external party.
2Architects
are senior developers responsible for the SW architecture To improve this in
the future, the process ownership for risk management has to rest with the
project manager, who has to take care of the execution of the process, invite
the participants to the risk management meetings, and ensure implementation of
the controlling actions.
Thus,
the role of the technology provider IESE should be to facilitate the first few
sessions, take part in the following sessions as observers, and finally leave
the entire facilitation to the Tenovis risk management personnel.
Commitment
of project manager:
A third important observation concerns the involvement of the project manager
in the technology transfer. In risk management, the project manager is the
crucial person as s/he is the person making decisions and being responsible for
the activities in the project. This also includes activities that arise from
controlling actions, and motivating the development team. Moreover, risk
management is part of his/her project management task.
The
actual approach of our transfer was prone to give the project manager the
impression that an external party (i.e., the facilitators) intervened in his
tasks and authorities as project manager.
Therefore,
in addition to the changed technology transfer approach (see above), the
commitment of the project leader has to be ensured from the beginning and the
transfer approach must be coordinated with the project manager.
Summarizing
our findings related to the transfer of risk management, we can conclude:
§ Training
of the employed risk management process is important to train the participants
and raise awareness for risk management and risks.
§ Process
Ownership for risk management has to rest with the project manager.
§ Commitment
of the project manager is of utmost importance and has to be ensured from the
beginning.
6.2
Results for the Cost-Benefit of Riskit
An
important criterion for introducing a new technology is its cost-benefit
relationship. For risk management, however, this relationship is hard to
express quantitatively. While the cost (i.e., effort) is easy to measure
quantitatively, the benefit is usually hard to quantify. Therefore, we rely
mostly on the subjective assessment of the benefits as seen from the risk
management team.
In the
following, we first describe the costs and benefits separately and then combine
both aspects.
The
cost of risk management can be measured in terms of the effort that is spent on
the activities of the risk management process. Figure 8 shows the effort spent
in this case study. In total, 23 person days were spent in total from the
project team and facilitator team, which represents 5% of the overall effort
for project management.

To
assess the benefits of risk management, we collected quantitative measurement
data on the number of risks, the number and effectiveness of the controlling
actions as well as qualitative data in terms as the benefits subjectively seen
by the participants.
In
Figure 9, the number of risks identified and/or tracked in this project is
shown over the project’s time.

It can
be seen that the number of identified but not analyzed risks (i.e., raw risks)
is quite large. Thus, a relatively small proportion of those risks identified
during risk identification was considered during risk analysis. It can also be
observed that no major risk identification took place after June. This can be
attributed to problems in the project. Nevertheless, participants thought retrospectively
that the controlled risks contained most of the project’s important risks.
For
the controlled risks Figure 10 shows the impact of the controlling actions on
the risk. The risk management team assessed the impact subjectively on a scale
of {high, medium, low, no impact, unknown impact}. As can be seen, about 1/5 of
the defined controlling actions showed high impact on preventing or reducing
the risk. Thus, for these controlling actions it can be concluded that their implementation
was valuable for the project as they effectively contributed to the mitigation
of the corresponding risk.
On the
other hand, it can also be seen that a large proportion of controlling actions
is rated as unknown impact. This situation corroborates the
above-mentioned finding that the impact of the controlling actions was not
sufficiently questioned and that many controlling actions were not implemented
as planned.
To
foster qualitative assessment of the benefits of risk management, our
questionnaire contained the question: What was the overall impact of risk
management on the project?
Here,
participants stressed the systematic and sound approach of an explicit risk
management process that was definitely an improvement over the more intuitive
risk management performed prior to the introduction of Riskit. Participants
learned that it is possible to systematically identify risks and, even more important,
successfully tackle them by means of controlling actions.

In
order to decide whether risk management should be implemented in a new project
within Tenovis or a new company, the ratio between cost and benefit has to be
taken into account. Due to the qualitative nature of the benefits, the ratio
can only be assessed subjectively. Therefore we asked the participants: Considering
the effort spent on risk management, the number of identified/controlled risks,
and the impact of the controlling actions, would you say that the invested
effort paid off?
While
the amount of effort was seen as acceptable by the participants, they regarded
the impact of risk management on the project in this case study as too low.
They rated the relationship between cost and benefit for the project as
negative or neutral at best.
However,
since the low impact of risk management on the project can be attributed to the
weak implementation of the controlling actions, there is a clear potential for
improving the cost-benefit in the future with the experience from this project.
On the
other hand, at management level the existence of a more systematic and explicit
risk management providing a more professional project management was seen as
worth the cost. Because of this and the prospect that improved risk management will
also have a stronger impact on the project itself, management will continue
implementing explicit risk management using the
concepts
of Riskit in future projects. Summarizing our findings related to the cost and
benefit we can conclude:
§ The
cost of risk management accounted for 5% of the overall project management
effort, which was seen as acceptable.
§ At
management level, the existence of more professional project management was
seen as worth the cost.
§ The
impact of risk management on the project was seen as too low. With improved
risk management, however, this impact can be improved respectively.
6.3
Comparison with Other Case Studies
In
order to generalize the results of our study, we performed a cross-case
analysis [34] and compared our findings with the findings of three earlier case
studies investigating the Riskit method.
The
first case study for Riskit, which was performed in 1996 at NASA [23][24], was
an exploratory study for Riskit but also compared Riskit with a different
method. In this study, the visual appeal and understandability of the Riskit
analysis graphs was emphasized. Furthermore, this study found that users
reported higher levels of confidence in the results of the Riskit method.
Both
of these findings seem to be in line with the overall feedback received from
our study.
Additionally,
the NASA study found that the Riskit method produced more detailed controlling
actions. Although in our study, the Tenovis participants regarded the
implementation of the controlling actions as weak, they, nevertheless,
acknowledged that the controlling actions would have had a useful impact on the
project if they had been implemented as planned.
In
terms of effort, studies differ substantially: In the NASA study 20% of the
management effort was spent on risk management, whereas in the Tenovis project
this figure was 5%. One potential explanation for this difference could be the
substantially smaller size of the NASA project. Another possible explanation
could be the fact that the Riskit method itself was in its early development and
perhaps contained more overhead activities during the NASA study.
The
second study, which was conducted in 1998 at Nokia and DaimlerChrysler [27],
evaluated the feasibility and usefulness of Riskit. Additionally, the study
tried to identify issues related to the introduction of risk management. In
this second study, the following observations were made:
§ Motivation
and clear definition of responsibilities are necessary for successful risk
management.
§ Project
time pressures continually limit the time available for risk management.
§ Systematic
risk management was perceived as beneficial and seemed to improve participants’
confidence in risk management results.
These
findings are similar to the ones presented in this paper. However, some
findings differ. The DaimlerChrysler study indicated that users had
difficulties understanding and using Riskit analysis graphs whereas in our
study these graphs were considered very helpful. We believe that a major reason
for this difference was the amount of training given to participants. In the DaimlerChrysler
study, one to two hours of training were given to the risk management
participants, whereas in the Tenovis study, a full-day workshop with exercises
using material from the actual project was performed.
This
explanation of factors impacting the understandability of the Riskit analysis
graphs emphasizes our finding that appropriate training is essential for a
successful technology transfer for Riskit. The third study, which was performed
by Getto and Landes in the context of DaimlerChrysler in 1999 [18], emphasized
the need for efficiency in risk management. Again, this is similar to the
findings of our study.
This
third study also emphasized the importance of stakeholders as defined in Riskit
(cf. Figure 2), a fact that was also reported in the second study performed at
Nokia and DaimlerChrysler. In our study, the concept of stakeholders was not
explicitly mentioned in the case study interviews by the interviewees. Yet,
during the course of the project, discussions took place in the risk management
team on stakeholders, their goals, and their goal priorities.
In
summary, the findings in all four studies seem to be fairly consistent and the
natural variance in the way the method was applied in the various contexts can
be used to find more effective ways of applying the method.
7.
LESSONS LEARNED FROM THE CASE STUDY
Based
on the results reported above we developed a set of lessons learned that we
consider the essentials of our case study. They are largely independent of the
project and as such can be applied to other projects as well.
§ Explicit
and systematic risk management is perceived as useful by project management. Prior to Riskit’s
implementation
the project managers performed most of the risk management activities, albeit
in an informal and intuitive way. However, the explicit and systematic way was perceived
as a valuable add-on to their daily practices.
§ The
distinguishing features of Riskit were perceived as practical and
understandable. During
risk identification, the combination of checklists and brainstorming allows
both to include the experience and insight of the participants and, simultaneously,
check systematically for typical risks. During risk analysis, the Riskit
scenarios provided an effective way to understand and discuss about risks.
During selection of the most important risks, the Pareto table allows to take
into account both the probability and utility loss effectively and
comprehensibly even though they are measured by ordinal scale metrics.
§ Monitoring
is one of the most important activities. A vital prerequisite for successful risk mitigation
is the ability to react quickly to changes in the status of a risk or its controlling
actions, as early as possible. Risk monitoring on a regular basis is the
key to this prerequisite. The method used for monitoring should be carefully
selected to avoid tedious repetition, and the documentation should support the requirements
of monitoring, as it is the activity that is performed most frequently.
§ Ensure
seamless integration of risk management activities into the overall project
work. Regular
project meetings should be used to perform the risk management activities. This
is especially true for risk monitoring. Regular meetings enable participants to
detect and react on changes in the status of risks or their controlling actions
and prevents unnecessary overhead through additional meetings. Moreover,
developers will not perceive risk management activities as additional burden
but as part of their routine work. The integration should also force an
appropriate level of documentation.
§ Ensure
the commitment of the project manager when implementing risk management. Although upper management often
decides on the introduction of a technology such as risk management, the
project manager is the one who, in the end has to make risk management
decisions in the project and convince his or her project team. Therefore, the
project manager’s commitment is of crucial importance for successful technology
transfer.
§ Process
ownership of customized risk management process. Although at the beginning of the
technology transfer, the technology provider has the experience and competence
with risk management, it is very important that the project manager takes over
responsibility for the customized process. This ownership is necessary to adapt
the process to the project’s needs quickly and efficiently, and to perform the
process in the most effective and systematic way. The role of the technology
provider is to advise and support the project manager.
8.
CONCLUSION
In
this paper, we presented a case study of implementing risk management at
Tenovis. The objectives of the case study were, on the one hand, to analyze the
usefulness and adequacy of Riskit in order to tailor the method to Tenovis and
improve it in general. On the other hand, the objective was to analyze the
cost-benefit of Riskit in an industrial context.
Our
results show that Riskit is a practical and understandable risk management
method. Its techniques for describing risks (Risk Scenarios) and for selecting
the most important risks (Pareto ranking technique) were highly appreciated by
the risk management team. While the costs for risk management were seen as
acceptable, its impact on the project were, in this particular case, considered
too low. Yet, the experiences from this case study can be used to improve risk
management at Tenovis and thus increase its cost effectiveness. On a
management, level the existence of a more professional project management was
seen as worth the costs. Additionally, we reported several lessons learned for
both risk management in general, and Riskit in particular. They can be useful for
all project managers who are considering the introduction of explicit risk
management.
9.
ACKNOWLEDGEMENTS
We
would like to thank the participants of the Tenovis Risk Management Meetings
for their commitment and their collaboration when we performed the case study
interviews. Additionally, we would like to thank Sonnhild Namingha for proofreading
the paper. Finally, we thank Ulrike Becker- Kornstaedt for her valuable
comments on the contents and presentation of the paper.

0 Response to "Manajemen Resiko"
Post a Comment