skip to main content
article
Free Access

The one-minute risk assessment tool

Published:01 November 2004Publication History
Skip Abstract Section

Abstract

An analysis of risks in software development, using data from senior IT managers, produced surprising results. Our one-minute assessment tool applies those results to assessing the risks of specific projects.

References

  1. Alexander, C. Notes on the Synthesis of Form. Harvard University Press, Cambridge, MA, 1964.Google ScholarGoogle Scholar
  2. Armour, P. A case for a new business model: Is software a product or a medium? Commun. ACM 43, 8 (Aug. 2000), 19--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Benko, C. and McFarlan, W. Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times. Harvard Business School Press, Boston, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Faraj, S. and Sproull, L. Coordinating expertise in software development teams. Manage. Sci. 46, 12 (2000), 1554--1568. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Highsmith, J. The great methodologies debate part I: opening statement. Cutter IT J. 14, 12 (2001), 2--4.Google ScholarGoogle Scholar
  6. Leonard-Barton, D. and Sinha, D. Developer-user interaction and user satisfaction in internal technology transfer. Acad. Manage. J. 36, 5 (1993), 1125--1139.Google ScholarGoogle Scholar
  7. Rus, I. and Lindvall, M. Knowledge management in software engineering. IEEE Softw. (May/June 2002), 26--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Standish Group. Chaos chronicles II. West Yarmouth, MA, 2001.Google ScholarGoogle Scholar
  9. Von Hippel, E. Lead users: a source of novel product concepts. Manage. Sci 32, 7 (1986), 791--805. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The one-minute risk assessment tool

        Recommendations

        Reviews

        Andrea F Paramithiotti

        Tiwana and Keil present a risk assessment tool for information and communications technology (ICT) projects that they developed after finding that conventional tools took too much time, were highly complex, and often produced misleading results. In order to avoid such pitfalls, they developed a quick and practical (they call it "pragmatic") tool. After conducting a large survey of senior ICT project managers, the authors identified six key risk factors for information technology (IT) projects, and divided them into knowledge-related and organizational factors. Among knowledge-related factors, they place the similarity of the current project to previous ones, customer involvement in the project, and the stability of requirements. Among organizational factors, they place the use of formal project management methods, the fit between methodology and project type, and the project complexity itself. The tool devised by the authors consists first of dividing a Cartesian space into four quadrants, whose axes describe the type of risk factor (organizational or knowledge-related) and the manager's sphere of influence (within, if the project manager can control the risk factors, or outside, if he or she cannot). Then, each of the risk factors can be placed in the region of the plane that more accurately describes its nature. Different people in an organization can then be asked to place the risk factors in the grid; at the end of this process, the project manager can have an idea of the relative perception of these factors in the whole organization. This tool is straightforward, quick, and easy to use; however, being qualitative only, it is not suited for a rigorous analysis. The authors suggest using it as a first step, to "get the bearings," before embarking on a large project. It could also be useful as an introductory tool in risk assessment courses, just to get the flavor of what risk assessment is about. And who knows__?__ It could even be fun using in some everyday activities (for example, vacation planning or car substitution). Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 47, Issue 11
          Bioinformatics
          November 2004
          106 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/1029496
          Issue’s Table of Contents

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format