Koncepcja metody oceny ryzyka w przedsięwzięciach

Transkrypt

Koncepcja metody oceny ryzyka w przedsięwzięciach
.RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL
Z]L
FLDFK
informatycznych
:RMFLHFK0DFKDáD-HU]\6WDQLN
:RMVNRZD$NDGHPLD7HFKQLF]QD:\G]LDá&\EHUQHW\NL,QVW\WXW6\VWHPyZ,QIRUPDW\F]Q\FK
e–mail: [email protected], [email protected]
Abstrakt : DUW\NXOH SU]HGVWDZLRQR VSRVyE NRQVWUXRZDQLD L Z\]QDF]DQLD ZDUWRFL PLDU\ SRZRG]HQLD
UHDOL]DFML SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR ]ZDQHM ZVND(QLNLHP ]DJUR*HQLD SU]HGVL
Z]L
FLD
LQIRUPDW\F]QHJR :DUWRü WHJR ZVND(QLND MHVW REOLF]DQD QD SRGVWDZLH W]Z VSUDZF]\FK L Z\NRQDZF]\FK
F]\QQLNyZ ]DJUR*HQLD NWyUH VWDQRZL DJUHJDFM
Uy*Q\FK U\]\N LGHQW\ILNRZDQ\FK L RFHQLDQ\FK ]
wykorzystaniem tradycyjnych metod.
:SURZDG]HQLH Z SUREOHPDW\N
U\]\ND Z SU]HGVL
Z]L
FLDFK
informatycznych
: OLWHUDWXU]H GRW\F]FHM U\]\ND Z SU]HGVL
Z]L
FLDFK LQIRUPDW\F]Q\FK PR*QD ]QDOH(ü ZLHOH
G\VNXVMLGRW\F]F\FKGHILQLFMLSRM
FLDU\]\ND:V]\VF\DXWRU]\W\FKG\VNXVMLVMHGQDN]JRGQLFR
GRIDNWX*HU\]\NR]DZV]HFKDUDNWHU\]RZDQHMHVWSU]H]GZDHOHPHQW\
• 1LHSHZQRü ± ]GDU]HQLH NWyUH SRZRGXMH XU]HF]\ZLVWQLHQLH U\]\ND PR*H OHF] QLH PXVL
Z\VWSLü 5\]\NR NWyUHJR XU]HF]\ZLVWQLHQLH MHVW SHZQH Z SRZLQQR E\ü
NODV\ILNRZDQHMDNRRJUDQLF]HQLHUHDOL]DFMLSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
• 6NXWNL±XU]HF]\ZLVWQLHQLHVL
U\]\NDSRZRGXMHZ\VWSLHQLHQHJDW\ZQ\FKNRQVHNZHQFMLOXE
strat.
'REUD GHILQLFMD U\]\ND ]RVWDáD SU]HGVWDZLRQD Z GRNXPHQFLH ÄAustarlian Standard on Risk
0DQDJHPHQW´ $61=6 Z NWyU\P U\]\NR MHVW GHILQLRZDQH MDNR ÄV]DQVD MDNLHJR
Z\GDU]HQLDNWyUHE
G]LHPLDáRZSá\ZQDUHDOL]DFM
]DPLHU]RQHJRFHOX´
5\]\NR MHVW QLHRGáF]Q\P HOHPHQWHP UHDOL]DFML ND*GHJR SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR
GODWHJR SURIHVMRQDOQH SRGHMFLH GR SU]HGVL
Z]L
ü LQIRUPDW\F]Q\FK Z\PDJD VWRVRZDQLD SU]H]
NLHURZQLND SURMHNWX VNXWHF]QHM PHWRG\ ]DU]G]DQLD U\]\NLHP -HGQ\P ] EDUG]LHM ]QDQ\FK
SDUDG\JPDWyZ ]DU]G]DQLD U\]\NLHP Z SU]HGVL
Z]L
FLDFK LQIRUPDW\F]Q\FK MHVW SDUDG\JPDW
opracowany przez Software Engineering Institute (SEI) na Carnegie Mellon University (rys. 1).
3U]HGVWDZLRQ\ SDUDG\JPDW UHSUH]HQWRZDQ\ MHVW V\PEROLF]QLH SU]H] RNUJ GOD SRGNUHOHQLD
FLJáRFLSURFHVX]DU]G]DQLDU\]\NLHPDáXNLZVND]XMORJLF]QHLF]DVRZHQDVW
SVWZRSU]HSá\ZX
LQIRUPDFMLPL
G]\SRV]F]HJyOQ\PLF]\QQRFLDPLUHDOL]RZDQ\PLZSURFHVLH]DU]G]DQLDU\]\NLHP
&HQWUDOQ\P HOHPHQWHP Z PRGHOX ]DU]G]DQLD U\]\NLHP MHVW NRPXQLNDFMD SRQLHZD* EH]
HIHNW\ZQ\FK PHWRG NRPXQLNRZDQLD *DGQH SRGHMFLH GR ]DU]G]DQLD U\]\NLHP QLH XPR*OLZL
RVLJQL
FLDVXNFHVX:\PLDQDLQIRUPDFMLRU\]\NXQDUy*Q\FKSR]LRPDFKRUJDQL]DFMLLVWRWQ\FKGOD
HIHNW\ZQHJRZ\NRQ\ZDQLDG]LDáDZUDPDFK]DU]G]DQLDU\]\NLHPMHVWQLH]Z\NOHLVWRWQD]SXQNWX
ZLG]HQLDSRZRG]HQLDFDáRFLSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
,GHQW\ILNDFMD U\]\ND MHVW ÄLQZHQWDU\]DFM´ SRWHQFMDOQ\FK ]DJUR*H ]DQLP E
G RQH Z\ZLHUDü
ZSá\Z QD UHDOL]DFM
SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR 5H]XOWDWHP WHM F]\QQRFL MHVW OLVWD
VSHF\ILF]Q\FKGODGDQHJRSU]HGVL
Z]L
FLDHOHPHQWyZU\]\ND
$QDOL]D U\]\ND SROHJD QD GRNáDGQ\P ]EDGDQLX ZV]\VWNLFK ]LGHQW\ILNRZDQ\FK U\]\N Z FHOX
SU]HNV]WDáFHQLD LQIRUPDFML R SRWHQFMDOQ\FK U\]\NDFK Z LQIRUPDFM
GHF\]\MQ 'OD ND*GHJR
]LGHQW\ILNRZDQHJR U\]\ND RFHQLDQH MHVW SUDZGRSRGRELHVWZR MHJR Z\VWSLHQLD L UR]PLDU
SRWHQFMDOQ\FK VWDUW 5R]ZD*D VL
UyZQLH* VNXWNL MHGQRF]HVQHJR XU]HF]\ZLVWQLHQLD VL
NLONX
elementów ryzyka.
242
:RMFLHFK0DFKDáD-HU]\6WDQLN
5\V0RGHO]DU]G]DQLDU\]\NLHPSURSRQRZDQ\SU]H]Software Engineering Institute
3ODQRZDQLH U\]\ND SROHJD QD Z\NRU]\VWDQLX LQIRUPDFML R U\]\NDFK Z Uy*Q\FK GHF\]MDFK L
G]LDáDQLDFK PDMF\FK QD FHOX ]áDJRG]HQLH VNXWNyZ XU]HF]\ZLVWQLHQLD VL
U\]\N 'OD ND*GHJR
HOHPHQWX U\]\ND SRZLQLHQ E\ü RNUHORQ\ VSRVyE SRVW
SRZDQLD QS áDJRG]HQLH XQLNDQLH
DNFHSWDFMDWUDQVIHUSRJá
ELRQDDQDOL]DU\]\ND
OHG]HQLH U\]\ND UHDOL]RZDQH MHVW SRSU]H] PRQLWRURZDQLH VWDWXVX U\]\N RUD] G]LDáD
UR]SRF]
W\FKZFHOXáDJRG]HQLDOXEXQLNDQLDU\]\ND
6WHURZDQLHU\]\NLHPMHVWF]\QQRFLSROHJDMFQDNRU\JRZDQLXRGFK\OHRGSU]HZLG\ZDQ\FK
UH]XOWDWyZG]LDáDSRGM
W\FKZFHOXáDJRG]HQLDOXEXQLNDQLDU\]\ND
'ZLHSLHUZV]HF]\QQRFLLGHQW\ILNDFMDLDQDOL]DPR*QDRNUHOLüMDNRG]LDáDQLD]PLHU]DMFHGR
RFHQ\U\]\NDDZ\NRQ\ZDQLHSR]RVWDá\FKF]\QQRFLSODQRZDQLHOHG]HQLHLVWHURZDQLH]PLHU]D
GRREQL*DQLDU\]\ND
: GDOV]HM F]
FL DUW\NXáX SU]HGVWDZLRQR NRQFHSFM
PHWRG\ RFHQ\ U\]\ND FR Z NRQWHNFLH
RSLVDQHJRZ\*HMPRGHOX]DU]G]DQLDU\]\NLHPR]QDF]DNRQFHSFM
LGHQW\ILNDFMLLDQDOL]\U\]\ND
2. Identyfikacja i analiza ryzyka
6WRVRZDQHZSUDNW\FHPHWRG\LGHQW\ILNDFMLU\]\NDVZVZRMHMLVWRFLHEDUG]RSRGREQHGRVLHELH
± SROHJDM RQH QD XWZRU]HQLX OLVW\ (UyGHá SRWHQFMDOQ\FK U\]\N GOD NRQNUHWQHJR SU]HGVL
Z]L
FLD
LQIRUPDW\F]QHJR/LVWDWDNDF]
VWRMHVWSU]HNV]WDáFDQDGRSHZQHMVWUXNWXU\KLHUDUFKLF]QHM3RQL*HM
przedstawiono fragment takiej struktury.
1. URGRZLVNRZ\WZDU]DQLD
1.1. Proces wytwarzania:
1.1.1. ....
1.1.2. ....
1.2. 3URFHV]DU]G]DQLDSU]HGVL
Z]L
FLHP
1.2.1. Planowanie
.RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL
Z]L
FLDFKLQIRUPDW\F]Q\FK
1.2.2.
1.2.3.
1.2.4.
1.3. ....
1.4. ....
2. ....
243
Organizacja projektu
....
....
'R ND*GHJR HOHPHQWDUQHJR (UyGáD U\]\ND QDOH*\ GRáF]\ü S\WDQLH OXE OLVW
S\WD NWyUH
XPR*OLZL LGHQW\ILNDFM
U\]\N ]ZL]DQ\FK ] GDQ\P (UyGáHP 5\]\ND ]ZL]DQH ] SODQRZDQLHP
RUD]RUJDQL]DFMSURMHNWXPRJE\ü]LGHQW\ILNRZDQHQDSRGVWDZLHQDVW
SXMFHMOLVW\
S\WD
1.2.1.
Planowanie:
1.2.1.1. &]\SU]HGVL
Z]L
FLHMHVW]DU]G]DQH]JRGQLH]SODQHP"
1.2.1.2. &]\SODQSU]HGVL
Z]L
FLDSRGOHJDUHRUJDQL]DFMLVWRVRZQLHGRRNROLF]QRFL"
1.2.1.3. &]\ND*G\SR]LRP]HVSRáXZ\NRQDZF]HJRMHVWXZ]JO
GQLDQ\ZSODQRZDQLX]DGD"
1.2.1.4. &]\GOD]QDQ\FKU\]\N]RVWDá\XWZRU]RQHSODQ\DZDU\MQH"
1.2.2.
Organizacja projektu:
1.2.2.1. &]\RUJDQL]DFMDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRMHVWHIHNW\ZQD"
1.2.2.2. &]\ ZV]\VF\ F]áRQNRZLH ]HVSRáX Z\NRQDZF]HJR GREU]H UR]XPLHM VZRMH UROH L UROH
LQQ\FKF]áRQNyZ"
1.2.2.3. &]\ ZV]\VF\ F]áRQNRZLH ]HVSRáX Z\NRQDZF]HJR GREU]H UR]XPLHM ]DNUHV
RGSRZLHG]LDOQRFLVZRMHMRUD]LQQ\FKF]áRQNyZ]HVSRáX"
3U]\JRWRZDQLH Z\F]HUSXMFHJR NZHVWLRQDULXV]D XPR*OLZLDMFHJR LGHQW\ILNDFM
ZV]\VWNLFK
SRWHQFMDOQ\FK U\]\N QLH MHVW WU\ZLDOQH : OLWHUDWXU]H PR*QD ]QDOH(ü ZLHOH Uy*Q\FK V]DEORQyZ
NZHVWLRQDULXV]\ VáX*F\FK LGHQW\ILNDFML U\]\ND NWyUH Z UD]LH SRWU]HE\ PRJ E\ü UR]V]HU]RQD R
V]F]HJyOQH S\WDQLD Z\QLNDMFH ] VSHF\ILNL GDQHJR SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR 0LPR *H
SU]\JRWRZDQLHZáDFLZHJRNZHVWLRQDULXV]DRUD]X]\VNDQLHZ\F]HUSXMF\FKRGSRZLHG]LQD]DZDUWH
Z QLP S\WDQLD MHVW EDUG]R SUDFRFKáRQQH QS NZHVWLRQDULXV] LGHQW\ILNDFML U\]\ND SU]\JRWRZDQ\
SU]H] 6(, ]DZLHUD RN V]F]HJyáRZ\FK S\WD WR WUXGQR VRELH Z\REUD]Lü LQQ\ VSRVyE
identyfikacji wszystkich ryzyk.
&]\QQRFL QDVW
SXMF SR LGHQW\ILNDFMD U\]\ND MHVW MHJR DQDOL]D F]\OL SU]HNV]WDáFHQLH
LQIRUPDFMLR]LGHQW\ILNRZDQ\FKU\]\NDFKZLQIRUPDFM
GHF\]\MQRNUHOHQLHSUDZGRSRGRELHVWZD
Z\VWSLHQLD L RFHQD UR]PLDUX VWUDW : W\P PLHMVFX PR*QD SRVWDZLü S\WDQLH F]\ NLHURZQLN
SURMHNWX MHVW Z VWDQLH OHG]Lü WDN GX* LORü F]\QQLNyZ ZSá\ZDMF\FK QD SRZRG]HQLH
SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR " 1DZHW MHOL RGSRZLHG( QD WR S\WDQLH MHVW SR]\W\ZQD WR ]
SHZQRFLND*G\NLHURZQLNSURMHNWXFKFLDáE\PSRVLDGDüEDUG]LHMV\QWHW\F]QLQIRUPDFM
GRW\F]F
V]DQV\SRZRG]HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
:VND(QLN]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
.D*GH SU]HGVL
Z]L
FLH LQIRUPDW\F]QH MHVW UHDOL]RZDQH Z XVWDORQHM NRQILJXUDFML NOLHQW ±
Z\NRQDZFD 3U]HGVWDZLFLHOH Z\VRNLHJR V]F]HEOD REX VWURQ WDNLHM NRQILJXUDFML V ]DLQWHUHVRZDQL
DNWXDOQ\PLV]DQVDPLSRZRG]HQLDUHDOL]RZDQHJRSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR.RQLHF]QDMHVW
:RMFLHFK0DFKDáD-HU]\6WDQLN
244
]DWHP V\QWHW\F]QD PLDUD WDNLHM V]DQV\ NWyU PR*QD RNUHOLü MDNR ZVND(QLN ]DJUR*HQLD
SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR :VND(QLN WDNL SRZLQLHQ PLHü GZLH VNáDGRZH UHSUH]HQWXMFH
odpowiednio:
motywacji NRQILJXUDFML NOLHQW ± Z\NRQDZFD GR SRP\OQHJR ]DNRF]HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
• stan
• VWDQ PR*OLZRFL Z\NRQDZF]\FK NRQILJXUDFML NOLHQW ± Z\NRQDZFD SRP\OQHJR ]DNRF]HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
5\VXQHN SU]HGVWDZLD SURSR]\FM
]REUD]RZDQLD ZVND(QLND ]DJUR*HQLD ZUD] ] LQWHUSUHWDFM
ZDUWRFL MHJR VNáDGRZ\FK SU]\ ]DáR*HQLX *H ZDUWRü ND*GHM VNáDGRZHM GD VL
Z\UD]Lü Z SRVWDFL
liczby z zakresu [-10..10]).
Motywacja Mo*OLZRFL
Wska(nik zagro*HQLD
Bardzo mocno korzystny dla przedsi
wzi
FLD
Mocno korzystny dla przedsi
wzi
FLD
Dostatecznie korzystny dla przedsi
wzi
FLD
Zauwa *alnie korzystny dla przedsi
Z]L
FLD
Nieznacznie korzystny dla przedsi
wzi
FLD
Oboj tny dla przedsi
Z]L
FLD
Nieznacznie niekorzystny dla przedsi
wzi
FLD
Zauwa *alnie niekorzystny dla przedsi
Z]L
FLD
Dostatecznie niekorzystny dla przedsi
wzi
FLD
Mocno niekorzystny dla przedsi
wzi
FLD
Bardzo mocno niekorzystny dla przedsi
wzi
FLD
10
8
6
4
2
0
-2
-4
-6
-8
-10
5\V=REUD]RZDQLHZVND(QLND]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
:\]QDF]HQLH ZDUWRFL ZVND(QLND ]DJUR*HQLD EH]SRUHGQLR QD SRGVWDZLH OLVW\
]LGHQW\ILNRZDQ\FKU\]\NUDF]HMQLHMHVWPR*OLZHQDOH*\]DWHPZSURZDG]LüSRUHGQLSR]LRPPLDU
RSLVXMF\FKV]DQV
SRZRG]HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR:DUWRüVNáDGRZ\FKZVND(QLND
]DJUR*HQLD PRW\ZDFMD L PR*OLZRFL PR*H E\ü Z\]QDF]RQD QD SRGVWDZLH ZDUWRFL W]Z
VSUDZF]\FK L Z\NRQDZF]\FK F]\QQLNyZ ]DJUR*HQLD SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR &]\QQLNL
VSUDZF]H]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRRSLVXMWHHOHPHQW\G]LDáDOQRFLNRQILJXUDFML
NOLHQW±Z\NRQDZFDRUD]WHZáDFLZRFLFHFK\WHMNRQILJXUDFMLNWyUHJHQHUXMSU]\F]\Q\XSDGNX
OXE SRZRG]HQLD SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR &]\QQLNL Z\NRQDZF]H ]DJUR*HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRRSLVXMWHHOHPHQW\G]LDáDOQRFLNRQILJXUDFMLNOLHQW±Z\NRQDZFD
RUD] WH ZáDFLZRFL FHFK\ WHM NRQILJXUDFML NWyUH RNUHODM IL]\F]Q UHDOL]RZDOQRü
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR,ORüF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FKSRZLQQDE\üWDN
GREUDQD DE\ ]ELyU ZDUWRFL W\FK F]\QQLNyZ XVWDORQ\ GOD RNUHORQHM FKZLOL E\á UyZQLH GREU
LQIRUPDFMGHF\]\MQGODNLHURZQLNDSURMHNWXMDNZDUWRüZVND(QLND]DJUR*HQLDDOHMHGQRF]HQLH
QLH SRZLQLHQ ]ZLHUDü ]E\W GX*R LQIRUPDFML V]F]HJyáRZ\FK ± LORü F]\QQLNyZ VSUDZF]\FK L
Z\NRQDZF]\FKSRZLQQD]ZLHUDüVL
ZSU]HG]LDOHRGRNGRRN
3U]\ WDN RNUHORQHM VHPDQW\FH VSUDZF]\FK L Z\NRQDZF]\FK F]\QQLNyZ ]DJUR*HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRRF]\ZLVW\PZ\GDMHVL
IDNWREOLF]HQLDZDUWRFLVWDQXPRW\ZDFML
NRQILJXUDFMLNOLHQW±Z\NRQDZFDQDSRGVWDZLH]ELRUXZDUWRFLF]\QQLNyZVSUDZF]\FK]DJUR*HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRDZDUWRFLVWDQXPR*OLZRFLZ\NRQDZF]\FKNRQILJXUDFMLNOLHQW±
Z\NRQDZFD QD SRGVWDZLH ]ELRUX ZDUWRFL F]\QQLNyZ Z\NRQDZF]\FK ]DJUR*HQLD SU]HGVL
Z]L
FLD
.RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL
Z]L
FLDFKLQIRUPDW\F]Q\FK
245
LQIRUPDW\F]QHJR=NROHLZDUWRFLF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FKPRJE\üZ\]QDF]RQH
QD SRGVWDZLH OLVW\ ]LGHQW\ILNRZDQ\FK U\]\N NWyUH E
G]LHP\ QD]\ZDü F]\QQLNDPL SLHUZRWQ\PL
]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR:W\PFHOXGODND*GHJR]LGHQW\ILNRZDQHJRU\]\ND
F]\QQLNDSLHUZRWQHJRQDOH*\RNUHOLü
• F]\GDQ\F]\QQLNSLHUZRWQ\ZSá\ZDQDRNUHORQ\F]\QQLNVSUDZF]\F]\Z\NRQDZF]\"
• OLF]E
RNUHODMFELH*F\VWRSLHXU]HF]\ZLVWQLHQLDVL
GDQHJRU\]\ND
• MDN GDQ\ F]\QQLN SLHUZRWQ\ ZSá\ZD QD RNUHORQ\ F]\QQLN VSUDZF]\ Z\NRQDZF]\ ±
powoduje jego wzrost czy spadek ?
4. Sposób obOLF]DQLDZDUWRFLF]\QQLNyZVSUDZF]\FK
iZ\NRQDZF]\FKRUD]ZVND(QLND]DJUR*HQLD
-DN SRND]DQR Z SRSU]HGQLP UR]G]LDOH F]\QQLNL SLHUZRWQH ]DJUR*HQLD SU]HGVL
Z]L
FLD
LQIRUPDW\F]QHJR PRJ E\ü RNUHORQH QD SRGVWDZLH NZHVWLRQDULXV]\ LGHQW\ILNDFML U\]\ND =DWHP
LORü F]\QQLNyZ SLHUZRWQ\FK PR*H E\ü Z SU]\EOL*HQLX UyZQD LORFL S\WD ]DZDUW\FK Z
NZHVWLRQDULXV]XLGHQW\ILNDFMLU\]\NDDZL
FSU]HGVWDZLHQLHDQDOL]\ND*GHJRF]\QQLNDSLHUZRWQHJR
RUD] VSRVREX SU]HNV]WDáFHQLD ZV]\VWNLFK F]\QQLNyZ SLHUZRWQ\FK Z F]\QQLNL VSUDZF]H L
Z\NRQDZF]HQLHMHVWPR*OLZHZQLQLHMV]\PRSUDFRZDQLX
1LHZWSOLZLH MHGQ\P ] F]\QQLNyZ ZSá\ZDMF\FK QD SRZRG]HQLH SU]HGVL
Z]L
FLD
LQIRUPDW\F]QHJR V GREU]H VIRUPXáRZDQH L XGRNXPHQWRZDQH Z\PDJDQLD *HQHUDOQLH Z\PDJDQLD
QLHVWDQRZLRIL]\F]Q\FKPR*OLZRFLDFKUHDOL]DFMLSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRDOHUDF]HMV
SRWHQFMDáHP ZSá\ZDMF\P QD SRZRG]HQLH SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR 7DN ZL
F MHGQ\P ]
F]\QQLNyZVSUDZF]\FK]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRE
G]LHÄMDNRüZ\PDJD´
.D*GDVSHF\ILNDFMDZ\PDJDPR*HE\üRFHQLRQDQS]SXQNWXZLG]HQLDVWDELOQRFLSHáQRFL
MDVQRFL L VSU]HF]QRFL Z\PDJD :\PLHQLRQH DWU\EXW\ Z\PDJD VWDQRZL ]DWHP F]\QQLNL
SLHUZRWQH ]DJUR*HQLD SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR 3U]\EOL*RQD RFHQD W\FK DWU\EXWyZ PR*H
E\ü]UHDOL]RZDQDSU]\X*\FLXQDVW
SXMFHJRNZHVWLRQDULXV]D
• 6WDELOQRüZ\PDJDStaW):
• 4 - wymagania bardzo stabilne, gwarantowane dokumentami uzgodnionymi i podpisanymi
przez przedstawicieli wysokiego szczebla ze strony klienta i wykonawcy;
• 3 - wymagania stabilne, zdefiniowane w analitycznych dokumentach roboczych;
• PDáDVWDELOQRüZ\PDJD±QLHIRUPDOQHX]JRGQLHQLDPL
G]\]HVSRáHPZ\NRQDZF]\P
DX*\WNRZQLNLHPNRFRZ\P
• ±GX*D]PLHQQRüZ\PDJDEUDNSHáQHMNRQFHSFMLV\VWHPX]HVWURQ\NOLHQWD
• 3HáQRüZ\PDJD3Há:):
• Z\PDJDQLD SHáQH GOD ND*GHJR IUDJPHQWX V\VWHPX ]GHILQLRZDQH QD ZV]\VWNLFK
SR]LRPDFKRJyOQRFL
• EUDNGUXJRU]
GQ\FKZ\PDJDGODZ\EUDQ\FKHOHPHQWyZV\VWHPX
• EUDNLVWRWQ\FKZ\PDJDGODQLHNWyU\FKNOXF]RZ\FKHOHPHQWyZV\VWHPX
• EUDN]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMF\FKUR]SRF]
FLHSUDF
• -DVQRüZ\PDJDJasW):
:RMFLHFK0DFKDáD-HU]\6WDQLN
246
• Z\PDJDQLD MDVQH ]UR]XPLDáH GOD ZV]\VWNLFK ]DLQWHUHVRZDQ\FK F]áRQNyZ ]HVSRáX
wykonawczego;
• QLHMDVQHVIRUPXáRZDQLHGUXJRU]
GQ\FKZ\PDJDGODZ\EUDQ\FKHOHPHQWyZV\VWHPX
• QLHMDVQH VIRUPXáRZDQLH LVWRWQ\FK Z\PDJD GOD QLHNWyU\FK NOXF]RZ\FK HOHPHQWyZ
systemu;
• QLHMDVQHVIRUPXáRZDQLH]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMFHUR]SRF]
FLHSUDF
• 6SU]HF]QRüZ\PDJDSprW):
• VSU]HF]QRü]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMFDUHDOL]DFM
V\VWHPX
• VSU]HF]QRü LVWRWQ\FK Z\PDJD Z\PDJDMFD GRNáDGQHJR VSUHF\]RZDQLD Z\PDJD
X*\WNRZQLND
• VSU]HF]QRüZ\PDJDGUXJRU]
GQ\FKNWyUHQLHPDMZL
NV]HJRZSá\ZXQDUHDOL]DFM
systemu;
• EUDNVSU]HF]Q\FKZ\PDJD
=DNáDGDMF *H VWDELOQRü SHáQRü MDVQRü L VSU]HF]QRü Z\PDJD Z SHáQL RNUHOD MDNRü
]GHILQLRZDQ\FK Z\PDJD PR*QD VNRQVWUXRZDü IRUPXá
UHSUH]HQWXMF ZDUWRü F]\QQLND
VSUDZF]HJRÄMDNRüZ\PDJD´JakWym):
JakWym = (StaW × 3Há:× JasW) / SprW
a = 0,25 ≤ JakWym ≤ 64 = b
3RQLHZD* LQQH F]\QQLNL VSUDZF]H L Z\NRQDZF]H PRJ PLHü LQQ\ ]DNUHV ZDUWRFL
dopuszczalnych (JakWym ∈ [0,25..64]QDOH*\GRNRQDüWDNLHMWUDQVIRUPDFMLIRUPXáGODZV]\VWNLFK
F]\QQLNyZ DE\ X]\VNDü ]DNUHV ZDUWRFL GRSXV]F]DOQ\FK >@ 8áDWZL WR SRUyZQ\ZDQLH
ZDUWRFL SRV]F]HJyOQ\FK F]\QQLNyZ PL
G]\ VRE RUD] ]DSHZQL SR*GDQ\ ]DNUHV ]PLHQQRFL
Z\OLF]DQHJRZVND(QLND]DJUR*HQLDF]\OL>@
Dla czynnika JakWymIRUPXáDWUDQVIRUPXMFDE
G]LHPLDáDQDVW
SXMFSRVWDü
JakWym’ = JakWym – 9,75 + [(JakWym – 0,25) / 63,75] × (-43,75)
:RJyOQ\PSU]\SDGNXIRUPXáDWUDQVIRUPXMFDMHVWQDVW
SXMFD
C’ = C – 10 – a + [(C – a) / (b – a)] × (20 – b + a)
gdzie:
• C’±ZDUWRüRNUHORQHJRF]\QQLNDVSUDZF]HJROXEZ\NRQDZF]HJRSRWUDQVIRUPDFML
• C±ZDUWRüRNUHORQHJRF]\QQLNDVSUDZF]HJROXEZ\NRQDZF]HJRSU]HGWUDQVIRUPDFM
• a±PLQLPDOQDGRSXV]F]DOQDZDUWRüF]\QQLND
• b±PDNV\PDOQDGRSXV]F]DOQDZDUWRüF]\QQLND
.RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL
Z]L
FLDFKLQIRUPDW\F]Q\FK
247
3U]HGVWDZLHQLHVSRVREXREOLF]DQLDZDUWRFLZV]\VWNLFKF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FK
Z\NUDF]DSR]DPR*OLZRFLQLQLHMV]HJRDUW\NXáXGODWHJRGDOV]HUR]ZD*DQLDE
GSURZDG]RQHSU]\
QDVW
SXMF\FK]DáR*HQLDFK
• ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZSLHUZRWQ\FK]DJUR*HQLDP = (p1, p2,...,pk);
• GOD ND*GHJR F]\QQLND SLHUZRWQHJR VNRQVWUXRZDQ\ ]RVWDá NZHVWLRQDULXV] RFHQ\ ZDUWRFL
GDQHJR F]\QQLND XPR*OLZLDMF\ XVWDOHQLH MHJR ELH*FHM ZDUWRFL QDOH*FHM GR SU]HG]LDáX
[a..b], gdzie a = 1, b±GRZROQDOLF]EDQDWXUDOQDZL
NV]DRG
• ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZVSUDZF]\FK]DJUR*HQLDC = (c1, c2,...,cn);
• GOD ND*GHJR F]\QQLND VSUDZF]HJR ]GHILQLRZDQD ]RVWDáD IRUPXáD SU]HGVWDZLDMFD ]DOH*QRü
PL
G]\Z\EUDQ\PLF]\QQLNDPLSLHUZRWQ\PL]DJUR*HQLDDGDQ\PF]\QQLNLHPVSUDZF]\P
• ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZZ\NRQDZF]\FK]DJUR*HQLDE = (e1, e2,...,em);
• GOD ND*GHJR F]\QQLND VSUDZF]HJR ]GHILQLRZDQD ]RVWDáD IRUPXáD SU]HGVWDZLDMFD ]DOH*QRü
PL
G]\ Z\EUDQ\PL F]\QQLNDPL SLHUZRWQ\PL ]DJUR*HQLD D GDQ\P F]\QQLNLHP
wykonawczym.
Niech R = (M, P)R]QDF]DZVND(QLN]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRJG]LH
• M ∈ [-10..10] ± R]QDF]D VWDQ PRW\ZDFML GR SRP\OQHJR ]DNRF]HQLD SU]HGVL
Z]L
FLD
informatycznego;
• P ∈ [-10..10] ± R]QDF]D VWDQ PR*OLZRFL Z\NRQDZF]\FK SRP\OQHJR ]DNRF]HQLD
SU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
1DMSURVWV]\P VSRVREHP XVWDOHQLD ZDUWRFL VWDQX PRW\ZDFML RUD] VWDQX PR*OLZRFL MHVW
Z\]QDF]HQLH ZDUWRFL ÄZ\SDGNRZHM RGSRZLHGQLR F]\QQLNyZ VSUDZF]\FK RUD] F]\QQLNyZ
Z\NRQDZF]\FK]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJR
(
)
(
)
Q
0=∑ Z LF ×F L
L=
P
3=∑ Z LH ×H L
L=
gdzie:
Z LF
R]QDF]DZDJ
LWHJRF]\QQLNDVSUDZF]HJR
Z LH
R]QDF]DZDJ
LWHJRF]\QQLNDZ\NRQDZF]HJR
6NRQVWUXRZDQ\ZWHQVSRVyEZVND(QLN]DJUR*HQLDSU]HGVL
Z]L
FLDLQIRUPDW\F]QHJRMHVWGREU
PLDU V]DQV\ SRZRG]HQLD SU]HGVL
Z]L
FLD LQIRUPDW\F]QHJR 1LHZWSOLZLH *DGHQ ZVND(QLN QLH
]DVWSL ]GURZHJR UR]VGNX NLHURZQLND SURMHNWX NWyU\ F]
VWR LQWXLF\MQLH SRGHMPXMH SHZQH
G]LDáDQLD QDSUDZF]H Z F]DVLH UHDOL]DFML SU]HGVL
Z]L
FLD DOH ] SHZQRFL PR*H E\ü SU]\GDWQ\ Z
Uy*Q\FKV\WXDFMDFKGHF\]\MQ\FK
Bibliografia
248
:RMFLHFK0DFKDáD-HU]\6WDQLN
1.
Carr M., Konda S., Monarch I., Ulrich F., Walker C. – Tacxonomy Based Risk Identification, Carnegie
Mellon University Software Engineering Institute, Technical Report 1993
2.
Gallagher B. – Software Acquisition Risk Management Key Process Area (KPA) A Guidebook, Carnegie
Mellon University Software Engineering Institute, 1999
3.
Austarlian Standard on Risk Management, AS/NZS 4360:1995
4.
Nowicki T., Najgebauer A., 8OLFNL00DFKDáD:±2SUDFRZDQLHED]\GDQ\FKGODSRWU]HE
komputerowego wspomagania systemu wczesnego ostrzegania, Wojskowa Akademia Techniczna
:\G]LDá&\EHUQHW\NL,QVW\WXW6\VWHPyZ,QIRUPDW\F]Q\FK