Koncepcja metody oceny ryzyka w przedsięwzięciach
Transkrypt
Koncepcja metody oceny ryzyka w przedsięwzięciach
.RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL Z]L FLDFK informatycznych :RMFLHFK0DFKDáD-HU]\6WDQLN :RMVNRZD$NDGHPLD7HFKQLF]QD:\G]LDá&\EHUQHW\NL,QVW\WXW6\VWHPyZ,QIRUPDW\F]Q\FK e–mail: [email protected], [email protected] Abstrakt : DUW\NXOH SU]HGVWDZLRQR VSRVyE NRQVWUXRZDQLD L Z\]QDF]DQLD ZDUWRFL PLDU\ SRZRG]HQLD UHDOL]DFML SU]HGVL Z]L FLD LQIRUPDW\F]QHJR ]ZDQHM ZVND(QLNLHP ]DJUR*HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR :DUWRü WHJR ZVND(QLND MHVW REOLF]DQD QD SRGVWDZLH W]Z VSUDZF]\FK L Z\NRQDZF]\FK F]\QQLNyZ ]DJUR*HQLD NWyUH VWDQRZL DJUHJDFM Uy*Q\FK U\]\N LGHQW\ILNRZDQ\FK L RFHQLDQ\FK ] wykorzystaniem tradycyjnych metod. :SURZDG]HQLH Z SUREOHPDW\N U\]\ND Z SU]HGVL Z]L FLDFK informatycznych : OLWHUDWXU]H GRW\F]FHM U\]\ND Z SU]HGVL Z]L FLDFK LQIRUPDW\F]Q\FK PR*QD ]QDOH(ü ZLHOH G\VNXVMLGRW\F]F\FKGHILQLFMLSRM FLDU\]\ND:V]\VF\DXWRU]\W\FKG\VNXVMLVMHGQDN]JRGQLFR GRIDNWX*HU\]\NR]DZV]HFKDUDNWHU\]RZDQHMHVWSU]H]GZDHOHPHQW\ • 1LHSHZQRü ± ]GDU]HQLH NWyUH SRZRGXMH XU]HF]\ZLVWQLHQLH U\]\ND PR*H OHF] QLH PXVL Z\VWSLü 5\]\NR NWyUHJR XU]HF]\ZLVWQLHQLH MHVW SHZQH Z SRZLQQR E\ü NODV\ILNRZDQHMDNRRJUDQLF]HQLHUHDOL]DFMLSU]HGVL Z]L FLDLQIRUPDW\F]QHJR • 6NXWNL±XU]HF]\ZLVWQLHQLHVL U\]\NDSRZRGXMHZ\VWSLHQLHQHJDW\ZQ\FKNRQVHNZHQFMLOXE strat. 'REUD GHILQLFMD U\]\ND ]RVWDáD SU]HGVWDZLRQD Z GRNXPHQFLH ÄAustarlian Standard on Risk 0DQDJHPHQW´ $61=6 Z NWyU\P U\]\NR MHVW GHILQLRZDQH MDNR ÄV]DQVD MDNLHJR Z\GDU]HQLDNWyUHE G]LHPLDáRZSá\ZQDUHDOL]DFM ]DPLHU]RQHJRFHOX´ 5\]\NR MHVW QLHRGáF]Q\P HOHPHQWHP UHDOL]DFML ND*GHJR SU]HGVL Z]L FLD LQIRUPDW\F]QHJR GODWHJR SURIHVMRQDOQH SRGHMFLH GR SU]HGVL Z]L ü LQIRUPDW\F]Q\FK Z\PDJD VWRVRZDQLD SU]H] NLHURZQLND SURMHNWX VNXWHF]QHM PHWRG\ ]DU]G]DQLD U\]\NLHP -HGQ\P ] EDUG]LHM ]QDQ\FK SDUDG\JPDWyZ ]DU]G]DQLD U\]\NLHP Z SU]HGVL Z]L FLDFK LQIRUPDW\F]Q\FK MHVW SDUDG\JPDW opracowany przez Software Engineering Institute (SEI) na Carnegie Mellon University (rys. 1). 3U]HGVWDZLRQ\ SDUDG\JPDW UHSUH]HQWRZDQ\ MHVW V\PEROLF]QLH SU]H] RNUJ GOD SRGNUHOHQLD FLJáRFLSURFHVX]DU]G]DQLDU\]\NLHPDáXNLZVND]XMORJLF]QHLF]DVRZHQDVW SVWZRSU]HSá\ZX LQIRUPDFMLPL G]\SRV]F]HJyOQ\PLF]\QQRFLDPLUHDOL]RZDQ\PLZSURFHVLH]DU]G]DQLDU\]\NLHP &HQWUDOQ\P HOHPHQWHP Z PRGHOX ]DU]G]DQLD U\]\NLHP MHVW NRPXQLNDFMD SRQLHZD* EH] HIHNW\ZQ\FK PHWRG NRPXQLNRZDQLD *DGQH SRGHMFLH GR ]DU]G]DQLD U\]\NLHP QLH XPR*OLZL RVLJQL FLDVXNFHVX:\PLDQDLQIRUPDFMLRU\]\NXQDUy*Q\FKSR]LRPDFKRUJDQL]DFMLLVWRWQ\FKGOD HIHNW\ZQHJRZ\NRQ\ZDQLDG]LDáDZUDPDFK]DU]G]DQLDU\]\NLHPMHVWQLH]Z\NOHLVWRWQD]SXQNWX ZLG]HQLDSRZRG]HQLDFDáRFLSU]HGVL Z]L FLDLQIRUPDW\F]QHJR ,GHQW\ILNDFMD U\]\ND MHVW ÄLQZHQWDU\]DFM´ SRWHQFMDOQ\FK ]DJUR*H ]DQLP E G RQH Z\ZLHUDü ZSá\Z QD UHDOL]DFM SU]HGVL Z]L FLD LQIRUPDW\F]QHJR 5H]XOWDWHP WHM F]\QQRFL MHVW OLVWD VSHF\ILF]Q\FKGODGDQHJRSU]HGVL Z]L FLDHOHPHQWyZU\]\ND $QDOL]D U\]\ND SROHJD QD GRNáDGQ\P ]EDGDQLX ZV]\VWNLFK ]LGHQW\ILNRZDQ\FK U\]\N Z FHOX SU]HNV]WDáFHQLD LQIRUPDFML R SRWHQFMDOQ\FK U\]\NDFK Z LQIRUPDFM GHF\]\MQ 'OD ND*GHJR ]LGHQW\ILNRZDQHJR U\]\ND RFHQLDQH MHVW SUDZGRSRGRELHVWZR MHJR Z\VWSLHQLD L UR]PLDU SRWHQFMDOQ\FK VWDUW 5R]ZD*D VL UyZQLH* VNXWNL MHGQRF]HVQHJR XU]HF]\ZLVWQLHQLD VL NLONX elementów ryzyka. 242 :RMFLHFK0DFKDáD-HU]\6WDQLN 5\V0RGHO]DU]G]DQLDU\]\NLHPSURSRQRZDQ\SU]H]Software Engineering Institute 3ODQRZDQLH U\]\ND SROHJD QD Z\NRU]\VWDQLX LQIRUPDFML R U\]\NDFK Z Uy*Q\FK GHF\]MDFK L G]LDáDQLDFK PDMF\FK QD FHOX ]áDJRG]HQLH VNXWNyZ XU]HF]\ZLVWQLHQLD VL U\]\N 'OD ND*GHJR HOHPHQWX U\]\ND SRZLQLHQ E\ü RNUHORQ\ VSRVyE SRVW SRZDQLD QS áDJRG]HQLH XQLNDQLH DNFHSWDFMDWUDQVIHUSRJá ELRQDDQDOL]DU\]\ND OHG]HQLH U\]\ND UHDOL]RZDQH MHVW SRSU]H] PRQLWRURZDQLH VWDWXVX U\]\N RUD] G]LDáD UR]SRF] W\FKZFHOXáDJRG]HQLDOXEXQLNDQLDU\]\ND 6WHURZDQLHU\]\NLHPMHVWF]\QQRFLSROHJDMFQDNRU\JRZDQLXRGFK\OHRGSU]HZLG\ZDQ\FK UH]XOWDWyZG]LDáDSRGM W\FKZFHOXáDJRG]HQLDOXEXQLNDQLDU\]\ND 'ZLHSLHUZV]HF]\QQRFLLGHQW\ILNDFMDLDQDOL]DPR*QDRNUHOLüMDNRG]LDáDQLD]PLHU]DMFHGR RFHQ\U\]\NDDZ\NRQ\ZDQLHSR]RVWDá\FKF]\QQRFLSODQRZDQLHOHG]HQLHLVWHURZDQLH]PLHU]D GRREQL*DQLDU\]\ND : GDOV]HM F] FL DUW\NXáX SU]HGVWDZLRQR NRQFHSFM PHWRG\ RFHQ\ U\]\ND FR Z NRQWHNFLH RSLVDQHJRZ\*HMPRGHOX]DU]G]DQLDU\]\NLHPR]QDF]DNRQFHSFM LGHQW\ILNDFMLLDQDOL]\U\]\ND 2. Identyfikacja i analiza ryzyka 6WRVRZDQHZSUDNW\FHPHWRG\LGHQW\ILNDFMLU\]\NDVZVZRMHMLVWRFLHEDUG]RSRGREQHGRVLHELH ± SROHJDM RQH QD XWZRU]HQLX OLVW\ (UyGHá SRWHQFMDOQ\FK U\]\N GOD NRQNUHWQHJR SU]HGVL Z]L FLD LQIRUPDW\F]QHJR/LVWDWDNDF] VWRMHVWSU]HNV]WDáFDQDGRSHZQHMVWUXNWXU\KLHUDUFKLF]QHM3RQL*HM przedstawiono fragment takiej struktury. 1. URGRZLVNRZ\WZDU]DQLD 1.1. Proces wytwarzania: 1.1.1. .... 1.1.2. .... 1.2. 3URFHV]DU]G]DQLDSU]HGVL Z]L FLHP 1.2.1. Planowanie .RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL Z]L FLDFKLQIRUPDW\F]Q\FK 1.2.2. 1.2.3. 1.2.4. 1.3. .... 1.4. .... 2. .... 243 Organizacja projektu .... .... 'R ND*GHJR HOHPHQWDUQHJR (UyGáD U\]\ND QDOH*\ GRáF]\ü S\WDQLH OXE OLVW S\WD NWyUH XPR*OLZL LGHQW\ILNDFM U\]\N ]ZL]DQ\FK ] GDQ\P (UyGáHP 5\]\ND ]ZL]DQH ] SODQRZDQLHP RUD]RUJDQL]DFMSURMHNWXPRJE\ü]LGHQW\ILNRZDQHQDSRGVWDZLHQDVW SXMFHMOLVW\ S\WD 1.2.1. Planowanie: 1.2.1.1. &]\SU]HGVL Z]L FLHMHVW]DU]G]DQH]JRGQLH]SODQHP" 1.2.1.2. &]\SODQSU]HGVL Z]L FLDSRGOHJDUHRUJDQL]DFMLVWRVRZQLHGRRNROLF]QRFL" 1.2.1.3. &]\ND*G\SR]LRP]HVSRáXZ\NRQDZF]HJRMHVWXZ]JO GQLDQ\ZSODQRZDQLX]DGD" 1.2.1.4. &]\GOD]QDQ\FKU\]\N]RVWDá\XWZRU]RQHSODQ\DZDU\MQH" 1.2.2. Organizacja projektu: 1.2.2.1. &]\RUJDQL]DFMDSU]HGVL Z]L FLDLQIRUPDW\F]QHJRMHVWHIHNW\ZQD" 1.2.2.2. &]\ ZV]\VF\ F]áRQNRZLH ]HVSRáX Z\NRQDZF]HJR GREU]H UR]XPLHM VZRMH UROH L UROH LQQ\FKF]áRQNyZ" 1.2.2.3. &]\ ZV]\VF\ F]áRQNRZLH ]HVSRáX Z\NRQDZF]HJR GREU]H UR]XPLHM ]DNUHV RGSRZLHG]LDOQRFLVZRMHMRUD]LQQ\FKF]áRQNyZ]HVSRáX" 3U]\JRWRZDQLH Z\F]HUSXMFHJR NZHVWLRQDULXV]D XPR*OLZLDMFHJR LGHQW\ILNDFM ZV]\VWNLFK SRWHQFMDOQ\FK U\]\N QLH MHVW WU\ZLDOQH : OLWHUDWXU]H PR*QD ]QDOH(ü ZLHOH Uy*Q\FK V]DEORQyZ NZHVWLRQDULXV]\ VáX*F\FK LGHQW\ILNDFML U\]\ND NWyUH Z UD]LH SRWU]HE\ PRJ E\ü UR]V]HU]RQD R V]F]HJyOQH S\WDQLD Z\QLNDMFH ] VSHF\ILNL GDQHJR SU]HGVL Z]L FLD LQIRUPDW\F]QHJR 0LPR *H SU]\JRWRZDQLHZáDFLZHJRNZHVWLRQDULXV]DRUD]X]\VNDQLHZ\F]HUSXMF\FKRGSRZLHG]LQD]DZDUWH Z QLP S\WDQLD MHVW EDUG]R SUDFRFKáRQQH QS NZHVWLRQDULXV] LGHQW\ILNDFML U\]\ND SU]\JRWRZDQ\ SU]H] 6(, ]DZLHUD RN V]F]HJyáRZ\FK S\WD WR WUXGQR VRELH Z\REUD]Lü LQQ\ VSRVyE identyfikacji wszystkich ryzyk. &]\QQRFL QDVW SXMF SR LGHQW\ILNDFMD U\]\ND MHVW MHJR DQDOL]D F]\OL SU]HNV]WDáFHQLH LQIRUPDFMLR]LGHQW\ILNRZDQ\FKU\]\NDFKZLQIRUPDFM GHF\]\MQRNUHOHQLHSUDZGRSRGRELHVWZD Z\VWSLHQLD L RFHQD UR]PLDUX VWUDW : W\P PLHMVFX PR*QD SRVWDZLü S\WDQLH F]\ NLHURZQLN SURMHNWX MHVW Z VWDQLH OHG]Lü WDN GX* LORü F]\QQLNyZ ZSá\ZDMF\FK QD SRZRG]HQLH SU]HGVL Z]L FLD LQIRUPDW\F]QHJR " 1DZHW MHOL RGSRZLHG( QD WR S\WDQLH MHVW SR]\W\ZQD WR ] SHZQRFLND*G\NLHURZQLNSURMHNWXFKFLDáE\PSRVLDGDüEDUG]LHMV\QWHW\F]QLQIRUPDFM GRW\F]F V]DQV\SRZRG]HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR :VND(QLN]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR .D*GH SU]HGVL Z]L FLH LQIRUPDW\F]QH MHVW UHDOL]RZDQH Z XVWDORQHM NRQILJXUDFML NOLHQW ± Z\NRQDZFD 3U]HGVWDZLFLHOH Z\VRNLHJR V]F]HEOD REX VWURQ WDNLHM NRQILJXUDFML V ]DLQWHUHVRZDQL DNWXDOQ\PLV]DQVDPLSRZRG]HQLDUHDOL]RZDQHJRSU]HGVL Z]L FLDLQIRUPDW\F]QHJR.RQLHF]QDMHVW :RMFLHFK0DFKDáD-HU]\6WDQLN 244 ]DWHP V\QWHW\F]QD PLDUD WDNLHM V]DQV\ NWyU PR*QD RNUHOLü MDNR ZVND(QLN ]DJUR*HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR :VND(QLN WDNL SRZLQLHQ PLHü GZLH VNáDGRZH UHSUH]HQWXMFH odpowiednio: motywacji NRQILJXUDFML NOLHQW ± Z\NRQDZFD GR SRP\OQHJR ]DNRF]HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJR • stan • VWDQ PR*OLZRFL Z\NRQDZF]\FK NRQILJXUDFML NOLHQW ± Z\NRQDZFD SRP\OQHJR ]DNRF]HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJR 5\VXQHN SU]HGVWDZLD SURSR]\FM ]REUD]RZDQLD ZVND(QLND ]DJUR*HQLD ZUD] ] LQWHUSUHWDFM ZDUWRFL MHJR VNáDGRZ\FK SU]\ ]DáR*HQLX *H ZDUWRü ND*GHM VNáDGRZHM GD VL Z\UD]Lü Z SRVWDFL liczby z zakresu [-10..10]). Motywacja Mo*OLZRFL Wska(nik zagro*HQLD Bardzo mocno korzystny dla przedsi wzi FLD Mocno korzystny dla przedsi wzi FLD Dostatecznie korzystny dla przedsi wzi FLD Zauwa *alnie korzystny dla przedsi Z]L FLD Nieznacznie korzystny dla przedsi wzi FLD Oboj tny dla przedsi Z]L FLD Nieznacznie niekorzystny dla przedsi wzi FLD Zauwa *alnie niekorzystny dla przedsi Z]L FLD Dostatecznie niekorzystny dla przedsi wzi FLD Mocno niekorzystny dla przedsi wzi FLD Bardzo mocno niekorzystny dla przedsi wzi FLD 10 8 6 4 2 0 -2 -4 -6 -8 -10 5\V=REUD]RZDQLHZVND(QLND]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR :\]QDF]HQLH ZDUWRFL ZVND(QLND ]DJUR*HQLD EH]SRUHGQLR QD SRGVWDZLH OLVW\ ]LGHQW\ILNRZDQ\FKU\]\NUDF]HMQLHMHVWPR*OLZHQDOH*\]DWHPZSURZDG]LüSRUHGQLSR]LRPPLDU RSLVXMF\FKV]DQV SRZRG]HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR:DUWRüVNáDGRZ\FKZVND(QLND ]DJUR*HQLD PRW\ZDFMD L PR*OLZRFL PR*H E\ü Z\]QDF]RQD QD SRGVWDZLH ZDUWRFL W]Z VSUDZF]\FK L Z\NRQDZF]\FK F]\QQLNyZ ]DJUR*HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR &]\QQLNL VSUDZF]H]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJRRSLVXMWHHOHPHQW\G]LDáDOQRFLNRQILJXUDFML NOLHQW±Z\NRQDZFDRUD]WHZáDFLZRFLFHFK\WHMNRQILJXUDFMLNWyUHJHQHUXMSU]\F]\Q\XSDGNX OXE SRZRG]HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR &]\QQLNL Z\NRQDZF]H ]DJUR*HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJRRSLVXMWHHOHPHQW\G]LDáDOQRFLNRQILJXUDFMLNOLHQW±Z\NRQDZFD RUD] WH ZáDFLZRFL FHFK\ WHM NRQILJXUDFML NWyUH RNUHODM IL]\F]Q UHDOL]RZDOQRü SU]HGVL Z]L FLDLQIRUPDW\F]QHJR,ORüF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FKSRZLQQDE\üWDN GREUDQD DE\ ]ELyU ZDUWRFL W\FK F]\QQLNyZ XVWDORQ\ GOD RNUHORQHM FKZLOL E\á UyZQLH GREU LQIRUPDFMGHF\]\MQGODNLHURZQLNDSURMHNWXMDNZDUWRüZVND(QLND]DJUR*HQLDDOHMHGQRF]HQLH QLH SRZLQLHQ ]ZLHUDü ]E\W GX*R LQIRUPDFML V]F]HJyáRZ\FK ± LORü F]\QQLNyZ VSUDZF]\FK L Z\NRQDZF]\FKSRZLQQD]ZLHUDüVL ZSU]HG]LDOHRGRNGRRN 3U]\ WDN RNUHORQHM VHPDQW\FH VSUDZF]\FK L Z\NRQDZF]\FK F]\QQLNyZ ]DJUR*HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJRRF]\ZLVW\PZ\GDMHVL IDNWREOLF]HQLDZDUWRFLVWDQXPRW\ZDFML NRQILJXUDFMLNOLHQW±Z\NRQDZFDQDSRGVWDZLH]ELRUXZDUWRFLF]\QQLNyZVSUDZF]\FK]DJUR*HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJRDZDUWRFLVWDQXPR*OLZRFLZ\NRQDZF]\FKNRQILJXUDFMLNOLHQW± Z\NRQDZFD QD SRGVWDZLH ]ELRUX ZDUWRFL F]\QQLNyZ Z\NRQDZF]\FK ]DJUR*HQLD SU]HGVL Z]L FLD .RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL Z]L FLDFKLQIRUPDW\F]Q\FK 245 LQIRUPDW\F]QHJR=NROHLZDUWRFLF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FKPRJE\üZ\]QDF]RQH QD SRGVWDZLH OLVW\ ]LGHQW\ILNRZDQ\FK U\]\N NWyUH E G]LHP\ QD]\ZDü F]\QQLNDPL SLHUZRWQ\PL ]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR:W\PFHOXGODND*GHJR]LGHQW\ILNRZDQHJRU\]\ND F]\QQLNDSLHUZRWQHJRQDOH*\RNUHOLü • F]\GDQ\F]\QQLNSLHUZRWQ\ZSá\ZDQDRNUHORQ\F]\QQLNVSUDZF]\F]\Z\NRQDZF]\" • OLF]E RNUHODMFELH*F\VWRSLHXU]HF]\ZLVWQLHQLDVL GDQHJRU\]\ND • MDN GDQ\ F]\QQLN SLHUZRWQ\ ZSá\ZD QD RNUHORQ\ F]\QQLN VSUDZF]\ Z\NRQDZF]\ ± powoduje jego wzrost czy spadek ? 4. Sposób obOLF]DQLDZDUWRFLF]\QQLNyZVSUDZF]\FK iZ\NRQDZF]\FKRUD]ZVND(QLND]DJUR*HQLD -DN SRND]DQR Z SRSU]HGQLP UR]G]LDOH F]\QQLNL SLHUZRWQH ]DJUR*HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR PRJ E\ü RNUHORQH QD SRGVWDZLH NZHVWLRQDULXV]\ LGHQW\ILNDFML U\]\ND =DWHP LORü F]\QQLNyZ SLHUZRWQ\FK PR*H E\ü Z SU]\EOL*HQLX UyZQD LORFL S\WD ]DZDUW\FK Z NZHVWLRQDULXV]XLGHQW\ILNDFMLU\]\NDDZL FSU]HGVWDZLHQLHDQDOL]\ND*GHJRF]\QQLNDSLHUZRWQHJR RUD] VSRVREX SU]HNV]WDáFHQLD ZV]\VWNLFK F]\QQLNyZ SLHUZRWQ\FK Z F]\QQLNL VSUDZF]H L Z\NRQDZF]HQLHMHVWPR*OLZHZQLQLHMV]\PRSUDFRZDQLX 1LHZWSOLZLH MHGQ\P ] F]\QQLNyZ ZSá\ZDMF\FK QD SRZRG]HQLH SU]HGVL Z]L FLD LQIRUPDW\F]QHJR V GREU]H VIRUPXáRZDQH L XGRNXPHQWRZDQH Z\PDJDQLD *HQHUDOQLH Z\PDJDQLD QLHVWDQRZLRIL]\F]Q\FKPR*OLZRFLDFKUHDOL]DFMLSU]HGVL Z]L FLDLQIRUPDW\F]QHJRDOHUDF]HMV SRWHQFMDáHP ZSá\ZDMF\P QD SRZRG]HQLH SU]HGVL Z]L FLD LQIRUPDW\F]QHJR 7DN ZL F MHGQ\P ] F]\QQLNyZVSUDZF]\FK]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJRE G]LHÄMDNRüZ\PDJD´ .D*GDVSHF\ILNDFMDZ\PDJDPR*HE\üRFHQLRQDQS]SXQNWXZLG]HQLDVWDELOQRFLSHáQRFL MDVQRFL L VSU]HF]QRFL Z\PDJD :\PLHQLRQH DWU\EXW\ Z\PDJD VWDQRZL ]DWHP F]\QQLNL SLHUZRWQH ]DJUR*HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR 3U]\EOL*RQD RFHQD W\FK DWU\EXWyZ PR*H E\ü]UHDOL]RZDQDSU]\X*\FLXQDVW SXMFHJRNZHVWLRQDULXV]D • 6WDELOQRüZ\PDJDStaW): • 4 - wymagania bardzo stabilne, gwarantowane dokumentami uzgodnionymi i podpisanymi przez przedstawicieli wysokiego szczebla ze strony klienta i wykonawcy; • 3 - wymagania stabilne, zdefiniowane w analitycznych dokumentach roboczych; • PDáDVWDELOQRüZ\PDJD±QLHIRUPDOQHX]JRGQLHQLDPL G]\]HVSRáHPZ\NRQDZF]\P DX*\WNRZQLNLHPNRFRZ\P • ±GX*D]PLHQQRüZ\PDJDEUDNSHáQHMNRQFHSFMLV\VWHPX]HVWURQ\NOLHQWD • 3HáQRüZ\PDJD3Há:): • Z\PDJDQLD SHáQH GOD ND*GHJR IUDJPHQWX V\VWHPX ]GHILQLRZDQH QD ZV]\VWNLFK SR]LRPDFKRJyOQRFL • EUDNGUXJRU] GQ\FKZ\PDJDGODZ\EUDQ\FKHOHPHQWyZV\VWHPX • EUDNLVWRWQ\FKZ\PDJDGODQLHNWyU\FKNOXF]RZ\FKHOHPHQWyZV\VWHPX • EUDN]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMF\FKUR]SRF] FLHSUDF • -DVQRüZ\PDJDJasW): :RMFLHFK0DFKDáD-HU]\6WDQLN 246 • Z\PDJDQLD MDVQH ]UR]XPLDáH GOD ZV]\VWNLFK ]DLQWHUHVRZDQ\FK F]áRQNyZ ]HVSRáX wykonawczego; • QLHMDVQHVIRUPXáRZDQLHGUXJRU] GQ\FKZ\PDJDGODZ\EUDQ\FKHOHPHQWyZV\VWHPX • QLHMDVQH VIRUPXáRZDQLH LVWRWQ\FK Z\PDJD GOD QLHNWyU\FK NOXF]RZ\FK HOHPHQWyZ systemu; • QLHMDVQHVIRUPXáRZDQLH]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMFHUR]SRF] FLHSUDF • 6SU]HF]QRüZ\PDJDSprW): • VSU]HF]QRü]DVDGQLF]\FKZ\PDJDXQLHPR*OLZLDMFDUHDOL]DFM V\VWHPX • VSU]HF]QRü LVWRWQ\FK Z\PDJD Z\PDJDMFD GRNáDGQHJR VSUHF\]RZDQLD Z\PDJD X*\WNRZQLND • VSU]HF]QRüZ\PDJDGUXJRU] GQ\FKNWyUHQLHPDMZL NV]HJRZSá\ZXQDUHDOL]DFM systemu; • EUDNVSU]HF]Q\FKZ\PDJD =DNáDGDMF *H VWDELOQRü SHáQRü MDVQRü L VSU]HF]QRü Z\PDJD Z SHáQL RNUHOD MDNRü ]GHILQLRZDQ\FK Z\PDJD PR*QD VNRQVWUXRZDü IRUPXá UHSUH]HQWXMF ZDUWRü F]\QQLND VSUDZF]HJRÄMDNRüZ\PDJD´JakWym): JakWym = (StaW × 3Há:× JasW) / SprW a = 0,25 ≤ JakWym ≤ 64 = b 3RQLHZD* LQQH F]\QQLNL VSUDZF]H L Z\NRQDZF]H PRJ PLHü LQQ\ ]DNUHV ZDUWRFL dopuszczalnych (JakWym ∈ [0,25..64]QDOH*\GRNRQDüWDNLHMWUDQVIRUPDFMLIRUPXáGODZV]\VWNLFK F]\QQLNyZ DE\ X]\VNDü ]DNUHV ZDUWRFL GRSXV]F]DOQ\FK >@ 8áDWZL WR SRUyZQ\ZDQLH ZDUWRFL SRV]F]HJyOQ\FK F]\QQLNyZ PL G]\ VRE RUD] ]DSHZQL SR*GDQ\ ]DNUHV ]PLHQQRFL Z\OLF]DQHJRZVND(QLND]DJUR*HQLDF]\OL>@ Dla czynnika JakWymIRUPXáDWUDQVIRUPXMFDE G]LHPLDáDQDVW SXMFSRVWDü JakWym’ = JakWym – 9,75 + [(JakWym – 0,25) / 63,75] × (-43,75) :RJyOQ\PSU]\SDGNXIRUPXáDWUDQVIRUPXMFDMHVWQDVW SXMFD C’ = C – 10 – a + [(C – a) / (b – a)] × (20 – b + a) gdzie: • C’±ZDUWRüRNUHORQHJRF]\QQLNDVSUDZF]HJROXEZ\NRQDZF]HJRSRWUDQVIRUPDFML • C±ZDUWRüRNUHORQHJRF]\QQLNDVSUDZF]HJROXEZ\NRQDZF]HJRSU]HGWUDQVIRUPDFM • a±PLQLPDOQDGRSXV]F]DOQDZDUWRüF]\QQLND • b±PDNV\PDOQDGRSXV]F]DOQDZDUWRüF]\QQLND .RQFHSFMDPHWRG\RFHQ\U\]\NDZSU]HGVL Z]L FLDFKLQIRUPDW\F]Q\FK 247 3U]HGVWDZLHQLHVSRVREXREOLF]DQLDZDUWRFLZV]\VWNLFKF]\QQLNyZVSUDZF]\FKLZ\NRQDZF]\FK Z\NUDF]DSR]DPR*OLZRFLQLQLHMV]HJRDUW\NXáXGODWHJRGDOV]HUR]ZD*DQLDE GSURZDG]RQHSU]\ QDVW SXMF\FK]DáR*HQLDFK • ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZSLHUZRWQ\FK]DJUR*HQLDP = (p1, p2,...,pk); • GOD ND*GHJR F]\QQLND SLHUZRWQHJR VNRQVWUXRZDQ\ ]RVWDá NZHVWLRQDULXV] RFHQ\ ZDUWRFL GDQHJR F]\QQLND XPR*OLZLDMF\ XVWDOHQLH MHJR ELH*FHM ZDUWRFL QDOH*FHM GR SU]HG]LDáX [a..b], gdzie a = 1, b±GRZROQDOLF]EDQDWXUDOQDZL NV]DRG • ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZVSUDZF]\FK]DJUR*HQLDC = (c1, c2,...,cn); • GOD ND*GHJR F]\QQLND VSUDZF]HJR ]GHILQLRZDQD ]RVWDáD IRUPXáD SU]HGVWDZLDMFD ]DOH*QRü PL G]\Z\EUDQ\PLF]\QQLNDPLSLHUZRWQ\PL]DJUR*HQLDDGDQ\PF]\QQLNLHPVSUDZF]\P • ]GHILQLRZDQ\]RVWDá]ELyUF]\QQLNyZZ\NRQDZF]\FK]DJUR*HQLDE = (e1, e2,...,em); • GOD ND*GHJR F]\QQLND VSUDZF]HJR ]GHILQLRZDQD ]RVWDáD IRUPXáD SU]HGVWDZLDMFD ]DOH*QRü PL G]\ Z\EUDQ\PL F]\QQLNDPL SLHUZRWQ\PL ]DJUR*HQLD D GDQ\P F]\QQLNLHP wykonawczym. Niech R = (M, P)R]QDF]DZVND(QLN]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJRJG]LH • M ∈ [-10..10] ± R]QDF]D VWDQ PRW\ZDFML GR SRP\OQHJR ]DNRF]HQLD SU]HGVL Z]L FLD informatycznego; • P ∈ [-10..10] ± R]QDF]D VWDQ PR*OLZRFL Z\NRQDZF]\FK SRP\OQHJR ]DNRF]HQLD SU]HGVL Z]L FLDLQIRUPDW\F]QHJR 1DMSURVWV]\P VSRVREHP XVWDOHQLD ZDUWRFL VWDQX PRW\ZDFML RUD] VWDQX PR*OLZRFL MHVW Z\]QDF]HQLH ZDUWRFL ÄZ\SDGNRZHM RGSRZLHGQLR F]\QQLNyZ VSUDZF]\FK RUD] F]\QQLNyZ Z\NRQDZF]\FK]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJR ( ) ( ) Q 0=∑ Z LF ×F L L= P 3=∑ Z LH ×H L L= gdzie: Z LF R]QDF]DZDJ LWHJRF]\QQLNDVSUDZF]HJR Z LH R]QDF]DZDJ LWHJRF]\QQLNDZ\NRQDZF]HJR 6NRQVWUXRZDQ\ZWHQVSRVyEZVND(QLN]DJUR*HQLDSU]HGVL Z]L FLDLQIRUPDW\F]QHJRMHVWGREU PLDU V]DQV\ SRZRG]HQLD SU]HGVL Z]L FLD LQIRUPDW\F]QHJR 1LHZWSOLZLH *DGHQ ZVND(QLN QLH ]DVWSL ]GURZHJR UR]VGNX NLHURZQLND SURMHNWX NWyU\ F] VWR LQWXLF\MQLH SRGHMPXMH SHZQH G]LDáDQLD QDSUDZF]H Z F]DVLH UHDOL]DFML SU]HGVL Z]L FLD DOH ] SHZQRFL PR*H E\ü SU]\GDWQ\ Z Uy*Q\FKV\WXDFMDFKGHF\]\MQ\FK Bibliografia 248 :RMFLHFK0DFKDáD-HU]\6WDQLN 1. Carr M., Konda S., Monarch I., Ulrich F., Walker C. – Tacxonomy Based Risk Identification, Carnegie Mellon University Software Engineering Institute, Technical Report 1993 2. Gallagher B. – Software Acquisition Risk Management Key Process Area (KPA) A Guidebook, Carnegie Mellon University Software Engineering Institute, 1999 3. Austarlian Standard on Risk Management, AS/NZS 4360:1995 4. Nowicki T., Najgebauer A., 8OLFNL00DFKDáD:±2SUDFRZDQLHED]\GDQ\FKGODSRWU]HE komputerowego wspomagania systemu wczesnego ostrzegania, Wojskowa Akademia Techniczna :\G]LDá&\EHUQHW\NL,QVW\WXW6\VWHPyZ,QIRUPDW\F]Q\FK