SlideShare une entreprise Scribd logo
1  sur  52
Télécharger pour lire hors ligne
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 1
Requirements Engineering
Processes
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 2
Objectives
● To describe the principal requirements
engineering activities and their relationships
● To introduce techniques for requirements
elicitation and analysis
● To describe requirements validation and the
role of requirements reviews
● To discuss the role of requirements
management in support of other
requirements engineering processes
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 3
Topics covered
● Feasibility studies
● Requirements elicitation and analysis
● Requirements validation
● Requirements management
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 4
Requirements engineering processes
● The processes used for RE vary widely
depending on the application domain, the
people involved and the organisation
developing the requirements.
● However, there are a number of generic
activities common to all processes
• Requirements elicitation;
• Requirements analysis;
• Requirements validation;
• Requirements management.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 5
The requirements engineering process
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 6
Requirements engineering
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 7
Feasibility studies
● A feasibility study decides whether or not the
proposed system is worthwhile.
● A short focused study that checks
• If the system contributes to organisational
objectives;
• If the system can be engineered using current
technology and within budget;
• If the system can be integrated with other
systems that are used.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 8
Feasibility study implementation
● Based on information assessment (what is required),
information collection and report writing.
● Questions for people in the organisation
• What if the system wasn’t implemented?
• What are current process problems?
• How will the proposed system help?
• What will be the integration problems?
• Is new technology needed? What skills?
• What facilities must be supported by the proposed
system?
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 9
Elicitation and analysis
● Sometimes called requirements elicitation or
requirements discovery.
● Involves technical staff working with customers to
find out about the application domain, the services
that the system should provide and the system’s
operational constraints.
● May involve end-users, managers, engineers
involved in maintenance, domain experts, trade
unions, etc. These are called stakeholders.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 10
Problems of requirements analysis
● Stakeholders don’t know what they really want.
● Stakeholders express requirements in their own
terms.
● Different stakeholders may have conflicting
requirements.
● Organisational and political factors may influence
the system requirements.
● The requirements change during the analysis
process. New stakeholders may emerge and the
business environment change.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 11
The requirements spiral
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 12
Process activities
● Requirements discovery
• Interacting with stakeholders to discover their
requirements. Domain requirements are also discovered
at this stage.
● Requirements classification and organisation
• Groups related requirements and organises them into
coherent clusters.
● Prioritisation and negotiation
• Prioritising requirements and resolving requirements
conflicts.
● Requirements documentation
• Requirements are documented and input into the next
round of the spiral.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 13
Requirements discovery
● The process of gathering information about
the proposed and existing systems and
distilling the user and system requirements
from this information.
● Sources of information include
documentation, system stakeholders and the
specifications of similar systems.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 14
ATM stakeholders
● Bank customers
● Representatives of other banks
● Bank managers
● Counter staff
● Database administrators
● Security managers
● Marketing department
● Hardware and software maintenance engineers
● Banking regulators
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 15
Viewpoints
● Viewpoints are a way of structuring the
requirements to represent the perspectives
of different stakeholders. Stakeholders may
be classified under different viewpoints.
● This multi-perspective analysis is important
as there is no single correct way to analyse
system requirements.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 16
Types of viewpoint
● Interactor viewpoints
• People or other systems that interact directly with the
system. In an ATM, the customer’s and the account
database are interactor VPs.
● Indirect viewpoints
• Stakeholders who do not use the system themselves but
who influence the requirements. In an ATM, management
and security staff are indirect viewpoints.
● Domain viewpoints
• Domain characteristics and constraints that influence the
requirements. In an ATM, an example would be standards
for inter-bank communications.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 17
Viewpoint identification
● Identify viewpoints using
• Providers and receivers of system services;
• Systems that interact directly with the system
being specified;
• Regulations and standards;
• Sources of business and non-functional
requirements.
• Engineers who have to develop and maintain
the system;
• Marketing and other business viewpoints.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 18
LIBSYS viewpoint hierarchy
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 19
Interviewing
● In formal or informal interviewing, the RE
team puts questions to stakeholders about
the system that they use and the system to
be developed.
● There are two types of interview
• Closed interviews where a pre-defined set of
questions are answered.
• Open interviews where there is no pre-defined
agenda and a range of issues are explored with
stakeholders.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 20
Interviews in practice
● Normally a mix of closed and open-ended
interviewing.
● Interviews are good for getting an overall
understanding of what stakeholders do and how
they might interact with the system.
● Interviews are not good for understanding domain
requirements
• Requirements engineers cannot understand specific
domain terminology;
• Some domain knowledge is so familiar that people find it
hard to articulate or think that it isn’t worth articulating.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 21
Effective interviewers
● Interviewers should be open-minded, willing
to listen to stakeholders and should not have
pre-conceived ideas about the requirements.
● They should prompt the interviewee with a
question or a proposal and should not simply
expect them to respond to a question such
as ‘what do you want’.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 22
Scenarios
● Scenarios are real-life examples of how a
system can be used.
● They should include
• A description of the starting situation;
• A description of the normal flow of events;
• A description of what can go wrong;
• Information about other concurrent activities;
• A description of the state when the scenario
finishes.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 23
LIBSYS scenario (1)
Initial assumption: The user has logged on to the LIBSYS system and has located the journal containing
the copy of the article.
Normal: The user selects the article to be copied. He or she is then prompted by the system to ei ther
provide subscriber information for the journal or to indicate how they will pay for the article. Alternative
payment methods are by credit card or by quoting an organisational account number.
The user is then asked to fill in a copyright form that maintains details of the transaction and they then
submit this to the LIBSYS system.
The copyright form is c hecked and, if OK, the PDF version of the article is downloaded to the LIBSYS
working area on the user’s computer and the user is informed that it is available. The user is asked to select
a printer and a copy of the article is printed. If the article has been flagged as ‘print-only’ it is deleted from
the user’s system once the user has confirmed that printing is complete.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 24
LIBSYS scenario (2)
What can go wrong: The user may fail to fill in the copyright form correctly. In this case, the form should
be re-presented to the user for correction. If the resubmitted form is still incorrect then the user’s request
for the article is rejected.
The payment may be rejected by the system. The user’s request for the article is rejected.
The article download may fail. Retry until successful or the user terminates the session.
It may not be possible to print the article. If the article is not flagged as ‘print-only’ then it is held in the
LIBSYS workspace. Otherwise, the article is deleted and the user’s account credited with the cost of the
article.
Other activities: Simultaneous downloads of other articles.
System state on completion: User is logged on. The downloaded article has been deleted from LIBSYS
workspace if it has been flagged as print-only.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 25
Use cases
● Use-cases are a scenario based technique
in the UML which identify the actors in an
interaction and which describe the
interaction itself.
● A set of use cases should describe all
possible interactions with the system.
● Sequence diagrams may be used to add
detail to use-cases by showing the sequence
of event processing in the system.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 26
Article printing use-case
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 27
LIBSYS use cases
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 28
Article printing
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 29
Print article sequence
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 30
Social and organisational factors
● Software systems are used in a social and
organisational context. This can influence or
even dominate the system requirements.
● Social and organisational factors are not a
single viewpoint but are influences on all
viewpoints.
● Good analysts must be sensitive to these
factors but currently no systematic way to
tackle their analysis.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 31
Ethnography
● A social scientists spends a considerable time
observing and analysing how people actually work.
● People do not have to explain or articulate their
work.
● Social and organisational factors of importance may
be observed.
● Ethnographic studies have shown that work is
usually richer and more complex than suggested by
simple system models.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 32
Focused ethnography
● Developed in a project studying the air traffic
control process
● Combines ethnography with prototyping
● Prototype development results in
unanswered questions which focus the
ethnographic analysis.
● The problem with ethnography is that it
studies existing practices which may have
some historical basis which is no longer
relevant.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 33
Ethnography and prototyping
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 34
Scope of ethnography
● Requirements that are derived from the way
that people actually work rather than the way
I which process definitions suggest that they
ought to work.
● Requirements that are derived from
cooperation and awareness of other people’s
activities.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 35
Requirements validation
● Concerned with demonstrating that the
requirements define the system that the
customer really wants.
● Requirements error costs are high so
validation is very important
• Fixing a requirements error after delivery may
cost up to 100 times the cost of fixing an
implementation error.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 36
Requirements checking
● Validity. Does the system provide the functions
which best support the customer’s needs?
● Consistency. Are there any requirements conflicts?
● Completeness. Are all functions required by the
customer included?
● Realism. Can the requirements be implemented
given available budget and technology
● Verifiability. Can the requirements be checked?
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 37
Requirements validation techniques
● Requirements reviews
• Systematic manual analysis of the
requirements.
● Prototyping
• Using an executable model of the system to
check requirements. Covered in Chapter 17.
● Test-case generation
• Developing tests for requirements to check
testability.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 38
Requirements reviews
● Regular reviews should be held while the
requirements definition is being formulated.
● Both client and contractor staff should be
involved in reviews.
● Reviews may be formal (with completed
documents) or informal. Good
communications between developers,
customers and users can resolve problems
at an early stage.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 39
Review checks
● Verifiability. Is the requirement realistically
testable?
● Comprehensibility. Is the requirement
properly understood?
● Traceability. Is the origin of the requirement
clearly stated?
● Adaptability. Can the requirement be
changed without a large impact on other
requirements?
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 40
Requirements management
● Requirements management is the process of
managing changing requirements during the
requirements engineering process and system
development.
● Requirements are inevitably incomplete and
inconsistent
• New requirements emerge during the process as
business needs change and a better understanding of the
system is developed;
• Different viewpoints have different requirements and
these are often contradictory.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 41
Requirements change
● The priority of requirements from different
viewpoints changes during the development
process.
● System customers may specify requirements
from a business perspective that conflict with
end-user requirements.
● The business and technical environment of
the system changes during its development.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 42
Requirements evolution
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 43
Enduring and volatile requirements
● Enduring requirements. Stable requirements
derived from the core activity of the customer
organisation. E.g. a hospital will always have
doctors, nurses, etc. May be derived from
domain models
● Volatile requirements. Requirements which
change during development or when the
system is in use. In a hospital, requirements
derived from health-care policy
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 44
Requirements classification
Requirement
Type
Description
Mutable
requirements
Requirements that change because of changes to the environment in which the
organisation is operating. For example, in hospital systems, the funding of patient
care may change and thus require different treatment information to be collected.
Emergent
requirements
Requirements that emerge as the customer's understanding of the system develops
during the system development. The design process may reveal new emergent
requirements.
Consequential
requirements
Requirements that result from the introduction of the computer system. Introducing
the computer system may change the organisations processes and open up new ways
of working which generate new system requirements
Compatibility
requirements
Requirements that depend on the particular systems or business processes within an
organisation. As these change, the compatibility requirements on the commissioned
or delivered system may also have to evolve.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 45
Requirements management planning
● During the requirements engineering process, you
have to plan:
• Requirements identification
• How requirements are individually identified;
• A change management process
• The process followed when analysing a requirements
change;
• Traceability policies
• The amount of information about requirements relationships
that is maintained;
• CASE tool support
• The tool support required to help manage requirements
change;
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 46
Traceability
● Traceability is concerned with the relationships
between requirements, their sources and the system
design
● Source traceability
• Links from requirements to stakeholders who proposed
these requirements;
● Requirements traceability
• Links between dependent requirements;
● Design traceability
• Links from the requirements to the design;
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 47
A traceability matrix
Req.
id
1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2
1.1 D R
1.2 D D D
1.3 R R
2.1 R D D
2.2 D
2.3 R D
3.1 R
3.2 R
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 48
CASE tool support
● Requirements storage
• Requirements should be managed in a secure, managed
data store.
● Change management
• The process of change management is a workflow
process whose stages can be defined and information
flow between these stages partially automated.
● Traceability management
• Automated retrieval of the links between requirements.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 49
Requirements change management
● Should apply to all proposed changes to the
requirements.
● Principal stages
• Problem analysis. Discuss requirements
problem and propose change;
• Change analysis and costing. Assess effects of
change on other requirements;
• Change implementation. Modify requirements
document and other documents to reflect
change.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 50
Change management
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 51
Key points
● The requirements engineering process
includes a feasibility study, requirements
elicitation and analysis, requirements
specification and requirements management.
● Requirements elicitation and analysis is
iterative involving domain understanding,
requirements collection, classification,
structuring, prioritisation and validation.
● Systems have multiple stakeholders with
different requirements.
©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 52
Key points
● Social and organisation factors influence
system requirements.
● Requirements validation is concerned with
checks for validity, consistency,
completeness, realism and verifiability.
● Business changes inevitably lead to
changing requirements.
● Requirements management includes
planning and change management.

Contenu connexe

Tendances

Non-functional requirements
Non-functional requirements Non-functional requirements
Non-functional requirements Rohela Raouf
 
Software Engineering - Ch6
Software Engineering - Ch6Software Engineering - Ch6
Software Engineering - Ch6Siddharth Ayer
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01Rizwan Khurram
 
Improving of software processes
Improving of software processesImproving of software processes
Improving of software processesREHMAT ULLAH
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process ImprovementBilal Shah
 
Software Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationSoftware Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationAjit Nayak
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTvicci4041
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration modelsAlan Dix
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirementsAlan Dix
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentationKuppusamy P
 
Software Engineering - Ch2
Software Engineering - Ch2Software Engineering - Ch2
Software Engineering - Ch2Siddharth Ayer
 

Tendances (20)

CMMI
CMMICMMI
CMMI
 
Unit 2
Unit 2Unit 2
Unit 2
 
Non-functional requirements
Non-functional requirements Non-functional requirements
Non-functional requirements
 
Software Engineering - Ch6
Software Engineering - Ch6Software Engineering - Ch6
Software Engineering - Ch6
 
Software requirements
Software requirementsSoftware requirements
Software requirements
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01
 
Improving of software processes
Improving of software processesImproving of software processes
Improving of software processes
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
 
Human Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELSHuman Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELS
 
Software Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationSoftware Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & Specification
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
 
Chap4 RE validation
Chap4 RE validationChap4 RE validation
Chap4 RE validation
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Hci
HciHci
Hci
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration models
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentation
 
Software Engineering - Ch2
Software Engineering - Ch2Software Engineering - Ch2
Software Engineering - Ch2
 
Software process
Software processSoftware process
Software process
 

En vedette

Software Engineering - Ch4
Software Engineering - Ch4Software Engineering - Ch4
Software Engineering - Ch4Siddharth Ayer
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11Siddharth Ayer
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1Siddharth Ayer
 
software engineering
software engineeringsoftware engineering
software engineeringramyavarkala
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8Siddharth Ayer
 
software engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semestersoftware engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semesterrajesh199155
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering pptshruths2890
 
Software engineering presentation
Software engineering presentationSoftware engineering presentation
Software engineering presentationMJ Ferdous
 

En vedette (10)

Software Engineering - Ch4
Software Engineering - Ch4Software Engineering - Ch4
Software Engineering - Ch4
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1
 
software engineering
software engineeringsoftware engineering
software engineering
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
 
software engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semestersoftware engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semester
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
 
Software engineering presentation
Software engineering presentationSoftware engineering presentation
Software engineering presentation
 

Similaire à Software Engineering - Ch7

5. SE RequirementEngineering task.ppt
5. SE RequirementEngineering task.ppt5. SE RequirementEngineering task.ppt
5. SE RequirementEngineering task.pptHaiderAli252366
 
Unit2 Software engineering UPTU
Unit2 Software engineering UPTUUnit2 Software engineering UPTU
Unit2 Software engineering UPTUMohammad Faizan
 
software recq.ppt
software recq.pptsoftware recq.ppt
software recq.pptkarinaabyys
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGSaqib Raza
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITSIan Sommerville
 
Lecture_three_Requirements_analysis.pptx
Lecture_three_Requirements_analysis.pptxLecture_three_Requirements_analysis.pptx
Lecture_three_Requirements_analysis.pptxGracePeter10
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringSutha31
 
Wireless communication.ppt
Wireless communication.pptWireless communication.ppt
Wireless communication.pptssuser183d67
 
Requirement Engineering.pdf
Requirement Engineering.pdfRequirement Engineering.pdf
Requirement Engineering.pdfMuhammad Imran
 
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...madhurpatidar2
 
Software Requirements.pptx
Software Requirements.pptxSoftware Requirements.pptx
Software Requirements.pptxPrem Chandrakar
 

Similaire à Software Engineering - Ch7 (20)

Ch7
Ch7Ch7
Ch7
 
5. SE RequirementEngineering task.ppt
5. SE RequirementEngineering task.ppt5. SE RequirementEngineering task.ppt
5. SE RequirementEngineering task.ppt
 
Ch6
Ch6Ch6
Ch6
 
SRE.pptx
SRE.pptxSRE.pptx
SRE.pptx
 
Lecture10.ppt
Lecture10.pptLecture10.ppt
Lecture10.ppt
 
Unit2 Software engineering UPTU
Unit2 Software engineering UPTUUnit2 Software engineering UPTU
Unit2 Software engineering UPTU
 
software recq.ppt
software recq.pptsoftware recq.ppt
software recq.ppt
 
Requirementengg
RequirementenggRequirementengg
Requirementengg
 
3. 1 req elicitation
3. 1 req elicitation3. 1 req elicitation
3. 1 req elicitation
 
UNIT-II MMB.pptx
UNIT-II MMB.pptxUNIT-II MMB.pptx
UNIT-II MMB.pptx
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Requirements Engineering for LSCITS
Requirements Engineering for LSCITSRequirements Engineering for LSCITS
Requirements Engineering for LSCITS
 
Lecture_three_Requirements_analysis.pptx
Lecture_three_Requirements_analysis.pptxLecture_three_Requirements_analysis.pptx
Lecture_three_Requirements_analysis.pptx
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Reqmt_Engn.ppt
Reqmt_Engn.pptReqmt_Engn.ppt
Reqmt_Engn.ppt
 
Wireless communication.ppt
Wireless communication.pptWireless communication.ppt
Wireless communication.ppt
 
Requirement Engineering.pdf
Requirement Engineering.pdfRequirement Engineering.pdf
Requirement Engineering.pdf
 
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...
WINSEM2021-22_ITE2004_ETH_VL2021220500452_Reference_Material_I_03-01-2022_Sof...
 
Software Requirements.pptx
Software Requirements.pptxSoftware Requirements.pptx
Software Requirements.pptx
 

Dernier

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Software Engineering - Ch7

  • 1. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 1 Requirements Engineering Processes
  • 2. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 2 Objectives ● To describe the principal requirements engineering activities and their relationships ● To introduce techniques for requirements elicitation and analysis ● To describe requirements validation and the role of requirements reviews ● To discuss the role of requirements management in support of other requirements engineering processes
  • 3. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 3 Topics covered ● Feasibility studies ● Requirements elicitation and analysis ● Requirements validation ● Requirements management
  • 4. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 4 Requirements engineering processes ● The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the requirements. ● However, there are a number of generic activities common to all processes • Requirements elicitation; • Requirements analysis; • Requirements validation; • Requirements management.
  • 5. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 5 The requirements engineering process
  • 6. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 6 Requirements engineering
  • 7. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 7 Feasibility studies ● A feasibility study decides whether or not the proposed system is worthwhile. ● A short focused study that checks • If the system contributes to organisational objectives; • If the system can be engineered using current technology and within budget; • If the system can be integrated with other systems that are used.
  • 8. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 8 Feasibility study implementation ● Based on information assessment (what is required), information collection and report writing. ● Questions for people in the organisation • What if the system wasn’t implemented? • What are current process problems? • How will the proposed system help? • What will be the integration problems? • Is new technology needed? What skills? • What facilities must be supported by the proposed system?
  • 9. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 9 Elicitation and analysis ● Sometimes called requirements elicitation or requirements discovery. ● Involves technical staff working with customers to find out about the application domain, the services that the system should provide and the system’s operational constraints. ● May involve end-users, managers, engineers involved in maintenance, domain experts, trade unions, etc. These are called stakeholders.
  • 10. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 10 Problems of requirements analysis ● Stakeholders don’t know what they really want. ● Stakeholders express requirements in their own terms. ● Different stakeholders may have conflicting requirements. ● Organisational and political factors may influence the system requirements. ● The requirements change during the analysis process. New stakeholders may emerge and the business environment change.
  • 11. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 11 The requirements spiral
  • 12. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 12 Process activities ● Requirements discovery • Interacting with stakeholders to discover their requirements. Domain requirements are also discovered at this stage. ● Requirements classification and organisation • Groups related requirements and organises them into coherent clusters. ● Prioritisation and negotiation • Prioritising requirements and resolving requirements conflicts. ● Requirements documentation • Requirements are documented and input into the next round of the spiral.
  • 13. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 13 Requirements discovery ● The process of gathering information about the proposed and existing systems and distilling the user and system requirements from this information. ● Sources of information include documentation, system stakeholders and the specifications of similar systems.
  • 14. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 14 ATM stakeholders ● Bank customers ● Representatives of other banks ● Bank managers ● Counter staff ● Database administrators ● Security managers ● Marketing department ● Hardware and software maintenance engineers ● Banking regulators
  • 15. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 15 Viewpoints ● Viewpoints are a way of structuring the requirements to represent the perspectives of different stakeholders. Stakeholders may be classified under different viewpoints. ● This multi-perspective analysis is important as there is no single correct way to analyse system requirements.
  • 16. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 16 Types of viewpoint ● Interactor viewpoints • People or other systems that interact directly with the system. In an ATM, the customer’s and the account database are interactor VPs. ● Indirect viewpoints • Stakeholders who do not use the system themselves but who influence the requirements. In an ATM, management and security staff are indirect viewpoints. ● Domain viewpoints • Domain characteristics and constraints that influence the requirements. In an ATM, an example would be standards for inter-bank communications.
  • 17. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 17 Viewpoint identification ● Identify viewpoints using • Providers and receivers of system services; • Systems that interact directly with the system being specified; • Regulations and standards; • Sources of business and non-functional requirements. • Engineers who have to develop and maintain the system; • Marketing and other business viewpoints.
  • 18. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 18 LIBSYS viewpoint hierarchy
  • 19. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 19 Interviewing ● In formal or informal interviewing, the RE team puts questions to stakeholders about the system that they use and the system to be developed. ● There are two types of interview • Closed interviews where a pre-defined set of questions are answered. • Open interviews where there is no pre-defined agenda and a range of issues are explored with stakeholders.
  • 20. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 20 Interviews in practice ● Normally a mix of closed and open-ended interviewing. ● Interviews are good for getting an overall understanding of what stakeholders do and how they might interact with the system. ● Interviews are not good for understanding domain requirements • Requirements engineers cannot understand specific domain terminology; • Some domain knowledge is so familiar that people find it hard to articulate or think that it isn’t worth articulating.
  • 21. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 21 Effective interviewers ● Interviewers should be open-minded, willing to listen to stakeholders and should not have pre-conceived ideas about the requirements. ● They should prompt the interviewee with a question or a proposal and should not simply expect them to respond to a question such as ‘what do you want’.
  • 22. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 22 Scenarios ● Scenarios are real-life examples of how a system can be used. ● They should include • A description of the starting situation; • A description of the normal flow of events; • A description of what can go wrong; • Information about other concurrent activities; • A description of the state when the scenario finishes.
  • 23. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 23 LIBSYS scenario (1) Initial assumption: The user has logged on to the LIBSYS system and has located the journal containing the copy of the article. Normal: The user selects the article to be copied. He or she is then prompted by the system to ei ther provide subscriber information for the journal or to indicate how they will pay for the article. Alternative payment methods are by credit card or by quoting an organisational account number. The user is then asked to fill in a copyright form that maintains details of the transaction and they then submit this to the LIBSYS system. The copyright form is c hecked and, if OK, the PDF version of the article is downloaded to the LIBSYS working area on the user’s computer and the user is informed that it is available. The user is asked to select a printer and a copy of the article is printed. If the article has been flagged as ‘print-only’ it is deleted from the user’s system once the user has confirmed that printing is complete.
  • 24. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 24 LIBSYS scenario (2) What can go wrong: The user may fail to fill in the copyright form correctly. In this case, the form should be re-presented to the user for correction. If the resubmitted form is still incorrect then the user’s request for the article is rejected. The payment may be rejected by the system. The user’s request for the article is rejected. The article download may fail. Retry until successful or the user terminates the session. It may not be possible to print the article. If the article is not flagged as ‘print-only’ then it is held in the LIBSYS workspace. Otherwise, the article is deleted and the user’s account credited with the cost of the article. Other activities: Simultaneous downloads of other articles. System state on completion: User is logged on. The downloaded article has been deleted from LIBSYS workspace if it has been flagged as print-only.
  • 25. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 25 Use cases ● Use-cases are a scenario based technique in the UML which identify the actors in an interaction and which describe the interaction itself. ● A set of use cases should describe all possible interactions with the system. ● Sequence diagrams may be used to add detail to use-cases by showing the sequence of event processing in the system.
  • 26. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 26 Article printing use-case
  • 27. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 27 LIBSYS use cases
  • 28. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 28 Article printing
  • 29. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 29 Print article sequence
  • 30. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 30 Social and organisational factors ● Software systems are used in a social and organisational context. This can influence or even dominate the system requirements. ● Social and organisational factors are not a single viewpoint but are influences on all viewpoints. ● Good analysts must be sensitive to these factors but currently no systematic way to tackle their analysis.
  • 31. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 31 Ethnography ● A social scientists spends a considerable time observing and analysing how people actually work. ● People do not have to explain or articulate their work. ● Social and organisational factors of importance may be observed. ● Ethnographic studies have shown that work is usually richer and more complex than suggested by simple system models.
  • 32. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 32 Focused ethnography ● Developed in a project studying the air traffic control process ● Combines ethnography with prototyping ● Prototype development results in unanswered questions which focus the ethnographic analysis. ● The problem with ethnography is that it studies existing practices which may have some historical basis which is no longer relevant.
  • 33. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 33 Ethnography and prototyping
  • 34. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 34 Scope of ethnography ● Requirements that are derived from the way that people actually work rather than the way I which process definitions suggest that they ought to work. ● Requirements that are derived from cooperation and awareness of other people’s activities.
  • 35. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 35 Requirements validation ● Concerned with demonstrating that the requirements define the system that the customer really wants. ● Requirements error costs are high so validation is very important • Fixing a requirements error after delivery may cost up to 100 times the cost of fixing an implementation error.
  • 36. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 36 Requirements checking ● Validity. Does the system provide the functions which best support the customer’s needs? ● Consistency. Are there any requirements conflicts? ● Completeness. Are all functions required by the customer included? ● Realism. Can the requirements be implemented given available budget and technology ● Verifiability. Can the requirements be checked?
  • 37. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 37 Requirements validation techniques ● Requirements reviews • Systematic manual analysis of the requirements. ● Prototyping • Using an executable model of the system to check requirements. Covered in Chapter 17. ● Test-case generation • Developing tests for requirements to check testability.
  • 38. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 38 Requirements reviews ● Regular reviews should be held while the requirements definition is being formulated. ● Both client and contractor staff should be involved in reviews. ● Reviews may be formal (with completed documents) or informal. Good communications between developers, customers and users can resolve problems at an early stage.
  • 39. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 39 Review checks ● Verifiability. Is the requirement realistically testable? ● Comprehensibility. Is the requirement properly understood? ● Traceability. Is the origin of the requirement clearly stated? ● Adaptability. Can the requirement be changed without a large impact on other requirements?
  • 40. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 40 Requirements management ● Requirements management is the process of managing changing requirements during the requirements engineering process and system development. ● Requirements are inevitably incomplete and inconsistent • New requirements emerge during the process as business needs change and a better understanding of the system is developed; • Different viewpoints have different requirements and these are often contradictory.
  • 41. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 41 Requirements change ● The priority of requirements from different viewpoints changes during the development process. ● System customers may specify requirements from a business perspective that conflict with end-user requirements. ● The business and technical environment of the system changes during its development.
  • 42. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 42 Requirements evolution
  • 43. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 43 Enduring and volatile requirements ● Enduring requirements. Stable requirements derived from the core activity of the customer organisation. E.g. a hospital will always have doctors, nurses, etc. May be derived from domain models ● Volatile requirements. Requirements which change during development or when the system is in use. In a hospital, requirements derived from health-care policy
  • 44. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 44 Requirements classification Requirement Type Description Mutable requirements Requirements that change because of changes to the environment in which the organisation is operating. For example, in hospital systems, the funding of patient care may change and thus require different treatment information to be collected. Emergent requirements Requirements that emerge as the customer's understanding of the system develops during the system development. The design process may reveal new emergent requirements. Consequential requirements Requirements that result from the introduction of the computer system. Introducing the computer system may change the organisations processes and open up new ways of working which generate new system requirements Compatibility requirements Requirements that depend on the particular systems or business processes within an organisation. As these change, the compatibility requirements on the commissioned or delivered system may also have to evolve.
  • 45. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 45 Requirements management planning ● During the requirements engineering process, you have to plan: • Requirements identification • How requirements are individually identified; • A change management process • The process followed when analysing a requirements change; • Traceability policies • The amount of information about requirements relationships that is maintained; • CASE tool support • The tool support required to help manage requirements change;
  • 46. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 46 Traceability ● Traceability is concerned with the relationships between requirements, their sources and the system design ● Source traceability • Links from requirements to stakeholders who proposed these requirements; ● Requirements traceability • Links between dependent requirements; ● Design traceability • Links from the requirements to the design;
  • 47. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 47 A traceability matrix Req. id 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 1.1 D R 1.2 D D D 1.3 R R 2.1 R D D 2.2 D 2.3 R D 3.1 R 3.2 R
  • 48. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 48 CASE tool support ● Requirements storage • Requirements should be managed in a secure, managed data store. ● Change management • The process of change management is a workflow process whose stages can be defined and information flow between these stages partially automated. ● Traceability management • Automated retrieval of the links between requirements.
  • 49. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 49 Requirements change management ● Should apply to all proposed changes to the requirements. ● Principal stages • Problem analysis. Discuss requirements problem and propose change; • Change analysis and costing. Assess effects of change on other requirements; • Change implementation. Modify requirements document and other documents to reflect change.
  • 50. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 50 Change management
  • 51. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 51 Key points ● The requirements engineering process includes a feasibility study, requirements elicitation and analysis, requirements specification and requirements management. ● Requirements elicitation and analysis is iterative involving domain understanding, requirements collection, classification, structuring, prioritisation and validation. ● Systems have multiple stakeholders with different requirements.
  • 52. ©Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 7 Slide 52 Key points ● Social and organisation factors influence system requirements. ● Requirements validation is concerned with checks for validity, consistency, completeness, realism and verifiability. ● Business changes inevitably lead to changing requirements. ● Requirements management includes planning and change management.