SlideShare une entreprise Scribd logo
1  sur  31
Chapter 6
Requirement Management
 Introduction
 Stable and volatile requirements
 Types of volatile requirements
 Requirements change factors
 Requirements identification & Storing
 Requirements management activities
 Change control
 Version control
 Requirements status tracking
 Requirement tracing
 Requirement Management planning
Contents
Next Class
2
 RD – often a separate stage in the project
 RM – activities conducted in parallel with design and
implementation
Introduction
3
 Requirement management is hard problem because of continuous
changes during development process
 Signing off the requirements document by the customer means that
a baseline of requirements agreement has been established.
 It does not mean that requirements have been finalized.
 The subtext of a signature on a requirements specification sign-off
page should read something like (Wiegers, 2003):
 “I agree that this document represents our best understanding of
the requirements for this project today. I agree to make future
changes in this baseline through the project’s defined change
process. I realize that approved changes might require us to
renegotiate cost, resource, and schedule commitments for this
project.”
 Freezing requirements is unwise and unrealistic, changes are fate
Introduction…
4
 Requirements management is the process of analyzing, tracing,
prioritizing, agreeing and documenting requirements and then
controlling change and communicating to relevant stakeholders.
 It is a continuous process throughout a project.
 The principal concerns in requirements management are
 Managing the relationships between requirements
 Managing priorities between requirements
 Managing the dependencies between different documents
 Requirements document
 Architectural Specification
 Managing changes to agreed requirements
5
 Requirements changes occur
 while the requirements are being elicited, analyzed and validated
 after the system has gone into service
 Requirements change is unavoidable & doesn’t imply poor
requirements engineering practice.
 Some requirements are usually more subject to change than others
 Stable requirements: Are concerned with the essence of a system
and its application domain
 E.g. Student detail in student information system
 Volatile requirements: Are specific to the instantiation of the
system in a particular environment and for a particular customer
 E.g. In a hospital, requirements derived from health-care policy
Stable and volatile requirements
6
 Mutable requirements
 Requirements change due to changes to the environment in
which the system is operating
 Example
 The requirements for a system which computes tax deductions
evolve as tax laws are changed
 In hospital system, the funding of patient care may change and
thus require different treatment information to be collected.
 Emergent requirements
 Requirements which cannot be completely defined when the
system is specified
 Requirements emerge; as the system is designed & implemented
and as users have contact with new system
Types of volatile requirements
7
 Consequential requirements
 Requirements that result from the introduction of the computer
system.
 Introducing the computer system may change the
organizations processes and open up new ways of working
which generate new system requirements
 May be based on wrong assumptions about how the system
will be used and some may be wrong
 Compatibility requirements
 Requirements which depend on the particular systems or
business process within an organization.
 As these changes, the compatibility requirements on the
commissioned or delivered system may also evolve.
8
 Requirements for complex systems are continuously changing (during
RE process and after a system has gone into service) because of
 Requirements errors, conflicts and inconsistencies
 As the system development proceeds, some errors and
inconsistencies may be discovered that were not revealed earlier
(in validation) and must be corrected.
 Evolving customer/end-user knowledge of the system
 Customers and end-users may develop a better understanding of
what they really require from a system.
 Technical, schedule or cost problems
 Problems may be encountered in implementing a requirement. It
may be too expensive or take too long to implement certain
requirements.
Requirements change factors
Better RD processes may contribute to reducing the
9
 Changing customer priorities
 Customer priorities change during system development as a
result of a changing business environment, the emergence of
new competitors, staff changes, etc.
 Environmental changes
 The environment in which the system is to be installed may
change so that the system requirements have to change to
maintain compatibility.
 Organizational changes
 The organization which intends to use the system may change
its structure and processes resulting in new system
requirements.
 New Technology
 technology push
RD processes cannot really
10
 Requirements need unique identification
 essential for requirements management
 Requirement Identification Approaches
1. Chapter/section based identification
 requirements are numbered based on chapter/section in the
requirements document
 Problems with this are:
 Numbers cannot be unambiguously assigned until the document is
complete
 Assigning chapter/section numbers is an implicit classification of the
requirement.
 Relationships between requirements is due to their “neighborhood”
 This is misleading
 References are hard to handle
Requirements identification
11
2. Dynamic renumbering
 Some word processing systems allow for automatic renumbering
(paragraphs, cross-references)
 As you re-organize your document and add new requirements, the
system keeps track of the cross reference and automatically
renumbers your requirement depending on its chapter, section and
position within the section
3. Symbolic identification
 Requirements can be identified by giving them a symbolic name
 E.g. EFF-1, EFF-2, EFF-3 are requirements which relate to system
efficiency
4. Database record identification
 Requirements are held as data in a database
 Unique identifier per item are assigned
Requirements identification techniques
12
 Requirements have to be stored in such a way that they can be
easily
 Accessed
 Changed
 linked (with other requirements)
 described (in text as well as in graphics…)
 enhanced (by adding external information)
 Possible Storage techniques are
 In one or more word processor files
 requirements are stored in the requirements document
 In a specially designed requirements database
 Database management software is used
Storing requirements
13
 Advantages
 Easy to construct, maintain, cheap
 Requirements may be accessed by anyone with the right word
processor
 Requirements can be described informally, unstructured…
 It is easy to produce the final requirements document
 Disadvantages
 Requirements dependencies must be externally maintained
 Search facilities are limited
 Not possible to link requirements with proposed requirements changes
 Not possible to have version control on individual requirements (only
whole document)
 No automated navigation from one requirement to another
(Improvement: Hypertext documents)
Storing requirements: Word processor documents
14
 Each requirement is represented as one or more database
entities
 Database query language is used to access requirements
 Advantages
 Good query and navigation facilities
 Support for change and version management
 Versioning of single requirements
 Disadvantages
 Readers may not have the software/skills to access the
requirements database
 Higher costs
Storing requirements: Requirements database
15
Storing requirements: Requirements
database
16
 The statement of requirements ( text, graphics, photos and external
linked storage or multimedia database)
 The number of requirements
 Teamwork, team distribution and computer support
 Distributed team of requirements engineers ( Remote, multi-site
access, Browser interface)
 CASE tool use
 The database should be the same as or compatible with CASE tool
databases
 Interfaces to CASE tools needed in later process steps
 Existing database usage
 If a database for software engineering support is already in use, this
should be used for requirements management
 Costs of training, supporting staff, etc.
Requirements DB: Choice factors
17
 Requirement management maintains the agreement between the
stakeholders, in terms of the integrity and accuracy.
 Involves:
 Change control – managing changes to the requirements baseline,
through reviewing proposed changes and evaluating the likely
impact of each change before approving it, and incorporating
approved changes into the project in a controlled way.
 Version control – managing document versions and requirements
revisions.
 Requirements status tracking – defining a set of status values for a
requirement, and monitoring statuses throughout the project.
 Requirements tracing – managing dependency links between
requirements, and tracing requirements up to their sources and
down to corresponding design, source code, and test cases.
Requirements management activities
18
 Change control/management is concerned with procedures,
processes and standards which are used to manage changes to
system requirements
 During the requirement development stage, changes to the
requirements document can be made relatively freely.
 After the document is approved
 Changes are to be made only by designated people
 Every change is to be documented
 Changes are to be communicated to all the affected
stakeholders and developers
Change control
19
20
Contd….
 Requirements changes may lead to overruns in project’s
schedule, budget, negative impact on the product’s quality.
 Therefore, there is need for change impact analysis, and
decision making whether to approve a change request at all.
 Change control is often seen as a barrier to change.
 However, it is not a barrier, it is structuring of change.
 A very common condition in software project is scope creep,
when stakeholders continue to propose (request) some
additional features.
 If every such a proposition is approved, the project will never
get finished
Contd…
 The most effective technique against the scope creep is ability
to say “No”, or at least “Not now’”.
 Generally,
 change requests that are in fact ‘defect reports’ should all be
satisfied,
 change request which are just ‘extensions’ should all be taken
with suspicion.
21
Contd…
 Change management policies (plan of action) may cover:
 Change request process
 The information required to process for each change request
 The process used to analyze the impact and costs of change
and the associated traceability information
 Change Request Board (should be independent)
 The software support (if any) for the change control process
 Generally, the change management process has three main
activities
 Identifying requirements problem
 caused by analysis of the requirements, new customer needs,
or operational problems
 requirements changes are proposed (specified)
22
 Analyzing proposed changes
 check how many requirements (and, if necessary, system
components) are affected
 time and money, to make the change.
 Implementing changes
 A set of modifications to the requirements document or a new
document version
 has to be validated (quality checking procedures)
 Requirement change requests may be rejected: reasons for rejection
 Change request is invalid: customer has misunderstood some
requirements, proposed change isn’t necessary
 Too many dependent requirements: consequential changes are
unacceptable to the user
 Costs are too high or take too long
Contd…
23
 Change isn’t free.
 Even seemingly minor changes may unexpectedly require lot of
work
 In one project, a change in one of displayed error messages was
requested. In English version of the system it required 1 minute of
work. However, in Amharic version, the message exceeded the
maximum allowed length, both in the message box and in the
database. This requires lot of work.
 Impact analysis:
 Attempts to understand the possible implications of the change. E.g.
whether a quality attribute will be negatively affected?
 Identifies all the files, models and documents affected.
 Identifies the tasks required to implement the change.
 Estimates the effort needed to complete those tasks.
 A change often produces a large ripple effect.
Impact analysis
24
 ….
Ripple Effect
25
 It is useful to monitor the requirements change dynamics throughout
the project
Monitoring changes dynamics
26
 There must be a standard channel through which stakeholders can
submit their change requests.
 Examples are paper form, web form, designated email address.
 Change request forms may include: fields to document the
change analysis, data fields, responsibility fields, status field,
comments field
 All requests must go through this channel.
 No design or implementation work should be done on requests that
have not been yet approved.
 There must be a Change Control Board (CCB), approving changes.
 CCB is to have representatives of various stakeholders.
 CCB should meet regularly, and also have some conditions defined
that would trigger a special meeting.
Change control process guidelines
27
 Impact analysis is to be performed on each change request,
before it is considered at a CCB meeting.
 There should be a ‘fast path’ for low-risk low-cost changes (not
waiting for a CCB meeting).
 The contents of change database should be visible to all the
stakeholders.
 Each incorporated change must be traceable to an approved
change request.
 For changes, what, when, who and why must be documented.
 Keep removed and changed requirements, sometimes ‘undo’ is
to be made.
Contd…
28
 Requirements change is inevitable as customers develop a
better understanding of their real needs and as the political,
organizational and technical environment in which a system is
to be installed changes.
 Requirements which are concerned with the essence of a
system are more likely to be stable than requirements which
are more concerned with how the system is implemented in a
particular environment.
 Types of volatile requirement include mutable requirements,
emergent requirements, consequential requirements and
compatibility requirements.
Key points
29
 Requirements management requires that each requirement
should be uniquely identified.
 If a large number of requirements have to be managed, the
requirements should be stored in a database and links between
related requirements should be maintained.
 Change management policies should define the processes used
for change management and the information which should be
associated with each change request.
 They should also define who is responsible for doing what in the
change management process.
Key points…
30
 ….
Key Points: Change request’s
lifecycle
31

Contenu connexe

Tendances

Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9Ian Sommerville
 
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Dagmar Monett
 
5- Requirement.ppt
5- Requirement.ppt5- Requirement.ppt
5- Requirement.pptssusera1c25a
 
Requirements analysis and modeling
Requirements analysis and modelingRequirements analysis and modeling
Requirements analysis and modelingSyed Zaid Irshad
 
Chapter 01 software engineering pressman
Chapter 01  software engineering pressmanChapter 01  software engineering pressman
Chapter 01 software engineering pressmanRohitGoyal183
 
Requirements Engineering @ Agile
Requirements Engineering @ AgileRequirements Engineering @ Agile
Requirements Engineering @ AgileGirish Khemani
 
Basics of software engineering
Basics of software engineeringBasics of software engineering
Basics of software engineeringMadhav Suratkar
 
Quality attributes in software architecture
Quality attributes in software architectureQuality attributes in software architecture
Quality attributes in software architectureHimanshu
 
Software Requirements and Specifications
Software Requirements and SpecificationsSoftware Requirements and Specifications
Software Requirements and Specificationsvustudent1
 
Software engineering rogers pressman chapter 7
Software engineering rogers pressman chapter 7Software engineering rogers pressman chapter 7
Software engineering rogers pressman chapter 7mohammad hossein Jalili
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11Siddharth Ayer
 
Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software ProcessJomel Penalba
 

Tendances (20)

Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Software project management 3
Software project management 3Software project management 3
Software project management 3
 
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
Requirements Engineering Techniques for Eliciting Requirements (lecture slides)
 
5- Requirement.ppt
5- Requirement.ppt5- Requirement.ppt
5- Requirement.ppt
 
Requirements analysis and modeling
Requirements analysis and modelingRequirements analysis and modeling
Requirements analysis and modeling
 
Chapter 01 software engineering pressman
Chapter 01  software engineering pressmanChapter 01  software engineering pressman
Chapter 01 software engineering pressman
 
Requirements Engineering @ Agile
Requirements Engineering @ AgileRequirements Engineering @ Agile
Requirements Engineering @ Agile
 
Basics of software engineering
Basics of software engineeringBasics of software engineering
Basics of software engineering
 
Ch6 architectural design
Ch6 architectural designCh6 architectural design
Ch6 architectural design
 
Quality attributes in software architecture
Quality attributes in software architectureQuality attributes in software architecture
Quality attributes in software architecture
 
Software Requirements and Specifications
Software Requirements and SpecificationsSoftware Requirements and Specifications
Software Requirements and Specifications
 
Software engineering rogers pressman chapter 7
Software engineering rogers pressman chapter 7Software engineering rogers pressman chapter 7
Software engineering rogers pressman chapter 7
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11
 
Prototyping model
Prototyping modelPrototyping model
Prototyping model
 
RUP
RUPRUP
RUP
 
Ch24 quality management
Ch24 quality managementCh24 quality management
Ch24 quality management
 
Sdlc models
Sdlc modelsSdlc models
Sdlc models
 
Ch2 sw processes
Ch2 sw processesCh2 sw processes
Ch2 sw processes
 
Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software Process
 

Similaire à Ch 6 - Requirement Management.pptx

Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change managementRa'Fat Al-Msie'deen
 
SE Chapter 4 - Software Requirements.pptx
SE Chapter 4 - Software  Requirements.pptxSE Chapter 4 - Software  Requirements.pptx
SE Chapter 4 - Software Requirements.pptxDibyesh1
 
SEPM_MODULE 3.1 Req Eng.pptx
SEPM_MODULE 3.1 Req Eng.pptxSEPM_MODULE 3.1 Req Eng.pptx
SEPM_MODULE 3.1 Req Eng.pptxmokshithaM1
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1pikuoec
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationskylan2
 
Requirement management traceability.ppt
Requirement management  traceability.pptRequirement management  traceability.ppt
Requirement management traceability.pptubaidullah75790
 
Requirments management traceability.ppt
Requirments  management traceability.pptRequirments  management traceability.ppt
Requirments management traceability.pptubaidullah75790
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptxaryan631999
 
Requirements change - requirements engineering
Requirements change - requirements engineeringRequirements change - requirements engineering
Requirements change - requirements engineeringRa'Fat Al-Msie'deen
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringAyaz Ahmed
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringAyaz Shariff
 
Case Study - Upgrading to the Next Gen User Interface for Documentum- final
Case Study - Upgrading to the Next Gen User Interface for Documentum- finalCase Study - Upgrading to the Next Gen User Interface for Documentum- final
Case Study - Upgrading to the Next Gen User Interface for Documentum- finalBrian Nace
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineeringRa'Fat Al-Msie'deen
 
Software Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summarySoftware Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summaryAhmed Kamel Taha
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringSutha31
 

Similaire à Ch 6 - Requirement Management.pptx (20)

Chap5 RE management
Chap5 RE managementChap5 RE management
Chap5 RE management
 
Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change management
 
SE Chapter 4 - Software Requirements.pptx
SE Chapter 4 - Software  Requirements.pptxSE Chapter 4 - Software  Requirements.pptx
SE Chapter 4 - Software Requirements.pptx
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
 
SEPM_MODULE 3.1 Req Eng.pptx
SEPM_MODULE 3.1 Req Eng.pptxSEPM_MODULE 3.1 Req Eng.pptx
SEPM_MODULE 3.1 Req Eng.pptx
 
L4 RE Processes
L4 RE ProcessesL4 RE Processes
L4 RE Processes
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
 
Requirement management traceability.ppt
Requirement management  traceability.pptRequirement management  traceability.ppt
Requirement management traceability.ppt
 
Requirments management traceability.ppt
Requirments  management traceability.pptRequirments  management traceability.ppt
Requirments management traceability.ppt
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptx
 
Requirements change - requirements engineering
Requirements change - requirements engineeringRequirements change - requirements engineering
Requirements change - requirements engineering
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Case Study - Upgrading to the Next Gen User Interface for Documentum- final
Case Study - Upgrading to the Next Gen User Interface for Documentum- finalCase Study - Upgrading to the Next Gen User Interface for Documentum- final
Case Study - Upgrading to the Next Gen User Interface for Documentum- final
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineering
 
Ch4
Ch4Ch4
Ch4
 
Software Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summarySoftware Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summary
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 

Plus de balewayalew

Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.pptbalewayalew
 
Data Analytics.ppt
Data Analytics.pptData Analytics.ppt
Data Analytics.pptbalewayalew
 
PE1 Module 4.ppt
PE1 Module 4.pptPE1 Module 4.ppt
PE1 Module 4.pptbalewayalew
 
PE1 Module 3.ppt
PE1 Module 3.pptPE1 Module 3.ppt
PE1 Module 3.pptbalewayalew
 
PE1 Module 2.ppt
PE1 Module 2.pptPE1 Module 2.ppt
PE1 Module 2.pptbalewayalew
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
Chapter -5- Augumented Reality (AR).pptx
Chapter -5- Augumented Reality (AR).pptxChapter -5- Augumented Reality (AR).pptx
Chapter -5- Augumented Reality (AR).pptxbalewayalew
 
PE1 Module 1.ppt
PE1 Module 1.pptPE1 Module 1.ppt
PE1 Module 1.pptbalewayalew
 
Ch 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptCh 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptbalewayalew
 

Plus de balewayalew (20)

slides.06.pptx
slides.06.pptxslides.06.pptx
slides.06.pptx
 
slides.07.pptx
slides.07.pptxslides.07.pptx
slides.07.pptx
 
slides.08.pptx
slides.08.pptxslides.08.pptx
slides.08.pptx
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.ppt
 
Data Analytics.ppt
Data Analytics.pptData Analytics.ppt
Data Analytics.ppt
 
PE1 Module 4.ppt
PE1 Module 4.pptPE1 Module 4.ppt
PE1 Module 4.ppt
 
PE1 Module 3.ppt
PE1 Module 3.pptPE1 Module 3.ppt
PE1 Module 3.ppt
 
PE1 Module 2.ppt
PE1 Module 2.pptPE1 Module 2.ppt
PE1 Module 2.ppt
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Chapter -5- Augumented Reality (AR).pptx
Chapter -5- Augumented Reality (AR).pptxChapter -5- Augumented Reality (AR).pptx
Chapter -5- Augumented Reality (AR).pptx
 
Chapter 8.ppt
Chapter 8.pptChapter 8.ppt
Chapter 8.ppt
 
PE1 Module 1.ppt
PE1 Module 1.pptPE1 Module 1.ppt
PE1 Module 1.ppt
 
chapter7.ppt
chapter7.pptchapter7.ppt
chapter7.ppt
 
chapter6.ppt
chapter6.pptchapter6.ppt
chapter6.ppt
 
chapter5.ppt
chapter5.pptchapter5.ppt
chapter5.ppt
 
chapter4.ppt
chapter4.pptchapter4.ppt
chapter4.ppt
 
chapter3.ppt
chapter3.pptchapter3.ppt
chapter3.ppt
 
chapter2.ppt
chapter2.pptchapter2.ppt
chapter2.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Ch 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.pptCh 1-Non-functional Requirements.ppt
Ch 1-Non-functional Requirements.ppt
 

Dernier

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Ch 6 - Requirement Management.pptx

  • 2.  Introduction  Stable and volatile requirements  Types of volatile requirements  Requirements change factors  Requirements identification & Storing  Requirements management activities  Change control  Version control  Requirements status tracking  Requirement tracing  Requirement Management planning Contents Next Class 2
  • 3.  RD – often a separate stage in the project  RM – activities conducted in parallel with design and implementation Introduction 3
  • 4.  Requirement management is hard problem because of continuous changes during development process  Signing off the requirements document by the customer means that a baseline of requirements agreement has been established.  It does not mean that requirements have been finalized.  The subtext of a signature on a requirements specification sign-off page should read something like (Wiegers, 2003):  “I agree that this document represents our best understanding of the requirements for this project today. I agree to make future changes in this baseline through the project’s defined change process. I realize that approved changes might require us to renegotiate cost, resource, and schedule commitments for this project.”  Freezing requirements is unwise and unrealistic, changes are fate Introduction… 4
  • 5.  Requirements management is the process of analyzing, tracing, prioritizing, agreeing and documenting requirements and then controlling change and communicating to relevant stakeholders.  It is a continuous process throughout a project.  The principal concerns in requirements management are  Managing the relationships between requirements  Managing priorities between requirements  Managing the dependencies between different documents  Requirements document  Architectural Specification  Managing changes to agreed requirements 5
  • 6.  Requirements changes occur  while the requirements are being elicited, analyzed and validated  after the system has gone into service  Requirements change is unavoidable & doesn’t imply poor requirements engineering practice.  Some requirements are usually more subject to change than others  Stable requirements: Are concerned with the essence of a system and its application domain  E.g. Student detail in student information system  Volatile requirements: Are specific to the instantiation of the system in a particular environment and for a particular customer  E.g. In a hospital, requirements derived from health-care policy Stable and volatile requirements 6
  • 7.  Mutable requirements  Requirements change due to changes to the environment in which the system is operating  Example  The requirements for a system which computes tax deductions evolve as tax laws are changed  In hospital system, the funding of patient care may change and thus require different treatment information to be collected.  Emergent requirements  Requirements which cannot be completely defined when the system is specified  Requirements emerge; as the system is designed & implemented and as users have contact with new system Types of volatile requirements 7
  • 8.  Consequential requirements  Requirements that result from the introduction of the computer system.  Introducing the computer system may change the organizations processes and open up new ways of working which generate new system requirements  May be based on wrong assumptions about how the system will be used and some may be wrong  Compatibility requirements  Requirements which depend on the particular systems or business process within an organization.  As these changes, the compatibility requirements on the commissioned or delivered system may also evolve. 8
  • 9.  Requirements for complex systems are continuously changing (during RE process and after a system has gone into service) because of  Requirements errors, conflicts and inconsistencies  As the system development proceeds, some errors and inconsistencies may be discovered that were not revealed earlier (in validation) and must be corrected.  Evolving customer/end-user knowledge of the system  Customers and end-users may develop a better understanding of what they really require from a system.  Technical, schedule or cost problems  Problems may be encountered in implementing a requirement. It may be too expensive or take too long to implement certain requirements. Requirements change factors Better RD processes may contribute to reducing the 9
  • 10.  Changing customer priorities  Customer priorities change during system development as a result of a changing business environment, the emergence of new competitors, staff changes, etc.  Environmental changes  The environment in which the system is to be installed may change so that the system requirements have to change to maintain compatibility.  Organizational changes  The organization which intends to use the system may change its structure and processes resulting in new system requirements.  New Technology  technology push RD processes cannot really 10
  • 11.  Requirements need unique identification  essential for requirements management  Requirement Identification Approaches 1. Chapter/section based identification  requirements are numbered based on chapter/section in the requirements document  Problems with this are:  Numbers cannot be unambiguously assigned until the document is complete  Assigning chapter/section numbers is an implicit classification of the requirement.  Relationships between requirements is due to their “neighborhood”  This is misleading  References are hard to handle Requirements identification 11
  • 12. 2. Dynamic renumbering  Some word processing systems allow for automatic renumbering (paragraphs, cross-references)  As you re-organize your document and add new requirements, the system keeps track of the cross reference and automatically renumbers your requirement depending on its chapter, section and position within the section 3. Symbolic identification  Requirements can be identified by giving them a symbolic name  E.g. EFF-1, EFF-2, EFF-3 are requirements which relate to system efficiency 4. Database record identification  Requirements are held as data in a database  Unique identifier per item are assigned Requirements identification techniques 12
  • 13.  Requirements have to be stored in such a way that they can be easily  Accessed  Changed  linked (with other requirements)  described (in text as well as in graphics…)  enhanced (by adding external information)  Possible Storage techniques are  In one or more word processor files  requirements are stored in the requirements document  In a specially designed requirements database  Database management software is used Storing requirements 13
  • 14.  Advantages  Easy to construct, maintain, cheap  Requirements may be accessed by anyone with the right word processor  Requirements can be described informally, unstructured…  It is easy to produce the final requirements document  Disadvantages  Requirements dependencies must be externally maintained  Search facilities are limited  Not possible to link requirements with proposed requirements changes  Not possible to have version control on individual requirements (only whole document)  No automated navigation from one requirement to another (Improvement: Hypertext documents) Storing requirements: Word processor documents 14
  • 15.  Each requirement is represented as one or more database entities  Database query language is used to access requirements  Advantages  Good query and navigation facilities  Support for change and version management  Versioning of single requirements  Disadvantages  Readers may not have the software/skills to access the requirements database  Higher costs Storing requirements: Requirements database 15
  • 17.  The statement of requirements ( text, graphics, photos and external linked storage or multimedia database)  The number of requirements  Teamwork, team distribution and computer support  Distributed team of requirements engineers ( Remote, multi-site access, Browser interface)  CASE tool use  The database should be the same as or compatible with CASE tool databases  Interfaces to CASE tools needed in later process steps  Existing database usage  If a database for software engineering support is already in use, this should be used for requirements management  Costs of training, supporting staff, etc. Requirements DB: Choice factors 17
  • 18.  Requirement management maintains the agreement between the stakeholders, in terms of the integrity and accuracy.  Involves:  Change control – managing changes to the requirements baseline, through reviewing proposed changes and evaluating the likely impact of each change before approving it, and incorporating approved changes into the project in a controlled way.  Version control – managing document versions and requirements revisions.  Requirements status tracking – defining a set of status values for a requirement, and monitoring statuses throughout the project.  Requirements tracing – managing dependency links between requirements, and tracing requirements up to their sources and down to corresponding design, source code, and test cases. Requirements management activities 18
  • 19.  Change control/management is concerned with procedures, processes and standards which are used to manage changes to system requirements  During the requirement development stage, changes to the requirements document can be made relatively freely.  After the document is approved  Changes are to be made only by designated people  Every change is to be documented  Changes are to be communicated to all the affected stakeholders and developers Change control 19
  • 20. 20 Contd….  Requirements changes may lead to overruns in project’s schedule, budget, negative impact on the product’s quality.  Therefore, there is need for change impact analysis, and decision making whether to approve a change request at all.  Change control is often seen as a barrier to change.  However, it is not a barrier, it is structuring of change.  A very common condition in software project is scope creep, when stakeholders continue to propose (request) some additional features.  If every such a proposition is approved, the project will never get finished
  • 21. Contd…  The most effective technique against the scope creep is ability to say “No”, or at least “Not now’”.  Generally,  change requests that are in fact ‘defect reports’ should all be satisfied,  change request which are just ‘extensions’ should all be taken with suspicion. 21
  • 22. Contd…  Change management policies (plan of action) may cover:  Change request process  The information required to process for each change request  The process used to analyze the impact and costs of change and the associated traceability information  Change Request Board (should be independent)  The software support (if any) for the change control process  Generally, the change management process has three main activities  Identifying requirements problem  caused by analysis of the requirements, new customer needs, or operational problems  requirements changes are proposed (specified) 22
  • 23.  Analyzing proposed changes  check how many requirements (and, if necessary, system components) are affected  time and money, to make the change.  Implementing changes  A set of modifications to the requirements document or a new document version  has to be validated (quality checking procedures)  Requirement change requests may be rejected: reasons for rejection  Change request is invalid: customer has misunderstood some requirements, proposed change isn’t necessary  Too many dependent requirements: consequential changes are unacceptable to the user  Costs are too high or take too long Contd… 23
  • 24.  Change isn’t free.  Even seemingly minor changes may unexpectedly require lot of work  In one project, a change in one of displayed error messages was requested. In English version of the system it required 1 minute of work. However, in Amharic version, the message exceeded the maximum allowed length, both in the message box and in the database. This requires lot of work.  Impact analysis:  Attempts to understand the possible implications of the change. E.g. whether a quality attribute will be negatively affected?  Identifies all the files, models and documents affected.  Identifies the tasks required to implement the change.  Estimates the effort needed to complete those tasks.  A change often produces a large ripple effect. Impact analysis 24
  • 26.  It is useful to monitor the requirements change dynamics throughout the project Monitoring changes dynamics 26
  • 27.  There must be a standard channel through which stakeholders can submit their change requests.  Examples are paper form, web form, designated email address.  Change request forms may include: fields to document the change analysis, data fields, responsibility fields, status field, comments field  All requests must go through this channel.  No design or implementation work should be done on requests that have not been yet approved.  There must be a Change Control Board (CCB), approving changes.  CCB is to have representatives of various stakeholders.  CCB should meet regularly, and also have some conditions defined that would trigger a special meeting. Change control process guidelines 27
  • 28.  Impact analysis is to be performed on each change request, before it is considered at a CCB meeting.  There should be a ‘fast path’ for low-risk low-cost changes (not waiting for a CCB meeting).  The contents of change database should be visible to all the stakeholders.  Each incorporated change must be traceable to an approved change request.  For changes, what, when, who and why must be documented.  Keep removed and changed requirements, sometimes ‘undo’ is to be made. Contd… 28
  • 29.  Requirements change is inevitable as customers develop a better understanding of their real needs and as the political, organizational and technical environment in which a system is to be installed changes.  Requirements which are concerned with the essence of a system are more likely to be stable than requirements which are more concerned with how the system is implemented in a particular environment.  Types of volatile requirement include mutable requirements, emergent requirements, consequential requirements and compatibility requirements. Key points 29
  • 30.  Requirements management requires that each requirement should be uniquely identified.  If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained.  Change management policies should define the processes used for change management and the information which should be associated with each change request.  They should also define who is responsible for doing what in the change management process. Key points… 30
  • 31.  …. Key Points: Change request’s lifecycle 31