1 Requirements Analysis and Design Engineering Southern Methodist University CSE 7313.

Slides:



Advertisements
Similar presentations
The Capital Market, The Legal Practitioner And The Investor: A Career As A Capital Market Solicitor By: Anthony I. Idigbe San.
Advertisements

Chapter 1 Business Driven Technology
User Interface Design Main issues: What is the user interface How to design a user interface.
Management and Leadership
Software Requirements
Introduction to Software Engineering Dr. Basem Alkazemi
Software Requirements The Volere Requirements Source: “Mastering the Requirements Process”, S. Robertson, J. Robertson Created by Eshcar Hilel.
Generic Simulator for Users' Movements and Behavior in Collaborative Systems.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Accounting Information Systems: An Overview
Chistyakova Nataly O.. Project stakeholders The client is the principal party interested in the carrying out of a project and in its successful outcome.
Chapter 7 Database Auditing Models
Accounting Information Systems: An Overview
Internal Auditing and Outsourcing
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
CMSC 345 The Requirements Specification. Why do we need requirements Without the correct requirements, you cannot design or build the correct product,
Requirements Engineering
Software Project Management Fifth Edition
Edition Vitale and Giglierano Chapter 3 Organizational Buying and Buyer Behavior Prepared by John T. Drea, Western Illinois University.
Topics Covered: Software requirement specification(SRS) Software requirement specification(SRS) Authors of SRS Authors of SRS Need of SRS Need of SRS.
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Jeanette Bordelon, PMP, MBA Bordelon Consulting, Inc.
IT Requirements Management Balancing Needs and Expectations.
Software Requirements Engineering: What, Why, Who, When, and How
2  Mission Statement.  Company’s overall purpose and direction, products, services and values.  Goals.  That accomplish the mission. E.g. 5 year plan.
User Interface Design Main issues: What is the user interface How to design a user interface ©2008 John Wiley & Sons Ltd.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Lecture 7: Requirements Engineering
University of Palestine software engineering department Testing of Software Systems Testing throughout the software life cycle instructor: Tasneem.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Systems Analysis and Design 8 th Edition Chapter 2 Analyzing the Business Case.
Rational Requirements Management with Use Cases v5.5 Copyright © Rational Software, all rights reserved 1 Requirements Management with Use Cases.
Managing the Application Development. How system project Begun Information system applications originate from virtually all areas of firm and relate to.
Software Requirements and Design Khalid Ishaq
CS551 - Lecture 5 1 CS551 Lecture 5: Quality Attributes Yugi Lee FH #555 (816)
Problem Solving – 4 Stages
LESSON 3. Properties of Well-Engineered Software The attributes or properties of a software product are characteristics displayed by the product once.
Software Engineering 1 Object-oriented Analysis and Design Applying UML and Patterns An Introduction to Object-oriented Analysis and Design and Iterative.
CS212: Object Oriented Analysis and Design Lecture 32: Use case and Class diagrams.
INTERNAL CONTROLS What are they? Why should I care?
This information is confidential and was prepared by Bain & Company solely for the use of our client; it is not to be relied on by any 3rd party without.
Cooperation & Interoperability Architecture & Ontology.
Professional Ethics and Responsibilities
Requirements Management with Use Cases Module 2: Introduction to RMUC Requirements Management with Use Cases Module 2: Introduction to RMUC.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 13 Usability 1.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
上海金融学院 1-1 Lecture 3 Investment Banking Basics: The Financial Statements.
Quiz 1 Q1) Discuss briefly the main phases of the requirement process. Q2)Discuss briefly the main outcome of the Trawling for Requirements phase.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Non Functional Testing. Contents Introduction – Security Testing Why Security Test ? Security Testing Basic Concepts Security requirements - Top 5 Non-Functional.
 System Requirement Specification and System Planning.
Software Requirements Engineering Session: 1 Topics: Chapters 1 – 3.
Writing the Requirements


Classifications of Software Requirements
Non Functional Requirements (NFRs)
Requirements Analysis Scenes
CHAPTER ‘3’ Project Blastoff
in Construction Industry
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Lecture # 7 System Requirements
Presentation transcript:

1 Requirements Analysis and Design Engineering Southern Methodist University CSE 7313

2 Categorizing requirements into useful types  Functional; things the product must do  Non-functional; properties or qualities that the product must have  Constraints; global requirements  Defined before beginning the work gathering the requirements  Users are a constraint!  Product must run on a Unix machine  Project Issues

3 Non-functional requirements  Look and feel requirements  Usability requirements  Performance requirements  Operational requirements  Maintainability and portability requirements  Security requirements  Cultural and political requirements  Legal requirements

4 Look and feel  Highly readable  Apparently simple to use  Approachable so people will use it  Authoritative so users will trust it  Conforming to the clients other products  Colorful and attractive to children  Unobtrusive so people are not aware of it  Innovative and appearing state of the art  Professional and executive looking

5 Usability requirements  Rate of acceptance by users  Productivity gained from the product  Errors rates (or reduction thereof)  Being used by people who do not speak the language where product is used  Accessibility to handicapped people  Being used by people with no prior experience with computers

6 Performance requriements  Speed to complete a task  Accuracy of the results  Safety to the operator  Volumes to be held by the product  Ranges of allowable values  Throughput (rate of transactions)  Efficiency of resource usage  Reliability (MTBF)

7 Operational requirements  Operating environment  Condition of the users (dark, hurry, etc)  Partner or collaborating systems  Portable products

8 Maintainability requirements  Organization  Environment  Laws that apply to the product  Business rules

9 Security requirements  Confidentiality  Data stored by product is protected  Availability  Accessible to authorized users  Integrity  Products data are the same as the source or authority of the data

10 Constraints  Purpose of the product  Client, customer, other stakeholders  Users of the product  Requirements constraints  Naming conventions and definitions  Relevant facts  Assumptions

11 Project issues  Open issues  Off the shelf solutions (COTS)  New problems  Tasks  Cutover  Risks  Costs  User documentation  Waiting room

12 Risk management

13 Risks that can do damage  Inaccurate metrics  Inadequate measurement  Excessive schedule pressure  Management malpractice  Inaccurate cost estimates  Silver bullet syndrome  Creeping user requriements  Low quality

14 Risks to the requirements process  Absence of a clear and measurable purpose for the project  Lack of client involvement  Lack of stakeholder involvement  Little or no agreement on requirements  Requirements creep  Gold plating  No measurements put on requirements (customer satisfaction/dissatisfaction)

15 Risks to the requirements process  Rapidly changing requirements  Inadequate change control  New or unknown business area with certain needs

16 The role of adjacent systems

17 Types of adjacent systems  Active adjacent systems  Autonomous adjacent systems  Cooperative adjacent systems

18 Active adjacent systems  These systems behave dynamically  Interact or participate in the work  Usually humans  Initiate events with some objective in mind  Interact with the product by exchanging data and other signals  Bank customer interacting with a bank

19 Active adjacent systems  You can predict its behavior within reason  You can expect it to respond to signals from your work  Will comply if perceived benefit  Will respond in a suitably short period of time  Is actually part of the work

20 Autonomous adjacent systems  Some external body that does not directly interact with the system  Government department  Acts independently of the work being studied but has connections to it  Communicate through one day data flows  Credit card company sending you a monthly statement – you act as autonomous adjacent system  You act as a sink of information (act when ready)

21 Autonomous adjacent systems  Autonomous adjacent systems use one way communication because of technology or preference  These systems do not involve themselves in the response to the business events that it triggers  Make sure that an autonomous adjacent system should not really be an active adjacent system

22 Cooperative adjacent systems  Cooperative adjacent systems can be relied on to behave predictably when called upon  Cooperate with the product to bring about some desired outcome  Usually done by means of some simple request-response dialog  Another product containing a DB used by your work  An OS

23 Cooperative adjacent systems  We can access a cooperative adjacent system, store data in it, request information from it  Behavior is consistent and predictable  Can consider a cooperative adjacent system to be part of the response to the business event (part of the use case)  Processing of the use case does not stop when it reaches the adjacent system (even though it is not part of the product)

24 Role of adjacent systems  The part played by the adjacent system is dependent on its capabilities and willingness to participate  Must understand/study the following;  Ability to respond in a timely manner  Willingness to respond  Technological compatibility with the work (effectiveness depends on effective comm link that does not require slow transactions)

25 Role of adjacent systems  Policy with regard to responding  Proximity to the work (affects the medium of communication and the time taken)  Ownership (different ownership may be less inclined to participate)  Interests (is it in the interest to participate or not)