SlideShare a Scribd company logo
1 of 31
CIB 3103
Object Oriented Analysis and Design
Requirements Determination
Learning Objectives
• Learn how to create a requirements definition
• Learn various requirements analysis techniques
• Learn when to use each requirements analysis techniques
• Learn how to gather requirements using interviews, JAD
sessions, questionnaires, document analysis & observation
• Learn various requirements documentation techniques such
as concept maps, story cards & task-lists
• Understand when to use each requirements-gathering
technique
• Be able to begin the creation of a system proposal
Introduction
The systems development process transforms the existing
(as is) system into the proposed (to be) system
Requirements determination
The single most critical step of the entire SDLC
Changes can be made easily in this stage
Most (>50%) system failures are due to problems with
requirements
The iterative process of OOSAD is effective because:
Small batches of requirements can be identified and
implemented incrementally
The system will evolve over time
Requirements Determination
Purpose: to convert high level business requirements
(from the system request) into detailed requirements that
can be used as inputs for creating models
What is a requirement?
A statement of what the system must do or a characteristic
it must have
Will later evolve into a technical description of how the
system will be implemented
Types:
Functional: relates to a process or data
Non-functional: relates to performance or usability
Nonfunctional Requirements
Requirements Definition
Functional & non-functional requirements listed in outline
format
May be prioritized
Provides information needed in subsequent workflows
Defines the scope of the system
Determining Requirements
Business & IT personnel need to collaborate
Strategies for effective results:
Business Process Analysis (BPA)
Business Process Improvement (BPI)
Business Process Reengineering (BPR)
Determining Requirements
Requirements are best determined by systems analysts
and business people together
Strategies for analyzing the requirements
 Business Process Analysis (BPA)
 Business Process Improvement (BPI)
 Business Process Reengineering (BPR)
Techniques for identifying requirements
Interviews, questionnaires and/or observation
Joint application development (JAD)
Document analysis
Creating a
Requirements Definition
Determine the types of functional and non-functional
requirements applicable to the project
Use requirements-gathering techniques to collect details
Analysts work with users to verify, change and prioritize
each requirement
Continue this process through analysis workflow, but be
careful of scope creep
Requirements that meet a need but are not within the
current scope can be added to a list of future
enhancements
Problems in
Requirements Determination
Analyst may not have access to the correct users
Requirements specifications may be inadequate
Some requirements may not be known in the beginning
Verifying and validating requirements can be difficult
Requirements Analysis
Strategies
Business Process Automation (BPA)
Least amount of change to the current system
Use computer technology to automate some portions
Business Process Improvement (BPI)
Moderate amount of change is required
Designed to improve efficiency of the current system
Business Process Reengineering (BPR)
Most amount of change—a complete makeover
Focus is on the to-be system—little time spent on the current
system
Business Process Automation
Techniques
Problem analysis
Ask users to identify problems with the current system
Ask users how they would solve these problems
Good for improving efficiency or ease-of-use
Root cause analysis
Focus is on the cause of a problem, not its solution
Create a prioritized list of problems
Try to determine their causes
Once the causes are known, solutions can be developed
Business Process Improvement
Techniques:
Duration analysis
Determine the time required to complete each step in a
business process
Compare this to the total time required for the entire process
Large differences suggest problems that might be solved by:
 Integrating some steps together
 Performing some steps simultaneously (in parallel)
Activity-based costing—same as duration analysis but
applied to costs
Informal benchmarking—analyzes similar processes in other
successful organizations
Business Process Reengineering
Institutes maximum change: “Out with the old and in
with the new”
Techniques:
Outcome analysis—what does the customer want in the
end?
Technology analysis—apply new technologies to business
processes & identify benefits
Activity elimination—eliminate each activity in a business
process in a “force-fit” exercise
Selecting An
Appropriate Strategy
Fact Finding Techniques
Process is used to:
Uncover all requirements (those uncovered late in the
process are more difficult to incorporate)
Build support and trust among users
Which technique(s) to use?
Interviews
Joint Application Development (JAD)
Questionnaires
Document analysis
Observation
Interviews
Most popular technique—if you need to know
something, just ask
Process:
Select people to interview & create a schedule
Design interview questions (Open-ended, closed-ended, &
probing types of questions)
Prepare for the interview (Unstructured vs. structured
interview organized in a logical order)
Conduct the interview (Top-down vs. bottom-up)
Follow-up after the interview
Question Types
Interviewing Strategies
How
can order
processing be
improved?
How can we reduce the
number of times that customers
return ordered items?
How can we reduce the number of
errors in order processing (e.g., shipping
the wrong products)?
Top-down
Bottom-up
High-level:
Very general
Medium-level:
Moderately specific
Low-level:
Very specific
Post-Interview
Prepare notes and send to the interviewee for verification
Joint Application Development
(JAD)
Joint user-analyst meeting hosted by a facilitator
10 to 20 users
1 to 2 scribes as needed to record the session
Usually in a specially prepared room
Meetings can be held electronically and anonymously
Reduces problems in group settings
Can be held remotely
Sessions require careful planning to be successful
Users may need to bring documents or user manuals
Ground rules should be established
Questionnaires
A set of written questions used to obtain information
from individuals
May be paper based or electronic (e.g., web based)
Common uses:
Large numbers of people
Need both information and opinions
When designing for use outside the organization (customers,
vendors, etc.)
Typical response rates: < 50% (paper); < 30% (Web)
Questionnaire Steps
Select the participants
 Identify the population
 Use representative samples for large populations
Designing the questionnaire
 Careful question selection
 Remove ambiguities
Administering the questionnaire
 Working to get good response rate
 Offer an incentive (e.g., a free pen)
Questionnaire follow-up
 Send results to participants
 Send a thank-you
Good Questionnaire Design
Begin with non-threatening and interesting
questions
Group items into logically coherent sections
No important items at the very end
Do not crowd a page with too many items
Avoid abbreviations
Avoid biased or suggestive items or terms
Number questions to avoid confusion
Pretest to identify confusing questions
Provide anonymity to respondents
Document Analysis
Provides information about the “as-is” system
Review technical documents when available
Review typical user documents:
Forms
Reports
Policy manuals
Look for user additions to forms
Look for unused form elements
Observation
Users/managers often don’t remember everything they
do
Checks validity of information gathered in other ways
Behaviors may change when people are watched
Workers tend to be very careful when watched
Keep a low profile
Try not to interrupt or influence workers
Be careful not to ignore periodic activities
Weekly … Monthly … Annually
Fact Finding Techniques
Compared
A combination of techniques may be used
Document analysis & observation require little training;
JAD sessions can be very challenging
Alternative Techniques
Concept Maps
Represent meaningful relationships between concepts
Focus individuals on a small number of key ideas
Story Cards & Task Lists
Associated with agile development methods
File cards with a single requirement
Each requirement is discussed
How much effort is required to implement it
A task list is created for each requirement (story)
Large requirements can be split into smaller sections
The System Proposal
Combines all material created in planning & analysis
Included sections:
Executive summary
Provides all critical information is summary form
Helps busy executives determine which sections they need to
read in more detail
The system request
The workplan
The feasibility analysis
The requirements definition
Current models of the system (expected to evolve)
System Proposal Template
Summary
Presented in this chapter:
Discussion of functional and non-functional requirements
determination
Requirements analysis strategies
Requirements gathering techniques
Alternative requirements documentation techniques
The system proposal

More Related Content

What's hot

BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)AMJAD SHAIKH
 
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)AMJAD SHAIKH
 
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...Eugene O'Loughlin
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business RequirementsHeinz Tonn
 
Babokv2.0 English
Babokv2.0 EnglishBabokv2.0 English
Babokv2.0 EnglishMarinne1986
 
Chapter07 determining system requirements
Chapter07 determining system requirementsChapter07 determining system requirements
Chapter07 determining system requirementsDhani Ahmad
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpmdutconsult
 
Business Analysis in A Nutshell
Business Analysis in A Nutshell  Business Analysis in A Nutshell
Business Analysis in A Nutshell Goran Mutalib
 
requirement gathering for EMR customization
requirement gathering for EMR customizationrequirement gathering for EMR customization
requirement gathering for EMR customizationZEESHAN ASIF
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirementsz-999
 
Information gathering interactive methods
Information gathering interactive methodsInformation gathering interactive methods
Information gathering interactive methodsKiran Ajudiya
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528moris lee
 
Business Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo VideoBusiness Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo VideoRajeshGOT
 
Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirementshapy
 

What's hot (18)

BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)
 
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
 
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business Requirements
 
Babokv2.0 English
Babokv2.0 EnglishBabokv2.0 English
Babokv2.0 English
 
Chapter07 determining system requirements
Chapter07 determining system requirementsChapter07 determining system requirements
Chapter07 determining system requirements
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpm
 
Business Analysis in A Nutshell
Business Analysis in A Nutshell  Business Analysis in A Nutshell
Business Analysis in A Nutshell
 
requirement gathering for EMR customization
requirement gathering for EMR customizationrequirement gathering for EMR customization
requirement gathering for EMR customization
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information gathering interactive methods
Information gathering interactive methodsInformation gathering interactive methods
Information gathering interactive methods
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Business Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo VideoBusiness Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo Video
 
Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
 
4
44
4
 
W3 requirements engineering processes
W3   requirements engineering processesW3   requirements engineering processes
W3 requirements engineering processes
 

Viewers also liked (20)

أدارة الوقت
أدارة الوقتأدارة الوقت
أدارة الوقت
 
Tabel 2
Tabel 2Tabel 2
Tabel 2
 
Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8
 
Harbor UCLA Neuro-Radiology Case #9
Harbor UCLA Neuro-Radiology Case #9Harbor UCLA Neuro-Radiology Case #9
Harbor UCLA Neuro-Radiology Case #9
 
F 20
F 20F 20
F 20
 
Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10
 
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
 
Theory Of Wing Sections
Theory  Of  Wing  SectionsTheory  Of  Wing  Sections
Theory Of Wing Sections
 
Juniper marketing
Juniper marketingJuniper marketing
Juniper marketing
 
Detection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in theDetection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in the
 
David
DavidDavid
David
 
Calendario Land 2013
Calendario Land 2013Calendario Land 2013
Calendario Land 2013
 
Carnet deportivo
Carnet deportivoCarnet deportivo
Carnet deportivo
 
Partesdemicuerpo2
Partesdemicuerpo2Partesdemicuerpo2
Partesdemicuerpo2
 
Listening
ListeningListening
Listening
 
Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0
 
Questions 1 27
Questions 1 27Questions 1 27
Questions 1 27
 
A comparison of historical vs current instructional design
A comparison of historical vs current instructional designA comparison of historical vs current instructional design
A comparison of historical vs current instructional design
 
The colours
The coloursThe colours
The colours
 
La Castanyera
La CastanyeraLa Castanyera
La Castanyera
 

Similar to CIB 3103: Requirements Capture

RequirementsDetermination.pptx
RequirementsDetermination.pptxRequirementsDetermination.pptx
RequirementsDetermination.pptxabcxyz637771
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysisMena M. Eissa
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babuHem Rana
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.pptSoham De
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineeringIan Sommerville
 
Course 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptxCourse 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptxSyifaNurgaidaYutia
 
Section b
Section bSection b
Section bPCTE
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptMarissaPedragosa
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2Best Rahim
 
Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25koolkampus
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development HelpWithAssignment.com
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process ImprovementIan Sommerville
 

Similar to CIB 3103: Requirements Capture (20)

RequirementsDetermination.pptx
RequirementsDetermination.pptxRequirementsDetermination.pptx
RequirementsDetermination.pptx
 
Ch04
Ch04Ch04
Ch04
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
Course 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptxCourse 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptx
 
Section b
Section bSection b
Section b
 
Sad Lec3
Sad Lec3Sad Lec3
Sad Lec3
 
Chap2 RE processes
Chap2 RE processesChap2 RE processes
Chap2 RE processes
 
SDLC_Intro.ppt
SDLC_Intro.pptSDLC_Intro.ppt
SDLC_Intro.ppt
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Determining Information Needs.
Determining Information Needs.Determining Information Needs.
Determining Information Needs.
 
BIS2311Topic1
BIS2311Topic1BIS2311Topic1
BIS2311Topic1
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
 
Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process Improvement
 

More from Ahmad Ammari

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingAhmad Ammari
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3Ahmad Ammari
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2Ahmad Ammari
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initializationAhmad Ammari
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is developmentAhmad Ammari
 
CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1Ahmad Ammari
 
CIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and DesignCIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and DesignAhmad Ammari
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social mediaAhmad Ammari
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computingAhmad Ammari
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lecAhmad Ammari
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructureAhmad Ammari
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelAhmad Ammari
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategyAhmad Ammari
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_verAhmad Ammari
 

More from Ahmad Ammari (15)

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process Modeling
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initialization
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is development
 
CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1
 
CIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and DesignCIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and Design
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social media
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computing
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lec
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructure
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_model
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategy
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_ver
 
Itec410 lec2
Itec410 lec2Itec410 lec2
Itec410 lec2
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

CIB 3103: Requirements Capture

  • 1. CIB 3103 Object Oriented Analysis and Design Requirements Determination
  • 2. Learning Objectives • Learn how to create a requirements definition • Learn various requirements analysis techniques • Learn when to use each requirements analysis techniques • Learn how to gather requirements using interviews, JAD sessions, questionnaires, document analysis & observation • Learn various requirements documentation techniques such as concept maps, story cards & task-lists • Understand when to use each requirements-gathering technique • Be able to begin the creation of a system proposal
  • 3. Introduction The systems development process transforms the existing (as is) system into the proposed (to be) system Requirements determination The single most critical step of the entire SDLC Changes can be made easily in this stage Most (>50%) system failures are due to problems with requirements The iterative process of OOSAD is effective because: Small batches of requirements can be identified and implemented incrementally The system will evolve over time
  • 4. Requirements Determination Purpose: to convert high level business requirements (from the system request) into detailed requirements that can be used as inputs for creating models What is a requirement? A statement of what the system must do or a characteristic it must have Will later evolve into a technical description of how the system will be implemented Types: Functional: relates to a process or data Non-functional: relates to performance or usability
  • 6. Requirements Definition Functional & non-functional requirements listed in outline format May be prioritized Provides information needed in subsequent workflows Defines the scope of the system
  • 7. Determining Requirements Business & IT personnel need to collaborate Strategies for effective results: Business Process Analysis (BPA) Business Process Improvement (BPI) Business Process Reengineering (BPR)
  • 8. Determining Requirements Requirements are best determined by systems analysts and business people together Strategies for analyzing the requirements  Business Process Analysis (BPA)  Business Process Improvement (BPI)  Business Process Reengineering (BPR) Techniques for identifying requirements Interviews, questionnaires and/or observation Joint application development (JAD) Document analysis
  • 9. Creating a Requirements Definition Determine the types of functional and non-functional requirements applicable to the project Use requirements-gathering techniques to collect details Analysts work with users to verify, change and prioritize each requirement Continue this process through analysis workflow, but be careful of scope creep Requirements that meet a need but are not within the current scope can be added to a list of future enhancements
  • 10. Problems in Requirements Determination Analyst may not have access to the correct users Requirements specifications may be inadequate Some requirements may not be known in the beginning Verifying and validating requirements can be difficult
  • 11. Requirements Analysis Strategies Business Process Automation (BPA) Least amount of change to the current system Use computer technology to automate some portions Business Process Improvement (BPI) Moderate amount of change is required Designed to improve efficiency of the current system Business Process Reengineering (BPR) Most amount of change—a complete makeover Focus is on the to-be system—little time spent on the current system
  • 12. Business Process Automation Techniques Problem analysis Ask users to identify problems with the current system Ask users how they would solve these problems Good for improving efficiency or ease-of-use Root cause analysis Focus is on the cause of a problem, not its solution Create a prioritized list of problems Try to determine their causes Once the causes are known, solutions can be developed
  • 13. Business Process Improvement Techniques: Duration analysis Determine the time required to complete each step in a business process Compare this to the total time required for the entire process Large differences suggest problems that might be solved by:  Integrating some steps together  Performing some steps simultaneously (in parallel) Activity-based costing—same as duration analysis but applied to costs Informal benchmarking—analyzes similar processes in other successful organizations
  • 14. Business Process Reengineering Institutes maximum change: “Out with the old and in with the new” Techniques: Outcome analysis—what does the customer want in the end? Technology analysis—apply new technologies to business processes & identify benefits Activity elimination—eliminate each activity in a business process in a “force-fit” exercise
  • 16. Fact Finding Techniques Process is used to: Uncover all requirements (those uncovered late in the process are more difficult to incorporate) Build support and trust among users Which technique(s) to use? Interviews Joint Application Development (JAD) Questionnaires Document analysis Observation
  • 17. Interviews Most popular technique—if you need to know something, just ask Process: Select people to interview & create a schedule Design interview questions (Open-ended, closed-ended, & probing types of questions) Prepare for the interview (Unstructured vs. structured interview organized in a logical order) Conduct the interview (Top-down vs. bottom-up) Follow-up after the interview
  • 19. Interviewing Strategies How can order processing be improved? How can we reduce the number of times that customers return ordered items? How can we reduce the number of errors in order processing (e.g., shipping the wrong products)? Top-down Bottom-up High-level: Very general Medium-level: Moderately specific Low-level: Very specific
  • 20. Post-Interview Prepare notes and send to the interviewee for verification
  • 21. Joint Application Development (JAD) Joint user-analyst meeting hosted by a facilitator 10 to 20 users 1 to 2 scribes as needed to record the session Usually in a specially prepared room Meetings can be held electronically and anonymously Reduces problems in group settings Can be held remotely Sessions require careful planning to be successful Users may need to bring documents or user manuals Ground rules should be established
  • 22. Questionnaires A set of written questions used to obtain information from individuals May be paper based or electronic (e.g., web based) Common uses: Large numbers of people Need both information and opinions When designing for use outside the organization (customers, vendors, etc.) Typical response rates: < 50% (paper); < 30% (Web)
  • 23. Questionnaire Steps Select the participants  Identify the population  Use representative samples for large populations Designing the questionnaire  Careful question selection  Remove ambiguities Administering the questionnaire  Working to get good response rate  Offer an incentive (e.g., a free pen) Questionnaire follow-up  Send results to participants  Send a thank-you
  • 24. Good Questionnaire Design Begin with non-threatening and interesting questions Group items into logically coherent sections No important items at the very end Do not crowd a page with too many items Avoid abbreviations Avoid biased or suggestive items or terms Number questions to avoid confusion Pretest to identify confusing questions Provide anonymity to respondents
  • 25. Document Analysis Provides information about the “as-is” system Review technical documents when available Review typical user documents: Forms Reports Policy manuals Look for user additions to forms Look for unused form elements
  • 26. Observation Users/managers often don’t remember everything they do Checks validity of information gathered in other ways Behaviors may change when people are watched Workers tend to be very careful when watched Keep a low profile Try not to interrupt or influence workers Be careful not to ignore periodic activities Weekly … Monthly … Annually
  • 27. Fact Finding Techniques Compared A combination of techniques may be used Document analysis & observation require little training; JAD sessions can be very challenging
  • 28. Alternative Techniques Concept Maps Represent meaningful relationships between concepts Focus individuals on a small number of key ideas Story Cards & Task Lists Associated with agile development methods File cards with a single requirement Each requirement is discussed How much effort is required to implement it A task list is created for each requirement (story) Large requirements can be split into smaller sections
  • 29. The System Proposal Combines all material created in planning & analysis Included sections: Executive summary Provides all critical information is summary form Helps busy executives determine which sections they need to read in more detail The system request The workplan The feasibility analysis The requirements definition Current models of the system (expected to evolve)
  • 31. Summary Presented in this chapter: Discussion of functional and non-functional requirements determination Requirements analysis strategies Requirements gathering techniques Alternative requirements documentation techniques The system proposal