SlideShare a Scribd company logo
1 of 18
Page 1Classification: Restricted
Business Analysis
Training
Requirement Engineering
Page 2Classification: Restricted
Agenda
• Requirement Engineering
• Elaboration and Management
• Negotiating
• Validation
• Verification
• Validation and Verification
• Requirement Engineering at a Glance
Page 3Classification: Restricted
Requirement Engineering
• Provides appropriate mechanism for understanding:
• Inception -what the customer wants
• Elicitation - Analyzing needs
• Elaboration - Assessing feasibility
• Negotiating a reasonable solution
• Specifying the solution
• Validating the specification
• Managing the requirements
Page 4Classification: Restricted
• Information from Elicitation and Inception is further expanded and refined
during elaboration
• Composed of number of modeling and refinement tasks
• Creation of Use cases and User scenarios
• Root Cause Analysis
Elaboration and Management
Page 5Classification: Restricted
• Identifying the real need of building the Software
• Using Prioritization techniques requirements are further analyzed
• Risk against each is calculated
• Efforts estimation OR guesstimate
• Requirements are then combined/eliminated.
Negotiating
Page 6Classification: Restricted
• Prioritization
• Ranking
• Grouping
• MOSCOW
• Bubble Sort
• Hundred Dollar
• Analytical
• 5 Whys
Negotiating
Page 7Classification: Restricted
• Prioritization: Ranking
• Rank requirements on an ordinal scale
• Assigning a different numerical value against
each requirement based on importance
• Limitation:
• Works best with 1 stakeholder as it is difficult
to align different stakeholder’s perspectives.
Negotiating
Page 8Classification: Restricted
• Prioritization : Grouping
• Grouping requirements as per different
priority groups.
• Groups should be Clearly defines to
avoid ambiguities.
• To prevent stakeholders from putting
all requirements in one category, the
percentage in each group should be
restricted
• Limitation:
• Each group has the same priority
Negotiating
Page 9Classification: Restricted
• Prioritization : MOSCOW
• MUST (Mandatory)
• SHOULD (Of high priority)
• COULD (Preferred but not necessary)
• WOULD (Can be postponed and
suggested for future execution)
Negotiating
Page 10Classification: Restricted
• Prioritization : Bubble Sort
• Take 2 requirements and compare
• One with higher priority, Swap
• Continue in this fashion till all the
requirements are
Negotiating
Page 11Classification: Restricted
Prioritization : Hundred Dollar Method
• Same as Priority points
• Stakeholders are provided with
some number of priority points
• List of requirements are provided
to each
• Each stakeholder indicates the
relative importance of each
spending one or more priority
points
• Points cannot be reused
• Overall points spent on each
requirement by all stakeholders
decides which one to take up and
which one to be discarded
Negotiating
Page 12Classification: Restricted
Prioritization: 5 Why’s?
With five whys, the analyst asks the
stakeholder repeatedly (five times or less)
why the requirement is necessary until the
importance of the requirements is
established
Negotiating
Page 13Classification: Restricted
Negotiating
• Art of Negotiation
• Recognize its not a competition
• Map out a strategy
• Listed effectively
• Focus on other party’s interest
• Don’t let it go personal
• Be creative
• Be ready to commit
• ‘Best Negotiation strive for a Win-Win Result’
Page 14Classification: Restricted
Validation
• Validation is the process of confirming the completeness and correctness
of requirements.
• Correct – accurately states a customer or external need
• Clear – has only one possible meaning
• Feasible – can be implemented within known constraints
• Modifiable – can be easily changed, with history, when necessary
• Necessary – documents something customers really need
• Prioritized – ranked as to importance of inclusion in product
• Traceable – can be linked to system requirements, and to designs, code,
and tests
• Verifiable – correct implementation can be determined by testing,
inspection, analysis, or demonstration
Page 15Classification: Restricted
Verification
• Verification is the process of confirming that the designed and built
product fully addresses documented
• Validation – “Am I building the right product?” Checking a work product
against higher-level work products or authorities that frame this particular
product.
• Requirements are validated by stakeholders.
• Verification – “Am I building the product right?” Checking a work product
against some standards and conditions imposed on this type of product
and the process of its development.
• Requirements are verified by the analysts mainly.
Page 16Classification: Restricted
Validation :
Correct
Feasible
Necessary
Prioritized
Unambiguous
Verification :
Concise
Traceable
Non redundant
Organized
Conformant to standards
Validation and Verification
Page 17Classification: Restricted
Requirement Engineering at a Glance
Page 18Classification: Restricted
Thank you

More Related Content

What's hot

Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation Lakshmi-BA
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in TestingLakshmi-BA
 
Requirements Management
Requirements ManagementRequirements Management
Requirements ManagementLakshmi-BA
 
Roles and Responsibilities of a BA
Roles and Responsibilities of a BARoles and Responsibilities of a BA
Roles and Responsibilities of a BASwatiS-BA
 
Kanban and Scrum - Agile Delivery
Kanban and Scrum - Agile DeliveryKanban and Scrum - Agile Delivery
Kanban and Scrum - Agile DeliveryAMJAD SHAIKH
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review ProcessManageware
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise AnalysisSunil-QA
 
Product Management in Operations Environment
Product Management in Operations EnvironmentProduct Management in Operations Environment
Product Management in Operations EnvironmentAMJAD SHAIKH
 
Requirement change management
Requirement change managementRequirement change management
Requirement change managementAbdul Basit
 
Software maintenance real world maintenance cost
Software maintenance real world maintenance costSoftware maintenance real world maintenance cost
Software maintenance real world maintenance costmalathieswaran29
 
Importance of requirement assurance in product selection
Importance of requirement assurance in product selectionImportance of requirement assurance in product selection
Importance of requirement assurance in product selectionMaveric Systems
 
Design for Six Sigma Primer
Design for Six Sigma PrimerDesign for Six Sigma Primer
Design for Six Sigma PrimerMike Henderson
 
Scrum_Process_View
Scrum_Process_ViewScrum_Process_View
Scrum_Process_ViewAMJAD SHAIKH
 

What's hot (20)

Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
 
SDLC
SDLCSDLC
SDLC
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Roles and Responsibilities of a BA
Roles and Responsibilities of a BARoles and Responsibilities of a BA
Roles and Responsibilities of a BA
 
JIRA
JIRAJIRA
JIRA
 
Kanban and Scrum - Agile Delivery
Kanban and Scrum - Agile DeliveryKanban and Scrum - Agile Delivery
Kanban and Scrum - Agile Delivery
 
Requirements Review Process
Requirements Review ProcessRequirements Review Process
Requirements Review Process
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
Product Management in Operations Environment
Product Management in Operations EnvironmentProduct Management in Operations Environment
Product Management in Operations Environment
 
SOFTWARE MAINTENANCE- 5
SOFTWARE MAINTENANCE- 5SOFTWARE MAINTENANCE- 5
SOFTWARE MAINTENANCE- 5
 
SOFTWARE MAINTENANCE -3
SOFTWARE MAINTENANCE -3SOFTWARE MAINTENANCE -3
SOFTWARE MAINTENANCE -3
 
Requirement change management
Requirement change managementRequirement change management
Requirement change management
 
Software maintenance real world maintenance cost
Software maintenance real world maintenance costSoftware maintenance real world maintenance cost
Software maintenance real world maintenance cost
 
SOFTWARE MAINTENANCE -4
SOFTWARE MAINTENANCE -4SOFTWARE MAINTENANCE -4
SOFTWARE MAINTENANCE -4
 
SOFTWARE MAINTENANCE -2
SOFTWARE MAINTENANCE -2SOFTWARE MAINTENANCE -2
SOFTWARE MAINTENANCE -2
 
Requirements management
Requirements managementRequirements management
Requirements management
 
Importance of requirement assurance in product selection
Importance of requirement assurance in product selectionImportance of requirement assurance in product selection
Importance of requirement assurance in product selection
 
Design for Six Sigma Primer
Design for Six Sigma PrimerDesign for Six Sigma Primer
Design for Six Sigma Primer
 
Scrum_Process_View
Scrum_Process_ViewScrum_Process_View
Scrum_Process_View
 

Similar to Requirement Engineering

Requirements Management
Requirements ManagementRequirements Management
Requirements ManagementShwetha-BA
 
Session 04 - Project Planning
Session 04 - Project PlanningSession 04 - Project Planning
Session 04 - Project PlanningRakeshSinhaPMP
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques Requirement Elicitation Techniques
Requirement Elicitation Techniques Shwetha-BA
 
BABOK Study Group - meeting 1
BABOK Study Group - meeting 1BABOK Study Group - meeting 1
BABOK Study Group - meeting 1Paweł Zubkiewicz
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation TechniquesShwetha-BA
 
Requirement Management
Requirement ManagementRequirement Management
Requirement ManagementRavikanth-BA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business AnalysisSunil-QA
 
SPM 5 - Release Planning
SPM 5 - Release PlanningSPM 5 - Release Planning
SPM 5 - Release PlanningGarm Lucassen
 
Writing effective requirements
Writing effective requirementsWriting effective requirements
Writing effective requirementsLiz Lavaveshkul
 
Session 01 - Introduction to Business Analysis
Session 01 - Introduction to Business AnalysisSession 01 - Introduction to Business Analysis
Session 01 - Introduction to Business AnalysisOmkarBA
 
Writing effective requirements
Writing effective requirementsWriting effective requirements
Writing effective requirementsLizLavaveshkul
 
session3-elicitationandcollaboration-Jessie Notes.pdf
session3-elicitationandcollaboration-Jessie Notes.pdfsession3-elicitationandcollaboration-Jessie Notes.pdf
session3-elicitationandcollaboration-Jessie Notes.pdfJessieJames38
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business AnalysisMihika-QA
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis Sunil-QA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business AnalysisShwetha-BA
 
Requirements engineering activities
Requirements engineering activitiesRequirements engineering activities
Requirements engineering activitiesSyed Zaid Irshad
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development Mark Opanasiuk
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528moris lee
 
Enterprise Analysis
Enterprise Analysis Enterprise Analysis
Enterprise Analysis Shwetha-BA
 

Similar to Requirement Engineering (20)

Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Session 04 - Project Planning
Session 04 - Project PlanningSession 04 - Project Planning
Session 04 - Project Planning
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques Requirement Elicitation Techniques
Requirement Elicitation Techniques
 
BABOK Study Group - meeting 1
BABOK Study Group - meeting 1BABOK Study Group - meeting 1
BABOK Study Group - meeting 1
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation Techniques
 
Requirement Management
Requirement ManagementRequirement Management
Requirement Management
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
SPM 5 - Release Planning
SPM 5 - Release PlanningSPM 5 - Release Planning
SPM 5 - Release Planning
 
Writing effective requirements
Writing effective requirementsWriting effective requirements
Writing effective requirements
 
Session 01 - Introduction to Business Analysis
Session 01 - Introduction to Business AnalysisSession 01 - Introduction to Business Analysis
Session 01 - Introduction to Business Analysis
 
Writing effective requirements
Writing effective requirementsWriting effective requirements
Writing effective requirements
 
session3-elicitationandcollaboration-Jessie Notes.pdf
session3-elicitationandcollaboration-Jessie Notes.pdfsession3-elicitationandcollaboration-Jessie Notes.pdf
session3-elicitationandcollaboration-Jessie Notes.pdf
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Requirements engineering activities
Requirements engineering activitiesRequirements engineering activities
Requirements engineering activities
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development
 
Kanban Trojan Horse_(2022).pdf
Kanban Trojan Horse_(2022).pdfKanban Trojan Horse_(2022).pdf
Kanban Trojan Horse_(2022).pdf
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Enterprise Analysis
Enterprise Analysis Enterprise Analysis
Enterprise Analysis
 

More from Mihika-QA

SDLC Method Training Course
SDLC Method Training CourseSDLC Method Training Course
SDLC Method Training CourseMihika-QA
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC MethodologiesMihika-QA
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise AnalysisMihika-QA
 
UML and Case study
UML and Case study UML and Case study
UML and Case study Mihika-QA
 
Basic Formats
Basic FormatsBasic Formats
Basic FormatsMihika-QA
 

More from Mihika-QA (7)

SDLC Method Training Course
SDLC Method Training CourseSDLC Method Training Course
SDLC Method Training Course
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC Methodologies
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
UML and Case study
UML and Case study UML and Case study
UML and Case study
 
ER Diagrams
ER DiagramsER Diagrams
ER Diagrams
 
Basic Formats
Basic FormatsBasic Formats
Basic Formats
 
Agile
Agile Agile
Agile
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Requirement Engineering

  • 1. Page 1Classification: Restricted Business Analysis Training Requirement Engineering
  • 2. Page 2Classification: Restricted Agenda • Requirement Engineering • Elaboration and Management • Negotiating • Validation • Verification • Validation and Verification • Requirement Engineering at a Glance
  • 3. Page 3Classification: Restricted Requirement Engineering • Provides appropriate mechanism for understanding: • Inception -what the customer wants • Elicitation - Analyzing needs • Elaboration - Assessing feasibility • Negotiating a reasonable solution • Specifying the solution • Validating the specification • Managing the requirements
  • 4. Page 4Classification: Restricted • Information from Elicitation and Inception is further expanded and refined during elaboration • Composed of number of modeling and refinement tasks • Creation of Use cases and User scenarios • Root Cause Analysis Elaboration and Management
  • 5. Page 5Classification: Restricted • Identifying the real need of building the Software • Using Prioritization techniques requirements are further analyzed • Risk against each is calculated • Efforts estimation OR guesstimate • Requirements are then combined/eliminated. Negotiating
  • 6. Page 6Classification: Restricted • Prioritization • Ranking • Grouping • MOSCOW • Bubble Sort • Hundred Dollar • Analytical • 5 Whys Negotiating
  • 7. Page 7Classification: Restricted • Prioritization: Ranking • Rank requirements on an ordinal scale • Assigning a different numerical value against each requirement based on importance • Limitation: • Works best with 1 stakeholder as it is difficult to align different stakeholder’s perspectives. Negotiating
  • 8. Page 8Classification: Restricted • Prioritization : Grouping • Grouping requirements as per different priority groups. • Groups should be Clearly defines to avoid ambiguities. • To prevent stakeholders from putting all requirements in one category, the percentage in each group should be restricted • Limitation: • Each group has the same priority Negotiating
  • 9. Page 9Classification: Restricted • Prioritization : MOSCOW • MUST (Mandatory) • SHOULD (Of high priority) • COULD (Preferred but not necessary) • WOULD (Can be postponed and suggested for future execution) Negotiating
  • 10. Page 10Classification: Restricted • Prioritization : Bubble Sort • Take 2 requirements and compare • One with higher priority, Swap • Continue in this fashion till all the requirements are Negotiating
  • 11. Page 11Classification: Restricted Prioritization : Hundred Dollar Method • Same as Priority points • Stakeholders are provided with some number of priority points • List of requirements are provided to each • Each stakeholder indicates the relative importance of each spending one or more priority points • Points cannot be reused • Overall points spent on each requirement by all stakeholders decides which one to take up and which one to be discarded Negotiating
  • 12. Page 12Classification: Restricted Prioritization: 5 Why’s? With five whys, the analyst asks the stakeholder repeatedly (five times or less) why the requirement is necessary until the importance of the requirements is established Negotiating
  • 13. Page 13Classification: Restricted Negotiating • Art of Negotiation • Recognize its not a competition • Map out a strategy • Listed effectively • Focus on other party’s interest • Don’t let it go personal • Be creative • Be ready to commit • ‘Best Negotiation strive for a Win-Win Result’
  • 14. Page 14Classification: Restricted Validation • Validation is the process of confirming the completeness and correctness of requirements. • Correct – accurately states a customer or external need • Clear – has only one possible meaning • Feasible – can be implemented within known constraints • Modifiable – can be easily changed, with history, when necessary • Necessary – documents something customers really need • Prioritized – ranked as to importance of inclusion in product • Traceable – can be linked to system requirements, and to designs, code, and tests • Verifiable – correct implementation can be determined by testing, inspection, analysis, or demonstration
  • 15. Page 15Classification: Restricted Verification • Verification is the process of confirming that the designed and built product fully addresses documented • Validation – “Am I building the right product?” Checking a work product against higher-level work products or authorities that frame this particular product. • Requirements are validated by stakeholders. • Verification – “Am I building the product right?” Checking a work product against some standards and conditions imposed on this type of product and the process of its development. • Requirements are verified by the analysts mainly.
  • 16. Page 16Classification: Restricted Validation : Correct Feasible Necessary Prioritized Unambiguous Verification : Concise Traceable Non redundant Organized Conformant to standards Validation and Verification