SlideShare a Scribd company logo
1 of 14
FITRI HARYATI
11453205499
DEPARTMENT OF INFORMATION SYSTEM
FACULTY OF SAINS AND TECHNOLOGY
UIN SUSKA RIAU
Types of review
– Walkthrough
– Technical review
– Inspection
Types of review
A single document may be the subject of more than one review. If more
than one type of review is used, the order may vary.
For example, an informal review may be carried out before a technical
review, or an inspection may be carried out on a requirements specification before
a walkthrough with customers. It is apparent that none of the following types of
review is the 'winner', but the different types serve different purposes at different
stages in the life cycle of a document.
1. Walkthrough
This is especially useful if people from outside the software discipline are
present, who are not used to, or cannot easily understand software development
documents. The content of the document is explained step by step by the author,
to reach consensus on changes or to gather information.
Next
…
The specific goals of a walkthrough depend on its role in the creation of the
document. In general the following goals can be applicable:
– to present the document to stakeholders both within and outside the software
discipline, in order to gather information regarding the topic under
documentation;
– to explain (knowledge transfer) and evaluate the contents of the document;
– to establish a common understanding of the document;
– to examine and discuss the validity of proposed solutions and the viability of
alternatives, establishing consensus.
Next
…
Key characteristics of walkthroughs are:
– The meeting is led by the authors; often a separate scribe is present.
– Scenarios and dry runs may be used to validate the content.
– Separate pre-meeting preparation for reviewers is optional.
2. Technical review
Compared to inspections, technical reviews are less formal and there is
little or no focus on defect identification on the basis of referenced documents,
intended readership and rules. During technical reviews defects are found by
experts, who focus on the content of the document. The experts that are needed
for a technical review are, for example, architects, chief designers and key users. In
practice, technical reviews vary from quite informal to very formal.
Next
…
The goals of a technical review are to:
– assess the value of technical concepts and alternatives in the product and
project environment;
– establish consistency in the use and representation of technical concepts;
– ensure, at an early stage, that technical concepts are used correctly;
– inform participants of the technical content of the document.
Next
…
Key characteristics of a technical review are:
– It is a documented defect-detection process that involves peers and technical
experts.
– It is often performed as a peer review without management partici pation.
– Ideally it is led by a trained moderator, but possibly also by a technical expert.
– A separate preparation is carried out during which the product is examined and
the defects are found.
– More formal characteristics such as the use of checklists and a logging list or
issue log are optional.
3. Inspection
The document under inspection is prepared and checked thoroughly by
the reviewers before the meeting, comparing the work product with its sources
and other referenced documents, and using rules and checklists. In the inspection
meeting the defects found are logged and any discussion is postponed until the
discussion phase. This makes the inspection meeting a very efficient meeting.
Next
…
The generally accepted goals of inspection are to:
– help the author to improve the quality of the document under inspection;
– remove defects efficiently, as early as possible;
– improve product quality, by producing documents with a higher level of quality;
– create a common understanding by exchanging information among the inspection participants;
– train new employees in the organization's development process;
– learn from defects found and improve processes in order to prevent recurrence of similar
defects;
– sample a few pages or sections from a larger document in order to measure the typical quality
of the document, leading to improved work by individuals in the future, and to process
improvements.
Next
…
Key characteristics of an inspection are:
– It is usually led by a trained moderator (certainly not by the author).
– It uses defined roles during the process.
– It involves peers to examine the product.
– Rules and checklists are used during the preparation phase.
– A separate preparation is carried out during which the product is examined and the defects
are found.
– The defects found are documented in a logging list or issue log.
– A formal follow-up is carried out by the moderator applying exit criteria.
– Optionally, a causal analysis step is introduced to address process improve ment issues and
learn from the defects found.
– Metrics are gathered and analyzed to optimize the process.
Back Link
http://sif.uin-suska.ac.id/
http://fst.uin-suska.ac.id/
http://www.uin-suska.ac.id/
REFERENCE
Graham et.al (2011)

More Related Content

What's hot

Requirements engineering activities
Requirements engineering activitiesRequirements engineering activities
Requirements engineering activitiesSyed Zaid Irshad
 
Static nopri wahyudi
Static nopri wahyudiStatic nopri wahyudi
Static nopri wahyudiNopriwahyudi
 
Presentasi static techniques
Presentasi static techniquesPresentasi static techniques
Presentasi static techniquesEgi Ilham Elnusa
 
Static techniques
Static techniquesStatic techniques
Static techniquesYusran5
 
Actors in requirement engineering process
Actors in requirement engineering processActors in requirement engineering process
Actors in requirement engineering processSyed Zaid Irshad
 
Requirements Management
Requirements Management Requirements Management
Requirements Management Shwetha-BA
 
RE processes and process models
RE processes and process modelsRE processes and process models
RE processes and process modelsSyed Zaid Irshad
 
Static techniques software development - Testing & Implementation
Static techniques software development - Testing & ImplementationStatic techniques software development - Testing & Implementation
Static techniques software development - Testing & Implementationyogi syafrialdi
 
Solution Evaluation (BA Role)
Solution Evaluation (BA Role)   Solution Evaluation (BA Role)
Solution Evaluation (BA Role) Shwetha-BA
 
software requirement
software requirementsoftware requirement
software requirementahmed zewita
 
Quality Systems Investigation Technique
Quality Systems Investigation TechniqueQuality Systems Investigation Technique
Quality Systems Investigation TechniqueMitchell Manning Sr.
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in TestingShwetha-BA
 
Static techniques
Static techniquesStatic techniques
Static techniquesadeafsa
 
ISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsMoutasm Tamimi
 
NOSQAA Requirements Inspection
NOSQAA Requirements InspectionNOSQAA Requirements Inspection
NOSQAA Requirements Inspectionclelhs
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringvucevic
 
Measurement and Quality in Object-Oriented Design
Measurement and Quality in Object-Oriented DesignMeasurement and Quality in Object-Oriented Design
Measurement and Quality in Object-Oriented DesignMoutasm Tamimi
 

What's hot (20)

Requirements engineering activities
Requirements engineering activitiesRequirements engineering activities
Requirements engineering activities
 
Static nopri wahyudi
Static nopri wahyudiStatic nopri wahyudi
Static nopri wahyudi
 
Presentasi static techniques
Presentasi static techniquesPresentasi static techniques
Presentasi static techniques
 
STATIC TECHNIQUES
STATIC TECHNIQUESSTATIC TECHNIQUES
STATIC TECHNIQUES
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Actors in requirement engineering process
Actors in requirement engineering processActors in requirement engineering process
Actors in requirement engineering process
 
Requirements Management
Requirements Management Requirements Management
Requirements Management
 
RE processes and process models
RE processes and process modelsRE processes and process models
RE processes and process models
 
Static techniques software development - Testing & Implementation
Static techniques software development - Testing & ImplementationStatic techniques software development - Testing & Implementation
Static techniques software development - Testing & Implementation
 
Solution Evaluation (BA Role)
Solution Evaluation (BA Role)   Solution Evaluation (BA Role)
Solution Evaluation (BA Role)
 
software requirement
software requirementsoftware requirement
software requirement
 
Quality Systems Investigation Technique
Quality Systems Investigation TechniqueQuality Systems Investigation Technique
Quality Systems Investigation Technique
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
ISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEs
 
NOSQAA Requirements Inspection
NOSQAA Requirements InspectionNOSQAA Requirements Inspection
NOSQAA Requirements Inspection
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirements management
Requirements managementRequirements management
Requirements management
 
Measurement and Quality in Object-Oriented Design
Measurement and Quality in Object-Oriented DesignMeasurement and Quality in Object-Oriented Design
Measurement and Quality in Object-Oriented Design
 

Similar to Fitri haryati (static techniques)

Similar to Fitri haryati (static techniques) (20)

static techniques
static techniquesstatic techniques
static techniques
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Review Process
Review ProcessReview Process
Review Process
 
3.static techniques
3.static techniques3.static techniques
3.static techniques
 
Marjuni.
Marjuni.Marjuni.
Marjuni.
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Testing static technicques
Testing static technicquesTesting static technicques
Testing static technicques
 
Software Testing 4/5
Software Testing 4/5Software Testing 4/5
Software Testing 4/5
 
Static Technique
Static TechniqueStatic Technique
Static Technique
 
Bab 3
Bab 3Bab 3
Bab 3
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Static Techniques (Chapter 3)
Static Techniques (Chapter 3)Static Techniques (Chapter 3)
Static Techniques (Chapter 3)
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Static techniques
Static techniquesStatic techniques
Static techniques
 
Techincal review
Techincal reviewTechincal review
Techincal review
 
Ch 5 - Requirement Validation.pptx
Ch 5 - Requirement Validation.pptxCh 5 - Requirement Validation.pptx
Ch 5 - Requirement Validation.pptx
 
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptxChapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
Chapdgfgdfdfgdgdgdfgdfgdgdfgdgdfgdfgdgr -2.pptx
 
Chapter 3 Static Techniques
Chapter 3 Static TechniquesChapter 3 Static Techniques
Chapter 3 Static Techniques
 

Recently uploaded

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Fitri haryati (static techniques)

  • 1. FITRI HARYATI 11453205499 DEPARTMENT OF INFORMATION SYSTEM FACULTY OF SAINS AND TECHNOLOGY UIN SUSKA RIAU
  • 2. Types of review – Walkthrough – Technical review – Inspection
  • 3. Types of review A single document may be the subject of more than one review. If more than one type of review is used, the order may vary. For example, an informal review may be carried out before a technical review, or an inspection may be carried out on a requirements specification before a walkthrough with customers. It is apparent that none of the following types of review is the 'winner', but the different types serve different purposes at different stages in the life cycle of a document.
  • 4. 1. Walkthrough This is especially useful if people from outside the software discipline are present, who are not used to, or cannot easily understand software development documents. The content of the document is explained step by step by the author, to reach consensus on changes or to gather information.
  • 5. Next … The specific goals of a walkthrough depend on its role in the creation of the document. In general the following goals can be applicable: – to present the document to stakeholders both within and outside the software discipline, in order to gather information regarding the topic under documentation; – to explain (knowledge transfer) and evaluate the contents of the document; – to establish a common understanding of the document; – to examine and discuss the validity of proposed solutions and the viability of alternatives, establishing consensus.
  • 6. Next … Key characteristics of walkthroughs are: – The meeting is led by the authors; often a separate scribe is present. – Scenarios and dry runs may be used to validate the content. – Separate pre-meeting preparation for reviewers is optional.
  • 7. 2. Technical review Compared to inspections, technical reviews are less formal and there is little or no focus on defect identification on the basis of referenced documents, intended readership and rules. During technical reviews defects are found by experts, who focus on the content of the document. The experts that are needed for a technical review are, for example, architects, chief designers and key users. In practice, technical reviews vary from quite informal to very formal.
  • 8. Next … The goals of a technical review are to: – assess the value of technical concepts and alternatives in the product and project environment; – establish consistency in the use and representation of technical concepts; – ensure, at an early stage, that technical concepts are used correctly; – inform participants of the technical content of the document.
  • 9. Next … Key characteristics of a technical review are: – It is a documented defect-detection process that involves peers and technical experts. – It is often performed as a peer review without management partici pation. – Ideally it is led by a trained moderator, but possibly also by a technical expert. – A separate preparation is carried out during which the product is examined and the defects are found. – More formal characteristics such as the use of checklists and a logging list or issue log are optional.
  • 10. 3. Inspection The document under inspection is prepared and checked thoroughly by the reviewers before the meeting, comparing the work product with its sources and other referenced documents, and using rules and checklists. In the inspection meeting the defects found are logged and any discussion is postponed until the discussion phase. This makes the inspection meeting a very efficient meeting.
  • 11. Next … The generally accepted goals of inspection are to: – help the author to improve the quality of the document under inspection; – remove defects efficiently, as early as possible; – improve product quality, by producing documents with a higher level of quality; – create a common understanding by exchanging information among the inspection participants; – train new employees in the organization's development process; – learn from defects found and improve processes in order to prevent recurrence of similar defects; – sample a few pages or sections from a larger document in order to measure the typical quality of the document, leading to improved work by individuals in the future, and to process improvements.
  • 12. Next … Key characteristics of an inspection are: – It is usually led by a trained moderator (certainly not by the author). – It uses defined roles during the process. – It involves peers to examine the product. – Rules and checklists are used during the preparation phase. – A separate preparation is carried out during which the product is examined and the defects are found. – The defects found are documented in a logging list or issue log. – A formal follow-up is carried out by the moderator applying exit criteria. – Optionally, a causal analysis step is introduced to address process improve ment issues and learn from the defects found. – Metrics are gathered and analyzed to optimize the process.