SlideShare a Scribd company logo
CIB 3103
Object Oriented Analysis and Design
Requirements Determination
Learning Objectives
• Learn how to create a requirements definition
• Learn various requirements analysis techniques
• Learn when to use each requirements analysis techniques
• Learn how to gather requirements using interviews, JAD
sessions, questionnaires, document analysis & observation
• Learn various requirements documentation techniques such
as concept maps, story cards & task-lists
• Understand when to use each requirements-gathering
technique
• Be able to begin the creation of a system proposal
Introduction
The systems development process transforms the existing
(as is) system into the proposed (to be) system
Requirements determination
The single most critical step of the entire SDLC
Changes can be made easily in this stage
Most (>50%) system failures are due to problems with
requirements
The iterative process of OOSAD is effective because:
Small batches of requirements can be identified and
implemented incrementally
The system will evolve over time
Requirements Determination
Purpose: to convert high level business requirements
(from the system request) into detailed requirements that
can be used as inputs for creating models
What is a requirement?
A statement of what the system must do or a characteristic
it must have
Will later evolve into a technical description of how the
system will be implemented
Types:
Functional: relates to a process or data
Non-functional: relates to performance or usability
Nonfunctional Requirements
Requirements Definition
Functional & non-functional requirements listed in outline
format
May be prioritized
Provides information needed in subsequent workflows
Defines the scope of the system
Determining Requirements
Business & IT personnel need to collaborate
Strategies for effective results:
Business Process Analysis (BPA)
Business Process Improvement (BPI)
Business Process Reengineering (BPR)
Determining Requirements
Requirements are best determined by systems analysts
and business people together
Strategies for analyzing the requirements
 Business Process Analysis (BPA)
 Business Process Improvement (BPI)
 Business Process Reengineering (BPR)
Techniques for identifying requirements
Interviews, questionnaires and/or observation
Joint application development (JAD)
Document analysis
Creating a
Requirements Definition
Determine the types of functional and non-functional
requirements applicable to the project
Use requirements-gathering techniques to collect details
Analysts work with users to verify, change and prioritize
each requirement
Continue this process through analysis workflow, but be
careful of scope creep
Requirements that meet a need but are not within the
current scope can be added to a list of future
enhancements
Problems in
Requirements Determination
Analyst may not have access to the correct users
Requirements specifications may be inadequate
Some requirements may not be known in the beginning
Verifying and validating requirements can be difficult
Requirements Analysis
Strategies
Business Process Automation (BPA)
Least amount of change to the current system
Use computer technology to automate some portions
Business Process Improvement (BPI)
Moderate amount of change is required
Designed to improve efficiency of the current system
Business Process Reengineering (BPR)
Most amount of change—a complete makeover
Focus is on the to-be system—little time spent on the current
system
Business Process Automation
Techniques
Problem analysis
Ask users to identify problems with the current system
Ask users how they would solve these problems
Good for improving efficiency or ease-of-use
Root cause analysis
Focus is on the cause of a problem, not its solution
Create a prioritized list of problems
Try to determine their causes
Once the causes are known, solutions can be developed
Business Process Improvement
Techniques:
Duration analysis
Determine the time required to complete each step in a
business process
Compare this to the total time required for the entire process
Large differences suggest problems that might be solved by:
 Integrating some steps together
 Performing some steps simultaneously (in parallel)
Activity-based costing—same as duration analysis but
applied to costs
Informal benchmarking—analyzes similar processes in other
successful organizations
Business Process Reengineering
Institutes maximum change: “Out with the old and in
with the new”
Techniques:
Outcome analysis—what does the customer want in the
end?
Technology analysis—apply new technologies to business
processes & identify benefits
Activity elimination—eliminate each activity in a business
process in a “force-fit” exercise
Selecting An
Appropriate Strategy
Fact Finding Techniques
Process is used to:
Uncover all requirements (those uncovered late in the
process are more difficult to incorporate)
Build support and trust among users
Which technique(s) to use?
Interviews
Joint Application Development (JAD)
Questionnaires
Document analysis
Observation
Interviews
Most popular technique—if you need to know
something, just ask
Process:
Select people to interview & create a schedule
Design interview questions (Open-ended, closed-ended, &
probing types of questions)
Prepare for the interview (Unstructured vs. structured
interview organized in a logical order)
Conduct the interview (Top-down vs. bottom-up)
Follow-up after the interview
Question Types
Interviewing Strategies
How
can order
processing be
improved?
How can we reduce the
number of times that customers
return ordered items?
How can we reduce the number of
errors in order processing (e.g., shipping
the wrong products)?
Top-down
Bottom-up
High-level:
Very general
Medium-level:
Moderately specific
Low-level:
Very specific
Post-Interview
Prepare notes and send to the interviewee for verification
Joint Application Development
(JAD)
Joint user-analyst meeting hosted by a facilitator
10 to 20 users
1 to 2 scribes as needed to record the session
Usually in a specially prepared room
Meetings can be held electronically and anonymously
Reduces problems in group settings
Can be held remotely
Sessions require careful planning to be successful
Users may need to bring documents or user manuals
Ground rules should be established
Questionnaires
A set of written questions used to obtain information
from individuals
May be paper based or electronic (e.g., web based)
Common uses:
Large numbers of people
Need both information and opinions
When designing for use outside the organization (customers,
vendors, etc.)
Typical response rates: < 50% (paper); < 30% (Web)
Questionnaire Steps
Select the participants
 Identify the population
 Use representative samples for large populations
Designing the questionnaire
 Careful question selection
 Remove ambiguities
Administering the questionnaire
 Working to get good response rate
 Offer an incentive (e.g., a free pen)
Questionnaire follow-up
 Send results to participants
 Send a thank-you
Good Questionnaire Design
Begin with non-threatening and interesting
questions
Group items into logically coherent sections
No important items at the very end
Do not crowd a page with too many items
Avoid abbreviations
Avoid biased or suggestive items or terms
Number questions to avoid confusion
Pretest to identify confusing questions
Provide anonymity to respondents
Document Analysis
Provides information about the “as-is” system
Review technical documents when available
Review typical user documents:
Forms
Reports
Policy manuals
Look for user additions to forms
Look for unused form elements
Observation
Users/managers often don’t remember everything they
do
Checks validity of information gathered in other ways
Behaviors may change when people are watched
Workers tend to be very careful when watched
Keep a low profile
Try not to interrupt or influence workers
Be careful not to ignore periodic activities
Weekly … Monthly … Annually
Fact Finding Techniques
Compared
A combination of techniques may be used
Document analysis & observation require little training;
JAD sessions can be very challenging
Alternative Techniques
Concept Maps
Represent meaningful relationships between concepts
Focus individuals on a small number of key ideas
Story Cards & Task Lists
Associated with agile development methods
File cards with a single requirement
Each requirement is discussed
How much effort is required to implement it
A task list is created for each requirement (story)
Large requirements can be split into smaller sections
The System Proposal
Combines all material created in planning & analysis
Included sections:
Executive summary
Provides all critical information is summary form
Helps busy executives determine which sections they need to
read in more detail
The system request
The workplan
The feasibility analysis
The requirements definition
Current models of the system (expected to evolve)
System Proposal Template
Summary
Presented in this chapter:
Discussion of functional and non-functional requirements
determination
Requirements analysis strategies
Requirements gathering techniques
Alternative requirements documentation techniques
The system proposal

More Related Content

What's hot

BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)
AMJAD SHAIKH
 
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
AMJAD SHAIKH
 
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Eugene O'Loughlin
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Ahmed Magdy
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business Requirements
Heinz Tonn
 
Babokv2.0 English
Babokv2.0 EnglishBabokv2.0 English
Babokv2.0 English
Marinne1986
 
Chapter07 determining system requirements
Chapter07 determining system requirementsChapter07 determining system requirements
Chapter07 determining system requirements
Dhani Ahmad
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpmdutconsult
 
Business Analysis in A Nutshell
Business Analysis in A Nutshell  Business Analysis in A Nutshell
Business Analysis in A Nutshell
Goran Mutalib
 
requirement gathering for EMR customization
requirement gathering for EMR customizationrequirement gathering for EMR customization
requirement gathering for EMR customizationZEESHAN ASIF
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirementsz-999
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Sharad Patel
 
Information gathering interactive methods
Information gathering interactive methodsInformation gathering interactive methods
Information gathering interactive methods
Kiran Ajudiya
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
moris lee
 
Business Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo VideoBusiness Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo Video
RajeshGOT
 
Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirementshapy
 

What's hot (18)

BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)BABoK V2 Requirements Analysis (RA)
BABoK V2 Requirements Analysis (RA)
 
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)BABoK V2 Business Analysis Planning and Monitoring (BAPM)
BABoK V2 Business Analysis Planning and Monitoring (BAPM)
 
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
Requirements Elicitation - Business Analysis Association of Ireland Annual Co...
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business Requirements
 
Babokv2.0 English
Babokv2.0 EnglishBabokv2.0 English
Babokv2.0 English
 
Chapter07 determining system requirements
Chapter07 determining system requirementsChapter07 determining system requirements
Chapter07 determining system requirements
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpm
 
Business Analysis in A Nutshell
Business Analysis in A Nutshell  Business Analysis in A Nutshell
Business Analysis in A Nutshell
 
requirement gathering for EMR customization
requirement gathering for EMR customizationrequirement gathering for EMR customization
requirement gathering for EMR customization
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information gathering interactive methods
Information gathering interactive methodsInformation gathering interactive methods
Information gathering interactive methods
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Business Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo VideoBusiness Analysis Training |Business Analysis Demo Video
Business Analysis Training |Business Analysis Demo Video
 
Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
 
4
44
4
 
W3 requirements engineering processes
W3   requirements engineering processesW3   requirements engineering processes
W3 requirements engineering processes
 

Viewers also liked

أدارة الوقت
أدارة الوقتأدارة الوقت
أدارة الوقت
Mohamed Yaser
 
Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8
Surgical Neurology International
 
F 20
F 20F 20
Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10Ilaria Troni
 
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Surgical Neurology International
 
Theory Of Wing Sections
Theory  Of  Wing  SectionsTheory  Of  Wing  Sections
Theory Of Wing SectionsMohamed Yaser
 
Detection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in theDetection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in thekpiller
 
Calendario Land 2013
Calendario Land 2013Calendario Land 2013
Calendario Land 2013
Ningyou Tsukai
 
Carnet deportivo
Carnet deportivoCarnet deportivo
Carnet deportivo
Francisco Jesús Antiñolo
 
Partesdemicuerpo2
Partesdemicuerpo2Partesdemicuerpo2
Partesdemicuerpo2
Francisco Jesús Antiñolo
 
Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0
Ningyou Tsukai
 
Questions 1 27
Questions 1 27Questions 1 27
Questions 1 27clarodgers
 
A comparison of historical vs current instructional design
A comparison of historical vs current instructional designA comparison of historical vs current instructional design
A comparison of historical vs current instructional design
Clemson University
 
The colours
The coloursThe colours
The coloursElnaroca
 
La Castanyera
La CastanyeraLa Castanyera
La Castanyera
lomeru
 

Viewers also liked (20)

أدارة الوقت
أدارة الوقتأدارة الوقت
أدارة الوقت
 
Tabel 2
Tabel 2Tabel 2
Tabel 2
 
Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8Harbor UCLA Neuro-Radiology Case 8
Harbor UCLA Neuro-Radiology Case 8
 
Harbor UCLA Neuro-Radiology Case #9
Harbor UCLA Neuro-Radiology Case #9Harbor UCLA Neuro-Radiology Case #9
Harbor UCLA Neuro-Radiology Case #9
 
F 20
F 20F 20
F 20
 
Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10Presentazione informagiovani 14.12.10
Presentazione informagiovani 14.12.10
 
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011Russian Neurosurgical Journal; Volume 3, No. 3, 2011
Russian Neurosurgical Journal; Volume 3, No. 3, 2011
 
Theory Of Wing Sections
Theory  Of  Wing  SectionsTheory  Of  Wing  Sections
Theory Of Wing Sections
 
Juniper marketing
Juniper marketingJuniper marketing
Juniper marketing
 
Detection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in theDetection of swine hepatitis e virus in the
Detection of swine hepatitis e virus in the
 
David
DavidDavid
David
 
Calendario Land 2013
Calendario Land 2013Calendario Land 2013
Calendario Land 2013
 
Carnet deportivo
Carnet deportivoCarnet deportivo
Carnet deportivo
 
Partesdemicuerpo2
Partesdemicuerpo2Partesdemicuerpo2
Partesdemicuerpo2
 
Listening
ListeningListening
Listening
 
Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0Land of Immortals - Fanzine n.0
Land of Immortals - Fanzine n.0
 
Questions 1 27
Questions 1 27Questions 1 27
Questions 1 27
 
A comparison of historical vs current instructional design
A comparison of historical vs current instructional designA comparison of historical vs current instructional design
A comparison of historical vs current instructional design
 
The colours
The coloursThe colours
The colours
 
La Castanyera
La CastanyeraLa Castanyera
La Castanyera
 

Similar to CIB 3103: Requirements Capture

RequirementsDetermination.pptx
RequirementsDetermination.pptxRequirementsDetermination.pptx
RequirementsDetermination.pptx
abcxyz637771
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
SebastienChristianVe
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
Mena M. Eissa
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
Hem Rana
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
Soham De
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
Ian Sommerville
 
Course 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptxCourse 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptx
SyifaNurgaidaYutia
 
Section b
Section bSection b
Section bPCTE
 
Sad Lec3
Sad Lec3Sad Lec3
Sad Lec3
Waqas !!!!
 
Chap2 RE processes
Chap2 RE processesChap2 RE processes
Chap2 RE processes
Ian Sommerville
 
SDLC_Intro.ppt
SDLC_Intro.pptSDLC_Intro.ppt
SDLC_Intro.ppt
shoukatali154717
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
MarissaPedragosa
 
Determining Information Needs.
Determining Information Needs.Determining Information Needs.
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
Best Rahim
 
Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25koolkampus
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
HelpWithAssignment.com
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process Improvement
Ian Sommerville
 

Similar to CIB 3103: Requirements Capture (20)

RequirementsDetermination.pptx
RequirementsDetermination.pptxRequirementsDetermination.pptx
RequirementsDetermination.pptx
 
Ch04
Ch04Ch04
Ch04
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
Course 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptxCourse 5 - APS2-Requirement and Functional Modeling.pptx
Course 5 - APS2-Requirement and Functional Modeling.pptx
 
Section b
Section bSection b
Section b
 
Sad Lec3
Sad Lec3Sad Lec3
Sad Lec3
 
Chap2 RE processes
Chap2 RE processesChap2 RE processes
Chap2 RE processes
 
SDLC_Intro.ppt
SDLC_Intro.pptSDLC_Intro.ppt
SDLC_Intro.ppt
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Determining Information Needs.
Determining Information Needs.Determining Information Needs.
Determining Information Needs.
 
BIS2311Topic1
BIS2311Topic1BIS2311Topic1
BIS2311Topic1
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
 
Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25Process Improvement in Software Engineering SE25
Process Improvement in Software Engineering SE25
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
 
Requirements Engineering Process Improvement
Requirements Engineering Process ImprovementRequirements Engineering Process Improvement
Requirements Engineering Process Improvement
 

More from Ahmad Ammari

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingAhmad Ammari
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3Ahmad Ammari
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2Ahmad Ammari
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initializationAhmad Ammari
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is developmentAhmad Ammari
 
CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1Ahmad Ammari
 
CIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and DesignCIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and Design
Ahmad Ammari
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social mediaAhmad Ammari
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computingAhmad Ammari
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lecAhmad Ammari
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructureAhmad Ammari
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelAhmad Ammari
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategy
Ahmad Ammari
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_ver
Ahmad Ammari
 
Itec410 lec2
Itec410 lec2Itec410 lec2
Itec410 lec2
Ahmad Ammari
 

More from Ahmad Ammari (15)

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process Modeling
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initialization
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is development
 
CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1
 
CIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and DesignCIS 2303 LO1: Introduction to System Analysis and Design
CIS 2303 LO1: Introduction to System Analysis and Design
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social media
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computing
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lec
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructure
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_model
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategy
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_ver
 
Itec410 lec2
Itec410 lec2Itec410 lec2
Itec410 lec2
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

CIB 3103: Requirements Capture

  • 1. CIB 3103 Object Oriented Analysis and Design Requirements Determination
  • 2. Learning Objectives • Learn how to create a requirements definition • Learn various requirements analysis techniques • Learn when to use each requirements analysis techniques • Learn how to gather requirements using interviews, JAD sessions, questionnaires, document analysis & observation • Learn various requirements documentation techniques such as concept maps, story cards & task-lists • Understand when to use each requirements-gathering technique • Be able to begin the creation of a system proposal
  • 3. Introduction The systems development process transforms the existing (as is) system into the proposed (to be) system Requirements determination The single most critical step of the entire SDLC Changes can be made easily in this stage Most (>50%) system failures are due to problems with requirements The iterative process of OOSAD is effective because: Small batches of requirements can be identified and implemented incrementally The system will evolve over time
  • 4. Requirements Determination Purpose: to convert high level business requirements (from the system request) into detailed requirements that can be used as inputs for creating models What is a requirement? A statement of what the system must do or a characteristic it must have Will later evolve into a technical description of how the system will be implemented Types: Functional: relates to a process or data Non-functional: relates to performance or usability
  • 6. Requirements Definition Functional & non-functional requirements listed in outline format May be prioritized Provides information needed in subsequent workflows Defines the scope of the system
  • 7. Determining Requirements Business & IT personnel need to collaborate Strategies for effective results: Business Process Analysis (BPA) Business Process Improvement (BPI) Business Process Reengineering (BPR)
  • 8. Determining Requirements Requirements are best determined by systems analysts and business people together Strategies for analyzing the requirements  Business Process Analysis (BPA)  Business Process Improvement (BPI)  Business Process Reengineering (BPR) Techniques for identifying requirements Interviews, questionnaires and/or observation Joint application development (JAD) Document analysis
  • 9. Creating a Requirements Definition Determine the types of functional and non-functional requirements applicable to the project Use requirements-gathering techniques to collect details Analysts work with users to verify, change and prioritize each requirement Continue this process through analysis workflow, but be careful of scope creep Requirements that meet a need but are not within the current scope can be added to a list of future enhancements
  • 10. Problems in Requirements Determination Analyst may not have access to the correct users Requirements specifications may be inadequate Some requirements may not be known in the beginning Verifying and validating requirements can be difficult
  • 11. Requirements Analysis Strategies Business Process Automation (BPA) Least amount of change to the current system Use computer technology to automate some portions Business Process Improvement (BPI) Moderate amount of change is required Designed to improve efficiency of the current system Business Process Reengineering (BPR) Most amount of change—a complete makeover Focus is on the to-be system—little time spent on the current system
  • 12. Business Process Automation Techniques Problem analysis Ask users to identify problems with the current system Ask users how they would solve these problems Good for improving efficiency or ease-of-use Root cause analysis Focus is on the cause of a problem, not its solution Create a prioritized list of problems Try to determine their causes Once the causes are known, solutions can be developed
  • 13. Business Process Improvement Techniques: Duration analysis Determine the time required to complete each step in a business process Compare this to the total time required for the entire process Large differences suggest problems that might be solved by:  Integrating some steps together  Performing some steps simultaneously (in parallel) Activity-based costing—same as duration analysis but applied to costs Informal benchmarking—analyzes similar processes in other successful organizations
  • 14. Business Process Reengineering Institutes maximum change: “Out with the old and in with the new” Techniques: Outcome analysis—what does the customer want in the end? Technology analysis—apply new technologies to business processes & identify benefits Activity elimination—eliminate each activity in a business process in a “force-fit” exercise
  • 16. Fact Finding Techniques Process is used to: Uncover all requirements (those uncovered late in the process are more difficult to incorporate) Build support and trust among users Which technique(s) to use? Interviews Joint Application Development (JAD) Questionnaires Document analysis Observation
  • 17. Interviews Most popular technique—if you need to know something, just ask Process: Select people to interview & create a schedule Design interview questions (Open-ended, closed-ended, & probing types of questions) Prepare for the interview (Unstructured vs. structured interview organized in a logical order) Conduct the interview (Top-down vs. bottom-up) Follow-up after the interview
  • 19. Interviewing Strategies How can order processing be improved? How can we reduce the number of times that customers return ordered items? How can we reduce the number of errors in order processing (e.g., shipping the wrong products)? Top-down Bottom-up High-level: Very general Medium-level: Moderately specific Low-level: Very specific
  • 20. Post-Interview Prepare notes and send to the interviewee for verification
  • 21. Joint Application Development (JAD) Joint user-analyst meeting hosted by a facilitator 10 to 20 users 1 to 2 scribes as needed to record the session Usually in a specially prepared room Meetings can be held electronically and anonymously Reduces problems in group settings Can be held remotely Sessions require careful planning to be successful Users may need to bring documents or user manuals Ground rules should be established
  • 22. Questionnaires A set of written questions used to obtain information from individuals May be paper based or electronic (e.g., web based) Common uses: Large numbers of people Need both information and opinions When designing for use outside the organization (customers, vendors, etc.) Typical response rates: < 50% (paper); < 30% (Web)
  • 23. Questionnaire Steps Select the participants  Identify the population  Use representative samples for large populations Designing the questionnaire  Careful question selection  Remove ambiguities Administering the questionnaire  Working to get good response rate  Offer an incentive (e.g., a free pen) Questionnaire follow-up  Send results to participants  Send a thank-you
  • 24. Good Questionnaire Design Begin with non-threatening and interesting questions Group items into logically coherent sections No important items at the very end Do not crowd a page with too many items Avoid abbreviations Avoid biased or suggestive items or terms Number questions to avoid confusion Pretest to identify confusing questions Provide anonymity to respondents
  • 25. Document Analysis Provides information about the “as-is” system Review technical documents when available Review typical user documents: Forms Reports Policy manuals Look for user additions to forms Look for unused form elements
  • 26. Observation Users/managers often don’t remember everything they do Checks validity of information gathered in other ways Behaviors may change when people are watched Workers tend to be very careful when watched Keep a low profile Try not to interrupt or influence workers Be careful not to ignore periodic activities Weekly … Monthly … Annually
  • 27. Fact Finding Techniques Compared A combination of techniques may be used Document analysis & observation require little training; JAD sessions can be very challenging
  • 28. Alternative Techniques Concept Maps Represent meaningful relationships between concepts Focus individuals on a small number of key ideas Story Cards & Task Lists Associated with agile development methods File cards with a single requirement Each requirement is discussed How much effort is required to implement it A task list is created for each requirement (story) Large requirements can be split into smaller sections
  • 29. The System Proposal Combines all material created in planning & analysis Included sections: Executive summary Provides all critical information is summary form Helps busy executives determine which sections they need to read in more detail The system request The workplan The feasibility analysis The requirements definition Current models of the system (expected to evolve)
  • 31. Summary Presented in this chapter: Discussion of functional and non-functional requirements determination Requirements analysis strategies Requirements gathering techniques Alternative requirements documentation techniques The system proposal