SlideShare a Scribd company logo
INFORMATION SYSTEM ANALYSIS AND DESIGN
ANALISA DAN PERANCANGAN SISTEM INFORMASI – IT21D3
Fakultas Teknik – Program Studi S1 Teknologi Informasi
• Topic 5: Requirement Analysis
• Lecturer: Syifa Nurgaida Yutia, M.T
#InnovationForTheFuture
Session Outline
1. Planning (Perencanaan)
Mengapa sistem dibuat?
2. Analysis (Analisis)
Who, what, when, where will the system be?
3. Design (Disain)
Bagaimana sistem akan berkerja?
4. Implementation (Implementasi)
Pengembangan dan pengiriman sistem?
FASE – FASE SDLC
Requirement Determination
Requirement Analysis Strategies
Requirement Gathering Techniques
The System Proposal
Learning
Objectives
Able to create and define a requirement in IS project
Able to explain the various technique for requirement
analysis in IS project
Able to apply the various technique for requirement
analysis in IS project
Able to explain the utilization of requirement analysis
technique in IS project
Able to explain how to do requirements-gathering by using
interview, JAD, questionnaires, document analysis, and
observation in an IS project
Able to explain the utilization of each requirements-
gathering technique
5.1
R E Q U I R E M E N T
D E T E R M I N A T I O N &
REQUIREMENT ANALYSIS TECHNIQUES
• The As-Is system : adalah sistem saat ini dan mungkin terkomputerisasi atau
mungkin tidak terkomputerisasi
- Dapatkan sejelas mungkin informasi terkait sistem yang ada saat ini
• The To-Be system : sistem baru yang didasarkan pada persyaratan yang
diperbarui
- Tunjukkan bahwa sistem yang akan datang jauh lebih baik daripada
sistem apa adanya
• System Proposal : penyampaian utama dari Tahap Analisis
- Sistem informasi logis yang diusulkan: persyaratan fungsional dan non-
fungsional
• Tujuan dari fase analisis adalah untuk benar-benar memahami persyaratan
sistem baru dan mengembangkan sistem yang menanganinya
– atau memutuskan sistem baru tidak diperlukan
• Usulan Sistem disampaikan kepada komite persetujuan
• Tantangan pertama adalah menemukan orang yang tepat untuk
berpartisipasi.
• Tantangan kedua adalah mengumpulkan dan mengintegrasikan
informasi.
• Penentuan kebutuhan adalah langkah penting dalam SDLC
• Tujuan penentuan kebutuhan adalah untuk mengubah penjelasan tingkat
yang sangat tinggi dari kebutuhan bisnis yang dinyatakan dalam
permintaan sistem menjadi daftar kebutuhan yang lebih tepat yang dapat
digunakan sebagai masukan untuk analisis lainnya (membuat model
fungsional, struktural, dan perilaku ).
What is
Requirement?
• Sebuah pernyataan tentang apa yang harus
dilakukan system
• Pernyataan karakteristik yang harus dimiliki system
• Fokus pada kebutuhan pengguna bisnis selama
fase analisis -> Business Requirements
• Persyaratan akan berubah seiring waktu saat
proyek bergerak dari analisis ke desain ke
implementasi
• Jadi, waspadai project scope creep (kondisi
requirement yang bertambah terus menerus)
What is the differences
between
requirement in analysis phase
and design phase?
User, Clients System Analyst
Business Analyst,
Logical Req
Programmer, Developer
Technical Analyst
User (business person) perspectives VS Developer perspectives
Requirement Types
Functional Requirements
Nonfunctional Requirements
Functional
Requirements
• Persyaratan Fungsional: berhubungan dengan
proses atau data
• Proses yang harus dilakukan sistem
• Informasi yang harus terkandung sistem
• Fokus pada fungsionalitas fitur
Nonfunctional
Requirements
• Persyaratan Nonfungsional: berkaitan dengan
kinerja atau kegunaan
• Behavioral properties yang harus dipertimbangkan
oleh system
• Operasional
• Kinerja
• Keamanan
• Aspek budaya dan politik
• Persyaratan nonfungsional dapat memengaruhi
mode fungsional, struktural, dan behavioral model
Example of
Functional
and Non-
Functional
Requireme
nts
12
Non-
Functional
Requireme
nts
13
Documenting
Requirements
• Requirements definition report
– Text document listing requirements in outline form
– Priorities may be included
• Key purpose is to define the project scope: what is and is not to be
included.
• Your accountability and responsibility to the IS Project is proven by this
documentation
Purposes of
a requirements
specification
documents
A requirements specification document is used by
many different stakeholder for different purposes:
1. Customer - part of a formal contract
2. Manager - basis for the project plan
3. Developer - basis for the design and
 implementation
4. Tester - document to test the system against
5. Maintainer - starting point for understanding the
 system
Determining
Requirements
• Participation by business users/experts and IT analyst is
• essential
– If done only by IT analyst, may not address true business needs
– If done only by business experts, may not take advantage of ->
technology simply automate an existing systems
• Three techniques help users discover their needs for the new
system:
1. Business Process Automation (BPA)
2. Business Process Improvement (BPI)
3. Business Process Reengineering (BPR)
Basic Process of Analysis
(Determining Requirements)
1. Understand the “As-Is” system
2. Identify improvement opportunities
3. Develop the “To-Be” system concept
• Techniques vary in amount of change
– BPA (Business Process Automation) – small change
– BPI (Business Process Improvement) – moderate change
– BPR ((Business Process Reengineering) – significant change
• Additional information gathering techniques are needed as well
Requirement
Definition
• Creating a requirements definition is an iterative and ongoing process.
• However, the evolution of the requirements definition must be carefully
managed -> scope creep
• Real-world problem with requirement determination:
1) Access to the correct set of users to uncover the complete set of requirements
2) Specification of the requirements may be inadequate
3) Some requirements are simply unknowable at the beginning of a development process
4) Verifying and validating of requirements can be very difficult
18
5.2
R E Q U I R E M E N T
A N A L Y S I S
T E C H N I Q U E S
Discovering Needs
of New Systems
1. BUSINESS PROCESS
AUTOMATION
2. BUSINESS PROCESS
IMPROVEMENT
3. BUSINESS PROCESS
REENGINEERING
Business Process
Automation
Characteristics:
• Doesn’t change basic operations
• Automates some operations
Goal: Efficiency for users
What are the negative and positive impacts of BPA?
Business Process
Automation
Pros:
– Quick wins (unless processes are extremely complex)
– Less culture shock
– Reduce human error
–Start collecting process metrics baselines to analyze
future process improvements
– Reduce paper, fax, emails, etc.
Cons:
– Only small efficiency gains are realized
– Automating non-value add processes
– Missed opportunity to optimize work flow
– May never get A chance to improve processes
Business Process
Improvement
Changes how an organization operates
Changes operation with new techniques (i.e., take advantage of
new opportunities offered by technology)
Can improve efficiency (i.e., doing things right)
Can improve effectiveness (i.e., doing the right things)
More focus on to-be system for improvement (i.e., less on as-is
system than BPA)
Business Process
Improvement
Goal: Goal: Efficiency and effectiveness for
users
What are the negative and positive
impacts of BPI?
Business Process
Improvement
Pros:
- Reduce or eliminate waste
- Potential huge return on investment
-Improve employee performance and customer
experience
- Reduce complexity of systems
- Financial justification of process steps
Cons:
– Potential culture shock issues
– Requires more executive support
– More expensive to implement
–Requires more attention to change
management
Business Process
Reengineering
Characteristics:
• Change the fundamental way the organization operates
• Eliminate the current way of doing business
• Making major changes to take advantage of new ideas and technology
Goal: Focus on new ideas and new ways of doing business
What are the negative and positive impacts of BPR?
Business Process
Reengineering
Pros:
- Provides long solution
- Gives an appropriate focus to business
- Coordinates and integrates several function immediately
- Eliminate the delay and unessential activities
Cons:
-Cause a culture shock that need effective change
management
-Very high cost and IT Investment, consumes more
time and human resources
- May not suit to every business
- Does not provide immediate results
Comparing
Analysis
Techniques
1. Potential
business value
2. Project cost
3. Breadth of
analysis
4. Risk
Project
Characteristics
Requirement Analysis Strategy in Identifying
Improvement
1. Problem Analysis
2. Root-Cause Analysis
3. Duration Analysis
4. Activity Based Costing
5. Informal Benchmarking
6. Outcome Analysis
7. Technology Analysis
8. Activity Elimination
1. Problem
Analysis
2. Root Cause Analysis
• Problem Analysis
–Identify problems with as-is system and to
describe how to solve them in the to-be system à
Ask users to identify problems and solutions
– Improvements tend to be small and
incremental
–Rarely finds improvements with significant
business value
• Root Cause Analysis
– Challenge assumptions about why problem exists
– Trace symptoms to their causes to discover the
“real” problem
–Identify the root causes of problems rather than
symptoms of
problems
Root Cause
Analysis
Example
3. Duration
Analysis
• Calculate time needed for each process step
• Calculate time needed for overall process
• Compare the two – a large difference indicates a badly fragmented process
• Potential solutions:
–Process integration – change the process to use fewer people, each with
broader responsibilities
–Parallelization – change the process so that individual step are performed
simultaneously
4. Activity-Based
Costing
• Examine the cost of each major process or step in a business process rather than time
taken.
• Calculate cost of each process step
• Consider both direct and indirect costs
• Identify most costly steps and focus improvement efforts on
them
5. Informal
Benchmarking
• Studying how other organizations perform the same business process
• Helps the organization by introducing ideas that employees may never have
considered but that have the potential added value.
• Common for customer-facing processes
• Interact with other business’ processes as if you are a customer
6. Outcome
Analysis
• Consider desirable outcomes from customers’ perspective.
• System analysts encourage the managers and project sponsor to
• pretend they are customers and consider what the organization
• could enable the customer to do
7. Technology
Analysis
• Analysts list important and interesting technologies
• Managers list important and interesting technologies
• The group identifies how each might be applied to the business and how the business
might benefit
8. Activity
Elimination
• Identify what would happen if each organizational activity were
eliminated
• Use “force-fit” to test all possibilities
5 . 3
R E Q U I R E M E N T S
- G A T H E R I N G
T E C H N I Q U E S
1. Interviews
2. JAD
3. Questionnaires
4. Document Analysis
5. Observation
1. Interview
• Most commonly used technique
• Basic steps:
• Selecting Interviewees
• Designing Interview Questions (instrument
development)
• Preparing for the Interview
• Conducting the Interview
• Post-Interview Follow-up
Interview:
1. Selecting
Interviewees
• Based on information needed
• Create interview schedule and the purpose of the interview
• Often good to get different perspectives
– Managers
– Users
– Ideally, all key stakeholders
• People at different levels of the organization have varying
perspectives on the
systems.
– Gain both high-level and low-level perspectives on an issue
2. Designing
Interview
Questions
• Unstructured interview
– Broad, roughly defined information
– At the earlier stage of the project
• Structured interview
– More specific information
– At the later stage of the project
3. Preparation
Steps
• Prepare general interview plan
– List of question
– Anticipated answers and follow-ups
• Confirm areas of knowledge
• Set priorities in case of time shortage
• Prepare the interviewee
– Schedule
– Inform of reason for interview
– Inform of areas of discussion
Interview:
4. Conducting
the Interview
• Appear professional and unbiased
• Record all information
• Check on organizational policy regarding tape recording
• Be sure you understand all issues and terms
• Separate facts from opinions
• Give interviewee time to ask questions
• Be sure to thank the interviewee
• End on time
Interview:
Conducting
the Interview
• Don’t worry, be happy
• Pay attention
• Summarize key points
• Be succinct
• Be honest
• Watch body language
5. Post-Interview
Follow-Up
• Prepare interview notes
• Prepare interview report
• Have interviewee review and confirm interview
report
• Look for gaps and new questions
Interview Report
A structured group process focused on determining
requirements
Involves project team, users, and management
working together
May reduce scope creep by 50%
Very useful technique
JAD: Participants
• Facilitator
– Trained in JAD techniques
– Sets agenda and guides group processes
• Scribe(s)
– Record content of JAD sessions
•Users and managers from business area with
broad and detailed knowledge
• It is important that the participants understand what is expected
of the JAD session.
• Time commitment – ½ day to several weeks
• Close ended questions are seldom used because do not spark
the open and frank discussion
• Strong management support is needed to release key
participants from their usual responsibilities
• The JAD session is structured
• Careful planning is essential
• e-JAD can help alleviate some problems inherent with groups
knowledge
JAD: Setting
• U-Shaped seating
• Away from distractions
• Whiteboard/flip chart
• Prototyping tools
• e-JAD
JAD: Setting
Select
Participant
Desain a JAD
Session
Preparing for
a JAD Session
Conducting a
JAD Session
Post JAD
Follow-up
JAD: Steps in
Conducting the
JAD
• Participants are selected in the same way as
are interview participants
• Design questions, use formal agenda, and use
top-down structure
• Inform the goals and agenda of JAD session to
all participant
• Facilitator facilitates a JAD Session according to
the rules and agenda
• Post session follow-up report is prepared and
circulated among session attendees.
JAD: Post JAD
Follow-up
•Post-session report is prepared and circulated
among session attendees
•The report should be completed approximately a
week to two after the JAD
session
• Reducing domination
• Encouraging non-contributors
• Side discussions
• Agenda merry-go-round
• Violent agreement
• Unresolved conflict
• True conflict
• Use humor
3. Questionnaires
• A set of written questions, often sent to a large
number of people
• May be paper-based or electronic
• Select participants using samples of the population
• Design the questions for clarity and ease of analysis
• Administer the questionnaire and take steps to get a
good response
• rate
• Questionnaire follow-up report
Questionnaires:
Good
Questionnaire
Design
4.Document Analysis
• Study of existing material describing the current system
• Provides clues about existing “as-is” system
• Forms, reports, policy manuals, organization charts describe the
formal
• system
• Look for the informal system in user additions to forms/report and
unused
• form/report elements
• The most powerful indication that the system needs to be changed
is when
• users create their own forms or add additional information to existing
one
5.Observation
• Watch processes being performed
• Users/managers often don’t remember everything they do
• Checks validity of information gathered other ways
• Be aware that behaviors change when people are watched
• Be unobtrusive
• Careful not to ignore periodic activities
• Weekly … Monthly … Annual
• Identify peak and lull periods
Comparison of Requirements-
Gathering Techniques
6. System
Proposal
TUGAS DISKUSI
KELOMPOK HARI INI
https://bit.ly/DISKUSI_ANAPERANCIS
Diskusi dan isilah Functional dan
Non Functional Requirements sesuai
dengan studi kasus projectnya masing-
masing
Isi di jamboard berikut:
TUGAS
• Buatlah Requirement Sistem yang terdiri dari
1. Functional Requirement
2. Nonfunctional Requirement
Studi kasus : sistem sama dengan tugas
sebelumnya
Format word / pdf dan dikirimkan ke email
syifanurgaida@ittelkom-jkt.ac.id sebelum
perkuliahan dimulai
Summary
• The analysis process focuses on capturing the business requirements for the
system
• Functional and non-functional business requirements tell what the system
must do
• Three main requirements analysis techniques are BPA, BPI, and BPR
• These techniques vary in potential business value, but also in
potential cost and risk
• There are five major requirements-gathering techniques that all
systems analysts must be able to use: Interviews, JAD,
Questionnaires, Document Analysis, and Observation.
• Systems analysts must also know how and when to use each as well
as how to combine methods.
Reference
• Dennis, et. al., “Systems Analysis & Design: An
Object-Oriented Approach with UML 5th ed”, John
Wiley & Sons, 2015.
• Whitten, et. al., “Systems Analysis & Design
Methods 7th ed”, McGraw-Hill, 2007.
• Dennis, et. al., “Systems Analysis & Design 5th ed”,
John Wiley & Sons, 2012.
• Larman, C., Applying UML Pattern 4th ed, Prentice
Hall

More Related Content

Similar to Course 5 - APS2-Requirement and Functional Modeling.pptx

CIB 3103: Requirements Capture
CIB 3103: Requirements CaptureCIB 3103: Requirements Capture
CIB 3103: Requirements CaptureAhmad Ammari
 
Chapter 12 developiong business&it solutions
Chapter 12  developiong business&it solutionsChapter 12  developiong business&it solutions
Chapter 12 developiong business&it solutions
Advance Saraswati Prakashan Pvt Ltd
 
5 investigating system requirements
5 investigating system requirements5 investigating system requirements
5 investigating system requirementsricardovigan
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
Khalid Kahloot
 
Sadchap04
Sadchap04Sadchap04
Introduction to business process management
Introduction to business process managementIntroduction to business process management
Introduction to business process management
Huu Nguyen Tat
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementSara Afxal
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
Alan McSweeney
 
Course 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxCourse 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptx
adikesavulu
 
lecture_Analysis Phase.ppt
lecture_Analysis Phase.pptlecture_Analysis Phase.ppt
lecture_Analysis Phase.ppt
AteeqaKokab1
 
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjdlecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
AqeelAbbas94
 
Chapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptxChapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptx
AxmedMaxamuudYoonis
 
10 - Project Management
10 - Project Management10 - Project Management
10 - Project Management
Raymond Gao
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
SebastienChristianVe
 
Part7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lecturesPart7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lectures
mohammedderriche2
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
SADEED AMEEN
 
MIS Session 6
MIS Session 6MIS Session 6
MIS Session 6
sant190
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
Hem Rana
 

Similar to Course 5 - APS2-Requirement and Functional Modeling.pptx (20)

CIB 3103: Requirements Capture
CIB 3103: Requirements CaptureCIB 3103: Requirements Capture
CIB 3103: Requirements Capture
 
SAD 1st PPT
SAD 1st PPTSAD 1st PPT
SAD 1st PPT
 
Chapter 12 developiong business&it solutions
Chapter 12  developiong business&it solutionsChapter 12  developiong business&it solutions
Chapter 12 developiong business&it solutions
 
5 investigating system requirements
5 investigating system requirements5 investigating system requirements
5 investigating system requirements
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
Sadchap04
Sadchap04Sadchap04
Sadchap04
 
Introduction to business process management
Introduction to business process managementIntroduction to business process management
Introduction to business process management
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Course 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptxCourse 1 Requirements Definition Overview.pptx
Course 1 Requirements Definition Overview.pptx
 
lecture_Analysis Phase.ppt
lecture_Analysis Phase.pptlecture_Analysis Phase.ppt
lecture_Analysis Phase.ppt
 
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjdlecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
 
Chapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptxChapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptx
 
10 - Project Management
10 - Project Management10 - Project Management
10 - Project Management
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
 
Part7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lecturesPart7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lectures
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
MIS Session 6
MIS Session 6MIS Session 6
MIS Session 6
 
Downloads abc 2006 presentation downloads-ramesh_babu
Downloads abc 2006   presentation downloads-ramesh_babuDownloads abc 2006   presentation downloads-ramesh_babu
Downloads abc 2006 presentation downloads-ramesh_babu
 

Recently uploaded

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 

Recently uploaded (20)

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 

Course 5 - APS2-Requirement and Functional Modeling.pptx

  • 1. INFORMATION SYSTEM ANALYSIS AND DESIGN ANALISA DAN PERANCANGAN SISTEM INFORMASI – IT21D3 Fakultas Teknik – Program Studi S1 Teknologi Informasi • Topic 5: Requirement Analysis • Lecturer: Syifa Nurgaida Yutia, M.T #InnovationForTheFuture
  • 2.
  • 3.
  • 4. Session Outline 1. Planning (Perencanaan) Mengapa sistem dibuat? 2. Analysis (Analisis) Who, what, when, where will the system be? 3. Design (Disain) Bagaimana sistem akan berkerja? 4. Implementation (Implementasi) Pengembangan dan pengiriman sistem? FASE – FASE SDLC
  • 5. Requirement Determination Requirement Analysis Strategies Requirement Gathering Techniques The System Proposal
  • 6. Learning Objectives Able to create and define a requirement in IS project Able to explain the various technique for requirement analysis in IS project Able to apply the various technique for requirement analysis in IS project Able to explain the utilization of requirement analysis technique in IS project Able to explain how to do requirements-gathering by using interview, JAD, questionnaires, document analysis, and observation in an IS project Able to explain the utilization of each requirements- gathering technique
  • 7. 5.1 R E Q U I R E M E N T D E T E R M I N A T I O N & REQUIREMENT ANALYSIS TECHNIQUES
  • 8. • The As-Is system : adalah sistem saat ini dan mungkin terkomputerisasi atau mungkin tidak terkomputerisasi - Dapatkan sejelas mungkin informasi terkait sistem yang ada saat ini • The To-Be system : sistem baru yang didasarkan pada persyaratan yang diperbarui - Tunjukkan bahwa sistem yang akan datang jauh lebih baik daripada sistem apa adanya • System Proposal : penyampaian utama dari Tahap Analisis - Sistem informasi logis yang diusulkan: persyaratan fungsional dan non- fungsional
  • 9. • Tujuan dari fase analisis adalah untuk benar-benar memahami persyaratan sistem baru dan mengembangkan sistem yang menanganinya – atau memutuskan sistem baru tidak diperlukan • Usulan Sistem disampaikan kepada komite persetujuan • Tantangan pertama adalah menemukan orang yang tepat untuk berpartisipasi. • Tantangan kedua adalah mengumpulkan dan mengintegrasikan informasi. • Penentuan kebutuhan adalah langkah penting dalam SDLC • Tujuan penentuan kebutuhan adalah untuk mengubah penjelasan tingkat yang sangat tinggi dari kebutuhan bisnis yang dinyatakan dalam permintaan sistem menjadi daftar kebutuhan yang lebih tepat yang dapat digunakan sebagai masukan untuk analisis lainnya (membuat model fungsional, struktural, dan perilaku ).
  • 10. What is Requirement? • Sebuah pernyataan tentang apa yang harus dilakukan system • Pernyataan karakteristik yang harus dimiliki system • Fokus pada kebutuhan pengguna bisnis selama fase analisis -> Business Requirements • Persyaratan akan berubah seiring waktu saat proyek bergerak dari analisis ke desain ke implementasi • Jadi, waspadai project scope creep (kondisi requirement yang bertambah terus menerus)
  • 11. What is the differences between requirement in analysis phase and design phase? User, Clients System Analyst Business Analyst, Logical Req Programmer, Developer Technical Analyst User (business person) perspectives VS Developer perspectives
  • 13. Functional Requirements • Persyaratan Fungsional: berhubungan dengan proses atau data • Proses yang harus dilakukan sistem • Informasi yang harus terkandung sistem • Fokus pada fungsionalitas fitur
  • 14. Nonfunctional Requirements • Persyaratan Nonfungsional: berkaitan dengan kinerja atau kegunaan • Behavioral properties yang harus dipertimbangkan oleh system • Operasional • Kinerja • Keamanan • Aspek budaya dan politik • Persyaratan nonfungsional dapat memengaruhi mode fungsional, struktural, dan behavioral model
  • 17. Documenting Requirements • Requirements definition report – Text document listing requirements in outline form – Priorities may be included • Key purpose is to define the project scope: what is and is not to be included. • Your accountability and responsibility to the IS Project is proven by this documentation
  • 18. Purposes of a requirements specification documents A requirements specification document is used by many different stakeholder for different purposes: 1. Customer - part of a formal contract 2. Manager - basis for the project plan 3. Developer - basis for the design and  implementation 4. Tester - document to test the system against 5. Maintainer - starting point for understanding the  system
  • 19. Determining Requirements • Participation by business users/experts and IT analyst is • essential – If done only by IT analyst, may not address true business needs – If done only by business experts, may not take advantage of -> technology simply automate an existing systems • Three techniques help users discover their needs for the new system: 1. Business Process Automation (BPA) 2. Business Process Improvement (BPI) 3. Business Process Reengineering (BPR)
  • 20. Basic Process of Analysis (Determining Requirements) 1. Understand the “As-Is” system 2. Identify improvement opportunities 3. Develop the “To-Be” system concept • Techniques vary in amount of change – BPA (Business Process Automation) – small change – BPI (Business Process Improvement) – moderate change – BPR ((Business Process Reengineering) – significant change • Additional information gathering techniques are needed as well
  • 21. Requirement Definition • Creating a requirements definition is an iterative and ongoing process. • However, the evolution of the requirements definition must be carefully managed -> scope creep • Real-world problem with requirement determination: 1) Access to the correct set of users to uncover the complete set of requirements 2) Specification of the requirements may be inadequate 3) Some requirements are simply unknowable at the beginning of a development process 4) Verifying and validating of requirements can be very difficult 18
  • 22.
  • 23. 5.2 R E Q U I R E M E N T A N A L Y S I S T E C H N I Q U E S
  • 24. Discovering Needs of New Systems 1. BUSINESS PROCESS AUTOMATION 2. BUSINESS PROCESS IMPROVEMENT 3. BUSINESS PROCESS REENGINEERING
  • 25. Business Process Automation Characteristics: • Doesn’t change basic operations • Automates some operations Goal: Efficiency for users What are the negative and positive impacts of BPA?
  • 26. Business Process Automation Pros: – Quick wins (unless processes are extremely complex) – Less culture shock – Reduce human error –Start collecting process metrics baselines to analyze future process improvements – Reduce paper, fax, emails, etc. Cons: – Only small efficiency gains are realized – Automating non-value add processes – Missed opportunity to optimize work flow – May never get A chance to improve processes
  • 27. Business Process Improvement Changes how an organization operates Changes operation with new techniques (i.e., take advantage of new opportunities offered by technology) Can improve efficiency (i.e., doing things right) Can improve effectiveness (i.e., doing the right things) More focus on to-be system for improvement (i.e., less on as-is system than BPA)
  • 28. Business Process Improvement Goal: Goal: Efficiency and effectiveness for users What are the negative and positive impacts of BPI?
  • 29. Business Process Improvement Pros: - Reduce or eliminate waste - Potential huge return on investment -Improve employee performance and customer experience - Reduce complexity of systems - Financial justification of process steps Cons: – Potential culture shock issues – Requires more executive support – More expensive to implement –Requires more attention to change management
  • 30. Business Process Reengineering Characteristics: • Change the fundamental way the organization operates • Eliminate the current way of doing business • Making major changes to take advantage of new ideas and technology Goal: Focus on new ideas and new ways of doing business What are the negative and positive impacts of BPR?
  • 31. Business Process Reengineering Pros: - Provides long solution - Gives an appropriate focus to business - Coordinates and integrates several function immediately - Eliminate the delay and unessential activities Cons: -Cause a culture shock that need effective change management -Very high cost and IT Investment, consumes more time and human resources - May not suit to every business - Does not provide immediate results
  • 32. Comparing Analysis Techniques 1. Potential business value 2. Project cost 3. Breadth of analysis 4. Risk
  • 34. Requirement Analysis Strategy in Identifying Improvement 1. Problem Analysis 2. Root-Cause Analysis 3. Duration Analysis 4. Activity Based Costing 5. Informal Benchmarking 6. Outcome Analysis 7. Technology Analysis 8. Activity Elimination
  • 35. 1. Problem Analysis 2. Root Cause Analysis • Problem Analysis –Identify problems with as-is system and to describe how to solve them in the to-be system à Ask users to identify problems and solutions – Improvements tend to be small and incremental –Rarely finds improvements with significant business value • Root Cause Analysis – Challenge assumptions about why problem exists – Trace symptoms to their causes to discover the “real” problem –Identify the root causes of problems rather than symptoms of problems
  • 37. 3. Duration Analysis • Calculate time needed for each process step • Calculate time needed for overall process • Compare the two – a large difference indicates a badly fragmented process • Potential solutions: –Process integration – change the process to use fewer people, each with broader responsibilities –Parallelization – change the process so that individual step are performed simultaneously
  • 38. 4. Activity-Based Costing • Examine the cost of each major process or step in a business process rather than time taken. • Calculate cost of each process step • Consider both direct and indirect costs • Identify most costly steps and focus improvement efforts on them
  • 39. 5. Informal Benchmarking • Studying how other organizations perform the same business process • Helps the organization by introducing ideas that employees may never have considered but that have the potential added value. • Common for customer-facing processes • Interact with other business’ processes as if you are a customer
  • 40. 6. Outcome Analysis • Consider desirable outcomes from customers’ perspective. • System analysts encourage the managers and project sponsor to • pretend they are customers and consider what the organization • could enable the customer to do
  • 41. 7. Technology Analysis • Analysts list important and interesting technologies • Managers list important and interesting technologies • The group identifies how each might be applied to the business and how the business might benefit
  • 42. 8. Activity Elimination • Identify what would happen if each organizational activity were eliminated • Use “force-fit” to test all possibilities
  • 43. 5 . 3 R E Q U I R E M E N T S - G A T H E R I N G T E C H N I Q U E S
  • 44. 1. Interviews 2. JAD 3. Questionnaires 4. Document Analysis 5. Observation
  • 45. 1. Interview • Most commonly used technique • Basic steps: • Selecting Interviewees • Designing Interview Questions (instrument development) • Preparing for the Interview • Conducting the Interview • Post-Interview Follow-up
  • 46. Interview: 1. Selecting Interviewees • Based on information needed • Create interview schedule and the purpose of the interview • Often good to get different perspectives – Managers – Users – Ideally, all key stakeholders • People at different levels of the organization have varying perspectives on the systems. – Gain both high-level and low-level perspectives on an issue
  • 47.
  • 48. 2. Designing Interview Questions • Unstructured interview – Broad, roughly defined information – At the earlier stage of the project • Structured interview – More specific information – At the later stage of the project
  • 49.
  • 50. 3. Preparation Steps • Prepare general interview plan – List of question – Anticipated answers and follow-ups • Confirm areas of knowledge • Set priorities in case of time shortage • Prepare the interviewee – Schedule – Inform of reason for interview – Inform of areas of discussion
  • 51. Interview: 4. Conducting the Interview • Appear professional and unbiased • Record all information • Check on organizational policy regarding tape recording • Be sure you understand all issues and terms • Separate facts from opinions • Give interviewee time to ask questions • Be sure to thank the interviewee • End on time
  • 52. Interview: Conducting the Interview • Don’t worry, be happy • Pay attention • Summarize key points • Be succinct • Be honest • Watch body language
  • 53. 5. Post-Interview Follow-Up • Prepare interview notes • Prepare interview report • Have interviewee review and confirm interview report • Look for gaps and new questions
  • 55. A structured group process focused on determining requirements Involves project team, users, and management working together May reduce scope creep by 50% Very useful technique
  • 56. JAD: Participants • Facilitator – Trained in JAD techniques – Sets agenda and guides group processes • Scribe(s) – Record content of JAD sessions •Users and managers from business area with broad and detailed knowledge
  • 57. • It is important that the participants understand what is expected of the JAD session. • Time commitment – ½ day to several weeks • Close ended questions are seldom used because do not spark the open and frank discussion • Strong management support is needed to release key participants from their usual responsibilities • The JAD session is structured • Careful planning is essential • e-JAD can help alleviate some problems inherent with groups knowledge
  • 58. JAD: Setting • U-Shaped seating • Away from distractions • Whiteboard/flip chart • Prototyping tools • e-JAD
  • 60. Select Participant Desain a JAD Session Preparing for a JAD Session Conducting a JAD Session Post JAD Follow-up
  • 61. JAD: Steps in Conducting the JAD • Participants are selected in the same way as are interview participants • Design questions, use formal agenda, and use top-down structure • Inform the goals and agenda of JAD session to all participant • Facilitator facilitates a JAD Session according to the rules and agenda • Post session follow-up report is prepared and circulated among session attendees.
  • 62. JAD: Post JAD Follow-up •Post-session report is prepared and circulated among session attendees •The report should be completed approximately a week to two after the JAD session
  • 63. • Reducing domination • Encouraging non-contributors • Side discussions • Agenda merry-go-round • Violent agreement • Unresolved conflict • True conflict • Use humor
  • 64. 3. Questionnaires • A set of written questions, often sent to a large number of people • May be paper-based or electronic • Select participants using samples of the population • Design the questions for clarity and ease of analysis • Administer the questionnaire and take steps to get a good response • rate • Questionnaire follow-up report
  • 66. 4.Document Analysis • Study of existing material describing the current system • Provides clues about existing “as-is” system • Forms, reports, policy manuals, organization charts describe the formal • system • Look for the informal system in user additions to forms/report and unused • form/report elements • The most powerful indication that the system needs to be changed is when • users create their own forms or add additional information to existing one
  • 67. 5.Observation • Watch processes being performed • Users/managers often don’t remember everything they do • Checks validity of information gathered other ways • Be aware that behaviors change when people are watched • Be unobtrusive • Careful not to ignore periodic activities • Weekly … Monthly … Annual • Identify peak and lull periods
  • 70. TUGAS DISKUSI KELOMPOK HARI INI https://bit.ly/DISKUSI_ANAPERANCIS Diskusi dan isilah Functional dan Non Functional Requirements sesuai dengan studi kasus projectnya masing- masing Isi di jamboard berikut:
  • 71. TUGAS • Buatlah Requirement Sistem yang terdiri dari 1. Functional Requirement 2. Nonfunctional Requirement Studi kasus : sistem sama dengan tugas sebelumnya Format word / pdf dan dikirimkan ke email syifanurgaida@ittelkom-jkt.ac.id sebelum perkuliahan dimulai
  • 72. Summary • The analysis process focuses on capturing the business requirements for the system • Functional and non-functional business requirements tell what the system must do • Three main requirements analysis techniques are BPA, BPI, and BPR • These techniques vary in potential business value, but also in potential cost and risk • There are five major requirements-gathering techniques that all systems analysts must be able to use: Interviews, JAD, Questionnaires, Document Analysis, and Observation. • Systems analysts must also know how and when to use each as well as how to combine methods.
  • 73. Reference • Dennis, et. al., “Systems Analysis & Design: An Object-Oriented Approach with UML 5th ed”, John Wiley & Sons, 2015. • Whitten, et. al., “Systems Analysis & Design Methods 7th ed”, McGraw-Hill, 2007. • Dennis, et. al., “Systems Analysis & Design 5th ed”, John Wiley & Sons, 2012. • Larman, C., Applying UML Pattern 4th ed, Prentice Hall