The document discusses requirement analysis for information systems projects. It covers topics such as requirement determination techniques, requirement analysis strategies, and requirement gathering techniques. Some key points include:
- Requirement determination aims to understand user needs and define requirements that can be used for system analysis and design. Techniques include interviews, questionnaires, documentation analysis and observation.
- Requirement analysis strategies help identify improvement opportunities, such as problem analysis, duration analysis, and activity elimination.
- Common requirement gathering techniques are interviews, Joint Application Design (JAD) sessions, questionnaires, document analysis, and observation. Each has benefits and challenges to consider.
- The goal of the analysis phase is to fully understand requirements for the new system
Introduction to business process managementmoh2000amed
"Introduction to Business Process Management.pdf": A very good practical guide for Business Process Management with clear steps, I recommend to have a look on this guide specially on the following topics:
Business Process Management Common Body of Knowledge (CBOK) Knowledge Areas. Page 21
Business Process Management Topic Scope. Page 33
Types of Processes. Page 60
Modeling Techniques and Tools. Page 124
Process Analysis Roles. Page 145
Choose the Process. Page 148-150
Introduction to business process managementmoh2000amed
"Introduction to Business Process Management.pdf": A very good practical guide for Business Process Management with clear steps, I recommend to have a look on this guide specially on the following topics:
Business Process Management Common Body of Knowledge (CBOK) Knowledge Areas. Page 21
Business Process Management Topic Scope. Page 33
Types of Processes. Page 60
Modeling Techniques and Tools. Page 124
Process Analysis Roles. Page 145
Choose the Process. Page 148-150
Introduction to Business Process ManagementAlan McSweeney
Training Course - Introduction to Business Process Management
It is intended to be a good general and practical introduction to the subject. It covers the following topics:
1. Business Process Management
2. Process Modelling
3. Process Analysis
4. Process Design
5. Process Performance Management
6. Process Transformation
7. Process Management Organisation
8. Enterprise Process Management
9. Business Process Management Technologies
10. Business Process Management and Business Analysis
11. Business Process Management Technology Review
The systematic use of proven principles, techniques ,languages and tools for the cost-effective analysis ,documentation and on-going evolution of user needs and the external behavior of a system to satisfy those user needs.
Requirement Elicitation
Facilitated Application Specification Technique(FAST)
Quality Function Deployment
USE-CASES
Introduction to Business Process ManagementAlan McSweeney
Training Course - Introduction to Business Process Management
It is intended to be a good general and practical introduction to the subject. It covers the following topics:
1. Business Process Management
2. Process Modelling
3. Process Analysis
4. Process Design
5. Process Performance Management
6. Process Transformation
7. Process Management Organisation
8. Enterprise Process Management
9. Business Process Management Technologies
10. Business Process Management and Business Analysis
11. Business Process Management Technology Review
The systematic use of proven principles, techniques ,languages and tools for the cost-effective analysis ,documentation and on-going evolution of user needs and the external behavior of a system to satisfy those user needs.
Requirement Elicitation
Facilitated Application Specification Technique(FAST)
Quality Function Deployment
USE-CASES
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Launch Your Streaming Platforms in MinutesRoshan Dwivedi
The claim of launching a streaming platform in minutes might be a bit of an exaggeration, but there are services that can significantly streamline the process. Here's a breakdown:
Pros of Speedy Streaming Platform Launch Services:
No coding required: These services often use drag-and-drop interfaces or pre-built templates, eliminating the need for programming knowledge.
Faster setup: Compared to building from scratch, these platforms can get you up and running much quicker.
All-in-one solutions: Many services offer features like content management systems (CMS), video players, and monetization tools, reducing the need for multiple integrations.
Things to Consider:
Limited customization: These platforms may offer less flexibility in design and functionality compared to custom-built solutions.
Scalability: As your audience grows, you might need to upgrade to a more robust platform or encounter limitations with the "quick launch" option.
Features: Carefully evaluate which features are included and if they meet your specific needs (e.g., live streaming, subscription options).
Examples of Services for Launching Streaming Platforms:
Muvi [muvi com]
Uscreen [usencreen tv]
Alternatives to Consider:
Existing Streaming platforms: Platforms like YouTube or Twitch might be suitable for basic streaming needs, though monetization options might be limited.
Custom Development: While more time-consuming, custom development offers the most control and flexibility for your platform.
Overall, launching a streaming platform in minutes might not be entirely realistic, but these services can significantly speed up the process compared to building from scratch. Carefully consider your needs and budget when choosing the best option for you.
Takashi Kobayashi and Hironori Washizaki, "SWEBOK Guide and Future of SE Education," First International Symposium on the Future of Software Engineering (FUSE), June 3-6, 2024, Okinawa, Japan
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Crescat
Crescat is industry-trusted event management software, built by event professionals for event professionals. Founded in 2017, we have three key products tailored for the live event industry.
Crescat Event for concert promoters and event agencies. Crescat Venue for music venues, conference centers, wedding venues, concert halls and more. And Crescat Festival for festivals, conferences and complex events.
With a wide range of popular features such as event scheduling, shift management, volunteer and crew coordination, artist booking and much more, Crescat is designed for customisation and ease-of-use.
Over 125,000 events have been planned in Crescat and with hundreds of customers of all shapes and sizes, from boutique event agencies through to international concert promoters, Crescat is rigged for success. What's more, we highly value feedback from our users and we are constantly improving our software with updates, new features and improvements.
If you plan events, run a venue or produce festivals and you're looking for ways to make your life easier, then we have a solution for you. Try our software for free or schedule a no-obligation demo with one of our product specialists today at crescat.io
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...kalichargn70th171
A dynamic process unfolds in the intricate realm of software development, dedicated to crafting and sustaining products that effortlessly address user needs. Amidst vital stages like market analysis and requirement assessments, the heart of software development lies in the meticulous creation and upkeep of source code. Code alterations are inherent, challenging code quality, particularly under stringent deadlines.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
Utilocate offers a comprehensive solution for locate ticket management by automating and streamlining the entire process. By integrating with Geospatial Information Systems (GIS), it provides accurate mapping and visualization of utility locations, enhancing decision-making and reducing the risk of errors. The system's advanced data analytics tools help identify trends, predict potential issues, and optimize resource allocation, making the locate ticket management process smarter and more efficient. Additionally, automated ticket management ensures consistency and reduces human error, while real-time notifications keep all relevant personnel informed and ready to respond promptly.
The system's ability to streamline workflows and automate ticket routing significantly reduces the time taken to process each ticket, making the process faster and more efficient. Mobile access allows field technicians to update ticket information on the go, ensuring that the latest information is always available and accelerating the locate process. Overall, Utilocate not only enhances the efficiency and accuracy of locate ticket management but also improves safety by minimizing the risk of utility damage through precise and timely locates.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
E-commerce Application Development Company.pdfHornet Dynamics
Your business can reach new heights with our assistance as we design solutions that are specifically appropriate for your goals and vision. Our eCommerce application solutions can digitally coordinate all retail operations processes to meet the demands of the marketplace while maintaining business continuity.
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Course 5 - APS2-Requirement and Functional Modeling.pptx
1. INFORMATION SYSTEM ANALYSIS AND DESIGN
ANALISA DAN PERANCANGAN SISTEM INFORMASI – IT21D3
Fakultas Teknik – Program Studi S1 Teknologi Informasi
• Topic 5: Requirement Analysis
• Lecturer: Syifa Nurgaida Yutia, M.T
#InnovationForTheFuture
2.
3.
4. Session Outline
1. Planning (Perencanaan)
Mengapa sistem dibuat?
2. Analysis (Analisis)
Who, what, when, where will the system be?
3. Design (Disain)
Bagaimana sistem akan berkerja?
4. Implementation (Implementasi)
Pengembangan dan pengiriman sistem?
FASE – FASE SDLC
6. Learning
Objectives
Able to create and define a requirement in IS project
Able to explain the various technique for requirement
analysis in IS project
Able to apply the various technique for requirement
analysis in IS project
Able to explain the utilization of requirement analysis
technique in IS project
Able to explain how to do requirements-gathering by using
interview, JAD, questionnaires, document analysis, and
observation in an IS project
Able to explain the utilization of each requirements-
gathering technique
7. 5.1
R E Q U I R E M E N T
D E T E R M I N A T I O N &
REQUIREMENT ANALYSIS TECHNIQUES
8. • The As-Is system : adalah sistem saat ini dan mungkin terkomputerisasi atau
mungkin tidak terkomputerisasi
- Dapatkan sejelas mungkin informasi terkait sistem yang ada saat ini
• The To-Be system : sistem baru yang didasarkan pada persyaratan yang
diperbarui
- Tunjukkan bahwa sistem yang akan datang jauh lebih baik daripada
sistem apa adanya
• System Proposal : penyampaian utama dari Tahap Analisis
- Sistem informasi logis yang diusulkan: persyaratan fungsional dan non-
fungsional
9. • Tujuan dari fase analisis adalah untuk benar-benar memahami persyaratan
sistem baru dan mengembangkan sistem yang menanganinya
– atau memutuskan sistem baru tidak diperlukan
• Usulan Sistem disampaikan kepada komite persetujuan
• Tantangan pertama adalah menemukan orang yang tepat untuk
berpartisipasi.
• Tantangan kedua adalah mengumpulkan dan mengintegrasikan
informasi.
• Penentuan kebutuhan adalah langkah penting dalam SDLC
• Tujuan penentuan kebutuhan adalah untuk mengubah penjelasan tingkat
yang sangat tinggi dari kebutuhan bisnis yang dinyatakan dalam
permintaan sistem menjadi daftar kebutuhan yang lebih tepat yang dapat
digunakan sebagai masukan untuk analisis lainnya (membuat model
fungsional, struktural, dan perilaku ).
10. What is
Requirement?
• Sebuah pernyataan tentang apa yang harus
dilakukan system
• Pernyataan karakteristik yang harus dimiliki system
• Fokus pada kebutuhan pengguna bisnis selama
fase analisis -> Business Requirements
• Persyaratan akan berubah seiring waktu saat
proyek bergerak dari analisis ke desain ke
implementasi
• Jadi, waspadai project scope creep (kondisi
requirement yang bertambah terus menerus)
11. What is the differences
between
requirement in analysis phase
and design phase?
User, Clients System Analyst
Business Analyst,
Logical Req
Programmer, Developer
Technical Analyst
User (business person) perspectives VS Developer perspectives
13. Functional
Requirements
• Persyaratan Fungsional: berhubungan dengan
proses atau data
• Proses yang harus dilakukan sistem
• Informasi yang harus terkandung sistem
• Fokus pada fungsionalitas fitur
14. Nonfunctional
Requirements
• Persyaratan Nonfungsional: berkaitan dengan
kinerja atau kegunaan
• Behavioral properties yang harus dipertimbangkan
oleh system
• Operasional
• Kinerja
• Keamanan
• Aspek budaya dan politik
• Persyaratan nonfungsional dapat memengaruhi
mode fungsional, struktural, dan behavioral model
17. Documenting
Requirements
• Requirements definition report
– Text document listing requirements in outline form
– Priorities may be included
• Key purpose is to define the project scope: what is and is not to be
included.
• Your accountability and responsibility to the IS Project is proven by this
documentation
18. Purposes of
a requirements
specification
documents
A requirements specification document is used by
many different stakeholder for different purposes:
1. Customer - part of a formal contract
2. Manager - basis for the project plan
3. Developer - basis for the design and
implementation
4. Tester - document to test the system against
5. Maintainer - starting point for understanding the
system
19. Determining
Requirements
• Participation by business users/experts and IT analyst is
• essential
– If done only by IT analyst, may not address true business needs
– If done only by business experts, may not take advantage of ->
technology simply automate an existing systems
• Three techniques help users discover their needs for the new
system:
1. Business Process Automation (BPA)
2. Business Process Improvement (BPI)
3. Business Process Reengineering (BPR)
20. Basic Process of Analysis
(Determining Requirements)
1. Understand the “As-Is” system
2. Identify improvement opportunities
3. Develop the “To-Be” system concept
• Techniques vary in amount of change
– BPA (Business Process Automation) – small change
– BPI (Business Process Improvement) – moderate change
– BPR ((Business Process Reengineering) – significant change
• Additional information gathering techniques are needed as well
21. Requirement
Definition
• Creating a requirements definition is an iterative and ongoing process.
• However, the evolution of the requirements definition must be carefully
managed -> scope creep
• Real-world problem with requirement determination:
1) Access to the correct set of users to uncover the complete set of requirements
2) Specification of the requirements may be inadequate
3) Some requirements are simply unknowable at the beginning of a development process
4) Verifying and validating of requirements can be very difficult
18
22.
23. 5.2
R E Q U I R E M E N T
A N A L Y S I S
T E C H N I Q U E S
24. Discovering Needs
of New Systems
1. BUSINESS PROCESS
AUTOMATION
2. BUSINESS PROCESS
IMPROVEMENT
3. BUSINESS PROCESS
REENGINEERING
26. Business Process
Automation
Pros:
– Quick wins (unless processes are extremely complex)
– Less culture shock
– Reduce human error
–Start collecting process metrics baselines to analyze
future process improvements
– Reduce paper, fax, emails, etc.
Cons:
– Only small efficiency gains are realized
– Automating non-value add processes
– Missed opportunity to optimize work flow
– May never get A chance to improve processes
27. Business Process
Improvement
Changes how an organization operates
Changes operation with new techniques (i.e., take advantage of
new opportunities offered by technology)
Can improve efficiency (i.e., doing things right)
Can improve effectiveness (i.e., doing the right things)
More focus on to-be system for improvement (i.e., less on as-is
system than BPA)
29. Business Process
Improvement
Pros:
- Reduce or eliminate waste
- Potential huge return on investment
-Improve employee performance and customer
experience
- Reduce complexity of systems
- Financial justification of process steps
Cons:
– Potential culture shock issues
– Requires more executive support
– More expensive to implement
–Requires more attention to change
management
30. Business Process
Reengineering
Characteristics:
• Change the fundamental way the organization operates
• Eliminate the current way of doing business
• Making major changes to take advantage of new ideas and technology
Goal: Focus on new ideas and new ways of doing business
What are the negative and positive impacts of BPR?
31. Business Process
Reengineering
Pros:
- Provides long solution
- Gives an appropriate focus to business
- Coordinates and integrates several function immediately
- Eliminate the delay and unessential activities
Cons:
-Cause a culture shock that need effective change
management
-Very high cost and IT Investment, consumes more
time and human resources
- May not suit to every business
- Does not provide immediate results
35. 1. Problem
Analysis
2. Root Cause Analysis
• Problem Analysis
–Identify problems with as-is system and to
describe how to solve them in the to-be system à
Ask users to identify problems and solutions
– Improvements tend to be small and
incremental
–Rarely finds improvements with significant
business value
• Root Cause Analysis
– Challenge assumptions about why problem exists
– Trace symptoms to their causes to discover the
“real” problem
–Identify the root causes of problems rather than
symptoms of
problems
37. 3. Duration
Analysis
• Calculate time needed for each process step
• Calculate time needed for overall process
• Compare the two – a large difference indicates a badly fragmented process
• Potential solutions:
–Process integration – change the process to use fewer people, each with
broader responsibilities
–Parallelization – change the process so that individual step are performed
simultaneously
38. 4. Activity-Based
Costing
• Examine the cost of each major process or step in a business process rather than time
taken.
• Calculate cost of each process step
• Consider both direct and indirect costs
• Identify most costly steps and focus improvement efforts on
them
39. 5. Informal
Benchmarking
• Studying how other organizations perform the same business process
• Helps the organization by introducing ideas that employees may never have
considered but that have the potential added value.
• Common for customer-facing processes
• Interact with other business’ processes as if you are a customer
40. 6. Outcome
Analysis
• Consider desirable outcomes from customers’ perspective.
• System analysts encourage the managers and project sponsor to
• pretend they are customers and consider what the organization
• could enable the customer to do
41. 7. Technology
Analysis
• Analysts list important and interesting technologies
• Managers list important and interesting technologies
• The group identifies how each might be applied to the business and how the business
might benefit
42. 8. Activity
Elimination
• Identify what would happen if each organizational activity were
eliminated
• Use “force-fit” to test all possibilities
43. 5 . 3
R E Q U I R E M E N T S
- G A T H E R I N G
T E C H N I Q U E S
45. 1. Interview
• Most commonly used technique
• Basic steps:
• Selecting Interviewees
• Designing Interview Questions (instrument
development)
• Preparing for the Interview
• Conducting the Interview
• Post-Interview Follow-up
46. Interview:
1. Selecting
Interviewees
• Based on information needed
• Create interview schedule and the purpose of the interview
• Often good to get different perspectives
– Managers
– Users
– Ideally, all key stakeholders
• People at different levels of the organization have varying
perspectives on the
systems.
– Gain both high-level and low-level perspectives on an issue
47.
48. 2. Designing
Interview
Questions
• Unstructured interview
– Broad, roughly defined information
– At the earlier stage of the project
• Structured interview
– More specific information
– At the later stage of the project
49.
50. 3. Preparation
Steps
• Prepare general interview plan
– List of question
– Anticipated answers and follow-ups
• Confirm areas of knowledge
• Set priorities in case of time shortage
• Prepare the interviewee
– Schedule
– Inform of reason for interview
– Inform of areas of discussion
51. Interview:
4. Conducting
the Interview
• Appear professional and unbiased
• Record all information
• Check on organizational policy regarding tape recording
• Be sure you understand all issues and terms
• Separate facts from opinions
• Give interviewee time to ask questions
• Be sure to thank the interviewee
• End on time
55. A structured group process focused on determining
requirements
Involves project team, users, and management
working together
May reduce scope creep by 50%
Very useful technique
56. JAD: Participants
• Facilitator
– Trained in JAD techniques
– Sets agenda and guides group processes
• Scribe(s)
– Record content of JAD sessions
•Users and managers from business area with
broad and detailed knowledge
57. • It is important that the participants understand what is expected
of the JAD session.
• Time commitment – ½ day to several weeks
• Close ended questions are seldom used because do not spark
the open and frank discussion
• Strong management support is needed to release key
participants from their usual responsibilities
• The JAD session is structured
• Careful planning is essential
• e-JAD can help alleviate some problems inherent with groups
knowledge
61. JAD: Steps in
Conducting the
JAD
• Participants are selected in the same way as
are interview participants
• Design questions, use formal agenda, and use
top-down structure
• Inform the goals and agenda of JAD session to
all participant
• Facilitator facilitates a JAD Session according to
the rules and agenda
• Post session follow-up report is prepared and
circulated among session attendees.
62. JAD: Post JAD
Follow-up
•Post-session report is prepared and circulated
among session attendees
•The report should be completed approximately a
week to two after the JAD
session
64. 3. Questionnaires
• A set of written questions, often sent to a large
number of people
• May be paper-based or electronic
• Select participants using samples of the population
• Design the questions for clarity and ease of analysis
• Administer the questionnaire and take steps to get a
good response
• rate
• Questionnaire follow-up report
66. 4.Document Analysis
• Study of existing material describing the current system
• Provides clues about existing “as-is” system
• Forms, reports, policy manuals, organization charts describe the
formal
• system
• Look for the informal system in user additions to forms/report and
unused
• form/report elements
• The most powerful indication that the system needs to be changed
is when
• users create their own forms or add additional information to existing
one
67. 5.Observation
• Watch processes being performed
• Users/managers often don’t remember everything they do
• Checks validity of information gathered other ways
• Be aware that behaviors change when people are watched
• Be unobtrusive
• Careful not to ignore periodic activities
• Weekly … Monthly … Annual
• Identify peak and lull periods
70. TUGAS DISKUSI
KELOMPOK HARI INI
https://bit.ly/DISKUSI_ANAPERANCIS
Diskusi dan isilah Functional dan
Non Functional Requirements sesuai
dengan studi kasus projectnya masing-
masing
Isi di jamboard berikut:
71. TUGAS
• Buatlah Requirement Sistem yang terdiri dari
1. Functional Requirement
2. Nonfunctional Requirement
Studi kasus : sistem sama dengan tugas
sebelumnya
Format word / pdf dan dikirimkan ke email
syifanurgaida@ittelkom-jkt.ac.id sebelum
perkuliahan dimulai
72. Summary
• The analysis process focuses on capturing the business requirements for the
system
• Functional and non-functional business requirements tell what the system
must do
• Three main requirements analysis techniques are BPA, BPI, and BPR
• These techniques vary in potential business value, but also in
potential cost and risk
• There are five major requirements-gathering techniques that all
systems analysts must be able to use: Interviews, JAD,
Questionnaires, Document Analysis, and Observation.
• Systems analysts must also know how and when to use each as well
as how to combine methods.