SlideShare a Scribd company logo
Business Analysis
Training
Requirement Elicitation
Techniques
Page 2Classification: Restricted
Agenda
• Requirements Engineering
• Project Scope
• Landscape of Requirements
• Properties of Requirements
• Types of Requirements
• Stakeholder
• Requirements Elicitation
• Techniques
Page 3Classification: Restricted
Project Scope
Defining the proposed project scope includes:
• Describing business objectives
• Determining expected deliverables at a high level in terms of products,
services or
other outcomes
• Documenting business assumptions and constraints
• Building a statement of the anticipated work effort
Page 4Classification: Restricted
Project Scope
Page 5Classification: Restricted
Project Scope Vs Product Scope
• Project Scope
• Product Scope
• Solution Scope
Page 6Classification: Restricted
Vision
Page 7Classification: Restricted
Landscape of Requirements
 A condition or capability needed by a
stakeholder to solve a problem or achieve an
objective.
A condition or capability that must be met or
possessed by the system or system component
to satisfy a contract, standard, specification or
other formally imposed documents .
A documented representation of a condition or
capability as in (1) or (2).
What is a Requirement?
Page 8Classification: Restricted
Properties of Requirements
 Functionality – What the system can do.
Constraints – What the system cannot do.
Contents – What must be present in the system.
Condition - A state that must exist at a particular time.
Process - How a system provides a capability.
Page 9Classification: Restricted
Types of Requirements
Business Requirements are higher level requirements of the goals, objectives
or needs of the enterprise. They describe such things as the reasons why a
project is initiated, what the project will achieve, and the metrics which will be
used to measure its success. Business Requirements describe needs of the
organization as a whole, and not groups or stakeholders within it. They are
developed and defined through enterprise analysis.
User Requirements are statements of the needs of a particular stakeholder or
class of stakeholders. They describe the needs that a given stakeholder has
and how that stakeholder will interact with a solution. Stakeholder
requirements serve as a bridge between business requirements and the
various classes of solution requirements. They are developed and defined
through requirements analysis.
Page 10Classification: Restricted
Types of Requirements
Solution Requirements describe the characteristics of a solution that meet
business requirements and stakeholder requirements. They are developed and
defined through requirements analysis. They are frequently divided into sub-
categories:
Functional Requirements describe the behavior and information that the
solution will manage. They describe capabilities the system will be able to
perform in terms of behaviors or operations.
Non-functional Requirements capture conditions that do not directly relate
to the behavior or functionality of the solution, but rather describe
environmental conditions under which the solution must remain effective or
qualities that the systems must have. They are also known as quality or
supplementary requirements. These can include requirements related to
capacity, speed, security, availability and the information architecture and
presentation of the user interface.
Page 11Classification: Restricted
Types of Requirements
Transition Requirements describe capabilities that the solution must have in
order to facilitate transition from the current state of the enterprise to a
desired future state, but that will not be needed once that transition is
complete. They are differentiated from other requirements types because
they are always temporary in nature and because they cannot be developed
until both an existing and new solution are defined. They typically cover
data conversion from existing systems, skill gaps that must be addressed,
and other related changes to reach the desired future state. They are
developed and defined through solution assessment and validation.
Assumptions and Constraints identify aspects of the problem domain that
are not functional requirements of a solution and will limit or impact the
design of a solution.
Page 12Classification: Restricted
Requirements Engineering
• Requirements Engineering, also called as Requirements analysis, is the
process of determining user expectations for a new or modified product.
These features, called requirements, must be quantifiable, relevant and
detailed. In software engineering, such requirements are often called
functional specifications
Page 13Classification: Restricted
Business Requirements Initiation
• Stakeholder Analysis
• Apply Requirement Elicitation Techniques
• Sort the Requirements
• Prioritize Requirements
• Validate Requirements
Page 14Classification: Restricted
Stakeholder Analysis
• Identify Stakeholders
• Stakeholders Listing Document
• Stakeholders Summary
• RASCI Matrix-Responsible, Accountable, Supporting, Consulted, Informed
Page 15Classification: Restricted
Who is Stakeholder?
• A stakeholder is any person or organization that is actively involved in a
project, or whose interests may be affected positively or negatively by
execution of a project.
15
Page 16Classification: Restricted
16
Page 17Classification: Restricted
Stakeholders
• Customers
• Users
• Management
• Competitors
• Regulators
Page 18Classification: Restricted
Stakeholder Analysis – RACI Matrix
Page 19Classification: Restricted
Requirements Elicitation
Page 21Classification: Restricted
Page 22Classification: Restricted
Page 23Classification: Restricted
Page 24Classification: Restricted
Page 25Classification: Restricted
Cont’d…
Focus Groups
• It is a technique where prequalified stakeholders and SMEs are brought
together to elicit their attitudes/ideas about a product, service or result
• It is guided by a moderator who help the group focused and produces the
report
• Focus group can gather in a same room or online over network
• It can be utilized during any life-cycle state: exploratory, under development,
ready to launch, or in production
• It is typically more structured unlike brainstorming where goal is to actively
seek broad, creative, even exaggerated ideas
Page 26Classification: Restricted
Page 27Classification: Restricted
Page 28Classification: Restricted
Cont’d…Interviews
• It is a common/easy technique used in requirement gathering
• It is a formal or informal direct talking approach to gather information
• Performed by either prepared or spontaneous questions and
recording responses
• It may be one to one or one to multiple or multiple to multiple
• This technique helps in obtaining highly focused business process
knowledge from stake holder
• This approach needs less planning and less stakeholder commitment
for small groups
Page 29Classification: Restricted
Page 30Classification: Restricted
Cont’d…Observations
• It is a direct way of viewing individuals in their work environment to see how a
task, job or a process is carried out
• This method is used when user has difficulty allotting time or articulating
requirement
• It is also called as Job Shadowing or Following people around
• It is also used to study the detailed process and to uncover hidden requirements
• This technique is appropriate when documenting details about current processes
or if the project is intended to enhance or change the current process
• Types of Observation:
• Passive/Invisible
• Active/Visible
Page 31Classification: Restricted
31
Page 32Classification: Restricted
32
Page 33Classification: Restricted
Cont’d…Prototyping
• It is providing a working model of a expected product
• It gives better clarity in visual form rather than just oral or written representation
of requirements
• Prototypes can be created by various mock-ups and it helps users in
experimenting, providing feedback and revision
• When sufficient revisions are done to prototype, then the requirements gathered
are moved to next phase of the project
• Types of Prototype:
• Horizontal – Eg: Just UI with no backend logic gives overview
• Vertical – Eg: Both UI and logic gives deep understanding
Page 34Classification: Restricted
Page 35Classification: Restricted
Cont’d…Facilitated Work Shops
• It is a most effective & structured way to gather and deliver high
quality cross-functional requirements quickly
• It is a highly productive focused event attended by carefully selected
key stakeholders and subject matter experts for a short, intensive
period
• It is guided and moderated by a facilitator who has strong subject
knowledge/experience
• This technique helps in identifying issues and get resolved quickly
than individual sessions
• It is also called as JAD session where it brings users and development
team together
• It can promote trust, mutual understanding, and strong
communications among the project stakeholders and project team
Page 36Classification: Restricted
Page 37Classification: Restricted
Cont’d…Questionnaires and Surveys
• It is set of written questions to gather requirement from wide range of people in
very short period of time
• These questions/surveys are sent to stakeholders and SMEs
• This technique is used when statistical analysis is required among the ideas
• Types of Questions:
• Closed – Questions with predefined list of responses/answers
• Open ended – Questions which are open to answer anything
• Normally Closed questions are used in Surveys as it helps analyzing the responses
faster
Page 38Classification: Restricted
Topic to be covered in next session
•Introduction to OOA and UML
•Stated vs Un-stated
•Software Analysis and Design
•Modeling
•UML
•Why UML
•Overview
•Types
•Use Case Diagram
•Types of Actor
•Class Diagram
•What is Class Diagram
•Class Representation
•Types of Class
•Sequence Diagram
•Interaction Diagram
Page 39Classification: Restricted
Thank you

More Related Content

What's hot

Introspection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation TechniqueIntrospection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation Technique
Fahad Farooq
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
SwatiS-BA
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
Deepak Kadam
 
Business Analysis 101
Business Analysis 101Business Analysis 101
Business Analysis 101
Abhishek Navlakha, PMP, CSM
 
Business Analyst Training in Hyderabad
Business Analyst Training in HyderabadBusiness Analyst Training in Hyderabad
Business Analyst Training in Hyderabad
Ugs8008
 
Business Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An IntroductionBusiness Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An Introduction
Egrove Systems Corporation
 
The Evolving Role of the Business Analyst
The Evolving Role of the Business AnalystThe Evolving Role of the Business Analyst
The Evolving Role of the Business Analyst
Tracy Cook
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
Nethan Shaik
 
Scanning of Business Analysis
Scanning of Business AnalysisScanning of Business Analysis
Scanning of Business Analysis
TechShiv
 
A Business Analyst
A Business AnalystA Business Analyst
A Business Analyst
Abbasgulu Allahverdili
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitation
Syed Zaid Irshad
 
Jira overview
Jira overviewJira overview
Jira overview
thanhlamct
 
What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?
Patrick van Abbema, PMP, CBAP, CSP
 
Introductory session on business analyst training1
Introductory session on business analyst training1Introductory session on business analyst training1
Introductory session on business analyst training1Suprriya Nair
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation TechniquesSwati Sinha
 
Requirement specification
Requirement specificationRequirement specification
Requirement specificationAbdul Basit
 
Business Analyst Training
Business  Analyst  TrainingBusiness  Analyst  Training
Business Analyst Training
Craig Brown
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
Benoy Ramachandran
 
Agile Requirements Gathering Techniques
Agile Requirements Gathering TechniquesAgile Requirements Gathering Techniques
Agile Requirements Gathering Techniques
Onur Demir
 
8 essential business analysis steps
8 essential business analysis steps8 essential business analysis steps
8 essential business analysis steps
Abhinav Sabharwal- Business Analyst Mumbai
 

What's hot (20)

Introspection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation TechniqueIntrospection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation Technique
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
 
Business Analysis 101
Business Analysis 101Business Analysis 101
Business Analysis 101
 
Business Analyst Training in Hyderabad
Business Analyst Training in HyderabadBusiness Analyst Training in Hyderabad
Business Analyst Training in Hyderabad
 
Business Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An IntroductionBusiness Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An Introduction
 
The Evolving Role of the Business Analyst
The Evolving Role of the Business AnalystThe Evolving Role of the Business Analyst
The Evolving Role of the Business Analyst
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Scanning of Business Analysis
Scanning of Business AnalysisScanning of Business Analysis
Scanning of Business Analysis
 
A Business Analyst
A Business AnalystA Business Analyst
A Business Analyst
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitation
 
Jira overview
Jira overviewJira overview
Jira overview
 
What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?What is in your Business Analysis Toolkit?
What is in your Business Analysis Toolkit?
 
Introductory session on business analyst training1
Introductory session on business analyst training1Introductory session on business analyst training1
Introductory session on business analyst training1
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation Techniques
 
Requirement specification
Requirement specificationRequirement specification
Requirement specification
 
Business Analyst Training
Business  Analyst  TrainingBusiness  Analyst  Training
Business Analyst Training
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Agile Requirements Gathering Techniques
Agile Requirements Gathering TechniquesAgile Requirements Gathering Techniques
Agile Requirements Gathering Techniques
 
8 essential business analysis steps
8 essential business analysis steps8 essential business analysis steps
8 essential business analysis steps
 

Similar to Requirement Elicitation Techniques

Requirement Elicitation Techniques
Requirement Elicitation Techniques   Requirement Elicitation Techniques
Requirement Elicitation Techniques
Lakshmi-BA
 
Session 04 - Project Planning
Session 04 - Project PlanningSession 04 - Project Planning
Session 04 - Project Planning
RakeshSinhaPMP
 
BABOK Study Group - meeting 1
BABOK Study Group - meeting 1BABOK Study Group - meeting 1
BABOK Study Group - meeting 1
Paweł Zubkiewicz
 
Requirementsdevelopment 120207165817-phpapp02
Requirementsdevelopment 120207165817-phpapp02Requirementsdevelopment 120207165817-phpapp02
Requirementsdevelopment 120207165817-phpapp02Oginni Olumide
 
Enterprise Analysis
Enterprise Analysis Enterprise Analysis
Enterprise Analysis
Shwetha-BA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Sunil-QA
 
Req.Management & Analysis.pptx
Req.Management & Analysis.pptxReq.Management & Analysis.pptx
Req.Management & Analysis.pptx
KYaghi1
 
Business Analyst Overview
Business Analyst OverviewBusiness Analyst Overview
Business Analyst Overview
Salil Vaidya
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development
Mark Opanasiuk
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
Kumail Raza
 
GAP Analysis
GAP AnalysisGAP Analysis
GAP Analysis
Lakshmi-BA
 
BA Techniques BABOK
BA Techniques BABOKBA Techniques BABOK
BA Techniques BABOK
QBI Institute
 
Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2
Lakshmi-BA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Veneet-BA
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
moris lee
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
Sunil-QA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Mihika-QA
 
Project Formulation and Management - Project Scope Management
Project Formulation and Management - Project Scope ManagementProject Formulation and Management - Project Scope Management
Project Formulation and Management - Project Scope Management
Hrishikesh Satpute
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
Shwetha-BA
 
Session 01 - Introduction to Business Analysis
Session 01 - Introduction to Business AnalysisSession 01 - Introduction to Business Analysis
Session 01 - Introduction to Business Analysis
OmkarBA
 

Similar to Requirement Elicitation Techniques (20)

Requirement Elicitation Techniques
Requirement Elicitation Techniques   Requirement Elicitation Techniques
Requirement Elicitation Techniques
 
Session 04 - Project Planning
Session 04 - Project PlanningSession 04 - Project Planning
Session 04 - Project Planning
 
BABOK Study Group - meeting 1
BABOK Study Group - meeting 1BABOK Study Group - meeting 1
BABOK Study Group - meeting 1
 
Requirementsdevelopment 120207165817-phpapp02
Requirementsdevelopment 120207165817-phpapp02Requirementsdevelopment 120207165817-phpapp02
Requirementsdevelopment 120207165817-phpapp02
 
Enterprise Analysis
Enterprise Analysis Enterprise Analysis
Enterprise Analysis
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Req.Management & Analysis.pptx
Req.Management & Analysis.pptxReq.Management & Analysis.pptx
Req.Management & Analysis.pptx
 
Business Analyst Overview
Business Analyst OverviewBusiness Analyst Overview
Business Analyst Overview
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
 
GAP Analysis
GAP AnalysisGAP Analysis
GAP Analysis
 
BA Techniques BABOK
BA Techniques BABOKBA Techniques BABOK
BA Techniques BABOK
 
Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Project Formulation and Management - Project Scope Management
Project Formulation and Management - Project Scope ManagementProject Formulation and Management - Project Scope Management
Project Formulation and Management - Project Scope Management
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
Session 01 - Introduction to Business Analysis
Session 01 - Introduction to Business AnalysisSession 01 - Introduction to Business Analysis
Session 01 - Introduction to Business Analysis
 

More from Shwetha-BA

Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
Shwetha-BA
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
Shwetha-BA
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
Shwetha-BA
 
Software Development Life Cycle – SDLC
Software Development Life Cycle – SDLCSoftware Development Life Cycle – SDLC
Software Development Life Cycle – SDLC
Shwetha-BA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Shwetha-BA
 
Introduction to OOA and UML
Introduction to OOA and UMLIntroduction to OOA and UML
Introduction to OOA and UML
Shwetha-BA
 
Business Aanalysis Resume/Interview preparation
Business Aanalysis Resume/Interview preparation Business Aanalysis Resume/Interview preparation
Business Aanalysis Resume/Interview preparation
Shwetha-BA
 
Solution Evaluation (BA Role)
Solution Evaluation (BA Role)   Solution Evaluation (BA Role)
Solution Evaluation (BA Role)
Shwetha-BA
 
Requirements Management
Requirements Management Requirements Management
Requirements Management
Shwetha-BA
 
Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2 Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2
Shwetha-BA
 
Introduction to OOA and UML - Part 1
Introduction to OOA and UML - Part 1Introduction to OOA and UML - Part 1
Introduction to OOA and UML - Part 1
Shwetha-BA
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLC
Shwetha-BA
 

More from Shwetha-BA (12)

Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
 
Software Development Life Cycle – SDLC
Software Development Life Cycle – SDLCSoftware Development Life Cycle – SDLC
Software Development Life Cycle – SDLC
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Introduction to OOA and UML
Introduction to OOA and UMLIntroduction to OOA and UML
Introduction to OOA and UML
 
Business Aanalysis Resume/Interview preparation
Business Aanalysis Resume/Interview preparation Business Aanalysis Resume/Interview preparation
Business Aanalysis Resume/Interview preparation
 
Solution Evaluation (BA Role)
Solution Evaluation (BA Role)   Solution Evaluation (BA Role)
Solution Evaluation (BA Role)
 
Requirements Management
Requirements Management Requirements Management
Requirements Management
 
Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2 Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2
 
Introduction to OOA and UML - Part 1
Introduction to OOA and UML - Part 1Introduction to OOA and UML - Part 1
Introduction to OOA and UML - Part 1
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLC
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Requirement Elicitation Techniques

  • 2. Page 2Classification: Restricted Agenda • Requirements Engineering • Project Scope • Landscape of Requirements • Properties of Requirements • Types of Requirements • Stakeholder • Requirements Elicitation • Techniques
  • 3. Page 3Classification: Restricted Project Scope Defining the proposed project scope includes: • Describing business objectives • Determining expected deliverables at a high level in terms of products, services or other outcomes • Documenting business assumptions and constraints • Building a statement of the anticipated work effort
  • 5. Page 5Classification: Restricted Project Scope Vs Product Scope • Project Scope • Product Scope • Solution Scope
  • 7. Page 7Classification: Restricted Landscape of Requirements  A condition or capability needed by a stakeholder to solve a problem or achieve an objective. A condition or capability that must be met or possessed by the system or system component to satisfy a contract, standard, specification or other formally imposed documents . A documented representation of a condition or capability as in (1) or (2). What is a Requirement?
  • 8. Page 8Classification: Restricted Properties of Requirements  Functionality – What the system can do. Constraints – What the system cannot do. Contents – What must be present in the system. Condition - A state that must exist at a particular time. Process - How a system provides a capability.
  • 9. Page 9Classification: Restricted Types of Requirements Business Requirements are higher level requirements of the goals, objectives or needs of the enterprise. They describe such things as the reasons why a project is initiated, what the project will achieve, and the metrics which will be used to measure its success. Business Requirements describe needs of the organization as a whole, and not groups or stakeholders within it. They are developed and defined through enterprise analysis. User Requirements are statements of the needs of a particular stakeholder or class of stakeholders. They describe the needs that a given stakeholder has and how that stakeholder will interact with a solution. Stakeholder requirements serve as a bridge between business requirements and the various classes of solution requirements. They are developed and defined through requirements analysis.
  • 10. Page 10Classification: Restricted Types of Requirements Solution Requirements describe the characteristics of a solution that meet business requirements and stakeholder requirements. They are developed and defined through requirements analysis. They are frequently divided into sub- categories: Functional Requirements describe the behavior and information that the solution will manage. They describe capabilities the system will be able to perform in terms of behaviors or operations. Non-functional Requirements capture conditions that do not directly relate to the behavior or functionality of the solution, but rather describe environmental conditions under which the solution must remain effective or qualities that the systems must have. They are also known as quality or supplementary requirements. These can include requirements related to capacity, speed, security, availability and the information architecture and presentation of the user interface.
  • 11. Page 11Classification: Restricted Types of Requirements Transition Requirements describe capabilities that the solution must have in order to facilitate transition from the current state of the enterprise to a desired future state, but that will not be needed once that transition is complete. They are differentiated from other requirements types because they are always temporary in nature and because they cannot be developed until both an existing and new solution are defined. They typically cover data conversion from existing systems, skill gaps that must be addressed, and other related changes to reach the desired future state. They are developed and defined through solution assessment and validation. Assumptions and Constraints identify aspects of the problem domain that are not functional requirements of a solution and will limit or impact the design of a solution.
  • 12. Page 12Classification: Restricted Requirements Engineering • Requirements Engineering, also called as Requirements analysis, is the process of determining user expectations for a new or modified product. These features, called requirements, must be quantifiable, relevant and detailed. In software engineering, such requirements are often called functional specifications
  • 13. Page 13Classification: Restricted Business Requirements Initiation • Stakeholder Analysis • Apply Requirement Elicitation Techniques • Sort the Requirements • Prioritize Requirements • Validate Requirements
  • 14. Page 14Classification: Restricted Stakeholder Analysis • Identify Stakeholders • Stakeholders Listing Document • Stakeholders Summary • RASCI Matrix-Responsible, Accountable, Supporting, Consulted, Informed
  • 15. Page 15Classification: Restricted Who is Stakeholder? • A stakeholder is any person or organization that is actively involved in a project, or whose interests may be affected positively or negatively by execution of a project. 15
  • 17. Page 17Classification: Restricted Stakeholders • Customers • Users • Management • Competitors • Regulators
  • 25. Page 25Classification: Restricted Cont’d… Focus Groups • It is a technique where prequalified stakeholders and SMEs are brought together to elicit their attitudes/ideas about a product, service or result • It is guided by a moderator who help the group focused and produces the report • Focus group can gather in a same room or online over network • It can be utilized during any life-cycle state: exploratory, under development, ready to launch, or in production • It is typically more structured unlike brainstorming where goal is to actively seek broad, creative, even exaggerated ideas
  • 28. Page 28Classification: Restricted Cont’d…Interviews • It is a common/easy technique used in requirement gathering • It is a formal or informal direct talking approach to gather information • Performed by either prepared or spontaneous questions and recording responses • It may be one to one or one to multiple or multiple to multiple • This technique helps in obtaining highly focused business process knowledge from stake holder • This approach needs less planning and less stakeholder commitment for small groups
  • 30. Page 30Classification: Restricted Cont’d…Observations • It is a direct way of viewing individuals in their work environment to see how a task, job or a process is carried out • This method is used when user has difficulty allotting time or articulating requirement • It is also called as Job Shadowing or Following people around • It is also used to study the detailed process and to uncover hidden requirements • This technique is appropriate when documenting details about current processes or if the project is intended to enhance or change the current process • Types of Observation: • Passive/Invisible • Active/Visible
  • 33. Page 33Classification: Restricted Cont’d…Prototyping • It is providing a working model of a expected product • It gives better clarity in visual form rather than just oral or written representation of requirements • Prototypes can be created by various mock-ups and it helps users in experimenting, providing feedback and revision • When sufficient revisions are done to prototype, then the requirements gathered are moved to next phase of the project • Types of Prototype: • Horizontal – Eg: Just UI with no backend logic gives overview • Vertical – Eg: Both UI and logic gives deep understanding
  • 35. Page 35Classification: Restricted Cont’d…Facilitated Work Shops • It is a most effective & structured way to gather and deliver high quality cross-functional requirements quickly • It is a highly productive focused event attended by carefully selected key stakeholders and subject matter experts for a short, intensive period • It is guided and moderated by a facilitator who has strong subject knowledge/experience • This technique helps in identifying issues and get resolved quickly than individual sessions • It is also called as JAD session where it brings users and development team together • It can promote trust, mutual understanding, and strong communications among the project stakeholders and project team
  • 37. Page 37Classification: Restricted Cont’d…Questionnaires and Surveys • It is set of written questions to gather requirement from wide range of people in very short period of time • These questions/surveys are sent to stakeholders and SMEs • This technique is used when statistical analysis is required among the ideas • Types of Questions: • Closed – Questions with predefined list of responses/answers • Open ended – Questions which are open to answer anything • Normally Closed questions are used in Surveys as it helps analyzing the responses faster
  • 38. Page 38Classification: Restricted Topic to be covered in next session •Introduction to OOA and UML •Stated vs Un-stated •Software Analysis and Design •Modeling •UML •Why UML •Overview •Types •Use Case Diagram •Types of Actor •Class Diagram •What is Class Diagram •Class Representation •Types of Class •Sequence Diagram •Interaction Diagram