SlideShare a Scribd company logo
User Centred Approaches to Information
Services Development
Soft Systems Methodology: Rich Pictures
The Peter Checkland Model
Soft Systems methodology
“…is not a tool or technique to be
used occassionally but a way to
think and act every day…”
Peter Checkland
The Seven Stages
CATWOE Checklist
 Clients: customers of the system
 Actors: people who carry out activities in the system
 Transformation: the changes that take place because
of the system
 Weltanschauung: the world view or accepted
assumption of the system
 Owner: those that the system is answerable to
 Environment: the external influences on the system
CATWOE: An Information Systems Example
Clients: Students
Actors: Librarians
Transformation: Access to copies of relevant
extracts from articles and books to assist in studies
Worldview: Centre for learning with up to date
student support from library services
Owners: Librarians
Environment: Licensing Agencies, Copyright laws
Root definition
 Definition:
‘A system to paint the garden fence’.
 Root definitions are complex BUT NOT definitive:
‘A householder-owned and staffed system to paint the
garden fence, by hand-painting, in keeping with the overall
decoration scheme of the property in order to enhance the
appearance of the property’.
Investigating and understanding
unstructured problems
 The investigation of a situation (case) should provide a
written agreement between the systems analyst
(remember the ‘systems analyst’ could be ‘you’ or ‘you +
team’) and the owner of the problem (one or several
‘stakeholders’). This often forms the basis for the design
of the solution service, product or system (depending on
the scope of the problem/solution)
 Agreement between analyst and the owner of the
problem is essential so that both parties are clear as to
what the problem is before a solution design is sought.
The unstructured situation
 Understanding a new place you have just
arrived at - e.g. on holiday
 A new company that you have just started to
work for
 studying an organisation as part of your
degree course - Organisation Study
 A case study that you have been provided as
an assignment
Understanding unstructured
situations
 Unstructured means - “not formally or
systematically organised:loose, free, open
etc,” - this may seem to be in contradiction to
the term “organisation” itself.
 Exploring and understanding an unstructured
situation requires objective investigation and
analysis
e.g. Why are hospital waiting lists in the UK too long?
Exploring the Unstructured Situation
 Initially,
 the problem owner has identified that something is
wrong or that something needs improving
 Critical analysis is usually applied:
 Approach the problem with an open mind
 View the problem from multiple perspectives
(particularly technological, organisational and people
perspectives)
 The analyst engages in fact finding using
conventional methods, including:
 interviews, observing, reading background material
and documentation, providing questionnaires and
measuring processes.
Exploring the Unstructured Situation
 The analyst gains a mental picture of the
unstructured situation.
 Identifies
 roles,
 responsibilities,
 processes and
 accepted norms.
 Produces a definition of the unstructured
situation, by using, for example:
 Rich pictures and/or CATWOE
Rich Picture
 A rich picture is a sketch or diagram, using specific
symbols, usually hand drawn, that depicts these key
aspects of a situation:
 the organisational structure
 the physical characteristics of the situation, buildings
etc.
 the processes that are carried out by the
situation/system
 the relationship between processes
 issues expressed or felt by individuals in the situation -
complaints, criticisms, feelings etc
Commonly used symbols
A few symbols are commonly used to describe certain entities within
the situations. But these symbols are not prescriptive and any such
pictorial representations may be used.
Movement or Transportation
External Scrutiny
Conflict or disagreement
A person in roleA thought or opinion
A relationship
A simple rich picture
CLA
Publishers
Authors
Librarian
You can’t
copy that!
I don’t have
time to sort this
Photocopy
to paper to
give in
class or
post
or Scan for
online
access
Academic
Student
Too few copies +
too slow by post
The Rich Picture – more art than science?
Holistic, ongoing, subject to revision as
problem is further investigated …
Hazards include:
 assumptions made must be justified
 small issues can be blown out of proportion
 too much detail will obscure the overall
richness of the picture
 too little detail will not serve the purpose of
the picture.
Drawing rich pictures
 The rich picture techniques may appear
childish at first but can be a very powerful tool
in understanding an unstructured situation …
Purpose of the Rich Picture
1. To help visualise the complex (unstructured)
situation from all its many perspectives
2. To avoid imposing a rigid structure on the
appreciation of the problem situation
3. To aid an investigative approach by the analyst
4. To act as a communication tool between
participants
The Relevant System
 The rich picture is a pictorial representation of the
problem situation
 In order to move on this needs to be viewed from a
systemic point of view – using the Soft Systems
approach, this is known as the “relevant system”
 The relevant system should be discussed and agreed
between all involved parties
 It is expressed by the use of a root definition –
describing the essence of the relevant system
Example 1
…
Example 2
…
Example 3
…

More Related Content

What's hot

System dynamics- simulation and modeling social systems
System dynamics- simulation and modeling social systemsSystem dynamics- simulation and modeling social systems
System dynamics- simulation and modeling social systems
Farzad Pargar
 
Socio Technical Systems
Socio Technical SystemsSocio Technical Systems
Socio Technical SystemsVikram Rao
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
Ayaz Ahmed
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniques
Alan Dix
 
CATWOE Analysis
CATWOE AnalysisCATWOE Analysis
CATWOE Analysis
Ashesh Pokharel
 
HCI 3e - Ch 18: Modelling rich interaction
HCI 3e - Ch 18:  Modelling rich interactionHCI 3e - Ch 18:  Modelling rich interaction
HCI 3e - Ch 18: Modelling rich interaction
Alan Dix
 
Organizational Renewal: The Challenge of Change
Organizational Renewal: The Challenge of ChangeOrganizational Renewal: The Challenge of Change
Organizational Renewal: The Challenge of Change
Juan Franco
 
Introduction to System Dynamics
Introduction to System DynamicsIntroduction to System Dynamics
Introduction to System Dynamics
De La Salle University-Manila
 
Information and decision support system
Information and decision support systemInformation and decision support system
Information and decision support system
Naveed Zahoor
 
OOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMSOOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMS
Mikel Raj
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1
Alan Dix
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
LOKESH KUMAR
 
Organizational change and its approaches
Organizational change and its approachesOrganizational change and its approaches
Organizational change and its approaches
Aamir chouhan
 
System Development Methodologies
System Development MethodologiesSystem Development Methodologies
System Development Methodologies
Devon Ravihansa
 
XP vs Lean vs FDD
XP vs Lean vs FDDXP vs Lean vs FDD
XP vs Lean vs FDD
Suman Guha
 
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
HCI 3e - Ch 20:  Ubiquitous computing and augmented realitiesHCI 3e - Ch 20:  Ubiquitous computing and augmented realities
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
Alan Dix
 
System Analysis and design Class 1
System Analysis and design Class 1System Analysis and design Class 1
System Analysis and design Class 1
Dr. Mazin Mohamed alkathiri
 
System development
System developmentSystem development
System development
Praveen Minz
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
Alan Dix
 

What's hot (20)

System dynamics- simulation and modeling social systems
System dynamics- simulation and modeling social systemsSystem dynamics- simulation and modeling social systems
System dynamics- simulation and modeling social systems
 
Socio Technical Systems
Socio Technical SystemsSocio Technical Systems
Socio Technical Systems
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniques
 
CATWOE Analysis
CATWOE AnalysisCATWOE Analysis
CATWOE Analysis
 
HCI 3e - Ch 18: Modelling rich interaction
HCI 3e - Ch 18:  Modelling rich interactionHCI 3e - Ch 18:  Modelling rich interaction
HCI 3e - Ch 18: Modelling rich interaction
 
Organizational Renewal: The Challenge of Change
Organizational Renewal: The Challenge of ChangeOrganizational Renewal: The Challenge of Change
Organizational Renewal: The Challenge of Change
 
Introduction to System Dynamics
Introduction to System DynamicsIntroduction to System Dynamics
Introduction to System Dynamics
 
Information and decision support system
Information and decision support systemInformation and decision support system
Information and decision support system
 
OOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMSOOAD UNIT I UML DIAGRAMS
OOAD UNIT I UML DIAGRAMS
 
3 analysis and design overview
3 analysis and design overview3 analysis and design overview
3 analysis and design overview
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Organizational change and its approaches
Organizational change and its approachesOrganizational change and its approaches
Organizational change and its approaches
 
System Development Methodologies
System Development MethodologiesSystem Development Methodologies
System Development Methodologies
 
XP vs Lean vs FDD
XP vs Lean vs FDDXP vs Lean vs FDD
XP vs Lean vs FDD
 
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
HCI 3e - Ch 20:  Ubiquitous computing and augmented realitiesHCI 3e - Ch 20:  Ubiquitous computing and augmented realities
HCI 3e - Ch 20: Ubiquitous computing and augmented realities
 
System Analysis and design Class 1
System Analysis and design Class 1System Analysis and design Class 1
System Analysis and design Class 1
 
System development
System developmentSystem development
System development
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
 

Similar to Soft Systems Methodology

Qualitative research
Qualitative researchQualitative research
Qualitative research
Mir Wajahat
 
Unpacking Understanding by Design By Grant Wiggins, et al
Unpacking Understanding by Design By Grant Wiggins, et alUnpacking Understanding by Design By Grant Wiggins, et al
Unpacking Understanding by Design By Grant Wiggins, et al
Karen Hartle
 
Tu812 tma02 presentation_part_2 version 2 (forum post)
Tu812 tma02 presentation_part_2 version 2 (forum post)Tu812 tma02 presentation_part_2 version 2 (forum post)
Tu812 tma02 presentation_part_2 version 2 (forum post)
Jitse D. J. van Ameijde
 
Introduction to soft systems methodology workshop
Introduction to soft systems methodology workshopIntroduction to soft systems methodology workshop
Introduction to soft systems methodology workshop
MuseumID
 
Five Models for Interaction Between Science Enterprises and Organization Scie...
Five Models for Interaction Between Science Enterprises and Organization Scie...Five Models for Interaction Between Science Enterprises and Organization Scie...
Five Models for Interaction Between Science Enterprises and Organization Scie...
James Howison
 
Subject on a Small Scale: Home-grown vocabularies
Subject on a Small Scale: Home-grown vocabulariesSubject on a Small Scale: Home-grown vocabularies
Subject on a Small Scale: Home-grown vocabularies
Visual Resources Association
 
Case Studys and lesson of how to do case
Case Studys and lesson of how to do caseCase Studys and lesson of how to do case
Case Studys and lesson of how to do case
xx280nwosx
 
Tech for teaching @ goldsmith
Tech for teaching @ goldsmithTech for teaching @ goldsmith
Tech for teaching @ goldsmith
Bath Spa University
 
Exploring Users' Values, Motivations and Emotions
Exploring Users' Values, Motivations and EmotionsExploring Users' Values, Motivations and Emotions
Exploring Users' Values, Motivations and Emotions
Northern User Experience
 
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdfFashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
4934bk
 
Purpose, theory and policy for higher education
Purpose, theory and policy for higher educationPurpose, theory and policy for higher education
Purpose, theory and policy for higher educationGeorge Roberts
 
Research Methodology Chapter 3
Research Methodology Chapter 3Research Methodology Chapter 3
Research Methodology Chapter 3Pulchowk Campus
 
CHER 2015 – If PBL is the answer, then what is the problem?
CHER 2015 – If PBL is the answer, then what is the problem?CHER 2015 – If PBL is the answer, then what is the problem?
CHER 2015 – If PBL is the answer, then what is the problem?
Hans Hyttel
 
Convivial Toolbox
Convivial ToolboxConvivial Toolbox
Convivial Toolbox
R. Sosa
 
Reconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual ModelingReconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual Modeling
Knowledge & Experience
 
General Psychology
General PsychologyGeneral Psychology
General Psychology
Margielyn Aniñon
 
Barba Whats the Worst that Could Happen Workshop
Barba Whats the Worst that Could Happen WorkshopBarba Whats the Worst that Could Happen Workshop
Barba Whats the Worst that Could Happen Workshop
Systemic Design Association (SDA)
 
Research questions and research design
Research questions and research design Research questions and research design
Research questions and research design
Normative
 
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptxchapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
VincentAcapen
 

Similar to Soft Systems Methodology (20)

Qualitative research
Qualitative researchQualitative research
Qualitative research
 
Unpacking Understanding by Design By Grant Wiggins, et al
Unpacking Understanding by Design By Grant Wiggins, et alUnpacking Understanding by Design By Grant Wiggins, et al
Unpacking Understanding by Design By Grant Wiggins, et al
 
Tu812 tma02 presentation_part_2 version 2 (forum post)
Tu812 tma02 presentation_part_2 version 2 (forum post)Tu812 tma02 presentation_part_2 version 2 (forum post)
Tu812 tma02 presentation_part_2 version 2 (forum post)
 
Introduction to soft systems methodology workshop
Introduction to soft systems methodology workshopIntroduction to soft systems methodology workshop
Introduction to soft systems methodology workshop
 
Five Models for Interaction Between Science Enterprises and Organization Scie...
Five Models for Interaction Between Science Enterprises and Organization Scie...Five Models for Interaction Between Science Enterprises and Organization Scie...
Five Models for Interaction Between Science Enterprises and Organization Scie...
 
Subject on a Small Scale: Home-grown vocabularies
Subject on a Small Scale: Home-grown vocabulariesSubject on a Small Scale: Home-grown vocabularies
Subject on a Small Scale: Home-grown vocabularies
 
Case Studys and lesson of how to do case
Case Studys and lesson of how to do caseCase Studys and lesson of how to do case
Case Studys and lesson of how to do case
 
Tech for teaching @ goldsmith
Tech for teaching @ goldsmithTech for teaching @ goldsmith
Tech for teaching @ goldsmith
 
Exploring Users' Values, Motivations and Emotions
Exploring Users' Values, Motivations and EmotionsExploring Users' Values, Motivations and Emotions
Exploring Users' Values, Motivations and Emotions
 
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdfFashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
Fashion Institute of Design and Merchandising Critical Inquiry Essay.pdf
 
Purpose, theory and policy for higher education
Purpose, theory and policy for higher educationPurpose, theory and policy for higher education
Purpose, theory and policy for higher education
 
Research Methodology Chapter 3
Research Methodology Chapter 3Research Methodology Chapter 3
Research Methodology Chapter 3
 
CHER 2015 – If PBL is the answer, then what is the problem?
CHER 2015 – If PBL is the answer, then what is the problem?CHER 2015 – If PBL is the answer, then what is the problem?
CHER 2015 – If PBL is the answer, then what is the problem?
 
R vaughan
R vaughanR vaughan
R vaughan
 
Convivial Toolbox
Convivial ToolboxConvivial Toolbox
Convivial Toolbox
 
Reconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual ModelingReconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual Modeling
 
General Psychology
General PsychologyGeneral Psychology
General Psychology
 
Barba Whats the Worst that Could Happen Workshop
Barba Whats the Worst that Could Happen WorkshopBarba Whats the Worst that Could Happen Workshop
Barba Whats the Worst that Could Happen Workshop
 
Research questions and research design
Research questions and research design Research questions and research design
Research questions and research design
 
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptxchapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
chapter-3-qualitative-research-and-its-importance-in-daily-lives.pptx
 

More from Sunderland City Council

Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development
Sunderland City Council
 
Defining Systems
Defining SystemsDefining Systems
Defining Systems
Sunderland City Council
 
Giving Presentations: Views from the Observatory
Giving Presentations: Views from the ObservatoryGiving Presentations: Views from the Observatory
Giving Presentations: Views from the Observatory
Sunderland City Council
 
Social Media & Project Management
Social Media & Project ManagementSocial Media & Project Management
Social Media & Project Management
Sunderland City Council
 
Problem Solving Skills
Problem Solving SkillsProblem Solving Skills
Problem Solving Skills
Sunderland City Council
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
Sunderland City Council
 
The Peeragogy Handbook
The Peeragogy HandbookThe Peeragogy Handbook
The Peeragogy Handbook
Sunderland City Council
 
Teaching & Learning in Second Life
Teaching & Learning in Second LifeTeaching & Learning in Second Life
Teaching & Learning in Second Life
Sunderland City Council
 
GeoffW's PhD
GeoffW's PhDGeoffW's PhD
Groupthink Revisited
Groupthink RevisitedGroupthink Revisited
Groupthink Revisited
Sunderland City Council
 
Case Study: Sunderland Community Development Network
Case Study: Sunderland Community Development NetworkCase Study: Sunderland Community Development Network
Case Study: Sunderland Community Development Network
Sunderland City Council
 
Time Management
Time ManagementTime Management
Time Management
Sunderland City Council
 
Problem Based Learning: Reflecting on Practice
Problem Based Learning: Reflecting on PracticeProblem Based Learning: Reflecting on Practice
Problem Based Learning: Reflecting on Practice
Sunderland City Council
 
Data Warehousing, Data Mining & Data Visualisation
Data Warehousing, Data Mining & Data VisualisationData Warehousing, Data Mining & Data Visualisation
Data Warehousing, Data Mining & Data Visualisation
Sunderland City Council
 
Database Management & Models
Database Management & ModelsDatabase Management & Models
Database Management & Models
Sunderland City Council
 
Networks & Knowledge Sharing
Networks & Knowledge SharingNetworks & Knowledge Sharing
Networks & Knowledge Sharing
Sunderland City Council
 

More from Sunderland City Council (19)

Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development
 
Defining Systems
Defining SystemsDefining Systems
Defining Systems
 
Giving Presentations: Views from the Observatory
Giving Presentations: Views from the ObservatoryGiving Presentations: Views from the Observatory
Giving Presentations: Views from the Observatory
 
Social Media & Project Management
Social Media & Project ManagementSocial Media & Project Management
Social Media & Project Management
 
Problem Solving Skills
Problem Solving SkillsProblem Solving Skills
Problem Solving Skills
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
The Peeragogy Handbook
The Peeragogy HandbookThe Peeragogy Handbook
The Peeragogy Handbook
 
Teaching & Learning in Second Life
Teaching & Learning in Second LifeTeaching & Learning in Second Life
Teaching & Learning in Second Life
 
GeoffW's PhD
GeoffW's PhDGeoffW's PhD
GeoffW's PhD
 
Groupthink Revisited
Groupthink RevisitedGroupthink Revisited
Groupthink Revisited
 
Creating Knowledge Sharing Networks
Creating Knowledge Sharing NetworksCreating Knowledge Sharing Networks
Creating Knowledge Sharing Networks
 
Case Study: Sunderland Community Development Network
Case Study: Sunderland Community Development NetworkCase Study: Sunderland Community Development Network
Case Study: Sunderland Community Development Network
 
Time Management
Time ManagementTime Management
Time Management
 
Problem Based Learning: Reflecting on Practice
Problem Based Learning: Reflecting on PracticeProblem Based Learning: Reflecting on Practice
Problem Based Learning: Reflecting on Practice
 
Data Warehousing, Data Mining & Data Visualisation
Data Warehousing, Data Mining & Data VisualisationData Warehousing, Data Mining & Data Visualisation
Data Warehousing, Data Mining & Data Visualisation
 
Database Management & Models
Database Management & ModelsDatabase Management & Models
Database Management & Models
 
Networks & Knowledge Sharing
Networks & Knowledge SharingNetworks & Knowledge Sharing
Networks & Knowledge Sharing
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
 
Km#6 the pedagogy_of_trust
Km#6 the pedagogy_of_trustKm#6 the pedagogy_of_trust
Km#6 the pedagogy_of_trust
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Soft Systems Methodology

  • 1. User Centred Approaches to Information Services Development Soft Systems Methodology: Rich Pictures The Peter Checkland Model
  • 2. Soft Systems methodology “…is not a tool or technique to be used occassionally but a way to think and act every day…” Peter Checkland
  • 4. CATWOE Checklist  Clients: customers of the system  Actors: people who carry out activities in the system  Transformation: the changes that take place because of the system  Weltanschauung: the world view or accepted assumption of the system  Owner: those that the system is answerable to  Environment: the external influences on the system
  • 5. CATWOE: An Information Systems Example Clients: Students Actors: Librarians Transformation: Access to copies of relevant extracts from articles and books to assist in studies Worldview: Centre for learning with up to date student support from library services Owners: Librarians Environment: Licensing Agencies, Copyright laws
  • 6. Root definition  Definition: ‘A system to paint the garden fence’.  Root definitions are complex BUT NOT definitive: ‘A householder-owned and staffed system to paint the garden fence, by hand-painting, in keeping with the overall decoration scheme of the property in order to enhance the appearance of the property’.
  • 7. Investigating and understanding unstructured problems  The investigation of a situation (case) should provide a written agreement between the systems analyst (remember the ‘systems analyst’ could be ‘you’ or ‘you + team’) and the owner of the problem (one or several ‘stakeholders’). This often forms the basis for the design of the solution service, product or system (depending on the scope of the problem/solution)  Agreement between analyst and the owner of the problem is essential so that both parties are clear as to what the problem is before a solution design is sought.
  • 8. The unstructured situation  Understanding a new place you have just arrived at - e.g. on holiday  A new company that you have just started to work for  studying an organisation as part of your degree course - Organisation Study  A case study that you have been provided as an assignment
  • 9. Understanding unstructured situations  Unstructured means - “not formally or systematically organised:loose, free, open etc,” - this may seem to be in contradiction to the term “organisation” itself.  Exploring and understanding an unstructured situation requires objective investigation and analysis e.g. Why are hospital waiting lists in the UK too long?
  • 10. Exploring the Unstructured Situation  Initially,  the problem owner has identified that something is wrong or that something needs improving  Critical analysis is usually applied:  Approach the problem with an open mind  View the problem from multiple perspectives (particularly technological, organisational and people perspectives)  The analyst engages in fact finding using conventional methods, including:  interviews, observing, reading background material and documentation, providing questionnaires and measuring processes.
  • 11. Exploring the Unstructured Situation  The analyst gains a mental picture of the unstructured situation.  Identifies  roles,  responsibilities,  processes and  accepted norms.  Produces a definition of the unstructured situation, by using, for example:  Rich pictures and/or CATWOE
  • 12. Rich Picture  A rich picture is a sketch or diagram, using specific symbols, usually hand drawn, that depicts these key aspects of a situation:  the organisational structure  the physical characteristics of the situation, buildings etc.  the processes that are carried out by the situation/system  the relationship between processes  issues expressed or felt by individuals in the situation - complaints, criticisms, feelings etc
  • 13. Commonly used symbols A few symbols are commonly used to describe certain entities within the situations. But these symbols are not prescriptive and any such pictorial representations may be used. Movement or Transportation External Scrutiny Conflict or disagreement A person in roleA thought or opinion A relationship
  • 14. A simple rich picture CLA Publishers Authors Librarian You can’t copy that! I don’t have time to sort this Photocopy to paper to give in class or post or Scan for online access Academic Student Too few copies + too slow by post
  • 15. The Rich Picture – more art than science? Holistic, ongoing, subject to revision as problem is further investigated … Hazards include:  assumptions made must be justified  small issues can be blown out of proportion  too much detail will obscure the overall richness of the picture  too little detail will not serve the purpose of the picture.
  • 16. Drawing rich pictures  The rich picture techniques may appear childish at first but can be a very powerful tool in understanding an unstructured situation …
  • 17. Purpose of the Rich Picture 1. To help visualise the complex (unstructured) situation from all its many perspectives 2. To avoid imposing a rigid structure on the appreciation of the problem situation 3. To aid an investigative approach by the analyst 4. To act as a communication tool between participants
  • 18. The Relevant System  The rich picture is a pictorial representation of the problem situation  In order to move on this needs to be viewed from a systemic point of view – using the Soft Systems approach, this is known as the “relevant system”  The relevant system should be discussed and agreed between all involved parties  It is expressed by the use of a root definition – describing the essence of the relevant system