SlideShare a Scribd company logo
3rd
Order
Requirements
Engineering
Richard Veryard
The Problem(s) of Changing Requirements
Changing Requirements
• Engineers on long design and
development projects must rework
designs to keep them in step with
changes in the specification, or in the
expectations of the clients and/or
markets.
Flexible Requirements
• Technical systems are intended to be
‘flexible’, in other words they should
satisfy not only the original
requirements, but also some range of
new or additional requirements.
Problem FOR WHOM?
• “Changing Requirements” is widely
perceived by engineers of all kinds
to be a problem.
• “Changing Requirements” is also
perceived to be a problem from
the users' perspective.
Requirements Engineering
• There is also a perceived need
for tools and methods for
requirements engineering.
• Note that the specification of
such tools and methods is itself
an exercise in requirements
engineering. We might call this
requirements engineering
engineering.
Constructivist account of requirements
• A requirement is a demand
statement that can be expressed
in the form ‘We Require This’, a
statement that contains three
components.
• However, requirements
engineering usually focuses on
only one or two of the three
components.
 
Evolving Requirements
↓↓↓
Third Order
Second Order↓
First Order↓↓
Focus on evolution
of solution
Focus on evolution
of process
Focus on evolution
of client
THISREQUIREWE
Constructivist account of requirements
• First-order requirements
engineering concentrates on
the ‘This’. In other words,
attention on the (evolving)
solution, rather than on the
process or the client.
• Second-order requirements
engineering concentrates on
the ‘Require This’. In other
words, attention on the solution
and on the (evolving)
procurement process/contract,
but still not on the identity of the
client.
• Third-order requirements
engineering concentrates on
the whole ‘We Require This’.
Only now is attention explicitly
directed at the (evolving) identity
of the client. We therefore need
to explore the evolution of the
process and the evolution of the
client, if we expect to have an
adequate account of changing
requirements.
Identity
• Most approaches to requirements
engineering only address the
solution, and take the process
(including the procurement
process) for granted.  We refer
to these approaches as first order
requirements engineering.
• Some approaches (notably
Checkland’s soft systems
methodology) address the
process as well as the solution. 
We refer to these approaches as
second order requirements
engineering.
• Both first order and second
order requirements engineering
consider the identification of the
client to be merely a matter of
correctly naming all the
stakeholders.  The development
of the group identity of the
requirements owner (as well as
the other participants in the
requirements engineering
process) is only properly
addressed by what we are calling
third order requirements
engineering.
Developmental account of requirements process
• The requirements engineering
process can be regarded as a
progression
– starting with a sense of something
lacking (e.g. from an organization or
process or system)
– via a fantasy or vision of what might
compensate for the lack
– to an engineerable specification of
an engineerable product or service.
Iterative Requirements Process
• But although this may be the
starting point for
requirements engineering,
much of the time is often
spent working out what is
lacking in the solution.
• The specification is itself
always incomplete or
incoherent or inadequate.
• This may be discovered when
the product or service is
being designed, or when it is
delivered.
Developing identity of requirements owner
(or client)
• During the requirements
formulation process, the
requirements owner is
himself transformed:
• from a ’naive’ client who
articulates an infinite
(imaginary, fantasy)
demand for a magic
solution,
• into a ‘mature’ client
who articulates a
moderated (symbolic,
formal) desire for a
realistic solution.
References
Source
• R.A. Veryard & J.E. Dobson, Third
Order Requirements
Engineering: Vision and Identity,
in Proceedings of REFSQ 95, Second
International Workshop on
Requirements Engineering, (Jyvaskyla,
Finland: June 12-13, 1995)
See also
• Vincent Kenny & Philip Boxer, The
Economy of Discourses: a third
order cybernetics? Human Systems
Management Volume 9 Number 4
(1990) pp 205-224.
http://www.oikos.org/discourses.htm

More Related Content

What's hot

Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
Syed Zaid Irshad
 
business requirements functional and non functional
business requirements functional and  non functionalbusiness requirements functional and  non functional
business requirements functional and non functional
CHANDRA KAMAL
 
Req specification
Req specificationReq specification
Req specification
abdullah229162
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7Siddharth Ayer
 
Visualizing non-functional requirements
Visualizing non-functional requirementsVisualizing non-functional requirements
Visualizing non-functional requirements
Neil Ernst
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
Ayaz Shariff
 
Tech Talk - Enterprise Architect - 01
Tech Talk - Enterprise Architect - 01Tech Talk - Enterprise Architect - 01
Tech Talk - Enterprise Architect - 01Shahzad Masud
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
Nishu Rastogi
 
Software Process and Model by Md. Hasan Imam Bijoy
Software Process and  Model by Md. Hasan Imam BijoySoftware Process and  Model by Md. Hasan Imam Bijoy
Software Process and Model by Md. Hasan Imam Bijoy
Md. Hasan Imam Bijoy
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
SADEED AMEEN
 
Requirements Analysis
Requirements AnalysisRequirements Analysis
Requirements Analysis
Sibel Kuzgun AKIN
 
Software Requirements engineering
Software Requirements engineeringSoftware Requirements engineering
Software Requirements engineering
Md. Shafiuzzaman Hira
 
Requirement and Specification
Requirement and SpecificationRequirement and Specification
Requirement and Specification
sarojsaroza
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
University of Haripur
 
1 software requirements engineering-01
1 software requirements engineering-011 software requirements engineering-01
1 software requirements engineering-01Zaman Khan
 
Requirement Analysis - Software Enigneering
Requirement Analysis - Software EnigneeringRequirement Analysis - Software Enigneering
Requirement Analysis - Software Enigneering
university of education,Lahore
 
Unit 2
Unit 2Unit 2
Requirements Engineering
Requirements EngineeringRequirements Engineering

What's hot (20)

Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
 
business requirements functional and non functional
business requirements functional and  non functionalbusiness requirements functional and  non functional
business requirements functional and non functional
 
When Requirements Change
When Requirements ChangeWhen Requirements Change
When Requirements Change
 
Req specification
Req specificationReq specification
Req specification
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7
 
Visualizing non-functional requirements
Visualizing non-functional requirementsVisualizing non-functional requirements
Visualizing non-functional requirements
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Tech Talk - Enterprise Architect - 01
Tech Talk - Enterprise Architect - 01Tech Talk - Enterprise Architect - 01
Tech Talk - Enterprise Architect - 01
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
 
Software Process and Model by Md. Hasan Imam Bijoy
Software Process and  Model by Md. Hasan Imam BijoySoftware Process and  Model by Md. Hasan Imam Bijoy
Software Process and Model by Md. Hasan Imam Bijoy
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Requirements Analysis
Requirements AnalysisRequirements Analysis
Requirements Analysis
 
Software Requirements engineering
Software Requirements engineeringSoftware Requirements engineering
Software Requirements engineering
 
Requirement and Specification
Requirement and SpecificationRequirement and Specification
Requirement and Specification
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
1 software requirements engineering-01
1 software requirements engineering-011 software requirements engineering-01
1 software requirements engineering-01
 
Requirement Analysis - Software Enigneering
Requirement Analysis - Software EnigneeringRequirement Analysis - Software Enigneering
Requirement Analysis - Software Enigneering
 
Unit 2
Unit 2Unit 2
Unit 2
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Software Processes
Software ProcessesSoftware Processes
Software Processes
 

Similar to Third Order Requirements Engineering

UNIT-II MMB.pptx
UNIT-II MMB.pptxUNIT-II MMB.pptx
UNIT-II MMB.pptx
sayalishivarkar1
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
Preeti Mishra
 
Systems Engineering
Systems EngineeringSystems Engineering
Systems Engineering
SergeyDolgorukov
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdf
RAVALCHIRAG1
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
zimalfayzankhan
 
lecture_Analysis Phase.ppt
lecture_Analysis Phase.pptlecture_Analysis Phase.ppt
lecture_Analysis Phase.ppt
AteeqaKokab1
 
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjdlecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
AqeelAbbas94
 
Software Engineering .pdf
Software Engineering .pdfSoftware Engineering .pdf
Software Engineering .pdf
UtsavKumarSingh6
 
software engineering
software engineeringsoftware engineering
software engineering
Snow Queenzz
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
Azhar Shaik
 
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02Durga Prasad Mishra
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Lecture 1 - Requirement Engineering.pptx
Lecture 1 - Requirement Engineering.pptxLecture 1 - Requirement Engineering.pptx
Lecture 1 - Requirement Engineering.pptx
AbdulRaheem254960
 
Unit 1 .pptx
Unit 1 .pptxUnit 1 .pptx
Unit 1 .pptx
Aditya Dhobale
 
SPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and IdentificationSPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and Identification
Garm Lucassen
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
David Pedreno
 
Agile projects
Agile projectsAgile projects
Agile projects
David Pedreno
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
David Harmer
 
04 fse understandingrequirements
04 fse understandingrequirements04 fse understandingrequirements
04 fse understandingrequirementsMohesh Chandran
 

Similar to Third Order Requirements Engineering (20)

UNIT-II MMB.pptx
UNIT-II MMB.pptxUNIT-II MMB.pptx
UNIT-II MMB.pptx
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
 
Systems Engineering
Systems EngineeringSystems Engineering
Systems Engineering
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdf
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
lecture_Analysis Phase.ppt
lecture_Analysis Phase.pptlecture_Analysis Phase.ppt
lecture_Analysis Phase.ppt
 
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjdlecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
lecture_5 (2).ppt hjhrrgjbgrmgrhbgrgghjd
 
Software Engineering .pdf
Software Engineering .pdfSoftware Engineering .pdf
Software Engineering .pdf
 
software engineering
software engineeringsoftware engineering
software engineering
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
 
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02
SYSTEM LIFE CYCLE_DurgaPrasad_TA Assignemnt 02
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Lecture 1 - Requirement Engineering.pptx
Lecture 1 - Requirement Engineering.pptxLecture 1 - Requirement Engineering.pptx
Lecture 1 - Requirement Engineering.pptx
 
Unit 1 .pptx
Unit 1 .pptxUnit 1 .pptx
Unit 1 .pptx
 
SPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and IdentificationSPM lecture2 Requirements Management and Identification
SPM lecture2 Requirements Management and Identification
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
 
Agile projects
Agile projectsAgile projects
Agile projects
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
 
04 fse understandingrequirements
04 fse understandingrequirements04 fse understandingrequirements
04 fse understandingrequirements
 

More from Richard Veryard

IOT is coming to town
IOT is coming to townIOT is coming to town
IOT is coming to town
Richard Veryard
 
The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of Manufacturing
Richard Veryard
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Richard Veryard
 
Real-Time Personalization
Real-Time PersonalizationReal-Time Personalization
Real-Time Personalization
Richard Veryard
 
Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015
Richard Veryard
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014
Richard Veryard
 
On Customer Insight
On Customer InsightOn Customer Insight
On Customer Insight
Richard Veryard
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?
Richard Veryard
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2
Richard Veryard
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems Thinking
Richard Veryard
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on Trial
Richard Veryard
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?Richard Veryard
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart Retail
Richard Veryard
 
Implementation Roadmap
Implementation RoadmapImplementation Roadmap
Implementation Roadmap
Richard Veryard
 
Six views of business architecture
Six views of business architectureSix views of business architecture
Six views of business architecture
Richard Veryard
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org Intelligence
Richard Veryard
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurement
Richard Veryard
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided business
Richard Veryard
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise Architecture
Richard Veryard
 

More from Richard Veryard (20)

IOT is coming to town
IOT is coming to townIOT is coming to town
IOT is coming to town
 
The New Economics of Manufacturing
The New Economics of ManufacturingThe New Economics of Manufacturing
The New Economics of Manufacturing
 
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPRDigital Disruption and Consumer Trust - Resolving the Challenge of GDPR
Digital Disruption and Consumer Trust - Resolving the Challenge of GDPR
 
Real-Time Personalization
Real-Time PersonalizationReal-Time Personalization
Real-Time Personalization
 
Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015Customer Engagement Open Group Oct 2015
Customer Engagement Open Group Oct 2015
 
EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014EA Second Coming EA Forum Nov 2014
EA Second Coming EA Forum Nov 2014
 
On Customer Insight
On Customer InsightOn Customer Insight
On Customer Insight
 
What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?What can Enterprise Architecture learn from Systems Thinking?
What can Enterprise Architecture learn from Systems Thinking?
 
Architecting multi sided business 2
Architecting multi sided business 2Architecting multi sided business 2
Architecting multi sided business 2
 
Perspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems ThinkingPerspectives on Enterprise Architecture and Systems Thinking
Perspectives on Enterprise Architecture and Systems Thinking
 
Enterprise Architecture on Trial
Enterprise Architecture on TrialEnterprise Architecture on Trial
Enterprise Architecture on Trial
 
Why do I need to understand business?
Why do I need to understand business?Why do I need to understand business?
Why do I need to understand business?
 
Business Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart RetailBusiness Architecture - The Rise and Fall of Smart Retail
Business Architecture - The Rise and Fall of Smart Retail
 
Implementation Roadmap
Implementation RoadmapImplementation Roadmap
Implementation Roadmap
 
Six views of business architecture
Six views of business architectureSix views of business architecture
Six views of business architecture
 
Assessing Org Intelligence
Assessing Org IntelligenceAssessing Org Intelligence
Assessing Org Intelligence
 
Architecture led procurement
Architecture led procurementArchitecture led procurement
Architecture led procurement
 
Architecting multi sided business
Architecting multi sided businessArchitecting multi sided business
Architecting multi sided business
 
Next Generation Enterprise Architecture
Next Generation Enterprise ArchitectureNext Generation Enterprise Architecture
Next Generation Enterprise Architecture
 
Notes on Coupling
Notes on CouplingNotes on Coupling
Notes on Coupling
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Third Order Requirements Engineering

  • 2. The Problem(s) of Changing Requirements Changing Requirements • Engineers on long design and development projects must rework designs to keep them in step with changes in the specification, or in the expectations of the clients and/or markets. Flexible Requirements • Technical systems are intended to be ‘flexible’, in other words they should satisfy not only the original requirements, but also some range of new or additional requirements. Problem FOR WHOM? • “Changing Requirements” is widely perceived by engineers of all kinds to be a problem. • “Changing Requirements” is also perceived to be a problem from the users' perspective.
  • 3. Requirements Engineering • There is also a perceived need for tools and methods for requirements engineering. • Note that the specification of such tools and methods is itself an exercise in requirements engineering. We might call this requirements engineering engineering.
  • 4. Constructivist account of requirements • A requirement is a demand statement that can be expressed in the form ‘We Require This’, a statement that contains three components. • However, requirements engineering usually focuses on only one or two of the three components.  
  • 5. Evolving Requirements ↓↓↓ Third Order Second Order↓ First Order↓↓ Focus on evolution of solution Focus on evolution of process Focus on evolution of client THISREQUIREWE
  • 6. Constructivist account of requirements • First-order requirements engineering concentrates on the ‘This’. In other words, attention on the (evolving) solution, rather than on the process or the client. • Second-order requirements engineering concentrates on the ‘Require This’. In other words, attention on the solution and on the (evolving) procurement process/contract, but still not on the identity of the client. • Third-order requirements engineering concentrates on the whole ‘We Require This’. Only now is attention explicitly directed at the (evolving) identity of the client. We therefore need to explore the evolution of the process and the evolution of the client, if we expect to have an adequate account of changing requirements.
  • 7. Identity • Most approaches to requirements engineering only address the solution, and take the process (including the procurement process) for granted.  We refer to these approaches as first order requirements engineering. • Some approaches (notably Checkland’s soft systems methodology) address the process as well as the solution.  We refer to these approaches as second order requirements engineering. • Both first order and second order requirements engineering consider the identification of the client to be merely a matter of correctly naming all the stakeholders.  The development of the group identity of the requirements owner (as well as the other participants in the requirements engineering process) is only properly addressed by what we are calling third order requirements engineering.
  • 8. Developmental account of requirements process • The requirements engineering process can be regarded as a progression – starting with a sense of something lacking (e.g. from an organization or process or system) – via a fantasy or vision of what might compensate for the lack – to an engineerable specification of an engineerable product or service.
  • 9. Iterative Requirements Process • But although this may be the starting point for requirements engineering, much of the time is often spent working out what is lacking in the solution. • The specification is itself always incomplete or incoherent or inadequate. • This may be discovered when the product or service is being designed, or when it is delivered.
  • 10. Developing identity of requirements owner (or client) • During the requirements formulation process, the requirements owner is himself transformed: • from a ’naive’ client who articulates an infinite (imaginary, fantasy) demand for a magic solution, • into a ‘mature’ client who articulates a moderated (symbolic, formal) desire for a realistic solution.
  • 11. References Source • R.A. Veryard & J.E. Dobson, Third Order Requirements Engineering: Vision and Identity, in Proceedings of REFSQ 95, Second International Workshop on Requirements Engineering, (Jyvaskyla, Finland: June 12-13, 1995) See also • Vincent Kenny & Philip Boxer, The Economy of Discourses: a third order cybernetics? Human Systems Management Volume 9 Number 4 (1990) pp 205-224. http://www.oikos.org/discourses.htm