Professional Documents
Culture Documents
- Jay
2
Convergys Confidential and Proprietary
Fact -2
3
Convergys Confidential and Proprietary
Fact - 3
4
Convergys Confidential and Proprietary
Fact - 4
5
Convergys Confidential and Proprietary
Where is the exact problem ?
6
Convergys Confidential and Proprietary
How it differs?
7
Convergys Confidential and Proprietary
Importance of requirements
8
Convergys Confidential and Proprietary
Where Requirement management fits?
9
Convergys Confidential and Proprietary
What it costs?
10
Convergys Confidential and Proprietary
Requirement - Definition
11
Convergys Confidential and Proprietary
Requirement engineering
12
Convergys Confidential and Proprietary
Why requirement engineering?
13
Convergys Confidential and Proprietary
Who does requirement engineering?
Software engineer
System analyst
Business analyst
Requirements specifier
Requirements Reviewer
Other Stakeholders
14
Convergys Confidential and Proprietary
The framework
15
Convergys Confidential and Proprietary
The real connected environment
16
Convergys Confidential and Proprietary
RE - Process
17
Convergys Confidential and Proprietary
Requirements elicitation
18
Convergys Confidential and Proprietary
Requirement elicitation - Techniques
- Interviews
- Surveys
- Data mining
- Questionnaires
- Market analysis
- Focus groups
- Future workshops
- Soft system methodology
- Co-operative requirements capture
- Scenario based requirements elicitation
- Multiple Viewpoint Requirements Capture
- Observation and Social Analysis
- Designer as Apprentice
19
Convergys Confidential and Proprietary
Interviews
20
Convergys Confidential and Proprietary
Surveys, Questionnaire and Data mining
-Mining the data about customers such as the responses to a product survey or customers’
reaction to a new technology, can draw important conclusion about their needs.
These techniques are useful if the proposed product is targeted towards a large number of
customers. In such cases, information gathered from a few customers will not be sufficient.
Surveys and Questionnaires can be used to obtain information from a large number of customers.
Data mining techniques can be used to analyze the data obtained from those surveys to identify
different classes of customers and
*Certain patterns or relationships in their needs. However, it is always difficult to get a good
and representative number of responses to surveys. In addition to this, the list of questions
prepared should be relevant and should be distributed to the right sample population.
21
Convergys Confidential and Proprietary
Market analysis
The process of analyzing the product market for its current and
future trends is called market analysis.
Market analysis is a good technique to elicit requirements for a
system.
Gathering information about the competitor products would help to
identify the features that are not present in current products
22
Convergys Confidential and Proprietary
Focus groups
-Since the users are allowed to discuss in a free environment, problems that
occur due to a lack of communication can be reduced. It is easier to participate
in a free discussion than in a structured interview.
-In addition to this, when different customers discuss certain topic, it is easy to
identify requirements conflicts and to resolve them.
* However, the requirements engineer must have good listening and problem
solving skills. Also when several different customers discuss together, it is
important to maintain proper coordination between them.
23
Convergys Confidential and Proprietary
Future workshops
24
Convergys Confidential and Proprietary
Soft system methodology
-SSM is a system development framework that allows for system analysis from
both the organizational and technical perspective.
25
Convergys Confidential and Proprietary
Cooperative Requirements Capture (CRC)
-In this approach all the stakeholders together explore the user environment and
develop a shared vision of the future system.
-During the group session, participants discuss the current user activities and
envision any possible changes that might occur in future.
-The advantage of using the CRC approach for requirements engineering is that it
involves all the stakeholders in the decision making process.
-Due to this, the needs of different stakeholders can be easily understood. Since all
the stakeholders explore and develop a shared understanding of the current and
future visions of the product, it is possible to identify requirement changes and
conflicts early in the development process.
26
Convergys Confidential and Proprietary
Scenario Based Requirements Elicitation
27
Convergys Confidential and Proprietary
Multiple Viewpoint Requirements Capture
Each stakeholder has his/her own viewpoint on the services that the
-
28
Convergys Confidential and Proprietary
Observation and Social Analysis
This is a technique where the designers learn from the user about
•
their work.
Here user is the master and designer is the apprentice who learns by
•
The idea behind this technique is to provide the designer with some
•
30
Convergys Confidential and Proprietary
Requirement analysis
A feasibility study and cost-benefit analysis of the product development process may be conducted
and the scope of the system is determined.
Customer requirements are analyzed and requirements conflicts if any are resolved.
Requirements analysis ensures that the system is going to provide the services that the customers
require. It also helps the designer to understand the customer requirements.
For product line development, the requirements analysis stage involves:
Identification of commonalities and variabilities in the domain
Identification of potential members and their features and modeling them to get a better
understanding of the family.
Once the common and variable requirements are identified, potential products and their
features are selected. Using these details, the feasibility of developing those products as a
family is analyzed.
Aspects to choose product members and their features,
• Company strategies
• Customer’s priority
• Market advantage
• Contribution to the domain and
• The competition
Market Analysis is a good technique that can provide some useful information regarding the current
And future market trends and information about other products in the market. Based on the results
of this analysis, products and their features can be selected. Once the products and features are
selected, they must be modeled. Modeling enhances the understandability and simplifies the design.
Depending on the product line approach used suitable modeling techniques can be used.
31
Convergys Confidential and Proprietary
Requirement analysis - Techniques
32
Convergys Confidential and Proprietary
Requirement analysis - Techniques
JAD:
- JAD is a group session requirements analysis and design approach developed by
IBM.
- JAD is a group session approach that involves users in the system design.
- All the stakeholders can participate in the decision-making process. Activities such as
defining high-level requirements and bounding system scope can be extended to
identify product line requirements and characterize individual products in the family.
- JAD defines six different roles of participants who should participate in a session: a
session leader or facilitator, a system analyst, a specialist, a user representative, an
information system representative and the executive sponsor.
33
Convergys Confidential and Proprietary
Requirement analysis - Techniques
QFD:
QFD is an approach developed in Japan to produce quality products in the automotive industry in
1986.
• It focuses on translating customer requirements into technical requirements throughout the
product development process.
• The entire QFD process focuses on a house of quality, which maps customer requirements to the
proposed product features.
• Each development phase can use its own house of quality. QFD for the planning phase is used for
requirements analysis.
• Participants are asked to rate each requirement according to their relevance to a particular feature.
In addition to this, correlation between various technical features, customer’s importance of each
requirement and market evaluation of the competitive features are also considered.
• Based on the subjective analysis of the above factors, the final product features are selected. Thus
the QFD approach helps to develop quality features that are important to customers
• QFD is a good approach to select product features and to make high-level design decisions. It
encourages the organization to consider factors such as customer’s priority and competition for
requirements analysis.
34
Convergys Confidential and Proprietary
Requirement analysis - Techniques
Participatory design:
Since this approach involves users in the system design, problems that
may occur due to a lack of communication can be avoided.
Designers can learn more about users’ needs by actually doing their work.
Users can work with the designer to learn about the design and to verify that the
design is going to meet all their needs.
35
Convergys Confidential and Proprietary
Requirement specification
SRS:
Each product in the family must be specified separately and there should
be proper traceability mechanisms between the family and individual
product requirements.
A SRS document is developed for each family member as well as for the
entire family. While writing the family SRS, all the common and
variable requirements must be documented.
XML
Requirements Validation is concerned with checking the requirements for omissions, correctness, precision
conflicts and ambiguities and for ensuring that the requirements follow quality standard
Requirement reviews
Domain experts
Requirements engineers
Customers and
Stakeholders.
Prototyping
System prototypes can de developed to demonstrate the system behavior before the final product is being
developed.
Users have an opportunity to really see how the final system is going to behave and they can provide any
feedback
regarding possible misunderstandings or any other changes in the requirements.
Types:
- Throwaway prototyping (discarded)
- Evolutionary prototyping (adapted)
37
Convergys Confidential and Proprietary
Requirement validation
-Requirement testing
38
Convergys Confidential and Proprietary
Requirement validation review - Checklist
Sample checklist:
• Clarity
• Completeness
• Compliance
• Consistency
• Correctness
• Data usage
• Functionality
• Interface
• Level of detail
• Maintainability
• Performance
• Reliability
• Testability
• Traceability
39
Convergys Confidential and Proprietary
Requirement management techniques
40
Convergys Confidential and Proprietary
Requirement management techniques
41
Convergys Confidential and Proprietary
Requirement management techniques
42
Convergys Confidential and Proprietary
Requirement management metrics
Number of requirements.
Status of each requirement.
Number of requirement changes.
Kind of change.
Reason for change.
Cost of change.
Change Requested by Whom.
Functionality of the requirement.
Functionality of the software.
43
Convergys Confidential and Proprietary
Conclusion and Summary
44
Convergys Confidential and Proprietary
45
Convergys Confidential and Proprietary