Professional Documents
Culture Documents
Supervised by: Pn. Wan Noor Amalina binti Wan Hariri Presented at: Final Year Project Presentation Date: 10 May 2006
Introduction
Software
systems requirements engineering is the process of discovering that purpose, by identifying stakeholders and their needs, and documenting these in a form that is amenable to analysis, communication, and subsequent implementation. (Nuseibeh and Easterbrook, 2001) We will facing several defects during the progress We need to discover what techniques that can be used to prevent those defects.
Problem Statement
Only
9% of projects are on time and under budget, and only about 16% deliver what was promised (Carr, 2000). We need to know and understand those defects. When we classified the defects, we tried to imagine what could have prevented each defects (Vinter, Lauesen & Pries-Heje, 1998). We make the comparison from various techniques that have been identified. Proposing the effective prevention techniques that can be implemented.
Research Questions
What
are the defects that have been identify in requirements engineering based on defect categories? What are the techniques that can be used to prevent the defects? Which are the effective techniques that can be used based on defect categories?
Objectives
To
identify the commonly known requirements defects that occurs in requirements engineering. To identify the commonly used techniques that can be implemented to prevent the defects. To compare the effective techniques from several techniques those have been identified. To propose the effective techniques that can be implemented based on defect categories.
Scope
Focus
on IT company in private sector and IT department from government sector. It will be persistent at Shah Alam, Subang Jaya and Technology Park Malaysia (TPM) at Bukit Jalil. Also focusing on preventing the requirements defects in requirements engineering.
can assist the IT projects team identified the defects that will occur or had occurred earlier. This research can be implemented and added as extra learning in requirements analysis courses.
research will identify the commonly known requirements defects that laid on four main defects categories. It is also covered on commonly used prevention techniques that have been implemented to prevent the defects. Time constraint is considered a limitation in this research. This research also does not show how the prevention techniques have been applied to prevent the defects.
Requirements
They
are descriptions of how the system should behave, or of a system property or attribute (Sommerville & Sawyer, 1997). A requirement is a narration of the system vision along with a set of functional and non-functional requirements (Booch, 2002).
Requirements engineering
Requirements
engineering and management (REAM) is the process of discovering, documenting and managing systems requirements (Carr, 2000).
Requirements analysis and negotiation Requirements documentation Requirements validation
Requirements elicitation
User needs domain information, existing system information, regulations, standards, etc.
Agreed requirements
Requirements defects
Requirement
defects may creep in at any stage of development (Lauesen & Vinter, 2001). Something that can harm the requirements and does not match the surroundings.
Prevention techniques
The
earlier they are detected, the easier they are to repair (Lauesen & Vinter, 2001). Any techniques that can help to prevent the defects from harming the requirements engineering process.
Methodology
DEFINITION PROCESS
Problem Assessment
Data Analysis
MODELING PROCESS
Information Modelling
Table
4.1
Wrong specification
of
ot m
at iv
n io
Wrong specification
18
6
Im us io ur Sp
25
t en
27
10 30
33
40
Sum
20
Demand change
Demand change
50 40
Sum
30 20 10 0
46 17
Demand change
New domain
Tacit requirements
Tacit requirement Inconsistent tacit 27 Conflicting tacit Sum
21
Wrong tacit 19 Omitted tacit 17 Forgotten tacit 12
Other categories
Others
25
20
Sum
15
21
10
10
prevention techniques have been identified and there are laid on four main defect categories Table 4.2
12
Consistency review
User data model Risk analysis Focus groups with users Requirement specification overview
32
32 30 29 27
27
26 25 24 24
23
16 12 10 9
20
Let product expert review screens Check with organization style guide Check with public style guide
13
21
16
24
10
15
20
25
Sum
23
16 12
20
29
Sum
15
23
10
0
0 Manage configuration management Motivation Others
30
Sum
20
33
33 24 18
10
0 To compare To ensure As a lesson To learn which the defect is learned and several technique(s) really guidelines prevention is/are prevented for system techniques suitable for development that can be the defect used
Defect
Incomplete requirements (33*) Conflicting requirements (27*) Spurious requirements (25*)
have several effective techniques that have been identified based on defects categories. Table 4.3
Conclusion
Even
though, requirements engineering is a very critical process, but there are still have techniques that can help if the defects are occurred. System analyst needs to understand those defects and techniques.