Requirements Engineering Processes

Download Report

Transcript Requirements Engineering Processes

Requirements Engineering
Processes
Slide 1
Something to Think About …
The indispensable first step to getting the
things you want out of life: decide what
you want.
—Ben Stein
Slide 2
Objectives




To describe the principal requirements
engineering activities and their relationships
To introduce techniques for requirements
elicitation and analysis
To describe requirements validation and the
role of requirements reviews
To discuss the role of requirements
management in support of other
requirements engineering processes
Slide 3
Requirements engineering processes


The processes used for RE vary widely
depending on the application domain, the
people involved and the organisation
developing the requirements.
However, there are a number of generic
activities common to all processes
•
•
•
•
Requirements elicitation;
Requirements analysis;
Requirements validation;
Requirements management.
Slide 4
Feasibility studies


A feasibility study decides whether or not the
proposed system is worthwhile.
A short focused study that checks
•
•
•
If the system contributes to organisational
objectives;
If the system can be engineered using current
technology and within budget;
If the system can be integrated with other
systems that are used.
Slide 5
Feasibility study implementation


Based on information assessment (what is required),
information collection and report writing.
Questions for people in the organisation
•
•
•
•
•
•
What if the system wasn’t implemented?
What are current process problems?
How will the proposed system help?
What will be the integration problems?
Is new technology needed? What skills?
What facilities must be supported by the proposed
system?
Slide 6
Elicitation and analysis



Sometimes called requirements elicitation or
requirements discovery.
Involves technical staff working with customers to
find out about the application domain, the services
that the system should provide and the system’s
operational constraints.
May involve end-users, managers, engineers
involved in maintenance, domain experts, trade
unions, etc. These are called stakeholders.
Slide 7
Problems of requirements analysis





Stakeholders don’t know what they really want.
Stakeholders express requirements in their own
terms.
Different stakeholders may have conflicting
requirements.
Organisational and political factors may influence
the system requirements.
The requirements change during the analysis
process. New stakeholders may emerge and the
business environment change.
Slide 8
Process activities

Requirements discovery
•

Requirements classification and organisation
•

Groups related requirements and organises them into
coherent clusters.
Prioritisation and negotiation
•

Interacting with stakeholders to discover their
requirements. Domain requirements are also discovered
at this stage.
Prioritising requirements and resolving requirements
conflicts.
Requirements documentation
•
Requirements are documented and input into the next
round of the spiral.
Slide 9
Requirements discovery


The process of gathering information about
the proposed and existing systems and
distilling the user and system requirements
from this information.
Sources of information include
documentation, system stakeholders and the
specifications of similar systems.
Slide 10
ATM stakeholders









Bank customers
Representatives of other banks
Bank managers
Counter staff
Database administrators
Security managers
Marketing department
Hardware and software maintenance engineers
Banking regulators
Slide 11
Viewpoints


Viewpoints are a way of structuring the
requirements to represent the perspectives
of different stakeholders. Stakeholders may
be classified under different viewpoints.
This multi-perspective analysis is important
as there is no single correct way to analyse
system requirements.
Slide 12
Types of viewpoint

Interactor viewpoints
•

Indirect viewpoints
•

People or other systems that interact directly with the
system. In an ATM, the customer’s and the account
database are interactor VPs.
Stakeholders who do not use the system themselves but
who influence the requirements. In an ATM, management
and security staff are indirect viewpoints.
Domain viewpoints
•
Domain characteristics and constraints that influence the
requirements. In an ATM, an example would be standards
for inter-bank communications.
Slide 13
Viewpoint identification

Identify viewpoints using
•
•
•
•
•
•
Providers and receivers of system services;
Systems that interact directly with the system
being specified;
Regulations and standards;
Sources of business and non-functional
requirements.
Engineers who have to develop and maintain
the system;
Marketing and other business viewpoints.
Slide 14
LIBSYS viewpoint hierarchy
All VPs
In direct
Library
man ag er
Finance
Stud en ts
In teractor
Article
providers
Staff
Users
Extern al
Slide 15
Domain
Library
staff
Sy stem
man ag ers
UI
stan dards
Catalo gu ers
Clas sificatio n
sy stem
Interviewing


In formal or informal interviewing, the RE
team puts questions to stakeholders about
the system that they use and the system to
be developed.
There are two types of interview
•
•
Closed interviews where a pre-defined set of
questions are answered.
Open interviews where there is no pre-defined
agenda and a range of issues are explored with
stakeholders.
Slide 16
Interviews in practice



Normally a mix of closed and open-ended
interviewing.
Interviews are good for getting an overall
understanding of what stakeholders do and how
they might interact with the system.
Several issues need to be addressed before
conducting interviews for understanding domain
requirements
•
•
Requirements engineers cannot understand specific
domain terminology;
Some domain knowledge is so familiar that people find it
hard to articulate or think that it isn’t worth articulating.
Slide 17
Effective interviewers


Interviewers should be open-minded, willing
to listen to stakeholders and should not have
pre-conceived ideas about the requirements.
They should prompt the interviewee with a
question or a proposal and should not simply
expect them to respond to a question such
as ‘what do you want’.
Slide 18
Use Cases - Background


Alistair Cockburn claims to have
encountered over 18 different definitions of
use case, given by different, each expert,
teachers and consultants.
They differed along 4 dimensions:
•
•
•
•
Purpose
Contents
Plurality
Structure.
Slide 19
Use Cases - Purpose


Is the purpose of use cases to gather user
stories, or build requirements?
Values:
•
•
Stories
Requirements
Slide 20
Use Cases - Contents



Are the contents of the use case required to
be consistent, or can they be selfcontradicting?
If consistent, are they in plain prose or are
they in a formal notation?
Values:
•
•
•
Contradicting
Consistent prose
Formal content
Slide 21
Use Cases - Plurality


Is a use case really just another name for a
scenario, or does a use case contain more
than one scenario?
Values:
•
•
One
Multiple
Slide 22
Use Cases - Structure


Does a collection of use cases have a formal
structure, an informal structure, or do they
form an unstructured collection?
Values:
•
•
•
Unstructured
Semi-formal
Formal structure
Slide 23
Cockburn in Use Case Space
Purpose = requirements
Contents = consistent prose
Plurality = multiple scenarios per use case
Structure = semi-formal
Slide 24
Actors

External Actors
•

Internal Actors
•
•

May be the system in design, a subsystem or an object.
The system in design consists of subsystems, which
consist of objects.
Actors have behavior(s).
•

A person, a group of people or a system of any kind.
The top-level behavior is a responsibility.
A responsibility contains goals, which contain
actions.
•
•
An action triggers an interaction.
The interaction is one actor’s goal calling upon another
actors (or its own) responsibility.
Slide 25
Scenario



A sequence of interactions happening under
certain conditions, to achieve the initiating
actor’s goal, and having a particular result
with respect to that goal.
The interactions start from the triggering
action and continue until the goal is delivered
or abandoned, and the system completes
whatever responsibilities it has with respect
to the interaction.
AKA: Use Case Instance
Slide 26
Use Case



A collection of possible scenarios between
the system under discussion (SuD) and
initiating actor.
Characterized by the goal the initiating actor
has toward the SuD’s declared
responsibilities.
Shows how the initiating actor’s goal might
be delivered or might fail.
Slide 27
Scenario/Use Case Bounds


All the interactions relate to the same goal.
Interactions start at the triggering event and
end when the goal is delivered or
abandoned, and the SuD completes its
responsibilities with respect to the
interaction.
Slide 28
Use Case


A set of use-case instances, where each instance is
a sequence of actions a system performs that yields
an observable result of value to a particular actor
A key attitude in use case work is to focus on the
question
•
•
“How can using the system provide observable value to
the user, or fulfill their goals?”
As opposed to thinking of system requirements in terms
of a “laundry list” of features or functions.
Slide 29
LIBSYS use cases
Slide 30
LIBSYS Use Case (1)
Initial assumption: The user has logged on to the LIBSYS system and has located the journal containing
the copy of the article.
Normal: The user selects the article to be copied. He or she is then prompted by the system to ei ther
provide subscriber information for the journal or to indicate how they will pay for the article. Alternative
payment me thods are by credit card or by quoting an organisational account number.
The user is then asked to fill in a copyright form that ma intains details of the transaction and they then
submit this to the LIBSYS system.
The copyright fo rm is c hecked and, if OK, the PDF version of the article is d ownloaded to the LIBSYS
working area on the userÕscomputer and the user is informed that it is available. The user is asked to select
a printer and a copy of the article is printed. If the article has been flagged as Ōprint-onlyÕit is deleted from
the userÕs system once the user has confirmed that printing is complete.
Slide 31
LIBSYS Use Case (2)
What can go wrong: The user may fail to fill in the copyright form correctly. In this case, the fo rm should
be re-presented to the user for correction. If the resubmitted form is still incorrect then the userÕsrequest
for the article is rejected.
The payment ma y be rejected by the system. The userÕs er quest for the article is rejected.
The article download may fail. Retry until successful or the user terminates the session.
It may not be possible to print the article. If t he article is not flagged as Ōprint-onlyÕthen it is held in the
LIBSYS workspace. Otherwise, the article is d eleted and the userÕs account credited with the cost of the
article.
Other activities: Simultaneous downloads of other articles.
System state on completion: User is logged on. The downloaded article has been deleted from LIBSYS
workspace if it has been flagged as print-only.
Slide 32
Social and organisational factors



Software systems are used in a social and
organisational context. This can influence or
even dominate the system requirements.
Social and organisational factors are not a
single viewpoint but are influences on all
viewpoints.
Good analysts must be sensitive to these
factors but currently no systematic way to
tackle their analysis.
Slide 33
Ethnography




A social scientists spends a considerable time
observing and analysing how people actually work.
People do not have to explain or articulate their
work.
Social and organisational factors of importance may
be observed.
Ethnographic studies have shown that work is
usually richer and more complex than suggested by
simple system models.
Slide 34
Focused ethnography




Developed in a project studying the air traffic
control process
Combines ethnography with prototyping
Prototype development results in
unanswered questions which focus the
ethnographic analysis.
The problem with ethnography is that it
studies existing practices which may have
some historical basis which is no longer
relevant.
Slide 35
Scope of ethnography


Requirements that are derived from the way
that people actually work rather than the way
in which process definitions suggest that
they ought to work.
Requirements that are derived from
cooperation and awareness of other people’s
activities.
Slide 36
Requirements validation


Concerned with demonstrating that the
requirements define the system that the
customer really wants.
Requirements error costs are high so
validation is very important
•
Fixing a requirements error after delivery may
cost up to 100 times the cost of fixing an
implementation error.
Slide 37
Requirements checking





Validity. Does the system provide the functions
which best support the customer’s needs?
Consistency. Are there any requirements conflicts?
Completeness. Are all functions required by the
customer included?
Realism. Can the requirements be implemented
given available budget and technology
Verifiability. Can the requirements be checked?
Slide 38
Requirements validation techniques

Requirements reviews
•

Prototyping
•

Systematic manual analysis of the
requirements.
Using an executable model of the system to
check requirements.
Test-case generation
•
Developing tests for requirements to check
testability.
Slide 39
Requirements reviews



Regular reviews should be held while the
requirements definition is being formulated.
Both client and contractor staff should be
involved in reviews.
Reviews may be formal (with completed
documents) or informal. Good
communications between developers,
customers and users can resolve problems
at an early stage.
Slide 40
Review checks




Verifiability. Is the requirement realistically
testable?
Comprehensibility. Is the requirement
properly understood?
Traceability. Is the origin of the requirement
clearly stated?
Adaptability. Can the requirement be
changed without a large impact on other
requirements?
Slide 41
Requirements management


Requirements management is the process of
managing changing requirements during the
requirements engineering process and system
development.
Requirements are inevitably incomplete and
inconsistent
•
•
New requirements emerge during the process as
business needs change and a better understanding of the
system is developed;
Different viewpoints have different requirements and
these are often contradictory.
Slide 42
Requirements change



The priority of requirements from different
viewpoints changes during the development
process.
System customers may specify requirements
from a business perspective that conflict with
end-user requirements.
The business and technical environment of
the system changes during its development.
Slide 43
Enduring and volatile requirements


Enduring requirements. Stable requirements
derived from the core activity of the customer
organisation. E.g. a hospital will always have
doctors, nurses, etc. May be derived from
domain models
Volatile requirements. Requirements which
change during development or when the
system is in use. In a hospital, requirements
derived from health-care policy
Slide 44
Requirements classification
Requirement
Type
Description
Mutable
requirements
Requirements that change because of changes to the environme nt in which the
organisation is operating. For example, in hospital systems , the funding of patient
care ma y change and thus require different treatment info rmation to be collected.
Emergent
requirements
Requirements that emerge as the customer's understanding of the system develops
during the system development. The design process may reveal new emergent
requirements.
Consequential
requirements
Requirements that result from the introduction of the comp uter system. Introducing
the computer system may change the organisations processes and open up new ways
of working which generate new system requirements
Compatibility
requirements
Requirements that depend on the particular systems or b usiness processes within an
organisation. As these change, the comp atibility requirements on the commissioned
or delivered system m ay also have to evolve.
Slide 45
Requirements management planning

During the requirements engineering process, you
have to plan:
•
Requirements identification
• How requirements are individually identified;
•
A change management process
• The process followed when analysing a requirements
change;
•
Traceability policies
• The amount of information about requirements relationships
that is maintained;
•
CASE tool support
• The tool support required to help manage requirements
change;
Slide 46
Traceability


Traceability is concerned with the relationships
between requirements, their sources and the system
design
Source traceability
•

Requirements traceability
•

Links from requirements to stakeholders who proposed
these requirements;
Links between dependent requirements;
Design traceability
•
Links from the requirements to the design;
Slide 47
CASE tool support

Requirements storage
•

Change management
•

Requirements should be managed in a secure, managed
data store.
The process of change management is a workflow
process whose stages can be defined and information
flow between these stages partially automated.
Traceability management
•
Automated retrieval of the links between requirements.
Slide 48
Requirements change management


Should apply to all proposed changes to the
requirements.
Principal stages
•
•
•
Problem analysis. Discuss requirements
problem and propose change;
Change analysis and costing. Assess effects of
change on other requirements;
Change implementation. Modify requirements
document and other documents to reflect
change.
Slide 49
Key points



The requirements engineering process
includes a feasibility study, requirements
elicitation and analysis, requirements
specification and requirements management.
Requirements elicitation and analysis is
iterative involving domain understanding,
requirements collection, classification,
structuring, prioritisation and validation.
Systems have multiple stakeholders with
different requirements.
Slide 50
Key points




Social and organisation factors influence
system requirements.
Requirements validation is concerned with
checks for validity, consistency,
completeness, realism and verifiability.
Business changes inevitably lead to
changing requirements.
Requirements management includes
planning and change management.
Slide 51
Use Cases – the Big Picture

Many high-level use cases start with simple
situations and straightforward, naturallanguage questions.
•
•
•
•
•
This is Jill.
This is her phone.
What does Jill want to do with her phone?
What steps must she take to achieve this goal?
How will her pathway toward this goal follow the
business logic fundamental to our project's
success?
Slide 52
Use Cases – the Big Picture



Use cases tend to account for various kinds of
failure modes and defaults in user flow.
But the very context in which these failure modes
occur tends to be rather cooked and artificial.
Many start with a neatly conventional circumstance
•

"Jill wants to buy a new ringtone"
They end in a similarly pat fulfillment
•
"Jill successfully downloads and installs the ringtone"
Slide 53
Use Cases – the Big Picture




What about use cases that start out like:
"Greta wants to sneak out and meet her lover
Patrick, without making her husband Bertrand
suspicious."
"Kenji wants his private contact information to be
more available to his close friends than the random
boys he picks up clubbing."
"Claudia wants to play games on her computer at
work, while making it seem as if she's busy getting
things done."
Slide 54
Use Cases – the Big Picture




Experience tells us that these are the kinds of things
people actually do with technology.
Human beings are endlessly creative, contrary, even
perverse.
Our motives are not always noble.
We figure out ways to use whatever technology
happens to be at hand to further our goals
•
whether or not those goals bear any resemblance to what
we're "supposed to be" doing.
Slide 55
Use Cases – the Big Picture

Consider the uses foreseen by designers,
manufacturers and retailers for a new
technology
•

Inevitably featured in the advertising and
marketing campaigns
They often turn out to be much less
interesting than what people actually do with
them.
Slide 56
Use Cases – the Big Picture


Fault lines are all the gaps between the assumptions
and the reality
Fault lines are places where emergent patterns of
use expose
•
•
•

incorrect assumptions on the part of the designers
imperfect models of the target audience on the part of
marketers
social realities that might otherwise have remained latent
Fault lines also crop up where tech-savvy
developers forget to take off their expert hat.
•
They consequently fail to understand the mental models
users carry around with them regarding how technology
works.
Slide 57
Use Cases – the Big Picture


There is good business sense in attending
carefully to these fault lines.
That is where the truly useful products and
services wait to be born.
Slide 58
Example




Cingular Wireless, US.
Offers a service called "Escape-a-Date.”
Provides its subscribers an emergency exit from bad
dates and similarly awkward social circumstances.
The subscriber schedules a "rescue" phone call for a
pre-set time.
•


When their phone rings they are guided through a script
that gives them a convenient excuse to get up and leave.
A social discomfort is circumvented,
Everybody gets to save face.
Slide 59
Example




We laugh, but this is a real circumstance, something
we can all recognize.
Someone, somewhere, has identified a genuine
social need and devised response to it.
There is the “side effect” of shifting some packets
and producing some revenue for the service
provider!
A definite improvement on use cases which imagine
or fabricate "needs" nobody actually ever had, which
produce "features" and "conveniences" nobody ever
uses.
Slide 60
Case in Point



Camera phones.
At some point in the last five years, bundling a camera and a
mobile phone became technically feasible.
Soon thereafter, it became a potential source of profit
•


thus the current proliferation of models.
But there never was a realistic scenario in which these
cameras become part of the everyday pattern of use for the
majority of users.
That's why we see the use profile we almost invariably do.
•
•
interest in the phone's camera spikes immediately after
purchase, as customers explore the novelty and seek to justify
the extra expenditure
then tapers off asymptotically to zero.
Slide 61
A Basic Problem with Use Cases




They generally fail to anticipate the larger social
context inside which all technology exists.
Another example:
We have any number of good models for why and
how a user would go about sending an email, or
using a mobile phone.
But no such model could have predicted the
insidious way in which always-on availability that
arrives alongside them affects even non-users.
Slide 62
A Basic Problem with Use Cases


What scenario would have predicted the
emerging etiquette of "reachability“ that says
serious adults must both own a mobile
phone and carry it at all times?
What use case would have accounted for the
resentment towards those who either refuse
or simply forget to do so?
Slide 63
A Basic Problem with Use Cases


What designer would have captured and accurately
modeled the annoyance your correspondents
experience when you don't answer their messages
in something closely approximating real time?
Remember, one of the original selling points of email
was precisely that it was asynchronous.
•

One didn't have to be sitting in front of one's computer to
benefit from it.
How things have changed!
Slide 64
The Moral of the Story




... is not to abandon use cases!!
They'll remain vital tools for anyone seeking to
understand the delicate interactions between human
beings and the things we use.
They will probably assume even greater importance
over time, as our artifacts become ever more
complicated.
But it would be both unexpected and fun if some of
the features and functionality we are sure to be
offered were based on a fuller, more robust
appreciation of everyday life.
Slide 65