• No results found

10-Lecture X

N/A
N/A
Protected

Academic year: 2020

Share "10-Lecture X"

Copied!
25
0
0

Loading.... (view fulltext now)

Full text

(1)

COMSATS Institute of Information Technology, Attock

1 Farhan Aadil

Farhan Aadil

Assistant Professor

COMSATS Institute of Information Technology

Lecture 10

Requirement Elicitation

(2)

COMSATS Institute of Information Technology, Attock

2 Farhan Aadil

(3)

COMSATS Institute of Information Technology, Attock

3 Farhan Aadil

3

Requirements Elicitation - 1

• Elicit means to gather, acquire, extract, and obtain, etc.

• Requirements elicitation means gathering requirements or

(4)

COMSATS Institute of Information Technology, Attock

4 Farhan Aadil

4

Requirements Elicitation - 2

(5)

COMSATS Institute of Information Technology, Attock

5 Farhan Aadil

5

Basics of Knowledge Acquisition

• Reading

• Listening

• Asking

• Observing

(6)

COMSATS Institute of Information Technology, Attock

6 Farhan Aadil

6

Requirements Elicitation Techniques

• Individual

• Group

• Modeling

(7)

COMSATS Institute of Information Technology, Attock

7 Farhan Aadil

7

Problems in Requirements Elicitation

• Problems of scope

(8)

COMSATS Institute of Information Technology, Attock

8 Farhan Aadil

8

Problems of Scope

• The boundary of the system is ill-defined

(9)

COMSATS Institute of Information Technology, Attock

9 Farhan Aadil

9

Problems of Understanding - 1

• Users have incomplete understanding of their needs

• Users have poor understanding of computer capabilities and

limitations

(10)

COMSATS Institute of Information Technology, Attock

10 Farhan Aadil

10

Problems of Understanding - 2

• User and analyst speak different languages

• Ease of omitting “obvious” information

• Conflicting views of different users

(11)

COMSATS Institute of Information Technology, Attock

11 Farhan Aadil

11

Problems of Volatility

(12)

COMSATS Institute of Information Technology, Attock

12 Farhan Aadil

12

Contexts in Requirements Elicitation Process

• Organization

• Environment

• Project

• Constraints imposed by people

It

is important to consider the context in which

requirements are being elicited. Requirements

elicitation process may be followed in the

(13)

COMSATS Institute of Information Technology, Attock

13 Farhan Aadil

13

Contexts in Requirements Elicitation Process - 1

• Organization

– Submitters of input

– Users of output

(14)

COMSATS Institute of Information Technology, Attock

14 Farhan Aadil

14

Contexts in Requirements Elicitation Process - 2

• Environment

– Hardware and software

– Maturity of the target system domain

(15)

COMSATS Institute of Information Technology, Attock

15 Farhan Aadil

15

Contexts in Requirements Elicitation Process - 3

• Project

– The attributes of the different stakeholder communities, such as the

end users, sponsors, developers, and requirements analysts.

Examples of such attributes are:

(16)

COMSATS Institute of Information Technology, Attock

16 Farhan Aadil

16

Contexts in Requirements Elicitation Process - 4

• The constraints imposed by the people

(17)

COMSATS Institute of Information Technology, Attock

17 Farhan Aadil

17

Requirements Elicitation Guidelines - 1

• Assess the business and technical feasibility for the

proposed system

• Identify the people who will help specify requirements

and understand their organizational bias

• Define the technical environment

(18)

COMSATS Institute of Information Technology, Attock

18 Farhan Aadil

18

Requirements Elicitation Guidelines - 2

• Define one or more requirements elicitation

methods (interviews, focus groups, team meetings)

(19)

COMSATS Institute of Information Technology, Attock

19 Farhan Aadil

19

Requirements Elicitation Guidelines - 3

• Identify ambiguous requirements as candidates for

prototyping

(20)

COMSATS Institute of Information Technology, Attock

20 Farhan Aadil

20

Ethnomethodology

• Looks for behaviors that may be different in

a specific culture but which have the same

underlying purpose or meaning

• Conversational/Informal analysis

• Measurement of body system functions

• Non-verbal behavior studies

(21)

COMSATS Institute of Information Technology, Attock

21 Farhan Aadil

21

Requirements and Psychology

• Errors in statements can happen in two

places

– Perception of facts – reality

– Linguistic representation of one of these

perceptions – personal reality

(22)

COMSATS Institute of Information Technology, Attock

22 Farhan Aadil

22

Use Case Modeling

• Define actors and black-box use cases

• The functional requirements of the system

are defined in terms of use cases and

actors

(23)

COMSATS Institute of Information Technology, Attock

23 Farhan Aadil

23

Summary - 1

• Introduced the concept of elicitation and

requirements elicitation process

• Basics of knowledge acquisition (reading,

listening, asking, & observing)

• Knowledge acquisition techniques

(individual, group, modeling, cognitive)

• Elicitation problems (scope,

(24)

COMSATS Institute of Information Technology, Attock

24 Farhan Aadil

24

Summary - 2

• Context (organization, environment,

(25)

COMSATS Institute of Information Technology, Attock

25 Farhan Aadil

25

References

• ‘Requirements Engineering: Processes and

Techniques’ by G. Kotonya and I. Sommerville,

John Wiley & Sons, 1998

• Software Requirements: Objects, Functions,

and States by A. Davis, PH, 1993

• Software Engineering 6

th

Edition, by I.

Sommerville, 2000

• Software Engineering 5

th

Edition, by R.

References

Related documents

It is hoped by the researcher that his findings can be used in the future to assist Libyan service and manufacturing industries understand the importance of Quality

Yagnopaveetham is the triple stranded sacrificial strand of thread joined by a k Yagnopaveetham is the triple stranded sacrificial strand of thread joined by a k not

The introduction and extension of adequate and appropriate training and education programmes for public servants as set out in the White Paper on Public Service Training and

Analele Universit ăţ ii “Constantin Brâncu ş i” din Târgu Jiu, Seria Economie, Nr.. Necesitatea de a utiliza software- ul în modelarea

To answer that question, we must consider the themes of fear and discord within the larger Megarian tradition, and indeed two later stories about Megara’s role in the Persian

Ralph MOVED to recommend Council authorize the Mayor to sign a Consultant Services Agreement with Jason Engineering and Consulting Business, Inc., in an amount not to

Once they arrive, peer tutors might copy edit and/or correct errors for them in a directive way (Cogie, Strain, and Lorinskas, 1999; Powers, 1993) because that is what the

More recently CAAs have become involved in various asset formation initiatives such as free tax preparation services, financial skills education, and Individual Development