SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Requirements Management
Requirements management The process of managing change to the requirements for a system The principal concerns of requirements management are: Managing changes to agreed requirements Managing the relationships between requirements Managing the dependencies between the requirements document and other documents produced in the systems engineering process Requirements cannot be managed effectively without requirements traceability.  A requirement is traceable if you can discover who suggested the requirement, why the requirement exists, what requirements are related to it and how that requirement relates to other information such as systems designs, implementations and user documentation.
CASE tools for requirements management Requirements management involves the collection, storage and maintenance of large amounts of information There are now a number of CASE tools available which are specifically designed to support requirements management Other CASE tools such as configuration management systems may be adapted for requirements engineering
Requirements management tool support A database system for storing requirements. Document analysis and generation facilities to help construct a requirements database and to help create requirements documents. Change management facilities which help ensure that changes are properly assessed and costed. Traceability facilities which help requirements engineers find dependencies between system requirements.
A requirements management system
Stable and volatile requirements Requirements changes occur while the requirements are being elicited, analysed and validated and after the system has gone into service Some requirements are usually more subject to change than others Stable requirements are concerned with the essence of a system and its application domain. They change more slowly than volatile requirements.  Volatile requirements are specific to the instantiation of the system in a particular environment and for a particular customer.
Requirements change factors Requirements errors, conflicts and inconsistencies As requirements are analysed and implemented, errors and inconsistencies emerge and must be corrected. These may be discovered during requirements analysis and validation or later in the development process. Evolving customer/end-user knowledge of the system As requirements are developed, customers and end-users develop a better understanding of what they really require from a system. Technical, schedule or cost problems	 Problems may be encountered in implementing a requirement. It may be too expensive or take too long to implement certain requirements.
Requirements change factors Changing customer priorities	 Customer priorities change during system development as a result of a changing business environment, the emergence of new competitors, staff changes, etc. Environmental changes	 The environment in which the system is to be installed may change so that the system requirements have to change to maintain compatibility Organisational changes	 The organisation which intends to use the system may change its structure and processes resulting in new system requirements
Types of volatile requirement Mutable requirements  These are requirements which change because of changes to the environment in which the system is operating Emergent requirements  These are requirements which cannot be completely defined when the system is specified but which emerge as the system is designed and implemented Consequential requirements  These are requirements which are based on assumptions about how the system will be used. When the system is put into use, some of these assumptions will be wrong. Compatibility requirements  These are requirements which depend on other equipment or processes.
Requirements identification It is essential for requirements management that every requirement should have a unique identification The most common approach is requirements numbering based on chapter/section in the requirements document Problems with this are: Numbers cannot be unambiguously assigned until the document is complete Assigning chapter/section numbers is an implicit classification of the requirement. This can mislead readers of the document into thinking that the most important relationships are with requirements in the same section
Requirements identification techniques Dynamic renumbering Some word processing systems allow for automatic renumbering of paragraphs and the inclusion of cross-references. As you re-organise your document and add new requirements, the system keeps track of the cross-reference and automatically renumbers your requirement depending on its chapter, section and position within the section Database record identification When a requirement is identified it is entered in a requirements database and a database record identifier is assigned. This database identifier is used in all subsequent references to the requirement Symbolic identification Requirements can be identified by giving them a symbolic name which is associated with the requirement itself. For example, EFF-1, EFF-2, EFF-3 may be used for requirements which relate to system efficiency
Storing requirements Requirements have to be stored in such a way that they can be accessed easily and related to other system requirements Possible storage techniques are In one or more word processor files - requirements are stored in the requirements document In a specially designed requirements database
Word processor documents Advantages Requirements are all stored in the same place Requirements may be accessed by anyone with the right word processor It is easy to produce the final requirements document Disadvantages Requirements dependencies must be externally maintained Search facilities are limited Not possible to link requirements with proposed requirements changes Not possible to have version control on individual requirements No automated navigation from one requirement to another
Requirements database Each requirement is represented as one or more database entities Database query language is used to access requirements Advantages Good query and navigation facilities Support for change and version management Disadvantages Readers may not have the software/skills to access the requirements database The link between the database and the requirements document must be maintained
Object classes for requirements DB
Requirements DB - choice factors The statement of requirements If there is a need to store more than just simple text,  a database with multimedia capabilities may have to be used. The number of requirements Larger systems usually need a database which is designed to manage a very large volume of data running on a specialised database server. Teamwork, team distribution and computer support If the requirements are developed by a distributed team of people, perhaps from different organisations, you need a database which provides for remote, multi-site access.
Database choice factors CASE tool use The database should be the same as or compatible with CASE tool databases. However, this can be a problem with some CASE tools which use their own proprietary database Existing database usage If a database for software engineering support is already in use, this should be used for requirements management.
Change management Change management is concerned with the procedures, processes and standards which are used to manage changes to system requirements Change management policies may cover: The change request process and the information required to process each change request The process used to analyse the impact and costs of change and the associated traceability information The membership of the body which formally considers change requests 4. The software support (if any) for the change control process
The change management process Some requirements problem is identified.  This could come from an analysis of the requirements, new customer needs, or operational problems with the system. The requirements are analysed using problem information and requirements changes are proposed. The proposed changes are analysed  This checks how many requirements (and, if necessary, system components) are affected by the change and roughly how much it would cost, in both time and money, to make the change. The change is implemented.  A set of amendments to the requirements document or a new document version is produced.  This should, of course, be validated using whatever normal quality checking procedures are used.
Change management stages
Change analysis and costing
Change analysis activities The change request is checked for validity. Customers can misunderstand requirements and suggest unnecessary changes. The requirements which are directly affected by the change are discovered. Traceability information is used to find dependent requirements affected by the change. The actual changes which must be made to the requirements are proposed.  The costs of making the changes are estimated.  Negotiations with customers are held to check if the costs of the proposed changes are acceptable.
Change request rejection If the change request is invalid. This normally arises if a customer has misunderstood something about the requirements and proposed a change which isn’t necessary. If the change request results in consequential changes which are unacceptable to the user.  If the cost of implementing the change is too high or takes too long.
Change processing Proposed changes are usually recorded on a change request form which is then passed to all of the people involved in the analysis of the change Change request forms may include fields to document the change analysis data fields  responsibility fields status field comments field
Tool support for change management May be provided through requirements management tools or through configuration management tools Tool facilities may include Electronic change request forms which are filled in by different participants in the process. A database to store and manage these forms. A change model which may be instantiated so that people responsible for one stage of the process know who is responsible for the next process activity. Electronic transfer of forms between people with different responsibilities and electronic mail notification when activities have been completed. In some cases, direct links to a requirements database.
Traceability Traceability information is information which helps you assess the impact of requirements change. It links related requirements and the requirements and other system representations Types of traceability information Backward-from traceability  Links requirements to their sources in other documents or people Forward-from traceability  Links requirements to the design and implementation components Backward-to traceability  Links design and implementation components backs to requirements Forward-to traceability  Links other documents (which may have preceded the requirements document) to relevant requirements.
Backwards/forwards traceability
Types of traceability Requirements-sources traceability Links the requirement and the people or documents which specified the requirement Requirements-rationale traceability Links the requirement with a description of why that requirement has been specified. Requirements-requirements traceability Links requirements with other requirements which are, in some way, dependent on them. This should be a two-way link (dependants and is-dependent on).
Types of traceability Requirements-architecture traceability Links requirements with the sub-systems where these requirements are implemented. This is particularly important where sub-systems are being developed by different sub-contractors Requirements-design traceability Links requirements with specific hardware or software components in the system which are used to implement the requirement Requirements-interface traceability Links requirements with the interfaces of external systems which are used in the provision of the requirements
Traceability tables Traceability tables show the relationships between requirements or between requirements and design components Requirements are listed along the horizontal and vertical axes and relationships between requirements are marked in the table cells Traceability tables for showing requirements dependencies should be defined with requirement numbers used to label the rows and columns of the table
A traceability table
Traceability lists If a relatively small number of requirements have to be managed (up to 250, say), traceability tables can be implemented using a spreadsheet Traceability tables become more of a problem when there are hundreds or thousands of requirements as the tables become large and sparsely populated A simplified form of traceability table may be used where, along with each requirement description, one or more lists of the identifiers of related requirements are maintained.  Traceability lists are simple lists of relationships which can be implemented as text or as simple tables
A traceability list
Traceability policies Traceability policies define what and how traceability information should be maintained.  Traceability policies may include The traceability information which should be maintained.     Techniques, such as traceability matrices, which should be used for maintaining traceability.  A description of when the traceability information should be collected during the requirements engineering and system development processes.  The roles of the people, such as the traceability manager, who are responsible for maintaining the traceability information should also be defined. A description of how to handle and document policy exceptions The process of managing traceability information
Factors influencing traceability policies Number of requirements  The greater the number of requirements, the more the need for formal traceability policies. Estimated system lifetime More comprehensive traceability policies should be defined for systems which have a long lifetime. Level of organisational maturity Detailed traceability policies are most likely to be cost-effective in organisations which have a higher level of process maturity
Factors influencing traceability policies Project team size and composition  With a small team, it may be possible to assess the impact of proposed informally without structured traceability information. With larger teams, however, you need more formal traceability policies. Type of system Critical systems such as hard real-time control systems or safety-critical systems need more comprehensive traceability policies than non-critical systems.  Specific customer requirements Some customers may specify that specific traceability information should be delivered as part of the system documentation.
Key points Requirements change is inevitable as customers develop a better understanding of their real needs and as the political, organisational and technical environment in which a system is to be installed changes. Requirements which are concerned with the essence of a system are more likely to be stable than requirements which are more concerned with how the system is implemented in a particular environment.  Types of volatile requirement include mutable requirements, emergent requirements, consequential requirements and compatibility requirements. Requirements management requires that each requirement should be uniquely identified.  If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained.
Key points Change management policies should define the processes used for change management and the information which should be associated with each change request. They should also define who is responsible for doing what in the change management process. Some automated support for change management should be provided. This may come through specialised requirements management tools or by configuring existing tools to support change management Traceability information records the dependencies between requirements and the sources of these requirements, dependencies between requirements and dependencies between the requirements and the system implementation.   Traceability matrices may be used to record traceability information. Collecting and maintaining traceability information is expensive. To help control these costs, organisations should define a set of traceability policies which set out what information is to be collected and how it is to be maintained.

Weitere ähnliche Inhalte

Was ist angesagt?

Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineeringPreeti Mishra
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
Pressman ch-11-component-level-design
Pressman ch-11-component-level-designPressman ch-11-component-level-design
Pressman ch-11-component-level-designOliver Cheng
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration ManagementSaqib Raza
 
Requirements prioritization
Requirements prioritizationRequirements prioritization
Requirements prioritizationSyed Zaid Irshad
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineeringRa'Fat Al-Msie'deen
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riportDilip Prajapati
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering ProcessesRa'Fat Al-Msie'deen
 
Software Requirements
 Software Requirements Software Requirements
Software RequirementsZaman Khan
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)IIUI
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specificationM.E. at GTU- PG School
 
Social and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringSocial and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringImran Hussain Khan
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementChandan Chaurasia
 
Library Management System Waterfall Model
Library Management System Waterfall ModelLibrary Management System Waterfall Model
Library Management System Waterfall Modelmitwa1990
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specificationAman Adhikari
 
Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...MD.HABIBUR Rahman
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
Library Management system
Library Management systemLibrary Management system
Library Management systemTayyab Hussain
 

Was ist angesagt? (20)

Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineering
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Pressman ch-11-component-level-design
Pressman ch-11-component-level-designPressman ch-11-component-level-design
Pressman ch-11-component-level-design
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Requirements prioritization
Requirements prioritizationRequirements prioritization
Requirements prioritization
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineering
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Requirements Engineering Processes
Requirements Engineering ProcessesRequirements Engineering Processes
Requirements Engineering Processes
 
Software Requirements
 Software Requirements Software Requirements
Software Requirements
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specification
 
Social and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringSocial and cultural issues in requirements engineering
Social and cultural issues in requirements engineering
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Library Management System Waterfall Model
Library Management System Waterfall ModelLibrary Management System Waterfall Model
Library Management System Waterfall Model
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Library Management system
Library Management systemLibrary Management system
Library Management system
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 

Andere mochten auch

An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineeringIan Sommerville
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGSaqib Raza
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering ProfessionSaqib Raza
 
software requirements
 software requirements software requirements
software requirementsZaman Khan
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9Ian Sommerville
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Ch26 - software engineering 9
Ch26 - software engineering 9Ch26 - software engineering 9
Ch26 - software engineering 9Ian Sommerville
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9Ian Sommerville
 
Ch4-Software Engineering 9
Ch4-Software Engineering 9Ch4-Software Engineering 9
Ch4-Software Engineering 9Ian Sommerville
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 

Andere mochten auch (20)

Chap1 RE Introduction
Chap1 RE IntroductionChap1 RE Introduction
Chap1 RE Introduction
 
Chap3 RE elicitation
Chap3 RE elicitationChap3 RE elicitation
Chap3 RE elicitation
 
Chap2 RE processes
Chap2 RE processesChap2 RE processes
Chap2 RE processes
 
Chap4 RE validation
Chap4 RE validationChap4 RE validation
Chap4 RE validation
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
software requirements
 software requirements software requirements
software requirements
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Ch26 - software engineering 9
Ch26 - software engineering 9Ch26 - software engineering 9
Ch26 - software engineering 9
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9
 
Ch4-Software Engineering 9
Ch4-Software Engineering 9Ch4-Software Engineering 9
Ch4-Software Engineering 9
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 

Ähnlich wie Chap5 RE management

Ch 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxCh 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxbalewayalew
 
Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change managementRa'Fat Al-Msie'deen
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26koolkampus
 
13 configuration management
13  configuration management13  configuration management
13 configuration managementrandhirlpu
 
Software Change in Software Engineering SE27
Software Change in Software Engineering SE27Software Change in Software Engineering SE27
Software Change in Software Engineering SE27koolkampus
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng OverviewIan Sommerville
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxbagotjesusa
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1pikuoec
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...Steffan Stringer
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development HelpWithAssignment.com
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringHuda Alameen
 

Ähnlich wie Chap5 RE management (20)

Ch 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxCh 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptx
 
Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change management
 
L4 RE Processes
L4 RE ProcessesL4 RE Processes
L4 RE Processes
 
4
44
4
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
 
13 configuration management
13  configuration management13  configuration management
13 configuration management
 
W3 requirements engineering processes
W3   requirements engineering processesW3   requirements engineering processes
W3 requirements engineering processes
 
Software Change in Software Engineering SE27
Software Change in Software Engineering SE27Software Change in Software Engineering SE27
Software Change in Software Engineering SE27
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng Overview
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1
 
Ch21
Ch21Ch21
Ch21
 
Dit yvol4iss44
Dit yvol4iss44Dit yvol4iss44
Dit yvol4iss44
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
 
Se lec 4
Se lec 4Se lec 4
Se lec 4
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0
 

Mehr von Ian Sommerville

Ch16-Software Engineering 9
Ch16-Software Engineering 9Ch16-Software Engineering 9
Ch16-Software Engineering 9Ian Sommerville
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9Ian Sommerville
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9Ian Sommerville
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9Ian Sommerville
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9Ian Sommerville
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9Ian Sommerville
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9Ian Sommerville
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9Ian Sommerville
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9Ian Sommerville
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9Ian Sommerville
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9Ian Sommerville
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 

Mehr von Ian Sommerville (14)

Ch16-Software Engineering 9
Ch16-Software Engineering 9Ch16-Software Engineering 9
Ch16-Software Engineering 9
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Chap5 RE management

  • 2. Requirements management The process of managing change to the requirements for a system The principal concerns of requirements management are: Managing changes to agreed requirements Managing the relationships between requirements Managing the dependencies between the requirements document and other documents produced in the systems engineering process Requirements cannot be managed effectively without requirements traceability. A requirement is traceable if you can discover who suggested the requirement, why the requirement exists, what requirements are related to it and how that requirement relates to other information such as systems designs, implementations and user documentation.
  • 3. CASE tools for requirements management Requirements management involves the collection, storage and maintenance of large amounts of information There are now a number of CASE tools available which are specifically designed to support requirements management Other CASE tools such as configuration management systems may be adapted for requirements engineering
  • 4. Requirements management tool support A database system for storing requirements. Document analysis and generation facilities to help construct a requirements database and to help create requirements documents. Change management facilities which help ensure that changes are properly assessed and costed. Traceability facilities which help requirements engineers find dependencies between system requirements.
  • 6. Stable and volatile requirements Requirements changes occur while the requirements are being elicited, analysed and validated and after the system has gone into service Some requirements are usually more subject to change than others Stable requirements are concerned with the essence of a system and its application domain. They change more slowly than volatile requirements. Volatile requirements are specific to the instantiation of the system in a particular environment and for a particular customer.
  • 7. Requirements change factors Requirements errors, conflicts and inconsistencies As requirements are analysed and implemented, errors and inconsistencies emerge and must be corrected. These may be discovered during requirements analysis and validation or later in the development process. Evolving customer/end-user knowledge of the system As requirements are developed, customers and end-users develop a better understanding of what they really require from a system. Technical, schedule or cost problems Problems may be encountered in implementing a requirement. It may be too expensive or take too long to implement certain requirements.
  • 8. Requirements change factors Changing customer priorities Customer priorities change during system development as a result of a changing business environment, the emergence of new competitors, staff changes, etc. Environmental changes The environment in which the system is to be installed may change so that the system requirements have to change to maintain compatibility Organisational changes The organisation which intends to use the system may change its structure and processes resulting in new system requirements
  • 9. Types of volatile requirement Mutable requirements These are requirements which change because of changes to the environment in which the system is operating Emergent requirements These are requirements which cannot be completely defined when the system is specified but which emerge as the system is designed and implemented Consequential requirements These are requirements which are based on assumptions about how the system will be used. When the system is put into use, some of these assumptions will be wrong. Compatibility requirements These are requirements which depend on other equipment or processes.
  • 10. Requirements identification It is essential for requirements management that every requirement should have a unique identification The most common approach is requirements numbering based on chapter/section in the requirements document Problems with this are: Numbers cannot be unambiguously assigned until the document is complete Assigning chapter/section numbers is an implicit classification of the requirement. This can mislead readers of the document into thinking that the most important relationships are with requirements in the same section
  • 11. Requirements identification techniques Dynamic renumbering Some word processing systems allow for automatic renumbering of paragraphs and the inclusion of cross-references. As you re-organise your document and add new requirements, the system keeps track of the cross-reference and automatically renumbers your requirement depending on its chapter, section and position within the section Database record identification When a requirement is identified it is entered in a requirements database and a database record identifier is assigned. This database identifier is used in all subsequent references to the requirement Symbolic identification Requirements can be identified by giving them a symbolic name which is associated with the requirement itself. For example, EFF-1, EFF-2, EFF-3 may be used for requirements which relate to system efficiency
  • 12. Storing requirements Requirements have to be stored in such a way that they can be accessed easily and related to other system requirements Possible storage techniques are In one or more word processor files - requirements are stored in the requirements document In a specially designed requirements database
  • 13. Word processor documents Advantages Requirements are all stored in the same place Requirements may be accessed by anyone with the right word processor It is easy to produce the final requirements document Disadvantages Requirements dependencies must be externally maintained Search facilities are limited Not possible to link requirements with proposed requirements changes Not possible to have version control on individual requirements No automated navigation from one requirement to another
  • 14. Requirements database Each requirement is represented as one or more database entities Database query language is used to access requirements Advantages Good query and navigation facilities Support for change and version management Disadvantages Readers may not have the software/skills to access the requirements database The link between the database and the requirements document must be maintained
  • 15. Object classes for requirements DB
  • 16. Requirements DB - choice factors The statement of requirements If there is a need to store more than just simple text, a database with multimedia capabilities may have to be used. The number of requirements Larger systems usually need a database which is designed to manage a very large volume of data running on a specialised database server. Teamwork, team distribution and computer support If the requirements are developed by a distributed team of people, perhaps from different organisations, you need a database which provides for remote, multi-site access.
  • 17. Database choice factors CASE tool use The database should be the same as or compatible with CASE tool databases. However, this can be a problem with some CASE tools which use their own proprietary database Existing database usage If a database for software engineering support is already in use, this should be used for requirements management.
  • 18. Change management Change management is concerned with the procedures, processes and standards which are used to manage changes to system requirements Change management policies may cover: The change request process and the information required to process each change request The process used to analyse the impact and costs of change and the associated traceability information The membership of the body which formally considers change requests 4. The software support (if any) for the change control process
  • 19. The change management process Some requirements problem is identified. This could come from an analysis of the requirements, new customer needs, or operational problems with the system. The requirements are analysed using problem information and requirements changes are proposed. The proposed changes are analysed This checks how many requirements (and, if necessary, system components) are affected by the change and roughly how much it would cost, in both time and money, to make the change. The change is implemented. A set of amendments to the requirements document or a new document version is produced. This should, of course, be validated using whatever normal quality checking procedures are used.
  • 22. Change analysis activities The change request is checked for validity. Customers can misunderstand requirements and suggest unnecessary changes. The requirements which are directly affected by the change are discovered. Traceability information is used to find dependent requirements affected by the change. The actual changes which must be made to the requirements are proposed. The costs of making the changes are estimated. Negotiations with customers are held to check if the costs of the proposed changes are acceptable.
  • 23. Change request rejection If the change request is invalid. This normally arises if a customer has misunderstood something about the requirements and proposed a change which isn’t necessary. If the change request results in consequential changes which are unacceptable to the user. If the cost of implementing the change is too high or takes too long.
  • 24. Change processing Proposed changes are usually recorded on a change request form which is then passed to all of the people involved in the analysis of the change Change request forms may include fields to document the change analysis data fields responsibility fields status field comments field
  • 25. Tool support for change management May be provided through requirements management tools or through configuration management tools Tool facilities may include Electronic change request forms which are filled in by different participants in the process. A database to store and manage these forms. A change model which may be instantiated so that people responsible for one stage of the process know who is responsible for the next process activity. Electronic transfer of forms between people with different responsibilities and electronic mail notification when activities have been completed. In some cases, direct links to a requirements database.
  • 26. Traceability Traceability information is information which helps you assess the impact of requirements change. It links related requirements and the requirements and other system representations Types of traceability information Backward-from traceability Links requirements to their sources in other documents or people Forward-from traceability Links requirements to the design and implementation components Backward-to traceability Links design and implementation components backs to requirements Forward-to traceability Links other documents (which may have preceded the requirements document) to relevant requirements.
  • 28. Types of traceability Requirements-sources traceability Links the requirement and the people or documents which specified the requirement Requirements-rationale traceability Links the requirement with a description of why that requirement has been specified. Requirements-requirements traceability Links requirements with other requirements which are, in some way, dependent on them. This should be a two-way link (dependants and is-dependent on).
  • 29. Types of traceability Requirements-architecture traceability Links requirements with the sub-systems where these requirements are implemented. This is particularly important where sub-systems are being developed by different sub-contractors Requirements-design traceability Links requirements with specific hardware or software components in the system which are used to implement the requirement Requirements-interface traceability Links requirements with the interfaces of external systems which are used in the provision of the requirements
  • 30. Traceability tables Traceability tables show the relationships between requirements or between requirements and design components Requirements are listed along the horizontal and vertical axes and relationships between requirements are marked in the table cells Traceability tables for showing requirements dependencies should be defined with requirement numbers used to label the rows and columns of the table
  • 32. Traceability lists If a relatively small number of requirements have to be managed (up to 250, say), traceability tables can be implemented using a spreadsheet Traceability tables become more of a problem when there are hundreds or thousands of requirements as the tables become large and sparsely populated A simplified form of traceability table may be used where, along with each requirement description, one or more lists of the identifiers of related requirements are maintained. Traceability lists are simple lists of relationships which can be implemented as text or as simple tables
  • 34. Traceability policies Traceability policies define what and how traceability information should be maintained. Traceability policies may include The traceability information which should be maintained. Techniques, such as traceability matrices, which should be used for maintaining traceability. A description of when the traceability information should be collected during the requirements engineering and system development processes. The roles of the people, such as the traceability manager, who are responsible for maintaining the traceability information should also be defined. A description of how to handle and document policy exceptions The process of managing traceability information
  • 35. Factors influencing traceability policies Number of requirements The greater the number of requirements, the more the need for formal traceability policies. Estimated system lifetime More comprehensive traceability policies should be defined for systems which have a long lifetime. Level of organisational maturity Detailed traceability policies are most likely to be cost-effective in organisations which have a higher level of process maturity
  • 36. Factors influencing traceability policies Project team size and composition With a small team, it may be possible to assess the impact of proposed informally without structured traceability information. With larger teams, however, you need more formal traceability policies. Type of system Critical systems such as hard real-time control systems or safety-critical systems need more comprehensive traceability policies than non-critical systems. Specific customer requirements Some customers may specify that specific traceability information should be delivered as part of the system documentation.
  • 37. Key points Requirements change is inevitable as customers develop a better understanding of their real needs and as the political, organisational and technical environment in which a system is to be installed changes. Requirements which are concerned with the essence of a system are more likely to be stable than requirements which are more concerned with how the system is implemented in a particular environment. Types of volatile requirement include mutable requirements, emergent requirements, consequential requirements and compatibility requirements. Requirements management requires that each requirement should be uniquely identified. If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained.
  • 38. Key points Change management policies should define the processes used for change management and the information which should be associated with each change request. They should also define who is responsible for doing what in the change management process. Some automated support for change management should be provided. This may come through specialised requirements management tools or by configuring existing tools to support change management Traceability information records the dependencies between requirements and the sources of these requirements, dependencies between requirements and dependencies between the requirements and the system implementation. Traceability matrices may be used to record traceability information. Collecting and maintaining traceability information is expensive. To help control these costs, organisations should define a set of traceability policies which set out what information is to be collected and how it is to be maintained.