SlideShare a Scribd company logo
1 of 32
Requirements Management with Use Cases Module 3  Analyzing the Problem
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Course Outline
Analyzing the Problem :  Overview Problem Solution Space Problem Space Needs Features Software Requirements The Product To Be Built Test Procedures Design User Docs Traceability
Why Is Analyzing the Problem Important? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of a Problem “ A problem can be defined as the difference between Gause & Weinberg, 1989 {Problem} things as  perceived things as  desired” and
Steps in Problem Analysis ,[object Object],[object Object],[object Object],[object Object]
Step 1. Gain Agreement ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Project: A Recycling Machine ,[object Object],Button Receipt printer  Can input Return slot Button Receipt printer  Bottle gate Crate gate
Sample Project: Initial Requests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Is the Problem Being Solved?  Fishbone Diagram:  One Method for Root-Cause Analysis  in Solving our Sample Problem List contributing causes to the identified problem. Keep asking “Why?” (expand each rib).  How much does each contribute? We Need Recycling Machines Here Too Much Litter Environmental Impact Too Hard to Recycle Now Limited Natural Resources Impact on Unborn Children People Can Make Money Our Customer’s Stated Problem:
Focus on the Largest Contributors Rank in order and use the 80-20 Rule to focus on the top contributing causes to address the greatest portion of the problem. Pareto Diagram % Contribution
Exercise: What Problem Are We Solving?  What is the  “ problem behind the problem ”  for our class project? Which of these causes contribute most to the identified problem? Pick the largest contributor and repeat (putting this item at the head of the fishbone) until the most significant root causes are identified.  What the customer  believes to be  the problem
Exercise: Step 2. Identify the Stakeholders ,[object Object],[object Object]
Step 3. Define the System Boundaries Legacy System Communications Reports New System Other Systems Maintenance Which of these will be actors in our system? Users
Use Actors to Help Define Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],An   Actor Actor
Who Is the Actor?  To Help Simplify ,[object Object],Passenger Travel Agent Airline Booking system The passenger never touches this system; the travel agent operates it.  Or perhaps you are building an Internet application ... Internet Booking system (airline www page) Passenger
Instances of Actors Print Daily Report  Sam Acts as an Operator Jody Acts as an Operator Use-Case model Operator Crates Cans Receipt Bottles Start
A User Can Act as Several Actors Charlie Charlie as Warehouse Manager Charlie as Warehouse Staff D e p o t S t a f f D e p o t M a n a g e r
Actors Help Determine System Boundaries PC System boundary? Server PC PC PC Is the client software part of the system or is the client an actor? Server User PC
[object Object],Actors Help Define System Boundaries Caller System boundary? Simple Phone System Answering Machine (voice mail) Callee
Useful Questions in Identifying Actors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Actor
Exercise: Identify Actors Our System
Step 4. Identify Constraints Economic Technical Environmental System Political Feasibility
Exercise: Formulating a Problem Statement Now, using the results of the four Problem Analysis steps just completed, let’s formulate a Problem Statement for our class project. The problem of (describe the problem) affects (the stakeholders affected by the problem) The impact of which is (what is the impact of the problem) A successful solution would (list some key benefits of a successful solution)
Problem Analysis: Handout WP: Problem Analysis Handout
Developing a Glossary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Example in RMUC Appendix and TP: Glossary Template Glossary Handout
Capturing the Vocabulary: A Domain Model? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Can Recycle Item Bottle
Defining the Problem ,[object Object],[object Object],Gause & Weinberg, 1982
RUP Workflow Detail: Analyze The Problem
RUP Workers and Artifacts in Requirements Workflow
RUP Workflow Detail: Analyze The Problem
Review: Analyzing the Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Mannermanagement 2
 
Force field analysis
Force field analysisForce field analysis
Force field analysisRobin Jadhav
 
Enterprise Performance Management System or ePMS or e-PMS
Enterprise Performance Management System or ePMS or e-PMSEnterprise Performance Management System or ePMS or e-PMS
Enterprise Performance Management System or ePMS or e-PMSMangipudi Rao
 
Classical theory of management
Classical theory of managementClassical theory of management
Classical theory of managementRavi Muchhal
 
Organisational development b.com vith sem (optional) Bangalore University
Organisational development b.com vith sem (optional) Bangalore UniversityOrganisational development b.com vith sem (optional) Bangalore University
Organisational development b.com vith sem (optional) Bangalore UniversityTriyogi Triyogi
 
BEHAVIOURAL APPROACH TO MANAGEMENT
BEHAVIOURAL APPROACH TO MANAGEMENTBEHAVIOURAL APPROACH TO MANAGEMENT
BEHAVIOURAL APPROACH TO MANAGEMENTPranab Choudhary
 
Employee Counselling
Employee CounsellingEmployee Counselling
Employee CounsellingArsalan Ahmad
 
Strategic planning process
Strategic planning processStrategic planning process
Strategic planning processganpules
 
Leadership concepts and theories
Leadership concepts and theoriesLeadership concepts and theories
Leadership concepts and theoriesalaguraja76
 
Kurt Lewin’s three stage model - Organizational Change and Development - Man...
Kurt Lewin’s three stage model -  Organizational Change and Development - Man...Kurt Lewin’s three stage model -  Organizational Change and Development - Man...
Kurt Lewin’s three stage model - Organizational Change and Development - Man...manumelwin
 
Oc 6440 nature of planned change
Oc 6440 nature of planned changeOc 6440 nature of planned change
Oc 6440 nature of planned changelindseygibsonphd
 
101 lect2 management_environment
101 lect2 management_environment101 lect2 management_environment
101 lect2 management_environmentDougforVUU
 
red hot stove rules seminar.pptx
red hot stove rules seminar.pptxred hot stove rules seminar.pptx
red hot stove rules seminar.pptxmba queens
 
Contemporary Approach to Leadership.
Contemporary  Approach to Leadership.Contemporary  Approach to Leadership.
Contemporary Approach to Leadership.Kuntal Pal
 
Chapter 1 Strategic HRM
Chapter 1 Strategic HRMChapter 1 Strategic HRM
Chapter 1 Strategic HRMLo-Ann Placido
 

What's hot (20)

Chapter 2 The Evolution Of Management Theory Written In Different Manner
Chapter 2   The Evolution Of Management Theory  Written In Different MannerChapter 2   The Evolution Of Management Theory  Written In Different Manner
Chapter 2 The Evolution Of Management Theory Written In Different Manner
 
Force field analysis
Force field analysisForce field analysis
Force field analysis
 
Enterprise Performance Management System or ePMS or e-PMS
Enterprise Performance Management System or ePMS or e-PMSEnterprise Performance Management System or ePMS or e-PMS
Enterprise Performance Management System or ePMS or e-PMS
 
Contingency theory
Contingency theoryContingency theory
Contingency theory
 
Systems Thinking 2019
Systems Thinking 2019Systems Thinking 2019
Systems Thinking 2019
 
scientific management
scientific managementscientific management
scientific management
 
Classical theory of management
Classical theory of managementClassical theory of management
Classical theory of management
 
Organisational development b.com vith sem (optional) Bangalore University
Organisational development b.com vith sem (optional) Bangalore UniversityOrganisational development b.com vith sem (optional) Bangalore University
Organisational development b.com vith sem (optional) Bangalore University
 
BEHAVIOURAL APPROACH TO MANAGEMENT
BEHAVIOURAL APPROACH TO MANAGEMENTBEHAVIOURAL APPROACH TO MANAGEMENT
BEHAVIOURAL APPROACH TO MANAGEMENT
 
Employee Counselling
Employee CounsellingEmployee Counselling
Employee Counselling
 
Strategic planning process
Strategic planning processStrategic planning process
Strategic planning process
 
Leadership concepts and theories
Leadership concepts and theoriesLeadership concepts and theories
Leadership concepts and theories
 
Kurt Lewin’s three stage model - Organizational Change and Development - Man...
Kurt Lewin’s three stage model -  Organizational Change and Development - Man...Kurt Lewin’s three stage model -  Organizational Change and Development - Man...
Kurt Lewin’s three stage model - Organizational Change and Development - Man...
 
change management -Types of change
change management -Types of changechange management -Types of change
change management -Types of change
 
Oc 6440 nature of planned change
Oc 6440 nature of planned changeOc 6440 nature of planned change
Oc 6440 nature of planned change
 
101 lect2 management_environment
101 lect2 management_environment101 lect2 management_environment
101 lect2 management_environment
 
red hot stove rules seminar.pptx
red hot stove rules seminar.pptxred hot stove rules seminar.pptx
red hot stove rules seminar.pptx
 
Contemporary Approach to Leadership.
Contemporary  Approach to Leadership.Contemporary  Approach to Leadership.
Contemporary Approach to Leadership.
 
Job evaluation ppt
Job evaluation pptJob evaluation ppt
Job evaluation ppt
 
Chapter 1 Strategic HRM
Chapter 1 Strategic HRMChapter 1 Strategic HRM
Chapter 1 Strategic HRM
 

Similar to 03 Analyzing The Problem

Similar to 03 Analyzing The Problem (20)

Understanding Stakeholder Needs
Understanding Stakeholder NeedsUnderstanding Stakeholder Needs
Understanding Stakeholder Needs
 
Programming Fundamentals lecture 3
Programming Fundamentals lecture 3Programming Fundamentals lecture 3
Programming Fundamentals lecture 3
 
Ch07
Ch07Ch07
Ch07
 
Ch07
Ch07Ch07
Ch07
 
Software Requirements Engineering Methodologies
Software Requirements Engineering MethodologiesSoftware Requirements Engineering Methodologies
Software Requirements Engineering Methodologies
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Spm intro
Spm introSpm intro
Spm intro
 
How to write use cases
How to write use casesHow to write use cases
How to write use cases
 
Systems development life cycle
Systems development life cycleSystems development life cycle
Systems development life cycle
 
6. ch 5-understanding requirements
6. ch 5-understanding requirements6. ch 5-understanding requirements
6. ch 5-understanding requirements
 
Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
 
Requirements Are Optional, Right?
Requirements Are Optional, Right?Requirements Are Optional, Right?
Requirements Are Optional, Right?
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
 
Assume that four mineral water producers compete in prices in a Be.docx
Assume that four mineral water producers compete in prices in a Be.docxAssume that four mineral water producers compete in prices in a Be.docx
Assume that four mineral water producers compete in prices in a Be.docx
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Hsc project management
Hsc project managementHsc project management
Hsc project management
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
4 IT Interview Question.pdf
4 IT Interview Question.pdf4 IT Interview Question.pdf
4 IT Interview Question.pdf
 
Sdlc
SdlcSdlc
Sdlc
 
SAD_UnitII.docx
SAD_UnitII.docxSAD_UnitII.docx
SAD_UnitII.docx
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

03 Analyzing The Problem

  • 1. Requirements Management with Use Cases Module 3 Analyzing the Problem
  • 2.
  • 3. Analyzing the Problem : Overview Problem Solution Space Problem Space Needs Features Software Requirements The Product To Be Built Test Procedures Design User Docs Traceability
  • 4.
  • 5. Definition of a Problem “ A problem can be defined as the difference between Gause & Weinberg, 1989 {Problem} things as perceived things as desired” and
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. What Is the Problem Being Solved? Fishbone Diagram: One Method for Root-Cause Analysis in Solving our Sample Problem List contributing causes to the identified problem. Keep asking “Why?” (expand each rib). How much does each contribute? We Need Recycling Machines Here Too Much Litter Environmental Impact Too Hard to Recycle Now Limited Natural Resources Impact on Unborn Children People Can Make Money Our Customer’s Stated Problem:
  • 11. Focus on the Largest Contributors Rank in order and use the 80-20 Rule to focus on the top contributing causes to address the greatest portion of the problem. Pareto Diagram % Contribution
  • 12. Exercise: What Problem Are We Solving? What is the “ problem behind the problem ” for our class project? Which of these causes contribute most to the identified problem? Pick the largest contributor and repeat (putting this item at the head of the fishbone) until the most significant root causes are identified. What the customer believes to be the problem
  • 13.
  • 14. Step 3. Define the System Boundaries Legacy System Communications Reports New System Other Systems Maintenance Which of these will be actors in our system? Users
  • 15.
  • 16.
  • 17. Instances of Actors Print Daily Report Sam Acts as an Operator Jody Acts as an Operator Use-Case model Operator Crates Cans Receipt Bottles Start
  • 18. A User Can Act as Several Actors Charlie Charlie as Warehouse Manager Charlie as Warehouse Staff D e p o t S t a f f D e p o t M a n a g e r
  • 19. Actors Help Determine System Boundaries PC System boundary? Server PC PC PC Is the client software part of the system or is the client an actor? Server User PC
  • 20.
  • 21.
  • 23. Step 4. Identify Constraints Economic Technical Environmental System Political Feasibility
  • 24. Exercise: Formulating a Problem Statement Now, using the results of the four Problem Analysis steps just completed, let’s formulate a Problem Statement for our class project. The problem of (describe the problem) affects (the stakeholders affected by the problem) The impact of which is (what is the impact of the problem) A successful solution would (list some key benefits of a successful solution)
  • 25. Problem Analysis: Handout WP: Problem Analysis Handout
  • 26.
  • 27.
  • 28.
  • 29. RUP Workflow Detail: Analyze The Problem
  • 30. RUP Workers and Artifacts in Requirements Workflow
  • 31. RUP Workflow Detail: Analyze The Problem
  • 32.