SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Dependability requirements engineering
Objectives To introduce dependability requirements, which are of particular significance for large-scale systems To discuss the notion of safety-critical information systems and to introduce an exemplar system concerned with healthcare records management To discuss an approach to dependability requirements derivation based on viewpoints and concerns that is geared to discovering requirements conflicts
System dependability A system may be considered to be dependable if it operates without interruption, delivers the services that are expected by stakeholders, does not have adverse effects on the system’s environment and does not damage its data or the system itself.  Dependability covers: Reliability Availability Safety Security
Dependability requirement types Non-functional requirements Requirements that specify the dependability properties of the system The Probability of Failure on Demand of the Protection system shall be 0.0001 Functional requirements Requirements that are introduced in order to achieve dependability as distinct from requirements that reflect the functionality that is used by system stakeholders All data that is maintained on local disks must be encrypted
Integrated requirements engineering Dependability requirements are business requirements so dependability requirements engineering should not be a separate process but should be part of the system requirements engineering process Dependability issues should be considered alongside other business requirements – dependability should not be compromised but the best way to improve dependability might be to change other system requirements In this lecture, I will focus on safety requirements engineering but the approach proposed is equally applicable to other dependability requirements
Rationale Safety is not an isolated system property but must be considered in conjunction with other properties such as integrity and timeliness Requirements conflicts and trade-offs are harder to make when safety requirements are distinguished in some way Risks and hazards, especially for information systems, cannot be identified until you have some knowledge of the system requirements
Safety-critical information systems The safety-critical systems community has focused its attention on safety-critical control systems In those systems, the actual damage that is caused results from undesirable behaviour of the equipment that is being controlled Increasingly, however, information systems are safety-critical in that system failure results in indirect risks to people Other systems (not necessarily equipment but also human systems) may rely on an information system for their correct functioning. Failure of these systems may then lead to damage
Examples Design systems Failure of CAD systems that are used to design critical hardware and software may lead to the failure of the systems that have been designed A story in the 1970s suggested that a number of plane crashes were a result of errors in a structural analysis program which resulted in structural weaknesses in the airframe Records systems Incorrect information or unavailability of records systems may mean that users of these systems take actions that are potentially dangerous If a maintenance record for an aircraft is incorrect, parts that have reached the end of their design life may not be replaced Simulation systems Simulation systems that do not match the real environment may result in incorrect design decisions or misplaced confidence in the integrity of the system
Secondary risks In control systems, the risks (primary risks) are determined from the characteristics of the equipment that is being controlled This doesn’t mean that risk assessment is easy but it does provide boundaries for the risk assessment and helps identify information sources In information systems, the risks are secondary risks (ie they result from the use of some other dependent system) As there may be many dependent systems, identifying risks is consequently more difficult
Hazard classes Data hazards, namely hazards that are associated with the data processed by the system, are the major type of hazard in information systems Control hazards, hazards that are associated with the software controlling the system are also significant
Secondary risk example An electronic health record in a hospital may be used in: Diagnostic processes Anaesthetic processes Treatment processes Discharge processes A failure in that system associated with an individual record may be non-critical for some of these processes but critical for others
Control systems and information systems Control systems are becoming increasingly data intensive as more and more operational data is stored and used Control systems are increasingly being directly connected to information systems so that failure of the information system is a hazard for the control system.  This type of hazard can be difficult to manage
The MHCPMS This system (not its real name but a real system) is a generic medical information system that is configured for use in different regional health trusts It supports the management of patients suffering from mental health problems and provides information on their treatment to health service managers
System goals To provide management information that allows health service managers to assess performance against local and government targets To provide medical staff with timely information to facilitate the treatment of patients
Mental health care Patients do not always attend the same clinic but may attend in different hospitals and local health centres Patients may be confused and disorganised, miss appointments, deliberately or accidentally lose medication, forget instructions and make unreasonable demands on staff Mental health care is safety-critical as a small number of patients may be a danger to themselves and others
Concerns Safety should be considered as an organisational goal and should be considered in conjunction with other organisational goals and business requirements Concerns are a general mechanism that we have devised that are used to reflect organisational goals They also reflect constraints on the organisation that reflect the environment in which the organisation operates They help focus the requirements engineering process and provide a basis for conflict analysis
Concerns Are issues that an organisation must pay attention to and that are systemic ie they apply to the system as a whole They are cross-cutting issues that may affect all system stakeholders Help bridge the gap between organisational goals and system requirements May exist at a number of levels so may be decomposed into more specific sub-concerns
Concerns Software and hardware Operators The organisation Society Safety Security Cost
Concerns and safety analysis Concerns are completely compatible with safety analysis as discussed earlier However, they provide a mechanism where safety can be integrated with other critical system requirements They help highlight trade-offs that may have to be made and conflicts that may arise
Concerns in the MHCPMS The principal concerns in the MHCPMS are: Safety - the system should help reduce the number of occasions where patients cause harm to themselves and others Privacy - patient privacy must be maintained according to the provisions of the Data Protection Act and local ethical guidelines Information quality - the information maintained by the system must be accurate and up-to date Operational costs - the operational costs of the system must be ‘reasonable’
Concern decomposition Concerns are decomposed into sub-concerns: Information integrity Information quality Information accuracy Information timeliness
The safety concern Accidental self-harm Patient safety Deliberate self-harm Staff safety Incorrect treatment Safety Adverse reaction to medication Public safety Mental Health Act
Concern identification The process of establishing concerns is probably best done in a series of meetings involving business managers and technical staff Brainstorming or a similar technique may be used Analysis of concerns between meetings is essential and someone should take an explicit action to do this Several meetings over a relatively short period of time are required for this stage
From concerns to questions A problem that I find with hazard analysis is the ‘requirements gap’. You identify the hazards and possible root causes but there is no method for going from there to requirements To address this, we proposed that, after sub-concerns are identified, you should then explicitly identify questions and sub-questions associated with each concern Answers to these questions come from system stakeholders and help generate system requirements
Generic questions What information relates to the sub-concern being considered? Who requires the information and when do they require it? How is the information delivered? What constraints does the (sub) concern impose? What are the consequences of failing to deliver this information?
Deliberate self-harm sub-concern Information about previous history of self-harm or threats of self-harm Medical staff during consultations. Relatives and carers Can be delivered to medical staff directly through the system. Delivered to relatives and carers through a message from the clinic No obvious constraints imposed Failing to deliver may mean an incident of preventable self-harm occurs
Concern-cross checking A generic problem in complex systems is requirements conflicts where different system requirements are mutually contradictory In my view, separating safety analysis in the RE process increases the likelihood of conflict and the costs of resolving that conflict Concerns partially address this problem as it allows cross-checking at a higher level of abstraction than the requirements themselves
Concern comparison Concerns should be compared in pairs to assess the likelihood of of potential conflicts Safety and information quality Conflicts only likely if the requirements allow erroneous or out of date information to be maintained in the system Safety and privacy Privacy may impose limits on what information can be shared and who can access that information. Requirements on information sharing and access should be checked Safety and operational costs Operational processes that require extensive staff time may be problematic
The privacy concern All information in the system that relates to identifiable individuals is covered by the Data Protection Act All staff need to be aware of the requirements imposed by the Act There are no information delivery requirements Personal information may only be disclosed to accredited information users Failure to address the concern could result in legal action against the Trust
A requirements conflict To reduce the likelihood of deliverate self-harm, the patient’s relatives should be informed of incidents or threats of self-harm Information may only be disclosed to accredited information users The privacy concern conflicts with the safety concern
Requirements derivation Requirements are derived from the answers to the questions associated with concerns. However, there is not a simple 1:1 relationship between answers and requirements By using answers to questions, the problem of stakeholders suggesting requirements that are too specific is reduced
MHCPMS requirements The system shall provide fields in each patient record that allow details of incidents or threats of deliberate self-harm to be maintained The records of patients with a record of deliberate self-harm shall be highlighted to bring them to the attention of clinical system users The system shall only permit the transmission of personal patient information to accredited staff and to the patient themselves
Key points An increasing number of information systems of various kinds are safety critical systems Concerns are a mechanism that allows safety to be integrated with other business requirements Concerns are decomposed to sub-concerns and questions that then drive the requirements engineering process The DISCOS method is a spiral model of requirements engineering for critical systems that integrates concerns, requirements and system architectural design

Weitere Àhnliche Inhalte

Was ist angesagt?

Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
Ian Sommerville
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
Ian Sommerville
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
Aryan Ajmer
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
Ian Sommerville
 

Was ist angesagt? (20)

Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Ian Sommerville, Software Engineering, 9th Edition Ch2
Ian Sommerville,  Software Engineering, 9th Edition Ch2Ian Sommerville,  Software Engineering, 9th Edition Ch2
Ian Sommerville, Software Engineering, 9th Edition Ch2
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Critical systems specification
Critical systems specificationCritical systems specification
Critical systems specification
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Process models
Process modelsProcess models
Process models
 
Ch20 systems of systems
Ch20 systems of systemsCh20 systems of systems
Ch20 systems of systems
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 
Overview of Mentcare systen - TEST FILE
Overview of Mentcare systen - TEST FILEOverview of Mentcare systen - TEST FILE
Overview of Mentcare systen - TEST FILE
 
Defect removal effectiveness
Defect removal effectivenessDefect removal effectiveness
Defect removal effectiveness
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 
Ch16 component based software engineering
Ch16 component based software engineeringCh16 component based software engineering
Ch16 component based software engineering
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8
 

Ähnlich wie L5 Dependability Requirements

Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
koolkampus
 
unit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptxunit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptx
GarimaSrivastava93
 

Ähnlich wie L5 Dependability Requirements (20)

L7 Design For Recovery
L7 Design For RecoveryL7 Design For Recovery
L7 Design For Recovery
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Modernizing Legacy Systems in Healthcare: A Comprehensive Guide
Modernizing Legacy Systems in Healthcare: A Comprehensive GuideModernizing Legacy Systems in Healthcare: A Comprehensive Guide
Modernizing Legacy Systems in Healthcare: A Comprehensive Guide
 
Ch10
Ch10Ch10
Ch10
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
unit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptxunit 3 information system in healthcare.pptx
unit 3 information system in healthcare.pptx
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
 
Ch9
Ch9Ch9
Ch9
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
BPM in Healthcare
BPM in HealthcareBPM in Healthcare
BPM in Healthcare
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 

KĂŒrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂŒrzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

L5 Dependability Requirements

  • 2. Objectives To introduce dependability requirements, which are of particular significance for large-scale systems To discuss the notion of safety-critical information systems and to introduce an exemplar system concerned with healthcare records management To discuss an approach to dependability requirements derivation based on viewpoints and concerns that is geared to discovering requirements conflicts
  • 3. System dependability A system may be considered to be dependable if it operates without interruption, delivers the services that are expected by stakeholders, does not have adverse effects on the system’s environment and does not damage its data or the system itself. Dependability covers: Reliability Availability Safety Security
  • 4. Dependability requirement types Non-functional requirements Requirements that specify the dependability properties of the system The Probability of Failure on Demand of the Protection system shall be 0.0001 Functional requirements Requirements that are introduced in order to achieve dependability as distinct from requirements that reflect the functionality that is used by system stakeholders All data that is maintained on local disks must be encrypted
  • 5. Integrated requirements engineering Dependability requirements are business requirements so dependability requirements engineering should not be a separate process but should be part of the system requirements engineering process Dependability issues should be considered alongside other business requirements – dependability should not be compromised but the best way to improve dependability might be to change other system requirements In this lecture, I will focus on safety requirements engineering but the approach proposed is equally applicable to other dependability requirements
  • 6. Rationale Safety is not an isolated system property but must be considered in conjunction with other properties such as integrity and timeliness Requirements conflicts and trade-offs are harder to make when safety requirements are distinguished in some way Risks and hazards, especially for information systems, cannot be identified until you have some knowledge of the system requirements
  • 7. Safety-critical information systems The safety-critical systems community has focused its attention on safety-critical control systems In those systems, the actual damage that is caused results from undesirable behaviour of the equipment that is being controlled Increasingly, however, information systems are safety-critical in that system failure results in indirect risks to people Other systems (not necessarily equipment but also human systems) may rely on an information system for their correct functioning. Failure of these systems may then lead to damage
  • 8. Examples Design systems Failure of CAD systems that are used to design critical hardware and software may lead to the failure of the systems that have been designed A story in the 1970s suggested that a number of plane crashes were a result of errors in a structural analysis program which resulted in structural weaknesses in the airframe Records systems Incorrect information or unavailability of records systems may mean that users of these systems take actions that are potentially dangerous If a maintenance record for an aircraft is incorrect, parts that have reached the end of their design life may not be replaced Simulation systems Simulation systems that do not match the real environment may result in incorrect design decisions or misplaced confidence in the integrity of the system
  • 9. Secondary risks In control systems, the risks (primary risks) are determined from the characteristics of the equipment that is being controlled This doesn’t mean that risk assessment is easy but it does provide boundaries for the risk assessment and helps identify information sources In information systems, the risks are secondary risks (ie they result from the use of some other dependent system) As there may be many dependent systems, identifying risks is consequently more difficult
  • 10. Hazard classes Data hazards, namely hazards that are associated with the data processed by the system, are the major type of hazard in information systems Control hazards, hazards that are associated with the software controlling the system are also significant
  • 11. Secondary risk example An electronic health record in a hospital may be used in: Diagnostic processes Anaesthetic processes Treatment processes Discharge processes A failure in that system associated with an individual record may be non-critical for some of these processes but critical for others
  • 12. Control systems and information systems Control systems are becoming increasingly data intensive as more and more operational data is stored and used Control systems are increasingly being directly connected to information systems so that failure of the information system is a hazard for the control system. This type of hazard can be difficult to manage
  • 13. The MHCPMS This system (not its real name but a real system) is a generic medical information system that is configured for use in different regional health trusts It supports the management of patients suffering from mental health problems and provides information on their treatment to health service managers
  • 14. System goals To provide management information that allows health service managers to assess performance against local and government targets To provide medical staff with timely information to facilitate the treatment of patients
  • 15. Mental health care Patients do not always attend the same clinic but may attend in different hospitals and local health centres Patients may be confused and disorganised, miss appointments, deliberately or accidentally lose medication, forget instructions and make unreasonable demands on staff Mental health care is safety-critical as a small number of patients may be a danger to themselves and others
  • 16. Concerns Safety should be considered as an organisational goal and should be considered in conjunction with other organisational goals and business requirements Concerns are a general mechanism that we have devised that are used to reflect organisational goals They also reflect constraints on the organisation that reflect the environment in which the organisation operates They help focus the requirements engineering process and provide a basis for conflict analysis
  • 17. Concerns Are issues that an organisation must pay attention to and that are systemic ie they apply to the system as a whole They are cross-cutting issues that may affect all system stakeholders Help bridge the gap between organisational goals and system requirements May exist at a number of levels so may be decomposed into more specific sub-concerns
  • 18. Concerns Software and hardware Operators The organisation Society Safety Security Cost
  • 19. Concerns and safety analysis Concerns are completely compatible with safety analysis as discussed earlier However, they provide a mechanism where safety can be integrated with other critical system requirements They help highlight trade-offs that may have to be made and conflicts that may arise
  • 20. Concerns in the MHCPMS The principal concerns in the MHCPMS are: Safety - the system should help reduce the number of occasions where patients cause harm to themselves and others Privacy - patient privacy must be maintained according to the provisions of the Data Protection Act and local ethical guidelines Information quality - the information maintained by the system must be accurate and up-to date Operational costs - the operational costs of the system must be ‘reasonable’
  • 21. Concern decomposition Concerns are decomposed into sub-concerns: Information integrity Information quality Information accuracy Information timeliness
  • 22. The safety concern Accidental self-harm Patient safety Deliberate self-harm Staff safety Incorrect treatment Safety Adverse reaction to medication Public safety Mental Health Act
  • 23. Concern identification The process of establishing concerns is probably best done in a series of meetings involving business managers and technical staff Brainstorming or a similar technique may be used Analysis of concerns between meetings is essential and someone should take an explicit action to do this Several meetings over a relatively short period of time are required for this stage
  • 24. From concerns to questions A problem that I find with hazard analysis is the ‘requirements gap’. You identify the hazards and possible root causes but there is no method for going from there to requirements To address this, we proposed that, after sub-concerns are identified, you should then explicitly identify questions and sub-questions associated with each concern Answers to these questions come from system stakeholders and help generate system requirements
  • 25. Generic questions What information relates to the sub-concern being considered? Who requires the information and when do they require it? How is the information delivered? What constraints does the (sub) concern impose? What are the consequences of failing to deliver this information?
  • 26. Deliberate self-harm sub-concern Information about previous history of self-harm or threats of self-harm Medical staff during consultations. Relatives and carers Can be delivered to medical staff directly through the system. Delivered to relatives and carers through a message from the clinic No obvious constraints imposed Failing to deliver may mean an incident of preventable self-harm occurs
  • 27. Concern-cross checking A generic problem in complex systems is requirements conflicts where different system requirements are mutually contradictory In my view, separating safety analysis in the RE process increases the likelihood of conflict and the costs of resolving that conflict Concerns partially address this problem as it allows cross-checking at a higher level of abstraction than the requirements themselves
  • 28. Concern comparison Concerns should be compared in pairs to assess the likelihood of of potential conflicts Safety and information quality Conflicts only likely if the requirements allow erroneous or out of date information to be maintained in the system Safety and privacy Privacy may impose limits on what information can be shared and who can access that information. Requirements on information sharing and access should be checked Safety and operational costs Operational processes that require extensive staff time may be problematic
  • 29. The privacy concern All information in the system that relates to identifiable individuals is covered by the Data Protection Act All staff need to be aware of the requirements imposed by the Act There are no information delivery requirements Personal information may only be disclosed to accredited information users Failure to address the concern could result in legal action against the Trust
  • 30. A requirements conflict To reduce the likelihood of deliverate self-harm, the patient’s relatives should be informed of incidents or threats of self-harm Information may only be disclosed to accredited information users The privacy concern conflicts with the safety concern
  • 31. Requirements derivation Requirements are derived from the answers to the questions associated with concerns. However, there is not a simple 1:1 relationship between answers and requirements By using answers to questions, the problem of stakeholders suggesting requirements that are too specific is reduced
  • 32. MHCPMS requirements The system shall provide fields in each patient record that allow details of incidents or threats of deliberate self-harm to be maintained The records of patients with a record of deliberate self-harm shall be highlighted to bring them to the attention of clinical system users The system shall only permit the transmission of personal patient information to accredited staff and to the patient themselves
  • 33. Key points An increasing number of information systems of various kinds are safety critical systems Concerns are a mechanism that allows safety to be integrated with other business requirements Concerns are decomposed to sub-concerns and questions that then drive the requirements engineering process The DISCOS method is a spiral model of requirements engineering for critical systems that integrates concerns, requirements and system architectural design