SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Requirements Management
Requirements management The process of managing change to the requirements for a system The principal concerns of requirements management are: Managing changes to agreed requirements Managing the relationships between requirements Managing the dependencies between the requirements document and other documents produced in the systems engineering process Requirements cannot be managed effectively without requirements traceability.  A requirement is traceable if you can discover who suggested the requirement, why the requirement exists, what requirements are related to it and how that requirement relates to other information such as systems designs, implementations and user documentation.
CASE tools for requirements management Requirements management involves the collection, storage and maintenance of large amounts of information There are now a number of CASE tools available which are specifically designed to support requirements management Other CASE tools such as configuration management systems may be adapted for requirements engineering
Requirements management tool support A database system for storing requirements. Document analysis and generation facilities to help construct a requirements database and to help create requirements documents. Change management facilities which help ensure that changes are properly assessed and costed. Traceability facilities which help requirements engineers find dependencies between system requirements.
A requirements management system
Stable and volatile requirements Requirements changes occur while the requirements are being elicited, analysed and validated and after the system has gone into service Some requirements are usually more subject to change than others Stable requirements are concerned with the essence of a system and its application domain. They change more slowly than volatile requirements.  Volatile requirements are specific to the instantiation of the system in a particular environment and for a particular customer.
Requirements change factors Requirements errors, conflicts and inconsistencies As requirements are analysed and implemented, errors and inconsistencies emerge and must be corrected. These may be discovered during requirements analysis and validation or later in the development process. Evolving customer/end-user knowledge of the system As requirements are developed, customers and end-users develop a better understanding of what they really require from a system. Technical, schedule or cost problems	 Problems may be encountered in implementing a requirement. It may be too expensive or take too long to implement certain requirements.
Requirements change factors Changing customer priorities	 Customer priorities change during system development as a result of a changing business environment, the emergence of new competitors, staff changes, etc. Environmental changes	 The environment in which the system is to be installed may change so that the system requirements have to change to maintain compatibility Organisational changes	 The organisation which intends to use the system may change its structure and processes resulting in new system requirements
Types of volatile requirement Mutable requirements  These are requirements which change because of changes to the environment in which the system is operating Emergent requirements  These are requirements which cannot be completely defined when the system is specified but which emerge as the system is designed and implemented Consequential requirements  These are requirements which are based on assumptions about how the system will be used. When the system is put into use, some of these assumptions will be wrong. Compatibility requirements  These are requirements which depend on other equipment or processes.
Requirements identification It is essential for requirements management that every requirement should have a unique identification The most common approach is requirements numbering based on chapter/section in the requirements document Problems with this are: Numbers cannot be unambiguously assigned until the document is complete Assigning chapter/section numbers is an implicit classification of the requirement. This can mislead readers of the document into thinking that the most important relationships are with requirements in the same section
Requirements identification techniques Dynamic renumbering Some word processing systems allow for automatic renumbering of paragraphs and the inclusion of cross-references. As you re-organise your document and add new requirements, the system keeps track of the cross-reference and automatically renumbers your requirement depending on its chapter, section and position within the section Database record identification When a requirement is identified it is entered in a requirements database and a database record identifier is assigned. This database identifier is used in all subsequent references to the requirement Symbolic identification Requirements can be identified by giving them a symbolic name which is associated with the requirement itself. For example, EFF-1, EFF-2, EFF-3 may be used for requirements which relate to system efficiency
Storing requirements Requirements have to be stored in such a way that they can be accessed easily and related to other system requirements Possible storage techniques are In one or more word processor files - requirements are stored in the requirements document In a specially designed requirements database
Word processor documents Advantages Requirements are all stored in the same place Requirements may be accessed by anyone with the right word processor It is easy to produce the final requirements document Disadvantages Requirements dependencies must be externally maintained Search facilities are limited Not possible to link requirements with proposed requirements changes Not possible to have version control on individual requirements No automated navigation from one requirement to another
Requirements database Each requirement is represented as one or more database entities Database query language is used to access requirements Advantages Good query and navigation facilities Support for change and version management Disadvantages Readers may not have the software/skills to access the requirements database The link between the database and the requirements document must be maintained
Object classes for requirements DB
Requirements DB - choice factors The statement of requirements If there is a need to store more than just simple text,  a database with multimedia capabilities may have to be used. The number of requirements Larger systems usually need a database which is designed to manage a very large volume of data running on a specialised database server. Teamwork, team distribution and computer support If the requirements are developed by a distributed team of people, perhaps from different organisations, you need a database which provides for remote, multi-site access.
Database choice factors CASE tool use The database should be the same as or compatible with CASE tool databases. However, this can be a problem with some CASE tools which use their own proprietary database Existing database usage If a database for software engineering support is already in use, this should be used for requirements management.
Change management Change management is concerned with the procedures, processes and standards which are used to manage changes to system requirements Change management policies may cover: The change request process and the information required to process each change request The process used to analyse the impact and costs of change and the associated traceability information The membership of the body which formally considers change requests 4. The software support (if any) for the change control process
The change management process Some requirements problem is identified.  This could come from an analysis of the requirements, new customer needs, or operational problems with the system. The requirements are analysed using problem information and requirements changes are proposed. The proposed changes are analysed  This checks how many requirements (and, if necessary, system components) are affected by the change and roughly how much it would cost, in both time and money, to make the change. The change is implemented.  A set of amendments to the requirements document or a new document version is produced.  This should, of course, be validated using whatever normal quality checking procedures are used.
Change management stages
Change analysis and costing
Change analysis activities The change request is checked for validity. Customers can misunderstand requirements and suggest unnecessary changes. The requirements which are directly affected by the change are discovered. Traceability information is used to find dependent requirements affected by the change. The actual changes which must be made to the requirements are proposed.  The costs of making the changes are estimated.  Negotiations with customers are held to check if the costs of the proposed changes are acceptable.
Change request rejection If the change request is invalid. This normally arises if a customer has misunderstood something about the requirements and proposed a change which isn’t necessary. If the change request results in consequential changes which are unacceptable to the user.  If the cost of implementing the change is too high or takes too long.
Change processing Proposed changes are usually recorded on a change request form which is then passed to all of the people involved in the analysis of the change Change request forms may include fields to document the change analysis data fields  responsibility fields status field comments field
Tool support for change management May be provided through requirements management tools or through configuration management tools Tool facilities may include Electronic change request forms which are filled in by different participants in the process. A database to store and manage these forms. A change model which may be instantiated so that people responsible for one stage of the process know who is responsible for the next process activity. Electronic transfer of forms between people with different responsibilities and electronic mail notification when activities have been completed. In some cases, direct links to a requirements database.
Traceability Traceability information is information which helps you assess the impact of requirements change. It links related requirements and the requirements and other system representations Types of traceability information Backward-from traceability  Links requirements to their sources in other documents or people Forward-from traceability  Links requirements to the design and implementation components Backward-to traceability  Links design and implementation components backs to requirements Forward-to traceability  Links other documents (which may have preceded the requirements document) to relevant requirements.
Backwards/forwards traceability
Types of traceability Requirements-sources traceability Links the requirement and the people or documents which specified the requirement Requirements-rationale traceability Links the requirement with a description of why that requirement has been specified. Requirements-requirements traceability Links requirements with other requirements which are, in some way, dependent on them. This should be a two-way link (dependants and is-dependent on).
Types of traceability Requirements-architecture traceability Links requirements with the sub-systems where these requirements are implemented. This is particularly important where sub-systems are being developed by different sub-contractors Requirements-design traceability Links requirements with specific hardware or software components in the system which are used to implement the requirement Requirements-interface traceability Links requirements with the interfaces of external systems which are used in the provision of the requirements
Traceability tables Traceability tables show the relationships between requirements or between requirements and design components Requirements are listed along the horizontal and vertical axes and relationships between requirements are marked in the table cells Traceability tables for showing requirements dependencies should be defined with requirement numbers used to label the rows and columns of the table
A traceability table
Traceability lists If a relatively small number of requirements have to be managed (up to 250, say), traceability tables can be implemented using a spreadsheet Traceability tables become more of a problem when there are hundreds or thousands of requirements as the tables become large and sparsely populated A simplified form of traceability table may be used where, along with each requirement description, one or more lists of the identifiers of related requirements are maintained.  Traceability lists are simple lists of relationships which can be implemented as text or as simple tables
A traceability list
Traceability policies Traceability policies define what and how traceability information should be maintained.  Traceability policies may include The traceability information which should be maintained.     Techniques, such as traceability matrices, which should be used for maintaining traceability.  A description of when the traceability information should be collected during the requirements engineering and system development processes.  The roles of the people, such as the traceability manager, who are responsible for maintaining the traceability information should also be defined. A description of how to handle and document policy exceptions The process of managing traceability information
Factors influencing traceability policies Number of requirements  The greater the number of requirements, the more the need for formal traceability policies. Estimated system lifetime More comprehensive traceability policies should be defined for systems which have a long lifetime. Level of organisational maturity Detailed traceability policies are most likely to be cost-effective in organisations which have a higher level of process maturity
Factors influencing traceability policies Project team size and composition  With a small team, it may be possible to assess the impact of proposed informally without structured traceability information. With larger teams, however, you need more formal traceability policies. Type of system Critical systems such as hard real-time control systems or safety-critical systems need more comprehensive traceability policies than non-critical systems.  Specific customer requirements Some customers may specify that specific traceability information should be delivered as part of the system documentation.
Key points Requirements change is inevitable as customers develop a better understanding of their real needs and as the political, organisational and technical environment in which a system is to be installed changes. Requirements which are concerned with the essence of a system are more likely to be stable than requirements which are more concerned with how the system is implemented in a particular environment.  Types of volatile requirement include mutable requirements, emergent requirements, consequential requirements and compatibility requirements. Requirements management requires that each requirement should be uniquely identified.  If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained.
Key points Change management policies should define the processes used for change management and the information which should be associated with each change request. They should also define who is responsible for doing what in the change management process. Some automated support for change management should be provided. This may come through specialised requirements management tools or by configuring existing tools to support change management Traceability information records the dependencies between requirements and the sources of these requirements, dependencies between requirements and dependencies between the requirements and the system implementation.   Traceability matrices may be used to record traceability information. Collecting and maintaining traceability information is expensive. To help control these costs, organisations should define a set of traceability policies which set out what information is to be collected and how it is to be maintained.

Weitere ähnliche Inhalte

Was ist angesagt?

SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)Akash Kumar Dhameja
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelssaurabhshertukde
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2MISY
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and AnswersBala Ganesh
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5koolkampus
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specificationM.E. at GTU- PG School
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureAmiya9439793168
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process ModelsHassan A-j
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineeringDarshit Metaliya
 
Reusibility vs Extensibility in OOAD
Reusibility vs Extensibility in OOADReusibility vs Extensibility in OOAD
Reusibility vs Extensibility in OOADShivani Kapoor
 
Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application developmentDhani Ahmad
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality AttributesHayim Makabee
 

Was ist angesagt? (20)

Software process
Software processSoftware process
Software process
 
Normalization
NormalizationNormalization
Normalization
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 
Data Flow Diagrams
Data Flow DiagramsData Flow Diagrams
Data Flow Diagrams
 
Normalization
NormalizationNormalization
Normalization
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and Answers
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Software design methodologies
Software design methodologiesSoftware design methodologies
Software design methodologies
 
Requirement analysis and specification
Requirement analysis and specificationRequirement analysis and specification
Requirement analysis and specification
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema Architecture
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineering
 
Reusibility vs Extensibility in OOAD
Reusibility vs Extensibility in OOADReusibility vs Extensibility in OOAD
Reusibility vs Extensibility in OOAD
 
Databases: Normalisation
Databases: NormalisationDatabases: Normalisation
Databases: Normalisation
 
Chapter19 rapid application development
Chapter19 rapid application developmentChapter19 rapid application development
Chapter19 rapid application development
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality Attributes
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 

Andere mochten auch

An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineeringIan Sommerville
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering ProfessionSaqib Raza
 
Software Requirements
 Software Requirements Software Requirements
Software RequirementsZaman Khan
 
software requirements
 software requirements software requirements
software requirementsZaman Khan
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9Ian Sommerville
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Ch26 - software engineering 9
Ch26 - software engineering 9Ch26 - software engineering 9
Ch26 - software engineering 9Ian Sommerville
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9Ian Sommerville
 
Ch4-Software Engineering 9
Ch4-Software Engineering 9Ch4-Software Engineering 9
Ch4-Software Engineering 9Ian Sommerville
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 

Andere mochten auch (20)

Chap1 RE Introduction
Chap1 RE IntroductionChap1 RE Introduction
Chap1 RE Introduction
 
Chap3 RE elicitation
Chap3 RE elicitationChap3 RE elicitation
Chap3 RE elicitation
 
Chap2 RE processes
Chap2 RE processesChap2 RE processes
Chap2 RE processes
 
Chap4 RE validation
Chap4 RE validationChap4 RE validation
Chap4 RE validation
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
Software Requirements
 Software Requirements Software Requirements
Software Requirements
 
software requirements
 software requirements software requirements
software requirements
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
Ch3-Software Engineering 9
Ch3-Software Engineering 9Ch3-Software Engineering 9
Ch3-Software Engineering 9
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Ch26 - software engineering 9
Ch26 - software engineering 9Ch26 - software engineering 9
Ch26 - software engineering 9
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Ch25-Software Engineering 9
Ch25-Software Engineering 9Ch25-Software Engineering 9
Ch25-Software Engineering 9
 
Ch4-Software Engineering 9
Ch4-Software Engineering 9Ch4-Software Engineering 9
Ch4-Software Engineering 9
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 

Ähnlich wie Chap5 RE management

Ch 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxCh 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxbalewayalew
 
Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change managementRa'Fat Al-Msie'deen
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26koolkampus
 
13 configuration management
13  configuration management13  configuration management
13 configuration managementrandhirlpu
 
Software Change in Software Engineering SE27
Software Change in Software Engineering SE27Software Change in Software Engineering SE27
Software Change in Software Engineering SE27koolkampus
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng OverviewIan Sommerville
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxbagotjesusa
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1pikuoec
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...Steffan Stringer
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development HelpWithAssignment.com
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringHuda Alameen
 

Ähnlich wie Chap5 RE management (20)

Ch 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptxCh 6 - Requirement Management.pptx
Ch 6 - Requirement Management.pptx
 
Requirements management planning & Requirements change management
Requirements management planning & Requirements change managementRequirements management planning & Requirements change management
Requirements management planning & Requirements change management
 
L4 RE Processes
L4 RE ProcessesL4 RE Processes
L4 RE Processes
 
4
44
4
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
 
13 configuration management
13  configuration management13  configuration management
13 configuration management
 
W3 requirements engineering processes
W3   requirements engineering processesW3   requirements engineering processes
W3 requirements engineering processes
 
Software Change in Software Engineering SE27
Software Change in Software Engineering SE27Software Change in Software Engineering SE27
Software Change in Software Engineering SE27
 
L3 Requirements Eng Overview
L3 Requirements Eng OverviewL3 Requirements Eng Overview
L3 Requirements Eng Overview
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Requirement Management 1
Requirement Management 1Requirement Management 1
Requirement Management 1
 
Ch21
Ch21Ch21
Ch21
 
Dit yvol4iss44
Dit yvol4iss44Dit yvol4iss44
Dit yvol4iss44
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development Accounting System Design and Development - System Planning and Development
Accounting System Design and Development - System Planning and Development
 
Se lec 4
Se lec 4Se lec 4
Se lec 4
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0
 

Mehr von Ian Sommerville

Ch16-Software Engineering 9
Ch16-Software Engineering 9Ch16-Software Engineering 9
Ch16-Software Engineering 9Ian Sommerville
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9Ian Sommerville
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9Ian Sommerville
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9Ian Sommerville
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9Ian Sommerville
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9Ian Sommerville
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9Ian Sommerville
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9Ian Sommerville
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9Ian Sommerville
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9Ian Sommerville
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9Ian Sommerville
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 

Mehr von Ian Sommerville (14)

Ch16-Software Engineering 9
Ch16-Software Engineering 9Ch16-Software Engineering 9
Ch16-Software Engineering 9
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9
 
Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9
 
Ch23-Software Engineering 9
Ch23-Software Engineering 9Ch23-Software Engineering 9
Ch23-Software Engineering 9
 
Ch24-Software Engineering 9
Ch24-Software Engineering 9Ch24-Software Engineering 9
Ch24-Software Engineering 9
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 

Kürzlich hochgeladen

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Chap5 RE management

  • 2. Requirements management The process of managing change to the requirements for a system The principal concerns of requirements management are: Managing changes to agreed requirements Managing the relationships between requirements Managing the dependencies between the requirements document and other documents produced in the systems engineering process Requirements cannot be managed effectively without requirements traceability. A requirement is traceable if you can discover who suggested the requirement, why the requirement exists, what requirements are related to it and how that requirement relates to other information such as systems designs, implementations and user documentation.
  • 3. CASE tools for requirements management Requirements management involves the collection, storage and maintenance of large amounts of information There are now a number of CASE tools available which are specifically designed to support requirements management Other CASE tools such as configuration management systems may be adapted for requirements engineering
  • 4. Requirements management tool support A database system for storing requirements. Document analysis and generation facilities to help construct a requirements database and to help create requirements documents. Change management facilities which help ensure that changes are properly assessed and costed. Traceability facilities which help requirements engineers find dependencies between system requirements.
  • 6. Stable and volatile requirements Requirements changes occur while the requirements are being elicited, analysed and validated and after the system has gone into service Some requirements are usually more subject to change than others Stable requirements are concerned with the essence of a system and its application domain. They change more slowly than volatile requirements. Volatile requirements are specific to the instantiation of the system in a particular environment and for a particular customer.
  • 7. Requirements change factors Requirements errors, conflicts and inconsistencies As requirements are analysed and implemented, errors and inconsistencies emerge and must be corrected. These may be discovered during requirements analysis and validation or later in the development process. Evolving customer/end-user knowledge of the system As requirements are developed, customers and end-users develop a better understanding of what they really require from a system. Technical, schedule or cost problems Problems may be encountered in implementing a requirement. It may be too expensive or take too long to implement certain requirements.
  • 8. Requirements change factors Changing customer priorities Customer priorities change during system development as a result of a changing business environment, the emergence of new competitors, staff changes, etc. Environmental changes The environment in which the system is to be installed may change so that the system requirements have to change to maintain compatibility Organisational changes The organisation which intends to use the system may change its structure and processes resulting in new system requirements
  • 9. Types of volatile requirement Mutable requirements These are requirements which change because of changes to the environment in which the system is operating Emergent requirements These are requirements which cannot be completely defined when the system is specified but which emerge as the system is designed and implemented Consequential requirements These are requirements which are based on assumptions about how the system will be used. When the system is put into use, some of these assumptions will be wrong. Compatibility requirements These are requirements which depend on other equipment or processes.
  • 10. Requirements identification It is essential for requirements management that every requirement should have a unique identification The most common approach is requirements numbering based on chapter/section in the requirements document Problems with this are: Numbers cannot be unambiguously assigned until the document is complete Assigning chapter/section numbers is an implicit classification of the requirement. This can mislead readers of the document into thinking that the most important relationships are with requirements in the same section
  • 11. Requirements identification techniques Dynamic renumbering Some word processing systems allow for automatic renumbering of paragraphs and the inclusion of cross-references. As you re-organise your document and add new requirements, the system keeps track of the cross-reference and automatically renumbers your requirement depending on its chapter, section and position within the section Database record identification When a requirement is identified it is entered in a requirements database and a database record identifier is assigned. This database identifier is used in all subsequent references to the requirement Symbolic identification Requirements can be identified by giving them a symbolic name which is associated with the requirement itself. For example, EFF-1, EFF-2, EFF-3 may be used for requirements which relate to system efficiency
  • 12. Storing requirements Requirements have to be stored in such a way that they can be accessed easily and related to other system requirements Possible storage techniques are In one or more word processor files - requirements are stored in the requirements document In a specially designed requirements database
  • 13. Word processor documents Advantages Requirements are all stored in the same place Requirements may be accessed by anyone with the right word processor It is easy to produce the final requirements document Disadvantages Requirements dependencies must be externally maintained Search facilities are limited Not possible to link requirements with proposed requirements changes Not possible to have version control on individual requirements No automated navigation from one requirement to another
  • 14. Requirements database Each requirement is represented as one or more database entities Database query language is used to access requirements Advantages Good query and navigation facilities Support for change and version management Disadvantages Readers may not have the software/skills to access the requirements database The link between the database and the requirements document must be maintained
  • 15. Object classes for requirements DB
  • 16. Requirements DB - choice factors The statement of requirements If there is a need to store more than just simple text, a database with multimedia capabilities may have to be used. The number of requirements Larger systems usually need a database which is designed to manage a very large volume of data running on a specialised database server. Teamwork, team distribution and computer support If the requirements are developed by a distributed team of people, perhaps from different organisations, you need a database which provides for remote, multi-site access.
  • 17. Database choice factors CASE tool use The database should be the same as or compatible with CASE tool databases. However, this can be a problem with some CASE tools which use their own proprietary database Existing database usage If a database for software engineering support is already in use, this should be used for requirements management.
  • 18. Change management Change management is concerned with the procedures, processes and standards which are used to manage changes to system requirements Change management policies may cover: The change request process and the information required to process each change request The process used to analyse the impact and costs of change and the associated traceability information The membership of the body which formally considers change requests 4. The software support (if any) for the change control process
  • 19. The change management process Some requirements problem is identified. This could come from an analysis of the requirements, new customer needs, or operational problems with the system. The requirements are analysed using problem information and requirements changes are proposed. The proposed changes are analysed This checks how many requirements (and, if necessary, system components) are affected by the change and roughly how much it would cost, in both time and money, to make the change. The change is implemented. A set of amendments to the requirements document or a new document version is produced. This should, of course, be validated using whatever normal quality checking procedures are used.
  • 22. Change analysis activities The change request is checked for validity. Customers can misunderstand requirements and suggest unnecessary changes. The requirements which are directly affected by the change are discovered. Traceability information is used to find dependent requirements affected by the change. The actual changes which must be made to the requirements are proposed. The costs of making the changes are estimated. Negotiations with customers are held to check if the costs of the proposed changes are acceptable.
  • 23. Change request rejection If the change request is invalid. This normally arises if a customer has misunderstood something about the requirements and proposed a change which isn’t necessary. If the change request results in consequential changes which are unacceptable to the user. If the cost of implementing the change is too high or takes too long.
  • 24. Change processing Proposed changes are usually recorded on a change request form which is then passed to all of the people involved in the analysis of the change Change request forms may include fields to document the change analysis data fields responsibility fields status field comments field
  • 25. Tool support for change management May be provided through requirements management tools or through configuration management tools Tool facilities may include Electronic change request forms which are filled in by different participants in the process. A database to store and manage these forms. A change model which may be instantiated so that people responsible for one stage of the process know who is responsible for the next process activity. Electronic transfer of forms between people with different responsibilities and electronic mail notification when activities have been completed. In some cases, direct links to a requirements database.
  • 26. Traceability Traceability information is information which helps you assess the impact of requirements change. It links related requirements and the requirements and other system representations Types of traceability information Backward-from traceability Links requirements to their sources in other documents or people Forward-from traceability Links requirements to the design and implementation components Backward-to traceability Links design and implementation components backs to requirements Forward-to traceability Links other documents (which may have preceded the requirements document) to relevant requirements.
  • 28. Types of traceability Requirements-sources traceability Links the requirement and the people or documents which specified the requirement Requirements-rationale traceability Links the requirement with a description of why that requirement has been specified. Requirements-requirements traceability Links requirements with other requirements which are, in some way, dependent on them. This should be a two-way link (dependants and is-dependent on).
  • 29. Types of traceability Requirements-architecture traceability Links requirements with the sub-systems where these requirements are implemented. This is particularly important where sub-systems are being developed by different sub-contractors Requirements-design traceability Links requirements with specific hardware or software components in the system which are used to implement the requirement Requirements-interface traceability Links requirements with the interfaces of external systems which are used in the provision of the requirements
  • 30. Traceability tables Traceability tables show the relationships between requirements or between requirements and design components Requirements are listed along the horizontal and vertical axes and relationships between requirements are marked in the table cells Traceability tables for showing requirements dependencies should be defined with requirement numbers used to label the rows and columns of the table
  • 32. Traceability lists If a relatively small number of requirements have to be managed (up to 250, say), traceability tables can be implemented using a spreadsheet Traceability tables become more of a problem when there are hundreds or thousands of requirements as the tables become large and sparsely populated A simplified form of traceability table may be used where, along with each requirement description, one or more lists of the identifiers of related requirements are maintained. Traceability lists are simple lists of relationships which can be implemented as text or as simple tables
  • 34. Traceability policies Traceability policies define what and how traceability information should be maintained. Traceability policies may include The traceability information which should be maintained. Techniques, such as traceability matrices, which should be used for maintaining traceability. A description of when the traceability information should be collected during the requirements engineering and system development processes. The roles of the people, such as the traceability manager, who are responsible for maintaining the traceability information should also be defined. A description of how to handle and document policy exceptions The process of managing traceability information
  • 35. Factors influencing traceability policies Number of requirements The greater the number of requirements, the more the need for formal traceability policies. Estimated system lifetime More comprehensive traceability policies should be defined for systems which have a long lifetime. Level of organisational maturity Detailed traceability policies are most likely to be cost-effective in organisations which have a higher level of process maturity
  • 36. Factors influencing traceability policies Project team size and composition With a small team, it may be possible to assess the impact of proposed informally without structured traceability information. With larger teams, however, you need more formal traceability policies. Type of system Critical systems such as hard real-time control systems or safety-critical systems need more comprehensive traceability policies than non-critical systems. Specific customer requirements Some customers may specify that specific traceability information should be delivered as part of the system documentation.
  • 37. Key points Requirements change is inevitable as customers develop a better understanding of their real needs and as the political, organisational and technical environment in which a system is to be installed changes. Requirements which are concerned with the essence of a system are more likely to be stable than requirements which are more concerned with how the system is implemented in a particular environment. Types of volatile requirement include mutable requirements, emergent requirements, consequential requirements and compatibility requirements. Requirements management requires that each requirement should be uniquely identified. If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained.
  • 38. Key points Change management policies should define the processes used for change management and the information which should be associated with each change request. They should also define who is responsible for doing what in the change management process. Some automated support for change management should be provided. This may come through specialised requirements management tools or by configuring existing tools to support change management Traceability information records the dependencies between requirements and the sources of these requirements, dependencies between requirements and dependencies between the requirements and the system implementation. Traceability matrices may be used to record traceability information. Collecting and maintaining traceability information is expensive. To help control these costs, organisations should define a set of traceability policies which set out what information is to be collected and how it is to be maintained.