SlideShare a Scribd company logo
1 of 7
Copyright (c) 2012 Pragmatic Cohesion
Consulting
1
Why Should Business Requirements
Focus on the System Boundary
Making your Customers’ Needs the TRUE focus of your IT Projects.
Why should Business Requirements only specify
What a system must do?
• The upmost concern of Business Requirements is to properly identify
users’ needs that can be fulfilled by a system’s services or products.
• Business Requirements therefore should squarely describe the
characteristics of a system in direct relation to their ability to fulfill clearly
identified user needs.
• Business Requirements too often describe the functionality of a system
while crossing into the realm of the system design solution.
• An important drawback of phrasing Business Requirements in such a way
is the loss of focus on properly characterizing the customer needs.
• Another side effect is to prematurely constrain the design solution space
by favoring an alternative over another without first establishing clear and
logical justifications for it.
• A way of dealing with the last point during Business Requirements
gathering is to capture and categorize as such all design specification
considerations and revisit them later during the system design phase.
Copyright (c) 2012 Pragmatic Cohesion
Consulting
2
System Users only care about the system Inputs and
Outputs and how well they fulfill their needs.
• System Users are consumers of a system’s services or
products; they provide inputs to the system and
receive outputs from it.
• System inputs and outputs become valuable (useful)
to a User only if they fulfill their needs within specific
service/product consumption scenarios.
• System Inputs and Outputs can take the shape of:
information, matter , or energy.
Copyright (c) 2012 Pragmatic Cohesion
Consulting
3
System’s Inputs and Outputs define the system
Boundary: its Contract.
• The boundary of a system is defined in a conceptual manner
by the interactions that it has with external systems and users.
• A Contract defines the responsibility of a system regarding its
environment; since interactions are either Inputs or Outputs
they define the System boundary: its Contract.
• The system then can be viewed as being responsible for
accepting Inputs from its external systems and users and
providing outputs back to them.
• The Quality of Inputs and Outputs contributes to making the
system Contract robust. Input/Output Quality examples are:
accuracy, correctness, confidence, error rate, security,
intensity, size, throughput, velocity, response time, update
frequency, availability, etc…
Copyright (c) 2012 Pragmatic Cohesion
Consulting
4
Design Specifications describe what’s inside a
system Boundary.
• Any specification describing or addressing the
inside of a system Boundary crosses into the
realm of system design specifications
• Such specification no longer focuses on the
system Contract/Boundary and its
responsibility to the external environment
(users and external systems) and consequently
falls out of scope of system Business
Requirements.
Copyright (c) 2012 Pragmatic Cohesion
Consulting
5
Business Requirements specify a System
contract for acceptable design solutions.
• Identifying and specifying the system Inputs and
Outputs delineates its Boundary: a Contract for
the system to its Users.
• Describing the internal mechanics of a system is
specifying the system design solution.
• Focusing squarely on specifying the System
boundary, not only enables freedom in the design
solution space but also provides robust
evaluation criteria of alternative design solutions.
Copyright (c) 2012 Pragmatic Cohesion
Consulting
6
What Vs How: The Coca Cola
Happiness Factory Movie
Copyright (c) 2012 Pragmatic Cohesion
Consulting
7
Check out this video!
Contact Didier at Pragmatic Cohesion Consulting to learn more
about making your Customers’ Needs the TRUE focus of your IT
Projects.
http://pragmaticohesion.com/

More Related Content

What's hot

Requirement specification
Requirement specificationRequirement specification
Requirement specification
Abdul Basit
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
koolkampus
 

What's hot (20)

Se lec-uosl-8
Se lec-uosl-8Se lec-uosl-8
Se lec-uosl-8
 
software requirement
software requirementsoftware requirement
software requirement
 
Reqdet
ReqdetReqdet
Reqdet
 
M azhar
M azharM azhar
M azhar
 
Ppt
PptPpt
Ppt
 
Ch 2 types of reqirement
Ch 2  types of reqirementCh 2  types of reqirement
Ch 2 types of reqirement
 
Reading Summary - Software Requirements + Characteristics of Well Written Req...
Reading Summary - Software Requirements + Characteristics of Well Written Req...Reading Summary - Software Requirements + Characteristics of Well Written Req...
Reading Summary - Software Requirements + Characteristics of Well Written Req...
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
Requirement specification
Requirement specificationRequirement specification
Requirement specification
 
selection of hardware & software in SAD
selection of hardware & software in SAD selection of hardware & software in SAD
selection of hardware & software in SAD
 
Lecture 11 understanding requirements (3)
Lecture 11   understanding requirements (3)Lecture 11   understanding requirements (3)
Lecture 11 understanding requirements (3)
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
 
Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)
 
Extracting Quality Scenarios from Functional Scenarios
Extracting Quality Scenarios from Functional ScenariosExtracting Quality Scenarios from Functional Scenarios
Extracting Quality Scenarios from Functional Scenarios
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
An overview of software requirements engineering
An overview of software requirements engineeringAn overview of software requirements engineering
An overview of software requirements engineering
 
software requirement
software requirementsoftware requirement
software requirement
 
Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5Software Requirements in Software Engineering SE5
Software Requirements in Software Engineering SE5
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 

Viewers also liked

Requirement Determination Process
Requirement Determination ProcessRequirement Determination Process
Requirement Determination Process
Sourabh Arya
 
Business requirements documents
Business requirements documentsBusiness requirements documents
Business requirements documents
hapy
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specification
indrisrozas
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement Document
Isabel Elaine Leong
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
Krishnasai Gudavalli
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
ALATechSource
 

Viewers also liked (14)

Products and Services of Bank of Industry, Betsy Bene Obasaki, Bank of Industry
Products and Services of Bank of Industry, Betsy Bene Obasaki, Bank of IndustryProducts and Services of Bank of Industry, Betsy Bene Obasaki, Bank of Industry
Products and Services of Bank of Industry, Betsy Bene Obasaki, Bank of Industry
 
System Requirements
System Requirements System Requirements
System Requirements
 
Requirement Determination Process
Requirement Determination ProcessRequirement Determination Process
Requirement Determination Process
 
Elicitation procedures
Elicitation proceduresElicitation procedures
Elicitation procedures
 
Elicitation techniques
Elicitation techniquesElicitation techniques
Elicitation techniques
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyz
 
Business requirements documents
Business requirements documentsBusiness requirements documents
Business requirements documents
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specification
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement Document
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Business Requirement Document
Business Requirement DocumentBusiness Requirement Document
Business Requirement Document
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 

Similar to Business requirements what versus how

Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W Engineering
Mikel Raj
 
04 fse understandingrequirements
04 fse understandingrequirements04 fse understandingrequirements
04 fse understandingrequirements
Mohesh Chandran
 
Week 1 lecture 2 - introduction to re
Week 1   lecture 2 - introduction to reWeek 1   lecture 2 - introduction to re
Week 1 lecture 2 - introduction to re
Hoo Jason
 

Similar to Business requirements what versus how (20)

W4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gatheringW4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gathering
 
Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W Engineering
 
SRE.pptx
SRE.pptxSRE.pptx
SRE.pptx
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Requirementengg
RequirementenggRequirementengg
Requirementengg
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Object oriented analysis &design - requirement analysis
Object oriented analysis &design - requirement analysisObject oriented analysis &design - requirement analysis
Object oriented analysis &design - requirement analysis
 
Requirement Engineering.pdf
Requirement Engineering.pdfRequirement Engineering.pdf
Requirement Engineering.pdf
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptx
 
Presentation of se
Presentation of sePresentation of se
Presentation of se
 
04 fse understandingrequirements
04 fse understandingrequirements04 fse understandingrequirements
04 fse understandingrequirements
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Se lec 4
Se lec 4Se lec 4
Se lec 4
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
 
Ch 1-Introduction.ppt
Ch 1-Introduction.pptCh 1-Introduction.ppt
Ch 1-Introduction.ppt
 
Week 1 lecture 2 - introduction to re
Week 1   lecture 2 - introduction to reWeek 1   lecture 2 - introduction to re
Week 1 lecture 2 - introduction to re
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
 

More from Pragmatic Cohesion Consulting, LLC

More from Pragmatic Cohesion Consulting, LLC (20)

Applying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsApplying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triads
 
Viewers locations usa - 30000
Viewers locations usa - 30000Viewers locations usa - 30000
Viewers locations usa - 30000
 
Viewers locations outside USA - 30000
Viewers locations outside USA - 30000Viewers locations outside USA - 30000
Viewers locations outside USA - 30000
 
Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...
 
Obstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitationObstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitation
 
Viewers locations in the USA
Viewers locations in the USAViewers locations in the USA
Viewers locations in the USA
 
Viewers locations outside the USA
Viewers locations outside the USAViewers locations outside the USA
Viewers locations outside the USA
 
Framework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessFramework for assessing business analysts situational awareness
Framework for assessing business analysts situational awareness
 
The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...
 
Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...
 
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
 
The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...
 
The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...
 
Balancing software project drivers a rational quantitative approach
Balancing software project drivers   a rational quantitative approachBalancing software project drivers   a rational quantitative approach
Balancing software project drivers a rational quantitative approach
 
M theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowermentM theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowerment
 
Effective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisEffective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysis
 
About the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsAbout the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methods
 
Deductive, inductive, and abductive reasoning and their application in trans...
Deductive, inductive, and abductive reasoning and their application in  trans...Deductive, inductive, and abductive reasoning and their application in  trans...
Deductive, inductive, and abductive reasoning and their application in trans...
 
34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!
 
Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2
 

Recently uploaded

Recently uploaded (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Business requirements what versus how

  • 1. Copyright (c) 2012 Pragmatic Cohesion Consulting 1 Why Should Business Requirements Focus on the System Boundary Making your Customers’ Needs the TRUE focus of your IT Projects.
  • 2. Why should Business Requirements only specify What a system must do? • The upmost concern of Business Requirements is to properly identify users’ needs that can be fulfilled by a system’s services or products. • Business Requirements therefore should squarely describe the characteristics of a system in direct relation to their ability to fulfill clearly identified user needs. • Business Requirements too often describe the functionality of a system while crossing into the realm of the system design solution. • An important drawback of phrasing Business Requirements in such a way is the loss of focus on properly characterizing the customer needs. • Another side effect is to prematurely constrain the design solution space by favoring an alternative over another without first establishing clear and logical justifications for it. • A way of dealing with the last point during Business Requirements gathering is to capture and categorize as such all design specification considerations and revisit them later during the system design phase. Copyright (c) 2012 Pragmatic Cohesion Consulting 2
  • 3. System Users only care about the system Inputs and Outputs and how well they fulfill their needs. • System Users are consumers of a system’s services or products; they provide inputs to the system and receive outputs from it. • System inputs and outputs become valuable (useful) to a User only if they fulfill their needs within specific service/product consumption scenarios. • System Inputs and Outputs can take the shape of: information, matter , or energy. Copyright (c) 2012 Pragmatic Cohesion Consulting 3
  • 4. System’s Inputs and Outputs define the system Boundary: its Contract. • The boundary of a system is defined in a conceptual manner by the interactions that it has with external systems and users. • A Contract defines the responsibility of a system regarding its environment; since interactions are either Inputs or Outputs they define the System boundary: its Contract. • The system then can be viewed as being responsible for accepting Inputs from its external systems and users and providing outputs back to them. • The Quality of Inputs and Outputs contributes to making the system Contract robust. Input/Output Quality examples are: accuracy, correctness, confidence, error rate, security, intensity, size, throughput, velocity, response time, update frequency, availability, etc… Copyright (c) 2012 Pragmatic Cohesion Consulting 4
  • 5. Design Specifications describe what’s inside a system Boundary. • Any specification describing or addressing the inside of a system Boundary crosses into the realm of system design specifications • Such specification no longer focuses on the system Contract/Boundary and its responsibility to the external environment (users and external systems) and consequently falls out of scope of system Business Requirements. Copyright (c) 2012 Pragmatic Cohesion Consulting 5
  • 6. Business Requirements specify a System contract for acceptable design solutions. • Identifying and specifying the system Inputs and Outputs delineates its Boundary: a Contract for the system to its Users. • Describing the internal mechanics of a system is specifying the system design solution. • Focusing squarely on specifying the System boundary, not only enables freedom in the design solution space but also provides robust evaluation criteria of alternative design solutions. Copyright (c) 2012 Pragmatic Cohesion Consulting 6
  • 7. What Vs How: The Coca Cola Happiness Factory Movie Copyright (c) 2012 Pragmatic Cohesion Consulting 7 Check out this video! Contact Didier at Pragmatic Cohesion Consulting to learn more about making your Customers’ Needs the TRUE focus of your IT Projects. http://pragmaticohesion.com/