Requirements Analysis
- Tags
- soft-eng
Is the [see page 15, process] of studying user needs to arrive at definitions of system, hardware or software requirements.
This is related to threat modelling.
This involves:
- [see page 16, Inception]: Identify stakeholders, recognise multiple viewpoints, Q&A.
A [see page 17, stakeholders] can be:
- Persons or organisations who have a valid interest in (or are affected by) the system.
- Anyone who operates the system.
- Anyone who benefits from the system.
- Anyone involved in purchasing or procuring the system.
- Organisations which regulate aspects of the system.
- Organisations responsible for system which interface with the system under design.
- People or organisations opposed to the system.
- [see page 20, Elicitation]: Collaborate with stakeholders to address:
- Scope: What is the boundary of the system?
- Understanding: Users don't know what they want?
- Volatility: Requirements change over time.
- [see page 25, Elaboration]: Expand and refine information, consider the 5Ws.
- [see page 26, Negotiation]: Reconcile conflicts, rank requirements and perform a risk estimation.
- [see page 28, Specification]: Write-up all that's to be done, develop use cases, UML diagrams and user stories.
- [see page 40, Validation]: Search for inconsistencies, omissions and errors and then have a technical review with the team.
- [see page 41, Requirements Management]: Control the change of requirements, tracing them to features, code or subsystems. This involves understanding the relation between requirements.