lecture 10: requirements engineering: preludedines bjorner: 8th draft: october 14, 2008 invisible...

92
invisible Dines Bjorner: 8th DRAFT: October 14, 2008 SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz Lecture: 10. Slide: 490 of 1352 c Dines Bjørner, 2008 Fredsvej 11 DK-2840 Holte Denmark November 16, 2008, 08:48 /home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db Lecture 10: Requirements Engineering: Prelude

Upload: others

Post on 26-Feb-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Lecture: 10. Slide: 490 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Lecture 10: Requirements Engineering: Prelude

Page 2: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 491 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Requirements EngineeringDiscussion of The Requirements Concept

Some Principles

• The objective of requirements engineering is to create arequirements prescription.

IEEE Definition of ‘Requirements’

• By a requirements we understand (cf. IEEE Standard 610.12):

⋆ “A condition or capability

⋆ needed by a user

⋆ to solve a problem

⋆ or achieve an objective”.

Page 3: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 492 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

• The above definition is adequate for our purposes.

• It stresses what requirements are.

• It is not operational, and that is good.

• It does not define the thing, the requirements, by how they look, orhow you construct them.

• The ‘what’ (not the ‘how’) of requirements is the purpose of thisand the next many lectures.

Page 4: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 493 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

The “Golden Rule” of Requirements Engineering

Principle 5 (Requirements Engineering [1) ]Prescribe only those requirements that can be objectively shown

to hold for the designed software.

• “Objectively shown” means that the designed software can

⋆ either be proved (verified),

⋆ or be model checked,

⋆ or be tested,

• to satisfy the requirements.

Page 5: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 494 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

An “Ideal Rule” of Requirements Engineering

Principle 6 (Requirements Engineering [2) ]When prescribing requirements,

• formulate, at the same time, tests (theorems, properties for model checking)

• whose actualisation should show adherence to the requirements

.

• The rule is labelled “ideal”.

⋆ We shall not show such precautions in this volume.

⋆ They ought to be shown.

⋆ But either

⋄ we would show one, or a few instances,

⋄ and they would “drown” in the mass of material otherwise presented.

⋆ Or they would, we claim, trivially take up too much space.

Page 6: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 495 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

Principle 7 (Requirements Adequacy) Make sure that requirements coverwhat users expect.

• That is,

⋆ do not express a requirement for which you have no users,

⋆ but make sure that all users’ requirements are represented or somehowaccommodated.

• In other words:

⋆ the requirements gathering process needs to be like an extremely “fine-meshednet”:

⋆ One must make sure that all possible stakeholders have been involved in therequirements acquisition process,

⋆ and that possible conflicts and other inconsistencies have been obviated.

Page 7: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 496 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

• The approach which we put forward in these lectures, namely

⋆ “deriving” domain requirements “directly” from domaindescriptions, and

⋆ systematically conceiving interface requirements also fromdomain descriptions

• shall help secure adherence to this ‘Requirements Adequacy’principle.

• We shall soon explain the terms ‘domain requirements’ and‘interface requirements’.

Page 8: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 497 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

Principle 8 (Requirements Implementability) Make surethat requirements are implementable.

• That is, do not express a requirement for which you have noassurance that it can be implemented.

• In other words,

⋆ although the requirements phase is not a design phase,

⋆ one must tacitly assume, perhaps even indicate, somehow, thatan implementation is possible.

• But the requirements in and by themselves, stay short of expressingsuch designs.

Page 9: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 498 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

Principle 9 (Requirements Verifiability and Validability)Make sure that requirements are verifiable and can be validated.

• That is, do not express a requirement for which you have noassurance that it can be verified and validated.

• In other words,

⋆ once a first-level software design has been proposed,

⋆ one must show that it satisfies the requirements.

• Thus specific parts of even abstract software designs are usuallyprovided with references to specific parts of the requirements thatthey are (thus) claimed to implement.

Page 10: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 1 Lecture: 10. Slide: 499 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, Some Principles ]

• We conclude this discussion.

Characterisation 71 (Requirements) • By requirements weshall understand a document which prescribes desired properties ofa machine:

⋆ (i) what entities the machine shall “maintain”, and

⋆ what the machine shall (must; not should) offer of

⋄ (ii) functions and of

⋄ (iii) behaviours

⋆ (iv) while also expressing which events the machine shall“handle”

.

Page 11: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 2 Lecture: 10. Slide: 500 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept ]

One Domain, Many Requirements

• Domain descriptions

⋆ nearly always cover a much larger span

⋆ than do any one individual (set of) requirements,

⋆ that is, a requirements for a specific software product.

• Thus one can expect one domain description

⋆ to be the basis for many (more-or-less) distinct requirements prescriptions,

⋆ which, since they are (to be) based on the same domain description,

⋆ and when they share some domain phenomena and concepts,

⋆ must (somehow) be made to fit one another.

• We shall cover the notion of requirements fitting when covering the topic ofdomain requirements.

Page 12: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 3 Lecture: 10. Slide: 501 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept ]

The Machine as Target

• A requirements prescription specifies

• externally observable properties of

⋆ simple entities,

⋆ functions,

⋆ events and

⋆ behaviours

• of the machine

• such as the requirements stakeholders wish them to be.

Page 13: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 4 Lecture: 10. Slide: 502 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept ]

Machine = Hardware + Software

• The machine is what is required, that is,

⋆ the hardware and

⋆ software

• that is to be designed and

• which are to satisfy the requirements.

Page 14: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 5 Lecture: 10. Slide: 503 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept ]

On “Derivation” of Requirements

• It is a highlight of this book that

⋆ requirements engineering has a scientific foundation

⋆ and that that scientific foundation is the domain theory,

⋆ that is the properties of the domain as modelled by a domaindescription.

• Conventional requirements engineering,

⋆ as covered in a great number of software engineering textbooks,

⋆ does not have (such) a scientific foundation.

• This foundation allows us to pursue requirements engineering inquite a new manner.

Page 15: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 5 Lecture: 10. Slide: 504 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, On “Derivation” of Requirements ]

• The way in which we shall pursue the central core of requirementsengineering will now be sketched.

• When modelling the requirements we “divide” the work into threekinds of requirements:

⋆ the domain requirements,

⋆ the interface requirements, and

⋆ the machine requirements.

Page 16: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 5 Lecture: 10. Slide: 505 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, On “Derivation” of Requirements ]

• These sub-stages are related to their underlying domain as follows.

⋆ The domain requirements are those requirements which

⋄ can be expressed solely using terms from

⋄ the domain (in addition to ordinary, say, English.

⋆ The machine requirements are those requirements

⋄ which can be expressed solely using terms from

⋄ the machine, that is, the hardware and software regime.

⋆ The interface requirements are then those requirements

⋄ which can be expressed using terms from

⋄ both the domain and the machine.

Page 17: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 5 Lecture: 10. Slide: 506 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept, On “Derivation” of Requirements ]

• This approach materially alters the way in which we pursue the preparatoryrequirements engineering stages of

⋆ stakeholder identification,

⋆ requirements acquisition,

⋆ requirements analysis and concept formation,

⋆ business process re-engineering and

⋆ requirements terminology.

• We will cover these preparatory requirements engineering stages in two rounds:

⋆ in an overview fashion

⋆ and in some detail.

• In our coverage we rely on the student having first carefully studied the“similarly named” domain engineering stage.

Page 18: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 1, Subsect. 6 Lecture: 10. Slide: 507 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Discussion of The Requirements Concept ]

Summary

• A requirements prescription

⋆ thus (putatively) expresses

⋆ what there should be.

• A requirements prescription

⋆ expresses nothing about the design of the possibly desired(required) software.

• • •

• We shall show how a major part of a requirements prescription canbe “derived” from “its” prerequisite domain description.

Page 19: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1 Lecture: 10. Slide: 508 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements EngineeringAn Overview of “What To Do?”

• The present section’s main material, Slides 509–522, on “what todo” in requirements development

• is very much like section on “what to do” in domain development(Slides 209–223).

• So we kindly ask the reader to recall that former section.

• We first summarise what is to be done,

⋆ ending that summary with an overview listing (Slide 523)

⋆ (as we did for the stages of domain engineering (Slide 224) .

• Then, in subsequent lectures we cover, in some detail, how to dothat which is to be done (Slides 524–685).

Page 20: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 1 Lecture: 10. Slide: 509 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What To Do?”

[1] Requirements Information

• We refer to Slide 210.

• The purpose of this stage of development, to repeat, is to record allrelevant

⋆ administrative,

⋆ socio-economic,

⋆ budgetary,

⋆ project management (planning) and

⋆ such non-formalisable information

which has a bearing on the requirements prescription project.

• For the example ‘requirements information’ document we refer toAppendix Slides 1123–1143.

Page 21: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 2 Lecture: 10. Slide: 510 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[2] Requirements Stakeholder Identification

• We refer to Slide 212.

• The purpose of this stage of development

⋆ is to identify the requirements stakeholders.

⋆ They are usually a proper subset of the domain stakeholders.

⋆ One does not need to interact with all domain stakeholders

⋆ as that was supposedly done in the domain description development phase,

⋆ and the domain description is, of course,

⋄ assumed available and

⋄ the basis for the requirements prescription development phase.

⋆ For more specifics on this topic we refer to Slides 538–539.

• For the example ‘requirements stakeholder identification’ document we refer toAppendix Slides 1144–1144.

Page 22: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 3 Lecture: 10. Slide: 511 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[3] Requirements Acquisition

• We refer to Slides 213–214 (domain acquisition).

• The purpose of this stage of development

⋆ is to acquire and elicit, to list, to enumerate, to collect the requirements.

⋆ Now since, as we shall see, the requirements shall consist of three parts:

⋄ the domain requirements,

⋄ the interface requirements and

⋄ the machine requirements,

⋆ and since the first two relies very strongly on the domain description,

⋆ a major part of the requirements acquisition takes on a rather different formthan the way in which domain acquisition takes place.

• For more specifics on this topic we refer to Slides 540–546.

• For the example ‘requirements acquisition’ document we refer to AppendixSlides 1145–1145.

Page 23: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 4 Lecture: 10. Slide: 512 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[4] Requirements Analysis & Concept Formation

• We refer to Slide 215.

• The purpose of this stage of development

⋆ is to analyse

⋆ and conceive of

⋄ concepts around which to structure the requirements,

⋄ for those relevant such concepts that are not already part ofthe domain description.

• While performing the steps of (a) the domain requirements, (b) theinterface requirements and (c) the machine requirements stages ofdevelopment

⋆ these steps may give rise to inconsistencies incompletenesses forwhich analysis has to check their absence.

Page 24: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 4 Lecture: 10. Slide: 513 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Stages of Requirements Engineering, An Overview of “What to Do ?”, [4] Requirements Analysis & Concept Formation ]

• While deriving the above three stages (a–b–c) analyses must bemade to secure that the required simple entities, functions, eventsand behaviours are computable.

⋆ (For a domain description incomputable concepts are allowed.)

⋆ (In fact, the whole purpose of requirements construction is tosecure some form of computability.

• For more specifics on this topic we refer to Slides 547–547.

• For the example ‘requirements analysis’ document we refer toAppendix Slides 1146–1146.

Page 25: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 5 Lecture: 10. Slide: 514 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[5] Requirements Business Process Re-Engineering

• We refer to Slide 216.

• The background for this stage of development

⋆ is the set of current business processes as carried out in the domain at present

⋆ and as described during construction of the domain description.

• The purpose of this stage of development

⋆ is to prescribe how thee business processes are to be in future,

⋆ once the required software has been installed;

⋆ that is: the business processes often need be re-engineered

⋆ since that is (to be) assumed by the required software.

• For more specifics on this topic we refer to Slides 548–579.

• For the example ‘business process re-engineering’ document we refer to AppendixSlides 1147–1154.

Page 26: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 6 Lecture: 10. Slide: 515 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[6] Requirements Terminology

• We refer to Slide 217.

• The purpose of this stage of development,

⋆ one which “links” up to the domain terminology,

⋆ is to extend that domain terminology

⋆ with the new terms that arise as a consequence of

⋆ interface and machine requirements.

⋆ (The stages of development [interface and machine requirements]will be covered later.)

• For more specifics on this topic we refer to Slides 580–580.

• For the example ‘requirements terminology’ document we refer toAppendix Slides 1155–1155.

Page 27: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 7 Lecture: 10. Slide: 516 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[7] Requirements Modelling

• We refer to Slide 219.

• The purpose of this stage of development

⋆ is to develop a requirements prescription,

⋆ that is a narrative and a formal specification of threerequirements facets:

⋄ domain requirements,

⋄ interface requirements and

⋄ machine requirements.

Page 28: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 7 Lecture: 10. Slide: 517 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Stages of Requirements Engineering, An Overview of “What to Do ?”, [7] Requirements Modelling ]

⋆ These relate as follows:

⋄ domain requirements are those requirements which can beexpressed solely by using terms from the domain (andotherwise ordinary terms of English);

⋄ machine requirements are those requirements which can beexpressed solely by using terms “from” the machine, i.e.,hardware and software terms (and otherwise ordinary terms ofEnglish);

⋄ interface requirements are those requirements which can onlybe expressed using terms both of the domain and of themachine.

Page 29: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 7 Lecture: 10. Slide: 518 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Stages of Requirements Engineering, An Overview of “What to Do ?”, [7] Requirements Modelling ]

• For more specifics on this topic we refer to Slides 583–679.

• For the example ‘requirements prescription’ document we refer toAppendix Slides 1159–1247.

Page 30: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 8 Lecture: 10. Slide: 519 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[8] Requirements Verification

• We refer to Slide 220.

• The purpose of this stage of development,

⋆ which normally goes hand–in–hand with requirements modelling,

⋆ is to verify (prove, model check and/or test) properties of what is beingprescribed.

• Examples of requirements prescription verification are

⋆ that all arguments to defined functions are within their range of applicability,

⋆ that postulated functions can be implemented,

⋆ that defined functions are of a desired complexity,

⋆ etcetera.

• For more specifics on this topic we refer to Slides 682–682.

• For the example ‘requirements verification’ document we refer to AppendixSlides 1251–1251.

Page 31: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 9 Lecture: 10. Slide: 520 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[9] Requirements Validation

• We refer to Slide 221.

• The purpose of this stage of development

⋆ which normally comes after proper completion of a requirements document,

⋆ is to make sure that what has been prescribed is actually what the relevantrequirements stakeholder have requested.

• The validation process is necessarily informal in that it relies solely on thenarrative prescriptions

⋆ as these are the only ones that all requirements stakeholders understand.

• For more specifics on this topic we refer to Slides 683–683.

• For the example ‘requirements validation’ document we refer to AppendixSlides 1252–1252.

Page 32: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 10 Lecture: 10. Slide: 521 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[10] Requirements Satisfiability and Feasibility

• This (numbered [10]) section is new.

• It has no direct counterpart in domain engineering.

• The purpose of this stage of development

⋆ is to secure that the full requirements are implementable

⋆ and in a way that is economic and relevant.

⋆ By feasible (i.e., relevance) we mean that an implementation

⋆ does not consume unreasonable resources: time, space, etcetera.

• For more specifics on this topic we refer to Slides 684–684.

• For the example ‘requirements satisfiability and feasibility’document we refer to Appendix Slides 1253–1253.

Page 33: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 1, Subsubsect. 11 Lecture: 10. Slide: 522 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1.tex Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Stages of Requirements Engineering, An Overview of “What to Do ?”

[11] Requirements Theory Formation

• We refer to Slide 223.

• The purpose of this stage of development

⋆ further develop the domain theory

⋆ by examining the theorems of that theory as to their also holdingfor the specific requirements

⋆ hold and to develop such theorems that hold for the specificrequirements.

• For more specifics on this topic we refer to Slides 685–685.

• For the example ‘requirements theory formation’ document we referto Appendix Slides 1254–1254.

Page 34: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 2, Subsect. 2 Lecture: 10. Slide: 523 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-enum Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Stages of Requirements Engineering ]

A Summary Enumeration

1. Requirements Information (Slide 524)

2. Requirements Stakeholder Identification (Slide 538)

3. Requirements Acquisition (Slide 540)

4. Requirements Analysis & Concept Formation (Slide 547)

5. Business Process Re-Engineering (Slide 548)

6. Requirements Terminology (Slide 580)

7. Requirements Modelling (Slide 583)

(a) Domain Requirements (Slide 585)

(b) Interface Requirements (Slide 616)

(c) Machine Requirements (Slide 645)

8. Requirements Verification (Slide 682)

9. Requirements Validation (Slide 683)

10. Requirements Satisfiability and Feasibility (Slide 684)

11. Requirements Theory Formation (Slide 685)

Page 35: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 524 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Requirements Information

• We refer to Slide 210.

• For the example ‘requirements information’ document we refer toAppendix Slides 1123–1143.

• We have earlier, as mentioned earlier, extensively (Slides 24–116)covered the general issues of informative documents.

• Suffice it here to emphasize the following.

• We highlight, in the next many “highlighted” paragraphs, what isspecial,

• to requirements prescription developments,

• with respect to the many items of project information.

Page 36: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 525 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Current Situation: Cf. Slides 34–36

⋆ As mentioned on Slide 34 the context in which the requirementsdevelopments starts must be emphasized.

⋆ That context invariably includes the existence of a domaindescription.

⋆ Please no reference to possible software designs.

We refer to an Appendix section starting on Slide 1126 for anexample related to the current situation topic.

Page 37: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 526 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Needs and Ideas: Cf. Slides 37–41

⋆ to be written

We refer to an Appendix section starting on Slide 1127 for anexample related to the needs and ideas topic.

Page 38: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 527 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Concepts and Facilities: Cf. Slides 42–44

⋆ to be written

We refer to an Appendix section starting on Slide 1128 for anexample related to the concepts and facilities topic.

Page 39: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 528 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Scope and Span: Cf. Slides 45–48

⋆ to be written

We refer to an Appendix section starting on Slide 1133 for anexample related to the scope and span topic.

Page 40: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 529 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Assumptions and Dependencies: Cf. Slides 49–51

⋆ to be written

We refer to an Appendix section starting on Slide 1134 for anexample related to the assumptions and dependencies topic.

Page 41: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 530 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Implicit/Derivative Goals: Cf. Slides 52–55

⋆ to be written

We refer to an Appendix section starting on Slide 1135 for anexample related to the implicit/derivative goals topic.

Page 42: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 531 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Synopsis: Cf. Slides 56–58

⋆ to be written

We refer to an Appendix section starting on Slide 1137 for anexample related to the synopsis topic.

Page 43: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 532 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Software Development Graphs: Cf. Slides 61–70

⋆ to be written

We refer to an Appendix section starting on Slide 1138 for anexample related to the software development graph topic.

Page 44: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 533 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Resource Allocation: Cf. Slides 71–74

⋆ to be written

We refer to an Appendix section starting on Slide 1139 for anexample related to the resource allocation topic.

Page 45: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 534 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Budget (and Other) Estimates: Cf. Slide 75

⋆ to be written

We refer to an Appendix section starting on Slide 1140 for anexample related to the budget (and other) estimates topic.

Page 46: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 535 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Standards Compliance: Cf. Slides 76–84

⋆ to be written

We refer to an Appendix section starting on Slide 1141 for anexample related to the standards compliance topic.

Page 47: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 536 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

• Contracts and Design Briefs: Cf. Slides 85–107

⋆ to be written

We refer to an Appendix section starting on Slide 1142 for an examplerelated to the contract and design brief topic.

Page 48: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 3 Lecture: 10. Slide: 537 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Information ]

More to come

Page 49: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 4 Lecture: 10. Slide: 538 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Requirements Stakeholders

• We refer to Slide 212 and Slides beginning with Slide 238.

• On Slide 510 we wrote that

⋆ the set of requirements stakeholder is usual a proper subset of

⋆ of the domain stakeholders.

• We may need to modify this statement.

• We assume that a list of domain stakeholders omitted administrative staff fromthe areas of general services staff:

⋆ accounting,

⋆ archiving (journal),

⋆ general procurement,

⋆ etcetera.

• We assume they were omitted since the domain, “technically speaking” was notabout these areas.

• If the requirements are for such general services of a domain which do indeedimpinge on such, previously omitted staff, then such staff gropus must beincluded among the stakeholders.

Page 50: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 4 Lecture: 10. Slide: 539 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Stakeholders ]

• (But we do remind the reader that our domain is in such a caseextended with the phenomena and concepts of the areas of generalservices thus identified — and appropriate domain extensions mustbe provided for.)

• For the example ‘requirements stakeholder identification’ documentwe refer to Appendix Slides 1144–1144.

We refer to an Appendix section starting on Slide 1144 for an example related to therequirements stakeholder topic.

Page 51: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5 Lecture: 10. Slide: 540 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Requirements Acquisition

• We have, on Slide 511, outlined the three stages of requirementsmodelling:

⋆ domain requirements,

⋆ interface requirements and

⋆ machine requirements.

• These requirements modelling stages were first overviewed, in moredetail on Slides 504–505.

• The three requirements modelling stages will be dealt with in“final” detail on Slides 585–679.

• We shall assume you have followed those brief outlines.

• Requirements acquisition now basically follows these three kinds ofrequirements modelling stages.

Page 52: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 1 Lecture: 10. Slide: 541 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition ]

Domain Requirements Acquisition

• Domain requirements acquisition is based solely on the domaindescription.

• From that domain description is developed, in sub-stages (or steps)of development a domain requirements acquisition document.

• The steps are projection, instantiation, determination, extensionand fitting.

• Each step takes a document and results in a requirementsacquisition document.

• The first step takes a domain description document.

• All steps results in a domain requirements acquisition document.

Page 53: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 1 Lecture: 10. Slide: 542 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition, Domain Requirements Acquisition ]

• Subsequent slides shall outline the details of the projection, instantiation,determination, extension and fitting operations.

⋆ In the domain requirements acquisition stage one basically marks up a“requirements acquisition copy” of the domain description.

⋆ In the domain requirements acquisition stage one collects the ‘domainrequirements acquisition’ mark-ups into a consistent acquisition documentediting it as per the mark-ups.

• All domain-to-domain requirements acquisition operations (projection,instantiation, determination, extension and fitting)

⋆ are conducted interactively, between the domain engineer and all the relevantrequirement stakeholder,

⋆ in turn, one after the other, and, in principle, in no particular order.

Page 54: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 2 Lecture: 10. Slide: 543 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition, Domain Requirements Acquisition ]

• The domain engineer, in a sense, guides the requirement stakeholders

⋆ through the emerging domain requirements acquisition prescription documentdetermining what

⋆ to project, instantiate, make more deterministic, extend and fit.

Interface Requirements Acquisition

• Interface requirements acquisition is based on the domain requirementsacquisition document and on some awareness of the facilities of machine beingrequired.

• Awareness and determination of which these facilities are, or could be, evolve asa result of conducting the below steps of interface requrements.

Page 55: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 2 Lecture: 10. Slide: 544 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition, Interface Requirements Acquisition ]

• First the domain engineer and the relevant requirement stakeholders determinewhich phenomena

⋆ simple entities,

⋆ functions,

⋆ events and

⋆ behaviours

of the domain need be represented by the machine.

• Then they go through each of these kinds of phenomena

• to determine what sharing means: what properties of

⋆ simple entities,

⋆ functions,

⋆ events and

⋆ behaviours

are to be satisfied by the machine.

Page 56: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 2 Lecture: 10. Slide: 545 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition, Interface Requirements Acquisition ]

• This entails decisions on abstractions of

⋆ initial data input and refreshment,

⋆ interactive computation of functionsbetween the machine and thedomain,

⋆ “translation” of events in the domaininto the machine, and

⋆ interactive behaviours between themachine and the domain.

• Again, each of these steps result in the input requirements acquisition documentbeing futher annotated — as were the domain requirements acquisitiondocuments.

• Proper requirements modelling documents now take these annotated acquisitiondocuments and rework them, “clean them up”, into proper requirementsprescripton documents.

Page 57: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 5, Subsect. 3 Lecture: 10. Slide: 546 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Requirements Acquisition ]

Machine Requirements Acquisition

• Machine requirements acquisition is basically concerned with theacquisition of such required properties of the desired machine asmachine:

⋆ performance,

⋆ dependability,

⋆ maintenance,

⋆ platform and

⋆ documentation.

• We shall defer the acquisition aspects of these machine requirements

⋆ till we later, Slides 645–679,

⋆ treat machine requirements modelling.

• • •

We refer to an Appendix section starting on Slide 1145 for an examplerelated to the requirements acquisition topic.

Page 58: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 6 Lecture: 10. Slide: 547 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Analysis and Concept Formation

to be written

We refer to an Appendix section starting on Slide 1146 for an examplerelated to the requirements analysis and concept formation topic.

Page 59: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7 Lecture: 10. Slide: 548 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Business Process Re-Engineering

Characterisation 72 (Business Process Reengineering) Bybusiness process reengineering we understand

• the reformulation of previously adopted business processdescriptions,

• together with additional business process engineering work

.

Page 60: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 1 Lecture: 10. Slide: 549 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

What Are BPR Requirements?

• Two “paths” lead to business process reengineering:

⋆ A client wishes to improve enterprise operations by deployingnew computing systems (i.e., new software).

⋄ In the course of formulating requirements for this newcomputing system

⋄ a need arises to also reengineer the human operations withinand without the enterprise.

Page 61: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 1 Lecture: 10. Slide: 550 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, What Are BPR Requirements? ]

⋆ An enterprise wishes to improve operations by redesigning theway staff operates within the enterprise and the way in whichcustomers and staff operate across the enterprise-to-environmentinterface.

⋄ In the course of formulating reengineering directives

⋄ a need arises to also deploy new software, for whichrequirements therefore have to be enunciated.

• One way or the other, business process reengineering is an integralcomponent in deploying new computing systems.

Page 62: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 2 Lecture: 10. Slide: 551 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Overview of BPR Operations

• We suggest six domain-to-business process reengineering operations:

1. introduction of some new and removal of some old intrinsics;

2. introduction of some new and removal of some old support technologies;

3. introduction of some new and removal of some old management andorganisation substructures;

4. introduction of some new and removal of some old rules and regulations;

5. introduction of some new and removal of some old work practices (relating tohuman behaviours); and

6. related scripting.

Page 63: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 1 Lecture: 10. Slide: 552 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

BPR and the Requirements Document

Requirements for New Business Processes

• The student must be duly “warned”:

⋆ The BPR requirements are not for a computing system,

⋆ but for the people who “surround” that (future) system.

⋆ The BPR requirements state, unequivocally,

⋆ how those people are to act,

⋆ i.e., to use that system properly.

• Any implications, by the BPR requirements,

• as to concepts and facilities of the new computing system

• must be prescribed (also) in the domain and interface requirements.

Page 64: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 2 Lecture: 10. Slide: 553 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Business Process Reengineering, BPR and the Requirements Document

Place in Narrative Document

• We shall thus, in the later part of this lecture, treat a number ofBPR facets.

• Each of whatever you decide to focus on,

• in any one requirements development,

• must be prescribed.

• And the prescription must be put into the overall requirementsprescription document.

Page 65: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 2 Lecture: 10. Slide: 554 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, BPR and the Requirements Document, Place in Narrative Document ]

• As the BPR requirements “rebuilds” the business processdescription part of the domain description4,

• and as the BPR requirements are not directly requirements for themachine,

• we find that they (the BPR requirements texts) can be simply putin a separate section.

4— Even if that business process description part of the domain description is “empty” or nearly so!

Page 66: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 2 Lecture: 10. Slide: 555 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, BPR and the Requirements Document, Place in Narrative Document ]

• There are basically two ways of “rebuilding”

⋆ the domain description’s business process’s description part (DBP )

⋆ into the requirements prescription part’s BPR requirements (RBPR).

⋆ Either

⋄ you keep all of D as a base part in RBPR,

⋄ and then you follow that part (i.e., RBPR)

⋄ with statements, R′BPR

, that express the new business process’s“differences”

⋄ with respect to the “old” (DBP ).

⋄ Call the result RBPR.

⋆ Or

⋄ you simply rewrite (in a sense, the whole of) DBP directly into RBPR,

⋄ copying all of DBP ,

⋄ and editing wherever necessary.

Page 67: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 3 Lecture: 10. Slide: 556 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Business Process Reengineering, BPR and the Requirements Document

Place in Formalisation Document

• The above statements as how to express the “merging” of BPRrequirements into the overall requirements document apply to thenarrative as well as to the formalised prescriptions.

• We may assume that there is a formal domain description, DBP ,(of business processes) from which we develop the formalprescription of the BPR requirements.

Page 68: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 3, Subsubsect. 3 Lecture: 10. Slide: 557 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, BPR and the Requirements Document, Place in Formalisation Document ]

• We may then decide to

⋆ either develop entirely new descriptions of the new businessprocesses, i.e., actually prescriptions for the business reengineeredprocesses, RBPR;

⋆ or develop, from DBP , using a suitable schema calculus, such asthe one in RSL, the requirements prescription RBPR, by suitableparameterisation, extension, hiding, etc., of the domaindescription DBP .

Page 69: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 4 Lecture: 10. Slide: 558 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Intrinsics Review and Replacement

Characterisation 73 (Intrinsics Review and Replacement)By intrinsics review and replacement we understand an evaluation

• as to whether current intrinsics stays or goes, and

• as to whether newer intrinsics need to be introduced

.

Page 70: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 4 Lecture: 10. Slide: 559 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Intrinsics Review and Replacement ]

Example. 1 – Intrinsics Replacement: A railway net ownerchanges its business from owning, operating and maintainingrailway nets (lines, stations and signals) to operating trains.Hence the more detailed state changing notions of rail units needno longer be part of that new company’s intrinsics while thenotions of trains and passengers need be introduced as relevantintrinsics. •

Replacement of intrinsics usually point to dramatic changes of thebusiness and are usually not done in connection with subsequent andrelated software requirements development.

Page 71: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 5 Lecture: 10. Slide: 560 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Support Technology Review and Replacement

Characterisation 74 (Support Technology Review and ReplacemenBy support technology review and replacement we understand anevaluation

• as to whether current support technology as used in the enterpriseis adequate, and

• as to whether other (newer) support technology can better performthe desired services

.

Page 72: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 5 Lecture: 10. Slide: 561 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Support Technology Review and Replacement ]

Example. 2 – Support Technology Review and Replacement:

• Currently the main information flow of an enterprise is takencare of by printed paper, copying machines and physicaldistribution. All such documents, whether originals (masters),copies, or annotated versions of originals or copies, are subjectto confidentiality.

• As part of a computerised system for handling the futureinformation flow, it is specified, by some domain requirements,that document confidentiality is to be taken care of byencryption, public and private keys, and digital signatures.

• However, it is realised that there can be a need for takingphysical, not just electronic, copies of documents.

Page 73: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 5 Lecture: 10. Slide: 562 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Support Technology Review and Replacement ]

• The following business process reengineering proposal is therefore considered:

⋆ Specially made printing paper and printing and copying machines are to beprocured, and so are printers and copiers whose use requires the insertion ofspecial signature cards which, when used, check that the person printing orcopying is the person identified on the card, and that that person may printthe desired document.

⋆ All copiers will refuse to copy such copied documents — hence the specialpaper.

⋆ Such paper copies can thus be read at, but not carried outside the premises(of the printers and copiers).

⋆ And such printers and copiers can register who printed, respectively who triedto copy, which documents.

⋆ Thus people are now responsible for the security (whereabouts) of possiblepaper copies (not the required computing system).

Page 74: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 5 Lecture: 10. Slide: 563 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Support Technology Review and Replacement ]

• The above, somewhat construed example, shows the “division oflabour” between the contemplated (required, desired) computingsystem (the “machine”) and the “business reengineered” personsauthorised to print and possess confidential documents.

• It is implied in the above that the reengineered handling ofdocuments would not be feasible without proper computingsupport.

• Thus there is a “spill-off” from the business reengineered world tothe world of computing systems requirements.

Page 75: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 6 Lecture: 10. Slide: 564 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Management and Organisation Reengineering

Characterisation 75 (Management and Organisation Reengineering)By management and organisation reengineering we understand anevaluation

• as to whether current management principles and organisationstructures as used in the enterprise are adequate, and

• as to whether other management principles and organisationstructures can better monitor and control the enterprise

.

Page 76: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 6 Lecture: 10. Slide: 565 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Management and Organisation Reengineering ]

Example. 3 – Management and Organisation Reengineering:

• A rather complete computerisation of the procurementpractices of a company is being contemplated.

• Previously procurement was manifested in the followingphysically separate as well as designwise differently formattedpaper documents: requisition form, order form, purchase order,delivery inspection form, rejection and return form, andpayment form.

• The supplier had corresponding forms: order acceptance andquotation form, delivery form, return acceptance form, invoiceform, return verification form, and payment acceptance form.

• The current concern is only the procurement forms, not thesupplier forms.

Page 77: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 6 Lecture: 10. Slide: 566 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Management and Organisation Reengineering ]

• The proposed domain requirements are mandating

⋆ that all procurer forms disappear in their paper version,

⋆ that basically only one, the procurement document, represents allphases of procurement,

⋆ and that order, rejection and return notification slips, andpayment authorisation notes,

⋆ be effected by electronically communicated and duly digitallysigned messages that represent appropriate subparts of the one,now electronic procurement document.

Page 78: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 6 Lecture: 10. Slide: 567 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Management and Organisation Reengineering ]

• The business process reengineering part may now

⋆ “short-circuit” previous staff’s review and

⋆ acceptance/rejection of former forms,

• in favour of fewer staff interventions.

• The new business procedures, in this case, subsequently find theirway into proper domain requirements: those that support, that ismonitor and control all stages of the reengineered procurementprocess.

Page 79: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 7 Lecture: 10. Slide: 568 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Rules and Regulations Reengineering

Characterisation 76 (Rules and Regulation Reengineering)By rules and regulations reengineering we understand an evaluation

• as to whether current rules and regulations as used in the enterpriseare adequate, and

• as to whether other rules and regulations can better guide andregulate the enterprise

.

• Here it should be remembered that rules and regulations principallystipulate business engineering processes.

• That is, they are — i.e., were — usually not computerised.

Page 80: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 7 Lecture: 10. Slide: 569 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Rules and Regulations Reengineering ]

Example. 4 – Rules and Regulations Reengineering:

• Assume now, due to reengineered support technologies, thatinterlock signalling can be made magnitudes safer than before,without interlocking.

• Thence it makes sense to reengineer a domain rule of

⋆ from: In any three-minute interval at most one train mayeither arrive to or depart from a railway station

⋆ into: In any 20-second interval at most two trains may eitherarrive to or depart from a railway station.

• This reengineered rule is subsequently made into a domainrequirements, namely that the software system for interlockingis bound by that rule.

Page 81: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 8 Lecture: 10. Slide: 570 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Script Reengineering

• On one hand, there is the engineering of the contents of rules andregulations,

• and, on another hand, there are

⋆ the people (management, staff) who script these rules andregulations,

⋆ and the way in which these rules and regulations arecommunicated to managers and staff concerned.

Page 82: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 8 Lecture: 10. Slide: 571 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Script Reengineering ]

Characterisation 77 (Script Reengineering) By scriptreengineering we understand evaluation

• as to whether the way in which rules and regulations are scriptedand made known (i.e., posted) to stakeholders in and of theenterprise is adequate, and

• as to whether other ways of scripting and posting are more suitablefor the enterprise

.

Page 83: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 8 Lecture: 10. Slide: 572 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Script Reengineering ]

More to come

Page 84: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 8 Lecture: 10. Slide: 573 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Script Reengineering ]

More to come

Page 85: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 8 Lecture: 10. Slide: 574 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Script Reengineering ]

More to come

Page 86: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 9 Lecture: 10. Slide: 575 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Human Behaviour Reengineering

Characterisation 78 (Human Behaviour Reengineering)By human behaviour reengineering we understand an evaluation

• as to whether current human behaviour as experienced in theenterprise is acceptable, and

• as to whether partially changed human behaviours are moresuitable for the enterprise

.

Page 87: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 9 Lecture: 10. Slide: 576 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering, Human Behaviour Reengineering ]

Example. 5 – Human Behaviour Reengineering:

• A company has experienced certain lax attitudes amongmembers of a certain category of staff.

• The progress of certain work procedures therefore isreengineered,

• implying that members of another category of staff arehenceforth expected to follow up on the progress of “that”work.

• In a subsequent domain requirements stage the abovereengineering

• leads to a number of requirements for computerised monitoringof the two groups of staff.

Page 88: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 10, Subsubsect. 1 Lecture: 10. Slide: 577 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

[ Business Process Reengineering ]

Discussion: Business Process Reengineering

Who Should Do the Business Process Reengineering?

• It is not in our power, as software engineers,

• to make the kind of business process reengineering decisions impliedabove.

• Rather it is, perhaps, more the prerogative of appropriatelyeducated, trained and skilled (i.e., gifted) other kinds of engineersor business people

• to make the kinds of decisions implied above.

• Once the BP reengineering has been made, it then behooves theclient stakeholders to further decide whether the BP reengineeringshall imply some requirements, or not.

Page 89: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 10, Subsubsect. 2 Lecture: 10. Slide: 578 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Business Process Reengineering, Discussion: Business Process Reengineering

Who Should Do the Business Process Reengineering?

• Once that last decision has been made in the affirmative, we, assoftware engineers, can then apply our abstraction and modellingskills, and,

• while collaborating with the former kinds of professionals,

• make the appropriate prescriptions for the BPR requirements.

• These will typically be in the form of domain requirements, whichare covered extensively in later lectures.

Page 90: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 7, Subsect. 10, Subsubsect. 3 Lecture: 10. Slide: 579 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Business Process Reengineering, Discussion: Business Process Reengineering

General

• Business process reengineering is based on the premise

• that corporations must change their way of operating,

• and, hence, must “reinvent” themselves.

• Some corporations (enterprises, businesses, etc.) are

⋆ “vertically” structured

⋄ along functions, products or geographical regions.

⋆ Others are “horizontally” structured

⋄ along coherent business processes.

⋆ In either case adjustments may need to be made as the business(i.e., products, sales, markets, etc.) changes.

We refer to an Appendix section starting on Slide 1147 for an examplerelated to the business process re-engineering topic.

Page 91: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 8 Lecture: 10. Slide: 580 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

/home/db/tseb/kap3/kap3-1 Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

Requirements Terminology

to be written

We refer to an Appendix section starting on Slide 1155 for an examplerelated to the requirements terminology topic.

Page 92: Lecture 10: Requirements Engineering: PreludeDines Bjorner: 8th DRAFT: October 14, 2008 invisible SOFTWARE ENGINEERING: The Essentials Nov.2008 Lectures: TUGraz Chap.3, Sect.1, Subsect.1

invi

sibl

e

Din

es B

jorn

er: 8

th D

RA

FT: O

ctob

er 1

4, 2

008

SOFTWARE ENGINEERING: The Essentials Nov. 2008 Lectures: TU Graz

Chap. 3, Sect. 8 Lecture: 10. Slide: 581 of 1352

c© Dines Bjørner, 2008Fredsvej 11DK-2840 HolteDenmark November 16, 2008, 08:48

Phone: +45 4542 2141, E-mail: [email protected], URL: www.imm.dtu.dk/˜db

End of Lecture 10