On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements
|
|
- Timothy Williams
- 8 years ago
- Views:
Transcription
1 Proceedings of the 2n d International Conference on Information Technology, ICIT June 2010, Gdansk, Poland. On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements Anna Bobkowska I), Magdalena Kowalska 2) 1) Department of Software Engineering Faculty of ETI, Gdansk University of Technology Gdansk, Poland annab@eti.pg.gda.pl 2) SoftLex Law and Software Quality Consulting Warsaw, Poland magdalena.kowalska@softlex.com.pl Abstract - In order to develop information systems which comply with law, cooperation between lawyers and software engineers is necessary. The problem is how to transform legal regulations to law-related systems requirements efficiently. In this paper, we present both lawyer's perspective and software engineer's perspective on this problem and then we attempt to capture a common information space. The lawyer's perspective delivers a method for identifying and analyzing relevant laws and legal regulations. The software engineer's perspective discovers the specifics of dealing with law-related requirements with the use of requirements engineering as a frame of reference. The common information space includes a process of transforming legal regulations to legal requirements and a description of knowledge which must be shared in order to facilitate efficient collaboration. Keywords-software compliant with law, common information space, law-related requirements, legal analysis. I. INTRODUCTION Ensuring that information systems comply with law becomes an increasingly important aspect of software development. Information systems are developed in the areas regulated by law and more and more often legal regulations are related to Information and Communication Technologies (lct). One of the reasons why ensuring compliance with law is not easy is the diversity of possible impacts of legal regulations to IT systems. Application of domain specific legal regulations, e.g. in domain of banking, is different from applying general legal regulations, e.g. related to privacy policy. Methods of dealing with ICT related laws, e.g. concerning e-voting or e-signature, are different from methods of dealing with laws introduced in times when no computer systems existed. Law regulates different domains of human life. AdditionalJy, in some domains law aijows or requires use of information technologies and in some cases even determines some features of systems. Sometimes the text of legal regulation is clear and precise, in other cases the legal regulations are ambiguous or even contradictory. In some cases, a new system which must comply with law is developed, and in other cases, the introduction of new laws causes the modifications of existing systems. In general, this issue concerns lawyers, representatives of ICT area, business decision makers and legislators. Effective and efficient collaboration between lawyers and software engineers is a real chaijenge. Representatives of these professions use different approaches and different terminology. They have different understanding of being effective. They must collaborate on transforming legal regulations to law-related Software engineers themselves will not perform a proper analysis of the system of law and characteristics of legal regulations, and lawyers themselves will not create a correct specification of system This problem has been discussed at a few conferences, especially at Requirements Engineering and Law (RELA W) workshops. The differences between legal concepts and requirements engineering concepts have been noticed at RELA W 2008 workshop [1] and the challenges of 'standardizing terminology between law, engineering and business' and 'increased collaboration between lawyers and engineers' were indicated as important interdisciplinary challenges during the break-out sessions of this workshop. One of the ways of solving this problem is representation of legal regulations with a kind of formalism and then development of software which supports processing this form of regulations. The formalisms can be text-based [2] or diagram-based [3]. The next step in this approach is the integration of the representations of legal regulations with the descriptions of software in order to meet the challenges of documenting legal constraints for software and supporting their traceability as well as change management. The results are interesting but they are in the research phase nowadays. In 105
2 our opinion, even when these systems gain industrial maturity, they will not eliminate the need of collaboration between system engineers and lawyers in the area of law-related In our approach, we focus on facilitating collaboration between lawyers and software engineers. The goal of this paper is to analyze this problem from both lawyer's perspective and software engineer's perspective and to propose a solution with synergetic effect. The contribution is a common information space which contains a description of common knowledge necessary for efficient collaboration and a process which integrates analysis of legal regulations and resulting requirements with the activities performed during traditional requirements engineering. The paper is structured as follows. Section 2 presents the lawyer's perspective. Section 3 deals with issues related to engineering legal requirements from the software engineer's perspective. Section 4 presents the common information space. II. LAWYER'S PERSPECTIVE This section presents important issues which arise when analysing this problem from lawyer's perspective. It includes selected aspects of identifying and analysis of legal regulations related to the IT system, the priority of legal requirements over other business goals, as well as the impact of law on software development decisions. Compliance of software with the binding law at all moments of its exploitation and maintenance is a special priority. In case of conflict between legal requirements and other goals, e.g. efficiency or scope of functionality, compliance with law has the priority and other goals must be subordinated. Law-related requirements may not be omitted and their implementation can not be delayed because of decreased budget. Compliance with law means sometimes the changes that have to be made to systems. They might result from the changes in related law and legal regulations. The analysis of changeability of legal regulations allows for estimating the impact of changes regarding legal regulations on system In order to perform analysis of impact of law for system under development, one must first identify all laws and legal regulations concerning the system. Before starting the identification of related legal regulations, one has to analyse the domain in which system will operate and understand business goals of the system. With this information, one can identify properly the legal areas that the system refers to and determine which legal regulations need to be taken into consideration. The next step is analysis of the character of legal regulations in this area, e.g. whether they are stable or they are subject to frequent changes, whether they are very detailed or the subject is regulated without many constraints. The manner of acquisition of legal requirements depends on the legal system and on the degree of regulation of various domains in different countries [4]. In the EU member states apart from the national regulations, one has to deal also with the EU regulations. And in the end, the legal obligations arising from international treaties and conventions should also be included. Analysis of the identified legal regulations is the next activity. It should result in a complete list of regulations which have impact on system. The points of this analysis are: 1) identification of basic legal regulations having impact on a respective IT system 2) analysis of completeness of legal regulations in the given domain 3) analysis of the time-scope validity 4) identification of possible transitory regulations regulating the rules of solving possible conflicts between old and new regulations 5) identification of potential changes of law and possible further new regulations. The complete analysis includes also the formal aspect of legal regulations: the hierarchy of acts and regulations and the characteristics of obligation (obligatory without exception or relatively obligatory). This analysis will allow systematizing requirements imposed by law and granting priorities to respective system In the next step, transformation of identified legal regulations to law-related requirements is performed. Several legal norms may influence one requirement but also on the basis of one legal norm several system requirements may be formulated. Some legal norms concerning the economic domain that the system refers to, may have no impact on the development and functioning of the system. Lawyers should extract relevant legal regulations and software engineers should formulate detailed requirements for an IT system and place them in System Requirements Specification. In this activity, the lawyers' role is mostly a consultancy. At the end, the lawyers should verify whether all legal requirements are integrated into System Requirements Specification. III. SOFTWARE ENGINEER'S PERSPECTIVE In this section, in order to discover specifics of dealing with law-related requirements we analyze them in context of the sub-areas of requirements engineering [5]. Requirements elicitation is the process of identifying stakeholders of a system and collecting requirements as well as constraints of the system. Legal requirements elicitation is different because their source is not in users' needs or customers' expectations. Legal requirements come from the analysis of the impact of law on the system under development. The process of analysis of relevant laws and legal regulations must be performed for every system separately. Thus, the vision of system which determines domain, goals and scope of the system should be delivered as 106
3 an input. Identification of relevant laws and legal regulations and their analysis should be performed by lawyers. One can treat law as a specific stakeholder. Law is obligatory with no possibility of exclusions or negotiations. It is invisible and abstract, which might cause problems with interpretations and validation. It covers many areas of human life and when it specifies the business rules, its impact to system is to be determined. There are not many formal constraints related to the changes in law, which means that changes in law will cause changes in systems. One of best practices is delegation of a person for tracing laws and legal regulations. Requirements analysis categorizes requirements, explores their relationships, examines them for consistency, omissions and ambiguity, and prioritizes them based on users' needs. Analysis must be performed also with respect to legal regulations and law-related requirements, because of their complexity, sources in different acts, necessary interpretations and possible contradictions between legal regulations, possible contradictions between legal requirements and other The goal of legal regulations and legal requirements analysis is understanding the impact of legal regulations on the system under development as well as integration of law-related requirements with other These activities should be performed by lawyer when analysis is related only to law. Transformation of legal regulations to legal requirements must be made iteratively in cooperation between lawyers and software engineers. Software Requirements Specification (SRS) is a document which describes goals of the system under development, their requirements and constraints. A separate document describing law and legal regulation analysis in details can be prepared by lawyers. However, the requirements which have impact on system should be integrated with other parts of Software Requirements Specification. In the section of legal requirements, all legal acts, their dependencies, attributes, effectiveness periods and changeability dates should be specified. Apart from this, traditional requirements resulting from law should be specified in other sections with indication of their source in legal Validation of requirements examines entire specification for fulfillment of goals, consistency, unambiguity and conformance to standards. It is usually made during reviews. There are two aspects of validation of law-related Validation of the system from legal perspective should be made by lawyers and it should result in confirmation that entire system complies with law. This review should detect situations when law forbids features which have not been specified or solutions which are consistent with requirements but entire system does not comply with law. The second type of validation is traditional validation with examining the impact of law-related requirements on the system by developers and customers. This review should check whether such scope of system is satisfactory for customers and feasible for development team in given project constraints. IV. COMMON INFORMATION SPACE A common information space is a set of information which must be shared by lawyers and software engineers in order to collaborate effectively on transforming legal regulations to system The common information space includes: Basic knowledge about software engineering for lawyers - Lawyers do not need the knowledge about technical details of software development. However, they should understand briefly the phases of software development. As legal regulations are transformed to requirements and the lawyers should validate SRS from legal perspective, they should have a basic knowledge of requirements engineering. Basic knowledge about law for software engineers - Software engineers should understand briefly the nature of law, the basis of legislation and legal reasoning. They need to see law as an entire system of many different regulations that may have impact on IT system. They should be aware of changeability and possible contradictions of legal regulations. Specific knowledge on the border of these disciplines - It consists of the knowledge how laws and legal regulations might impact software development, maintenance and exploitation. This knowledge can be presented in the form of taxonomy of impacts of law on information systems. The next element of the common information space is a process which defines the roles, activities and artefacts when transforming legal regulations to system requirements and integrating them with other Such a process defines and facilitates efficient collaboration. Law can have a diverse impact on IT systems. From legal point of view, law can allow for the use of the system, or law can require a system with a set of specified features in a given application, or text of legal regulation in a given domain does not refer to systems. From software project's point of view, legal regulations of the domain can determine business processes which must be supported by the system, administrative procedures can set constraints on print-outs, forms, data and algorithms in information systems, or legal regulations related to IT system can be related to functional and quality requirements of the system. Law can also set constraints on development and exploitation of the system. A proposition of the process which integrates analysis of legal regulations and resulting requirements with traditional requirements engineering activities is presented in Fig. 1. This process clearly defines the responsibilities of the involved roles and the structure of activities. System's Vision which defines goals and domain must be delivered before performing any activities related to requirements, including law-related Then, identification and analysis of different kinds of requirements can be made separately. With the 107
4 Analyst Lavvyer --- perform Systems Vision identify and analyse functional and quality requirerrents transform legal regulations to requirerrents validate SRS from business and tedmical perspective Figure 1. Figure. 1. The process for integration of analysis of legal regulations and resulting requirements with traditional requirements engineering activities knowledge of analyst's expectations, lawyers can get prepared with relevant legal regulations in order to perform the transformation smoothly. The transformation is made in cooperation between the lawyer and the analyst in discussion which determines the impact of all legal regulations for the system under development. SRS is prepared by an analyst. It should contain a section of legal requirements and complete specification of system requirements related to law. The final activity is the validation of the SRS from the technical, business and legal perspectives and introduction of necessary changes. V. CONCLUSIONS When searching for a solution to the problem of developing information systems which comply with law we have focused on facilitating efficient collaboration between lawyers and software engineers. We have analyzed this problem from both lawyer's and software engineer's perspectives and on the basis of this analysis we have proposed a common information space with a process which allows to integrate analysis of legal regulations and resulting requirements with traditional activities made during requirements engineering. The strengths of this process are the synergetic use of the expertise of both professionals involved in the process, the structure of the process resulting from the detailed analysis of the phenomena and dependencies between activities, and focus on communication and collaboration which should allow to overcome misunderstandings and clarify appearing problems as early as possible. In further work, we plan to elaborate the taxonomy of impacts of Iaw on information systems. REFERENCES [1] AI. Anton, T.O. Breaux, O. Karagiannis, 1. Mylopoulos, "First International Workshop on Requirements Engineering and Law (RELAW)", Proceedings of the workshop on Requirements Engineering and Law, RELA W'08, [2] T.O. Breaux, M.W. Vail, AI. Anton, "Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations", 14th IEEE International Requirements Engineering Conference (RE'06). [3] A Siena, 1. Mylopoulos, A Perini, A Susi, "From Laws to Requirements", Proceedings of the workshop on Requirements Engineering and Law, RELA W'08, [4] 1. Oniszczuk, "Filozofia i teoria prawa" (Philosophy and theory of law), Beck, Warsaw [5] R.S. Pressman, O. Ince, "Software Engineering. A Practitioner's Approach", 5th edition, McGraw Hill,
5 109
A Pattern-Based Method for Identifying and Analyzing Laws
A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of
More informationBusiness Process and Regulations Compliance Management Technology
Business Process and Regulations Compliance Management Technology Ilze Buksa Riga Technical University, Institute of Applied Computer Systems, Meza street 1/4, LV-1048, Riga, Latvia ilze.buksa@rtu.lv Supervisor
More informationCertification Authorities Software Team (CAST) Position Paper CAST-18
Certification Authorities Software Team (CAST) Position Paper CAST-18 Reverse Engineering in Certification Projects Completed June 2003 (Rev 1) NOTE: This position paper has been coordinated among the
More informationStory Card Based Agile Software Development
Story Card Based Agile Software Development Chetankumar Patel, and Muthu Ramachandran Leeds Metropolitan University, UK c.patel@leedsmet.ac.uk Abstract The use of story cards for user stories in many Extreme
More informationA Business Analysis Perspective on Business Process Management
A Business Analysis Perspective on Business Process Management October 2013 Discussion Points! Why have Roles?! What is Business Analysis?! Who is the Business Analyst?! Business Analysis & Business Process
More informationThe Role of Law in Software Requirements Engineering
The Role of Law in Software Requirements Engineering Paul Otto Advisor: Annie Antón CSC 890 Written Qualifier Exam Why should computer scientists study the law? Regulatory compliance is the primary driver
More informationEffective Business Requirements (Virtual Classroom Edition)
Developing & Confirming Effective Business Requirements (Virtual Classroom Edition) Eliminate Costly Changes and Save Time by Nailing Down the Project Requirements the First Time! Pre-Workshop Preparation
More informationRegulatory Compliance and its Impact on Software Development
Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
More informationThis alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.
Red River College Course Learning Outcome Alignment with BABOK Version 2 This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed
More informationRequirements Management Practice Description
Requirements Management Practice Description 1. REQUIREMENTS MANAGEMENT (RM) 1.1 Description of the practice TRASYS provide solutions to effectively manage critical issues and reduce risks in project related
More informationRequirements Engineering Process
Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their
More informationTowards Regulatory Compliance: Extracting Rights and Obligation to Align Requirements with Regulations
Towards Regulatory Compliance: Extracting Rights and Obligation to Align Requirements with Regulations Travis D. Breaux Matthew W. Vail Annie I. Antón North Carolina State University RE 06, Minneapolis,
More informationHow To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
More informationSyllabus. REQB Certified Professional for Requirements Engineering. Foundation Level
Syllabus REQB Certified Professional for Requirements Engineering Version 2.1 2014 The copyright to this edition of the syllabus in all languages is held by the Global Association for Software Quality,
More informationTeaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
More informationPharmaceutical Sales Certificate
Pharmaceutical Sales Certificate Target Audience Medical representatives Objective The objective of this program is to provide the necessary skills and knowledge needed to succeed as medical representatives.
More informationChapter 3 The Integrated Requirements Management Framework (IREQM)
Chapter 3 The Integrated Management Framework (IREQM) During the software requirements development process, customer and development team meet together for many times to obtain customer and product requirements
More informationElite: A New Component-Based Software Development Model
Elite: A New Component-Based Software Development Model Lata Nautiyal Umesh Kumar Tiwari Sushil Chandra Dimri Shivani Bahuguna Assistant Professor- Assistant Professor- Professor- Assistant Professor-
More informationTen steps to better requirements management.
White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten
More informationSoftware Requirements, Third Edition
j Microsoft Software Requirements, Third Edition Karl Wiegers and Joy Beatty Contents Introduction Acknowledgments xxv xxxi PART I SOFTWARE REQUIREMENTS: WHAT, WHY, AND WHO Chapter 1 The essential software
More informationRequirements Engineering Processes. Feasibility studies. Elicitation and analysis. Problems of requirements analysis
Requirements engineering processes Requirements Engineering Processes The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the.
More informationHow To Understand The Business Analysis Lifecycle
Business Analysis Lifecycle by Sergey Korban Aotea Studios Ltd November 2011 Contents Introduction... 3 Business Analysis Lifecycle... 4 Practical Application... 5 Start-Up Phase... 5 Initiation Phase...
More informationRequirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
More informationInstructional Designer Standards: Competencies & Performance Statements
Standards Set 2012 ibstpi Instructional Designer Standards: Competencies & Performance Statements The 2012 ibstpi Instructional Designer Competencies and Performance statements are copyrighted by the International
More informationModule 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur
Module 2 Software Life Cycle Model Lesson 3 Basics of Software Life Cycle and Waterfall Model Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what is a
More information11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
More informationImproving Traceability of Requirements Through Qualitative Data Analysis
Improving Traceability of Requirements Through Qualitative Data Analysis Andreas Kaufmann, Dirk Riehle Open Source Research Group, Computer Science Department Friedrich-Alexander University Erlangen Nürnberg
More informationPartnering for Project Success: Project Manager and Business Analyst Collaboration
Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,
More informationThe use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
More informationThe Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
More informationPrioritizing Legal Requirements
Prioritizing Legal Requirements Aaron K. Massey, Paul N. Otto,, and Annie I. Antón Department of Computer Science, North Carolina State University School of Law, Duke University {akmassey, pnotto, aianton}@ncsu.edu
More informationAdvancing Your Business Analysis Career Intermediate and Senior Role Descriptions
Advancing Your Business Analysis Career Intermediate and Senior Role Descriptions The role names listed in the Career Road Map from International Institute of Business Analysis (IIBA) are not job titles
More informationTowards a CMMI-compliant Goal-Oriented Software Process through Model-Driven Development
The 4th IFIP WG8.1 Working Conference on the Practice of Enterprise Modelling PoEM 2011 Universidade Federal de Pernambuco Towards a CMMI-compliant Goal-Oriented Software Process through Model-Driven Development
More informationCourse Outline. Foundation of Business Analysis Course BA30: 4 days Instructor Led
Foundation of Business Analysis Course BA30: 4 days Instructor Led Prerequisites: No prerequisites - This course is suitable for both beginner and intermediate Business Analysts who would like to increase
More informationBecoming a Business Analyst
Becoming a Business Analyst What is Business Analysis? The practice of enabling change in an organizational context by defining needs and recommending solutions that delivers value to stakeholders When
More informationStandards for the Professional Practice of Internal Auditing
Standards for the Professional Practice of Internal Auditing THE INSTITUTE OF INTERNAL AUDITORS 247 Maitland Avenue Altamonte Springs, Florida 32701-4201 Copyright c 2001 by The Institute of Internal Auditors,
More informationRequirement Gathering and Tracking Process for Distributed Agile based Development
Requirement Gathering and Tracking Process for Distributed Agile based Development REHAN AKBAR, MUHAMMAD HARIS, MAJID NAEEM Department of Computer Science GC University, Lahore Pakistan. Abstract: Requirement
More informationBridging the IT Business Gap The Role of an Enterprise Architect
Whitepaper Bridging the IT Business Gap The Role of an Enterprise Architect Today s enterprises understand the value that Information Technology (IT) can bring to their business. IT supports day-to-day
More informationKnowledge Representation & Reasoning for Business Analysis
Knowledge Representation & Reasoning for Business Analysis LECTURE 2 Types of data, information, assumption, and knowledge in Business Analysis Ivan Jureta Senior Researcher, Fonds de la Recherche Scientifique
More informationAn organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:
p. 1 System Management Standards Proposed on October 8, 2004 Preface Today, the information system of an organization works as an important infrastructure of the organization to implement its management
More informationLegal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.
IT 4823 Information Security Administration Legal and Ethical Considerations March 24 Legal and Ethical Aspects Topics include: cybercrime and computer crime intellectual property issues privacy ethical
More informationBUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
More informationSurveying and evaluating tools for managing processes for software intensive systems
Master Thesis in Software Engineering 30 Credits, Advanced Level Surveying and evaluating tools for managing processes for software intensive systems Anuradha Suryadevara IDT Mälardalen University, ABB
More informationISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
More informationSTAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
More informationLecture 17: Requirements Specifications
Lecture 17: Requirements Specifications Why we need to write specifications Purpose and audience Choosing an appropriate size and formality Desiderata for Specifications Properties of good specifications
More informationSoftware Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
More informationINCREASINGLY, regulations in Canada, Europe, and the US
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 34, NO. 1, JANUARY/FEBRUARY 2008 5 Analyzing Regulatory Rules for Privacy and Security Requirements Travis D. Breaux, Student Member, IEEE, and Annie I.
More informationSoftware Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti
Software Engineering Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
More informationNetwork Analysis of Regulations
Why Eliciting and Managing Legal Requirements Is Hard Nadzeya Kiyavitskaya University of Trento nadzeya@disi.unitn.it Alžběta Krausová ICRI - K. U. Leuven - IBBT betty.krausova@law.kuleuven.be Nicola Zannone
More informationTo Comply Software and IT System Development with Related Laws Abstract. Keywords: 1. PROBLEM STATEMENT
To Comply Software and IT System Development with Related Laws Fatemeh Zarrabi Supervising team: Haris Mouratidis, David Preston, Shareeful Islam School of Computing, Information Technology and Engineering,
More informationTowards Collaborative Requirements Engineering Tool for ERP product customization
Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,
More informationApplying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, ivanyos@trusted.hu Abstract: The term of scenario is used
More information{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information}
Job Description Business Analyst Organisation: Location: Reports to: Supervises: Working conditions: Last updated: {Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect
More informationRequirements in Functional IT Management
Requirements in Functional IT Floris Blaauboer University of Twente, Department of Computer Science, Chair of Information Systems, f.a.blaauboer@student.utwente.nl Abstract. Requirements engineering and
More informationISO 18308 INTERNATIONAL STANDARD. Health informatics Requirements for an electronic health record architecture
INTERNATIONAL STANDARD ISO 18308 First edition 2011-04-15 Health informatics Requirements for an electronic health record architecture Informatique de santé Exigences relatives à une architecture de l'enregistrement
More informationProject VIDE Challenges of Executable Modelling of Business Applications
Project VIDE Challenges of Executable Modelling of Business Applications Radoslaw Adamus *, Grzegorz Falda *, Piotr Habela *, Krzysztof Kaczmarski #*, Krzysztof Stencel *+, Kazimierz Subieta * * Polish-Japanese
More informationPROJECT MANAGEMENT FRAMEWORK
PROJECT MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Executive Assistant to
More informationRequirements Engineering for Web Applications
Web Engineering Requirements Engineering for Web Applications Copyright 2013 Ioan Toma & Srdjan Komazec 1 What is the course structure? # Date Title 1 5 th March Web Engineering Introduction and Overview
More informationSoftware Requirements Engineering: What, Why, Who, When, and How By Linda Westfall
Software Engineering: What, Why, Who, When, and How By Linda Westfall Key words: requirements engineering, requirements elicitation, requirements analysis, requirements specification, requirements management,
More informationQuick Guide: Meeting ISO 55001 Requirements for Asset Management
Supplement to the IIMM 2011 Quick Guide: Meeting ISO 55001 Requirements for Asset Management Using the International Infrastructure Management Manual (IIMM) ISO 55001: What is required IIMM: How to get
More informationDescription of Program Management Processes (Initiating, Planning) 2011 PROGstudy.com. All rights reserved
Description of Program Management Processes (Initiating, Planning) Topics Covered Program Management Process Groups salient features Description of all processes in Initiating Process Group: Initiate Program
More informationTechnology Delivery Co Ordinator
Technology Delivery Co Ordinator Information Package Full Time Technology Delivery Co Ordinator (IT Project & Service Desk Co Ordinator) The Sydney Anglican Schools Corporation caters for the academic,
More informationSTSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
More informationDigital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
More informationHOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM
HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM Prepared by Gwen Thomas of the Data Governance Institute Contents Why Data Governance?... 3 Why the DGI Data Governance Framework
More informationLowering business costs: Mitigating risk in the software delivery lifecycle
August 2009 Lowering business costs: Mitigating risk in the software delivery Roberto Argento IBM Rational Business Development Executive Valerie Hamilton IBM Rational Solution Marketing Manager and Certified
More informationCFP Certification Global excellence in financial planning
CFP Certification Global excellence in financial planning VISION STATEMENT To establish financial planning as a recognized profession through the promotion of excellence in financial planning for the benefit
More informationInternational Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000 on education.
ISO 2002 All rights reserved ISO / IWA 2 / WD1 N5 Date: 2002-10-25 Secretariat: SEP-MÉXICO International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000
More informationSyllabus. REQB Certified Professional for Requirements Engineering. Advanced Level Requirements Manager
Syllabus REQB Certified Professional for Requirements Engineering Requirements Manager Version 1.0 2011 The copyright to this edition of the syllabus in all languages is held by the Global Association
More informationDSDM DSDM. CONSORTiUM. CONSORTiUM. AgileBA. The Handbook for Business Analysts. Extract The Requirements Lifecycle In An Agile Project. www.dsdm.
DSDM CONSORTiUM DSDM CONSORTiUM AgileBA The Handbook for Business Analysts Extract The Lifecycle In An Agile Project www.dsdm.org This Extract from AgileBA, The Lifecycle in an Agile Project, is based
More informationRequirements Engineering Processes. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1
Requirements Engineering Processes Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1 Objectives To describe the principal requirements engineering activities and their relationships
More informationWest Point Negotiation Project. ADRP 6-22 (Army Leadership) Negotiation Content
West Point Negotiation Project ADRP 6-22 (Army Leadership) Negotiation Content The new ADRP 6-22 addresses negotiation An updated ADRP 6-22, Army Leadership, was published August, 2012 The updated manual
More informationINTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Introduction to the International Standards Internal auditing is conducted in diverse legal and cultural environments;
More informationBidirectional Tracing of Requirements in Embedded Software Development
Bidirectional Tracing of Requirements in Embedded Software Development Barbara Draxler Fachbereich Informatik Universität Salzburg Abstract Nowadays, the increased complexity of embedded systems applications
More informationListening to the Customer s Voice 1
Listening to the Customer s Voice 1 Karl E. Wiegers Process Impact 716-377-5110 www.processimpact.com Perhaps the greatest challenge facing the software developer is sharing the vision of the final product
More informationRequirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
More informationIDOL Outcomes and Competencies (ibstpi) 2
Instructional Design for Online Learning (IDOL) Specialization Outcomes and Specialization Competencies Updated January 2008 Table of Contents Outcomes-based curricula at Capella University...3 IDOL MS
More informationHealthcare systems make effective use of IT
SETLabs Briefings September 2008 IT Applications for Healthcare: Leverage Processes for High Quality By Ravishankar N An integrated process framework derived from industry models can help address compliance,
More informationFigure 2: DAMA Publications
Steve Hawtin, Schlumberger Information Solutions 14 th Petroleum Data Integration, Information & Data Management Conference The effective management of Exploration and Production (E&P) data has a major
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationFNSPIM403 Educate clients on personal injury management issues
FNSPIM403 Educate clients on personal injury management Release: 1 FNSPIM403 Educate clients on personal injury management Modification History Release Release 1 Comments This version first released with
More informationSOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities
More informationDesigning Law-Compliant Software Requirements
Designing Law-Compliant Software Requirements Alberto Siena 1, John Mylopoulos 2, Anna Perini 1, Angelo Susi 1 1 FBK - Irst, via Sommarive 18 - Trento, Italy {siena,perini,susi}@fbk.eu 2 University of
More informationA Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0
A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0 www.theiiba.org International Institute of Business Analysis, Toronto, Ontario, Canada. 2005, 2006, 2008, 2009, International
More informationFINANCIAL PLANNING PRACTICE STANADARDS
FINANCIAL PLANNING PRACTICE STANADARDS Introduction IFPHK has adopted the Financial Planning Practice Standards ( Practice Standards ) in order to: Establish the level of practice expected of a financial
More informationCombining Security Risk Assessment and Security Testing based on Standards
Jürgen Großmann (FhG Fokus) Fredrik Seehusen (SINTEF ICT) Combining Security Risk Assessment and Security Testing based on Standards 3 rd RISK Workshop at OMG TC in Berlin, 2015-06-16 3 rd RISK Workshop
More informationAgreed-Upon Procedures Engagements
Agreed-Upon Procedures Engagements 1323 AT Section 201 Agreed-Upon Procedures Engagements Source: SSAE No. 10; SSAE No. 11. Effective when the subject matter or assertion is as of or for a period ending
More informationA Framework for Software Product Line Engineering
Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product
More informationINTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Revised: October 2012 i Table of contents Attribute Standards... 3 1000 Purpose, Authority, and Responsibility...
More informationExpert Reference Series of White Papers. Intersecting Project Management and Business Analysis
Expert Reference Series of White Papers Intersecting Project Management and Business Analysis 1-800-COURSES www.globalknowledge.com Intersecting Project Management and Business Analysis Daniel Stober,
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationOPTIMISING PROCESSES OF IT ORGANISATION THROUGH SOFTWARE PRODUCTS CONFIGURATION MANAGEMENT
OPTIMISING PROCESSES OF IT ORGANISATION THROUGH SOFTWARE PRODUCTS CONFIGURATION MANAGEMENT Lecturer PhD Ion BULIGIU Associate Professor PhD Sorin POPA Associate Professor PhD Liviu Ion CIORA University
More informationCDC UNIFIED PROCESS PRACTICES GUIDE
Document Purpose The purpose of this document is to provide guidance on the practice of Requirements Definition and to describe the practice overview, requirements, best practices, activities, and key
More informationLeveraging CMMI framework for Engineering Services
Leveraging CMMI framework for Engineering Services Regu Ayyaswamy, Mala Murugappan Tata Consultancy Services Ltd. Introduction In response to Global market demand, several OEMs adopt Global Engineering
More informationMODEL MINE DEVELOPMENT AGREEMENT (MMDA)
MODEL MINE DEVELOPMENT AGREEMENT (MMDA) SPONSORSHIP The MMDA was developed by the Mining Law Committee of the International Bar Association. Development of the MMDA was managed by an Administrative Committee,
More informationDraft Requirements Management Plan
BAO111: Core Competencies for the Business Analyst Draft Requirements Management Plan 1.0 INTRODUCTION 1.1 Purpose This document outlines requirements roles and responsibilities, presents a stakeholder
More informationINTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION CONTENTS
INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION (Effective for assurance reports dated on or after January 1,
More informationWhite Paper. Business Analysis meets Business Information Management
White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute
More information