DELIVERABLE D2.1.1 Requirements gathering plan and methodology

Size: px
Start display at page:

Download "DELIVERABLE D2.1.1 Requirements gathering plan and methodology"

Transcription

1 PERICLES - Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital Preservation] DELIVERABLE D2.1.1 Requirements gathering plan and methodology GRANT AGREEMENT: SCHEME FP7 ICT Start date of project: 1 February 2013 Duration: 48 months 1

2 Project co-funded by the European Commission within the Seventh Framework Programme ( ) Dissemination level PU PUBLIC X RE CO RESTRICTED to a group specified by the consortium (including the Commission Services) CONFIDENTIAL only for members of the consortium (including the Commission Services) If RESTRICTED, specify distribution list Distribution list NAME CONTACT DETAILS 1

3 Authors(s) Partner SpaceApps KCL Name Rani Pinchuk Mark Hedges Contributors Partner KCL SpaceApps Name Simon Waddington Jelle Pelfrene Internal reviewers Partner TATE ULIV KCL Name Pip Laurenson Maureen Watry Christine Sauter PERICLES Consortium Page 2 of 32

4 Revision history V # # Date Description / Reason of change Contributor Feb-2013 Initial content table Rani Pinchuk Mar-2013 Initial version to be reviewed Rani Pinchuk Mar-2013 Implementing comments of Jelle Pelfrene Jelle Pelfrene, Rani Pinchuk Apr-2013 Adjusting to a newer template Rani Pinchuk Jun-2013 Updating the document according to the plan circulated to the partners, removing some methods and updating the names/descriptions of others Sep-2013 Major restructuring; added mapping to ISO standards. Rani Pinchuk Mark Hedges Sep-2013 Added some further text and suggestions Simon Waddington Sep-2013 Accepted changes Mark Hedges Nov-2013 Incorporated comments and filled in missing references etc Dec-2013 Accepted changes and incorporated comments Dec-2013 List of outcomes has been added, WP2 plan has been included, small fixes. Mark Hedges Mark Hedges Rani Pinchuk Dec-2013 Added executive summary Rani Pinchuk Dec-2013 Incorporated comments and changes Rani Pinchuk Jan-2014 Incorporated comments and changes from internal review Mark Hedges Feb-2014 Final submitted version Mark Hedges PERICLES Consortium Page 3 of 32

5 Table of contents 1 Introduction Purpose Scope Project summary Overall Approach Iterative development process Standards Outputs and Outcomes Introduction Outputs Methodology Introduction Requirements Gathering Methods Rapid case study Development of agreed terminology Stakeholder analysis Scenario development Identification and management of requirements Prioritisation of requirements Mock-up development Data inventory Scoping the evaluation(s) Identifying cross-domain differences and commonalities Broader requirements (communities of practice) Evaluating requirements (quality assurance) Methods for obtaining information Workshops Interviews Reviews of documentation or datasets Questionnaires Bibliography Appendix: Mapping to ISO/IEC 12207: Introduction Mapping Appendix: Requirements Gathering Plan Introduction Plan: art and media application domain Plan: space science application domain Glossary PERICLES Consortium Page 4 of 32

6 List of tables Table 1: Mapping to ISO/IEC 12207: PERICLES Consortium Page 5 of 32

7 List of figures Figure 1: Iterative development process...9 Figure 2: Scenario-based requirements specification Figure 3: Scenario development process Figure 5 - Space science plan Figure 6 - Space science application domain - plan for approaching the data owners Figure 7 - Space science application domain - plan for approaching the SOLAR team Figure 8 - Space science application domain - plan for approaching operations staff Figure 9 - Space science application domain - plan for approaching engineers Figure 10 - Space science application domain - plan for approaching data users Figure 11 - Space science application domain - plan for approaching solar researchers Figure 12 - Space science application domain - plan for approaching archive managers PERICLES Consortium Page 6 of 32

8 Executive summary PERICLES is a four-year project that aims to address the challenge of ensuring that digital content remains accessible in an environment that is subject to continual change. It is a research and development project that will develop a number of components including tools and software components, but also non-software outputs such as architectures and best practice which it will evaluate through prototypes based on application domains in art/media and space science. A chicken-and-egg situation was identified at the start of the project, where the application domain partners found that they needed to have a clearer understanding of the scope of the research ideas in order to provide requirements, while the technology partners needed to understand the application domains in order to scope the research more clearly. This situation is addressed by creating an iterative engagement between application domain partners and technology partners, which is initiated by the development of rapid case study descriptions. This iterative process involves a number of activities, each of which results in specific outputs and outcomes. The key activities are the following: A rapid case study description is created to bootstrap the requirements gathering process and ensure an early engagement and dialogue between partners. A terminology is developed and agreed. A stakeholder analysis is carried out. Stakeholder scenarios are developed. Requirements are identified, managed and prioritised. A data inventory is carried out. Cross-domain similarities and differences are identified. Requirements are validated and extended via communities of practice. A requirements evaluation process is set up. Where necessary, requirements and other information are obtained by means of workshops, interviews with stakeholders, review of documentation or datasets, or user surveys. The overall approach to requirements capture followed in PERICLES is grounded in accepted international standards, in particular: ISO/IEC 12207:2008 (Systems and software engineering Software life cycle processes) and ISO (Human-centred design processes for interactive systems). A mapping from the PERICLES methodology to ISO/IEC 12207:2008 is provided. In addition, for the space science domain, documents created by the LTDP (Long Term Data Preservation) Working Group at the European Space Agency will guide the requirements capture. PERICLES Consortium Page 7 of 32

9 1 Introduction 1.1 Purpose This document describes the methodology for requirements gathering that will be followed by PERICLES. The plan for implementing the methodology is attached as an appendix. 1.2 Scope This document describes how the requirements will be captured, but does not include the requirements themselves or the descriptions of the application domains. This information will be contained in Deliverable D2.3.1 Media and science case study functional requirements and user descriptions (due M17). 1.3 Project summary PERICLES is a four-year project that aims to address the challenge of ensuring that digital content remains accessible in an environment that is subject to continual change, including not only technological change, but also changes in semantics, academic or professional practice, or society itself, which can affect the attitudes and interests of the various stakeholders that interact with the content. PERICLES will take a preservation by design approach that involves modelling, capturing and maintaining detailed and complex information about digital content, the environment in which it exists, and the processes and policies to which it is subject. The project will be addressing these preservation challenges in relation to digital content from two quite different application domains: on the one hand, digital artworks, such as interactive software-based installations, and other digital content from Tate's collections, archives and media productions; on the other hand, experimental scientific data originating from the European Space Agency and International Space Station. The project website is PERICLES Consortium Page 8 of 32

10 2 Overall Approach 2.1 Iterative development process Figure 1 illustrates at a high-level the iterative, stakeholder-centric, lifecycle followed by PERICLES. Although, PERICLES will develop software, it is not developing a preservation system, and neither is it concerned with system development in the sense of developing a product-ready system that supports a comprehensive set of user functionality. It is a research and development project that will develop a number of components including tools and software components, but also non-software outputs such as architectures and best practice which it will demonstrate and evaluate by means of prototypes in application domains: art/media and space science. Case studies (art/media, science) Rapid case studies Understanding of stakeholder needs Research vision Preservation technology research Stakeholder engagement Research and prototyping Research context and scoping Science and art/media test beds Figure 1: Iterative development process Thus the inputs to the overall development process and in particular the requirements capture process include not only information about the requirements and constraints of the stakeholders at the application domain partners (Tate and B.USOC), but also the current state-of-the-art in the research fields (digital preservation and related areas), as well as the research ideas of the PERICLES partners. While of course the outputs of the project will be grounded in the needs of stakeholders, it may be the case that not all of the application domain partners requirements are relevant from the point of view of the research aims that are the drivers of the project, and will be weeded out as far as implementation is concerned. This results in a chicken-and-egg situation, which must be overcome if requirements capture is to progress. On the one hand, the technology partners must understand the needs of the stakeholders represented by the application domain partners; on the other hand, as the application domain PERICLES Consortium Page 9 of 32

11 partners are not necessarily knowledgeable about how to translate their digital preservation needs into technological requirements, their relevant requirements cannot be captured without supplying a degree of scope that is provided by the research context and ideas, and a knowledge of the available technology. Asking stakeholders about their requirements without providing such scope or context is likely to result in very generic requirements or ones that are only slightly relevant to the overall project objectives. We address this chicken-and-egg situation by following shorter cycles of iteration also within the requirements capture process, starting with a rapid case study for each of the two application domains addressed by the project, and using this as a starting point for iterative engagement between application domain partners and technology partners, during which we may carry out additional prototyping and evaluation. Through these iterations, stakeholders will be made aware of the potential of the technologies available both in terms of existing research and that planned by the project partners and at the same time stakeholders needs will be more precisely identified and mapped to the project s research themes. While the project s scientific approach and overall research ideas are clear to the partners, the concrete scope of the project has not yet been fully defined. The overall result of the requirements gathering exercise will be to provide this scope, in terms of the specific functionality that will be provided by the prototypes and how the stakeholders will experience them, as well as the components (software modules, tools, models) that will be produced to support this functionality. 2.2 Standards The overall approach to requirements capture followed in PERICLES is grounded in accepted international standards, in particular: ISO/IEC 12207:2008 (Systems and software engineering Software life cycle processes); ISO (Human-centred design processes for interactive systems) [an update of the earlier standard ISO 13407]. ISO/IEC 12207:2008 provides a standard for describing the processes involved in developing and maintaining software, throughout the software lifecycle. Because, of the generality of the situations it aims to cover, it was developed to be modular and flexible so that it can be adapted to the needs of projects that adopt it. Note that, while PERICLES is not developing a system per se, these principles still hold, although we replace user by the more generic term stakeholder. The motivation for introducing this additional standard is to emphasise PERICLES focus on iterative development and stakeholder-centricity. For the purposes of the current document, the key process in the standard is Section Stakeholder Requirements Definition Process, which aims to identify the requirements of a system so that it can provide the services needed by identified stakeholders in a defined environment. The standard identifies a number of tasks within this process, which are listed in Section 6 of this document, together with a mapping that indicates how they relate to the components of the specific methodology described in Section 4. In addition to this generic lifecycle process standard, we also incorporate ISO , which describes best practice for carrying out human-centred design for interactive computer-based systems, again in terms of the whole system lifecycle. In particular, it describes a number of key principles for human-centred design: Design is based on an explicit understanding of users, tasks and environments. Users are involved throughout the development lifecycle. PERICLES Consortium Page 10 of 32

12 Design is driven and refined by user-centric evaluation. Design processes proceed iteratively. Design addresses the whole user experience. Involvement of multidisciplinary skills and perspectives in the design team. In addition to these general standards, the following more specific documents will guide requirements capture in the space science case (no corresponding documents have been identified for the art/media case): which describes a proposed set of guidelines for the preservation of earth observation data issued by the LTDP (Long Term Data Preservation) Working Group at the European Space agency. which describes the set of data and associated information that needs to be preserved from the various phases of an Earth Observation mission. PERICLES Consortium Page 11 of 32

13 3 Outputs and Outcomes 3.1 Introduction The requirements gathering process will result in a number of concrete outputs, as well as less tangible outcomes. In this section, we describe these outputs and outcomes, and provide a crossreference to the specific activities or methods through which the output is produced, as described in Section 4.2. Note that some of these outputs are quite generic and standard components of a requirements analysis exercise for example Stakeholder Analysis, Scenarios others are more specific to the context of the project. 3.2 Outputs Rapid case study documentation (see Section 4.2.1). Agreed terminology (see Section 4.2.2). Stakeholder analysis (see Section 4.2.3). Set of user scenarios (see Section 4.2.4). List of requirements with priorities (see Sections and 4.2.6). Mock-up descriptions (see Section 4.2.7). Data inventory, including list of data and metadata types, data and metadata samples and their explanations, description of data lifecycles, description of relevant data policies (if any) and domain ontologies (see Section 4.2.8). Cross-domain differences and commonalities report (see Section ). Community of practice reports (see Section ). Workshop reports (see Section 4.3.1). Interview reports and analyses (see Section 4.3.2). Questionnaire analyses (see Section 4.3.4). PERICLES Consortium Page 12 of 32

14 4 Methodology 4.1 Introduction In this section we describe the approach to be taken to produce the outputs described in Section 3, in terms of the specific activities and methods that may be undertaken. As described in Section 2.1, the requirements gathering methodology is iterative, and the same type of activity may be performed several times, in successive iterations, in order to refine or otherwise modify the outputs. Nevertheless, there are certain dependencies between them, within iterations; for example, it is not possible to develop scenarios with stakeholders until one has done at least an initial stakeholder analysis. Figure 2 illustrates the overall requirements capture process, showing how the methods described below are combined to deliver the final set of requirements and other outputs. Stakeholder engagement Specification Technical research Rapid study Stakeholder input (workshops, interviews, questionnaires) Requirements from CoP Agreed terminology Stakeholder analysis Scenario development Identification and management of requirements Research vision and state of the art studies Data inventory Domain models Scoping of case studies / Identification of crossdomain similarities Constraints Evaluation Mockup-development Requirements Figure 2: Scenario-based requirements specification PERICLES Consortium Page 13 of 32

15 4.2 Requirements Gathering Methods Rapid case study The Rapid Case Studies are broad descriptions of the two application domains, carried out at the start of the requirements gathering process. The aim of this stage is to overcome the chicken and egg situation described in Section 2.1 and thus to bootstrap requirements gathering and the project as a whole, by providing a starting point for iterative engagement between application domain partners and technology partners. These documents are incomplete descriptions, but they include sufficient detail to allow the technology partners to develop some understanding of the application domains and the needs of the stakeholders, and to start thinking about how their research ideas can support these needs through concrete outputs. The rapid case study must include: An overall description of the application domain, to provide technology partners with context and a broad (but not necessarily deep) understanding of that domain. Descriptions of example data, to provide technology partners with some understanding of its characteristics and relationships with other data. Descriptions of existing metadata, in the broad sense of any other data or documentation that can be used to better understand the data. This documentation may originate from different phases of the data s lifecycle, or different phases activities or projects that involve the data. For example, it may relate to data generation or subsequent data reuse. High-level descriptions of processes related to the data. Again, these may originate from different phases of the data s lifecycle, or different phases activities or projects that involve the data. Initial stakeholder analysis, identifying the most obvious stakeholder groups and describing their interest in broad terms. Initial requirements of identified stakeholder groups. Key issues that need to be addressed, from the point of view of stakeholders. These issues should have some relevance to the research aims of the project Development of agreed terminology The project consortium includes application domain partners, ICT experts, and digital preservation experts. The application domain partners are experts in their respective domains, although the space science partners have limited knowledge of the digital archive or digital preservation worlds. On the other hand, many partners are new to the application domains, and some of the ICT partners have little knowledge of digital preservation. A major issue is to bridge these gaps, and to address the differences in language and culture between these communities, which may otherwise form a significant barrier to development and take-up of research outputs. Indeed, even within a domain a term may have multiple uses which need to be identified explicitly. In particular, all partners need to have a shared understanding of digital preservation issues if they are to communicate effectively about project objectives, user requirements and proposed solutions. This shared understanding will be manifest as an agreed terminology or glossary. To achieve this goal, project partners will develop collaboratively and iteratively a terminology document that will explain the various terms used, whether from digital preservation or other fields, and in particular will define how they will be used in the context of the PERICLES project and in the PERICLES Consortium Page 14 of 32

16 documents that it produces. The terminology document will be produced largely during the initial phase of the project, but it is likely that it will continue to be updated through the project. Each entry may include the following information: the term; relationships to other terms (including synonyms); definition; explanatory comments; external references. The document will contain guidelines for inserting new terms, and these guidelines will be communicated to the partners. The working version of the terminology document is held on the internal project wiki at A partial snapshot of the document will be appended to deliverables, as appropriate Stakeholder analysis Broadly considered, a stakeholder is any person (or group of people) who may either have impact upon a project or be impacted by it. For the purposes of PERICLES requirements gathering, a stakeholder is considered to be anyone with an interest (actual or potential) in the data or metadata involved in the application domains addressed, an interest that may be direct (e.g. people that produce or use the data) or indirect (e.g. staff responsible for data management infrastructure). For example, in the space domain, while future scientists may be interested in the data itself, future engineers may be interested in the documentation about the data, which can help them to design experimental devices better. In this project the application domain partners, Tate and B.USOC, represent a range of relevant stakeholders. An initial list of stakeholders will be identified in the rapid case studies; in subsequent iterations this list will be extended to include additional identified stakeholders, as well as enhanced to produce a full stakeholder analysis, assigning priorities and identifying the most important stakeholders. Identification and analysis of stakeholders is key to identifying success and quality criteria for the project, as requirements are always relative to some stakeholder(s). For a full stakeholder analysis, we will aim to identify the following information: The category of the stakeholder, relative to some taxonomy. The degree and nature of the stakeholder s interest in the project Their degree of influence on the project or within their organisation The impact the project has on them The methods by which we will communicate with them, or gather requirements from them (the Stakeholder Engagement Plan). Contact details of representative stakeholders (in each application domain, stakeholders will fall into groups, and engagement will be with one or more representatives of those groups). We will also identify key stakeholders among these, i.e. those that have a significant influence upon or importance within their organisation, in relation to the objectives of the project Scenario development A scenario is a free-text narrative of a sequence of events involving one or more actors or personas (i.e. stakeholders acting as representatives of particular roles), especially one that describes interactions between personas and an actual or proposed computer-based system. Scenarios can be described at varying levels of detail, ranging from a short summary paragraph to a detailed description, and can cover quite different timeframes, from a single user interaction with a system to a long-term preservation scenario. The interactions described in a scenario generally have a functional goal, and rather than attempting to capture a large class of interactions in abstract form (as in e.g. UML-based use cases) they provide concrete stories that serve as exemplars of a larger class of interactions. PERICLES Consortium Page 15 of 32

17 Scenarios are a well understood and effective vehicle for communicating information, fostering collaboration, and supporting discussion, among stakeholders in an ICT project. They can be used throughout a project, for various purposes, and at different levels of detail; however, they are particularly useful as a means of starting user engagement at a very early stage, and coming to a shared understanding of user requirements by providing a tangible object that can be exhibited and discussed. Subsequently, scenarios can be used for presenting the ideas of the research partners, and proposed design solutions, to stakeholders. In PERICLES, scenarios will be used to describe the potential contexts of use for software produced by the project, addressing both current and desired practice that is, they will describe what is done now, in some work, research or other context, and what stakeholders would like to be able to do given the appropriate systems; these two categories are sometimes termed as is and to be scenarios. Initially, short scenarios, about a paragraph in length, will be gathered, derived from the information in the rapid case study documents, and in particular addressing any key issues highlighted therein. These scenarios will focus on normal operations, but they will also be used to explore critical cases, limitations, and pressure points. In subsequent iterations the scenario set will be developed in the following ways: Some scenarios will be weeded out, either because they are not of high priority for stakeholders, or because addressing them during the project is viewed as impracticable or unrealistic, or because they do not raise issues of significance or novelty for the research partners. Selected scenarios will be fleshed out with more detail, partly provided by stakeholders but also including ideas and design solutions from the research partners. Scenarios will also be subject to validation, with subsequent modification. This validation takes two forms: stakeholders provide feedback on the validity of the context of use described by the scenario; on the other hand, research partners must confirm that the scenarios are valid from a technical point of view are these scenarios that can be supported by the proposed developments? This two-way process both improves the research partners understanding of the stakeholders needs, and highlights the technical potential of the research aspects. Further scenarios may be added; these may be entirely new ones resulting from newly raised issues, or a single high-level scenario may be split into a number of detailed ones, for example to address significantly different situations, or critical/problem cases. PERICLES Consortium Page 16 of 32

18 Stakeholder validation Scenarios Technical validation Refinement and gap analysis Detailed scenarios Figure 3: Scenario development process Ultimately, this process will result in a set of scenarios that have been agreed by all parties, and contain sufficient detail to serve as the basis for evaluation. Note however that these will still be snapshots, subject to change during the project, either to reflect an improved understanding of stakeholders and their environment, or in response to new research ideas that were not apparent at the start of the project. Moreover, the scenarios developed may include some that are regarded as ideal, and may not be achievable within the timeframe of the project. A detailed scenario may include answers to the following questions: Who are the actors (stakeholders with an active involvement in the scenario) and what are their roles? What tasks are they undertaking, and what are their goals in undertaking them? What triggers the performance of a task? What are the inputs and outputs (results) of performing a task? What tools or other resources are used? For further details of scenario-based approaches to requirements gathering, see (Carroll, 2000) or (Alexander, 2004) Identification and management of requirements The core part of the requirements gathering process will naturally be the identification of individual requirements. Many requirements will be identified during the process of compiling the outputs from the methods described above, especially scenario development. The scenarios in particular will form a basis that enables us to scope the areas in which additional information needs to be collected, and to categorise the requirements that are identified. Further methods such as interviews, workshops, or questionnaires may then be used to develop a systematic set of requirements. The specific methods in any particular case will be determined by the PERICLES Consortium Page 17 of 32

19 situation and the nature of the stakeholders. Each requirement will be classified according to an appropriate typology that will in part grow out of the scenarios. At the very least, the requirements collected will include functional and non-functional requirements. Functional requirements describe or refer directly to the functionality of proposed software. Non-functional requirements are requirements that do not describe the functionality of software, but relate to other characteristics of software and the way it can be used, which are of concern to stakeholders. Examples of areas that may give rise to non-functional requirements include: performance, usability, cost, trust, privacy, reliability, software quality, security. It should be borne in mind that PERICLES is not producing a system, but rather a set of models and components, together with two prototypes, and that this may affect how such requirements are interpreted. For example, the facility with which a component can be integrated into existing workflows may be more important for usability than user interface issues that relate specifically to the prototypes. Also, some characteristics that would be of crucial importance for a system may be considered out of scope for PERICLES, if they concern issues that are unrelated to the research objectives (e.g. security, cost). PERICLES may give rise to a number of performance requirements, relating to (e.g.) data size (in terms of overall size or size of individual objects), processing throughput, etc. Trust, in the sense of ISO 16363:2012 (Space data and information transfer systems Audit and certification of trustworthy digital repositories), is also likely to be a source on non-functional requirements. However an individual requirement is identified, it should be traceable. Requirements traceability involves documenting the provenance of a requirement so that it is possible to determine its origin; this information will be recorded and linked to the requirement. The concept of requirement traceability can be extended to tracing the relationships between a requirement and all artefacts associated with it, for example a software module that was developed to support a specific piece of functionality, or a test case. As PERICLES is primarily a research project, however, the relationships may be looser than for a system development project Prioritisation of requirements Each requirement should be prioritised into High, Medium or Low, where Low still indicates a requirement that is of some importance requirements that are of no importance will be omitted. Standard approaches to requirement prioritisation typically reflect the users point of view, together with consideration of the cost of implementation (see for example (Karlsson & Ryan, 1997)). Given the nature of PERICLES, a broader range of criteria will be taken into account for prioritisation: Value to stakeholders (users). Relevance to research objectives or interests of partners. Business value to partners. Technical feasibility and cost of implementation. Synergies between art/media and science use cases. Requirements from the two application domains should be prioritised independently, as there may be significant differences (see Section ) Mock-up development Context scenarios, as described in Section 4.2.4, are an effective way of communicating the functionality of a computer-based system to certain stakeholder groups. They can illustrate a system s potential benefits with respect to stakeholders goals and the tasks that they undertake to achieve them (see (Dzida 1999)), as well as, in broad terms, a user s interaction with a system. PERICLES Consortium Page 18 of 32

20 However, they do not describe the details of user interaction; for scenarios where the detailed user interface is judged to be important, mock-ups (i.e. lightweight non-functional prototypes) will be used to communicate this interface to users, to acquire feedback about design ideas, and to refine the requirements, as well as facilitating experimentation. Note that mock-ups should focus on content and functionality, not on details of graphic design. This activity will be carried out in tasks T2.2.1 and T Data inventory As the aims of PERICLES concern digital preservation and curation, the data held by the two application domain partners lies at the core of requirements gathering. A key activity will be the creation of a detailed, structured inventory of this data (including existing metadata), at least that which falls within the remit of the project. This activity is broken down as follows: Identifying the data Organising the data Description of data lifecycles Explanation of selected data examples Identification of data curation policies Although these sub-activities are listed separately, they will be carried out in parallel, as well as in parallel with other activities, such as scenario development. Note that this work does not conflict with the principles of scenario-based design that we are following; as each stage in the lifecycle of a digital object involves some form of interaction with an actor, it could be defined in terms of a number of scenarios. However, given the centrality of data to the project, it is clearer and more practical to provide descriptions with data at the focus. Note also that data-centric activities will also take place iteratively; it is to be expected that some information about the data and data lifecycles will be included as soon as the rapid case studies. It is further expected that the data inventory will develop in a manner analogous to the set of scenarios: some (groups of) digital objects will be fleshed out and described with more detail; other will be weeded out from the set to be addressed by the project, and their descriptions will remain at a more rudimentary level IDENTIFYING THE DATA This initial stage will identify, classify describe and locate the relevant data and existing metadata from the two application domains, as well any identifiable contextual information that can help in understanding the data. Contextual information includes such material as documentation, workflows, policies, and so forth. Initially, this will be a broad-brush activity, to map out the landscape; subsequent iterations will describe selected data objects or groups of data objects in more detail. Moreover, the level of granularity at which the data is to be identified and described will vary; for example, in the case of software-based art there will be a small number of artworks with quite different characteristics, and the descriptions are likely to relate to individual objects; in the case of the space science data, data objects are created according to more standardised procedures, and descriptions will relate to categories of object with similar characteristics (although specific instances will ultimately be identified for use by the project). This will be carried out by the application domain partners Tate and B.USOC in collaboration with some of the research partners, and will form part of tasks T2.2.2 and T PERICLES Consortium Page 19 of 32

21 ORGANISING THE DATA The previous stage identifies and describes the various data objects however, these objects do not exist in isolation, and a key part of the data inventory will be to organise the objects in a way that reflects not only the classification of the data (what sort of thing it is) but also the relationships and dependencies between them, whether explicit or implicit. As one of the outputs of WP3 will be a model for representing such relationships and dependencies formally, it is expected that this activity will continue once the results of WP3 become available. However, work on organising the data at an informal or semi-formal level will start as part of the data inventory activity. This work will be carried out under tasks T2.2.3 and T EXPLAINED DATA SAMPLES To help the technology partners to understand the data and metadata better, selected examples will be explained and annotated in detail. Examples will be selected according to the following criteria: they are representative of categories of data that will be addressed by the project, they provide particular insights from an application domain point of view, or they present particular conceptual or technological challenges. This will be carried out by the application domain partners Tate and B.USOC in collaboration with some of the technology partners, and will form part of tasks T2.2.2 and T DATA LIFECYCLES Once key data objects or categories of data object have been identified, we will describe their lifecycles. The data lifecycle represents the different phases of activity that impact upon the data; understanding these lifecycles is important if stakeholders are to manage, understand and reuse the data effectively. Note that, for our purposes we do not consider the data lifecycle to start only with the creation of the data; it may also cover events and activities that take place in a project before the data is created, and which generate information that can be used later to understand the data better. For example, in a space science project, the process of capturing requirements for an experimental device can be useful years later for understanding the actual data that the experiment generated. In terms of the DCC model, this can be regarded as part of the Conceptualise activity. A typical data lifecycle will document the following: The nature of the different lifecycle phases. The relationships and dependencies between phases. The rapidity of the lifecycle and its phases. The actors or other stakeholders involved in each phase, and the nature of their involvement. Any information required or used at each phase. Any transformations applied to data objects at each phase. Any additional information generated at each phase. Any domain-specific drivers of the lifecycle. Describing data lifecycles will (as usual) be an iterative process, and will result in both high-level and detailed descriptions; depending on circumstances, a lifecycle may describe either a specific set of data objects (e.g. relating to a specific digital artwork) or broad categories of objects, as appropriate. At a later stage, data lifecycles will be incorporated into the formal organisation of the data in accordance with the model to be developed by WP3, e.g. by documenting the relationships between PERICLES Consortium Page 20 of 32

22 the different phases of the lifecycle, and the data and metadata, in terms of the model and ontologies developed. Note that, in the first instance we will be describing the actual lifecycles of data in the two application domains. At a later stage these data lifecycles will be related to idealised curation lifecycles, such as the DCC Curation Lifecycle Model 1, which provides a high-level overview of the stages required for data curation and preservation from initial conceptualisation through the iterative curation cycle, as well as the models to be developed by WP DATA POLICIES As well as describing the data and its lifecycles, it is important to identify any policies that impact on the data or on activities around the data, and how these policies are followed or implemented in practice. The term policy is used in several senses in the digital preservation community, and is also understood differently in the application domains. Here we understand a policy to be a general directive that provides an aim, a principle, or a general direction, to the actions of an organisation (or part thereof). A policy thus describes what needs to be done (in terms of guidelines, or end result), but not in general how it is done (the implementation of the policy). Policies can be described in varying degrees of formal or informal language. That said, there may also be policies that are implicit in the way things are done, even if they are not explicitly stated or documented. Typically such policies may be abstracted by working backwards from actual workflows followed by stakeholders within the organisation. Both types of policy should be identified. As well as identifying the policies, the impact of the policies on the data lifecycles should be determined IDENTIFYING DOMAIN ONTOLOGIES Ontology development will form part of the research undertaken in WPs 3, 4 and 5, and this work will take into account relevant pre-existing ontologies. As part of the data inventory activity we will identify any ontologies (in the broad sense that includes any form of formal vocabulary) that are in use at the application domain partners to describe their data. We will also identify broader sets of domain ontologies relevant to the two project application domains, if available. While this does not strictly speaking form part of requirements gathering, as they relate to the application domains rather than the project s research areas, this is a more appropriate place to carry out this work. Relevant ontologies will be identified through (i) information obtained from stakeholders at the application domain partners, and (ii) desk research, i.e. manual browsing of the Web or documentation Scoping the evaluation(s) As part of evaluation, project outputs will be investigated and evaluated in relation to concrete examples of scenarios and requirements from the two application domains, which are likely to form only a subset of those identified and described. These examples should be relevant to the needs of the stakeholders, but as this is a research project at the same time they need to be challenging enough to contribute to the research goals of the project. In particular, the data used should be 1 PERICLES Consortium Page 21 of 32

23 representative of the complexity of the data and metadata available, and should involve the typical data lifecycles and policies operative in the application domains. While strictly speaking this selection activity forms part of the preparation of the evaluation phases, which are covered in deliverables D2.3.3-D2.3.5, it will be started already during the early stages of the project Identifying cross-domain differences and commonalities The two domains addressed by PERICLES are very different from each other. However, as the project aims to produce components that are broadly applicable, at least with some adaptation, it is important to identify common features and characteristics across the application domains addressed by the project, for example in terms of scenarios, data, lifecycles, or policies. While the similarities across the domains are well understood, the differences are less likely to be carefully mapped. Nevertheless, it is also possible that differences across the domains may illuminate issues related to the project; for example, by allowing us to define the criteria for following certain preservation approaches or using certain solutions when preserving data in particular contexts. This will be carried out by undertaking a careful examination and comparison of the (independently prioritised) sets of requirements coming out of the two application domains, and looking for matches and divergences. This can also be done for other outputs, such as the scenarios and data inventories/lifecycles, although direct comparison will be more difficult Broader requirements (communities of practice) We will be validating the requirements obtained through the two application domain partners (Tate and B.USOC) by engagement with a range of relevant communities of practice. The principle behind these communities of practice is that they function as networks for coordination of input from a broader group of stakeholders, as well as for dissemination. The following communities of practice will be set up: Archives and Memory Institutions Media Production Digital Art Facilities and Operations Centres (such as data or computing centres) Space Science Science and Engineering 2 This activity forms part of WP 9 (Dissemination) rather than WP 2, and is described in more detail in Deliverables D9.2.* (Dissemination Plan). In particular, D9.2 describes the ways in which the project will engage with these communities. Note that this list of communities differs from that provided in the DoW. However, the same groups of stakeholders are covered; we have simply revised the way in which they are divided into communities of practice for practical reasons. Although the Communities of Practice are not being consulted in detail in the specification of the PERICLES prototypes, they can provide a useful resource in the validation of the requirements and results. Specifically we aim to gain a better understanding of those requirements and functionalities that are of value and interest to a wider audience outside the specific use cases that are implemented in the project. This may for example provide an additional factor in the prioritisation of 2 Not including space science, which will have its own community of practice. PERICLES Consortium Page 22 of 32

24 the requirements. Where there is overlap across domains, they will also provide a resource for benchmarking the quality of the requirements gathered as discussed in Section Evaluating requirements (quality assurance) All outputs of the requirements gathering activities will be subject to evaluation for quality. There will not be a specific quality assurance activity or phase; rather, in the iterative process followed by the project, evaluation of outputs will take place on a continual basis. The following quality criteria will be used: Correctness: Do the requirements accurately represent the needs of the stakeholders? Do the scenarios accurately describe the actual or desired interactions of stakeholders with digital data or systems? Do the data descriptions accurately describe the data and its lifecycles? Etc. Adequate: Do the identified requirements (or scenarios, data lifecycles etc.) adequately represent the actual or desired situations? Is there something important missing? Relevance: Are the identified requirements etc. relevant to the research aims of the project? Feasibility: Is it feasible that the identified requirements etc. will result in research outputs, whether these are actual software components performing preservation-related functionality, or a valuable research report or publication? The first two of these criteria correspond to an application domain-centric viewpoint; requirements and other outputs will be communicated to relevant stakeholders for feedback, and will be updated accordingly to resolve any issues. The latter two represent a preservation/ict research-centric viewpoint; requirements etc. that are judged to be irrelevant or infeasible will be filtered out as far as the rest of the project is concerned, although they may still be included in the requirements documentation. 4.3 Methods for obtaining information Whereas Section 4.2 describes the activities that will be undertaken specifically for requirements capture, this section covers general methods of obtaining information from stakeholders that could form part of these activities. The precise methods that will be used for gathering the requirements from stakeholders will be selected and tailored to suit each stakeholder group and the types of requirements to be gathered; not all of these methods may be used for both application domains. Note that there will be a difference in approach between the two application domains. Within PERICLES, the Tate research teams represent directly the relevant stakeholders associated with the art/media domain; for this reason methods for consulting formally with external stakeholders will not be necessary in many cases Workshops Workshops with the stakeholders will be organized. The format will vary depending on the specific purpose of the workshop, and the stage of the project; however, they will include activities such as: Presentation of information about data, activities, requirements, issues etc. by stakeholders to project staff. Presentation of outputs by project staff to stakeholders. These may be outputs from the requirements gathering exercise, or later outputs such as initial versions of prototypes. Capture of feedback from stakeholders. Open discussion about the digital preservation needs of the stakeholders. PERICLES Consortium Page 23 of 32

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning Briefing paper: Value of software agents in digital preservation Ver 1.0 Dissemination Level: Public Lead Editor: NAE 2010-08-10 Status: Draft SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

The overall aim for this project is To improve the way that the University currently manages its research publications data

The overall aim for this project is To improve the way that the University currently manages its research publications data Project Plan Overview of Project 1. Background The I-WIRE project will develop a workflow and toolset, integrated into a portal environment, for the submission, indexing, and re-purposing of research outputs

More information

IPL Service Definition - Master Data Management Service

IPL Service Definition - Master Data Management Service IPL Proposal IPL Service Definition - Master Data Management Service Project: Date: 16th Dec 2014 Issue Number: Issue 1 Customer: Crown Commercial Service Page 1 of 7 IPL Information Processing Limited

More information

Progress Report Template -

Progress Report Template - Progress Report Template - Project Name Project Website Report compiled by Kultur, University of Southampton (lead institution) http://kultur.eprints.org Victoria Sheppard Reporting period Oct 07 Apr 08

More information

Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS

Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS Date: 2010-01-28 Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS Overview of Project 1. Background Research data is essential for good quality research, especially when data

More information

The challenges of becoming a Trusted Digital Repository

The challenges of becoming a Trusted Digital Repository The challenges of becoming a Trusted Digital Repository Annemieke de Jong is Preservation Officer at the Netherlands Institute for Sound and Vision (NISV) in Hilversum. She is responsible for setting out

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

1 About This Proposal

1 About This Proposal 1 About This Proposal 1. This proposal describes a six-month pilot data-management project, entitled Sustainable Management of Digital Music Research Data, to run at the Centre for Digital Music (C4DM)

More information

Managing Business Records and Archives at the Getty Center

Managing Business Records and Archives at the Getty Center Managing Business Records and Archives at the Getty Center How four separate program areas worked together to develop an integrated records management and archives program David Farneth, CRM, and Barbara

More information

Enterprise Architecture Assessment Guide

Enterprise Architecture Assessment Guide Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s

More information

NSW Government Open Data Policy. September 2013 V1.0. Contact

NSW Government Open Data Policy. September 2013 V1.0. Contact NSW Government Open Data Policy September 2013 V1.0 Contact datansw@finance.nsw.gov.au Department of Finance & Services Level 15, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 DOCUMENT CONTROL Document

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

MANAGING DIGITAL CONTINUITY

MANAGING DIGITAL CONTINUITY MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance

More information

Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville

Software Engineering. Software Processes. Based on Software Engineering, 7 th Edition by Ian Sommerville Software Engineering Software Processes Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To introduce software process models To describe three generic process models and when

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Document Purpose The purpose of this document is to provide guidance on the practice of Requirements Management and to describe the practice overview, requirements, best practices, activities, and key

More information

Information Management Advice 39 Developing an Information Asset Register

Information Management Advice 39 Developing an Information Asset Register Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if

More information

DFS C2013-6 Open Data Policy

DFS C2013-6 Open Data Policy DFS C2013-6 Open Data Policy Status Current KEY POINTS The NSW Government Open Data Policy establishes a set of principles to simplify and facilitate the release of appropriate data by NSW Government agencies.

More information

11 Tips to make the requirements definition process more effective and results more usable

11 Tips to make the requirements definition process more effective and results more usable 1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to

More information

IEEE SESC Architecture Planning Group: Action Plan

IEEE SESC Architecture Planning Group: Action Plan IEEE SESC Architecture Planning Group: Action Plan Foreward The definition and application of architectural concepts is an important part of the development of software systems engineering products. The

More information

D6.3 Knowledge Model: Project Knowledge Management

D6.3 Knowledge Model: Project Knowledge Management D6.3 Knowledge Model: Project Knowledge Management Project title: Project acronym: Project number: Project instrument: Knowledge in a Wiki KIWI ICT-2007.4.2-211932 EU FP7 Small and Medium-Scale Focused

More information

3SL. Requirements Definition and Management Using Cradle

3SL. Requirements Definition and Management Using Cradle 3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification

More information

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010 Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0

More information

Business Process Models as Design Artefacts in ERP Development

Business Process Models as Design Artefacts in ERP Development Business Process Models as Design Artefacts in ERP Development Signe Ellegaard Borch IT University of Copenhagen, Rued Langgaards Vej 7, 2300 København S, Denmark elleborch@itu.dk Abstract. Adequate design

More information

CROATIAN BUREAU OF STATISTICS REPUBLIC OF CROATIA MAIN (STATISTICAL) BUSINESS PROCESSES INSTRUCTIONS FOR FILLING OUT THE TEMPLATE

CROATIAN BUREAU OF STATISTICS REPUBLIC OF CROATIA MAIN (STATISTICAL) BUSINESS PROCESSES INSTRUCTIONS FOR FILLING OUT THE TEMPLATE CROATIAN BUREAU OF STATISTICS REPUBLIC OF CROATIA MAIN (STATISTICAL) BUSINESS PROCESSES INSTRUCTIONS FOR FILLING OUT THE TEMPLATE CONTENTS INTRODUCTION... 3 1. SPECIFY NEEDS... 4 1.1 Determine needs for

More information

To introduce software process models To describe three generic process models and when they may be used

To introduce software process models To describe three generic process models and when they may be used Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

Generic Statistical Business Process Model

Generic Statistical Business Process Model Joint UNECE/Eurostat/OECD Work Session on Statistical Metadata (METIS) Generic Statistical Business Process Model Version 4.0 April 2009 Prepared by the UNECE Secretariat 1 I. Background 1. The Joint UNECE

More information

Requirements Engineering Process

Requirements Engineering Process Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their

More information

Meta-Model specification V2 D602.012

Meta-Model specification V2 D602.012 PROPRIETARY RIGHTS STATEMENT THIS DOCUMENT CONTAINS INFORMATION, WHICH IS PROPRIETARY TO THE CRYSTAL CONSORTIUM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN SHALL BE USED, DUPLICATED OR

More information

Enterprise Content Management (ECM)

Enterprise Content Management (ECM) Business Assessment: A Quick-Reference Summary Intro to MIKE2 methodology and phase 1 The methodology that will be used throughout the specialist track is based on the MIKE2 methodology. MIKE stands for

More information

GSBPM. Generic Statistical Business Process Model. (Version 5.0, December 2013)

GSBPM. Generic Statistical Business Process Model. (Version 5.0, December 2013) Generic Statistical Business Process Model GSBPM (Version 5.0, December 2013) About this document This document provides a description of the GSBPM and how it relates to other key standards for statistical

More information

COLUMN. What is information architecture? Intuitive navigation doesn t happen by chance MAY 2005. The cost of failure

COLUMN. What is information architecture? Intuitive navigation doesn t happen by chance MAY 2005. The cost of failure KM COLUMN MAY 2005 What is information architecture? Organising functionality and content into a structure that people are able to navigate intuitively doesn t happen by chance. Organisations must recognise

More information

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.

More information

Requirements Engineering: A Roadmap

Requirements Engineering: A Roadmap Requirements Engineering: A Roadmap Bashar Nuseibeh & Steve Easterbrook Department of Computing Imperial College of Science, Technology & Medicine London SW7 2BZ, UK Email: ban@doc.ic.ac.uk http://www-dse.doc.ic.ac.uk/~ban/

More information

Identifying Information Assets and Business Requirements

Identifying Information Assets and Business Requirements Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance

Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment

More information

Overview. Software engineering and the design process for interactive systems. Standards and guidelines as design rules

Overview. Software engineering and the design process for interactive systems. Standards and guidelines as design rules Overview Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering Iterative design and prototyping Design rationale A. Dix, J.

More information

Long Term Preservation of Earth Observation Space Data. Preservation Workflow

Long Term Preservation of Earth Observation Space Data. Preservation Workflow Long Term Preservation of Earth Observation Space Data Preservation Workflow CEOS-WGISS Doc. Ref.: CEOS/WGISS/DSIG/PW Data Stewardship Interest Group Date: March 2015 Issue: Version 1.0 Preservation Workflow

More information

Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy>

Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy> DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK PRACTIICES GUIIDE REQUIREMENTS DEFINITION Issue Date: Revision Date: Document

More information

Public Transportation - Accessibility for All

Public Transportation - Accessibility for All Deliverable 1.1 Project Management Plan & Schedule (incl. project management strategies, risk management plan, dissemination plan and a detailed project schedule) Grant agreement no.: 233701 Project acronym:

More information

Software Engineering. What is a system?

Software Engineering. What is a system? What is a system? Software Engineering Software Processes A purposeful collection of inter-related components working together to achieve some common objective. A system may include software, mechanical,

More information

Partnering for Project Success: Project Manager and Business Analyst Collaboration

Partnering for Project Success: Project Manager and Business Analyst Collaboration Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,

More information

INTEGRATING RECORDS MANAGEMENT

INTEGRATING RECORDS MANAGEMENT INTERNATIONAL RECORDS MANAGEMENT TRUST INTEGRATING RECORDS MANAGEMENT IN ICT SYSTEMS Good Practice Indicators CONTENTS Figure 1: Designing a Records Management Improvement Programme iv Figure 2: Integrating

More information

The Usability Engineering Repository (UsER)

The Usability Engineering Repository (UsER) The Usability Engineering Repository (UsER) Marc Paul, Amelie Roenspieß, Tilo Mentler, Michael Herczeg Institut für Multimediale und Interaktive Systeme (IMIS) Universität zu Lübeck Ratzeburger Allee 160

More information

Programmes and Effects of the CESSDA Trust Project

Programmes and Effects of the CESSDA Trust Project WP3 - Strengthening and widening through planning and engagement Start month: 1 End month: 24 Objectives The overall objective of WP3 is to deliver a state of play evaluation of social science data archives

More information

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with

More information

Service Road Map for ANDS Core Infrastructure and Applications Programs

Service Road Map for ANDS Core Infrastructure and Applications Programs Service Road Map for ANDS Core and Applications Programs Version 1.0 public exposure draft 31-March 2010 Document Target Audience This is a high level reference guide designed to communicate to ANDS external

More information

Digital Continuity in ICT Services Procurement and Contract Management

Digital Continuity in ICT Services Procurement and Contract Management Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage

More information

White Paper. Business Analysis meets Business Information Management

White Paper. Business Analysis meets Business Information Management White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute

More information

OpenAIRE Research Data Management Briefing paper

OpenAIRE Research Data Management Briefing paper OpenAIRE Research Data Management Briefing paper Understanding Research Data Management February 2016 H2020-EINFRA-2014-1 Topic: e-infrastructure for Open Access Research & Innovation action Grant Agreement

More information

Technology management in warship acquisition

Technology management in warship acquisition management in warship acquisition A J Shanks B.Eng(Hons) MIET BMT Defence Services Limited SYNOPSIS Today s warship designers and engineers look to technology to provide warships and systems better, cheaper

More information

THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel

THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel INSPEL 34(2000)3/4, pp. 210-226 THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel Introduction Knowledge is universally

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

THE LE@RNING FEDERATION

THE LE@RNING FEDERATION THE LE@RNING FEDERATION Project Management Framework VERSION: 5.0 DATE: 26 JUNE 2007 Table of Contents 1 INTRODUCTION... 1 2 PRODUCTION PROCESS... 2 2.1 Operational support for the Project Management Framework...

More information

Requirements Engineering for Web Applications

Requirements Engineering for Web Applications Web Engineering Requirements Engineering for Web Applications Copyright 2013 Ioan Toma & Srdjan Komazec 1 What is the course structure? # Date Title 1 5 th March Web Engineering Introduction and Overview

More information

A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0

A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0 A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 2.0 www.theiiba.org International Institute of Business Analysis, Toronto, Ontario, Canada. 2005, 2006, 2008, 2009, International

More information

Executive summary. Today s researchers require skills beyond their core competencies

Executive summary. Today s researchers require skills beyond their core competencies EXECUTIVE SUMMARY 9 Executive summary Today s researchers require skills beyond their core competencies The formation and careers of researchers are important policy issues and training for transferable

More information

SPECIFICATION BY EXAMPLE. Gojko Adzic. How successful teams deliver the right software. MANNING Shelter Island

SPECIFICATION BY EXAMPLE. Gojko Adzic. How successful teams deliver the right software. MANNING Shelter Island SPECIFICATION BY EXAMPLE How successful teams deliver the right software Gojko Adzic MANNING Shelter Island Brief Contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Preface xiii Acknowledgments xxii

More information

PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT

PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT July 2014 Contents Page Introduction 3 What is continuous improvement? 4 Why do we

More information

ISO 18308 INTERNATIONAL STANDARD. Health informatics Requirements for an electronic health record architecture

ISO 18308 INTERNATIONAL STANDARD. Health informatics Requirements for an electronic health record architecture INTERNATIONAL STANDARD ISO 18308 First edition 2011-04-15 Health informatics Requirements for an electronic health record architecture Informatique de santé Exigences relatives à une architecture de l'enregistrement

More information

VAIL-Plant Asset Integrity Management System. Software Development Process

VAIL-Plant Asset Integrity Management System. Software Development Process VAIL-Plant Asset Integrity Management System Software Development Process Document Number: VAIL/SDP/2008/008 Engineering For a Safer World P u b l i c Approved by : Ijaz Ul Karim Rao Revision: 0 Page:2-of-15

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

Syllabus. REQB Certified Professional for Requirements Engineering. Foundation Level

Syllabus. REQB Certified Professional for Requirements Engineering. Foundation Level Syllabus REQB Certified Professional for Requirements Engineering Version 2.1 2014 The copyright to this edition of the syllabus in all languages is held by the Global Association for Software Quality,

More information

BUSINESS RULES AND GAP ANALYSIS

BUSINESS RULES AND GAP ANALYSIS Leading the Evolution WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Discovery and management of business rules avoids business disruptions WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Business Situation More

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Document Purpose The purpose of this document is to provide guidance on the practice of Requirements Definition and to describe the practice overview, requirements, best practices, activities, and key

More information

Managing Process Architecture and Requirements in a CMMI based SPI project 1

Managing Process Architecture and Requirements in a CMMI based SPI project 1 Managing Process Architecture and Requirements in a CMMI based SPI project 1 Author: Filippo Vitiello Abstract When developing or changing a process, and all its related assets, often the process engineers

More information

Certified Professional in Configuration Management Glossary of Terms

Certified Professional in Configuration Management Glossary of Terms Certified Professional in Configuration Management Glossary of terms used in Configuration Management Issue 2007.07 Association of the International Certified Configuration Manager e.v. Copyright 2007,

More information

Anatomy of an Enterprise Software Delivery Project

Anatomy of an Enterprise Software Delivery Project Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Alain Abran a,b, Kenza Meridji b, Javier Dolado a a Universidad del País Vasco/Euskal Herriko Unibertsitatea b Ecole de technologie

More information

Guide 4 Keeping records to meet corporate requirements

Guide 4 Keeping records to meet corporate requirements Guide 4 Keeping records to meet corporate requirements This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor

More information

Towards a research data management policy at Goldsmiths

Towards a research data management policy at Goldsmiths KAPTUR Case Study Towards a research data management policy at Goldsmiths Tahani Nadim, Jacqueline Cooke, Andrew Gray The Library Goldsmiths, University of London Photograph of studio space. Goldsmiths,

More information

An Integrated Quality Assurance Framework for Specifying Business Information Systems

An Integrated Quality Assurance Framework for Specifying Business Information Systems An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany

More information

D5.5 Initial EDSA Data Management Plan

D5.5 Initial EDSA Data Management Plan Project acronym: Project full : EDSA European Data Science Academy Grant agreement no: 643937 D5.5 Initial EDSA Data Management Plan Deliverable Editor: Other contributors: Mandy Costello (Open Data Institute)

More information

Monitoring and Reporting Drafting Team Monitoring Indicators Justification Document

Monitoring and Reporting Drafting Team Monitoring Indicators Justification Document INSPIRE Infrastructure for Spatial Information in Europe Monitoring and Reporting Drafting Team Monitoring Indicators Justification Document Title Creator Justification document Creation date 2008-12-15

More information

Knowledge Management. Better Practice Checklist. Practical guides for effective use of new technologies in Government 13 KNOWLEDGE MANAGEMENT

Knowledge Management. Better Practice Checklist. Practical guides for effective use of new technologies in Government 13 KNOWLEDGE MANAGEMENT 13 Knowledge Management 13 KNOWLEDGE MANAGEMENT Better Practice Checklist Practical guides for effective use of new technologies in Government www.agimo.gov.au/checklists version 1, 2004 Introduction Australian

More information

Architecting enterprise BPM systems for optimal agility

Architecting enterprise BPM systems for optimal agility Architecting enterprise BPM systems for optimal agility Dr Alexander Samarin www.samarin.biz About me An enterprise solutions architect From a programmer to a systems architect Experience in scientific,

More information

Statistical Data Quality in the UNECE

Statistical Data Quality in the UNECE Statistical Data Quality in the UNECE 2010 Version Steven Vale, Quality Manager, Statistical Division Contents: 1. The UNECE Data Quality Model page 2 2. Quality Framework page 3 3. Quality Improvement

More information

Data Audit Framework Methodology

Data Audit Framework Methodology Data Audit Framework Methodology Jones, Ross, Ruusalepp Release: Version 1.8 Date: 26 May 2009 Draft for discussion Email comments to info@data-audit.eu 1 Catalogue entry Title Creator Subject Description

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

Requirements engineering

Requirements engineering Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and

More information

State of California Department of Transportation. Transportation System Data Business Plan

State of California Department of Transportation. Transportation System Data Business Plan DRAFT Page i State of California Department of Transportation Transportation System Data Business Plan RFO# TSI DPA-0003 September 29, 2011 DRAFT Page ii Table of Contents Executive Summary... 4 Chapter

More information

THE UNIVERSITY OF LEEDS. Vice Chancellor s Executive Group Funding for Research Data Management: Interim

THE UNIVERSITY OF LEEDS. Vice Chancellor s Executive Group Funding for Research Data Management: Interim THE UNIVERSITY OF LEEDS VCEG/12/274 Vice Chancellor s Executive Group Funding for Research Data Management: Interim SOME CONTENT HAS BEEN REMOVED FROM THIS PAPER TO MAKE IT SUITABLE FOR PUBLIC DISSEMINATION

More information

D 8.2 Application Definition - Water Management

D 8.2 Application Definition - Water Management (FP7 609081) Date 31st July 2014 Version [1.0] Published by the Almanac Consortium Dissemination Level: Public Project co-funded by the European Commission within the 7 th Framework Programme Objective

More information

International Collaboration on Research Data Infrastructure

International Collaboration on Research Data Infrastructure Project Acronym Project Title icordi International Collaboration on Research Data Infrastructure Project Number 312424 Deliverable Title Quality plan and Risk register Deliverable No. D1.1 Delivery Date

More information

Revised October 2013

Revised October 2013 Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience

More information

Data Management Considerations for the Data Life Cycle

Data Management Considerations for the Data Life Cycle Data Management Considerations for the Data Life Cycle NRC STS Panel 2011 November 17, 2011, Washington DC Peter Fox (RPI) foxp@rpi.edu, pfox@cs.rpi.edu Tetherless World Constellation http://tw.rpi.edu

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Exploring the roles and responsibilities of data centres and institutions in curating research data a preliminary briefing.

Exploring the roles and responsibilities of data centres and institutions in curating research data a preliminary briefing. Exploring the roles and responsibilities of data centres and institutions in curating research data a preliminary briefing. Dr Liz Lyon, UKOLN, University of Bath Introduction and Objectives UKOLN is undertaking

More information

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8 THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,

More information

IPL Service Definition - Master Data Management for Cloud Related Services

IPL Service Definition - Master Data Management for Cloud Related Services IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information

More information

Archive I. Metadata. 26. May 2015

Archive I. Metadata. 26. May 2015 Archive I Metadata 26. May 2015 2 Norstore Data Management Plan To successfully execute your research project you want to ensure the following three criteria are met over its entire lifecycle: You are

More information

MAKING YOUR ORGANISATION S INFORMATION ACCESSIBLE FOR ALL IMPLEMENTING THE GUIDELINES FOR ACCESSIBLE INFORMATION

MAKING YOUR ORGANISATION S INFORMATION ACCESSIBLE FOR ALL IMPLEMENTING THE GUIDELINES FOR ACCESSIBLE INFORMATION MAKING YOUR ORGANISATION S INFORMATION ACCESSIBLE FOR ALL IMPLEMENTING THE GUIDELINES FOR ACCESSIBLE INFORMATION project has been funded with support from the European Union. publication reflects the views

More information

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping

More information

Planning, Budgeting and Forecasting

Planning, Budgeting and Forecasting MANAGEMENT CONSULTING Planning, Budgeting and Forecasting How is your planning process helping you identify and unlock value? kpmg.co.uk Key considerations How effective and efficient is your organisation

More information

Organisational Change Management

Organisational Change Management Organisational Change Management The only thing that is constant is change in your business, your market, your competitors, and your technology. Remaining competitive and responsive to your customers and

More information

Project Information. EDINA, University of Edinburgh Christine Rees Sheila Fraser sheila.fraser@ed.ac.uk 0131 651 7715

Project Information. EDINA, University of Edinburgh Christine Rees Sheila Fraser sheila.fraser@ed.ac.uk 0131 651 7715 Project Acronym - Project Title Project Information Scoping Study: Aggregations of Metadata for Images and Time-based Media Start Date June 2010 End Date 17 September 2010 Lead Institution Project Director

More information