Quality Control in Spreadsheets: A Software Engineering-Based Approach to Spreadsheet Development
|
|
|
- Camron McBride
- 10 years ago
- Views:
Transcription
1 Quality Control in Spreadsheets: A Software Engineering-Based Approach to Spreadsheet Development Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards Information Integrity Research Centre School of Computing & Mathematical Sciences University of Greenwich, United Kingdom [email protected] Abstract This paper presents work conducted towards the development of an effective software engineering-based methodology for integrity control in the process of spreadsheet development. Various approaches and concepts within the discipline of software engineering are investigated. The proposed methodology consists of a set of coherent stages incorporating relevant software engineering techniques and principles. The framework for spreadsheet quality control is mainly aimed at addressing the widespread problem of spreadsheet errors. This paper elaborately discusses the application of relevant software engineering techniques and principles in the construction of spreadsheet models, accompanied and supported by appropriate examples. The principles and techniques of tree-based formula representation, unique definition of spreadsheet elements and separation of data and operations, are among the main features explored.. 1. Introduction Numerous publications over the years have described the seriousness of the problem of spreadsheet errors as well as the extent to which it has adversely affected businesses. There are three different perspectives from which the phenomenon of spreadsheet errors can be investigated [1]. They are as follows: the frequency of the occurrence of the errors the real-life consequences of spreadsheet errors the actual errors themselves 1.1. Frequency of spreadsheet errors This area has attracted much attention and research. This is evident from the fact that most of the literature on the spreadsheet integrity problem concern the frequency of the occurrence of spreadsheet errors. Numerous related experiments and studies have been conducted in the past and adequate information is available. Panko and Halverson [2] have provided an excellent compilation of such information from a host of different sources. Apart from that, large and well-known auditing firms such as KPMG Management Consulting and Coopers & Lybrand have reported that spreadsheet errors are occurring at appalling rates. According to a financial model review by KPMG Management Consulting, London [3], at least 5 errors were found in 95% of the financial models reviewed. In addition to that, an article in New Scientist [4] has reported that a study conducted by the British accounting firm Coopers & Lybrand found errors in 90% of the spreadsheets audited. Therefore, it is beyond any doubt that the rate of occurrence of these errors is in fact significantly high The real-life consequences The second aspect of the spreadsheet integrity phenomenon concerns the real-life impact and consequences of these errors. Investigating the adverse effect of spreadsheet errors on businesses leads to a better insight into the seriousness of the situation. Such information has been presented in numerous publications. It must however be noted that these are just reported cases. There must be many other similar cases that have not been brought to public attention due to fear that it might affect the reputation of the company involved. Some of the reported cases are given in Chadwick et al [5], Rajalingham & Chadwick [6] Rajalingham et al [1]. An analysis of a large collection of reported cases over a decade, on the problem of spreadsheet errors and its negative consequences, clearly shows the extent of the damage that can be caused. Spreadsheet errors adversely affect the integrity and reliability of spreadsheet models. Consequently, numerous problems are encountered as a result of poor decisions made based on the unreliable or incorrect figures on spreadsheets /00 $10.00 (c) 2000 IEEE 1
2 1.3. The specific errors and flaws committed This is an issue that has not at all been adequately explored or discussed in publications on the problem of spreadsheet errors. Four research papers that have addressed this issue and analysed specific types of spreadsheet errors from business and academia are Panko and Halverson [2], Chadwick et al [5], Rajalingham & Chadwick [6], and Rajalingham et al [1]. The outcome of research into specific types of spreadsheet errors is the provision of a more comprehensive classification or taxonomy of spreadsheet errors, presented and elaborately discussed by Rajalingham & Chadwick [6] and Rajalingham et al [1]. Figure 1 shows a marginally improved version of the model of classification of spreadsheet errors given by Rajalingham & Chadwick [6] and Rajalingham et al [1]. These papers also contain an elaborate discussion of the errors with examples. 2. Applying software engineering principles 2.1. A spreadsheet is a computer program The increasing complexity and importance of spreadsheet models means that they have to be viewed differently. Contrary to the traditional view that a spreadsheet is merely a flexible electronic worksheet, it should be viewed as a computer program. A close examination of spreadsheet structure would reveal that a spreadsheet is fundamentally similar to a computer program Unique Definition of Spreadsheet Elements Various concepts and principles from structured analysis and design can be used in spreadsheet development as well. Uniqueness is a concept that is present in many parts and aspects of structured Figure 1. Types of spreadsheet errors /00 $10.00 (c) 2000 IEEE 2
3 approaches. The main purpose of this is to prevent ambiguity and confusion. In relational database design, there has to be uniqueness in the following aspects of design: Every relation or entity type has a distinct or unique name. Every attribute within the same relation/entity type must be unique. Every relation must have a primary key, which is an attribute or set of attributes capable of uniquely identifying a particular occurrence of the relation or entity type. Observing spreadsheets, we find that there are no mechanisms for enforcing such constraints. Consequently, there are many spreadsheet models designed without due attention paid to the uniqueness of the definition of elements within the model. The example [7] in figure 2 is used to illustrate this. Two important design flaws can be identified from the spreadsheet model in figure 2 [1]. They are as follows: A data value is not associated with any label e.g. cells B9 (114,290) and C23 (36,019). Although the meaning can be understood by carefully studying the model, it is not immediately obvious, especially to someone who is not familiar with such models. A label is placed on the same row as two different values, not distinguished by a column label. This results is some ambiguity as to exactly which value the label refers to e.g. cells B27 and C27, both being on the same row and labelled foreign exchange. Only after carefully studying the model it is known that cell C27 actually represents the total of appropriations. These problems can be overcome by ensuring that each element in the spreadsheet model is uniquely and unambiguously defined. The model in figure 3 shows the improved or corrected version of the model in figure Hierarchical decomposition in tree form Hierarchical decomposition is a technique commonly used in software engineering to gradually break-down the complexity of programs. A similar approach can be adopted in spreadsheet design and development. However, prior to attempting to break-down the complexity of a spreadsheet model, an analysis of the basic structure and components of a spreadsheet model is essential Analysis of spreadsheet structure. Generally, the principal elements of a spreadsheet model are labels, data values and formulae. There are many ways in which these terms can be defined. For our purposes, data values refer to the bits of data directly entered or fed into the model by users. A formula uses these data values and even other formulae to perform a particular operations. Labels are associated with data values and formulae to provide them with a meaning. Some labels describe the entire model. Referring to figure 3, examples of data values would be 40,360 (cell B6), 4,515 (cell B14) and 800 (cell B27). An example of a formula is 40,360 (cell B6) + 72,360 (cell B7) + 1,570 (cell B8), the result of which is 114,290 (cell B9). An example of a label is Gross profit (cell A11), which offers a meaning to the formula result 73,556 (cell C11). Research undertaken into spreadsheet errors has revealed that a majority of errors committed in spreadsheets are formula-based errors. In most cases, the formula is incorrectly constructed either due to a lack of understanding of the underlying algorithm or carelessness in entering the right cell addresses. Formulae are the most important elements of the spreadsheet model as they are the ones that actually calculate and provide useful results based on raw, user-entered data values. The process of formula construction in spreadsheets is basically a form of computer programming. The model in figure 4 shows the basic components of a spreadsheet formula. There are two main aspects to a formula, namely the formula structure and the arguments/terms. The structure of a formula refers to the organisation of binary operators (+, -, /, * or ^) and/or built-in spreadsheet functions in the formula. An argument/term in the formula is either represented in the form of a cell address or a constant. When a cell address is used the formula reads the value entered in the corresponding location on the spreadsheet. If this value changes, the result value of the formula changes accordingly, although the actual formula itself remains unchanged Hierarchical representation of a spreadsheet formula in tree form. In the same way that a computer program can be broken down into smaller parts and represented in the form of a tree, elements of a spreadsheet formula (data values and other formulae) can also be modelled diagrammatically in the form of a tree. This is important as it can be used to confirm our understanding of the structure and components of a particular formula as well as show its relationship with other formulae in the model. It can also be useful as a means of documenting the design of a spreadsheet model. All types of formulae can be represented in the form of a tree, including the spreadsheet (e.g. MS Excel) built-in functions. The general format of a function is as follows [8]: = name (argument1, argument2... ) /00 $10.00 (c) 2000 IEEE 3
4 Figure 2. Model with an ambiguity problem `name' is the function name, and `argument1', 'argument2', etc., are the arguments required for the evaluation of the function. Arguments must appear in a parenthesised list as shown above and their exact number depends on the function being used. However, some functions do not require arguments and are used without parentheses [1]. The tree represents all the elements of a particular formula (data values, hard-coded constants, cells referenced, binary operators and built-in functions). Based on the spreadsheet model shown in figure 3, it can be seen how formulae can be represented in the form of a tree to facilitate comprehension, analysis and documentation. This is shown in figure 5. Figure 5 represents the logical aspect of the spreadsheet model, independent of physical location on the spreadsheet. Tree structures can also be constructed on formulae to show the physical model using cell addresses. Examples of this [1] are given in figure 6. As all functions are of the same form, = name (argument1, argument2... ), we can represent each in the form of a tree (not necessarily a binary tree). The root /00 $10.00 (c) 2000 IEEE 4
5 would now contain the function name while each argument would form a node. to the fact that data values and their referencing formulae are placed close to each other and users are sometimes unable to distinguish between the two. This means that the cause Figure 3. The ambiguity problem resolved 2.4. Separation of data and operations It is important to control data integrity and maintain the consistency of data in information systems. A frequent error committed by users is the accidental overwriting of formulae. Formulae are important and must be protected from such undesirable events. This is mainly attributable is the physical proximity of data values and formulae performing operations. The strategy to be adopted is to separate user-entered data values from the formulae that operate on them. The user-entered data values, along with their corresponding /00 $10.00 (c) 2000 IEEE 5
6 labels are placed in a physically isolated matrix. The operations part of the model, consisting of formulae are Figure 4. Components of a spreadsheet formula Figure 5. Selected formulae in tree form placed in a another part of the spreadsheet. After they are programmed, the operations part is protected as a precaution against any overwriting of data. This approach is very similar to the technique proposed by DiAntonio [9]. DiAntonio proposes the splitting of the spreadsheet model into a facts matrix and a solution matrix. The facts matrix is similar to our data component while the solution matrix is fundamentally similar to our operations component. In addition to that, the operations section is also strictly protected. There is, however, one obvious and potentially serious problem with this method. The operations component is difficult to understand now. It is incomplete without the relevant data values put in the appropriate adjacent cells. The strategy that can be used to solve this problem would be to include absolute copies of data values from the data component in appropriate places in the operations component. As such, the absolute copy is present as a formula in the operations component. There can even be multiple copies of a piece of data value provided they all reference the same original data value in the data component. The refined model is shown in figure 7. It is based on the spreadsheet model shown in figure /00 $10.00 (c) 2000 IEEE 6
7 Figure 6. Examples of formulae in tree form 3. A coherent software engineering-based methodology 3.1. Rationale for the methodology Many authors who have carried out research into the problem of spreadsheet errors have reached the conclusion that the main reason behind this prevailing phenomenon is the absence of a structured approach. Many of them have also proposed the adoption of a software engineering-based approach, employing traditional programming principles. This is evident from numerous publications on the subject [1]. According to Kavanagh [10], companies are being put at risk due to their failure to realise that the process of constructing spreadsheets requires the discipline of traditional programming. Spreadsheet applications are more vulnerable to poor design and to errors than conventional programs [11]. This means that a greater degree of discipline is required in the process of spreadsheet development. A software engineering-based methodology is capable of providing such discipline. Panko and Halverson [2] have also indicated that when dealing with complex spreadsheets, there is a need to adopt strict programming disciplines. They have also said that a programming approach might be feasible due to the /00 $10.00 (c) 2000 IEEE 7
8 Data Component Operations Component (protected) Figure 7. A segment of the refined model similarity between spreadsheet errors and programming errors. Hendry and Green [12] have suggested that instead of creating the whole spreadsheet first and then checking for errors, errors ought to be checked for at various stages of the development process. This will make it easier to trace and correct errors. This strategy of stage-by-stage component testing is a software engineering principle [6]. Based on these published reports, there is an obvious and urgent need to apply the principles of software engineering in spreadsheet development in order to enhance the integrity and reliability of the models produced. This will help address the currently major phenomenon of spreadsheet errors [1] The methodology step-by-step The methodology consists of a step-by-step process to the construction of spreadsheet models incorporating the software engineering concepts and principles discussed in the previous section. Step 1: The spreadsheet problem is analysed thoroughly, mainly in terms of the operations required to serve the purposes of the model. All the formulae performing these operations in the spreadsheet model are identified. Step 2: Based on the technique of hierarchical decomposition, each formula is organised in a hierarchical form. This hierarchy takes the form of a tree. Step 3: All user-entered data values are identified. Most of these data values are referenced by some formula or several formulae. The formula trees can also be helpful in determining the data values. These data values are then organised in the form of a matrix and physically separated on the spreadsheet. This is based on the technique of separation of data and operations on the spreadsheet. Each element of the data matrix is uniquely described by a label or a pair of column and row labels. This is based on the technique of unique definition of spreadsheet elements discussed earlier /00 $10.00 (c) 2000 IEEE 8
9 Step 4: The various formulae operating on the data values are organised into a separate operations section along with absolute copies of data values (where appropriate) in order to provide completeness and understandability to the model. As done previously in step 3, each element in the operations part is uniquely described by a label or a pair of column and row labels. Step 5: The operations part of the model is completely protected from users. Users are only allowed to alter the contents of the data matrix when necessary. The elements of the operations section can only be modified by authorised spreadsheet programmers by having them 'unprotected' first and then protected again after the changes have been made. 4. Conclusion This paper has presented work presently in hand towards a methodology for increasing the integrity of spreadsheet models. The proposed methodology consists of various techniques, guidelines and rules governing the process of spreadsheet design and development. A significant feature of this approach is that it adopts concepts from software engineering and employs important principles and techniques such as unique definition of spreadsheet model elements, tree-based hierarchical decomposition, and separation of data and operations. The principles and techniques put forth in this paper have the potential to eliminate and reduce the occurrence of many types of spreadsheet errors. The unique definition of elements of a spreadsheet model prevents any ambiguity concerning the meaning of a particular data value or formula. This prevents any misinterpretation of the model, which could subsequently lead to various types of errors. The tree-based representation of a spreadsheet formula enhances understanding of the structure of and relationship between formula operations. Formulae lie at the heart of spreadsheet modelling and must be treated with care and caution. They are also a major source of errors. The tree-structure also helps identify any omitted or redundant elements in the formula. The technique of separation of data and operations is one which is not alien to structured approaches, where the data is defined and held separately from the functions or methods that operate on them. This technique applied in spreadsheet design and development ensures that formulae are protected from accidental overwriting. Data integrity can also be maintained as each piece of data value has a single point from which it is referenced by its dependant formulae and copies. The various features of this approach, as detailed in this paper, are currently being trialled with cohorts of students at the University of Greenwich. They form the basis of further work towards a working methodology. Such a methodology would represent a major step towards managing the quality of spreadsheets. 5. References [1] K. Rajalingham, D. Chadwick, B. Knight, and D. Edwards, An Approach to Improving the Quality of Spreadsheet Models", Proceedings of the Seventh International Conference on Software Quality Management SQM'99, Southampton, UK, British Computer Society, March 1999, pp [2] R.R. Panko and R.P. Halverson, Jr., "Spreadsheets on Trial: A Framework for Research on Spreadsheet Risks", Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences, Maui, Hawaii, January [3] KPMG Management Consulting, Executive Summary: Financial Model Review Survey, KPMG, London, [4] M. Ward, "Fatal Addition", New Scientist, 16th August [5] D. Chadwick, J. Knight, and P. Clipsham, " Information Integrity In End-user Systems", Proceedings of the First Annual IFIP TC-11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems, Zurich, Switzerland, Chapman & Hall, December [6] K. Rajalingham and D. Chadwick, "Integrity Control of Spreadsheets: Organisation & Tools", Proceedings of the Second Annual IFIP TC-11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems, Virginia, USA, Kluwer Academic Publishers, November 1998, pp [7] F. Wood, Business Accounting 1 (7th Edition), Pitman Publishing, [8] N. Kantaris and & P.R.M. Oliver, Excel 5 Explained, Bernard Babani (publishing), [9] A.E. DiAntonio, Spreadsheet Applications, Prentice-Hall, [10] J. Kavanagh, "Shoddy Business Models Breed Financial Disaster", Computer Weekly, 19 June [11] S.J. Davis, "Tools for Spreadsheet Auditing", International Journal of Human-Computer Studies (Vol 45), 1996, pp [12] D.G. Hendry and T.R.G. Green, "Creating, Comprehending, and Explaining Spreadsheets: A Cognitive Interpretation of What Discretionary Users Think of the Spreadsheet Model", International Journal of Human-Computer Studies (40:6), June 1994, pp /00 $10.00 (c) 2000 IEEE 9
A Structured Methodology For Spreadsheet Modelling
A Structured Methodology For Spreadsheet Modelling ABSTRACT Brian Knight, David Chadwick, Kamalesen Rajalingham University of Greenwich, Information Integrity Research Centre, School of Computing and Mathematics,
Errors in Operational Spreadsheets: A Review of the State of the Art
Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College [email protected] Kenneth R. Baker Tuck School of Business Dartmouth College
STOP THAT SUBVERSIVE SPREADSHEET!
STOP THAT SUBVERSIVE SPREADSHEET! David Chadwick School of Computing and Mathematical Sciences, University of Greenwich, London SE10 9LS, UK; [email protected] Abstract: This paper documents the formation
2. Basic Relational Data Model
2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that
A Generalised Spreadsheet Verification Methodology
A Generalised Spreadsheet Verification Methodology Nick Randolph Software Engineering Australia (WA) Enterprise Unit 5 De Laeter Way Bentley 6102 Western Australia [email protected] John Morris and
Managing Multi-Valued Attributes in Spreadsheet Applications
Managing Multi-Valued Attributes in Spreadsheet Applications Clare Churcher, Theresa McLennan and Wendy Spray Lincoln University New Zealand churcher/mclennan/[email protected] Abstract End-users frequently
Spreadsheets have become the principal software application for teaching decision models in most business
Vol. 8, No. 2, January 2008, pp. 89 95 issn 1532-0545 08 0802 0089 informs I N F O R M S Transactions on Education Teaching Note Some Practical Issues with Excel Solver: Lessons for Students and Instructors
Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective
Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Figure 2: DAMA Publications
Steve Hawtin, Schlumberger Information Solutions 14 th Petroleum Data Integration, Information & Data Management Conference The effective management of Exploration and Production (E&P) data has a major
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
Files. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file?
Files What s it all about? Information being stored about anything important to the business/individual keeping the files. The simple concepts used in the operation of manual files are often a good guide
54 Robinson 3 THE DIFFICULTIES OF VALIDATION
SIMULATION MODEL VERIFICATION AND VALIDATION: INCREASING THE USERS CONFIDENCE Stewart Robinson Operations and Information Management Group Aston Business School Aston University Birmingham, B4 7ET, UNITED
Project Management in Marketing Senior Examiner Assessment Report March 2013
Professional Diploma in Marketing Project Management in Marketing Senior Examiner Assessment Report March 2013 The Chartered Institute of Marketing 2013 Contents This report contains the following information:
XYZ Model Financial Accounts Generator June 2011 Update User Guide
User Guide Page 1 of 36 XYZ Model Financial Accounts Generator June 2011 Update User Guide Contents Product Overview... 3 Features of XYZ Model Financial Accounts Generator... 4 Cover Sheet... 4 Contents
Formulas & Functions in Microsoft Excel
Formulas & Functions in Microsoft Excel Theresa A Scott, MS Biostatistician III Department of Biostatistics Vanderbilt University [email protected] Table of Contents 1 Introduction 1 1.1 Using
BREAK-EVEN ANALYSIS. In your business planning, have you asked questions like these?
BREAK-EVEN ANALYSIS In your business planning, have you asked questions like these? How much do I have to sell to reach my profit goal? How will a change in my fixed costs affect net income? How much do
Use a Risk Breakdown Structure (RBS) to Understand Your Risks
Use a Risk Breakdown Structure (RBS) to Understand Your Risks David Hillson, PhD, PMP, FAPM, MIRM, MCMI, Director of Consultancy, Management Professional Solutions Limited Introducing the Risk Breakdown
An Activity-Based Costing Assessment Task: Using an Excel Spreadsheet
e-journal of Business Education & Scholarship of Teaching Vol. 3, No. 1, 2009, pp:25-35. http://www.ejbest.org Instructional Note An Activity-Based Costing Assessment Task: Using an Excel Spreadsheet Damian
Creating A Grade Sheet With Microsoft Excel
Creating A Grade Sheet With Microsoft Excel Microsoft Excel serves as an excellent tool for tracking grades in your course. But its power is not limited to its ability to organize information in rows and
Card-Sorting: What You Need to Know about Analyzing and Interpreting Card Sorting Results
October 2008, Vol. 10 Issue 2 Volume 10 Issue 2 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL) at Wichita State University.
A Risk Management System Framework for New Product Development (NPD)
2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong
Ten questions to ask when evaluating SAP change management solutions
Ten questions to ask when evaluating SAP change management solutions Organizations with SAP systems use a variety of different processes and tools to help them address the challenges outlined in this white
Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
Related guides: 'Planning and Conducting a Dissertation Research Project'.
Learning Enhancement Team Writing a Dissertation This Study Guide addresses the task of writing a dissertation. It aims to help you to feel confident in the construction of this extended piece of writing,
Spreadsheet Auditing Software
David Nixon, Mike O'Hara Information Systems Institute, University of Salford, United Kingdom Nixon & O Hara ABSTRACT It is now widely accepted that errors in spreadsheets are both common and potentially
INTOSAI. Performance Audit Subcommittee - PAS. Designing performance audits: setting the audit questions and criteria
INTOSAI Performance Audit Subcommittee - PAS Designing performance audits: setting the audit questions and criteria 1 Introduction A difficult phase in performance auditing is planning and designing. In
Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur
Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.
Decision Support Systems
Decision Support Systems 46 (2008) 128 138 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss A critical review of the literature on spreadsheet
Calc Guide Chapter 9 Data Analysis
Calc Guide Chapter 9 Data Analysis Using Scenarios, Goal Seek, Solver, others Copyright This document is Copyright 2007 2011 by its contributors as listed below. You may distribute it and/or modify it
THE BASICS OF STATISTICAL PROCESS CONTROL & PROCESS BEHAVIOUR CHARTING
THE BASICS OF STATISTICAL PROCESS CONTROL & PROCESS BEHAVIOUR CHARTING A User s Guide to SPC By David Howard Management-NewStyle "...Shewhart perceived that control limits must serve industry in action.
Populating a Data Quality Scorecard with Relevant Metrics WHITE PAPER
Populating a Data Quality Scorecard with Relevant Metrics WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Useful vs. So-What Metrics... 2 The So-What Metric.... 2 Defining Relevant Metrics...
GUIDANCE ON REVENUE OPINIONS ON CLASSIFICATION OF ACTIVITIES AS TRADING.
GUIDANCE ON REVENUE OPINIONS ON CLASSIFICATION OF ACTIVITIES AS TRADING. INTRODUCTION The introduction of the general 12½% corporation tax regime for profits from trading activities of companies is focusing
Software Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING
Critical and creative thinking (higher order thinking) refer to a set of cognitive skills or strategies that increases the probability of a desired outcome. In an information- rich society, the quality
Project Implementation Plan (PIP) User Guide
eea financial mechanism Project Implementation Plan (PIP) User Guide 23 November 2007 norwegian financial mechanism Page 2 of 20 1 Introduction The Project Implementation Plan (PIP) is a representation
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE The Shared Assessments Trust, But Verify Model The Shared Assessments Program Tools are used for managing the vendor risk
DISBURSEMENT HANDBOOK FOR PUBLIC SECTOR LOANS. January 2013. Office of the General Counsel
DISBURSEMENT HANDBOOK FOR PUBLIC SECTOR LOANS January 2013 Office of the General Counsel DISBURSEMENT HANDBOOK TABLE OF CONTENTS Page 1. INTRODUCTION... 4 1.1 SOME TERMS EXPLAINED... 6 Loan agreement...
Insurance. Chapter 7. Introduction
65 Chapter 7 Insurance Introduction 7.1 The subject of genetic screening in relation to insurance is not new. In 1935 R A Fisher addressed the International Congress of Life Assurance Medicine on the topic,
Clinical Risk Management: Agile Development Implementation Guidance
Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk
Involve-Project Manager
Involve-Project Manager This article will describe: What is Project Management Why is Project Management so important to community and voluntary organisations The Key Phases of Project Management: o Initiation
Formulas & Functions in Microsoft Excel
Formulas & Functions in Microsoft Excel Theresa A Scott, MS Biostatistician II Department of Biostatistics Vanderbilt University [email protected] Table of Contents 1 Introduction 1 1.1 Using
Evaluating Web Site Structure A Set of Techniques
Introduction Evaluating Web Site Structure A Set of Techniques K. Frederickson-Mele, Michael D. Levi, and Frederick G. Conrad U.S. Department of Labor, Bureau of Labor Statistics Washington, DC As the
Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.
White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
V. Phani Krishna et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (6), 2011, 2915-2919
Software Quality Assurance in CMM and XP- A Comparative Study CH.V. Phani Krishna and Dr. K.Rajasekhara Rao CSE Department, KL University, Guntur dt., India. Abstract Software Quality Assurance is a planned
Data entry and analysis Evaluation resources from Wilder Research
Wilder Research Data entry and analysis Evaluation resources from Wilder Research General instructions Preparation for data entry Data entry is often thought of as a time-consuming process, but there are
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
Performance Standards and Test Procedures for Environmental Data Management Software. Martin Lloyd
Performance Standards and Test Procedures for Environmental Data Management Software Martin Lloyd Dr M H Lloyd, Farside Technology Research / SIRA Environmental Ltd 12 Acorn Industrial Park, Crayford Road,
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Sales Performance Management Using Salesforce.com and Tableau 8 Desktop Professional & Server
Sales Performance Management Using Salesforce.com and Tableau 8 Desktop Professional & Server Author: Phil Gilles Sales Operations Analyst, Tableau Software March 2013 p2 Executive Summary Managing sales
Data Coding and Entry Lessons Learned
Chapter 7 Data Coding and Entry Lessons Learned Pércsich Richárd Introduction In this chapter we give an overview of the process of coding and entry of the 1999 pilot test data for the English examination
Functional Modeling with Data Flow Diagrams
Functional Modeling with Data Flow Diagrams Amasi Elbakush 5771668 Teaching Assistant : Daniel Alami Utrecht University 1 Introduction Data Flow Diagrams (DFDs) are a visual representation of the flow
Classication and selection of tools for quality knowledge management
Loughborough University Institutional Repository Classication and selection of tools for quality knowledge management This item was submitted to Loughborough University's Institutional Repository by the/an
How to Excel with CUFS Part 2 Excel 2010
How to Excel with CUFS Part 2 Excel 2010 Course Manual Finance Training Contents 1. Working with multiple worksheets 1.1 Inserting new worksheets 3 1.2 Deleting sheets 3 1.3 Moving and copying Excel worksheets
Stakeholder management and. communication PROJECT ADVISORY. Leadership Series 3
/01 PROJECT ADVISORY Stakeholder management and communication Leadership Series 3 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital programmes,
A Generalized PERT/CPM Implementation in a Spreadsheet
A Generalized PERT/CPM Implementation in a Spreadsheet Abstract Kala C. Seal College of Business Administration Loyola Marymount University Los Angles, CA 90045, USA [email protected] This paper describes
Project Risk Analysis toolkit
Risk Analysis toolkit MMU has a corporate Risk Management framework that describes the standard for risk management within the university. However projects are different from business as usual activities,
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
Qualification Specification
BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 1.0 December 2015. Contents 1. About BCS 3 2. Equal Opportunities 3 3. Introduction to the qualification 4 3.1 Qualification summary 4 3.2
Finite Mathematics Using Microsoft Excel
Overview and examples from Finite Mathematics Using Microsoft Excel Revathi Narasimhan Saint Peter's College An electronic supplement to Finite Mathematics and Its Applications, 6th Ed., by Goldstein,
Database design 1 The Database Design Process: Before you build the tables and other objects that will make up your system, it is important to take time to design it. A good design is the keystone to creating
Baseline Code Analysis Using McCabe IQ
White Paper Table of Contents What is Baseline Code Analysis?.....2 Importance of Baseline Code Analysis...2 The Objectives of Baseline Code Analysis...4 Best Practices for Baseline Code Analysis...4 Challenges
Introduction to Computing. Lectured by: Dr. Pham Tran Vu [email protected]
Introduction to Computing Lectured by: Dr. Pham Tran Vu [email protected] Databases The Hierarchy of Data Keys and Attributes The Traditional Approach To Data Management Database A collection of
Concept-Mapping Software: How effective is the learning tool in an online learning environment?
Concept-Mapping Software: How effective is the learning tool in an online learning environment? Online learning environments address the educational objectives by putting the learner at the center of the
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT
Standard for Software Component Testing
Standard for Software Component Testing Working Draft 3.4 Date: 27 April 2001 produced by the British Computer Society Specialist Interest Group in Software Testing (BCS SIGIST) Copyright Notice This document
CHAPTER 6 DATABASE MANAGEMENT SYSTEMS. Learning Objectives
CHAPTER 6 DATABASE MANAGEMENT SYSTEMS Management Information Systems, 10 th edition, By Raymond McLeod, Jr. and George P. Schell 2007, Prentice Hall, Inc. 1 Learning Objectives Understand the hierarchy
Measuring and Monitoring the Quality of Master Data By Thomas Ravn and Martin Høedholt, November 2008
Measuring and Monitoring the Quality of Master Data By Thomas Ravn and Martin Høedholt, November 2008 Introduction We ve all heard about the importance of data quality in our IT-systems and how the data
Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013
Transition guide Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013 The new international standard for information security management systems ISO/IEC 27001 - Information Security Management - Transition
Risk Assessment For Spreadsheet Developments: Choosing Which Models to Audit
Risk Assessment For Spreadsheet Developments: Choosing Which Models to Audit Raymond J. Butler, CISA H. M. Customs and Excise, UK Email [email protected] Crown Copyright reserved, published by permission
Appendix B Data Quality Dimensions
Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational
Almost all spreadsheet programs are based on a simple concept: the malleable matrix.
MS EXCEL 2000 Spreadsheet Use, Formulas, Functions, References More than any other type of personal computer software, the spreadsheet has changed the way people do business. Spreadsheet software allows
Requirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
Developing Entity Relationship Diagrams (ERDs)
Developing Entity Relationship Diagrams (ERDs) Introduction This document seeks to give expanded explanation and examples of how to produce entity relationship diagrams. It is based on material adapted
Sample- for evaluation only. Advanced Excel. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.
A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2010 Advanced Excel TeachUcomp, Inc. it s all about you Copyright: Copyright 2010 by TeachUcomp, Inc. All rights reserved. This publication,
Produce Spreadsheets Excel 2010
ISBN: 978-1-921885-15-0 Produce Spreadsheets Excel 2010 BSBITU304A Software Publications Writing Team Produce Spreadsheets Supporting BSBITU304A Produce Spreadsheets in the Business Services Training Package.
The use of computer systems
Technology Update Computer Systems Validation, Part 1 Software Purchase and GCP Compliance Teri Stokes Teri Stokes, PhD, is senior consultant and director of GXP International, 131 Sudbury Road, Concord,
Business Process Modeling with Structured Scenarios
Business Process Modeling with Structured Scenarios Doug Rosenberg ICONIX Software Engineering, Inc. In 2008, based on our experience with a number of business process engineering projects over the last
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Processing Requirements by Software Configuration Management
Processing Requirements by Software Configuration Management Ivica Crnkovic 1, Peter Funk 1, Magnus Larsson 2 1 Mälardalen University, Department of Computer Engineering, S-721 23 Västerås, Sweden {ivica.crnkovic,
A security analysis of the SecLookOn authentication system
Institut f. Statistik u. Wahrscheinlichkeitstheorie 1040 Wien, Wiedner Hauptstr. 8-10/107 AUSTRIA http://www.statistik.tuwien.ac.at A security analysis of the SecLookOn authentication system K. Grill Forschungsbericht
How To Write An Electronic Health Record
EHR Requirements David LLOYD and Dipak KALRA CHIME Centre for Health Informatics and Multiprofessional Education, University College London N19 5LW, by email: [email protected]. Abstract. Published
UNIVERSITY OF READING
UNIVERSITY OF READING MARKING CRITERIA CLASSIFICATION FRAMEWORK FOR TAUGHT POSTGRADUATE PROGRAMMES (for non-greenlands cohorts entering Autumn Term 2008 and thereafter) (for Greenlands cohorts entering
Break-Even and Leverage Analysis
CHAPTER 6 Break-Even and Leverage Analysis After studying this chapter, you should be able to: 1. Differentiate between fixed and variable costs. 2. Calculate operating and cash break-even points, and
Functional Modelling in secondary schools using spreadsheets
Functional Modelling in secondary schools using spreadsheets Peter Hubwieser Techn. Universität München Institut für Informatik Boltzmannstr. 3, 85748 Garching [email protected] http://ddi.in.tum.de
