Sie sind auf Seite 1von 6

Requirements Engineering

Twelve Requirements Basics for Project Success


Dr. Ralph R. Young
Northrop Grumman Information Technology Defense Group

The author provides a set of 12 requirements basics; these applications will contribute to your project’s success. The require-
ments basics are based on industry experience; guidance from requirements-related books, articles, and Web sites; and the
author’s involvement with projects. Having an experienced requirements subject matter expert on the project staff can help the

M
project manager and the project team guide investments that will help.
uch has been written about require- ject outcomes. Yet, many projects cessful project management and to perform
ments, and surely we have experi- encounter requirements-related problems, effective requirements practices [1, 2, 3, 4, 5]
enced enough to have learned how to do most of which could have been avoided. that are easy to apply.
things in ways that support successful pro- Ample guidance is available to enable suc- Table 1 provides a set of 12 require-
Table 1: Twelve Requirements Basics for Project Success ments basics for project success with sup-
porting information, suggestions, and rec-
ommendations provided further on. I
encourage you to consider them thought-
1. Make sure the project staff includes a trained and experienced requirements

fully in the context of your project and to


manager or requirements analyst.

determine if some changes in its approach


2. Proactively partner with your customer.

may be worth considering. (Of course, if


3. Invest in the project’s requirements process.
4. Write a project vision and scope document.
5. Use proven requirements elicitation techniques such as requirements workshops
you digest this article and then decide to
make no changes, no improvement oppor-
and prototyping to evolve the real requirements and to gain buy-in from the

tunities will result. Failure to work proac-


stakeholders.

tively to continuously improve is a root


6. Utilize an evolutionary or incremental approach to development, deployment, and

cause of a stagnant industry, as evaluated by


implementation of the capabilities.

project success rates [6].) You may relate to


7. Use an effective mechanism to control changes to requirements and new
requirements.

the Requirements Secrets provided in Table


8. Use an effective automated requirements tool to maintain information about the

2. The sad truth is that these are not really


requirements.

secrets; they are fairly well-known facts that


9. Ensure that the facts concerning the requirements are accurate and that important

are well documented in the requirements lit-


requirements are not omitted. Ascertain the rationale for every requirement (why it

erature (books and articles written by acad-


is needed).

emicians and practitioners concerning


10. Conduct inspections of all requirements-related documents. (Inspections are a
more rigorous form of peer review.)

requirements). So, the bottom line is not that we


11. Enlist the support and assistance of all members of the project staff in helping to

do not know what to do, it is that we do not do it –


perform requirements work.

a sad commentary on our willingness and


12. Proactively address requirements-related risks.

Table 2: Requirements Secrets commitment to discipline our efforts on


projects.
Related to the importance of require-
1. Half of the features provided in most delivered software are never used once [6].

ments basics is the need to be agile. How


2. More than half of the effort on most systems and software projects is wasted [6].

does one balance increased investment in


3. The stated requirements (i.e., the list of requirements provided to the developer by

the requirements process with the need to


the customer and users) are never the real requirements.

be agile? In my judgment, it is the project’s


4. Eighty percent of requirements errors found in system testing are a result of
incorrect facts about the requirements or omitted requirements [9].
5. Spending a lot of effort on testing may be misguided; it is better to invest more in
approach that makes all the difference. By
using an evolutionary or incremental
an effective requirements process that results in higher quality products being

approach, and by delivering versions, releas-


provided to test.

es, and new products, we can be agile. It is


6. Given that a) systems and software development is complex, and b) people (with
all our frailties) are involved, the probability of the development effort becoming

not required that we learn a whole new way


derailed is very high – unless a proactive effort is made to partner for success.

of doing things.
See Requirements Basic 2 in this article for a description of what is envisioned.
7. The documents we produce are fraught with errors; the earlier in the development
effort those errors (defects) are discovered, the less costly it is to fix them. A peer
review process should be implemented to reduce errors. All requirements-related
documents should be inspected. Twelve Requirements Basics
for Project Success
Concerning potential improvements in your
8. Project managers should pay added attention to the requirements basics and allot
sufficient funding for requirements-related activities.

project’s approach, we need to remind our-


9. It is neither difficult nor expensive to incorporate inspections in your project's

selves that each of us is a change agent on


approach[18]; although this technique has been available for a long time, most

our jobs and on projects. Select an improve-


projects do not use it.
10. A defect prevention process is also easy to train, deploy, and implement. It can

ment opportunity from the following where


save a lot of money and time, but again, most projects do not use it.

you have influence and show others that


11. Communication on most projects is challenged; a proactive effort to foster good

you can be successful.


communications is required [1].

1. Provide training for all project par-


12. An effective automated requirements tool is required to support requirements
development and requirements management on all but the smallest project.

4 CROSSTALK The Journal of Defense Software Engineering December 2006


Twelve Requirements Basics for Project Success

ticipants concerning the require-


ments processes to be used on the
project. Also, there needs to be a tech-
Junior- Mid- Senior-
Requirements Analyst's Skills Matrix Level Level Level

nical leader who is highly skilled in


Analyst Analyst Analyst

requirements engineering. The training


Skill Knowledge of = K

and experience required for three levels


No. Experience with = X

of a requirements analyst (RA) are pro-


1. Types of requirements. K X X

vided in Table 3. See [5] for more infor-


2. Criteria for a good requirement. K X X

mation and insight, including an exten-


3. Customer/user involvement with requirements (joint team). K X X
4. Identifying real requirements (from the stated requirements). K X X

sive set of references to excellent 5. Anticipating and controlling requirements changes. K X X

requirements books and articles by


6. Requirements elicitation. K X X

many good writers. Industry systems


7. References concerning requirements (books, articles, standards). K X X

engineering and requirements trainer


Robert Halligan believes that the num-
8. Requirements attributes. K X X

ber one problem in requirements engi-


9. Requirements baseline. K X X

neering is that project managers (PMs)


10. Training in systems engineering (e.g., life cycles, risk K X X

fail to require experienced RAs, and that


management).
11. Rationale for requirements. K X X

RAs are not sufficiently trained and/or


12. Requirements management tools. K X X

experienced to perform their roles


13. Requirements peer review/inspection. K X X

effectively1. PMs can use this skills


14. Requirements syntax. K X X

matrix to recruit and train RAs; RAs can


15. Requirements traceability. K X X

use it to pursue an ongoing profession-


16. Requirements verification and validation. K X X

al development program to acquire


17. Requirements Review Board/Configuration Review K X X

needed expertise.
Board/Configuration Control Board.

It is important to distinguish between a


18. Developing and using metrics for requirements K X X
activities/processes.

process and the skills of project professionals.


19. Requirements prioritization. K X X

A process may be defined as a set of activi-


20. Technical writing of requirements deliverables (Requirements K X X

ties that results in the accomplishment of a


Traceability Matrix, Software Requirements Specification, Interface

task or the achievement of an outcome.


Requirements Specification).

Every project uses a requirements process


21. Develop, implement, and use requirements processes. K X

whether it is defined and documented (writ-


22. Quality Assurance of requirements. K X

ten down) or not. Some of the advantages


23. Requirements allocation (to components, applications, packages). K X

of involving a project’s key lead in defining


24. Requirements change control and change notification. K X

and documenting the requirements process


25. Requirements repository. K X

for a project include the following:


26. Requirements errors (missing, incorrect, infeasible, out-of-scope). K X

• Because they helped create it, the people


involved in defining and documenting
27. Use-case development (with customer/user). K X

the process acquire a better understand-


28. Requirements specifications. X X

ing of it and become more committed


29. Evaluating requirements for risks. X
30. Training the requirements processes. X

to its successful use.


• The leads for other areas within the pro-
31. Requirements Impact Estimation Table. X

ject become more involved in the Table 3: RAs Skills Matrix


requirements activities and bring their successfully; the skills applied by the tomer. In our work, project practition-
expertise and experience to refine the requirements analyst facilitate the perfor- ers like to use the word partner. It sug-
requirements process. mance of the requirements work. For gests that we are collaboratively working
• Once the process is documented, the example, by ensuring that each requirement toward joint objectives. I am talking
opportunity exits to improve it based on meets the criteria for a good requirement, about a unique type of partnering in which
actual project events. the RA enables the project to avoid a lot of an independent outside facilitator is
• The process is likely to be more com- rework, thus making the requirements engaged to orchestrate an approach in
plete and useable. process much more effective. Another which a set of carefully selected stake-
• The process is more likely to be inte- example is that by utilizing the joint team holders gain commitment to success
grated into other activities and plans on mechanism (a way to do something), through a series of planned partnering
the project. In other words, by using a responsibility for the requirements is fixed – workshops2. The advantage of this
collaborative approach, project commu- all requirements go through a funnel so that approach is the evolution of a team that
nication is enhanced. accountability for them can be maintained. is committed to project success – it will
• Technical performers on projects The joint team mechanism needs to include not allow the project to become derailed
become more inclined and willing to use a few representatives (between two and 12 in spite of the inevitable problems and
an agreed-upon and understood or more, depending on the size of the pro- interpersonal issues encountered during
requirements approach. ject) of both the customer/user and the the days, weeks, months, and sometimes
When addressing the skills of a require- developer who are empowered to make years of hard (and often conflicted and
ments analyst in Table 3, think of these decisions and take responsibility and frustrating) work. Wiegers provides
skills supporting the project’s requirements accountability for the requirements through- related ideas concerning having a prod-
process. The process goals are created to out the project’s life cycle. uct champion as a specific partnering
perform requirements work effectively and 2. Proactively partner with your cus- technique in [7].

December 2006 www.stsc.hill.af.mil 5


Requirements Engineering

3. Understand the resources required by Karl Wiegers [7]. In our work, we serve all stakeholders. The latter tech-
to perform requirements processes need to be aware of the need to involve nique is a cost-effective way to gain a
effectively and invest in the project’s all stakeholders and to gain buy-in (com- better understanding of the customer’s
requirements process. The industry mitment to the success of the project). and users’ real needs – prototypes may
average for project investment in its Allowing various stakeholder groups to be designed, developed, implemented,
requirements process is 3 percent of review the vision and scope document, and updated for a fraction of the cost of
project costs; data from NASA shows comment on it, and then revise it to a delivered capability. Getting feedback
that when 8-14 percent of project costs address their stakeholder comments is on a visual representation is faster and
are invested in the system life-cycle one technique that can help gain buy-in. easier than getting it from text. The
requirements process, there is a much One project best practice is to engage important thing is to evolve the real require-
higher probability of achieving lower stakeholders throughout the project – ments before starting other technical work.
costs and improved schedule [8]. The projects that do so are more successful Experience has shown that using the
requirements process used by the pro- than those that do not because commu- stated requirements (the requirements
ject or organization should be 1) devel- nication is improved and expectations provided by the customer and users at
oped by the project’s stakeholders and are more realistic [9]. Also, this provides the beginning of a development effort)
staff; 2) documented; and 3) continu- more opportunities to build interper- results in an estimated 45 percent
ously improved based on experience on sonal relationships and even allows cus- rework [11].
each project. Measure the requirements tomers and users to help solve the prob- 6. Utilize an evolutionary or incremen-
change activity (requirements volatility), lems that arise. tal project approach to development,
including both new requirements and 5. Use proven requirements elicitation deployment, and implementation of
changes to requirements, to provide techniques such as requirements the needed capabilities. This is both
insight into project performance. Also, workshops and prototypes and other an opportunity and a challenge – when-
plan for change; this means estimating forms of visual presentations to ever one employs a new technique on a
the amount of change and when it evolve the real requirements3 and to real project, additional risk is assumed.
might occur. gain stakeholder buy-in [10]. Among My suggestion is to ensure that there are
4. Write a project vision and scope doc- more than 40 requirements-gathering people on the project staff who have
ument. The benefit of this recommen- techniques, these two seem to be the previously utilized a new practice, tech-
dation is to document the vision of the most effective. In the case of the for- nique, method, tool, or mechanism. In
stakeholders concerning the goals of mer, various stakeholder groups will this way, your project can benefit from
the project, and to achieve significant learn more about the perspective of the lessons learned previously (provided, of
consensus on the project’s scope (what other stakeholder groups and will have a course, that you pay attention to and are
is included in the project and what is better understanding of the overall disciplined to incorporate them). An
excluded – for example, product will not needs to be addressed. Another use of evolutionary or incremental approach
support users in Ireland until Vers. 3). A requirements workshops is to review allows the project to build hunks of
template for this document is provided issues and make decisions that best delivered code at a time, and then uses
them to learn how and where to pro-
Table 4: The Criteria of a Good Requirement ceed. Use versions, deliveries, releases,
and new products to accommodate the
Each Individual Requirement Should Be:
inevitable requirements changes.
Necessary If the system can meet prioritized real needs without the 7. Use an effective mechanism to con-
trol requirements changes and new
requirement, it is not necessary.

requirements. Controlling changes


Feasible The requirement is doable and can be accomplished within
may mean generating new releases.
available cost and schedule.

Most projects utilize Change Control


Correct The facts related to the requirement are accurate and it is

Boards (CCBs), but they usually address


technically and legally possible.

detailed project activities such as


Concise The requirement is stated simply.

changes in the code. Use of a higher-


Unambiguous The requirement can be interpreted in only one way.

level CCB (for example, the joint team I


Complete All conditions under which the requirement applies are stated,

recommend to be responsible for the


and the requirement expresses a whole idea or statement.

requirements) to maintain control of


Consistent The requirement is not in conflict with other requirements.

the requirements is a good example of


Verifiable Implementation of the requirement in the system can be proved.

applying added discipline on a project. It


Traceable The requirement can be traced to its source, and it can be tracked
throughout the system (e.g., to the design, code, test, and
is logical (though most often not done)
documentation).
that requirements should be prioritized,
Allocated The requirement is assigned to a component of the designed

and that the highest priority and most


system.

difficult requirements be addressed first.


Design The requirement does not pose a specific implementation

One reason to do this is that some


independent solution.

requirements are unknowable at the


Non-redundant The requirement is not a duplicate requirement.

beginning of a development effort it


Stated using a The requirement is stated as an imperative using the word shall.

requires some development work and


standard construct

related research effort to discover them.


Associated with a Each requirement has a unique identifying number.

It is critical to understand that changes


unique identifier

to requirements and new requirements


Devoid of escape Requirements do not use if, when, but, except, unless, and
clauses although and do not include speculative or general terms such as
can cause a project to go out of control,
usually, generally, often, normally, and typically.

6 CROSSTALK The Journal of Defense Software Engineering December 2006


Twelve Requirements Basics for Project Success

thus creating the need for a mechanism


to control them. I recommend limiting Risk Approach Suggested Risk Response Strategy
changes to a maximum of .5 percent per 1. Changing Mitigation Implement a high-level CCB (Joint Team);
month (6 percent per year) in the capa-
requirements conduct formal requirements reviews such as a

bility currently being developed in order


System Requirements Review.

to help keep the project under control


2. Incomplete or Mitigation Elicit requirements from a variety of

[12] 4.
missing stakeholders; conduct requirements workshops;

8. Use an effective automated require-


requirements conduct formal requirements reviews; and

ments tool to maintain information


ensure that all high-level requirements are

about the requirements. Although


addressed and met in the requirements work
products.
many projects do not follow this prac- 3. Unclear Mitigation Perform requirements analysis and rework
tice, in my judgment, an automated
requirements existing requirements; provide stakeholder

requirements tool is required for any


reviews of requirements work products; require

project except tiny ones. This is because


that an authoritative source be specified; and

it is necessary to have a lot of informa-


require verification of each requirement as part

tion concerning each requirement – its


of the planning for the test program.

attributes. For example, we need to know


4. Invalid Mitigation Revisit customer; re-establish needs; redevelop

the following:
requirements requirements; and delete requirements that do
(requirements that not have a good rationale or do not meet the
• The source of the requirement (who
may not specify criteria of a good requirement.
nominated it).
what the customer

• A unique identifying number for it.


really wants)

• Its priority (on a scale of one to


5. Infeasible Mitigation Revisit customer, re-establish needs, redevelop

three).
requirements requirements; and delete requirements that do

• Its relative cost to implement (low,


(requirements not have a good rationale or do not meet the

medium, high).
technically difficult criteria of a good requirement.

• Its relative difficulty to implement


to implement)
6. State-of-the-art Mitigation Obtain input from similar projects/companies;
(low, medium, high).
requirements perform detailed requirements analysis and find
• That each requirement meets the
(something never someone who has done it before and obtain

criteria of a good requirement (the


done before, or advice concerning lessons that were learned

criteria shown in Table 4 should be


your company has from doing something new or in a new way.

met for each requirement. If they


never done)

are not, it is likely that the require-


7. Inadequate Mitigation Establish interface management methods

ment statement is not really correct).


interface definition (Interface Requirements Documents/Interface

• The rationale for the requirement


Control Documents) and implement
responsibility assignment matrices.
(why is the requirement needed?)
8. Non-verifiable Mitigation Involve testers in early requirements
[13, 14] 5.
requirements development activities; and reword requirements

• Change history (how has the state-


to establish feasible compliance methods.

ment of the requirement changed


9. Incorrectly Mitigation Conduct formal requirements reviews and

over the system life?).


allocated implement a formal requirements management

• Traceability6 (of each requirement to


requirements tool.

its source, the design, code, test,


10. Non-traceable Mitigation Understand traceability more thoroughly and

documentation, training materials).


requirements perform detailed requirements analysis to
determine potential sources or to eliminate
• Status (draft, final, approved, pend-
non-traceable requirements.

ing approval, disapproved). Table 5: Suggested Requirements-Related Risk Response Strategies


• Assigned to (component of the sys-
tem). in delivered code that is a result of a • Provide stakeholder reviews of
Two related needs should be consid- requirement statement. Data from requirements work products.
ered. The first is that the requirements are NASA provided by requirements con- • Require that an authoritative source
used by different people (including cus- sultant and trainer Ivy Hooks show that document be specified.
tomers, users, and project team members) 80 percent of the requirements errors • Require verification of each require-
with different viewpoints [15]. We need to be that remain in delivered software are a ment as part of the planning for
able to organize the requirements to pro- result of incorrect facts (49 percent) and testing.
vide different perspectives, for example, for omitted requirements (31 percent) [8]. Some of the things that can be done to
customers, users, or testers. The order and This is truly amazing when you think address omitted requirements include
the actual requirements selected for these about it – clearly a key opportunity to the following:
activities are dependent on the viewpoint. improve requirements work. Making a • Elicit requirements from a variety of
The second need is that at any given time, concerted effort (investing more in the stakeholders.
one may need to see all requirements or requirements process) to avoid these • Conduct requirements workshops
only those changed ones; an automated two types of requirements errors can and review the requirements collab-
requirements tool provides the capability to save money and time and also improve oratively.
obtain various reports that are required to the quality of delivered capabilities. • Conduct formal requirements
perform good requirements work. Some of the things that can be reviews.
9. Avoid requirements errors. A require- done to address incorrect facts include • Ensure that all high-level require-
ments error is a defect that is discovered the following: ments are addressed and met in the

December 2006 www.stsc.hill.af.mil 7


Requirements Engineering

requirements work products. likely to be helpful. Consider discussing the tion: A Practical Approach.” Proc. of
10. Utilize inspections of requirements- contents of this article at a project staff the 1998 International Conference on
related documents. A technique many meeting with the objective of identifying Requirements Engineering (ICRE ‘98),
of us have heard about but may not the top three ideas, suggestions, or recom- 6-10 Apr. 1998, Colorado Springs.
have used in practice is the inspection. mendations to improve the requirements IEEE Computer Society (1998): 74-81
Data concerning the value of inspec- practices of your project.◆ <http://csdl2.computer.org/pers
tions is provided in [16]. An inspection agen/DLAbsToc.jsp?resourcePath=/dl
is a more vigorous form of peer review. References /proceedings/&toc=comp/pro ceed-
Inspections are not difficult to perform, 1. Whitten, Neal. Neal Whitten’s No- ings/icre/1998/8356/00/8356
and their use is cost-effective; a concise Nonsense Advice for Successful toc.xml>.
explanation of how to perform both Projects. Vienna, VA: Management 16. Gilb, Tom, and Dorothy Graham.
peer reviews and inspections and how Concepts, 2005. Software Inspection. Reading, MA:
to install a peer review process on a pro- 2. Young, Ralph R. Effective Addison-Wesley, 1993.
ject can be found in [17]7. Requirements Practices. Boston: 17. Wiegers, Karl E. Peer Reviews in
11. Enlist the support and assistance of Addison-Wesley, 2001. Software: A Practical Guide. Boston:
all members of the project staff in 3. Alexander, Ian F., and Richard Stevens. Addison-Wesley, 2002.
performing requirements work. It is Writing Better Requirements. London:
not just the requirements manager Addison-Wesley, 2002.
and/or the RA who need to be involved 4. Gottesdiener, Ellen. Requirements By
Notes
1. Personal e-mail to the author,
in requirements-related work on a pro- Collaboration. Reading, MA: Addison- September 2, 2006.
ject. Most members of the project staff Wesley, 2002. 2. Request a briefing available on this topic
can help; however, they need to be made 5. Young, Ralph R. The Requirements from facilitator Charles Markert <mark-
aware of how they can help and that the Engineering Handbook. Boston: Artech ert@facilitationcenter.com>. For addi-
PM’s expectation and request is that House, 2004.
tional information, see <www.mid-at
they do help. A technique I have used 6. The Standish Group. “What Are Your
lanticfacilitators.net/>.
successfully to accomplish this is an early Requirements?” West Yarmouth, MA:
3. The term real requirements may be new to
project requirements briefing that is made to The Standish Group International, Inc.,
2003. you. I refer to the requirements that are
the entire project staff. Participants in
the briefing can be invited to suggest 7. Wiegers, Karl E. Software Require- provided to developers by customers
how they can help with the require- ments. 2nd ed. Redmond, WA: Micro- and users as the stated requirements.
ments work with the objective of opti- soft Press, 2003 <www.processimpact. Industry experience has shown us that
mizing the efforts of all project mem- com/goodies.shtml>. the stated requirements are never the real
bers. A related need is to develop a 8. Hooks, Ivy F., and Kristin A. Farry. requirements for an application.
strong sense of teamwork throughout Customer-Centered Products: Creating Customers and users need help from
the project. In my experience, an Successful Products through Smart the development team to evolve the real
empowered and committed team can Requirements Management. New York: requirements from the stated require-
accomplish most anything it sets out The American Management Associa- ments. This is one reason project man-
to do. tion, 2001. agers should invest more time and
12. Work proactively to address require- 9. Stevens, Richard, Peter Brook, Ken money in the requirements process. It is
ments-related risks. As is well known Jackson, and Stuart Arnold. Systems
to practitioners, most projects do not Engineering: Coping with Complexity. About the Author
address the risks they face with the dis- London: Pearson Education Limited,
cipline that they should. There are many 1998. Ralph R. Young, Ph.D.,
excellent books concerning how to do 10. Young, Ralph R. “Recommended teaches courses concern-
this. A good starting point is Chapter 11 Requirements Gathering Practices.” ing requirements and
of [14]. Another source is [7], which CrossTalk Apr. 2002 <www.stsc. process improvement
provides a chapter on software require- hill.af.mil/crosstalk/2002/04>. and facilitates workshops
ments and risk management. Table 5 11. Leffingwell, Dean. “Calculating Your
to strengthen the use of
(see page 7) describes typical require- Return on Investment from More
ments-related risk response strategies Effective Requirements Management.” practices and techniques on projects. He
that should be helpful. Rational Corporation, 1997 <www. is the author of Effective Requirements
128.ibm.com/developerworks/ ratio- Practices, The Requirements Engineering
Summary nal/library/347.html>. Handbook, Project Requirements: A Guide to
From my experience in working with pro- 12. Jones, Capers. Estimating Software Best Practices, and co-authored Performance
jects of all sizes, there is a lot of benefit to Costs. New York: McGraw Hill, 1998. Based Earned Value.
investing in and continuously improving the 13. Whitten, Neal. “Meet Minimum Re-
project’s requirements process. There really quirements: Anything More Is Too
is no good excuse for the extent of rework Much.” PM Network, Sept. 1998.
Northrop Grumman Information

that is typically required on projects, or for 14. Young, Ralph R. “Project Require-
Technology Defense Group
the failure of projects, or even delivery of ments: A Guide to Best Practices.”
7575 Colshire DR
reduced functionality and/or over budget Vienna, VA: Management Concepts, McLean,VA 22102
or beyond schedule issues. It is within our 2006. Phone: (703) 556-1030
power to do better. Use of one or more of 15. Sommerville, I., P. Sawyer, and S. Viller. Fax: (703) 556-2802
the requirements basics discussed here is “Viewpoints for Requirements Elicita- E-mail: ralph.young@ngc.com

8 CROSSTALK The Journal of Defense Software Engineering December 2006


also an area where projects can leverage
the experience and expertise of qualified
requirements analysts.
4. Capers Jones has reported that the U.S.
average for requirements changes is
about 2 percent per month during the
design and coding phases, but can be
much higher [12, p. 429]. Two percent
per month equates to 24 percent per
year; this is too much change in my
experience to enable the project to
remain in control.
5. See Neal Whitten’s insightful and help-
ful article, “Meet Minimum
Requirements: Anything More is Too
Much” [13] to gain an understanding of
why it is in everybody’s best interests to
figure out the minimum set of require-
ments that will meet real needs. This
article is reprinted with the author’s per-
mission as an appendix in [14].
6. The best guidance available on the
important topic of traceability is James
D. Palmer’s article, “Traceability”, origi-
nally published in Software Requirements
Engineering, R. H. Thayer and M.
Dorfman Eds. 1997, pp. 364-374. This
article is reprinted with the author’s per-
mission as an appendix in [14].
7. Spend some time at Karl Wiegers’ Web
site. He offers a lot of downloadable
goodies, for instance, an automated
requirements prioritization worksheet
and the Vision and Scope Template
mentioned earlier in this article. See
<http://www.processimpact.com/goo
dies.shtml>. Why not leverage the
experience of others and also use tools
that are available and proven?

32 CROSSTALK The Journal of Defense Software Engineering December 2006

Das könnte Ihnen auch gefallen