COMP1787
COMP1787
REQUIREMENT MANAGEMENT
COURSEWORK
COMP1787 (2022/2023)
SUPERVISOR
MICHAEL OMAR
Greenwich University Vietnam
TABLE OF CONTENTS
LIST OF TABLES-------------------------------------------------------------------------------------------------------------------------------- 2
LIST OF FIGURES------------------------------------------------------------------------------------------------------------------------------- 2
SECTION A-------------------------------------------------------------------------------------------------------------------------------------- 2
INTRODUCTION----------------------------------------------------------------------------------------------------------------------------------2
THE TECHNICAL MODEL-------------------------------------------------------------------------------------------------------------------------2
SECTION B--------------------------------------------------------------------------------------------------------------------------------------- 3
HIGH LEVEL REQUIREMENTS ANALYSIS AND MOSCOW PRIORITISATION TOOLS:------------------------------------------------------------3
Project management Tools---------------------------------------------------------------------------------------------------------- 3
Evidence of Project management tool used-------------------------------------------------------------------------------------3
Agile project management---------------------------------------------------------------------------------------------------------- 4
FACILITATED WORKSHOP (MEETING)----------------------------------------------------------------------------------------------------------4
Planning communication------------------------------------------------------------------------------------------------------------ 5
Timebox guidelines.------------------------------------------------------------------------------------------------------------------- 5
B1: IDENTIFICATION OF REQUIREMENTS----------------------------------------------------------------------------------------------- 5
DOCUMENTING REQUIREMENTS.---------------------------------------------------------------------------------------------------------------5
Functional requirements:------------------------------------------------------------------------------------------------------------ 5
Non-functional:------------------------------------------------------------------------------------------------------------------------ 5
Gathering User requirement.------------------------------------------------------------------------------------------------------- 5
B2: REWRITE, AND ADD TO, THE LIST TO END UP WITH A TOTAL OF 8-10 ‘UPDATED’--------------------------------------5
B3: MOSCOW TECHNIQUE APPLIED APPROPRIATELY TO PRIORITISE THE REQUIREMENTS-------------------------------6
Discuss MosCow teschnique-------------------------------------------------------------------------------------------------------- 6
EXPRESSING REQUIREMENTS AND DESIGN WITH MODELS------------------------------------------------------------------------7
CAPTURING DESIGN-------------------------------------------------------------------------------------------------------------------------- 7
Module description------------------------------------------------------------------------------------------------------------------- 7
Functional Design artefacts from UML------------------------------------------------------------------------------------------- 7
Relational Database design artefacts--------------------------------------------------------------------------------------------- 7
UI Design-------------------------------------------------------------------------------------------------------------------------------- 8
SECTION C--------------------------------------------------------------------------------------------------------------------------------------- 8
LSEPI-------------------------------------------------------------------------------------------------------------------------------------------- 8
(C1) the role of the Data Controller within the organisation----------------------------------------------------------------8
(C2) any legal, social, ethical, and professional issues that MV may be faced with------------------------------------8
Legal-------------------------------------------------------------------------------------------------------------------------------------- 8
Social------------------------------------------------------------------------------------------------------------------------------------- 8
Ethical------------------------------------------------------------------------------------------------------------------------------------ 8
Professional issues-------------------------------------------------------------------------------------------------------------------- 8
BCS CODE OF CONDUCT--------------------------------------------------------------------------------------------------------------------- 8
- Public Interest:----------------------------------------------------------------------------------------------------------------------- 8
- Professional Competence and Integrity:---------------------------------------------------------------------------------------- 8
- Duty to Relevant Authority:------------------------------------------------------------------------------------------------------- 8
- Duty to the Profession:------------------------------------------------------------------------------------------------------------- 8
(C2) provide one practical example from the case study that relates to each aspect of LSEPI-----------------------8
ASSUMPTIONS--------------------------------------------------------------------------------------------------------------------------------- 9
CONCLUSION----------------------------------------------------------------------------------------------------------------------------------- 9
REFERENCES (HARVARD STYLE)----------------------------------------------------------------------------------------------------------- 9
NOTE:-------------------------------------------------------------------------------------------------------------------------------------------- 9
List of tables
TABLE 1: FACILITATED WORKSHOP-----------------------------------------------------------------------------------------------------------------3
TABLE 2: CAPTURING USER REQUIREMENTS------------------------------------------------------------------------------------------------------4
TABLE 3: LIST OF FR AND UPDATED LIST----------------------------------------------------------------------------------------------------------4
TABLE 4: LIST OF NF AND UPDATED LISTS---------------------------------------------------------------------------------------------------------5
TABLE 5: MOSCOW PRIORITIZATION--------------------------------------------------------------------------------------------------------------5
List of figures
FIGURE 1: PROEJECT MANAGEMENT TOOL--------------------------------------------------------------------------------------------------------2
FIGURE 2: WBS AND GANTT CHART - AGILE-----------------------------------------------------------------------------------------------------3
Section A
Introduction
This section should consider the following components:
• Introduces the rationale and the business drivers of this project.
• To be written in third person
• Capture the reader's attention.
Managerial model:
AGILE METHODS :
According to Hamilton(2023), Agile methodology is a technique that encourages ongoing
testing and development throughout the project's software development lifecycle. As opposed
to the Waterfall methodology, the Agile model for software testing involves concurrent
development and testing.
The choice of Agile method for this project can be explained by the following reasons:
The Agile methodology allows the product development team to focus on creating real product
value that meets the needs of the customer. Customers often have constantly changing
requirements, and the Agile approach allows the development team to adapt to these changes
flexibly.
Agile helps to increase responsiveness and speed of product development. By using themes
(sprints) and short-term development cycles, Agile allows development teams to control
progress and create more stable software products.
Agile also helps increase transparency in the project, helping members of the product
development team understand the requirements, progress and goals of the project.
Finally, Agile also helps increase creativity and innovation. Product development teams are
encouraged to periodically come up with new ideas and solutions during product development,
making the product unique and better.
RAD and TIMEBOXING
Rapid Application Development, or RAD, is a flexible approach to software development that
places less of a focus on detailed design and more on experimentation and quick feedback. In
general, the RAD approach places more emphasis on prototyping and development than it does
on planning.
The following arguments explain why I used Rapid Application Development for this project:
- RAD facilitates quicker application development and deployment using methods like
prototyping and iterative development, which cuts down on development time and
expenses.
Timeboxing:
According to Team(2022), timeboxing is a time management approach that restricts a task to a
predetermined (but realistic) timetable that, depending on the task complexity, may be
minutes, hours, days, or even weeks long.
I will apply time boxing to the this project which can be done as follows:
- Depending on the difficulty of the work in the backlog, each sprint has a time constraint
of 2 weeks.
- Team members gather to plan and assess the feasibility of completing tasks during each
sprint.
- The sprint's tasks must all be finished and satisfy the established quality standards.
- The team will hold a review and feedback session at the conclusion of each sprint to
assess its work and make adjustments for the following sprint.
- When some tasks are unable to be finished during the sprint, they are added to the
backlog to be finished during the following sprint.
The Chosen Method for development :
The primary reason why I chose Scrum as the method for developing the project is its flexibility.
Scrum is designed to accommodate changes in requirements and priorities, which is essential
for a project subject to change, as is the case with the project in question. The iterative
approach of Scrum ensures that the project is delivered in small increments, allowing constant
feedback and evaluation.
Another reason why I chose Scrum is that it is a highly collaborative approach to project
management. The Scrum team is cross-functional and self-organising, meaning that each team
member is responsible for a specific aspect of the project. The team members work together to
identify the requirements, create the product backlog, and prioritise tasks. This approach
encourages communication and collaboration, which is essential for the success of any project.
In conclusion, Scrum is an excellent methodology for managing complex and changing projects,
and it offers a flexible, collaborative, and iterative approach to project management. The
benefits of Scrum, including its ability to accommodate change, encourage collaboration, and
promote continuous improvement, make it an ideal choice for the project at hand.
Section B
High Level requirements analysis and MoSCoW prioritisation tools:
Project management Tools :
I choose Project Plan 365 as my project management tool because:
- Ease of use: Project Plan 365 has a simple and easy-to-use interface that allows users to
quickly and efficiently create project schedules, manage resources, and schedule tasks.
- Flexibility: Project Plan 365 allows users to customize project templates and
management options to fit the needs of specific projects.
- Update information in sync: Project Plan 365 allows users to store and share project
information in the cloud, and update information on multiple devices.
- Data analysis features: Project Plan 365 provides a variety of data analysis features,
helping users to track project progress and detect problems that may occur during
project implementation.
Planning communication
No Task Method Type Description
1 Meet with a Online Google meet/
Director MSTeams/Zoomz
Meet with Project In-person/Verbal Meeting room G410
Manager
Developers team Face to face Stand Up Meetings/
Users and Teams JAD JAD Join app
development
Timebox guidelines.
Integrating
Planning and
the completed
exploring phase Develop project
work of a Sprint
Kick-off of a sprint Improved
sprint evaluation
@20 -30% of
10% of effort @60-70% of effort
effort
B1: Identification of requirements that the student appropriate reasons are not
appropriate high-level requirements.
Documenting Requirements.
Specification
(Functional or Non-
Requirement functional
Person Problem User Understanding Definition Requirement)
Users need to
Daisy Lack of login securely access the A login facility should
Watson facility system be implemented FN: A login facility.
FN: A facility to keep
Need to keep Users need to track A facility to track track of funds, how
track of funds funds and funds and their they are allocated and
and their understand how allocation should be where they can be
allocation they are being used implemented applied.
Synchronization with
Need for Users need to see the organization's NF: Synchronization
synchronization accurate and up-to- banking system between the system
with banking date information should be built into and the organization’s
system about funds the prototype banking system.
FN: Addition of a
category for e-sports
Users want to donors when the
Lack of category categorize donors A category for e- facility for fundraising
Francis for e-sports based on their sports donors should activities is ported to
Smith donors interests be added the new system.
Users want to
Need for fast and efficiently access The system should NF: The system needs
responsive and process be fast and to be quick and
system information responsive responsive.
Users want to
Need to communicate with The system should
communicate businesses, allow for NF: Communication
with various individuals, and communication with with businesses,
sources of other sources of different types of individuals, and other
donations donations donors sources of donations.
Users need to plan
and manage events The system should
Need for events related to support events FN: Assistance in
planning support fundraising planning event planning.
Need for contact Users need to The system should FN: Facilitation of the
and mailing list manage contacts facilitate the collation of contacts
and mailing lists
related to collation of contacts
management fundraising and mailing lists and mailing lists.
Users want to
Need to categorize e-sports Different categories
Rohan categorize based on different for e-sports should FN: Classification of
Singh different e-sports criteria be created various e-sports.
FN: Consultation with
the scholarship
application and
Suitable criteria for management team
Users want to set each category should and experts to find
Need for criteria specific criteria for be defined with the suitable criteria for
for each category each category help of experts each category.
FN: Compilation of the
Users want to criteria for each
Need for tools to efficiently choose Tools to choose the category into
choose the best the best candidates best candidates preliminary
candidates for scholarships should be developed application forms.
Need to consult
with the scholarship Consult with the
application and scholarship
management team application and
Consult with the and experts to management team
scholarship determine suitable and experts to find FN: Availability of
application and criteria for each suitable criteria for tools to help choose
management t... category. each category. the best candidates.
The system should
allow real-time
changes to FN: Ability to make
application forms to real-time changes to
Real-time The scholarship be made by the the application forms
changes to be application and scholarship by the scholarship
Jan made to management team's application and application and
Dalton application forms workflow management team. management team.
The system should FN: Ability for
allow applicants to applicants to track the
track the status of status of their
Applicants Applicants need to their applications applications
tracking know the status of throughout the throughout the
application status their applications selection process. selection process.
Notification of Applicants need to The system should FN: Ability to notify
application know if they were notify applicants of applicants whether
the outcome of their
outcome successful or not application. they were successful.
The system should
Successful allow successful FN: Ability for
applicants need to applicants to applicants to formally
Ability to accept a accept scholarship formally accept a accept a scholarship
scholarship offer offers scholarship offer. offer.
The system should
allow the FN: Ability to manage
management of active scholarships by
active scholarships tracking deadlines,
by tracking setting up
Management of Management of deadlines, setting up notifications, and
active scholarships and notifications and making notes on the
scholarships their deadlines making notes. system.
NF: Inclusion of
relevant parts of the
Integration of The old system The prototype should old system,
relevant parts contains relevant integrate relevant integration into the
David from the old parts for the new parts from the old prototype, and
Dahl system prototype. system. testing.
The system should
Applicant Applicants need to allow applicants to FN: Ability for
Maya registration on register for the register on the applicants to register
Lou the system scholarship program system. on the system..
The system should
Applicants need to allow applicants to FN: Ability for
Viewing available view available view available applicants to view
scholarships scholarships scholarships. available scholarships.
The system should
automatically inform NF: Automatic
users of completed notification of
Applicants need to actions, such as completed actions,
Notification of know when they registration or such as registration or
completed have completed an submission of an successful submission
actions action application. of an application.
The system should FN: Ability for
allow applicants to applicants to supply
Context-sensitive Context-sensitive supply context- context-sensitive
information in information is sensitive information information when
scholarship required for each e- in their scholarship applying for a
application form sport game application form. scholarship.
User-friendly The system must be The system must be NF: User-friendliness
of the system, with
knowledge and
user-friendly and respect conveyed for
convey knowledge of each genre and
each genre and various electronic
system with easy to use and respect for the games, to ensure
knowledge of e- respect various e- various electronic applicants trust the
sport games sport games games. system.
Below is a list of requirements that I feel it is not appropriate the high-level requirements:
Requirements Reason why I choose
FN: Ability for applicants to track the status It is a process phase and makes no claims
of their applications throughout the selection about a particular result or outcome.
process.
FN: Availability of tools to help choose the The requirement is excessively general and
best candidates non-specific since it lacks precise standards
or techniques for judging candidates.
NF: Communication with businesses, The criteria is excessively general and non-
individuals, and other sources of donations. specific because it doesn't specify any
particular communication routes or protocols
to be employed.
FN: Ability to manage active scholarships by The requirement lacks specific tracking
tracking deadlines, setting up notifications, mechanisms or interfaces, making it too
and making notes on the system. vague and non-specific
B2: Rewrite, and add to, the list to end up with a total of 8-10 ‘updated’
functional and non- functional requirements for building the system. Approriate justification to
be provided for each of your requirements against information you have gathered from the
case study.
Figure 5:
o Pseudo-code:
Requirement : The login facility has a registration system that allows students to apply for the
scholarship program and integrates with Single Sign On (SSO) for ease of use and security.
Algorithm:
Infinite loop initialization
Ask users to enter student information and scholarship information
Check the validity of student information and scholarship information. If the information
is invalid, ask the user to re-enter it.
Call the function that enrolls the student in the scholarship program with the
information entered.
Check registration results. If successful, notify the user that the registration was
successful and exit the loop. If unsuccessful, error message and ask user to re-enter
student and scholarship information.
Go back to step 2 and continue the loop until registration is successful.
Here is a pseudocode for the login facility has a registration system that allows students to apply
for the scholarship program and integrates with Single Sign On (SSO) for ease of use and
security:
1. Display login page
2. If user clicks on "Register" button, go to step 3, else go to step 4
3. Display registration form with the following fields:
- First Name
- Last Name
- Email
- Password
- Confirm Password
- Checkbox for Scholarship program application
4. User enters their SSO credentials and clicks on "Sign In"
5. Validate the user's credentials with SSO provider
6. If the user is authenticated, redirect them to the home page, else display an error message
7. If user has applied for Scholarship program in step 3, save their details and mark them as
"Applied" in the database
The purpose of this algorithm is to help users log into the scholarship registration system and
apply the SSO feature to ensure security and convenience for users. The above pseudocode is
to describe an algorithm for login function for scholarship registration system. It helps users log
into the system and integrates the SSO feature to ensure safety and convenience for users.
Main
Success
Path
Actor Actions System Respones
Alternate
Path A1
Actor Actions System Respones
Exception E1
Path
Actor Actions System Respones
o Sequence diagram
o DFD’s
Must provide context diagram of the entire system
Followed by data flow diagram
UI Design
o Screen layout
o
Section C
LSEPi
(C1) the role of the Data Controller within the organisation
In recent years, organisations have become increasingly aware of the importance of protecting
the personal data of their customers, clients and employees. Brightstar Ltd. (BL), a charitable
organisation in the UK, is no exception. As part of its commitment to data protection, BL is
looking to appoint a Data Controller (DC) to help them comply with legal, social, ethical, and
professional requirements.
The DPA is a UK law that governs the processing of personal data. It gives individuals certain
rights in relation to their personal data, such as the right to access their data, the right to have
their data corrected, and the right to object to the processing of their data (Information
Commissioner's Office, 2021). The DC must ensure that BL complies with the DPA by
implementing appropriate policies and procedures, and by training staff on their obligations
under the Act.
According to Chai(2023), Confidentiality, integrity, and availability (CIA) are the three pillars of
information security. The DC must ensure that BL's data is secure and that access to it is
restricted to authorised personnel only. They must also ensure that data is accurate and up-to-
date, and that it is available when it is needed.
According to Wolford(2020), The GDPR is a European Union regulation that came into effect in
May 2018. It governs the processing of personal data and applies to all organisations that
process the data of EU citizens, regardless of where the organisation is based. The DC must
ensure that BL complies with the GDPR by implementing appropriate policies and procedures,
and by training staff on their obligations under the regulation.
The role of the DC within BL is crucial to ensuring that the organisation is compliant with data
protection legislation and that its data is secure. The DC must work closely with senior
management to develop and implement data protection policies and procedures, and must
ensure that staff are trained on their obligations under these policies. They must also respond
promptly and appropriately to DSARs and other requests for information.
In conclusion, the appointment of a Data Controller is an essential step for BL to ensure that
they are compliant with legal, social, ethical, and professional requirements. The DC plays a
critical role in ensuring that the organisation's data is protected and that staff are aware of their
obligations under data protection legislation. By appointing a DC, BL can demonstrate their
commitment to protecting the personal data of their stakeholders, and can enhance their
reputation as a responsible and trustworthy organisation.
(C2) Any legal, social, ethical, and professional issues that MV may be faced with.
Legal
Social
Ethical
Professional issues
There are various professional concerns that can develop in the case of BL, a nonprofit
organization that oversees scholarship applications and funds. Data privacy and security is
one such concern. The collecting and storage of sensitive personal data from candidates is
part of the scholarship application process. To guarantee that data is not mishandled or
misused, it is critical that BL's IT division implements proper security measures and that all
staff members are taught on data privacy rules and procedures.
Conflict of interest is another professional concern that might occur. BL has affiliations with
various universities and colleges, and certain staff members may have personal or financial
ties to these schools. All employees, especially those involved in scholarship application and
management, must preserve impartiality and justice in their decision-making procedures.
The BCS Code of Conduct can assist professionals in the IT industry, particularly those at BL,
in acting with integrity and accountability. Several principles are outlined in the BCS Code,
including acting in the public interest, preserving professional competence and integrity,
and performing duties to relevant authorities and the profession.
Acting in the public interest requires IT workers to examine the larger influence of their
work on society and accept responsibility for the potential consequences of their activities.
BL's IT division, for example, should guarantee that their systems and processes are
designed to preserve the privacy and security of scholarship candidates' personal data.
Maintaining professional competence and integrity entails constantly increasing skills and
knowledge in the sector, as well as ensuring that work is completed with honesty and
diligence. BL's IT section should maintain current on best practices in data security and
privacy, and all employees should be taught in these areas.
The duty to relevant authority entails IT professionals adhering to legal and regulatory
standards and cooperating with authorities as needed. BL's IT section should guarantee that
data protection rules and regulations, such as the GDPR, are followed and that any data
breaches are reported to the appropriate authorities.
Finally, obligation to the profession entails promoting the profession's ideals and beliefs as
well as acting with professionalism and accountability. In their work, BL IT professionals
should respect ethical standards and support the concepts of justice, transparency, and
responsibility.
Social: BL's decision to branch out into esports scholarships can be seen as a social issue.
Esports is a rapidly growing industry that appeals primarily to younger generations. By
offering esports scholarships, BL is catering to the changing needs and interests of younger
students, who may not have previously considered academic or sports scholarships.
However, there may be concerns that esports is not a socially acceptable activity and may
not be viewed favorably by all stakeholders.
Ethical: The ethical issue in the case study is the development of a new system to manage
esports scholarships. The head of the IT division, Flo Johnson, proposed building a highly
functional prototype system by re-using parts of the current system and adding new
functionalities. While this approach may be more efficient, it raises ethical concerns about
data privacy and security. BL must ensure that the new system adheres to ethical standards
and protects the privacy and security of personal information.
Professional issues: One example of a professional issue in the case study is the
development of a synchronisation system between the platform and the organization's
banking system. The lack of automatic communication or synchronisation between the two
systems has caused data integrity issues in the past, which is a professional issue. BL must
address this issue by developing a synchronisation system that minimizes human error and
ensures data integrity. This requires a professional approach and the involvement of IT
experts who can develop a robust system.
Assumptions
Conclusion
References: