Software Engineering. Lecture 10

Size: px
Start display at page:

Download "Software Engineering. Lecture 10"

Transcription

1 Software Engineering Lecture 10

2 1. What is software? Computer programs and associated documentation. Software products may be: -Generic - developed to be sold to a range of different customers - Bespoke (custom) - developed for a single customer according to their specification

3 What is software engineering? Software engineering is an engineering discipline (regulation), which is concerned with all aspects of software production. Software engineering is concerned with theories, methods and tools for professional software development

4 2. Software Requirements In this section we want to: To introduce the concepts of user and system requirements To describe functional and non-functional requirements To explain two techniques for describing system requirements To explain how software requirements may be organized in a requirements document

5 2.1 Requirements engineering Requirement Engineering: The process of establishing the services that the customer requires from a system and the constraints under which it operates and is developed Requirements: are the descriptions of the system services and constraints that are generated during the requirements engineering process

6 2.2 What is a requirement? It may range from a high-level abstract statement of a service or of a system constraint to a detailed mathematical functional specification

7 Requirements Levels of description: - requirements definition: high-level abstract description of requirements - requirements specification: detailed description of what the system should do - Software specification: More detailed description

8 Requirement Abstraction (Davis) Requirements may serve a dual function May be the basis for a bid for a contract - therefore must be open to interpretation May be the basis for the contract itself - therefore must be defined in detail Both these statements may be called requirements

9 2.3 Types of requirement User requirements (requirements definition): Statements in natural language plus diagrams of the services the system provides and its operational constraints. Written for customers System requirements (requirements specification): A structured document setting out detailed descriptions of the system services. Written as a contract between client and contractor Software specification: A detailed software description, which can serve as a basis for a design or implementation. Written for developers

10 Example: User requirement: 1. The software must provide means of representing and accessing external files created by other tools. System requirements 1.1 the user should be provided with facilities to define the type of external files. 1.2 each external file type may have an associated tool which may be applied to the file 1.3 each external file type may be represented as a specific icon on the users display

11 2.4 Functional and non-functional requirements Functional requirements: Statements of services the system should provide, how the system should react to particular inputs and how the system should behave in particular situations.

12 Functional requirements What inputs system should accept? What outputs system should produce? What data the system should store? What computations system should perform?

13 Non-functional requirements Non-functional requirements: constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.

14 Example User requirement Functional requirement: A need for an authorization facilities in the system Non Functional requirement: security

15 2.4.1 Functional requirements Describe functionality or system services Depend on: 1. the type of software 2.expected users 3.type of system where the software is used

16 Functional user requirements may be highlevel statements of what the system should do Functional system requirements should describe the system services in detail (inputs, outputs)

17 Examples of functional requirements for a university Library system The user shall be able to search either all of the initial set of databases or select a subset from it. The system shall provide appropriate viewers for the user to read documents in the document store. Every order shall be allocated a unique identifier (ORDER_ID)

18 Requirements imprecision Problems arise when requirements are not precisely stated Ambiguous requirements may be interpreted in different ways by developers and users results in: delays system delivery, increase cost Consider the term appropriate viewers User intention - special purpose viewer for each different document type Developer interpretation - Provide a text viewer that shows the contents of the document.

19 Requirements completeness and consistency In principle requirements should be both complete and consistent Complete: They should include descriptions of all facilities required Consistent: There should be no conflicts or contradictions in the descriptions of the system facilities In practice, it is impossible to produce a complete and consistent requirements document

20 Functional Requirements Examples

21 Example 1: Withdrawing money from ATM The system shall provide an option to withdraw money. The system shall query the user for the amount of money. The system shall query the user for the account type. The system shall validate the amount is available in the user s account before releasing funds to the user.

22 Example 1: Withdrawing money from ATM The system shall validate the amount is a multiple of $20. The system shall debit the user s account upon withdrawal of funds. The system shall be able to issue a specific amount of money to the user.

23 Examples of BAD Functional Requirements The system shall validate and accept credit cards and cashier s checks. What is the Problem in this requirement? Problem :two requirements instead of one. Suppose this Scenario: If the credit card processing works, but the cashier s check validation does not is this requirement pass or fail? Has to be fail, but that is misleading.

24 Examples of BAD Functional Requirements The system shall process all mouse clicks very fast to ensure user s do not have to wait. What is the Problem in this requirement? Problem: This is not testable. Quantify how fast is acceptable?

25 Examples of BAD Functional Requirements The user must have Adobe Acrobat installed. What is the Problem in this requirement? Problem: This is not something our system must do. It could be in the constraints/assumption but is not a functional requirement.

26 Non-Functional Requirements Examples

27 Example 1: Withdrawing money from ATM The system must handle 1,000 transactions per second (time/space bounds). user-friendliness. Interfaces with other systems (Interface requirements). system must have less than 1hr downtime per three months(reliability). permissible information flows, or who can do what (security)

28 Example 1: Withdrawing money from ATM system will need to survive fire.(safety) development time limitations, resource availability, limits on development. (Delivery) The customer must be able to access their account 24 hours a day, seven days a week. (reliability)

29 2.4.2 Non-functional requirements Define system properties and constraints Properties: reliability, response time and storage requirements. Constraints are I/O device capability, system representations, etc. Some non functional requirement may constrain the PROCESS used to develop the system.

30 Process requirements : specification that the design must be produced by a particular CASE system( Computer Aided Software Engineering), programming language or development method. Requirement?? Non-functional requirements may be more critical than functional requirements. If these are not met, the system is useless (implementation)

31 Examples of process requirements The development process to be used must be explicitly defined and must be conformant with ISO 9000 standards. What type of requirement? (Standard) The system must be developed using the XYZ suite of CASE tools. What type of requirement? (implementation) A disaster recovery plan for the system development must be specified What type of requirement? (safety)

32 Non-functional classifications Product requirements: Requirements, which specify that the delivered product must behave in a particular way e.g. execution speed, reliability, etc. Organisational requirements: Requirements, which are a consequence of organisational policies and procedures, e.g. process standards used, implementation requirements, etc. External requirements: Requirements, which arise from factors, which are external to the system and its development, process e.g. interoperability requirements, legislative requirements, etc.

33 Non-functional requirements examples Product requirement 4.C.8 It shall be possible for all necessary communication between the system and the user to be expressed in a user friendly interface Requirement is: Organisational requirement The system development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STAN-95.Requirement is: External requirement The system shall not disclose any personal information about customers apart from their name and reference number to the operators of the system (privacy) Requirement is: (Privacy) (usability) (standards)

34 Some Types of non-functional requirements with examples

35 Examples of Product requirements The System service X shall have an availability of 99%. Reliability Product Non functional System Y shall process a minimum of 8 transactions per second. Performance Efficiency Product Non Functional The executable code of System Z shall be limited to 512Kbytes. Space Efficiency Product Non Functional it specifies the maximum memory size of the system

36 Examples of Product requirements The system shall be developed for PC and Macintosh platforms. Portability Product Non Functional

37 Example of External requirement The system must encrypt all external communications using the RSA algorithm. Privacy legislative External Non Functional

38 Examples of external requirements In Medical data system : all data is maintained according to data protection legislation before the system is put into operation. Privacy legislative External Non Functional

39 Examples of External requirements The system shall not allow that the dose delivered to the patient to be greater than the maximum value which is determined by the patient s physician. Safety legislative External Non Functional The system shall not operate if the external temperature is below 4 degrees Celsius Safety legislative External Non Functional

40 Consistency between Functional and Nonfunctional Requirements. Example 1: To address security concerns one might have several choices, among them, setting a two level password or to use biometrics. Using a two level password would conflict with usability concerns while the use of biometric devices might conflict with cost concerns

41 Consistency between Functional and Nonfunctional Requirements. Example 2: We could have the following functional requirement: The system must have a file containing all the clients to be used by the Marketing Division. Together with this functional requirement we have the following NFR: This file must be complete enough to allow the Marketing Division to analyze prospective new clients. But an NFR associated with client s attendance states: Patient s admission must take less than 4 minutes. In this case, having a comprehensive file with all the information needed by the marketing division would possibly be conflicting with the goal of admitting a patient in less than 4 minutes.

42 Goals and requirements Non-functional requirements may be very difficult to state precisely and imprecise requirements may be difficult to verify. Goal: A general intention of the user such as ease of use. Verifiable non-functional requirement: A statement using some measure that can be objectively tested. Goals are helpful to developers as they convey the intentions of the system users.

43 Examples A system goal The system should be easy to use by experienced controllers and should be organised in such a way that user errors are minimised. A verifiable non-functional requirement Experienced controllers shall be able to use all the system functions after a total of two hours training. After this training, the average number of errors made by experienced users shall not exceed two per day.

44 Metrics for specifying non-functional requirements Performance Speed - Number of processed transactions per second - User/event response time - Screen refresh time Size - Kilobytes - Number of RAM chips

45 Robustness - Time to re-start after system failure -Percentage of events causing failure -Probability of data corruption on failure Integrity - Maximum permitted data loss after system failure

46 Some Objective Metrics for Nonfunctional Requirements Reliability - Mean time to failure - Probability of unavailability - Rate of failure occurrence - Availability

47 Ease of Use - Training time taken to learn 75% of user facilities - Average number of errors made by users in a given time period - Number of help frames Portability - Percentage of target-dependent statements - Number of target systems

48 Example: A verifiable non-functional requirement Experienced controllers shall be able to use all the system functions after a total of two hours training. After this training, the average number of errors made by experienced users shall not exceed two per day.

49 Requirements Evolution and Management Reasons for requirements change: 1- User gains better understanding of the requirements from the requirements elicitation, analysis and validation process. 2- New ways of working result from the introduction of the SW system itself. 3- Changes to the environment of the organization. 4- Changes to systems or processes within an organization.

50 Consequences of requirements change: Depends when in the life cycle the requirements change Best case review requirements specification Worst case changes to requirements, design, implementation, tests and documentation Modular design can minimize changes

51 Two Classes of Requirements Enduring Requirements Volatile Requirements

52 Enduring Requirements: Derived from an organization s core activity Relate directly to the problem domain Relatively stable

53 Volatile Requirements Derived from the environment of the system Likely to change during development or afterwards

54 Classes of Volatile Requirement Emergent from improved understanding of the problem. Consequential as a result of using the delivered system. Mutable from changes to the environment of the organization. Compatibility from changes to processes within the organization

55 Requirement documents and guidelines: Guidelines for writing requirements Invent a standard format and use it for all requirements. Use language in a consistent way. Use shall for mandatory requirements, should for desirable requirements. Use text highlighting to identify key parts of the requirement. Avoid the use of computer jargon.

56 The software requirements document: The requirements document : is the official statement of what is required of the system developers. Sometimes called the software requirement specification (SRS).

57 The software requirements document: Should include both a definition of user requirements and a specification of the system requirements. There are three cases: User and system requirements may be integrated into a single description User requirements are defined in an introduction to the system requirements specification If there are large number of requirements, the detailed system requirements may be presented as a separate document

58 The software requirements document: It is NOT a design document. As far as possible, it should set of WHAT the system should do rather than HOW it should do it

59 IEEE requirements standard Defines a generic structure for a requirements document that must be instantiated for each specific system. Introduction. General description. Specific requirements. Appendices. Index.

60 Requirements document structure based on IEEE standard Preface Introduction Glossary User requirements definition System architecture System requirements specification System models System evolution Appendices Index

Requirements Engineering. Establishing what the customer requires from a software system. Requirements Engineering. What is a Requirement?

Requirements Engineering. Establishing what the customer requires from a software system. Requirements Engineering. What is a Requirement? Engineering Establishing what the customer requires from a software system Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 5 and 6 Slide 1 Engineering

More information

Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 6 Slide 1

Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 6 Slide 1 Software Requirements Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 6 Slide 1 Objectives To introduce the concepts of user and system requirements To describe functional and non-functional

More information

SE351a: Software Project & Process Management. 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa

SE351a: Software Project & Process Management. 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa SE351a: Software Project & Process Management W4.1: Requirements Engineering 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa SE351 Roadmap Introduction to Software Project Management Project Management

More information

Requirements Engineering. Version October 2016

Requirements Engineering. Version October 2016 Requirements Engineering Version 1.11 26 October 2016 Maurizio Morisio, Marco Torchiano, 2016 Software development Customer Needs Acceptance testing Requirements Analysis System testing System Design Integration

More information

Requirements. Requirements. Types of Requirement. What Is a Requirement?

Requirements. Requirements. Types of Requirement. What Is a Requirement? Beatrice Åkerblom beatrice@dsv.su.se Everything else in software development depends on the requirements. If you cannot get stable requirements you cannot get a predictable plan... What Is a Requirement?!

More information

Lecture 6: Requirements Engineering

Lecture 6: Requirements Engineering Lecture 6: Requirements Engineering Software System Design and Implementation ITCS/ITIS 6112/8112 001 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte

More information

Software specification and modelling. Requirements engineering

Software specification and modelling. Requirements engineering Software specification and modelling Requirements engineering Requirements engineering (RE) Requirements engineering is the process of establishing the services that a customer requires from a system and

More information

Requirements Engineering: Specification & Validation. Software Requirements and Design CITS 4401 Lecture 18

Requirements Engineering: Specification & Validation. Software Requirements and Design CITS 4401 Lecture 18 Requirements Engineering: Specification & Validation Software Requirements and Design CITS 4401 Lecture 18 The Problems of Requirements What goal(s) are we trying to satisfy? How do we identify the scope

More information

SEG3201 Basics of the Requirements Process

SEG3201 Basics of the Requirements Process SEG3201 Basics of the Requirements Process Based on material from: I Bray: An introduction to Requirements Engineering Gerald Kotonya and Ian Sommerville: Requirements Engineering Processes and Techniques,

More information

Software Requirements and the Requirements Engineering Process. Chapters 5 and 6

Software Requirements and the Requirements Engineering Process. Chapters 5 and 6 Software Requirements and the Requirements Engineering Process Chapters 5 and 6 References Software Engineering. Ian Sommerville. 6th edition. Pearson. Code Complete. Steve McConnell. (CC) The art of triage.

More information

Ch 4: Requirements Engineering. What are requirements?

Ch 4: Requirements Engineering. What are requirements? Ch 4: Engineering What are? Functional and non-functional The software document specification engineering processes elicitation and analysis validation management The descriptions of what the system should

More information

Fundamentals: Software Engineering. Objectives. Last lectures. Unit 2: Light Introduction to Requirements Engineering

Fundamentals: Software Engineering. Objectives. Last lectures. Unit 2: Light Introduction to Requirements Engineering Fundamentals: Software Engineering Dr. Rami Bahsoon School of Computer Science University of Birmingham r.bahsoon@cs.bham.ac.uk Unit 2: Light Introduction to Requirements Engineering Dr R Bahsoon 1 Objectives

More information

VO Software Engineering

VO Software Engineering Administrative Issues Univ.Prof. Dr. Peter Auer Chair for Information Technology Email: auer@unileoben.ac.at Lecture Thursday 10:15 11:45 Project Lab Montag 16:00 19:00 Literature Helmut Balzert, Lehrbuch

More information

Requirements Engineering. Version November 2012

Requirements Engineering. Version November 2012 Requirements Engineering Version 1.8 11 November 2012 Maurizio Morisio, Marco Torchiano, 2012 Attribution-NonCommercial-NoDerivs 2.5 You are free: to copy, distribute, display, and perform the work Under

More information

Chapter 4 Requirements Engineering

Chapter 4 Requirements Engineering Chapter 4 Requirements Engineering Chapter 4 Requirements Engineering Slide 1 Topics covered Why RE is hard... Functional and non-functional requirements Product vs. organizational vs. external requirements

More information

UNIT-II REQUIREMENTS ANALYSIS AND SPECIFICATION

UNIT-II REQUIREMENTS ANALYSIS AND SPECIFICATION UNIT-II REQUIREMENTS ANALYSIS AND SPECIFICATION The for a system are the descriptions of what the system should do the services that it provides and the constraints on its operation. User are statements,

More information

Requirements engineering

Requirements engineering engineering Chapter 4 1 Engineering in the textbook 4.1 Functional and non-functional 4.2 The software document 4.4 engineering processes 4.5 elicitation and analysis 4.3 specification 4.6 validation 4.7

More information

Requirement Analysis

Requirement Analysis Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)

More information

Lecture 8 Requirements Engineering

Lecture 8 Requirements Engineering Lecture 8 Requirements Engineering Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 18, 2008 Lecture Overview

More information

Lecture 9 Requirements Engineering II

Lecture 9 Requirements Engineering II Lecture 9 Requirements Engineering II Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 23, 2008 Announcements

More information

Topic: Software Verification, Validation and Testing Software Engineering. Faculty of Computing Universiti Teknologi Malaysia

Topic: Software Verification, Validation and Testing Software Engineering. Faculty of Computing Universiti Teknologi Malaysia Topic: Software Verification, Validation and Testing Software Engineering Faculty of Computing Universiti Teknologi Malaysia 2016 Software Engineering 2 Recap on SDLC Phases & Artefacts Domain Analysis

More information

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author> <organization> <date created>

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author> <organization> <date created> Software Requirements Specification for Version 1.0 approved Prepared by Copyright 2002 by Karl E. Wiegers. Permission is granted to use, modify, and distribute

More information

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.

More information

UNIT II SOFTWARE REQUIREMENTS 9

UNIT II SOFTWARE REQUIREMENTS 9 UNIT II SOFTWARE REQUIREMENTS 9 Functional and non-functional - user system requirement engineering process feasibility studies requirements elicitation validation and management software prototyping prototyping

More information

Requirements Engineering

Requirements Engineering Requirements Engineering An introduction to requirements engineering Gerald Kotonya and Ian Sommerville G. Kotonya and I. Sommerville 1998 Slide 1 Objectives To introduce the notion of system requirements

More information

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created> Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision

More information

Software Requirements Specification (SRS) Software Requirements Specification for <Name of Project>

Software Requirements Specification (SRS) Software Requirements Specification for <Name of Project> Software Requirements Specification (SRS) Software Requirements Specification for Version Release Responsible Party Major Changes Date 0.1 Initial Document Release for

More information

Requirements Engineering

Requirements Engineering Dr. Michael Eichberg Software Engineering Department of Computer Science Technische Universität Darmstadt Software Engineering Engineering The following slides are primarily based on the contents of the

More information

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you?

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you? This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

Operating system. Hardware

Operating system. Hardware Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software

More information

Software Engineering Unit 4- Requirement Analysis and Specification

Software Engineering Unit 4- Requirement Analysis and Specification Software Engineering Unit 4- Requirement Analysis and Specification Requirement Engineering The process to gather the software requirements from client, analyze and document them is known as requirement

More information

CH 13 APPLICATION ANALYSIS

CH 13 APPLICATION ANALYSIS CH 13 APPLICATION ANALYSIS APPLICATION INTERACTION MODEL Steps: Determine system boundary Find actors Find use case Find initial & final events Prepare a normal scenario Add exception scenario Prepare

More information

Order of Malta Volunteers Privacy Statement

Order of Malta Volunteers Privacy Statement Order of Malta Volunteers Privacy Statement The Order of Malta Volunteers ( the OMV, We, Us ), is a charity registered in England and Wales with charity number 1164242. Its registered address is 13 Deodar

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering Gérald Monard Ecole GDR CORREL - April 16, 2013 www.monard.info Bibliography Software Engineering, 9th ed. (I. Sommerville, 2010, Pearson) Conduite de projets informatiques,

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. Holland & Odam Updated 4 th May 2018 This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand

More information

Software Engineering

Software Engineering Software Engineering JUNBEOM YOO Dependable Software Laboratory KONKUK University http://dslab.konkuk.ac.kr Ver. 2.0 (2010.06) This lecture note is based on materials from Ian Sommerville 2006. Anyone

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Request for Quotation (RfQ)

Request for Quotation (RfQ) Request for Quotation (RfQ) For ONVIF Technical Services Committee Device Test Tool Evolution WG Project Ash Circulation: 2017-June-02 Quotation Due: 2017-June-19 Copyright ONVIF 2017. All rights reserved.

More information

Meritain Connect User Manual. for Employees. 1 Meritain Connect User Guide for Employees

Meritain Connect User Manual. for Employees. 1 Meritain Connect User Guide for Employees Meritain Connect User Manual for Employees 1 Meritain Connect User Guide for Employees Contents Introduction... 4 Accessing Meritain Connect... 5 Logging In... 5 Forgot Password... 6 Registration Process...

More information

enter into application on 25 May 2018

enter into application on 25 May 2018 General Data Protection Regulation What is GDPR? Is GDPR applicable for you? Which actions are required from you (and us)? Which rights do your clients have and which services can KBC Securities s provide

More information

Lecture 5: Requirements Specifications

Lecture 5: Requirements Specifications Lecture 5: Requirements Specifications Why we need to write specifications Purpose and audience Choosing an appropriate size and formality Desiderata for Specifications Properties of good specifications

More information

The Clinical Data Repository Provides CPR's Foundation

The Clinical Data Repository Provides CPR's Foundation Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The

More information

Corso di Progettazione di Applicazioni Web e Mobile

Corso di Progettazione di Applicazioni Web e Mobile Corso di Progettazione di Applicazioni Web e Mobile Mirko Calvaresi Università di Camerino - Mirko Calvaresi - Progettazione Applicazioni Web e Mobile What this is about? How a web appliaction works? let

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

ISO Lead Implementation

ISO Lead Implementation FINAL CERTIFICATION AWARDED BY IMRTC - USA ISO 22000 Lead Implementation Training Program ISO 22000 FOOD SAFETY MANAGEMENT SYSTEM (FSMS) Course Introduction Food safety management systems (FSMS) are intended

More information

Lehigh County, PA Frequently Asked Questions

Lehigh County, PA Frequently Asked Questions Lehigh County, PA Frequently Asked Questions General How do I access the Odyssey File & Serve system? To access the Odyssey File & Serve website, go to the Lehigh website. How do I contact the Lehigh County

More information

Privacy Policy (with effect from 25 th May 2018)

Privacy Policy (with effect from 25 th May 2018) Privacy Policy (with effect from 25 th May 2018) Ron Sammons Ltd t/a TECO Building Products, (company number 01398336), having a registered office at The Gables, Codmore Hill, Pulborough, West Sussex RH20

More information

An Introduction to VRS (Visitor Registration System)

An Introduction to VRS (Visitor Registration System) An Introduction to VRS (Visitor Registration System) Edition 1 March 2016 Document Reference: 3851_v2-2018 An Introduction to VRS (Visitor Registration System) Contents 1. Introduction Who is a visitor

More information

Quality in Use: Achieving Stakeholder Needs for Quality

Quality in Use: Achieving Stakeholder Needs for Quality 1 Quality in Use: Achieving Stakeholder Needs for Quality Nigel Bevan www.nigelbevan.com nigel@nigelbevan.com Professional Usability Services Nigel Bevan. Reproduction permitted provided the source is

More information

1. Definitions and Interpretation In this Policy, the following terms shall have the following meanings:

1. Definitions and Interpretation In this Policy, the following terms shall have the following meanings: Capital Karts Privacy Policy Introduction Capital Karts understands that your privacy is important to you and that you care about how your personal data is used and shared online. We respect and value

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of

More information

Argyll Self Catering Privacy Statement 2018

Argyll Self Catering Privacy Statement 2018 Argyll Self Catering Privacy Statement 2018 Dated: May 2018 Who is responsible for managing my information? and all websites and brochures operated by United Kingdom This is our Privacy Notice and it explains

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Chapter Two: Conformance Clause

Chapter Two: Conformance Clause HL7 EHR TC Electronic Health Record - System Functional Model, Release 1 February 2007 Chapter Two: Conformance Clause EHR Technical Committee Co-chairs: Linda Fischetti, RN, MS Veterans Health Administration

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

CIS 890: Safety Critical Systems

CIS 890: Safety Critical Systems CIS 890: Safety Critical Systems Lecture: Requirements Introduction Copyright 2011, John Hatcliff. The syllabus and all lectures for this course are copyrighted materials and may not be used in other course

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

Table of Contents Storage Location of Document... 5 Document Details... 5 Approvals... 5

Table of Contents Storage Location of Document... 5 Document Details... 5 Approvals... 5 Table of Contents Storage Location of Document... 5 Document Details... 5 Approvals... 5 Regions... 7 Regions Icons... 7 Regions Screen... 7 Regions Steps... 8 Units... 9 Units Icons... 9 Units Screen...

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT

More information

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Updated December 12, Chapter 10 Service Description IBM Cloud for Government Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal

More information

Product Quality Engineering. RIT Software Engineering

Product Quality Engineering. RIT Software Engineering Product Quality Engineering Q vs q Quality includes many more attributes than just absence of defects Features Performance Availability Safety Security Reusability Extensibility Modifiability Portability

More information

AC63/AT63/AC114/AT114 SOFTWARE ENGINEERING DEC 2015

AC63/AT63/AC114/AT114 SOFTWARE ENGINEERING DEC 2015 Q.2 a. What is System Engineering? Explain in detail. (12) Systems engineering is the activity of specifying, designing, implementing, validating, deploying and maintaining socio technical systems. Concerned

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document

More information

IBM Software Group. Mastering Requirements Management with Use Cases Module 8: Refine the System Definition

IBM Software Group. Mastering Requirements Management with Use Cases Module 8: Refine the System Definition IBM Software Group Mastering Requirements Management with Use Cases Module 8: Refine the System Definition 1 Objectives Describe design constraints. Identify methods of specifying functional requirements.

More information

First National Bank and Trust P. O. Box 100 London, KY Attention: Statements

First National Bank and Trust P. O. Box 100 London, KY Attention:  Statements is pleased to offer Email Statements. These statements are an electronic version of the paper statements that are delivered to customers, and will include check images. Since email statements do not rely

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Software testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1

Software testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Software testing Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles

More information

SECTION SPECIAL SYSTEMS. Website and Construction Cameras

SECTION SPECIAL SYSTEMS. Website and Construction Cameras PART 1 GENERAL SECTION 01121 SPECIAL SYSTEMS 1.01 WORK INCLUDED A. Project Construction Site Cameras and Video Streaming Servers B. Project Web site C. Network & Infrastructure D. Internet Connectivity

More information

Unit 1 Introduction to Software Engineering

Unit 1 Introduction to Software Engineering Unit 1 Introduction to Software Engineering João M. Fernandes Universidade do Minho Portugal Contents 1. Software Engineering 2. Software Requirements 3. Software Design 2/50 Software Engineering Engineering

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

N.B This process description is to be read in conjunction with the associated MPF ALID Help Line - Terms of Access specified in the next slide.

N.B This process description is to be read in conjunction with the associated MPF ALID Help Line - Terms of Access specified in the next slide. MPF Access Line Identifier Help Line Tactical Process MPF line identification at multiple MPF sites Consumer scenarios:- - Migrations & - WLTO Homemoves N.B This process description is to be read in conjunction

More information

Privacy Policy. Full name and contact details (including your contact number, and postal address).

Privacy Policy. Full name and contact details (including your contact number,  and postal address). 01326 270212 sales@htiddy.co.uk www.htiddy.co.uk Privacy Policy This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this

More information

Mathematics and Computing: Level 2 M253 Team working in distributed environments

Mathematics and Computing: Level 2 M253 Team working in distributed environments Mathematics and Computing: Level 2 M253 Team working in distributed environments SR M253 Resource Sheet Specifying requirements 1 Overview Having spent some time identifying the context and scope of our

More information

Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview

Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn, Virginia 22209 USA Copyright

More information

Introduction to Architecture. Introduction to Architecture 1

Introduction to Architecture. Introduction to Architecture 1 Introduction to Architecture Introduction to Architecture 1 Content What is architecture? Motivation for architecture Non-functional requirements Introduction to Architecture 2 What is architecture? The

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

EU Data Protection Agreement

EU Data Protection Agreement EU Data Protection Agreement This Data Protection Agreement ("Agreement") is entered into by and between TechTarget, Inc., a Delaware corporation with a principle place of business at 275 Grove Street,

More information

Contents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE

Contents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over

More information

Recommended Practice for Software Requirements Specifications (IEEE)

Recommended Practice for Software Requirements Specifications (IEEE) Recommended Practice for Software Requirements Specifications (IEEE) Author: John Doe Revision: 29/Dec/11 Abstract: The content and qualities of a good software requirements specification (SRS) are described

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

PageScope Box Operator Ver. 3.2 User s Guide

PageScope Box Operator Ver. 3.2 User s Guide PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 110: Dialogue principles

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 110: Dialogue principles INTERNATIONAL STANDARD ISO 9241-110 First edition 2006-04-01 Ergonomics of human-system interaction Part 110: Dialogue principles Ergonomie de l'interaction homme-système Partie 110: Principes de dialogue

More information

ICT User Access Security Standard Operating Procedure

ICT User Access Security Standard Operating Procedure ICT User Access Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised

More information

Lecture 7 (3-April-2013)

Lecture 7 (3-April-2013) SOFTWARE QUALITY ASSURANCE Lecture 7 (3-April-2013) Instructor: Mr. Natash Ali Mian Department of CS and IT Department of CS and IT The University of Lahore ` Switch off mobile phones during lectures,

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

Accessing COMPASS from Your Home or Office

Accessing COMPASS from Your Home or Office Accessing COMPASS from Your Home or Office IMPORTANT: Please Read! 1. We encourage you to have your office manager or IT professional establish access for you using these instructions. 2. You can establish

More information

Microsoft Deploying, Configuring, and Administering Microsoft Lync Server 2010

Microsoft Deploying, Configuring, and Administering Microsoft Lync Server 2010 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10533 - Deploying, Configuring, and Administering Microsoft Lync Server 2010 Length 5 days Price $4290.00 (inc GST) Overview This five-day instructor-led

More information

PATIENT ACCESS REQUEST FOR MEDICAL RECORDS

PATIENT ACCESS REQUEST FOR MEDICAL RECORDS PATIENT ACCESS REQUEST FOR MEDICAL RECORDS Patient s Legal Name: Telephone: ( ) Address: Date of Birth: As provided by the Health Insurance Portability and Accountability Act ( HIPAA ), I am requesting

More information

Online Statements Disclosure

Online Statements Disclosure Online Statements Disclosure Rev. 04/30/13 DEFINITIONS "We", "Our", "Us" or "The Bank" mean Central Pacific Bank. "You" and "your" mean the account owner(s) authorized by the Bank to receive account statements

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Calling Line Identification (CLI) Code of Practice

Calling Line Identification (CLI) Code of Practice Calling Line Identification (CLI) Code of Practice Information Notice 05/02 Gibraltar Regulatory Authority Suite 603, Europort, Gibraltar Telephone: +350 20074636 Fax: +350 20072166 Website: www.gra.gi

More information

Requirements Elicitation

Requirements Elicitation Requirements Elicitation Introduction into Software Engineering Lecture 4 25. April 2007 Bernd Bruegge Applied Software Engineering Technische Universitaet Muenchen 1 Outline Motivation: Software Lifecycle

More information