Recognizing and Controlling Requirements Risk

$1,395.00


  • Virtual Classroom

  • Onsite
Duration: 3 Days

In this course, you will gain a better understanding of the nature of requirements risk and the need to control it. You will learn to prepare for requirements risk management by formulating a baseline requirements development process, providing tools, developing defect and root cause profiles, and conducting requirements retrospectives.

What You Will Learn

  • Avoid requirements-based failures by reconfirming needs and feasibility, managing customer expectations, prioritizing requirements, and incrementally committing to a project
  • Mitigate the impact of requirements-based defects by requiring frequent demos, decoupling vision from build, and building in multilane cycles
  • Minimize communication problems using rich definitions, algebraic formulas, spec patterns, and picture requirements information
  • Monitor requirements status by tracking requirements instability and growth, the accuracy of assumptions, and stakeholder participation
  • Identify unclear, imprecise, and missing information using requirements analysis and reviews with stakeholders
  • Build a cross-functional team and practice team success factors for requirements development by
  • Plan for requirements risk management by eliciting meta-requirements, by brainstorming risks, risk indicators, and root causes
  • Develop a requirements risk management strategy

Audience

  • Project sponsors
  • System users
  • Development directors
  • Project managers and leads
  • Requirements managers, leads, and analysts
  • System architects
  • Functional designers
  • Verification and test leads
  • Quality assurance staff
  • Process improvement leads

Prerequistes

Course Outline

1. Requirements Development

  • Challenge of communication
  • Why review and analysis don't fit find most defects
  • Role of human factors
  • Requirements are dangerous

2. Types of Requirements Risk

  • Application risk
  • Stakeholder risk
  • Process risk
  • Resource risk
  • Change risk
  • Implementation risk
  • Defect risk

3. Requirements Risk Management

  • Recognizing requirements risk
  • Forecasting project-specific dangers
  • Developing a strategy
  • Monitoring reality

4. Safety Tactics 1: Avoiding Requirements-Based Failures

  • Reconfirming reality of stated needs
  • Triage and prioritize requirements
  • Managing customer expectations
  • Reconfirming project feasibility or reduce scope
  • Identifying and resolving conflicts early
  • Committing incrementally

5. Safety Tactics 2: Mitigating Impact of Requirements-Based Problems

  • Requiring frequent demos of understanding
  • Decoupling vision from build
  • Prototyping unfamiliar functions and interfaces
  • Subdividing project scope
  • Building in multilane cycles

6. Safety Tactics 3a: Minimizing Communication Problems.

  • Maintaining a climate of safety and respect
  • Documenting assumptions
  • Marking intentional imprecision
  • Using rich definitions
  • Using derived values rather than "magic numbers"
  • User types and creating user personas
  • Clarifying with examples and measures
  • Structuring information with spec patterns
  • Picturing requirements information
  • Capturing context

7. Safety Tactics 3b: Minimizing Other Problems

  • Improving results of current requirements development process
  • Identifying minimal sets of marketable features
  • Focusing on quality and environmental requirements early
  • Identifying impacts and mitigation strategies
  • Analyzing benefits, risks, priorities, and costs of proposed requirements and changes

8. Safety Tactics 4: Monitoring Requirements Status

  • Monitoring requirements instability and growth
  • Monitoring accuracy of assumptions, expectations, and priorities
  • Monitoring stakeholder participation
  • Using workshops to find issues early
  • Incrementally review long specifications
  • Unclear, imprecise, and missing information
  • Estimating defect risk
  • Verifying satisfaction arguments of derived requirements
  • Tracking requirements defects
  • Analyzing and classifying requirements defects and root causes

9. Safety Tactics 5: Staffing for Requirements Development

  • Building cross-functional team
  • Supplementing with outside knowledge, skill, and experience
  • Replacing underperformers and disruptors
  • Training stakeholders in technical communication
  • Immersing stakeholders

10. Safety Tactics 6: Planning for Requirements Risk Management

  • Eliciting meta-requirements
  • Brainstorming risks and tactics
  • Risk indicators and root causes
  • Customizing requirements development and specification strategy
  • Customize, carry out, and monitor requirements risk management strategy

11. Safety Tactics 7: Preparing for Requirements Risk Management

  • Formulating baseline requirements processes
  • Systematizing change management, requirements defect, and failure tracking
  • Providing tools supporting safer requirements
  • Developing requirements defect and root cause profiles
  • Conducting requirements retrospectives

12. Safety Tactics 8: Compensating for Requirements-Based Problems

  • Estimating and tracking requirements-based rework
  • Adjusting for surprises

Exercises:

Exercise 1: Identify requirements risks

Exercise 2: Identify challenges of incremental commitment

Exercise 3: Create rich definitions, including a derived value, quality profile, and action contract

Exercise 4: Replace a "magic number" with a derived value

Exercise 5: Create a state transition table and then share with the entire group

Exercise 6: Requirements change measures

Exercise 7: Brainstorm risks and tactics for a case study

Exercise 8: Tactics usage process

Course Labs