Evaluation Protocols

Size: px
Start display at page:

Download "Evaluation Protocols"

Transcription

1 PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D6.1 Evaluation Protocols Call: Objective: FP7-ICT ICT ICT for smart and personalised inclusion Contractual delivery date: (M6) Actual delivery date: Version: Editor: Contributors: Reviewers: v1 Andreas Braun (FhG) Silvia Rus (FhG) Juan Carlos Augusto (MU) Terje Grimstad (Karde) Dissemination level: Public Number of pages: 20 1

2 Contents Contents Executive Summary Introduction System evaluation in POSEIDON POSEIDON Timeline Best practice of system evaluation Measuring the impact of POSEIDON POSEIDON requirements Technical evaluation of POSEIDON Evaluating requirements Requirement adherence Risk estimation Evaluation process Organization Managing potential requirement revision Result Template User experience evaluation of POSEIDON Evaluation of user experience requirement Evaluation process Organization User experience requirements Conclusion References

3 1 Executive Summary The deliverable D6.1 - Evaluation Protocols - is the first deliverable of Work Package 6 - Validation. The deliverable is linked to task T6.1 - Technical Assessment and has a number of connections to deliverables of Work Packages 2, & 5. It is based on deliverables D2.1 - Report on requirements and D2.3 - Report on Design of HW, Interfaces, and Software that build the foundation for the technical Work Packages. These requirements are driving development in Work Packages 3, 4 & 5. For this document we are also considering D5.1 - Development framework that describes the different components and their specific requirements. Additionally, Section of Part B of the POSEIDON DoW lists different expected outcomes and the measures to assess their impact. The document gives an introduction to the system evaluation, restating the timeline of POSEIDON and the requirement driven development process. We show relevant best practice of system evaluation and how it relates to the methods used for the POSEIDON evaluation. The process of the technical evaluation is outlined, stating both methods and management layout. The evaluation will be based on assessing the adherence to requirements and the associated risk of not meeting them. Additionally, the process of the user evaluation is briefly recapitulated and an introduction of the management is given. A template for the evaluation including the process to estimate the mentioned risk concludes this document. 3

4 2 Introduction In the scope of POSEIDON a variety of different technical systems will be developed and integrated into a common platform. Thus it is crucial to monitor and evaluate the performance of the system including, but not limited to hardware, interface, software, integration routines, but also contributions to safety, privacy and ethics. This task is integrated into Work Package 6 - Validation, as Task Technical Assessment. This task is intended to materialize the mechanisms that are envisaged to produce a highly reliable and useful product. In this scope the compliance to requirements will be double-checked, a link between requirements and testing, as well as monitoring the validation and pilots including the design revisions. This deliverable D6.1 Evaluation Protocols outlines the different steps involved in the testing process. This will range from analyzing the best practice in this domain and the prerequisites of POSEIDON, to the creation of evaluation protocols themselves - that will be used in the validation phase to quantify the performance of the technical systems. The system evaluation of POSEIDON is driven in part by the project specific timeline of pilots and studies. The most important factor is to verify adherence to the previously defined requirements gathered in Work Package 2. The technical systems that are to be developed in WP3, WP4 and WP5 should be tested according to the process specified in this document. The evaluation process is strictly based on the requirements that are defined and can be detailed in the scope of the validation. 4

5 3 System evaluation in POSEIDON 3.1 POSEIDON Timeline The interface strategy strongly depends on the requirements gathered during the requirement analysis. The interviews of the primary user, the online questionnaires of the secondary and tertiary user and the first user workshop have all contributed to this process. From these requirements an interface strategy is extracted, imminently followed by an implementation in form of an integrated prototype. In Fig. 1, (b) and (d), the requirements gathering phase and the first user workshop followed by f when the first interfaces and interactive technology are set up, are represented respectively. The created prototype (g) is evaluated in the second user workshop (h) and the outcome of the workshops is subsequently analyzed. The feedback is taken into account and the interface (l) is adjusted, when the interfaces are completely defined. This iterative process for the interfaces is finished in step r, when the improved interfaces are set up. Fig. 1 Project and work package milestones and events From this timeline we can identify a set of milestones of the technical systems developed in the scope of POSEIDON. The relevant events determining the points in which the system is tested are the user workshops and the continuous pilots of integrated prototypes. Therefore, we have the following short list of events that are directly associated to the system evaluation in WP6. 5

6 Table 1 Important events related to evaluation in POSEIDON Event Description Time in Planned date project 1 st User Group Marks the end of the requirements gathering M3 January 2014 Workshop face - requirements refinement 2 nd User Group Workshop Indicates successful implementation of first set of requirements M10 September 2014 First Pilot Testing of integrated prototype over a longer time M20-21 from July 2015 Second Pilot Testing of second integrated prototype over a longer time M30-31 from May 2016 Final Workshop Final check of requirements and post-project planning M36 October 2016 From those dates the first user group workshop has a special role, as it marks the end of the requirement gathering process and the adherence to requirements can t be validated already. Instead the primary purpose is to finalize the list of requirements and elucidate new ones according to the feedback gathered from the users. The next three events are the primary important events in the scope of the process described in this deliverable. During those events the systems are tested by the users and the evaluators can determine how well the requirements set for this specific stage have been fulfilled. Afterwards, the set of requirements to be fulfilled for the next stage can be adapted and refined according to the results of the testing. The last event is primarily intended to prepare the potential market launch of the POSEIDON system and can also act as a final check of adherence for all requirements, in order to verify that the full system is running with all intended functionality and at the intended level of stability. The process of evaluation is closely following the requirements gathering process, as specified in WP2. In the next section some best practice of system evaluation in general and the necessary aspects of requirements engineering specifically. 3.2 Best practice of system evaluation A large body of literature has been written on testing systems for conformity, adherence, robustness and feature-completeness. The goal is always to assure that a certain level of quality is reached that has been defined early in the project [1]. POSEIDON is following an approach that is based on defining and testing a set of requirements that are to be fulfilled at different stages of the project. Thus, we are using an approach that known in software development as Requirements Engineering. Requirements engineering describes the process of formulating, documenting and maintaining software requirements and to the subfield of Software Engineering concerned with this process [2]. Typically we can distinguish a set of seven different steps in this process, namely [3]: 1. Requirements inception or requirements elicitation - 2. Requirements identification - identifying new requirements 3. Requirements analysis and negotiation - checking requirements and resolving stakeholder conflicts 4. Requirements specification (Software Requirements Specification) - documenting the requirements in a requirements document 6

7 5. System modeling - deriving models of the system, often using a notation such as the Unified Modeling Language 6. Requirements validation - checking that the documented requirements and models are consistent and meet stakeholder needs 7. Requirements management - managing changes to the requirements as the system is developed and put into use As we are not solely developing software in POSEIDON this process has to be adapted to cater also to the requirements of the different hardware systems that will be developed. These adaptations are discussed in the following section. 3.3 Measuring the impact of POSEIDON In the application phase of POSEIDON, the consortium included a number of different considerations into the initial proposal concerned with measuring the impact of POSEIDON. We would like to briefly revisit these considerations and put them into context. The impact measurement is based on analysing a set of expected outcomes with a specific measure of success. They are listed in Table 2. Five different expected key outcomes are listed together with a proposed measure of success. In the evaluation phase we will transfer the measures and outcomes into requirements that can be mapped regarding the procedure outlined in the other chapters of this document. We will iteratively revisit this table and track the progress throughout all project phases. Table 2 How outcomes are measured in POSEIDON Expected Outcomes Novel accessibility solutions for user groups at risk of exclusion. Enhanced quality of life for people at risk of exclusion, including people with disabilities, older people and people with low digital literacy and skills. Strengthened possibilities of employment to nonhighly specialised professionals. Proposed Measure of Success One novel service/application with many functions that is available for people with DS (primary user group) and other intellectual disabilities. Results of testing in primary user group positive so development/production and marketing of the product will proceed. Interest organisations for DS and also for other persons with intellectual disabilities, positive to the product and will spread information about it (at conferences etc.) because they think it is useful. The measurement of these outcomes can be done more precisely during the last trimester of the project as part of the preparations for bringing the product to market. More than 50% of representatives for target group (including parents, carers, and teachers) find that our product makes persons with DS more independent and autonomous in their daily life. The impact of the product will also be observed in daily situations. Mastering of the technology developed will be measured by observations and interviews of representatives (parents, carers, teachers etc.) and interviews of people with DS. More than 50% of persons in target group like to use the product. These measurements will be done through the pilots [months 10 and 20] and the user group workshops [months 3, 10, 36] which will allow us to trace the variations in response in relation to the evolutions of the system. The more independent and autonomous in daily life the greater is the chance of employment for people with DS and other intellectual disabilities. Increased independence within the environment will be measured by: be evidenced by an increasing response to technical triggers rather than being told what to do next. 7

8 Improved competitiveness of European ICT industry in the field of inclusive smart environments and services. Wider availability and effectiveness of developers tools for creating inclusive smart environments (targeted to SMEs, key mainstream industrialists, open-source developers, and other less technical developers). result in relationships that depend less on instruction and more on engagement, to better facilitate mutual relationships. These measurements will be achieved through a combination of information gathered by the kits on their usage and the feedback provided by the users in each pilot. The US is ahead of Europe with regard to ICT devices and programmes for people with intellectual disabilities (for example Ablelink Technologies). Our service/ application will reduce the gap. Our service/application will be adaptable to different countries, cultures and languages. This will be tested in different European countries. A measure of acceptance is that relevant organizations for targeted beneficiaries find that the product is good and say so at conferences, meetings etc. to increase the use of the product. The measurement of these will be performed along the life of the process by contacting those who are interested in the project from any dimension. The findings will be compiled and summarized for the final report. The aim of POSEIDON is to make some relevant inclusion services and a framework which should enable a wide range of developers to provide services for people with DS. Increased number of inclusion services and interest will be measured by: Number of developers participating in POSEIDON social media. Number of companies providing POSEIDON services. Number of POSEIDON apps/services provided in different countries. The methods and architecture developed for the product establish a best practise from which others can learn. Some of these measurements can be only performed partially and at late stages of the project (after month 30) when the system is fully fledged and we can start transitioning to market deployment. Findings and evidence of these will be described in the final report. 3.4 POSEIDON requirements The interface strategy is closely related to D2.1 - Report on requirements and to D2.3 - Report on Design of HW, Interfaces, and Software. The general design principles for interfaces have been presented in D2.3. Therefore, parts of the following section regarding the design principles are taken from there, while section regarding the requirements analysis presents the requirements applicable for the interface strategy. In order to assure compatibility between the process of requirements engineering outlined in the previous section and the development in POSEIDON, the requirements have to be adapted appropriately. We will briefly describe the adaptation process for each step. 1. The requirements inception is performed according to specifications in the DoW, the initial requirements gathering phase and the results of the first user group workshop 2. The requirements identification is performed iteratively after each user workshop and the pilot phases of the integrated system 3. The requirements analysis and negotiation occurs led by a core group of developers in strong collaboration with the representatives of the user organizations 4. The specification of the requirements adds a number of labels to distinguish functional and non-functional requirements, identify the target system iteration and the associated system components 8

9 5. The combined software- and hardware-architecture is initially designed at a very high level and will be detailed according to the requirements of the current prototype iteration This step is the primary concern of this document and detailed in the next section 6. POSEIDON is using a shared Wiki system to manage the requirements and their different iterations 9

10 4 Technical evaluation of POSEIDON As previously mentioned this section will detail the evaluation process of the technical systems developed in POSEIDON. It is separated into three distinct parts. At first we will detail how requirements can be evaluated, including monitoring and risk assessment. The second part outlines the organizational structure of the evaluation process and the last part gives a set of templates that will be used to evaluate the requirements. 4.1 Evaluating requirements In the scope of WP2 the requirements of the POSEIDON system are defined and refined throughout the project. While some requirements can be easily quantified, particularly non-functional requirements need additional information that helps determining how well they meet criteria set towards them. In this section we will show how to determine the adherence of requirements and based on that calculate a risk level that helps to specify how the requirements should be modified in the later stages of the development and how severe the expected impact on the development timeline will be Requirement adherence The first important factor in the requirements evaluation is to determine how well they adhere to the specified metric. Here we can distinguish two different types of requirements - quantitative requirements and non-quantitative requirements. The first category can be easily measured and in order to fulfil the requirement a discrete number is given. In the following tables, we will use a fourlevel grading system for the different components of the requirement evaluation. This grading will simplify the notation of adherence in the later project stages. The grades used are A, B, C and F - whereas A indicates the highest grade, e.g. full adherence and F typically indicates failure. Table 3 shows grading, adherence level and description for quantitative requirements. Table 3 Quantitative requirements adherence levels, descriptions and associated score Grade Adherence Level Description A Full Achieving at least 100% of the specified value B With Limitations Achieving between 80% and 100% C Low 50% to 80% F Failure Less than 50% 10

11 A similar grading can be used for non-quantitative requirements and their adherence. In this case the level is subjective by definition and should therefore be determined by multiple persons, e.g. using a majority vote. Table 4 Non-quantitative requirements adherence levels, descriptions and associated score Grade Adherence Description Level A Full Full adherence is achieved if the requirement is completely fulfilled in the given evaluation B With Limitations If a requirement is only partially fulfilled, but the deviation is not critical, a level with limitations should be given C Low If a requirement is partially fulfilled and the deviation is high the adherence level is low F Failure If a requirement is not fulfilled at all the level of failure has to be attributed Risk estimation An important step in estimating the potential impact of not fulfilling a requirement is performing a risk assessment based on the level of adherence and some other factors. Risk management is a whole field of study dedicated to identify, assess and priorize risks [4]. Apart from the risks specified in the DoW we are only using a minimal routine to estimate the risk or impact of note meeting a certain requirement, based on the following factors: Risk Score = Adherence Level Score * (Criticality Level + Estimated time to fix) The adherence level score is derived from Table 4, shown in the previous section. The criticality level can be defined according to the following table. Table 5 Criticality of non-adherence to requirements Grade Criticality Description Level A Not critical Not fulfilling this specific requirement will not interfere with the overall functionality of the system - mostly suited for optional requirements B Potentially critical If not fulfilled this requirement has some impact on the system or user experience but it is considered low C Very critical If the requirement is not fulfilled the system is expected to behave unexpectedly or not adhere to the minimum functionality required F Fatal This breaks the system experience and permits main functions from working The last component is the estimated time required to fix the requirement in a way so it will be adhering to the specified level. This is important to get an estimate about the resources that will be required to fix the problem and how they can be mapped into the remaining project timeline and the development queue until the next iteration is due. The time required to fix will be quantized similar to the previous factors, in the following table. It should be noted that the time should be estimated in a way that includes testing of the fixed requirement: 11

12 Table 6 Score associated to estimated time to fix a certain requirement not met Grade A B C F Estimated time to fix < 1 hour < 1 day < 1 week > 1 week In order to calculate the risk score we have to associate the grades that were given to a numeric value. We are using the simple association of the following table: Table 7 Association between grades and numeric values Grade Numeric value A 0 B 1 C 3 F 5 Now, all components are complete that are required to calculate the risk score. For example, if there is a requirement with low adherence level that is not critical and will take less than one day to fix and test the resulting risk score is: Risk Score = 3 * (0 + 1) = 3 A second example for a requirement with low adherence level that is potentially critical and takes a long time to fix is: Risk Score = 3 * (3 + 5) = 24 The risk score is considerably higher than before, as the impact of not meeting this requirement on the project development roadmap can potentially be very high, primarily due to the long time that is required for a fix. The risk score for a fully met requirement thus is always 0 and there is obviously no need to note criticality and time to fix. Finally, we can group the risks into three distinct risk level groups based on their risk scores, as shown in the following table: Table 8 Association between risk levels and risk score Risk level Risk score High > 15 Medium < 15 Low < 6 None 0 This risk level should drive the discussion about how to manage changes to requirements and the impact of not meeting a specific requirement on the development schedule specified in the development roadmap. This risk level should be noted for any requirement that is not achieving 12

13 adherence level, or for all requirements, whereas the risk level for requirements fully met, is automatically set to None. 4.2 Evaluation process Piloting & Testing Development Analysis Requirement Revision Consolidation Figure 1 Requirement implementation and evaluation cycle The evaluation process is following the cycle outlined in Figure 1. Five different phases can be distinguished: 1. During the piloting & testing the adherence of the different requirements is tested with regards to the specification. The duration is depending on the setup of the pilot/workshop 2. In the analysis phase these results are used to calculate derived information, such as the risk score. This phase should not last longer than 14 days, in order to guarantee a thorough review, while not affecting the overall development too much. 3. The consolidation phase is a physical or virtual meeting, in which a consensus on the ranking of the requirements has to be found. This meeting should also be used to determine if an adaptation of requirements is needed 4. In the requirement revision phase the adaptations specified in the consolidation phase have to be detailed and integrated into the development roadmap 5. The development phase will implement the system in order to fulfill the requirements needed for the next iteration of the prototype 13

14 4.2.1 Organization The organizational structure of the personnel responsible should be kept small, in order to minimize overhead. We envision a system of three roles operating given the following organizational structure. Technical Evaluation Coordinator Technical Evaluation Committee Requirements Advisory Committee The different roles will have the following tasks. Figure 2 Organizational structure of technical evaluation Technical Evaluation Coordinator will lead the process, has to query the different stages of the process, distribute tasks to the technical evaluation committee and lead the consolidation meeting The technical evaluation committee members will execute the different tasks related to the evaluation process, such as performing the technical evaluation, analyzing the results, participating in the consolidation meeting and adapting the requirements The requirements advisory board is comprised of several members of the social science specialists within the consortium that perform the workshops and pilots and can contribute to the process during the consolidation meeting and analysis phase - giving input to potential adaptations of requirements for the next iteration Managing potential requirement revision In POSEIDON we are using a Wiki-based system to track the requirements. The integrated versioning allows keeping track of the different versions. In Figure 3, we can see a screenshot of the system. The system is in the process of being set up - a process that will be completed in time before the first pilot. The wiki follows the structure of requirements as specified in D2.3. Figure 3 Screenshot of requirement tracking wiki page 14

15 The wiki system will be updated by all members of the Technical Evaluation committee, with the Technical Evaluation Coordinator being responsible for periodically checking for adherence to the specified standards. In the future we will investigate different wiki add-ons or other system that will allow us to create the result template presented in the following section automatically, from a subset of requirements. 4.3 Result Template The results of the requirement evaluation should be noted in a specific template that allows recording the information required in the later stages of the process. The following table can be expanded and printed out with the current list of requirements to be tested in scope of the next event. There are two example requirements filled in order to show how the table works. They are not related to any actual evaluation. Table 9 Template of requirement evaluation sheet Label Requirement Category Quantitative Qualitative Adh Level Fun5 Fun6a Should keep track of user's position when traveling outdoors Should provide basic outdoors navigation services Criticality Functional - - A - - Functional - - B F C Est. timeto-fix 15

16 5 User experience evaluation of POSEIDON As previously mentioned this section will detail the evaluation process of user experience and usability factors of the POSEIDON systems. It is separated into three distinct parts. At first we will detail how requirements can be evaluated, including monitoring. The process and organizational aspects are similar to the ones presented in the previous chapter. Therefore we will refrain from reiterating most of the information and focus on the novel aspects. 5.1 Evaluation of user experience requirement The evaluation of user experience and usability is more difficult to express in terms of quantitative measurements. There are three different levels that we have to consider in increasing level of abstraction: 1. Functionality 2. Usability 3. User experience The functional aspects include all the required aspects for the system to work in the desired way. This is covered by the technical requirement evaluation presented in the previous section. Usability extends this scope by also considering aspects such as intuitiveness of use and predictability of the chosen actions. Finally, user experience covers all aspects of the system including the look and feel of POSEIDON. This category encompasses aspects, such as joy of use, reaction of users to the system, trust of the users, and various other aspects. In terms of evaluation this often is a subjective matter. 5.2 Evaluation process Piloting & Interviews Requirement Revision Analysis Consolidation Figure 4 User experience testing cycle The user experience evaluation process is following the cycle outlined in Figure 2. It is similar to the process for the technical evaluation. Four different phases can be distinguished: 16

17 1. During the piloting & testing the adherence of the user experience requirements is tested with regards to the specification. It is happening at the same time as the technical evaluation 2. Analogue to the technical evaluation, the analysis phase uses the results to calculate derived information, such as the risk score. This phase should not last longer than 14 days. 3. The consolidation phase is analogue to the technical evaluation 4. The requirements revision phase is also similar to the technical evaluation. However, single user experience factor may affect various requirements. Accordingly, more time should be planned in to thoroughly perform this task Organization The organizational structure of the personnel responsible should be kept small, in order to minimize overhead. We envision a system of three roles operating given the following organizational structure. User Experience Evaluation Coordinator User Experience Evaluation Committee Requirements Advisory Committee The different roles will have the following tasks. Figure 5 Organizational structure of technical evaluation User Experience Evaluation Coordinator will lead the process, has to query the different stages of the process, distribute tasks to the technical evaluation committee and lead the consolidation meeting The user experience evaluation committee members will execute the different tasks related to the evaluation process, such as performing the user experience evaluation, analysing the results, participating in the consolidation meeting and adapting the requirements The requirements advisory board is comprised of several technical specialists within the consortium that perform the workshops and pilots and can contribute to the process during the consolidation meeting and analysis phase - giving input on the technical feasibility of system adaptations User experience requirements In order to perform a risk assessment similar to the previously described requirement evaluation, it is necessary to specify a set of requirements specifically associated to this factor and analyse them similar to the evaluation of qualitative requirements that was introduced earlier. A practical approach is to quantize the user experience by performing interviews based on Likert-scales or transfer open interview questions to a Likert-scale scheme after the fact. The latter is required when interviewing certain user groups that are not suited to fill out Likert questions due to lack of experience or other factors. This transfer of open-ended questions to Likert-scale ratings enables to quantify the results of the questionnaire, in order to specify adherence levels as specified in the previous sections. However, this process has to be performed very carefully. The members of the user experience evaluation 17

18 committee will perform this transformation according to best practice. Example can be found in the write-ups by Hughes and Silver [5], or Jackson et al. [6]. The next step is to use this coding or quantification to grade the responses on user experience similar to the process presented in the previous section. According to the specific question, we propose the scheme, shown in Table 10. Table 10 User experience adherence levels, descriptions and associated score Grade Adherence Level Description A Full Matching or exceeding threshold B With Limitations Scoring between 80% and 100% of threshold C Low Scoring between 50% and 80% of threshold F Failure Scoring less than 50% of threshold The most important factor to consider is the threshold. This should be defined, based on the importance of a specific item. On Likert-scale to 10, a typical value could be 7. When analyzing the responses of the interviews the result is either a quantified table for Likert-style questions or coded values for open-ended questions. The coding should be chosen accordingly - so we can also assume a scale of 1-10 and a threshold of 7. Using this as base for grading the calculations for the different adherence grades, with a threshold of 7 look like this: Grade Score A >= 7.00 B 6.60 to 7.00 C F < 3.50 Achieving the adherence grades enables us to use the risk assessment of the previous section to specify risks and estimate their severity and impact on the project. The risk assessment is part of the analysis phase and should be performed at this step. 18

19 6 Conclusion On the previous pages we have introduced the process and protocols to allow a technical evaluation of the systems that will be developed in the scope of POSEIDON. We introduced the rationale of the technical evaluation by restating the POSEIDON timeline and the measures of impact and success that were introduced during the application phase. An overview of relevant best practice of system evaluation was given that relates to the requirement driven design of the POSEIDON development process. Based on this it was possible to introduce a method to quantify the technical capabilities of a system given a set of requirements. This assessment is based on two factors - the adherence to the specified requirements and the risk associated to not fulfilling the requirement, which can be determined using a risk score calculation. We outlined the process and persons required to perform this evaluation and briefly introduced the tools necessary to track the requirements. Additionally, the document also discusses critical differences between technical evaluation and user experience evaluation. This includes differences in process, but also evaluation and quantification of measurements. 19

20 7 References [1] B. Beizer, Software system testing and quality assurance. Van Nostrand Reinhold Co., [2] B. Nuseibeh and S. Easterbrook, Requirements engineering: a roadmap, in Proceedings of the Conference on the Future of Software Engineering, 2000, pp [3] I. Sommerville and P. Sawyer, Requirements engineering: a good practice guide. John Wiley & Sons, Inc., [4] K. Dowd, Beyond value at risk: the new science of risk management, vol. 3. Wiley Chichester, [5] G. Hughes and C. Silver, Quantitative analysis strategies for analysing open-ended survey questions in ATLAS.TI, [Online]. Available: ngsurvey/quantitative_analysis_strategies_for_analysing_openended_survey_questio ns_in_atlasti.htm. [6] K. M. Jackson and W. M. K. Trochim, Concept mapping as an alternative approach for the analysis of open-ended survey responses, Organ. Res. Methods, vol. 5, no. 4, pp ,

Product Documentation SAP Business ByDesign February Business Configuration

Product Documentation SAP Business ByDesign February Business Configuration Product Documentation PUBLIC Business Configuration Table Of Contents 1 Business Configuration.... 4 2 Business Background... 5 2.1 Configuring Your SAP Solution... 5 2.2 Watermark... 7 2.3 Scoping...

More information

Advantages and Disadvantages of. Independent Tests. Advantages. Disadvantages

Advantages and Disadvantages of. Independent Tests. Advantages. Disadvantages 8.0 Test Management Outline 8.1 Test organisation 8.2 Test planning and estimation 8.3 Test program monitoring and control 8.4 Configuration management 8.5 Risk and testing 8.6 Summary Independent Testing

More information

Requirements Engineering

Requirements Engineering Requirements Engineering Professor Ray Welland Department of Computing Science University of Glasgow E-mail: ray@dcs.gla.ac.uk The Importance of Requirements Identifying (some) requirements is the starting

More information

Sistemi ICT per il Business Networking

Sistemi ICT per il Business Networking Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking Requirements Engineering Docente: Vito Morreale (vito.morreale@eng.it) 17 October 2006 1 UP Phases 1. Inception

More information

Final Project Report. Abstract. Document information

Final Project Report. Abstract. Document information Final Project Report Document information Project Title Airport Performance Assessment and Management Support Systems Project Number 12.07.03 Project Manager Indra Deliverable Name Final Project Report

More information

A Primer for the Project Management Process by David W. Larsen 1. Table of Contents

A Primer for the Project Management Process by David W. Larsen 1. Table of Contents A Primer for the Project Management Process by David W. Larsen 1 Table of Contents Description... 2 STAGE/STEP/TASK SUMMARY LIST... 3 Project Initiation 3 Project Control 4 Project Closure 6 Project Initiation...

More information

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials Requirements Analysis and Design Definition Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this

More information

PARTICIPATION AS A PROCESS AND PRACTICE: WHAT METEP CAN MEASURE, WHY AND HOW?

PARTICIPATION AS A PROCESS AND PRACTICE: WHAT METEP CAN MEASURE, WHY AND HOW? PARTICIPATION AS A PROCESS AND PRACTICE: WHAT METEP CAN MEASURE, WHY AND HOW? Capacity Building Workshop (Baku, Azerbaijan) 03-05 December, 2013 Development Management Branch (DMB) Division for Public

More information

Requirements Engineering and Agile Methodology

Requirements Engineering and Agile Methodology Requirements Engineering and Agile Methodology R. Kuehl/J. Scott Hawker p. 1 Requirements Engineering and Agile Processes (You may be thinking) Requirements engineering model as presented is not very agile

More information

Guidelines for proposals preparation under the ESA satellite for 5G initiative 5G Validation Trials and Vertical Pilots

Guidelines for proposals preparation under the ESA satellite for 5G initiative 5G Validation Trials and Vertical Pilots estec European Space Research and Technology Centre Keplerlaan 1 2201 AZ Noordwijk The Netherlands Tel. (31) 71 5656565 Fax (31) 71 5656040 www.esa.int 15 November 2017 Subject: Guidelines for proposals

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements

Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements Malik Qasaimeh and Alain Abran Abstract ISO 9001 demands of (software) organizations that a rigorous demonstration

More information

Portfolio Management Professional (PfMP)

Portfolio Management Professional (PfMP) Portfolio Management Professional (PfMP) E X A M I N AT I O N CO N T E N T O U T L I N E Project Management Institute Portfolio Management Professional (PfMP) Examination Content Outline Published by:

More information

Deliverable 1.2 Detailed risk management plan

Deliverable 1.2 Detailed risk management plan Deliverable 1.2 Detailed risk management plan Date: November 2016 HORIZON 2020 - INFRADEV Implementation and operation of cross-cutting services and solutions for clusters of ESFRI Page 1 of 16 Grant agreement

More information

Introduction to Systems Analysis and Design

Introduction to Systems Analysis and Design Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.

More information

Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info A Study of Software Development Life Cycle Process Models

More information

Introduction to Software Engineering

Introduction to Software Engineering UNIT I SOFTWARE PROCESS Introduction S/W Engineering Paradigm life cycle models (water fall, incremental, spiral, WINWIN spiral, evolutionary, prototyping, objects oriented) -system engineering computer

More information

The 9 knowledge Areas and the 42 Processes Based on the PMBoK 4th

The 9 knowledge Areas and the 42 Processes Based on the PMBoK 4th The 9 knowledge Areas and the 42 Processes Based on the PMBoK 4th www.pmlead.net PMI, PMP, CAPM and PMBOK Guide are trademarks of the Project Management Institute, Inc. PMI has not endorsed and did not

More information

2018 Annual Work Plan EUROfusion Researcher Grants. Guide for applicants

2018 Annual Work Plan EUROfusion Researcher Grants. Guide for applicants CfP-AWP18-TRA-01 2018 Annual Work Plan EUROfusion Researcher Grants Guide for applicants 1 Contents 1. INTRODUCTION... 3 2. ELIGIBILITY TO THE PROGRAMME... 3 3. EVALUATION CRITERIA AND PROCEDURES... 3

More information

Moving toward software product lines in a small software firm: a case study

Moving toward software product lines in a small software firm: a case study Moving toward software product lines in a small software firm: a case study Tullio Vernazza Paolo Galfione Andrea Valerio Università di Genova RE.SI.CO. COCLEA Via Opera Pia 13 Via F. S. Orologio 6 via

More information

Final Project Report. Abstract. Document information

Final Project Report. Abstract. Document information Final Project Report Document information Project Title SWIM Design Project Number 14.01.03 Project Manager Indra Deliverable Name Final Project Report Deliverable ID D02 Edition 00.02.00 Template Version

More information

Certified Digital Marketing Specialist in Search

Certified Digital Marketing Specialist in Search Certified Digital Marketing Specialist in Search Align your skills with the needs of industry www.digitalandsocialmediaacademy.com Validated by the Syllabus Advisory Council (SAC). Including members from

More information

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Objectives To introduce software process models To describe three generic process models and when they may be

More information

CHAPTER 1 Introduction

CHAPTER 1 Introduction CHAPTER 1 Introduction The Standard for Program Management provides guidelines for managing programs within an organization. It defines program management and related concepts, describes the program management

More information

Oracle BPM Release New Features

Oracle BPM Release New Features Oracle BPM 11.1.1.7 Release New Features Oracle BPM enables business users to take control and drive improvements to their processes. This document discusses how the new features introduced in Oracle BPM

More information

e-competence in Finland

e-competence in Finland e-competence in Analysing Gaps and Mismatches for a Stronger ICT Profession About the Grand Coalition for Digital Jobs The an Commission is leading a multi-stakeholder partnership to tackle the lack of

More information

working with partnerships

working with partnerships A practical guide to: working with partnerships Practical step-by-step building blocks for establishing an effective partnership in the not-for-profit sector N 2 (squared) Consulting with Nottingham Council

More information

AUTOMOTIVE SPICE v3.1 POCKET GUIDE

AUTOMOTIVE SPICE v3.1 POCKET GUIDE EXTENDED VDA SCOPE ASPICE v3.1 AUTOMOTIVE SPICE v3.1 POCKET GUIDE 4 5 6 7 8-9 10 11-13 14-15 16-19 20-43 44-49 50-51 52-69 70-93 94-103 104-105 106 Automotive SPICE at a glance Automotive SPICE application

More information

Evaluation Policy for GEF Funded Projects

Evaluation Policy for GEF Funded Projects Evaluation Policy for GEF Funded Projects Context Conservation International helps society adopt the conservation of nature as the foundation of development. We do this to measurably improve and sustain

More information

7.11b: Quality in Project Management: A Comparison of PRINCE2 Against PMBOK

7.11b: Quality in Project Management: A Comparison of PRINCE2 Against PMBOK by Peter Whitelaw, Rational Management Pty Ltd, Melbourne Introduction This comparison takes each part of the PMBOK and provides comments on what match there is with elements of the PRINCE2 method. It's

More information

The British Institute of Recruiters. Accredited Courses. Business Administrator Level 3 ST0070/AP01. The British Institute of Recruiters

The British Institute of Recruiters. Accredited Courses. Business Administrator Level 3 ST0070/AP01. The British Institute of Recruiters Accredited Courses Business Administrator Level 3 ST0070/AP01 1 About Us (BIoR) is a British Institute representing the highest standard mark in British recruitment. As the professional body for HR, Agency

More information

Now, I wish you lots of pleasure while reading this report. In case of questions or remarks please contact me at:

Now, I wish you lots of pleasure while reading this report. In case of questions or remarks please contact me at: Preface Somewhere towards the end of the second millennium the director of Vision Consort bv, Hans Brands, came up with the idea to do research in the field of embedded software architectures. He was particularly

More information

SUSE Unified Delivery Process

SUSE Unified Delivery Process Guide www.suse.com SUSE Unified Delivery Process What Is the SUSE Unified Delivery Process? The SUSE Unified Delivery Process is a solution delivery process based on the IBM* Rational Unified Process*

More information

7. What is planning? It is an act of formulating a program for a definite course of action. Planning is to decide what is to be done.

7. What is planning? It is an act of formulating a program for a definite course of action. Planning is to decide what is to be done. UNIT I FUNDAMENTALS 2 MARKS QUESTIONS & ANSWERS 1. What is software project management? Software project management is the art and science of planning and leading software projects. It is sub discipline

More information

<Project Name> Business Case

<Project Name> Business Case Business Case Author(s) Contributors Department Campus DOCUMENT HISTORY Version Date Person Notes 1.0 ITS Portfolio Management Office Business Case Page 1 TABLE OF CONTENTS

More information

McKinsey BPR Approach

McKinsey BPR Approach McKinsey BPR Approach Kai A. Simon Viktora Institute 1General aspects Also McKinsey uses a set of basic guiding principles, or prerequisites, which must be satisfied in order to achieve reengineering success.

More information

Competency Area: Business Continuity and Information Assurance

Competency Area: Business Continuity and Information Assurance Competency Area: Business Continuity and Information Assurance Area Description: Business Continuity and Information Assurance competency area mainly concerns the continuity, auditing and assurance of

More information

Quizzes for 1 st Study Group Session

Quizzes for 1 st Study Group Session Quizzes for 1 st Study Group Session General 1. Business analysis is performed: a. Sequentially and in order. b. According to logical relationships (dependencies). c. Iteratively or simultaneously. d.

More information

University of Wisconsin-Extension Cooperative Extension

University of Wisconsin-Extension Cooperative Extension next Generation project Charter Version: 1.1 Created: November 8, 2016 Updated: December 6, 2016 Charter, Version 1.1 Document Control This Charter serves as the governing and constitutional document for

More information

2016 Annual Work Plan EUROfusion Engineering Grants. Annex 2. Guide for applicants

2016 Annual Work Plan EUROfusion Engineering Grants. Annex 2. Guide for applicants 2016 Annual Work Plan EUROfusion Engineering Grants Annex 2 Guide for applicants 1 Contents 1. INTRODUCTION... 3 2. ELIGIBILITY TO THE PROGRAMME... 3 3. EVALUATION CRITERIA AND PROCEDURES... 4 3.1. EXPERTS

More information

ICT in Factories of the Future

ICT in Factories of the Future Imagine FoF 2020 ICT in Factories of the Future Massimo Mattucci 13 June 2013 Factories of the Future Projects About Factories of the Future Launched in 2009 Public support through European Union s (EU)

More information

BETTER BUSINESS CASE - EFFICIENT DECISION MAKING Chris Purchas, Tonkin + Taylor Limited

BETTER BUSINESS CASE - EFFICIENT DECISION MAKING Chris Purchas, Tonkin + Taylor Limited BETTER BUSINESS CASE - EFFICIENT DECISION MAKING Chris Purchas, Tonkin + Taylor Limited Introduction If you are involved in any type of public infrastructure development in New Zealand you have probably

More information

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B 1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework

More information

2. Creating and monitoring the overall program milestone plan and cross-functional dependencies and issues.

2. Creating and monitoring the overall program milestone plan and cross-functional dependencies and issues. Deloitte 2200 Ross Ave Suite 1600 Dallas, TX 75201 www.deloitte.com Chris Garcia Director of Operations PharmaKat 123 Main St. Dallas, TX Dear Chris, Deloitte is pleased to confirm that it will provide

More information

Project Overview for the Rights Protection Mechanisms Survey Request for Proposal

Project Overview for the Rights Protection Mechanisms Survey Request for Proposal Project Overview for the Rights Protection Mechanisms Survey Request for Proposal Date of issue: 29 January 2018 ICANN Project Overview for the Rights Protection Mechanisms Survey Request for Proposal

More information

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 IIBA Global Business Analysis Core Standard A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 International Institute of Business Analysis, Toronto, Ontario, Canada.

More information

Supreme Audit Institutions Performance Measurement Framework

Supreme Audit Institutions Performance Measurement Framework Supreme Audit Institutions Performance Measurement Framework Implementation Strategy 2017-19 October 2016 Table of Contents 1. Introduction 2 1.1. What is the SAI PMF? 2 1.2. Why is SAI PMF of such strategic

More information

2014 Kent State University Catalog - Fall 2014 Course Descriptions Page 940

2014 Kent State University Catalog - Fall 2014 Course Descriptions Page 940 Schedule Types: Practicum or Internship Regional College Department Course Attributes: Experiential Learning Requirem 2014 Kent State University Catalog - Fall 2014 Course Descriptions Page 940 IAKM 41096

More information

Requirements Engineering and SCRUM. Peter Dolog dolog [at] cs [dot] aau [dot] dk E2-201 Information Systems February 13, 2007

Requirements Engineering and SCRUM. Peter Dolog dolog [at] cs [dot] aau [dot] dk E2-201 Information Systems February 13, 2007 Requirements Engineering and SCRUM Peter Dolog dolog [at] cs [dot] aau [dot] dk E2-201 Information Systems February 13, 2007 2 Scrum Larman Ch. 7 3 Scrum Model Start A small group is responsible for picking

More information

How to map excellence in research and technological development in Europe

How to map excellence in research and technological development in Europe COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.3.2001 SEC(2001) 434 COMMISSION STAFF WORKING PAPER How to map excellence in research and technological development in Europe TABLE OF CONTENTS 1. INTRODUCTION...

More information

Quality and Empowerment Framework

Quality and Empowerment Framework Quality and Empowerment Framework 1 Contents Introduction... 3 Background... 5 Why is quality important?... 5 Embedding a quality culture... 6 Excellence in service delivery... 6 Satisfying people s expectations...

More information

DAREED. Decision support Advisor for innovative business models and user engagement for smart Energy Efficient Districts

DAREED. Decision support Advisor for innovative business models and user engagement for smart Energy Efficient Districts DAREED Decision support Advisor for innovative business models and user engagement for smart Energy Efficient Districts Document Name DAREED REQUIREMENTS AND INTERFACES MANAGEMENT DEFINITION METHODOLOGY

More information

A Quality Assurance Framework for Knowledge Services Supporting NHSScotland

A Quality Assurance Framework for Knowledge Services Supporting NHSScotland Knowledge Services B. Resources A1. Analysis Staff E. Enabling A3.1 Monitoring Leadership A3. Measurable impact on health service Innovation and Planning C. User Support A Quality Assurance Framework for

More information

PRINCE Update. Changes to the manual. AXELOS.com. April 2017 PUBLIC

PRINCE Update. Changes to the manual. AXELOS.com. April 2017 PUBLIC PRINCE2 2017 Update s to the manual AXELOS.com April 2017 2 PRINCE2 2017 Update Contents 1 Introduction 3 2 Summary of changes 4 PRINCE2 2017 Update 3 1 Introduction This document provides a list of the

More information

Social Economy and the Roma community challenges and opportunities Situation Analysis Report CONCEPT NOTE POSDRU/69/6.1/S/34922

Social Economy and the Roma community challenges and opportunities Situation Analysis Report CONCEPT NOTE POSDRU/69/6.1/S/34922 Social Economy and the Roma community challenges and opportunities Situation Analysis Report CONCEPT NOTE I. PROJECT OVERVIEW Project title: Project number: Social Economy a solution for the development

More information

ASEAN AUSTRALIA DEVELOPMENT COOPERATION PROGRAM (AADCP) PHASE II TERMS OF REFERENCE FOR

ASEAN AUSTRALIA DEVELOPMENT COOPERATION PROGRAM (AADCP) PHASE II TERMS OF REFERENCE FOR ASEAN AUSTRALIA DEVELOPMENT COOPERATION PROGRAM (AADCP) PHASE II TERMS OF REFERENCE FOR Study on Establishing an ASEAN Telecommunications Single Market Post-2015 The ASEAN Secretariat and the Australian

More information

Certification Exam Content Outline: Certification in Monitoring, Evaluation, Accountability, and Learning (MEAL) FINAL (8 September 2017)

Certification Exam Content Outline: Certification in Monitoring, Evaluation, Accountability, and Learning (MEAL) FINAL (8 September 2017) Certification Exam Content Outline: Certification in Monitoring, Evaluation, Accountability, and Learning (MEAL) FINAL (8 September 2017) Domain 1: Components, concepts, and principles of MEAL/Situating

More information

Mid-term Project Evaluation Guidance Note For EIF TIER 1 Funded Projects: Support to National Implementation Arrangements

Mid-term Project Evaluation Guidance Note For EIF TIER 1 Funded Projects: Support to National Implementation Arrangements Mid-term Project Evaluation Guidance Note For EIF TIER 1 Funded Projects: Support to National Implementation Arrangements September 2012 This document is work in progress. Any queries/comments should be

More information

Bonsucro Benchmarking Protocol Version 1.0 May 2017

Bonsucro Benchmarking Protocol Version 1.0 May 2017 Bonsucro Benchmarking Protocol Version 1.0 May 2017 Bonsucro s vision is a sugarcane sector with thriving, sustainable producer communities and resilient, assured supply chains. Our mission is to ensure

More information

A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 Skillport

A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 Skillport A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2.0 by The International Institute of Business Analysis (IIBA) International Institute of Business Analysis. (c) 2009. Copying

More information

Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland

Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland Evaluation of the EUR-ACE outcome criteria for engineering degree programmes in Switzerland Guide 20.05.2014 Inhalt 1! General provisions... 1! 1.1! Goal and object of an evaluation... 1! 1.2! EUR-ACE

More information

Requirements Knowledge Model. Business. Event. Business. responding. Business. Use Case 1.. Business tracing * * * * Requirement

Requirements Knowledge Model. Business. Event. Business. responding. Business. Use Case 1.. Business tracing * * * * Requirement Requirements Knowledge Model This model provides a language for communicating the knowledge that you discover during requirements-related activities. We present it here as a guide to the information you

More information

Architectural Practices and Challenges in Using Agile Software Development Approaches

Architectural Practices and Challenges in Using Agile Software Development Approaches Architectural Practices and Challenges in Using Agile Software Development Approaches M. Ali Babar 1 Today s Talk Agility and architecture: A match made in Heaven broken on Earth? Talk summarizes The design,

More information

Pertemuan 2. Software Engineering: The Process

Pertemuan 2. Software Engineering: The Process Pertemuan 2 Software Engineering: The Process Collect Your Project Topic What is Software Engineering? Software engineering is the establishment and sound engineering principles in order to obtain economically

More information

Template for ToR for Transaction Advisory Services

Template for ToR for Transaction Advisory Services Template for ToR for Transaction Advisory Services Addendum 1 Prepared by Genesis Analytics 4 December 2013 PPP TRANSACTION ADVISOR TERMS OF REFERENCE Terms of reference for transaction advisor services

More information

Enterprise Architecture: an ideal discipline for use in Supply Chain Management

Enterprise Architecture: an ideal discipline for use in Supply Chain Management Enterprise Architecture: an ideal discipline for use in Supply Chain Management Richard Freggi Senior Supply Chain Architect (TOGAF 9.1 certified level 2) HP Inc. Content Understanding Supply Chain Management

More information

Requirements Engineering. Massimo Felici Room 1402, JCMB, KB

Requirements Engineering. Massimo Felici Room 1402, JCMB, KB Requirements Engineering Massimo Felici Room 1402, JCMB, KB 0131 650 5899 mfelici@inf.ed.ac.uk Administration SEOC1 Tutorials start in week 3 SEOC1 Communications: Mailing List: seoc1-students@inf.ed.acuk

More information

Administrative Analyst/Specialist Non-Exempt

Administrative Analyst/Specialist Non-Exempt Administrative Analyst/Specialist Non-Exempt Entry to this classification requires general knowledge and skills in the applicable administrative and/or program field with a foundational knowledge of public

More information

Result 14 Definition of new Learning Outcomes

Result 14 Definition of new Learning Outcomes Result 14 Definition of new Learning Outcomes Elaborated by ANQEP and nowa Based on the defined Functional Areas and Units of Competence of Spain Portugal Austria 1 December 2016 1. Functional Areas and

More information

Elicitation of Requirements for a knowledge-based Framework in Product Development Process

Elicitation of Requirements for a knowledge-based Framework in Product Development Process 11th International Conference on Knowledge Management (ICKM2015) Osaka, 4-6 November 2015 Elicitation of Requirements for a knowledge-based Framework in Product Development Process Hugo D ALBERT a*, Cristina

More information

The four steps to Service Management Exellence. White Paper.

The four steps to Service Management Exellence. White Paper. The four steps to Service Management Exellence White Paper Table of Contents Executive Summary Introduction Stage One: The Primary Role of Service Management Stage Two: The Operational Role of Service

More information

CODE OF PRACTICE FOR RESEARCH

CODE OF PRACTICE FOR RESEARCH CODE OF PRACTICE FOR RESEARCH Dr Diana Leighton REF Manager Professor Andy Young Director of Research & Innovation Services Version 1.0 - September 2010 First approved Academic Board 27 September 2010

More information

Agile Master Data Management

Agile Master Data Management A better approach than trial and error by First San Francisco Partners 2 Common MDM initiative and benefit Customer Optimization Improve up-sell, cross-sell and customer retention Access full-customer

More information

CARIBBEAN DEVELOPMENT BANK TERMS OF REFERENCE DISASTER RISK MANAGEMENT STRATEGY AND OPERATIONAL GUIDELINES OF THE CARIBBEAN DEVELOPMENT BANK

CARIBBEAN DEVELOPMENT BANK TERMS OF REFERENCE DISASTER RISK MANAGEMENT STRATEGY AND OPERATIONAL GUIDELINES OF THE CARIBBEAN DEVELOPMENT BANK CARIBBEAN DEVELOPMENT BANK TERMS OF REFERENCE DISASTER RISK MANAGEMENT STRATEGY AND OPERATIONAL GUIDELINES OF THE CARIBBEAN DEVELOPMENT BANK DECEMBER 2018 1. Background Natural hazards have become more

More information

The Basics of ITIL Help Desk for SMB s

The Basics of ITIL Help Desk for SMB s The Basics of ITIL Help Desk for SMB s This three-step process will provide you the information necessary to understand ITIL, help you write your strategic IT plan and develop the implementation plan for

More information

National Technical Advisor to Support the Development of the Action Plan to Implement the Child Protection Policy in Schools

National Technical Advisor to Support the Development of the Action Plan to Implement the Child Protection Policy in Schools United Nations Children s Fund (UNICEF) Phnom Penh, Cambodia Individual Consultant National Technical Advisor to Support the Development of the Action Plan to Implement the Child Protection Policy in Schools

More information

GUIDEBOOK CODE OF CONDUCT MANAGEMENT SYSTEMS

GUIDEBOOK CODE OF CONDUCT MANAGEMENT SYSTEMS GUIDEBOOK CODE OF CONDUCT MANAGEMENT SYSTEMS 2005 Levi Strauss & Co. Page 1 of 57 Table of content SECTION I: INTRODUCTION... 3 1. Introduction... 3 2. How to use this Guidebook... 3 SECTION II: THE MANAGEMENT

More information

(JCTSL) / 1. INTRODUCTION

(JCTSL) / 1. INTRODUCTION Terms of Reference (TOR) for Consultant to Implement Management Information System / Enterprise Resource Planning (MIS/ERP) at (JCTSL) 1. INTRODUCTION Efficient and Sustainable City Bus Services (ESCBS)

More information

TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION

TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION Job Classification Manual Page 1 of 49 TIER II STANDARD FOR TECHNICAL COOPERATION ADMINISTRATORS INTRODUCTION 1. This grade level standard illustrates the application of the ICSC Master Standard (Tier

More information

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and Enterprise Architecture is a holistic view of an enterprise s processes, information and information technology assets as a vehicle for aligning business and IT in a structured, more efficient and sustainable

More information

EMT Associates, Inc. Approach to Conducting Evaluation Projects

EMT Associates, Inc. Approach to Conducting Evaluation Projects EMT Associates, Inc. Approach to Conducting Evaluation Projects EMT has been a leading small business in the evaluation field for over 30 years. In that time, we have developed an expertise in conducting

More information

Module 1 Introduction. IIT, Bombay

Module 1 Introduction. IIT, Bombay Module 1 Introduction Lecture 1 Need Identification and Problem Definition Instructional objectives The primary objective of this lecture module is to outline how to identify the need and define the problem

More information

An Overview of Modern Business Analysis

An Overview of Modern Business Analysis An Overview of Modern Analysis Sergey Korban, Aotea Studios, 2012 Background The feedback we receive from our readers and customers indicates that the business analysis framework described in the BABOK

More information

Form 1: Proposal for a new field of technical activity

Form 1: Proposal for a new field of technical activity Form 1: Proposal for a new field of technical activity Circulation date: 2017-08-03 Closing date for voting: 2017-10-26 Proposer: BSI Reference number (to be given by Central Secretariat) ISO/TS/P TS/P

More information

Fixed scope offering. Oracle Fusion Inventory & Cost Management Cloud Service. 22 February 2016 A DIVISION OF DIMENSION DATA

Fixed scope offering. Oracle Fusion Inventory & Cost Management Cloud Service. 22 February 2016 A DIVISION OF DIMENSION DATA Fixed scope offering Oracle Fusion Inventory & Cost Management Cloud Service 22 February 2016 A DIVISION OF DIMENSION DATA 2015 1 Business objectives The solution Scope Methodology Project plan \ time

More information

Volere Requirements: How to Get Started

Volere Requirements: How to Get Started Requirements: How to Get Started Since its introduction in 1995, the approach to requirements has been adopted by thousands of organizations around the world. We felt that it was time to summarize some

More information

SOA Research Agenda. Grace A. Lewis

SOA Research Agenda. Grace A. Lewis Workshop SOA Research Agenda Grace A. Lewis Workshop Approach Broadened the scope of the research agenda to show that we are interested in more than just SOA as an architectural style Performed an extensive

More information

TERMS OF REFERENCE FEASIBILITY STUDY ON THE DEVELOPMENT OF A CENTRALISED POINT OF DATA SUBMISSION FOR THE BANKING SECTOR

TERMS OF REFERENCE FEASIBILITY STUDY ON THE DEVELOPMENT OF A CENTRALISED POINT OF DATA SUBMISSION FOR THE BANKING SECTOR TERMS OF REFERENCE FEASIBILITY STUDY ON THE DEVELOPMENT OF A CENTRALISED POINT OF DATA SUBMISSION FOR THE BANKING SECTOR 1.0 INTRODUCTION 1.1 Background Since the rollout of Credit Information Sharing

More information

Oracle Taleo Business Edition Implementation Fixed Scope Offerings

Oracle Taleo Business Edition Implementation Fixed Scope Offerings Oracle Taleo Business Edition Implementation Fixed Scope Offerings Date Email Website : Dec-2015 : info@kovaion.com : www.kovaion.com Kovaion Consulting Kovaion A Snapshot Oracle Alliance Certified Consultants

More information

TERMS OF REFERENCE. For a Bi-lingual Local Project Coordinator. To support stakeholder engagement and research on financial inclusion in Benin

TERMS OF REFERENCE. For a Bi-lingual Local Project Coordinator. To support stakeholder engagement and research on financial inclusion in Benin TERMS OF REFERENCE For a Bi-lingual Local Project Coordinator To support stakeholder engagement and research on financial inclusion in Benin MAP and FinScope Consumer Survey Benin 2017 RFP ID: MAP BENIN_2017

More information

Quality Assurance Plan D9.1.1

Quality Assurance Plan D9.1.1 Quality Assurance Plan D9.1.1 Deliverable Number: D9.1.1 Contractual Date of Delivery: month 3 Actual Date of Delivery: 27/07/2001 Title of Deliverable: Quality Assurance Plan Work-Package contributing

More information

Digital government toolkit

Digital government toolkit Digital Government Strategies: Good Practices Portugal: Citizen s Portal The OECD Council adopted on 15 July 2014 the Recommendation on Digital Government Strategies. The Recommendation provides a set

More information

PORTLAND PUBLIC SCHOOLS HUMAN RESOURCE SERVICES AND DELIVERY

PORTLAND PUBLIC SCHOOLS HUMAN RESOURCE SERVICES AND DELIVERY PORTLAND PUBLIC SCHOOLS HUMAN RESOURCE SERVICES AND DELIVERY January 2013 Overview Portland Public School District (the District or PPS) contracted with AKT to create a new vision and values for their

More information

Question 2: Requirements Engineering. Part a. Answer: Requirements Engineering Process

Question 2: Requirements Engineering. Part a. Answer: Requirements Engineering Process Question 2: Requirements Engineering Part a. Answer: Requirements Engineering Process The requirements engineering process varies from domain to domain. But the general activities involved are: Elicitation

More information

SAI Performance Measurement Framework Implementation strategy

SAI Performance Measurement Framework Implementation strategy SAI Performance Measurement Framework Implementation strategy 2017-19 24 September 2016 Draft SAI PMF strategy, 2017-19 Page 1 SAI PMF Strategy 2017-2019 1. Introduction 1.1 What is the SAI PMF? The SAI

More information

Knowledge structure maps based on Multiple Domain Matrices

Knowledge structure maps based on Multiple Domain Matrices InImpact: The Journal of Innovation Impact : ISSN 2051-6002 : http://inimpact.innovationkt.org Special Edition on Innovation through Knowledge Transfer : Vol. 5 No.1 : pp.5-16 : inkt13-002 Knowledge structure

More information

Qualification Specification 601/3690/X icq Level 4 NVQ Diploma in Management (RQF)

Qualification Specification 601/3690/X icq Level 4 NVQ Diploma in Management (RQF) Qualification Specification 601/3690/X icq Level 4 NVQ Diploma in Management (RQF) Qualification Details Title : icq Level 4 NVQ Diploma in Management (RQF) Awarding Organisation : ican Qualifications

More information

NZ POLICE CORE COMPETENCIES. Communicate, Partner, Solve, Deliver, Lead, Innovate, Develop HOW WE DO THINGS: OUR CORE COMPETENCIES

NZ POLICE CORE COMPETENCIES. Communicate, Partner, Solve, Deliver, Lead, Innovate, Develop HOW WE DO THINGS: OUR CORE COMPETENCIES NZ POLICE CORE COMPETENCIES Communicate, Partner, Solve, Deliver, Lead, Innovate, Develop 1 INTRO These are behaviours that are important to achieving our goals. They describe how we work as opposed to

More information

DATA AND THE ELECTRICITY GRID A ROADMAP FOR USING SYSTEM DATA TO BUILD A PLUG & PLAY GRID

DATA AND THE ELECTRICITY GRID A ROADMAP FOR USING SYSTEM DATA TO BUILD A PLUG & PLAY GRID 0000 DATA AND THE ELECTRICITY GRID A ROADMAP FOR USING SYSTEM DATA TO BUILD A PLUG & PLAY GRID DATA AND THE ELECTRICITY GRID: A ROADMAP FOR USING SYSTEM DATA TO BUILD A PLUG & PLAY GRID ARAM SHUMAVON,

More information