Medical Informatics Testing. Framework (MIT-F)
|
|
- Derek Preston
- 6 years ago
- Views:
Transcription
1 Joint Medical Service Norwegian Armed Forces Military Medical Research and development Medical Informatics Testing Framework (MIT-F) 1 Executive Summary In June 2002 USA (Department of Defence) and Norway (Ministry of Defence) signed a Memorandum of Understanding (MoU) agreement in the area of telemedicine. The objectives were to share experience/lessons learned and together do some research in new concepts/architectures that involves the use of the US PIC 1. Since June 2002 the MOU project has developed a prototype system called Evacuation Support System (EvacSys). This system uses the PIC as an "electronic field medical card" and addresses the problems of capturing, storing and distributing medical treatment and patient tracking information during the evacuation of a wounded soldier from field. In order to have an efficient iterative development process and to document the benefits and improvements of EvacSys, a framework for testing and evaluation has been developed namely the MIT-F. The MIT-F defines: Why to test (rationale) Figure 1 Field medics performing and documenting treatment. What tests can be performed (test types) What documentation can be produced (test specification) How to test (methodology) 1 Personal Information Carrier:
2 2 of 11 We believe the framework can easily be applied to other domains and systems that face similar operational challenges. This whitepaper introduce the framework and how it can be applied. 2 Why use MIT-F? 2.1 Testing The purpose of testing is to unveil and remove as many deviations as possible in the system within a given time- and resource-frame, and to ensure that the system complies with the test s pass criteria. A test should also verify that the system complies with its requirement specification. But testing should also find out if the system is suitable for its purpose. "Suitable" is tightly connected to usability, thus testing should also evaluate and contribute to improve the overall usability of the system. Glen Myers [3] states: 1. Testing is a process of executing a program with the intent of finding an error 2. A good test case is one that has high probability of finding an as-yet undiscovered error. 3. A successful test is one that uncovers an as-yet undiscovered error Testing can only find errors; it cannot prove the absence of errors. Consequently, exhaustive testing is impossible, and a testing never ends- it is being stopped when deemed sufficient. 2.2 Verification, Validation and Usability When planning system testing, one should make a distinction between system verification and system validation. According to the IEEE Standard Glossary of Software Engineering Terminology 2, verification is defined as "The process of evaluating a system or component to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase." Validation, on the other hand, is defined as "The process of evaluating a system or component during or at the end of the development process to determine whether it satisfies specified requirements." Verification checks that the system conforms to the specification (System Requirements), while validation checks that the system conforms to its intended use. It may be the case that the system is verified (all system requirements are fulfilled), but the system does not validate (does not conform to intended use). In this case the system requirements must be changed / updated. In summary: Verification: is the system correct? Validation: is it the correct system? MIT-F addresses all aspects of software testing (see section 3.1), but the primary focus is on validation and usability. This is because bad usability can kill patients [1]. We argue that in systems with safety concerns (i.e. systems that have implications on people s safety), high usability is key. Usability can be defined as [2]: A measure of the ease of use with which a system can be learned or used, its safety, effectiveness and efficiency, and the attitude of its users towards it. 2
3 3 of 11 The only feasible way to ensure that you achieve a sufficient degree of usability, is to validate the system using relevant end users in a realistic operational environment that capture the aspects of unfriendly environmental conditions, stressful work situations and unexpected events that are likely phenomena in the environment. This is also referred to as Site Acceptance Testing (SAT) and User Acceptance Testing (UAT) Figure 2: The relation between verification, validation and usability Figure 2 shows the relations between usability, verification and validation in a system perspective. The system has an "Intended use" that is highly dependent on good "Usability". These usability requirements are specified in the "System Requirements", but can only be tested during "Validation". MIT-F is a testing framework designed to be able to implement validation using efficient acceptance tests where real users use the system is real environments. 3 Framework Description 3.1 Tests Categories Four kinds of tests are being performed in MIT-F: Internal test Module/component testing Conducted in parallell with development Stepwise integrationtest Performed in internal test environment FAT Test of complete solution with solution provider Performed in suppliers environment SAT Test of complete solution in customer's environment Ensure that no errors are introduced during shipment and installation UAT Testing involving relevant end users in realistic environments
4 4 of 11 Internal test, including developer tests, unit tests, and internal integration tests Factory Acceptance Tests (FAT), testing the system with the solution provider Site Acceptance Test (SAT), testing the system functionality at the customer User Acceptance Tests (UAT), testing with relevant end users in realistic environment 3.2 Methodology Scenario based Acceptance Testing In MIT-F we suggest the use of Scenario-based testing (SBT) [4]. SBT concentrates on what the user does, and not what the product does. It means capturing representative tasks (via use cases and user stories) that the user will perform, and then applying them and their variants to as tests. Scenarios uncover interaction errors. To accomplish this, test scenarios must be realistic. Scenario based testing exercise multiple sub-systems in a single test (users do not limit themselves to one sub system at a time). MIT-F scenarios contain the following: Unique identifier Short description of scenario Precondition for the scenario What is documented using video What is documented as written log data What is documented using questionnaire, what questionnaire is used Variations of scenario Roles and responsibilities of evaluators Roles and responsibilities of testers Post conditions Acceptance Testing Evaluation Techniques This section describes the techniques we suggest to evaluate the tests we perform. The core task is to collect as much data as possible, to best answer the questions that are the rationale to perform the tests. We will use two complementary techniques: Observing usage and Collecting users opinions. Pretesting Questionnaires and Interview Guidelines Questionnaires and interview guidelines needs to be tested. This is done to ensure that they are fully understood by the target group, and to remove ambiguities and possible misunderstandings. Training When dealing with systems that require training, one need to train the users in the system before testing commences. This is done to reduce the amount of feedback on the system that originates from lack of training. Comparative Studies A computer system is introduced as a solution to a problem. The problem can be another computer system or not any system at all. In order to evaluate whether or not the new computer system, is solving the problem, we need to compare the old approach to the new. This involves designing two tests, one for the old approach, and another for the new approach involving the new system. Then we are able to compare (e.g. comparing time used to solve a task, user
5 5 of 11 satisfaction etc.) the two approaches and determine whether or not the new system constitutes an improvement. Direct Observation by Logging At least one evaluator is always observing the activities of the test. The evaluator is equipped with a schema for logging significant events. The schema includes a detailed specification of what is to be observed. Users are encouraged to think aloud. Even though this is considered awkward for most users, it provides valuable input for the evaluation. If it is impossible to achieve this, it is important for the observer to log as much incidents as possible, so one can have the user explain his thoughts in the interview. Indirect Observation using Video A human evaluator will have problems registering and logging everything that happens in a test scenario. It is therefore beneficial to supplement the logging using video recordings. There should always be one evaluator observing and one filming. This is because the person filming will not be able to observe, and vice versa. Analysing video is a very time consuming task, and what to be filmed must be carefully specified. It is recommended that video is used only for documentation, and not primary for the analysis. Collecting User Opinions In addition to observation, we recommend to collect data through the use of interviews and questionnaires. For the interview we are interchangeably using structured and unstructured interviews. Unstructured interviews will typically be used in the first tests to collect user s opinions about the system. In later tests one will have more concrete questions that need answering, and one can use structured interviews. Interviews are specified for each test specification. Questionnaires are used to collect a user s opinions after having performed test scenarios. Questionnaires will be specified for each test specification. Analysing Collected Data The analysis phase includes registering results with statistical software (such as SPSS 3 ). One need to group questions and run factor analysis. In order to obtain statistically significant results it is important to have a sufficient amount of test runs and testers. Other data sources such as observation logs, video recordings and interviews should be analysed in order to prove or disprove findings from statistical analysis. Findings must be unambiguous and must be documented carefully. All sources of error should be commented and investigated. 3.3 Test Process Testing conducted with MIT-F consists of five main activities 4 : The documents produced comply with IEEE Std , Standard for Software Test Documentation.
6 6 of 11 Start Project doc Develop Test Plan Test plan Preparing test environment Test Specification Test design spec Test case spec Perform test Test procedure specification Test data Test log Overall Test Report Test incident report Stop Test Reports Figure 3: Activities and documents in MIT-F 1. Planning is the process of developing the test plan, approve it, and distribute it to target group. Project documents such as requirements specifications, architecture, and design specifications are input to the plan. The test plan prescribes scope, approach, resources and schedule of testing activities. Focus is on identifying the test items, and test items should include reference to other documentation (e.g. requirement specification) for the item, if such documentation exists. 2. Specification is the process of specifying a test design, test cases and test procedures. The specifications should cover both functional and non-functional features of the system as described in the system design. The test design identifies features to be tested by the design, and its associated tests. The test design identifies test case specifications, which in turn identifies test procedure specifications. Test procedure specifications are the steps involved in executing a set of test cases. 3. Test environment and test data- addresses the task of establishing a test environment that is separated from the development environment and simulates/is the environment in which the system will be put into operation.
7 7 of Testing- is the task of testing the system based on test design specifications, test cases, and test procedure specifications. The test log is a record of relevant details about the execution of a test. The test incident report documents any event that occurs during the testing procedure that requires investigation. 5. Reporting and approval- involves developing the test reports and making sure the test is approved by proper authorities. The test report summarizes the results of the testing activities and provides evaluations based on these results. 4 Case Study: Medical Battalion during Exercise "Interaction" The evaluation framework described above was first applied on EvacSys during the military exercise Interaction in northern Norway in December This was a 5-day realistic exercise that involved both land and air units, and the EvacSys system was tested by the medical battalion in the 6th Division in the Norwegian Army. Several complete evacuation run-throughs were conducted and each step was evaluated using the framework. 4.1 Test preparation The following activities were carried out as a preparation to the test in real environments: We did a pre-test on a few of the participant to ensure that terminology and language of questions were easily understandable. We made a scenario overview that identified what key factors the observers should focus on. We gathered context information about all the participating users by using questionnaires. It is important to be aware of the technological competence when introducing new technology. We gave a brief introduction to the system and made sure that everyone had the opportunity to learn about the system and their interface to it 4.2 Testing in real environments The following activities were carried out during the exercise: A dynamic observer followed the patient throughout the evacuation chain (Battlefield, 1 st Transport, Level 1 Mobile Aid Post, 2 nd Transport, and Level 2 Light Field Hospital). Two observers were constantly located at each of the evacuation positions (static observers). Observers used log-schemas to log the activities on each of the locations before, during and after an incident occurs. Free notations were also documented in addition to the logschemas. Video recordings and photographs were used to document how specific actions were performed. The participants/medics were instructed to think aloud when performing their tasks. Evacuation run-troughs without the introduced technology and in dual-mode (new and old at the same time) were conducted for comparison studies. All participants were interviewed after each evaluation run-through. The interviews were recorded and typically took about 10 minutes. All participants filled out questionnaires regarding usability after each run-through and at the end of each day. The questions were based on previously validated scales from the
8 8 of 11 Technology Acceptance Model (TAM) [5] and The Perceived Characteristics of Innovating (PCI) [6] Figure 4: An example observer configuration. 4.3 After the Test After the exercise the gathered data were properly analysed. This resulted in new usability knowledge and evidences that can be used for improvement and comparison to other systems (or pre-system state). The analysis included the following activities: Debriefing meeting between observers and central participants. Transcription of interviews. Transcription and analysis of observations from log-schemas, notes and video. Analysis of information registered with the new technology and comparison with information gathered without it. This is typically amount of information, relevance and correctness. Registering results with statistical software (such as SPSS). Grouping questions and running factor analysis. Writing reports presenting the most important discoveries, statistics, and pictures, and that discusses further work. It is also advisable to make a short movie from the video material that can be used as a visual project presentation. In order to obtain statistically significant results it is important to have enough run-throughs and participants/medics. A medic should participate in more than one run-through and identifiable in order to observe improvements as the new technology becomes more familiar. Interviews and questionnaires should be applied immediately after a participant has completed his or her tasks.
9 9 of 11 5 Evaluation Framework Benefits By applying this evaluation framework one is able to identify and evaluate factors that would be difficult to observe in other ways. With real users in a realistic environment unexpected events are bound to happen, and new improvements and ways of use not originally thought of can be implemented. Working under pressure and in difficult conditions, a few creative users may come up with brilliant new ideas, and larger numbers of users usually indicate which way to go. The evaluation framework considers both these qualitative and quantitative aspects. The framework is also designed for full scale, complete run-throughs, and not just on isolated events. This also contributes to the relevance of the results.
10 10 of 11 6 Target Market Even thought the framework was designed for a specific project is can easily be applied to similar environments, not only related to military and healthcare. If you want to introduce new technology into an environment that conforms to some of the following concerns you should consider taking advantage of the EvacSys evaluation framework: You want to introduce and evaluate new technology that must be tightly integrated with existing work procedures and/or adds new functionality. Unpredictable incidents may occur and the system/technology must adapt. The work is carried out in a sometimes hectic and stressful environment and the weather conditions may be unfriendly. The users follow predefined work procedures. The new system is just a tool for accomplishing their main responsibilities, thus education and training in using the new system might be limited. User collaboration and communication is vital, and concurrent activities occur at several physical locations. You need to secure high usability and efficiency. You need high-quality evaluation documentation. You need to minimize the risk of failure and maximize the chance for smooth integration immediate return of effort. 7 References 1. Nielsen, J. Medical Usability: How to kill Patients through Bad Design. Jakob Nielsen s Alertbox. 2. Preece J. et.al. (1999) Human Computer interaction, Addison-Wesley. 3. Myers, G. (1979), The art of Software Testing, Wiley, 4. Pressman, R., S. (1997), Software Engineering, A Practitioner s Approach, McGraw- Hill. 5. Davis, F.D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, Vol. 13, pp Moore, G. C. and I. Benbasat (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation, Information Systems Research Vol 2 No 3 pp
11 11 of 11 8 Contact us For all questions regarding the evaluation framework (or the EvacSys system and concept) please contact: John Ivar Brevik MD, Chief Physician Norwegian Joint Medical Service joivar@online.no Office phone: Cell phone: Marius Mikalsen Research Scientist SINTEF ICT Ståle Walderhaug Research Scientist Norwegian Joint Medical Service swalderhaug@mil.no stale.walderhaug@sintef.no Office phone: Cell phone: Fax: Per H Meland Research Scientist SINTEF ICT Marius.mikalsen@sintef.no Office phone: Cell phone: Fax: Per.H.Meland@sintef.no Office phone: Cell phone: Fax:
CHAPTER 2 LITERATURE SURVEY
10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional
More informationIntroduction to Agile Life Cycles. CSCI 5828: Foundations of Software Engineering Lecture 07 09/13/2016
Introduction to Agile Life Cycles CSCI 5828: Foundations of Software Engineering Lecture 07 09/13/2016 1 Goals Introduction to Agile Life Cycles The Agile Manifesto and Agile Principles Agile Life Cycles
More informationRequirements Engineering
Requirements Engineering Professor Ray Welland Department of Computing Science University of Glasgow E-mail: ray@dcs.gla.ac.uk The Importance of Requirements Identifying (some) requirements is the starting
More informationIntroduction to Software Engineering
Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements
More informationRequirements Engineering. Andreas Zeller Saarland University
Requirements Engineering Software Engineering Andreas Zeller Saarland University Communication project initiation requirements gathering Planning estimating scheduling tracking Waterfall Model (1968) Modeling
More informationRequirements Knowledge Model. Business. Event. Business. responding. Business. Use Case 1.. Business tracing * * * * Requirement
Requirements Knowledge Model This model provides a language for communicating the knowledge that you discover during requirements-related activities. We present it here as a guide to the information you
More informationTesting 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG
CONCEPT HEIDELBERG GMP Compliance for January 16-17, 2003 at Istanbul, Turkey Testing for Systems Validation Dr.-Ing. Guenter Generlich guenter@generlich.de Testing 1 Testing: Agenda Techniques Principles
More informationSistemi ICT per il Business Networking
Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking Requirements Engineering Docente: Vito Morreale (vito.morreale@eng.it) 17 October 2006 1 UP Phases 1. Inception
More informationA New Divide & Conquer Software Process Model
A New Divide & Conquer Software Process Model First A. Hina Gull, Second B. Farooque Azam Third C. Wasi Haider Butt, Fourth D. Sardar Zafar Iqbal Abstract The software system goes through a number of stages
More informationDigital Industries Apprenticeship: Occupational Brief. Software Tester. March 2016
Digital Industries Apprenticeship: Occupational Brief Software Tester March 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 4 Software Tester Apprenticeship Minimum Standards and Grading
More informationAUDITING CONCEPTS. July 2008 Page 1 of 7
AUDITING CONCEPTS 1. BACKGROUND Each of the twenty aspects in SAP Sections B and C has been separated into components that need to be addressed individually. As well as addressing the specific SAP requirement,
More informationANALYSIS OF THE RESULTS FROM QUALITY SELF-ASSESSMENT OF STATISTICAL INFORMATION IN THE NATIONAL STATISTICAL SYSTEM OF BULGARIA
ANALYSIS OF THE RESULTS FROM QUALITY SELF-ASSESSMENT OF STATISTICAL INFORMATION IN THE NATIONAL STATISTICAL SYSTEM OF BULGARIA April, 2010 1 CONTENTS 1. INTRODUCTION...3 2. SURVEY DESCRIPTION...3 2.1.
More informationCCU 2010 / Identifying User Needs and Establishing Requirements. Lesson 7. (Part1 Requirements & Data Collection)
CCU 2010 / 2011 Lesson 7 Identifying User Needs and Establishing Requirements (Part1 Requirements & Data Collection) Previous Lesson (1) Participative Design Users are active in Developing Discussing and
More informationRequirements Analysis and Design Definition. Chapter Study Group Learning Materials
Requirements Analysis and Design Definition Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this
More informationEvaluation of E-health
Evaluation of E-health Learning Objectives On completion of this topic, students will be able to: - Introduce current evaluation frameworks; - Explore methods/tools used in E-Health evaluation; - Provide
More informationmaking money from customer use of kiosk attracting more customers to the store saving money if the kiosk replaces manual operations
Business Requirements Business requirements collected from multiple sources might conflict. For example, consider a kiosk product with embedded software that will be sold to retail stores and used by the
More informationProduct Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Types of S/W Requirements. Levels of S/W Requirements
Requirements Overview importance of getting right difficulty of getting right types and levels of characteristics of good the Requirements Development Process inception gathering, classification evaluation
More informationBASICS OF SOFTWARE TESTING AND QUALITY ASSURANCE. Yvonne Enselman, CTAL
BASICS OF SOFTWARE TESTING AND QUALITY ASSURANCE Yvonne Enselman, CTAL Information alines with ISTQB Sylabus and Glossary THE TEST PYRAMID Why Testing is necessary What is Testing Seven Testing principles
More informationSafety Perception / Cultural Surveys
Safety Perception / Cultural Surveys believes in incorporating safety, health, environmental and system management principles that address total integration, thus ensuring continuous improvement, equal
More informationModule 1 Introduction. IIT, Bombay
Module 1 Introduction Lecture 1 Need Identification and Problem Definition Instructional objectives The primary objective of this lecture module is to outline how to identify the need and define the problem
More informationIntroduction to Software Life Cycles and Agile. CSCI 5828: Foundations of Software Engineering Lecture 03 09/02/2014
Introduction to Software Life Cycles and Agile CSCI 5828: Foundations of Software Engineering Lecture 03 09/02/2014 1 Goals Present an introduction to the topic of software life cycles concepts and terminology
More informationCustomer, consumer and user involvement in product development: A framework and a review of selected methods
TOTAL QUAUTY MANAGEMENT, VOL. 9, NO. 1, 1998, 141-149 CARFAX Customer, consumer and user involvement in product development: A framework and a review of selected methods M. A. KAULIO School of Technology
More informationSoftware Engineering Lecture 5 Agile Software Development
Software Engineering Lecture 5 Agile Software Development JJCAO Mostly based on the presentation of Software Engineering, 9ed Exercise Describe the main activities in the software design process and the
More informationIFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004
INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July
More informationFunctional requirements and acceptance testing
Functional requirements and acceptance testing Lecture 3 Software Engineering TDDC88/TDDC93 autumn 2007 Department of Computer and Information Science Linköping University, Sweden Message from the course
More informationISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices
INTERNATIONAL STANDARD ISO 31000 First edition 2009-11-15 Risk management Principles and guidelines Management du risque Principes et lignes directrices http://mahdi.hashemitabar.com Reference number ISO
More informationRole of Technical Complexity Factors in Test Effort Estimation Using Use Case Points
Role of Technical ity s in Test Effort Estimation Using Use Case Points Dr. Pradeep Kumar Bhatia pkbhatia.gju@gmail.com Ganesh Kumar gkyaduvansi@gmail.com Abstarct-The increasing popularity of use-case
More informationCUSTOMER SATISFACTION DATA
CUSTOMER SATISFACTION DATA Collecting, Analyzing and Reporting With information from: Surveying Clients About Outcomes The Urban Institute, 2003 CSBG ORGANIZATIONAL STANDARD 1.3 : The organization has
More informationStatic Code Analysis A Systematic Literature Review and an Industrial Survey
Thesis no: MSSE-2016-09 Static Code Analysis A Systematic Literature Review and an Industrial Survey Islam Elkhalifa & Bilal Ilyas Faculty of Computing Blekinge Institute of Technology SE 371 79 Karlskrona,
More informationLearning Objectives. Agile Modeling and. Major Topics. Prototyping. Patched Up Prototype. Agile Modeling, but First. Prototyping
Agile Modeling and Prototyping Systems Analysis and Design, 7e Kendall & Kendall 6 Learning Objectives Understand the roots of agile modeling in prototyping and the four main types of prototyping Be able
More informationRequirements Validation and Negotiation
REQUIREMENTS ENGINEERING LECTURE 2014/2015 Dr. Sebastian Adam Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects
More informationWORKING WITH TEST DOCUMENTATION
WORKING WITH TEST DOCUMENTATION CONTENTS II. III. Planning Your Test Effort 2. The Goal of Test Planning 3. Test Planning Topics: b) High Level Expectations c) People, Places and Things d) Definitions
More information03. Perspective Process Models
03. Perspective Process Models Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2017 Prescriptive Process Models advocates an orderly approach to software
More informationProcess-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach
Process-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach Beate List, Josef Schiefer, A Min Tjoa Institute of Software Technology (E188) Vienna University
More informationRUP and XP Part II: Valuing Differences
RUP and XP Part II: Valuing Differences by Gary Pollice Evangelist, The Rational Unified Process Rational Software In the last issue of The Rational Edge, we looked at the common ground between the Rational
More informationFlexibility on what is delivered High
Flexibility on what is delivered level 1: Stakeholders are very comfortable with the fact that limited flexibility on budget and time may be necessary in order to deliver the full scope on quality, and
More informationCMPT 275 Software Engineering
CMPT 275 Software Engineering Software life cycle 1 Software Life Cycle Sequence of processes completed as a software project moves from inception to retirement At beginning of project development, choose
More informationWORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B
1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework
More informationIntroduction and Key Concepts Study Group Session 1
Introduction and Key Concepts Study Group Session 1 PD hours/cdu: CH71563-01-2018 (3 hours each session) 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters
More informationNATURAL S P I. Critical Path SCAMPI SM. Getting Real Business Results from Appraisals
Critical Path SCAMPI SM Getting Real Business Results from Appraisals NATURAL S P I 1 What You Will Get Level-Set: What Is and What Is Not a SCAMPI Level-Set: What a SCAMPI Can and Cannot Do Problems:
More informationIntroduction. Fundamental concepts in testing
INF 3121 Software Testing - Lecture 01 Introduction. Fundamental concepts in testing 1. Why is testing necessary?? 4. Fundamental test process 5. The psychology of testing 1 1. Why is testing necessary?
More informationValidation of NORM (Needs Oriented Framework for Producing Requirements Decision Material) Framework in Industry
Master Thesis Software Engineering Thesis no: MSE-2012:102 09 2012 Validation of NORM (Needs Oriented Framework for Producing Requirements Decision Material) Framework in Industry Salman Nazir Rizwan Yousaf
More informationAgile Quality Management
Agile Quality Management Panagiotis Sfetsos, PhD Assistant Professor, Department of Informatics, Alexander Technological Educational Institution E mail: sfetsos@it.teithe.gr Web Page: http://aetos.it.teithe.gr/~sfetsos/
More informationUPGRADE CONSIDERATIONS Appian Platform
UPGRADE CONSIDERATIONS Appian Platform ArchiTECH Solutions LLC 7700 Leesburg Pike #204 www.architechsolutions.com 703-972-9155 atsdelivery@architechsolutions.com TABLE OF CONTENTS Introduction... 3 Upgrade
More informationWhat are requirements? Basics of Requirement Engineering. Definition of a Stakeholder. Stated Vs. Real Requirements. Stated Vs.
What are requirements? Basics of Requirement Engineering Muzaffar Iqbal Farooqi A requirement is a necessary attribute in a system, a statement that identifies a capability, characteristic, or quality
More informationCourse Contents: TM Activities Identification: Introduction, Definition, Identification processes, Case study.
Chapter 2 Technology Identification Course Contents: TM Activities Identification: Introduction, Definition, Identification processes, Case study. Contents Chapter 2 Technology Identification... 1 Introduction...
More informationRetaining Employers for Work Placement Students
Retaining Employers for Work Placement Students Action Research Project by Jennifer Boyce Introduction The purpose of this research is to establish why employers very rarely continue to participate in
More informationIt will also enable you to manage the expectations of your clients or management, as they will know exactly what to expect.
Functional Specification / Requirement Document (FSD / FRD) The Functional Specification Document (FSD) in software development is a formal document that describes the functions of the software/system
More informationIIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3
IIBA Global Business Analysis Core Standard A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 International Institute of Business Analysis, Toronto, Ontario, Canada.
More informationAN APPROACH FOR EFFECTIVE QUALITY ASSURANCE AND IMPROVEMENT
AN APPROACH FOR EFFECTIVE QUALITY ASSURANCE AND IMPROVEMENT Yohanes Kristianto Universitas Katolik Darma Cendika / PT. ISM Tbk Bogasari Flour Mills Email: y_kristianto@hotmail.com / QA.Surabaya@bogasariflour.com
More informationAUDIT Where are we now? ONGOING MEASUREMENT Are we getting there?
CIPR Skill Guide Internal Communications: Measurement & Evaluation Applying the PRE Cycle to Internal Communications Introduction Measurement & evaluation is at the heart of successful, strategic internal
More informationMarketing Research Tools. Michele Morehouse. University of Phoenix MKT/441. Norma Atkinson
Marketing Research Tools 1 Marketing Research Tools Michele Morehouse University of Phoenix MKT/441 Norma Atkinson Marketing Research Tools 2 Overview Market research has several pertinent points that
More informationIntroduction and Key Concepts Study Group Session 1
Introduction and Key Concepts Study Group Session 1 PDU: CH71563-04-2017 (3 hours) 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this
More informationTen Requirements for Effective Process Control
Published in ASQ Quality Progress and won the Paper of the Year Award in 2002. Ten Requirements for Effective Process Control Thomas A. Little Ph.D. Thomas A. Little Consulting 12401 N Wildflower Lane
More informationCRM System Tester. Location London Department Supporter and Community Partnerships. CRM Project Manager Salary Band C
CRM System Tester Location London Department Supporter and Community Partnerships Reports to (Job Title) CRM Project Manager Salary Band C Matrix manager (if applicable) Click here to enter text. Competency
More informationUSER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS
USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS Ganesh Vaidyanathan, Indiana University South Bend, gvaidyan@iusb.edu Asghar Sabbaghi, Indiana University
More informationThe Complexity of Governing a Regional EPR System
The Complexity of Governing a Regional EPR System Gro-Hilde Ulriksen Norwegian Centre for E-health Research University Hospital of North Norway Telemedicine and ehealth Research Group, The Arctic University
More informationWorkflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1
Workflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1 FFG IKT der Zukunft SHAPE Project 2014 845638 Table 1: Document Information Project acronym:
More informationProduct Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Levels of S/W Requirements. Types of S/W Requirements
Requirements Overview importance of getting right difficulty of getting right types and levels of characteristics of good the Requirements Development Process inception gathering, classification actors
More informationHOW TO WRITE A WINNING PROPOSAL
HOW TO WRITE A WINNING PROPOSAL WHAT IS A PROPOSAL? A proposal is a picture of a project, it is NOT the project. In that sense, it is based on your project plan but may be quite different from the Project
More informationARCHITECTURAL PROGRAMMING: PROVIDING ESSENTIAL KNOWLEDGE OF PROJECT PARTICIPANTS NEEDS IN THE PRE-DESIGN PHASE
ARCHITECTURAL PROGRAMMING: PROVIDING ESSENTIAL KNOWLEDGE OF PROJECT PARTICIPANTS NEEDS IN THE PRE-DESIGN PHASE Stefan Faatz Lecturer, MSc Institute for interdisciplinary Construction Process Management
More informationTECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY
SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY D7-24 5-2004 FOREWORD This Part of SASO s Technical Directives is Adopted
More informationRequirements Analysis. Overview
Requirements Analysis Overview What is requirement? Classification of requirements Iterative and evolutionary requirements analysis Use Cases Domain models N. Meng, B. Ryder 2 1 Requirements Definition
More informationNEW! The Project Manager & The Business Analyst. by Barbara A. Carkenord, CBAP, PMP, PMI-ACP
NEW! The Project Manager & The Business Analyst by Barbara A. Carkenord, CBAP, PMP, PMI-ACP A White Paper from RMC Project Management, Inc. www.rmcproject.com 10953 Bren Road East, Minnetonka, Minnesota
More informationCHAPTER 4 EXAMINATION OF THE OVERALL R&M ACTIVITY CONTENTS
Applied R&M Manual for Defence Systems Part A: General CHAPTER 4 EXAMINATION OF THE OVERALL R&M ACTIVITY CONTENTS Page 1 Introduction 2 2 The Generalised R&M Activity 3 3 Decomposition 5 4 Techniques 12
More informationLecture 1: Processes, Requirements, and Use Cases
Lecture 1: Processes, Requirements, and Use Cases 1 Development Processes Early Days: evolve a system Build and fix Leads to chaos Need for intelligent design Waterfall Model Requirements, Design, Code,
More informationUtilizing Design Thinking for Digital Transformation
Utilizing Design Thinking for Digital Transformation March 2016 Introduction The past decade has proved to be a turning point for organizations. As the need to anticipate customer demands increases in
More informationContract Interpretation The grievance alleges that a provision of the contract, other than the just cause provision, was violated.
HANDLING GRIEVANCES 1. What is a Grievance? Grievances are defined under the contract. Be sure to know your timelines for filing a grievance and moving the grievance to the next step, if necessary. Generally,
More informationSystems Engineering Concept
Systems Engineering Concept WHITE PAPER February 2017 The Systems Engineering Concept provides practical hands-on methods and tools, that enable companies to meet today s global business challenges through
More informationChallenges in Assessing Parameters of a Socio-Technical System
Challenges in Assessing Parameters of a Socio-Technical System Ilia Bider and Erik Perjons DSV - Stockholm University, Stockholm, Sweden [ilia perjons]@dsv.su.se Abstract. The paper is an investigation
More informationCustomer-focused review of the IT services formerly provided by Health Solutions Wales (now provided by NWIS) Velindre NHS Trust
Customer-focused review of the IT services formerly provided by Health Solutions Wales (now provided by NWIS) Velindre NHS Trust Audit year: 2010-11 Issued: February 2012 Document reference: 161A2012 Status
More informationISO/IEC INTERNATIONAL STANDARD. Systems and software engineering System life cycle processes IEEE
INTERNATIONAL STANDARD ISO/IEC 15288 IEEE Std 15288-2008 Second edition 2008-02-01 Systems and software engineering System life cycle processes Ingénierie des systèmes et du logiciel Processus du cycle
More informationIntergeneration Mentoring. for Entrepreneurs TEACHER GUIDE. For Mentor Training Course
This document reflects the views only of the authors and the Commission cannot be held responsible for any use which may be made of the information contained therein Project Number: 2014-1-ES01-KA200-004372
More informationIt s about your success
Business-IT alignment assessment Proposed approach and methodology OCTANT 1 Introduction The domain of IT Governance, business-it alignment and process optimization is one of the cornerstones of BUSINESS
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing
INTERNATIONAL STANDARD ISO/IEC 27007 First edition 2011-11-15 Information technology Security techniques Guidelines for information security management systems auditing Technologies de l'information Techniques
More informationSoftware Engineering II - Exercise
Software Engineering II - Exercise April 29 th 2009 Software Project Management Plan Bernd Bruegge Helmut Naughton Applied Software Engineering Technische Universitaet Muenchen http://wwwbrugge.in.tum.de
More informationCourse : Software Engineering and Project Management. Unit 2 Software Requirements Engineering & Analysis
Course : Software Engineering and Project Management Unit 2 Software Requirements Engineering & Analysis Syllabus Requirements Engineering : User and system requirements, Functional and non-functional
More informationCategory 1 Consumer Input & Involvement
TECHNICAL ASSISTANCE GUIDE COE DEVELOPED CSBG ORGANIZATIONAL STANDARDS Category 1 Consumer Input & Involvement Community Action Partnership 1140 Connecticut Avenue, NW, Suite 1210 Washington, DC 20036
More informationFDA Medical Device HFE Guidance
W H I T E P A P E R www.makrocare.com U S FDA has established a new Draft Guidance; Applying Human Factors and Usability Engineering to Medical Devices to Optimize Safety and Effectiveness in Design. Manufacturers
More informationUoD IT Job Description
UoD IT Job Description Role: Service Delivery Manager (People HERA Grade: 8 Management Systems) Responsible to: Assistant Director (Business Services) Accountable for: Day to day leadership of team members
More informationVolume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info A Study of Software Development Life Cycle Process Models
More informationIntroduction to Software Engineering
UNIT I SOFTWARE PROCESS Introduction S/W Engineering Paradigm life cycle models (water fall, incremental, spiral, WINWIN spiral, evolutionary, prototyping, objects oriented) -system engineering computer
More information1. What is the most effective source of building business in an established primary care setting?
CPPM Ch 12 Review Questions 1. What is the most effective source of building business in an established primary care setting? a. Direct mail marketing b. Word of mouth referrals c. TV and radio ads d.
More informationQuality Concepts. Slide Set to accompany. Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman
Chapter 14 Quality Concepts Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For non-profit
More informationTOWARDS UNDERSTANDING THE DO-178C / ED-12C ASSURANCE CASE
TOWARDS UNDERSTANDING THE DO-178C / ED-12C ASSURANCE CASE C.M. Holloway NASA Langley Research Center, Hampton VA, USA, c.michael.holloway@nasa.gov Keywords: assurance case, software, standards, certification,
More informationCost of Changing the Activities in SDLC. Minimum of Cost at this level. code debuging unit test integration. Activity
Software Development Life Cycle (SDLC) This is a work flow for creating a new software/application. Usually, any company that is in the software business follows the same route and structure. In this document
More informationIntelligently Choosing Testing Techniques
Intelligently Choosing Testing Techniques CS 390: Software Engineering Dr. Hwang By: Jonathan Bach October 28, 2008 1 The ability for a company to produce a complicated, high quality, problem free product
More informationLittle r and Big R (Where r and R = Reliability)
Little r and Big R (Where r and R = Reliability) Reliability is in the vocabulary of almost everyone. Ask an ordinary person to define reliability. You ll get a wide variety of non-responses ending in
More informationSAS ANALYTICS AND OPEN SOURCE
GUIDEBOOK SAS ANALYTICS AND OPEN SOURCE April 2014 2014 Nucleus Research, Inc. Reproduction in whole or in part without written permission is prohibited. THE BOTTOM LINE Many organizations balance open
More informationCompetency Frameworks as a foundation for successful Talent Management. part of our We think series
Competency Frameworks as a foundation for successful part of our We think series Contents Contents 2 Introduction 3 If only they solved all of our problems 3 What tools and techniques can we use to help
More informationLeading Enterprise Change by Developing & Leveraging HR Business Partners
Leading Enterprise Change by Developing & Leveraging HR Business Partners B y Agni Kitsios, Kitsios Consulting, Inc. May 15 18, 2016 Dallas, Texas, USA 1 Introduction How do you provide the necessary change
More informationMitigating Medical Device Risk through Human Factors. Christina Mendat, PhD Director, Research & Human Factors
Mitigating Medical Device Risk through Human Factors Christina Mendat, PhD Director, Research & Human Factors A profound statistic one-third of medical device incidents involve user error and more than
More informationISO whitepaper, January Inspiring Business Confidence.
Inspiring Business Confidence. ISO 31000 whitepaper, January 2015 Author: Graeme Parker enquiries@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk ISO 31000 is an International Standard for Risk
More informationProject Manager, Project Oak Clinical Documentation and eprescribing Grade VIII (Temporary) Job Specification & Terms and Conditions
Project Manager, Project Oak Clinical Documentation and eprescribing Grade VIII (Temporary) Job Specification & Terms and Conditions Job Title and Grade Project Manager, Project Oak Clinical Documentation
More informationLecture 3 Design Approaches and Methods
Lecture outline Unit IMS5302 Lecture 3 Design Approaches and Methods This lecture will cover: Organisation of knowledge Gulf of execution and evaluation Design principles Methodologies for developing effective
More informationDesign and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements
Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements Malik Qasaimeh and Alain Abran Abstract ISO 9001 demands of (software) organizations that a rigorous demonstration
More informationCopyright Software Engineering Competence Center
Copyright Software Engineering Competence Center 2012 1 Copyright Software Engineering Competence Center 2012 5 These are mapped categories to the waste categories of manufacturing. An excellent overview
More informationRequirements Capturing by the System Architect
- top-down key-drivers (customer, business) operational drivers (logistics, production, etc.) roadmap (positioning and trends in time) competition (positioning in the market) regulations "ideal" reference
More informationThe Top Thrill Dragster
EEC 421/521: Software Engineering The Software Process Prescriptive Process Models 1/22/08 EEC 421/521: Software Engineering 1 The Top Thrill Dragster 420 ft tall Max speed over 120 mph World s second
More informationIMPLEMENTATION, EVALUATION & MAINTENANCE OF MIS:
IMPLEMENTATION, EVALUATION & MAINTENANCE OF MIS: The design of a management information system may seem to management to be an expensive project, the cost of getting the MIS on line satisfactorily may
More information