Medical Informatics Testing. Framework (MIT-F)

Size: px
Start display at page:

Download "Medical Informatics Testing. Framework (MIT-F)"

Transcription

1 Joint Medical Service Norwegian Armed Forces Military Medical Research and development Medical Informatics Testing Framework (MIT-F) 1 Executive Summary In June 2002 USA (Department of Defence) and Norway (Ministry of Defence) signed a Memorandum of Understanding (MoU) agreement in the area of telemedicine. The objectives were to share experience/lessons learned and together do some research in new concepts/architectures that involves the use of the US PIC 1. Since June 2002 the MOU project has developed a prototype system called Evacuation Support System (EvacSys). This system uses the PIC as an "electronic field medical card" and addresses the problems of capturing, storing and distributing medical treatment and patient tracking information during the evacuation of a wounded soldier from field. In order to have an efficient iterative development process and to document the benefits and improvements of EvacSys, a framework for testing and evaluation has been developed namely the MIT-F. The MIT-F defines: Why to test (rationale) Figure 1 Field medics performing and documenting treatment. What tests can be performed (test types) What documentation can be produced (test specification) How to test (methodology) 1 Personal Information Carrier:

2 2 of 11 We believe the framework can easily be applied to other domains and systems that face similar operational challenges. This whitepaper introduce the framework and how it can be applied. 2 Why use MIT-F? 2.1 Testing The purpose of testing is to unveil and remove as many deviations as possible in the system within a given time- and resource-frame, and to ensure that the system complies with the test s pass criteria. A test should also verify that the system complies with its requirement specification. But testing should also find out if the system is suitable for its purpose. "Suitable" is tightly connected to usability, thus testing should also evaluate and contribute to improve the overall usability of the system. Glen Myers [3] states: 1. Testing is a process of executing a program with the intent of finding an error 2. A good test case is one that has high probability of finding an as-yet undiscovered error. 3. A successful test is one that uncovers an as-yet undiscovered error Testing can only find errors; it cannot prove the absence of errors. Consequently, exhaustive testing is impossible, and a testing never ends- it is being stopped when deemed sufficient. 2.2 Verification, Validation and Usability When planning system testing, one should make a distinction between system verification and system validation. According to the IEEE Standard Glossary of Software Engineering Terminology 2, verification is defined as "The process of evaluating a system or component to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase." Validation, on the other hand, is defined as "The process of evaluating a system or component during or at the end of the development process to determine whether it satisfies specified requirements." Verification checks that the system conforms to the specification (System Requirements), while validation checks that the system conforms to its intended use. It may be the case that the system is verified (all system requirements are fulfilled), but the system does not validate (does not conform to intended use). In this case the system requirements must be changed / updated. In summary: Verification: is the system correct? Validation: is it the correct system? MIT-F addresses all aspects of software testing (see section 3.1), but the primary focus is on validation and usability. This is because bad usability can kill patients [1]. We argue that in systems with safety concerns (i.e. systems that have implications on people s safety), high usability is key. Usability can be defined as [2]: A measure of the ease of use with which a system can be learned or used, its safety, effectiveness and efficiency, and the attitude of its users towards it. 2

3 3 of 11 The only feasible way to ensure that you achieve a sufficient degree of usability, is to validate the system using relevant end users in a realistic operational environment that capture the aspects of unfriendly environmental conditions, stressful work situations and unexpected events that are likely phenomena in the environment. This is also referred to as Site Acceptance Testing (SAT) and User Acceptance Testing (UAT) Figure 2: The relation between verification, validation and usability Figure 2 shows the relations between usability, verification and validation in a system perspective. The system has an "Intended use" that is highly dependent on good "Usability". These usability requirements are specified in the "System Requirements", but can only be tested during "Validation". MIT-F is a testing framework designed to be able to implement validation using efficient acceptance tests where real users use the system is real environments. 3 Framework Description 3.1 Tests Categories Four kinds of tests are being performed in MIT-F: Internal test Module/component testing Conducted in parallell with development Stepwise integrationtest Performed in internal test environment FAT Test of complete solution with solution provider Performed in suppliers environment SAT Test of complete solution in customer's environment Ensure that no errors are introduced during shipment and installation UAT Testing involving relevant end users in realistic environments

4 4 of 11 Internal test, including developer tests, unit tests, and internal integration tests Factory Acceptance Tests (FAT), testing the system with the solution provider Site Acceptance Test (SAT), testing the system functionality at the customer User Acceptance Tests (UAT), testing with relevant end users in realistic environment 3.2 Methodology Scenario based Acceptance Testing In MIT-F we suggest the use of Scenario-based testing (SBT) [4]. SBT concentrates on what the user does, and not what the product does. It means capturing representative tasks (via use cases and user stories) that the user will perform, and then applying them and their variants to as tests. Scenarios uncover interaction errors. To accomplish this, test scenarios must be realistic. Scenario based testing exercise multiple sub-systems in a single test (users do not limit themselves to one sub system at a time). MIT-F scenarios contain the following: Unique identifier Short description of scenario Precondition for the scenario What is documented using video What is documented as written log data What is documented using questionnaire, what questionnaire is used Variations of scenario Roles and responsibilities of evaluators Roles and responsibilities of testers Post conditions Acceptance Testing Evaluation Techniques This section describes the techniques we suggest to evaluate the tests we perform. The core task is to collect as much data as possible, to best answer the questions that are the rationale to perform the tests. We will use two complementary techniques: Observing usage and Collecting users opinions. Pretesting Questionnaires and Interview Guidelines Questionnaires and interview guidelines needs to be tested. This is done to ensure that they are fully understood by the target group, and to remove ambiguities and possible misunderstandings. Training When dealing with systems that require training, one need to train the users in the system before testing commences. This is done to reduce the amount of feedback on the system that originates from lack of training. Comparative Studies A computer system is introduced as a solution to a problem. The problem can be another computer system or not any system at all. In order to evaluate whether or not the new computer system, is solving the problem, we need to compare the old approach to the new. This involves designing two tests, one for the old approach, and another for the new approach involving the new system. Then we are able to compare (e.g. comparing time used to solve a task, user

5 5 of 11 satisfaction etc.) the two approaches and determine whether or not the new system constitutes an improvement. Direct Observation by Logging At least one evaluator is always observing the activities of the test. The evaluator is equipped with a schema for logging significant events. The schema includes a detailed specification of what is to be observed. Users are encouraged to think aloud. Even though this is considered awkward for most users, it provides valuable input for the evaluation. If it is impossible to achieve this, it is important for the observer to log as much incidents as possible, so one can have the user explain his thoughts in the interview. Indirect Observation using Video A human evaluator will have problems registering and logging everything that happens in a test scenario. It is therefore beneficial to supplement the logging using video recordings. There should always be one evaluator observing and one filming. This is because the person filming will not be able to observe, and vice versa. Analysing video is a very time consuming task, and what to be filmed must be carefully specified. It is recommended that video is used only for documentation, and not primary for the analysis. Collecting User Opinions In addition to observation, we recommend to collect data through the use of interviews and questionnaires. For the interview we are interchangeably using structured and unstructured interviews. Unstructured interviews will typically be used in the first tests to collect user s opinions about the system. In later tests one will have more concrete questions that need answering, and one can use structured interviews. Interviews are specified for each test specification. Questionnaires are used to collect a user s opinions after having performed test scenarios. Questionnaires will be specified for each test specification. Analysing Collected Data The analysis phase includes registering results with statistical software (such as SPSS 3 ). One need to group questions and run factor analysis. In order to obtain statistically significant results it is important to have a sufficient amount of test runs and testers. Other data sources such as observation logs, video recordings and interviews should be analysed in order to prove or disprove findings from statistical analysis. Findings must be unambiguous and must be documented carefully. All sources of error should be commented and investigated. 3.3 Test Process Testing conducted with MIT-F consists of five main activities 4 : The documents produced comply with IEEE Std , Standard for Software Test Documentation.

6 6 of 11 Start Project doc Develop Test Plan Test plan Preparing test environment Test Specification Test design spec Test case spec Perform test Test procedure specification Test data Test log Overall Test Report Test incident report Stop Test Reports Figure 3: Activities and documents in MIT-F 1. Planning is the process of developing the test plan, approve it, and distribute it to target group. Project documents such as requirements specifications, architecture, and design specifications are input to the plan. The test plan prescribes scope, approach, resources and schedule of testing activities. Focus is on identifying the test items, and test items should include reference to other documentation (e.g. requirement specification) for the item, if such documentation exists. 2. Specification is the process of specifying a test design, test cases and test procedures. The specifications should cover both functional and non-functional features of the system as described in the system design. The test design identifies features to be tested by the design, and its associated tests. The test design identifies test case specifications, which in turn identifies test procedure specifications. Test procedure specifications are the steps involved in executing a set of test cases. 3. Test environment and test data- addresses the task of establishing a test environment that is separated from the development environment and simulates/is the environment in which the system will be put into operation.

7 7 of Testing- is the task of testing the system based on test design specifications, test cases, and test procedure specifications. The test log is a record of relevant details about the execution of a test. The test incident report documents any event that occurs during the testing procedure that requires investigation. 5. Reporting and approval- involves developing the test reports and making sure the test is approved by proper authorities. The test report summarizes the results of the testing activities and provides evaluations based on these results. 4 Case Study: Medical Battalion during Exercise "Interaction" The evaluation framework described above was first applied on EvacSys during the military exercise Interaction in northern Norway in December This was a 5-day realistic exercise that involved both land and air units, and the EvacSys system was tested by the medical battalion in the 6th Division in the Norwegian Army. Several complete evacuation run-throughs were conducted and each step was evaluated using the framework. 4.1 Test preparation The following activities were carried out as a preparation to the test in real environments: We did a pre-test on a few of the participant to ensure that terminology and language of questions were easily understandable. We made a scenario overview that identified what key factors the observers should focus on. We gathered context information about all the participating users by using questionnaires. It is important to be aware of the technological competence when introducing new technology. We gave a brief introduction to the system and made sure that everyone had the opportunity to learn about the system and their interface to it 4.2 Testing in real environments The following activities were carried out during the exercise: A dynamic observer followed the patient throughout the evacuation chain (Battlefield, 1 st Transport, Level 1 Mobile Aid Post, 2 nd Transport, and Level 2 Light Field Hospital). Two observers were constantly located at each of the evacuation positions (static observers). Observers used log-schemas to log the activities on each of the locations before, during and after an incident occurs. Free notations were also documented in addition to the logschemas. Video recordings and photographs were used to document how specific actions were performed. The participants/medics were instructed to think aloud when performing their tasks. Evacuation run-troughs without the introduced technology and in dual-mode (new and old at the same time) were conducted for comparison studies. All participants were interviewed after each evaluation run-through. The interviews were recorded and typically took about 10 minutes. All participants filled out questionnaires regarding usability after each run-through and at the end of each day. The questions were based on previously validated scales from the

8 8 of 11 Technology Acceptance Model (TAM) [5] and The Perceived Characteristics of Innovating (PCI) [6] Figure 4: An example observer configuration. 4.3 After the Test After the exercise the gathered data were properly analysed. This resulted in new usability knowledge and evidences that can be used for improvement and comparison to other systems (or pre-system state). The analysis included the following activities: Debriefing meeting between observers and central participants. Transcription of interviews. Transcription and analysis of observations from log-schemas, notes and video. Analysis of information registered with the new technology and comparison with information gathered without it. This is typically amount of information, relevance and correctness. Registering results with statistical software (such as SPSS). Grouping questions and running factor analysis. Writing reports presenting the most important discoveries, statistics, and pictures, and that discusses further work. It is also advisable to make a short movie from the video material that can be used as a visual project presentation. In order to obtain statistically significant results it is important to have enough run-throughs and participants/medics. A medic should participate in more than one run-through and identifiable in order to observe improvements as the new technology becomes more familiar. Interviews and questionnaires should be applied immediately after a participant has completed his or her tasks.

9 9 of 11 5 Evaluation Framework Benefits By applying this evaluation framework one is able to identify and evaluate factors that would be difficult to observe in other ways. With real users in a realistic environment unexpected events are bound to happen, and new improvements and ways of use not originally thought of can be implemented. Working under pressure and in difficult conditions, a few creative users may come up with brilliant new ideas, and larger numbers of users usually indicate which way to go. The evaluation framework considers both these qualitative and quantitative aspects. The framework is also designed for full scale, complete run-throughs, and not just on isolated events. This also contributes to the relevance of the results.

10 10 of 11 6 Target Market Even thought the framework was designed for a specific project is can easily be applied to similar environments, not only related to military and healthcare. If you want to introduce new technology into an environment that conforms to some of the following concerns you should consider taking advantage of the EvacSys evaluation framework: You want to introduce and evaluate new technology that must be tightly integrated with existing work procedures and/or adds new functionality. Unpredictable incidents may occur and the system/technology must adapt. The work is carried out in a sometimes hectic and stressful environment and the weather conditions may be unfriendly. The users follow predefined work procedures. The new system is just a tool for accomplishing their main responsibilities, thus education and training in using the new system might be limited. User collaboration and communication is vital, and concurrent activities occur at several physical locations. You need to secure high usability and efficiency. You need high-quality evaluation documentation. You need to minimize the risk of failure and maximize the chance for smooth integration immediate return of effort. 7 References 1. Nielsen, J. Medical Usability: How to kill Patients through Bad Design. Jakob Nielsen s Alertbox. 2. Preece J. et.al. (1999) Human Computer interaction, Addison-Wesley. 3. Myers, G. (1979), The art of Software Testing, Wiley, 4. Pressman, R., S. (1997), Software Engineering, A Practitioner s Approach, McGraw- Hill. 5. Davis, F.D. (1989), Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, Vol. 13, pp Moore, G. C. and I. Benbasat (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation, Information Systems Research Vol 2 No 3 pp

11 11 of 11 8 Contact us For all questions regarding the evaluation framework (or the EvacSys system and concept) please contact: John Ivar Brevik MD, Chief Physician Norwegian Joint Medical Service joivar@online.no Office phone: Cell phone: Marius Mikalsen Research Scientist SINTEF ICT Ståle Walderhaug Research Scientist Norwegian Joint Medical Service swalderhaug@mil.no stale.walderhaug@sintef.no Office phone: Cell phone: Fax: Per H Meland Research Scientist SINTEF ICT Marius.mikalsen@sintef.no Office phone: Cell phone: Fax: Per.H.Meland@sintef.no Office phone: Cell phone: Fax:

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional

More information

Introduction to Agile Life Cycles. CSCI 5828: Foundations of Software Engineering Lecture 07 09/13/2016

Introduction to Agile Life Cycles. CSCI 5828: Foundations of Software Engineering Lecture 07 09/13/2016 Introduction to Agile Life Cycles CSCI 5828: Foundations of Software Engineering Lecture 07 09/13/2016 1 Goals Introduction to Agile Life Cycles The Agile Manifesto and Agile Principles Agile Life Cycles

More information

Requirements Engineering

Requirements Engineering Requirements Engineering Professor Ray Welland Department of Computing Science University of Glasgow E-mail: ray@dcs.gla.ac.uk The Importance of Requirements Identifying (some) requirements is the starting

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements

More information

Requirements Engineering. Andreas Zeller Saarland University

Requirements Engineering. Andreas Zeller Saarland University Requirements Engineering Software Engineering Andreas Zeller Saarland University Communication project initiation requirements gathering Planning estimating scheduling tracking Waterfall Model (1968) Modeling

More information

Requirements Knowledge Model. Business. Event. Business. responding. Business. Use Case 1.. Business tracing * * * * Requirement

Requirements Knowledge Model. Business. Event. Business. responding. Business. Use Case 1.. Business tracing * * * * Requirement Requirements Knowledge Model This model provides a language for communicating the knowledge that you discover during requirements-related activities. We present it here as a guide to the information you

More information

Testing 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG

Testing 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG CONCEPT HEIDELBERG GMP Compliance for January 16-17, 2003 at Istanbul, Turkey Testing for Systems Validation Dr.-Ing. Guenter Generlich guenter@generlich.de Testing 1 Testing: Agenda Techniques Principles

More information

Sistemi ICT per il Business Networking

Sistemi ICT per il Business Networking Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking Requirements Engineering Docente: Vito Morreale (vito.morreale@eng.it) 17 October 2006 1 UP Phases 1. Inception

More information

A New Divide & Conquer Software Process Model

A New Divide & Conquer Software Process Model A New Divide & Conquer Software Process Model First A. Hina Gull, Second B. Farooque Azam Third C. Wasi Haider Butt, Fourth D. Sardar Zafar Iqbal Abstract The software system goes through a number of stages

More information

Digital Industries Apprenticeship: Occupational Brief. Software Tester. March 2016

Digital Industries Apprenticeship: Occupational Brief. Software Tester. March 2016 Digital Industries Apprenticeship: Occupational Brief Software Tester March 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 4 Software Tester Apprenticeship Minimum Standards and Grading

More information

AUDITING CONCEPTS. July 2008 Page 1 of 7

AUDITING CONCEPTS. July 2008 Page 1 of 7 AUDITING CONCEPTS 1. BACKGROUND Each of the twenty aspects in SAP Sections B and C has been separated into components that need to be addressed individually. As well as addressing the specific SAP requirement,

More information

ANALYSIS OF THE RESULTS FROM QUALITY SELF-ASSESSMENT OF STATISTICAL INFORMATION IN THE NATIONAL STATISTICAL SYSTEM OF BULGARIA

ANALYSIS OF THE RESULTS FROM QUALITY SELF-ASSESSMENT OF STATISTICAL INFORMATION IN THE NATIONAL STATISTICAL SYSTEM OF BULGARIA ANALYSIS OF THE RESULTS FROM QUALITY SELF-ASSESSMENT OF STATISTICAL INFORMATION IN THE NATIONAL STATISTICAL SYSTEM OF BULGARIA April, 2010 1 CONTENTS 1. INTRODUCTION...3 2. SURVEY DESCRIPTION...3 2.1.

More information

CCU 2010 / Identifying User Needs and Establishing Requirements. Lesson 7. (Part1 Requirements & Data Collection)

CCU 2010 / Identifying User Needs and Establishing Requirements. Lesson 7. (Part1 Requirements & Data Collection) CCU 2010 / 2011 Lesson 7 Identifying User Needs and Establishing Requirements (Part1 Requirements & Data Collection) Previous Lesson (1) Participative Design Users are active in Developing Discussing and

More information

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials

Requirements Analysis and Design Definition. Chapter Study Group Learning Materials Requirements Analysis and Design Definition Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this

More information

Evaluation of E-health

Evaluation of E-health Evaluation of E-health Learning Objectives On completion of this topic, students will be able to: - Introduce current evaluation frameworks; - Explore methods/tools used in E-Health evaluation; - Provide

More information

making money from customer use of kiosk attracting more customers to the store saving money if the kiosk replaces manual operations

making money from customer use of kiosk attracting more customers to the store saving money if the kiosk replaces manual operations Business Requirements Business requirements collected from multiple sources might conflict. For example, consider a kiosk product with embedded software that will be sold to retail stores and used by the

More information

Product Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Types of S/W Requirements. Levels of S/W Requirements

Product Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Types of S/W Requirements. Levels of S/W Requirements Requirements Overview importance of getting right difficulty of getting right types and levels of characteristics of good the Requirements Development Process inception gathering, classification evaluation

More information

BASICS OF SOFTWARE TESTING AND QUALITY ASSURANCE. Yvonne Enselman, CTAL

BASICS OF SOFTWARE TESTING AND QUALITY ASSURANCE. Yvonne Enselman, CTAL BASICS OF SOFTWARE TESTING AND QUALITY ASSURANCE Yvonne Enselman, CTAL Information alines with ISTQB Sylabus and Glossary THE TEST PYRAMID Why Testing is necessary What is Testing Seven Testing principles

More information

Safety Perception / Cultural Surveys

Safety Perception / Cultural Surveys Safety Perception / Cultural Surveys believes in incorporating safety, health, environmental and system management principles that address total integration, thus ensuring continuous improvement, equal

More information

Module 1 Introduction. IIT, Bombay

Module 1 Introduction. IIT, Bombay Module 1 Introduction Lecture 1 Need Identification and Problem Definition Instructional objectives The primary objective of this lecture module is to outline how to identify the need and define the problem

More information

Introduction to Software Life Cycles and Agile. CSCI 5828: Foundations of Software Engineering Lecture 03 09/02/2014

Introduction to Software Life Cycles and Agile. CSCI 5828: Foundations of Software Engineering Lecture 03 09/02/2014 Introduction to Software Life Cycles and Agile CSCI 5828: Foundations of Software Engineering Lecture 03 09/02/2014 1 Goals Present an introduction to the topic of software life cycles concepts and terminology

More information

Customer, consumer and user involvement in product development: A framework and a review of selected methods

Customer, consumer and user involvement in product development: A framework and a review of selected methods TOTAL QUAUTY MANAGEMENT, VOL. 9, NO. 1, 1998, 141-149 CARFAX Customer, consumer and user involvement in product development: A framework and a review of selected methods M. A. KAULIO School of Technology

More information

Software Engineering Lecture 5 Agile Software Development

Software Engineering Lecture 5 Agile Software Development Software Engineering Lecture 5 Agile Software Development JJCAO Mostly based on the presentation of Software Engineering, 9ed Exercise Describe the main activities in the software design process and the

More information

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004 INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July

More information

Functional requirements and acceptance testing

Functional requirements and acceptance testing Functional requirements and acceptance testing Lecture 3 Software Engineering TDDC88/TDDC93 autumn 2007 Department of Computer and Information Science Linköping University, Sweden Message from the course

More information

ISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices

ISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices INTERNATIONAL STANDARD ISO 31000 First edition 2009-11-15 Risk management Principles and guidelines Management du risque Principes et lignes directrices http://mahdi.hashemitabar.com Reference number ISO

More information

Role of Technical Complexity Factors in Test Effort Estimation Using Use Case Points

Role of Technical Complexity Factors in Test Effort Estimation Using Use Case Points Role of Technical ity s in Test Effort Estimation Using Use Case Points Dr. Pradeep Kumar Bhatia pkbhatia.gju@gmail.com Ganesh Kumar gkyaduvansi@gmail.com Abstarct-The increasing popularity of use-case

More information

CUSTOMER SATISFACTION DATA

CUSTOMER SATISFACTION DATA CUSTOMER SATISFACTION DATA Collecting, Analyzing and Reporting With information from: Surveying Clients About Outcomes The Urban Institute, 2003 CSBG ORGANIZATIONAL STANDARD 1.3 : The organization has

More information

Static Code Analysis A Systematic Literature Review and an Industrial Survey

Static Code Analysis A Systematic Literature Review and an Industrial Survey Thesis no: MSSE-2016-09 Static Code Analysis A Systematic Literature Review and an Industrial Survey Islam Elkhalifa & Bilal Ilyas Faculty of Computing Blekinge Institute of Technology SE 371 79 Karlskrona,

More information

Learning Objectives. Agile Modeling and. Major Topics. Prototyping. Patched Up Prototype. Agile Modeling, but First. Prototyping

Learning Objectives. Agile Modeling and. Major Topics. Prototyping. Patched Up Prototype. Agile Modeling, but First. Prototyping Agile Modeling and Prototyping Systems Analysis and Design, 7e Kendall & Kendall 6 Learning Objectives Understand the roots of agile modeling in prototyping and the four main types of prototyping Be able

More information

Requirements Validation and Negotiation

Requirements Validation and Negotiation REQUIREMENTS ENGINEERING LECTURE 2014/2015 Dr. Sebastian Adam Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects

More information

WORKING WITH TEST DOCUMENTATION

WORKING WITH TEST DOCUMENTATION WORKING WITH TEST DOCUMENTATION CONTENTS II. III. Planning Your Test Effort 2. The Goal of Test Planning 3. Test Planning Topics: b) High Level Expectations c) People, Places and Things d) Definitions

More information

03. Perspective Process Models

03. Perspective Process Models 03. Perspective Process Models Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2017 Prescriptive Process Models advocates an orderly approach to software

More information

Process-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach

Process-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach Process-Oriented Requirement Analysis Supporting the Data Warehouse Design Process A Use Case Driven Approach Beate List, Josef Schiefer, A Min Tjoa Institute of Software Technology (E188) Vienna University

More information

RUP and XP Part II: Valuing Differences

RUP and XP Part II: Valuing Differences RUP and XP Part II: Valuing Differences by Gary Pollice Evangelist, The Rational Unified Process Rational Software In the last issue of The Rational Edge, we looked at the common ground between the Rational

More information

Flexibility on what is delivered High

Flexibility on what is delivered High Flexibility on what is delivered level 1: Stakeholders are very comfortable with the fact that limited flexibility on budget and time may be necessary in order to deliver the full scope on quality, and

More information

CMPT 275 Software Engineering

CMPT 275 Software Engineering CMPT 275 Software Engineering Software life cycle 1 Software Life Cycle Sequence of processes completed as a software project moves from inception to retirement At beginning of project development, choose

More information

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B 1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework

More information

Introduction and Key Concepts Study Group Session 1

Introduction and Key Concepts Study Group Session 1 Introduction and Key Concepts Study Group Session 1 PD hours/cdu: CH71563-01-2018 (3 hours each session) 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters

More information

NATURAL S P I. Critical Path SCAMPI SM. Getting Real Business Results from Appraisals

NATURAL S P I. Critical Path SCAMPI SM. Getting Real Business Results from Appraisals Critical Path SCAMPI SM Getting Real Business Results from Appraisals NATURAL S P I 1 What You Will Get Level-Set: What Is and What Is Not a SCAMPI Level-Set: What a SCAMPI Can and Cannot Do Problems:

More information

Introduction. Fundamental concepts in testing

Introduction. Fundamental concepts in testing INF 3121 Software Testing - Lecture 01 Introduction. Fundamental concepts in testing 1. Why is testing necessary?? 4. Fundamental test process 5. The psychology of testing 1 1. Why is testing necessary?

More information

Validation of NORM (Needs Oriented Framework for Producing Requirements Decision Material) Framework in Industry

Validation of NORM (Needs Oriented Framework for Producing Requirements Decision Material) Framework in Industry Master Thesis Software Engineering Thesis no: MSE-2012:102 09 2012 Validation of NORM (Needs Oriented Framework for Producing Requirements Decision Material) Framework in Industry Salman Nazir Rizwan Yousaf

More information

Agile Quality Management

Agile Quality Management Agile Quality Management Panagiotis Sfetsos, PhD Assistant Professor, Department of Informatics, Alexander Technological Educational Institution E mail: sfetsos@it.teithe.gr Web Page: http://aetos.it.teithe.gr/~sfetsos/

More information

UPGRADE CONSIDERATIONS Appian Platform

UPGRADE CONSIDERATIONS Appian Platform UPGRADE CONSIDERATIONS Appian Platform ArchiTECH Solutions LLC 7700 Leesburg Pike #204 www.architechsolutions.com 703-972-9155 atsdelivery@architechsolutions.com TABLE OF CONTENTS Introduction... 3 Upgrade

More information

What are requirements? Basics of Requirement Engineering. Definition of a Stakeholder. Stated Vs. Real Requirements. Stated Vs.

What are requirements? Basics of Requirement Engineering. Definition of a Stakeholder. Stated Vs. Real Requirements. Stated Vs. What are requirements? Basics of Requirement Engineering Muzaffar Iqbal Farooqi A requirement is a necessary attribute in a system, a statement that identifies a capability, characteristic, or quality

More information

Course Contents: TM Activities Identification: Introduction, Definition, Identification processes, Case study.

Course Contents: TM Activities Identification: Introduction, Definition, Identification processes, Case study. Chapter 2 Technology Identification Course Contents: TM Activities Identification: Introduction, Definition, Identification processes, Case study. Contents Chapter 2 Technology Identification... 1 Introduction...

More information

Retaining Employers for Work Placement Students

Retaining Employers for Work Placement Students Retaining Employers for Work Placement Students Action Research Project by Jennifer Boyce Introduction The purpose of this research is to establish why employers very rarely continue to participate in

More information

It will also enable you to manage the expectations of your clients or management, as they will know exactly what to expect.

It will also enable you to manage the expectations of your clients or management, as they will know exactly what to expect. Functional Specification / Requirement Document (FSD / FRD) The Functional Specification Document (FSD) in software development is a formal document that describes the functions of the software/system

More information

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 IIBA Global Business Analysis Core Standard A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 International Institute of Business Analysis, Toronto, Ontario, Canada.

More information

AN APPROACH FOR EFFECTIVE QUALITY ASSURANCE AND IMPROVEMENT

AN APPROACH FOR EFFECTIVE QUALITY ASSURANCE AND IMPROVEMENT AN APPROACH FOR EFFECTIVE QUALITY ASSURANCE AND IMPROVEMENT Yohanes Kristianto Universitas Katolik Darma Cendika / PT. ISM Tbk Bogasari Flour Mills Email: y_kristianto@hotmail.com / QA.Surabaya@bogasariflour.com

More information

AUDIT Where are we now? ONGOING MEASUREMENT Are we getting there?

AUDIT Where are we now? ONGOING MEASUREMENT Are we getting there? CIPR Skill Guide Internal Communications: Measurement & Evaluation Applying the PRE Cycle to Internal Communications Introduction Measurement & evaluation is at the heart of successful, strategic internal

More information

Marketing Research Tools. Michele Morehouse. University of Phoenix MKT/441. Norma Atkinson

Marketing Research Tools. Michele Morehouse. University of Phoenix MKT/441. Norma Atkinson Marketing Research Tools 1 Marketing Research Tools Michele Morehouse University of Phoenix MKT/441 Norma Atkinson Marketing Research Tools 2 Overview Market research has several pertinent points that

More information

Introduction and Key Concepts Study Group Session 1

Introduction and Key Concepts Study Group Session 1 Introduction and Key Concepts Study Group Session 1 PDU: CH71563-04-2017 (3 hours) 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this

More information

Ten Requirements for Effective Process Control

Ten Requirements for Effective Process Control Published in ASQ Quality Progress and won the Paper of the Year Award in 2002. Ten Requirements for Effective Process Control Thomas A. Little Ph.D. Thomas A. Little Consulting 12401 N Wildflower Lane

More information

CRM System Tester. Location London Department Supporter and Community Partnerships. CRM Project Manager Salary Band C

CRM System Tester. Location London Department Supporter and Community Partnerships. CRM Project Manager Salary Band C CRM System Tester Location London Department Supporter and Community Partnerships Reports to (Job Title) CRM Project Manager Salary Band C Matrix manager (if applicable) Click here to enter text. Competency

More information

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS Ganesh Vaidyanathan, Indiana University South Bend, gvaidyan@iusb.edu Asghar Sabbaghi, Indiana University

More information

The Complexity of Governing a Regional EPR System

The Complexity of Governing a Regional EPR System The Complexity of Governing a Regional EPR System Gro-Hilde Ulriksen Norwegian Centre for E-health Research University Hospital of North Norway Telemedicine and ehealth Research Group, The Arctic University

More information

Workflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1

Workflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1 Workflow-Processing and Verification for Safety- Critical Engineering: Conceptual Architecture Deliverable D6.1 FFG IKT der Zukunft SHAPE Project 2014 845638 Table 1: Document Information Project acronym:

More information

Product Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Levels of S/W Requirements. Types of S/W Requirements

Product Requirements. Requirements. Get it Right ASAP. Why Requirements are Difficult. Levels of S/W Requirements. Types of S/W Requirements Requirements Overview importance of getting right difficulty of getting right types and levels of characteristics of good the Requirements Development Process inception gathering, classification actors

More information

HOW TO WRITE A WINNING PROPOSAL

HOW TO WRITE A WINNING PROPOSAL HOW TO WRITE A WINNING PROPOSAL WHAT IS A PROPOSAL? A proposal is a picture of a project, it is NOT the project. In that sense, it is based on your project plan but may be quite different from the Project

More information

ARCHITECTURAL PROGRAMMING: PROVIDING ESSENTIAL KNOWLEDGE OF PROJECT PARTICIPANTS NEEDS IN THE PRE-DESIGN PHASE

ARCHITECTURAL PROGRAMMING: PROVIDING ESSENTIAL KNOWLEDGE OF PROJECT PARTICIPANTS NEEDS IN THE PRE-DESIGN PHASE ARCHITECTURAL PROGRAMMING: PROVIDING ESSENTIAL KNOWLEDGE OF PROJECT PARTICIPANTS NEEDS IN THE PRE-DESIGN PHASE Stefan Faatz Lecturer, MSc Institute for interdisciplinary Construction Process Management

More information

TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY

TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY D7-24 5-2004 FOREWORD This Part of SASO s Technical Directives is Adopted

More information

Requirements Analysis. Overview

Requirements Analysis. Overview Requirements Analysis Overview What is requirement? Classification of requirements Iterative and evolutionary requirements analysis Use Cases Domain models N. Meng, B. Ryder 2 1 Requirements Definition

More information

NEW! The Project Manager & The Business Analyst. by Barbara A. Carkenord, CBAP, PMP, PMI-ACP

NEW! The Project Manager & The Business Analyst. by Barbara A. Carkenord, CBAP, PMP, PMI-ACP NEW! The Project Manager & The Business Analyst by Barbara A. Carkenord, CBAP, PMP, PMI-ACP A White Paper from RMC Project Management, Inc. www.rmcproject.com 10953 Bren Road East, Minnetonka, Minnesota

More information

CHAPTER 4 EXAMINATION OF THE OVERALL R&M ACTIVITY CONTENTS

CHAPTER 4 EXAMINATION OF THE OVERALL R&M ACTIVITY CONTENTS Applied R&M Manual for Defence Systems Part A: General CHAPTER 4 EXAMINATION OF THE OVERALL R&M ACTIVITY CONTENTS Page 1 Introduction 2 2 The Generalised R&M Activity 3 3 Decomposition 5 4 Techniques 12

More information

Lecture 1: Processes, Requirements, and Use Cases

Lecture 1: Processes, Requirements, and Use Cases Lecture 1: Processes, Requirements, and Use Cases 1 Development Processes Early Days: evolve a system Build and fix Leads to chaos Need for intelligent design Waterfall Model Requirements, Design, Code,

More information

Utilizing Design Thinking for Digital Transformation

Utilizing Design Thinking for Digital Transformation Utilizing Design Thinking for Digital Transformation March 2016 Introduction The past decade has proved to be a turning point for organizations. As the need to anticipate customer demands increases in

More information

Contract Interpretation The grievance alleges that a provision of the contract, other than the just cause provision, was violated.

Contract Interpretation The grievance alleges that a provision of the contract, other than the just cause provision, was violated. HANDLING GRIEVANCES 1. What is a Grievance? Grievances are defined under the contract. Be sure to know your timelines for filing a grievance and moving the grievance to the next step, if necessary. Generally,

More information

Systems Engineering Concept

Systems Engineering Concept Systems Engineering Concept WHITE PAPER February 2017 The Systems Engineering Concept provides practical hands-on methods and tools, that enable companies to meet today s global business challenges through

More information

Challenges in Assessing Parameters of a Socio-Technical System

Challenges in Assessing Parameters of a Socio-Technical System Challenges in Assessing Parameters of a Socio-Technical System Ilia Bider and Erik Perjons DSV - Stockholm University, Stockholm, Sweden [ilia perjons]@dsv.su.se Abstract. The paper is an investigation

More information

Customer-focused review of the IT services formerly provided by Health Solutions Wales (now provided by NWIS) Velindre NHS Trust

Customer-focused review of the IT services formerly provided by Health Solutions Wales (now provided by NWIS) Velindre NHS Trust Customer-focused review of the IT services formerly provided by Health Solutions Wales (now provided by NWIS) Velindre NHS Trust Audit year: 2010-11 Issued: February 2012 Document reference: 161A2012 Status

More information

ISO/IEC INTERNATIONAL STANDARD. Systems and software engineering System life cycle processes IEEE

ISO/IEC INTERNATIONAL STANDARD. Systems and software engineering System life cycle processes IEEE INTERNATIONAL STANDARD ISO/IEC 15288 IEEE Std 15288-2008 Second edition 2008-02-01 Systems and software engineering System life cycle processes Ingénierie des systèmes et du logiciel Processus du cycle

More information

Intergeneration Mentoring. for Entrepreneurs TEACHER GUIDE. For Mentor Training Course

Intergeneration Mentoring. for Entrepreneurs TEACHER GUIDE. For Mentor Training Course This document reflects the views only of the authors and the Commission cannot be held responsible for any use which may be made of the information contained therein Project Number: 2014-1-ES01-KA200-004372

More information

It s about your success

It s about your success Business-IT alignment assessment Proposed approach and methodology OCTANT 1 Introduction The domain of IT Governance, business-it alignment and process optimization is one of the cornerstones of BUSINESS

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing INTERNATIONAL STANDARD ISO/IEC 27007 First edition 2011-11-15 Information technology Security techniques Guidelines for information security management systems auditing Technologies de l'information Techniques

More information

Software Engineering II - Exercise

Software Engineering II - Exercise Software Engineering II - Exercise April 29 th 2009 Software Project Management Plan Bernd Bruegge Helmut Naughton Applied Software Engineering Technische Universitaet Muenchen http://wwwbrugge.in.tum.de

More information

Course : Software Engineering and Project Management. Unit 2 Software Requirements Engineering & Analysis

Course : Software Engineering and Project Management. Unit 2 Software Requirements Engineering & Analysis Course : Software Engineering and Project Management Unit 2 Software Requirements Engineering & Analysis Syllabus Requirements Engineering : User and system requirements, Functional and non-functional

More information

Category 1 Consumer Input & Involvement

Category 1 Consumer Input & Involvement TECHNICAL ASSISTANCE GUIDE COE DEVELOPED CSBG ORGANIZATIONAL STANDARDS Category 1 Consumer Input & Involvement Community Action Partnership 1140 Connecticut Avenue, NW, Suite 1210 Washington, DC 20036

More information

FDA Medical Device HFE Guidance

FDA Medical Device HFE Guidance W H I T E P A P E R www.makrocare.com U S FDA has established a new Draft Guidance; Applying Human Factors and Usability Engineering to Medical Devices to Optimize Safety and Effectiveness in Design. Manufacturers

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Service Delivery Manager (People HERA Grade: 8 Management Systems) Responsible to: Assistant Director (Business Services) Accountable for: Day to day leadership of team members

More information

Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 1, Jan-Feb 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info A Study of Software Development Life Cycle Process Models

More information

Introduction to Software Engineering

Introduction to Software Engineering UNIT I SOFTWARE PROCESS Introduction S/W Engineering Paradigm life cycle models (water fall, incremental, spiral, WINWIN spiral, evolutionary, prototyping, objects oriented) -system engineering computer

More information

1. What is the most effective source of building business in an established primary care setting?

1. What is the most effective source of building business in an established primary care setting? CPPM Ch 12 Review Questions 1. What is the most effective source of building business in an established primary care setting? a. Direct mail marketing b. Word of mouth referrals c. TV and radio ads d.

More information

Quality Concepts. Slide Set to accompany. Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman

Quality Concepts. Slide Set to accompany. Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Chapter 14 Quality Concepts Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For non-profit

More information

TOWARDS UNDERSTANDING THE DO-178C / ED-12C ASSURANCE CASE

TOWARDS UNDERSTANDING THE DO-178C / ED-12C ASSURANCE CASE TOWARDS UNDERSTANDING THE DO-178C / ED-12C ASSURANCE CASE C.M. Holloway NASA Langley Research Center, Hampton VA, USA, c.michael.holloway@nasa.gov Keywords: assurance case, software, standards, certification,

More information

Cost of Changing the Activities in SDLC. Minimum of Cost at this level. code debuging unit test integration. Activity

Cost of Changing the Activities in SDLC. Minimum of Cost at this level. code debuging unit test integration. Activity Software Development Life Cycle (SDLC) This is a work flow for creating a new software/application. Usually, any company that is in the software business follows the same route and structure. In this document

More information

Intelligently Choosing Testing Techniques

Intelligently Choosing Testing Techniques Intelligently Choosing Testing Techniques CS 390: Software Engineering Dr. Hwang By: Jonathan Bach October 28, 2008 1 The ability for a company to produce a complicated, high quality, problem free product

More information

Little r and Big R (Where r and R = Reliability)

Little r and Big R (Where r and R = Reliability) Little r and Big R (Where r and R = Reliability) Reliability is in the vocabulary of almost everyone. Ask an ordinary person to define reliability. You ll get a wide variety of non-responses ending in

More information

SAS ANALYTICS AND OPEN SOURCE

SAS ANALYTICS AND OPEN SOURCE GUIDEBOOK SAS ANALYTICS AND OPEN SOURCE April 2014 2014 Nucleus Research, Inc. Reproduction in whole or in part without written permission is prohibited. THE BOTTOM LINE Many organizations balance open

More information

Competency Frameworks as a foundation for successful Talent Management. part of our We think series

Competency Frameworks as a foundation for successful Talent Management. part of our We think series Competency Frameworks as a foundation for successful part of our We think series Contents Contents 2 Introduction 3 If only they solved all of our problems 3 What tools and techniques can we use to help

More information

Leading Enterprise Change by Developing & Leveraging HR Business Partners

Leading Enterprise Change by Developing & Leveraging HR Business Partners Leading Enterprise Change by Developing & Leveraging HR Business Partners B y Agni Kitsios, Kitsios Consulting, Inc. May 15 18, 2016 Dallas, Texas, USA 1 Introduction How do you provide the necessary change

More information

Mitigating Medical Device Risk through Human Factors. Christina Mendat, PhD Director, Research & Human Factors

Mitigating Medical Device Risk through Human Factors. Christina Mendat, PhD Director, Research & Human Factors Mitigating Medical Device Risk through Human Factors Christina Mendat, PhD Director, Research & Human Factors A profound statistic one-third of medical device incidents involve user error and more than

More information

ISO whitepaper, January Inspiring Business Confidence.

ISO whitepaper, January Inspiring Business Confidence. Inspiring Business Confidence. ISO 31000 whitepaper, January 2015 Author: Graeme Parker enquiries@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk ISO 31000 is an International Standard for Risk

More information

Project Manager, Project Oak Clinical Documentation and eprescribing Grade VIII (Temporary) Job Specification & Terms and Conditions

Project Manager, Project Oak Clinical Documentation and eprescribing Grade VIII (Temporary) Job Specification & Terms and Conditions Project Manager, Project Oak Clinical Documentation and eprescribing Grade VIII (Temporary) Job Specification & Terms and Conditions Job Title and Grade Project Manager, Project Oak Clinical Documentation

More information

Lecture 3 Design Approaches and Methods

Lecture 3 Design Approaches and Methods Lecture outline Unit IMS5302 Lecture 3 Design Approaches and Methods This lecture will cover: Organisation of knowledge Gulf of execution and evaluation Design principles Methodologies for developing effective

More information

Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements

Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements Design and Assessment for Agile Auditing Model: The Case of ISO 9001 Traceability Requirements Malik Qasaimeh and Alain Abran Abstract ISO 9001 demands of (software) organizations that a rigorous demonstration

More information

Copyright Software Engineering Competence Center

Copyright Software Engineering Competence Center Copyright Software Engineering Competence Center 2012 1 Copyright Software Engineering Competence Center 2012 5 These are mapped categories to the waste categories of manufacturing. An excellent overview

More information

Requirements Capturing by the System Architect

Requirements Capturing by the System Architect - top-down key-drivers (customer, business) operational drivers (logistics, production, etc.) roadmap (positioning and trends in time) competition (positioning in the market) regulations "ideal" reference

More information

The Top Thrill Dragster

The Top Thrill Dragster EEC 421/521: Software Engineering The Software Process Prescriptive Process Models 1/22/08 EEC 421/521: Software Engineering 1 The Top Thrill Dragster 420 ft tall Max speed over 120 mph World s second

More information

IMPLEMENTATION, EVALUATION & MAINTENANCE OF MIS:

IMPLEMENTATION, EVALUATION & MAINTENANCE OF MIS: IMPLEMENTATION, EVALUATION & MAINTENANCE OF MIS: The design of a management information system may seem to management to be an expensive project, the cost of getting the MIS on line satisfactorily may

More information