John E. Dobson

Learn More
This paper describes the diflculty of handling changing requirements within traditional development processes. The origins of changing user and organisational requirenlents are discussed and there is a class$cation of dinerent types. It identifies a nuniber of ways in which different approaches to design may help to deal with change ana' mechanisms which(More)
To achieve software quality, testing is an essential component in all software development. It involves the execution of a deterministic software system with test data and a comparison of the results with the expected output, which must satisfy the users' requirements. This accounts for over 25% of the cost of a software development. Therefore, automation(More)
Requirements engineering from an organisational perspective needs to be viewed as social engineering, Thus in this paper a modelling language will be presented, which is visual in nature, and with which we assert that it is possible to diagrammatically represent and reason about the impact that an information technology system may have on an organisation,(More)
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of brokerage in network-based commerce. Examples of models are presented that represent new configurations of systems, services and processes. Three distinct phases of brokerage are(More)
The most crucial aspect sf sojiware engineering is the gathering of requirements. Increasing the unwunt of tinw and improving the quality of effort expended ut this stage will lead to fewer and more tnnnageahle prohlems later on in the development ltfe-cycle. The purpose of this paper is to highlight one of the most crucial prohlenis thmt aflict user(More)
Parallels are drawn between the problems and techniques associated with achieving high reliability, and those associated with the provision of security, in distributed computing systems. Some limitations of the concept of a Trusted Computing Base are discussed, end an alternative approach to thedesign of highly secure computing systems is put forward,based(More)