TL;DR: Prioritize the conflicts and values identified so far. Identify the most important values for the team and where it is possible to compromise. Start and follow a requirements prioritization and tradeoff management process that involves all stakeholders.
This VDAD step is both critical and challenging. Values and consequences might need to be analyzed in more depth. Stakeholders have different values and conflicts cannot be avoided. There are opposing values; for example, privacy might require to hide certain data while transparency calls for making it visible.
The objective of this phase is to facilitate consensus among the project team regarding the prioritization of values and the resolution of conflicts. This process hinges on effective communication and the willingness to compromise.
Modifications to the features or system requirements may be beneficial in the mitigation of potential harm to values that are of importance to stakeholders. The identification of adjusted solutions with which all stakeholders can live may therefore assist in the resolution of conflicts between people.
Furthermore, decomposing the systems into bounded contexts according to Domain-Driven Design (DDD)1 might help, as not all values may be of equal criticality across all system components. The Context Mapper tool, which combines DDD with value-driven analysis and design, may be useful in this context, as it allows the modeling of values at the level of a bounded context.
The outputs of Step 3, i.e. a Value Impact Map, a value register2, and/or value models created with Context Mapper constitute the input to this step.
The outputs of this step are mainly adjustments to the artifacts produced in Step 3 or even Step 1 and Step 2:
Utilize the same tools used in previous steps to make any necessary adjustments to the produced artifacts.
Domain-Driven Design Reference, Eric Evans, https://www.domainlanguage.com/ddd/reference/ ↩
IEEE Standard Model Process for Addressing Ethical Concerns during System Design, 2021, https://ieeexplore.ieee.org/document/9536679 ↩ ↩2