skip to main content
10.1145/2816839.2816902acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

Procedural Model of Requirements Elicitation Techniques

Authors Info & Claims
Published:23 November 2015Publication History

ABSTRACT

Software requirement elicitation is one of the most sensitive phases in software requirements knowledge area; it extracts useful requirement and help software engineers to select the right elicitation techniques. This paper presents a proposed elicitation model to facilitate the selection requirement elicitation techniques on the basis of the previous published work in academia, including the combination of situational characteristics, in addition technique characteristics, project characteristic and use guidelines to avoid misunderstanding of the requirements.

References

  1. Bourque, P., & Fairley, R. E. (2014). Guide to the Software Engineering Body of Knowledge (SWEBOK (R)): Version 3.0. IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmad, S. (2008, March). Negotiation in the requirements elicitation and analysis process In Software Engineering, 2008. ASWEC 2008. 19th Australian Conference on (pp. 683--689). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kausar, S., Tariq, S., Riaz, S., & Khanum, A. (2010, October). Guidelines for the selection of elicitation techniques. In Emerging Technologies(ICET), 2010 6th International Conference on (pp. 265--269). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  4. Hickey, A. M., & Davis, A. M. (2003, September). Elicitation technique selection: how do experts do it?. In Requirements Engineering Conference, 2003. Proceedings. 11th IEEE International (pp. 169--178). IEEE.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Yozgyur, K. (2014, June). A proposal for a requirements elicitation tool to increase stakeholder involvement. In Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on (pp. 145--148). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lloyd, W. J., Rosson, M. B., & Arthur, J. D. (2002). Effectiveness of elicitation techniques in distributed requirements engineering. In Requirements Engineering, 2002. Proceedings. IEEE Joint International Conference on (pp. 311--318). IEEE Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Tiwari, S., Rathore, S. S., & Gupta, A. (2012, September). Selecting requirement elicitation techniques for software projects. In Software Engineering (CONSEG), 2012 CSI Sixth International Conference on (pp. 1--10). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mishra, D., Mishra, A., & Yazici, A. (2008, August). Successful requirement elicitation by combining requirement engineering techniques. In Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on the (pp. 258--263). IEEE.Google ScholarGoogle Scholar
  9. Duarte, D., Farinha, C., da Silva, M. M., & da Silva, A. R. (2012, June). Collaborative Requirements Elicitation with Visualization Techniques. In Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2012 IEEE 21st International Workshop on (pp. 343--348). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sharma, S., & Pandey, S. K. (2014, March). Requirements elicitation: Issues and challenges. In Computing for Sustainable Global Development (INDIACom) 2014 International Conference on (pp. 151--155). IEEEGoogle ScholarGoogle ScholarCross RefCross Ref
  11. Nakatani, T., Hori, S., Ubayashi, N., Katamine, K., & Hashimoto, M. (2008, September). A case study: Requirements elicitation processes throughout a project. In International Requirements Engineering, 2008. RE'08. 16th IEEE(pp. 241--246). IEEE Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kato, J., Komiya, S., Saeki, M., Ohnishi, A., Nagata, M., Yamamoto, S., & Horai, H(2001, December). A model for navigating interview processes in requirements elicitation. In Software Engineering Conference, 2001. APSEC 2001. Eighth Asia-Pacific (pp. 141--148). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Chua, B. B., Bernardo, D. V., & Verner, J. (2010, August). Understanding the Use of Elicitation Approaches for Effective Requirements Gathering. In Proceedings of the 2010 Fifth International Conference on Software Engineering Advances (pp. 325--330). IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ahmed, S., & Kanwal, H. T. (2014, December). Visualization based tools for software requirement elicitation. In Open Source Systems and Technologies (ICOSST), 2014 International Conference on (pp. 156--159). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  15. Knauss, A. (2012, September). On the usage of context for requirements elicitation: End-user involvement in IT ecosystems In Requirements Engineering Conference (RE), 2012 20th IEEE International (pp. 345--348). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Boulila, N., Hoffmann, A., & Herrmann, A. (2011, August). Using Storytelling to record requirements: Elements for an effective requirements elicitation approach In Multimedia and Enjoyable Requirements Engineering-Beyond Mere Descriptions and with More Fun and Games (MERE), 2011 Fourth International Workshop on (pp. 9--16). IEEE.Google ScholarGoogle Scholar
  17. Macredie, R. D., & Coughlan, J. A. (2002). Effective communication in requirements elicitation: A comparison of methodologies School of Information Systems, Computing and Mathematics.Google ScholarGoogle Scholar
  18. Hickey, A. M., & Davis, A. M. (2007). An ontological approach to requirements elicitation technique selection. In Ontologies (pp. 403--431). Springer US.Google ScholarGoogle Scholar

Index Terms

  1. Procedural Model of Requirements Elicitation Techniques

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
      November 2015
      495 pages
      ISBN:9781450334587
      DOI:10.1145/2816839

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 November 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate87of367submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader