Professional Documents
Culture Documents
Adnan Naseem
Department of Computer Sciences and IT,
Al hamd Islamic University Islamabad Campus,
Pakistan
Abstract--Requirements play an important role in the development of software system because they tell one why to make
this system. Requirements are the basic need of user from a system. And therefore unclear requirements may result in
failure. Elicitation of requirement is tough activity and demand high user involvement. Many different methods are
used to elicit requirements. As games involved their user in their interface and the more user interaction depicts their
need clearly. This paper discusses the latest gamification concept used for requirement elicitation and classifies them
into 5 different categories. This help to choose the best practice to increase customer satisfaction and market place.
I. Introduction:
Requirement engineering (RE) is an initial and vital There are many methods used for eliciting requirements
activity of software development lifecycle. RE includes depending on the resources, time and the type of project.
numbers of processes for gathering requirements according Traditionally used methods for eliciting requirements are
to stakeholders and users of a software project. Many questionnaires, surveys, interviews, task analysis, domain
issues and difficulties may occur in software project analysis, Introspection, Repertory grids, card sorting,
development if RE is not properly conducted. RE aims at laddering and protocol analysis, Group works,
collecting quality requirements, analyzing, documenting brainstorming, JAD requirement workshops, conversation
and implementing into software code to achieve the desired analysis, and observations or social analysis. User or
functionality and meet the users' needs. It is an iterative stakeholder involvement plays a key role in eliciting
process that targets developing quality product. A precise correct requirements [1,2].
definition of RE is defined by Zave as "The branch of
software engineering concerned with the real world goals Lack of communication with stakeholders may cause
for functions of and constraints on the software systems. It difficulty in eliciting requirements. Interviewing is an
is also concerned with the relationship of these factors to informal interaction where analysts explore needs asking
precise specifications of software behavior and their stakeholders about the system in use. Many pieces of
evolution overtime and across software families”[1] research are made on Conversations and interviews,
somehow user is engaged in both techniques but still have
The two main categories of RE process are: Requirement to improve the methods to gain user attention [3].To
Gathering[1] which includes eliciting, analyzing, develop interest and involvement in this critical process of
specifying, and validating requirements and Requirement requirement elicitation many tools and techniques are used.
Implementation[1] which includes executing the Game-based tools and technology help a lot as game
requirements in the software development activities. interface engages its users and involves them completely to
Requirement gathering or requirement elicitation consists achieve a target[3]. Games-based learning (GBL) has been
of four phases: applied in a wide variety of different fields including
medicine, knowledge management, military training,
1) Requirement elicitation and development 2) science and mathematics, software engineering, computer
Documentation of requirements science and information systems [2,3].Games give
3) Validation & verification of requirements 4) experiential learning where learning is made through the
Requirement management and planning Change of experience providing the four stages of the
experiential learning cycle: concrete experience, reflective
1|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
observation, abstract conceptualization, and active process and how it minimizes the conflicts and
experimentation. Traditional methods are outdated and communication barriers.
based on define content methodology whereas GBL is
more up to date and known for seeking more information The remaining paper consists of 4 sections: Sections II
and creative learning.[3] Research methodology, Section III Findings, Section IV
Results and Section V Conclusion that summarizes the
Gamification has emerged as a powerful technique for the whole paper.
past few years that can be applied to different problems to
influence human behavior. Gamification is a concept in II. Research methodology
which game design elements are used in non -game
This work has been undertaken as a systematic
context[5]. These elements should be characteristic of
literature review by following the guidelines as proposed
games and have a significant role in gameplay. There is a by[20]. A protocol is a significant step in systematic
difference between GBL, serious games, and gamification. literature review which provides the methods used to guide
GBL uses the serious game where games are designed for a the systematic review. For this study the protocol started
non-recreational environment like education while in with defining the research questions by following to
gamification only games principals and elements are used identify the search strategy, sources used, inclusion and
exclusion criteria and search table.
in a process of a requirement gathering[6]. The motivation
behind applying gamification is to increas e user 2.1. Research questions
involvement[6,7]. There are many benefits of gamification
investigated after different empirical studies. The This systematic review addresses the following
important claim about gamification is that it has a positive five research questions (RQs):
impact on increasing user motivation towards certain RQ1. What are the existing techniques used for
behavior[6]. The useful effect of gamification depends on requirement elicitation?
the context in which it is implemented and how to design
gamified experiences that encourage player (e.g., RQ2. In which context proposed requirement elicitation
employee, customer) motivation and engagement[6]. techniques have been used?
The purpose of conducting this SLR is to describe the The resultant search strings build on the basis of these rules
importance of gamification in requirement elicitation are described as under.
2|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
Software AND (Requirement/ OR Requirements/) AND This section of paper has 4 parts;
("Elicit" OR "Elicitation" OR "Eliciting" OR "Gather" OR
"Gathering" OR "Collect" OR "Collection" OR 1) Research questions 2) Research strategy 3) Inclusion
"Collecting") AND ( "technique" OR "techniques" OR criteria 4) Exclusion criteria.
"Approach “OR "Approaches" OR "activities" OR
"process/" OR "processes /" OR "practice/" OR "method" 1) Research Questions:
OR "methods" OR "practices/")
RQ1: Which methodologies have been proposed and why?
2.2.2. Sources used
RQ2: What is the main focus of these papers?
A systematic review is carried out against the following
electronic sources used in which search string is executed. RQ3: What is the common problem statement in these
These sources include Google Scholar, IEEE Xplore, ACM papers?
Digital Library, and Science Direct. Search strings
provided in section 2.2.1 were injected into the mentioned RQ4: Have the proposed methodologies been validated and
electronic search engines while dealing with the features how?
and restrictions a source had. Search was used to conduct
on title, keywords and abstract. 2) Research Strategy:
The following points were considered while selecting Not similar with other digital libraries
papers:
Papers published from 2010 to 2018
Relevant with topic
Proposed methodologies have been validated
3|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
Figure 1: Scrutinization
4|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
To establish a discussion that seeks to answer the consuming, geographical issues, language issues,
research questions defined for this review; all the papers understandability issues and complexity issues etc.
that we have studied are considered. The findings of this
study is the fact that all requirement elicitation techniques 4 studies belong to small and medium sized projects and
are based on the collaboration of stakeholders in different four studies were used in an agile context as a whole it
ways, but the basic foundation is upon the traditional makes 8% of the whole studies. Stakeholder involvement
RE techniques. We have identified the current in a project about agile context is a must. Scope creep is
techniques of requirement elicitation in response to RQ1. the common issue that leads to project more Costly and
Techniques are presented with their context in which they takes extra time. Some other issues found in proposed
are applicable and their limitations in response to RQ2 techniques are software issues need of exhaustive analyst
and RQ3. All the techniques are based on some of the involvement, sporting tool issues, traceability issues
process steps with variations. Four (4) generic process among various UML Diagrams. Conflicts arose when no of
steps are proposed for researchers and academics to make stakeholders are addressing requirements.
the new customized elicitation technique, in response to
RQ4. Each and every technique is based on one or more of There are 8 Domain Specific techniques containing 14 %
traditional requirement elicitation technique shown by of all the studies selected for this review. Domain specific
Error! Reference source not found. and Error! Reference techniques are limited to their own domain and it contains
source not found. in response to RQ5. Detailed response to issues related to its own environment where it is used like
research questions RQ1-RQ5 with tables and figures in the health care system, issues related to training and
depicting information is as below: safety are most prominent. Some of the issues we found is:
There is no specific functionality to support team work.
Requirement elicitation techniques with context and Requirement change according to customer’s view may
limitations: lead to scope creep. Not all trial design rationality may
have been exposed. The approach is healthy to evaluate
By excluding 9 papers having not pure techniques, but and applied. The pilot study evaluation might be biased.
models or tools [28] [37] [41] [50] [53] [55] [56] [58] [67],
46 techniques were identified. Interactive systems and information systems don dot lie in
the same category, but each have 4 techniques with 7% of
Table 1 —TRADITIONAL REQUIREMENT ELICITATION the whole review for each context. Interactive systems are
TECHNIQUES depicts the approaches, tools, techniques, more complex and difficult to understand, so time
models etc and their detailed description. All techniques consuming and usability issues occurs, but information
are based on one or more of the basic or traditional systems cannot be applied to entirely new project, they
requirement elicitation techniques. Techniques are broadly check the quality of requirement before goal elicitation and
categorized into 8 according to their context. do not cover the incorporation of strategic issues and new
activities.
- Requirement creation
without any clues
2 Computer Supported -Global Software Heterogeneous software When the stake holder [22]
Co-Operative Work Development And inspection team has preference seems to be
(Cscw) Distributed better performance than opposite, then there
Environment homogenous become a conflict
3 Feature Modeling Domain Specific -More stakeholder being -No specific [23]
Approach Software Involved in R.E are from functionality is
different discipline with provided to support
different background teamwork.
-Traditional
requirement elicitation
technique and tools are
difficult to be applied in
the scientific computing
project.
4 HCI Technique Interactive System -Personas help to gain a -Complex and difficult [24]
deeper understanding of to understand
the users
5 Form-Based -Open Source -Promote the negotiation -Applicability [25]
Distributed Communities among stakeholders -Usability
Requirement Elicitation -Distributed - Identify the capability
Environment of stakeholders
6 Requirements -Small And -Solve the volatility - Software issues [26]
Elicitation Using Qfd Medium Size problem -Costly
Projects - Reduce language
barriers during
requirement elicitation
7 Stakeholder -Large Projects -Easy and required less NI [27]
Recommender Model Distributed effort
Environment -Scalable and can be
used for large projects
- No communication
problem
8 The Integration Of KPI -Information -Eliminates the need of -Quality of KPI must be [28]
Requirements System user interests in checked before the
Elicitation Process requirement elicitation elicitation of goals
Originating From
Organization Goals
9 Stakerare -Large Projects - Scale up big projects - Scalability of the data [29]
-Improve the cleaning
involvement of
stakeholders
10 Laddering Technique - Interactive System -Solve the conflicts - Usability issues [30]
And Art2 Neural between requirements
Network arising from
multicultural groups
11 Group Storytelling Information System - Ability to capture -Does not cover the [31]
complete information - incorporation of
No biasedness Strategic issues and
new activities
12 Elicitation Of Where The End users are more This technique doesn’t [32]
Pervasive System Customer Is involved, it helps the end allow us to handle
Requirement Through Physically Present user to identify the scope creep because it
Immediate requirement avoids user to modify
Visualization. the requirement when
modification start
13 Agent Based Goal Agile Software Show requirements in Requirements are [33]
Elicitation(Ata Ble) Development natural language for user addressed by maximu m
Environment understanding. number of members
6|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
7|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
22 Computer Aided -Where Security Is It accelerates the The tool does not have [42]
Privacy Requirement Functional And elicitation process Helps any seal of approval of
Elicitation Technique Most Critical prevent privacy privacy law
Requirement requirement Leaks compliance..
especially for those who
are not familiar with the
privacy laws of
technique.
23 Spatial Hypertext Wiki Global Software -Easy to use -Understandability [43]
Development - Incremental content - Language issues
creation
24 Irequire -Distributed -Automatically gather -Usability issues [44]
Environment information on the
End-users environment.
25 Remo-Ekd Used For Industrial -It maximizes the total Can anyone elicit more [45]
And Organizational no of the requirement requirement when using
Context. found heuristic.
Web Based System -Helps to identify Does heuristic turns to
Having A Basis requirement much faster easy to identify
EKD Organization -Helps your performance software requirement.
Model in Requirement
Elicitation task
26 Focus Group Interactive System -Provide a platform on - Domain and [46]
Discussion For which user can share background
Requirements their requirements identification is
Elicitation (FGDRE) -Requirements are necessary
represented as mind
maps that improve the
understanding.
27 Gamifying Multiple Different people put Biasness [47]
Requirement Elicitation different suggestions to
reach a common point
28 Goore Any -Embed the ontological -Constructing an [48]
system through goal- ontology by hand is
oriented analysis slow
29 FLEX Reqmodel Combination Of Modification in existing [49]
Both Traditional requirement is easy
And Agile when discussed with
User
30 Goal And Any Promotes customer Avoid non-functional [50]
Scenario Authoring communication in requirements
defining system
requirements
Less time consuming
and cheaper
31 Goal-Oriented Analysis Small And Medium Support goal No supporting tool [51]
Method Size Projects decomposition and
refinement activities
Support cooperation
work of stakeholders
32 Interview Process Any Helpful to the elicitation No supporting tool [52]
Model (Where team who face a
Stockholders Are stakeholder that have
Available) problems in phrasing
their needs and
expectations from the
system.
33 Ithink Web Based Increase the Usability issues and [53]
collaboration and complexity
8|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
stakeholder involvement
34 Knowledge Audit Information System Solve the problem of Can’t be apply to [54]
Model communication between entirely new projects
user and developers
35 Novel Reengineering Context-Aware Context awareness much manual work [55]
Service Evolution Scalability issues
36 Wiki-Based Distributed -A lightweight approach -Increased complexity [56]
Stakeholder Environment to documentations of wiki syntax to
Participation In Re -easy page linking denominate metadata
-Easy history captured -Missing replication of
wiki content
37 Requirement Elicitation Information System Solve requirement NI [52]
Conceptual Model conflict and
inconsistencies between
them reduce
communication barriers
38 Requirements Health Care System Provide Not all trial design [56]
Elicitation In A multidisciplinary rationales may have
Telemedicine Pain- collaboration between been exposed
Treatment Trial1 trial designers and
system engineers that
makes topics of
discussions clear and
mutually understandable
39 Requirements Small And Medium An integrated use of traceability among [57]
Elicitation Through Size Projects several searching various UML diagrams
Model-Driven techniques, such as Only for functional
Evaluation Of Software keyword-based Search, requirements.
Components case-based reasoning
(CBR) and analytic
hierarchy Process (AHP)
40 Requirements Interactive System Improve communication Time consuming [58]
Elicitation Using
Visual And Textual
Information
41 Requirements Security System Focus on both functional NI [59]
Elicitation Using View and non-functional
Points requirements
42 A Collaborative Any Allowing stockholders to More time and effort [60]
Approach To define requirements required
Requirements collaboratively resulting
Elicitation clear and less ambiguous
requirements.
43 Collaborative Distributed Consider NI [61]
Requirements Environment interdependencies into
Elicitation And account by introducing
Decision-Supported requirements sets as
Requirements Analysis units
44 Goal-Oriented Idea Any Collaborative way of Ambiguous definition [62]
Generation Method defining goal as of goal
requirements removing No toll support
conflicts and
inconsistencies
45 Persona-Scenario-Goal Web Based Easy way to identify Issues regarding [56]
Methodology new requirements by requirements conflicts
evaluating different Platform and usability
scenario that eliminated issues
the need of stakeholders.
46 Utilizing Rule Ultra-Large-Scale Requires no or almost no Approach is not [63]
Deviations In It Software Systems interaction with the end evaluated and applied.
9|P age
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
1) Conference papers:
11 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
12 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
13 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
Design & preliminary evaluation of a cyber security requirements education game (SREG)
CUTA4UM L-bridging the gap between informal & formal requirements for dynamic system aspects
paper-based Requirement elicitation with adapted CUTA cards: first experiences with business process analysis
Simulating the Software engineering interview process using decision based serious computer game
Supporting the requirements analysis phase for development of serious games for children
14 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
Figure 2
RQ2: What is the main focus in these papers? to help non-technical people in understanding
requirement elicitation process[18,19].
Papers main focus is different according to their
methodology. Papers using web-based approach RQ3: What is the common problem statement
are focusing on increasing collaborative in these papers?
requirement elicitation[4],[9],[10],7]. Papers
Old techniques for requirement elicitation such
using paper-based approach are focusing on
as interview, observation, brainstorming etc. are
making interview technique more
less entertaining. These old techniques make
entertaining[8,9,10]. Papers using simulation-
stakeholders less interested in requirement
based approach are focusing on creating virtual
elicitation.
environment as prototype to gather better
requirements in cost effective manner[11,12,13]. RQ4: Have the proposed methodologies been
Papers using hybrid approach are focusing on validated?
improving 2 different aspects: 1 is to find the
hidden requirement from the raw data gathered All papers using different methodologies
from the users and 2 is to provide a mechanism validated their methodologies.
N0. Paper Title Q1 Q2 Q3 Q4
1 “A driving Simulator for discovering requirements in complex Yes Yes Yes Yes
systems”
2 “CUTA4UML: Bridging the gap between informal and formal Yes Yes Yes Yes
requirements for dynamic system aspects.”
3 “A methodology for managing distributed virtual environment Yes Yes Yes Yes
scalability”
4 “A collaborative method for business process oriented requirements Yes Yes Yes Yes
acquisition and refining”
5 “Requirement elicitation with adapted CUTA cards: first Yes Yes Yes Yes
experiences with business process analysis”
6 “Simulating the software engineering interview process using a Yes Yes Yes Yes
decision-based serious computer game”
7 “A feature modeling approach for domain-specific requirement Yes Yes Yes Yes
elicitation”
8 “Therapist-centered requirements: A multi-method approach of Yes Yes Yes Yes
requirement gathering to support rehabilitation gaming”
9 “Inviting everyone to play: Gamifying collaborative requirements Yes Yes Yes Yes
engineering”
10 “Refine: A gamified platform for participatory requirements Yes Yes Yes Yes
engineering”
11 “A serious game for eliciting social engineering security Yes Yes Yes Yes
requirements”
12 “Tailoring gamification to requirements elicitation: a stakeholder Yes Yes Yes Yes
centric motivation concept”
13 “Requirements gathering and testing by game playing” Yes Yes Yes Yes
14 “Evaluation of a game to teach requirements collection and analysis Yes Yes Yes Yes
in software engineering at tertiary education level”
15 “Designing a course for stimulating entrepreneurship in higher Yes Yes Yes Yes
education through serious games”
16 “iThink: a game-based approach towards improving collaboration Yes Yes Yes Yes
and participation in requirement elicitation”
17 “Applying collaborative process design to user requirements Yes Yes Yes Yes
elicitation: A case study”
18 “Gamifying requirement elicitation: practical implications and Yes Yes Yes Yes
outcomes in improving stakeholders collaboration”
15 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
gamification. 3 different databases have been [3] T. Hainey, T. M. Connolly, M. Stansfield, and E.
covered to provide a best review on A. Boyle, “Evaluation of a game to teach requirements
gamification. The Findings reveal that the collection and analysis in software engineering at tertiary
methodologies proposed in literature have education level,” Comput. Educ., vol. 56, no. 1, pp. 21–
35, 2011.
minimized the boring factor while eliciting the
requirements. In this paper these methodologies [4] M. Mira, “iThink : A game-based approach
has been categorized according to 5 different towards improving collaboration and participation in
approaches. 1) Web-based approach, 2) Paper- requirement elicitation,” vol. 15, pp. 66–77, 2012.
16 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
[11] H. Ghanbari, J. Similä, and J. Markkula, games for children,” Int. J. Child-Computer Interact., vol.
“Utilizing online serious games to facilitate distributed 2, no. 2, pp. 76–84, 2014.
requirements elicitation,” J. Syst. Softw., vol. 109, pp. 32–
49, 2015. [22] O. De Troyer and E. Janssens, “A feature
modeling approach for domain-specific requirement
[12] I. Erfurth and W. Rossak, “CUTA4UML - elicitation,” 2014 IEEE 4th Int. Work. Requir. Patterns,
Bridging the Gap between Informal and Formal RePa 2014 - Proc., pp. 17–24, 2014.
Requirements for Dynamic System Aspects,” Proc. 32nd
ACM/IEEE Int. Conf. Softw. Eng., pp. 171–174, 2010. [23] M. Z. H. Kolpondinos and M. Glinz, “Tailoring
gamification to requirements elicitation: A stakeholder-
[13] I. Erfurth and K. Kirchner, “Requirements centric motivation concept,” Proc. - 2017 IEEE/ACM
elicitation with adapted CUTA cards: First experiences 10th Int. Work. Coop. Hum. Asp. Softw. Eng. CHASE
with business process analysis,” Proc. IEEE Int. Conf. 2017, pp. 9–15, 2017.
Eng. Complex Comput. Syst. ICECCS, no. 4, pp. 215–223,
2010. [24] C. Ribeiro, C. Farinha, J. Pereira, and M. Mira da
Silva, “Gamifying requirement elicitation: Practical
[14] K. Beckers and S. Pape, “A Serious Game for implications and outcomes in improving stakeholders
Eliciting Social Engineering Security Requirements,” collaboration,” Entertain. Comput., vol. 5, no. 4, pp. 335–
Proc. - 2016 IEEE 24th Int. Requir. Eng. Conf. RE 2016 , 345, 2014. [1] S. K. Pandey and K. Mustafa, “Recent
pp. 16–25, 2016. Advances in SRE Research,” vol. 02, no. 04, pp. 1079–
1085, 2010.
[15] A. Gregoriades, J. Hadjicosti, C. Florides, M.
Pampaka, and H. Michail, “A driving simulator for [2] T. Standish and G. Report, “The Standish Group
discovering requirements in complex systems,” Simul. Report,” 2010.
Ser., vol. 47, no. 10, pp. 17–26, 2015.
[3] L. C. Cotran and R. N. Taylor, “Developing
Requirements in an Established Domain Using Tags and
[16] A. Rusu, R. Russell, and R. Cocco, “Simulating
Metadata,” pp. 24–27, 2011.
the software engineering interview process using a
decision-based serious computer game,” Proc. [4] C. Pacheco and I. Garcia, “The Journal of
CGAMES’2011 USA - 16th Int. Conf. Comput. Games AI, Systems and Software A systematic literature review of
Animat. Mobile, Interact. Multimedia, Educ. Serious stakeholder identification methods in requirements
Games, pp. 235–239, 2011. elicitation,” J. Syst. Softw., vol. 85, no. 9, pp. 2171–2181,
2012.
[17] H. L. Singh, “Denis Graˇ Virginia Tech,” pp.
[5] Z. Zhang, “Effective Requirements Development
2740–2751, 2011. - A Comparison of Requirements Elicitation techniques,”
2007.
[18] H. Lai, R. Peng, and Y. Ni, “Evaluating the
BPCRAR Method: A Collaborative Method for Business [6] E. W. Duggan and C. S. Thachenkary,
Process Oriented Requirements Acquisition and “Integrating nominal group technique and joint
Refining,” Commun. Comput. Inf. Sci., vol. 432 CCIS, pp. application development for improved systems
90–104, 2014. requirements determination,” vol. 41, pp. 399–411, 2004.
Systems in Poly ( dimethylsiloxane ),” vol. 70, no. 23, pp. [25] H. Lai, R. Peng, D. Sun, and J. Liu, “A
4974–4984, 1998. Lightweight Forum-based Distributed Requirement
Elicitation Process for Open Source Community,” vol. 4,
[11] C. J. Neill and P. A. Laplante, “Requirements no. April, pp. 138–145, 2012.
engineering: the state of the practice,” IEEE Softw., no. 6,
pp. 40–45, 2003. [26] P. Rajagopal, R. Lee, T. Ahlswede, C. Chiang,
D. Karolak, C. Science, A.-L. Rock, and I. A. Closures,
[12] A. Van Lamsweerde and others, “Requirements “A New Approach for Software Requirements
engineering: from system goals to UML models to Elicitation,” vol. 2, 2005.
software specifications,” 2009.
[27] N. Mulla and S. Girase, “A NEW APPROACH
[13] T. Bilgi and G. Software, “Utilizing Business TO REQUIREMENT ELICITATION BASED ON
Process Models for Requirements Elicitation,” pp. 1–4, STAKEHOLDER RECOMMENDATION AND,” vol. 3,
2003. no. 3, pp. 51–60, 2012.
[14] A. P. Massey and W. A. Wallace, “Focus groups [28] E. Engineering, “A New Proposal for The
as a knowledge elicitation technique: an exploratory Integration of Key Performance Indicators to
study,” Knowl. Data Eng. IEEE Trans., vol. 3, no. 2, pp. Requirements Elicitation Process Originating from
193–200, 1991. Organization Goals,” 2014.
[15] E. Hudlicka, “Requirements Elicitation with [29] S. Keele, “Guidelines for performing systematic
Indirect Knowledge Elicitation Techniques : Comparison literature reviews in software engineering,” in Technical
of Three Methods,” pp. 4–11, 1996. report, Ver. 2.3 EBSE Technical Report. EBSE, 2007.
[16] A. Hameed, D. Sleeman, and A. Preece, [30] C. Chen, L. P. Khoo, and W. Yan, “A strategy
“Detecting mismatches among experts’ ontologies for acquiring customer requirement patterns using
acquired through knowledge elicitation,” Knowledge- laddering technique and ART2 neural network,” vol. 16,
Based Syst., vol. 15, no. 5, pp. 265–273, 2002. no. 2002, pp. 229–240, 2003.
[17] A. Hart, “Knowledge elicitation : issues and [31] F. Maria, M. R. S. Borges, and J. A. Pino,
methods,” vol. 17, no. 9, 1985. “Advanced Engineering Informatics Acquiring knowledge
on business processes from stakeholders ’ stories,” Adv.
[18] K. D. Gill, “Eliciting Futuristic End-User Eng. Informatics, vol. 24, no. 2, pp. 138–148, 2010.
Requirements through Contributory Appreciative
Inquiry,” pp. 49–54, 2014. [32] F. Pérez and P. Valderas, “Allowing End-users to
Actively Participate within the Elicitation of Pervasive
[19] A. Davis, O. Dieste, A. Hickey, N. Juristo, and System Requirements through Immediate Visualization,”
A. M. Moreno, “Effectiveness of requirements elicitation 2010.
techniques: Empirical results derived from a systematic
review,” in Requirements Engineering, 14th IEEE [33] F. Perez and P. Valderas, “Allowing end-users to
International Conference, 2006, pp. 179–188. actively participate within the elicitation of pervasive
system requirements through immediate visualization,” in
[20] S. E. Group, “Guidelines for performing Requirements Engineering Visualization (REV), 2009
Systematic Literature Reviews in Software Engineering,” Fourth International Workshop on, 2009, pp. 31–40.
2007.
[34] A. M. Sen and S. K. Jain, “An agile technique
[21] X. Zhou, L. Yi, and Y. Liu, “A collaborative for agent based goal refinement to elicit soft goals in goal
requirement elicitation technique for SaaS applications,” oriented requirements engineering,” in Advanced
Proc. 2011 IEEE Int. Conf. Serv. Oper. Logist. Computing and Communications, 2007. ADCOM 2007.
Informatics, SOLI 2011, pp. 83–88, 2011. International Conference on, 2007, pp. 41–47.
[22] F. Medina-domínguez and A. Amescua, [35] J. Zapata, B. M. Losada, and G. Gonzalez-
“Computers in Human Behavior Knowledge management Calderon, “An approach for using procedure manuals as a
acquisition improvement by using software engineering source for Requirements Elicitation,” in Informatica
elicitation techniques,” vol. 30, pp. 721–730, 2014. (CLEI), 2012 XXXVIII Conferencia Latinoamericana En ,
2012, pp. 1–8.
[23] O. De Troyer and E. Janssens, “A Feature
Modeling Approach for Domain-Specific Requirement [36] P. Nistala, S. Kummamuru, and M. Narayana,
Elicitation,” pp. 17–24, 2014. “An approach to understand and elicit requirements usin g
systemic models : Ensuring a connect from problem
[24] S. T. Acuña, J. W. Castro, and N. Juristo, “A context to requirements,” Procedia Comput. Sci., vol. 16,
HCI technique for improving requirements elicitation,” pp. 786–795, 2013.
vol. 54, pp. 1357–1375, 2012.
18 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
[37] N. Latheef and A. A. Nithya, “An Automated authoring : A linguistics -based approach,” vol. 58, pp. 21–
Approach to Requirement Elicitation using Stakeholder 46, 2006.
Recommendation and Prediction Analysis,” pp. 77–81,
2013. [51] K. Ohshiro, K. Watahiki, and M. Saeki,
“Integrating an Idea Generation Method into a Goal-
[38] X. Zhang, S. Lv, M. Xu, and W. Mu, “Applying Oriented Analysis Method for Requirements Elicitation,”
evolutionary prototyping model for eliciting system 2005.
requirement of meat traceability at agribusiness level,”
Food Control, vol. 21, no. 11, pp. 1556–1562, 2010. [52] K. Ohshiro, K. Watahiki, and M. Saeki,
“Integrating an idea generation method into a goal-
[39] V. Laporti, M. R. S. Borges, and V. Braganholo, oriented analysis method for requirements elicitation,” in
“Computers in Industry Athena : A collaborative approach Software Engineering Conference, 2005. APSEC’05. 12th
to requirements elicitation,” vol. 60, pp. 367–380, 2009. Asia-Pacific, 2005, p. 9–pp.
[40] N. A. Z. Adem, “Automating Function Points [53] M. Mira, “iThink : A game-based approach
Analysis Based on Functional and non Functional towards improving collaboration and participation in
Requirements Text,” vol. 5, pp. 664–669, 2010. requirement elicitation,” vol. 15, pp. 66–77, 2012.
[41] D. Duarte, C. Farinha, M. M. Da Silva, and A. R. [54] L. Taheri, N. C. Pa, R. Abdullah, S. Abdullah,
Da Silva, “Collaborative requirements elicitation with and A. K. Audit, “Knowledge Audit Model for
visualization techniques,” Proc. Work. Enabling Technol. Requirement Elicitation Process,” vol. 8, no. 2, pp. 452–
Infrastruct. Collab. Enterp. WETICE, pp. 343–348, 2012. 456, 2014.
[42] S. Miyazaki, N. Mead, and J. Zhan, “Computer- [55] J. Huang and H. Yang, “Reconciling
aided privacy requirements elicitation technique,” Proc. Requirements and Implementation via Reengineering for
3rd IEEE Asia-Pacific Serv. Comput. Conf. APSCC 2008, Context-Aware Service Evolution,” 2011.
pp. 367–372, 2008.
[56] J. Huang, H. Yang, and L. Liu, “Reconciling
[43] C. Sol, E. Carlossolisleroie, and N. Ali, Requirements and Implementation via Reengineering for
“Distributed Requirements Elicitation Using A Spatial Context-Aware Service Evolution,” in Computer Software
Hypertext Wiki,” 2010. and Applications Conference Workshops (COMPSACW),
2011 IEEE 35th Annual, 2011, pp. 464–469.
[44] C. Solí and N. Ali, “Distributed requirements
elicitation using a spatial hypertext wiki,” in Global [57] L. Chung and N. F. Rd, “Requirements
Software Engineering (ICGSE), 2010 5th IEEE Elicitation through Model-Driven Evaluation of Software
International Conference on, 2010, pp. 237–246. Components The University of Texas at Dallas,” no.
Iccbss, 2006.
[45] M. De Oliveira, D. Viana, T. Conte, and S.
Marczak, “Evaluating the REMO-EKD Technique : A [58] J. M. Moore and F. M. S. I, “Requirements
Technique for the Elicitation of Software Requirements Elicitation using Visual and Textual Information,” no.
Based on EKD Organizational Models,” pp. 9–16, 2013. Figure I, pp. 308–309, 2001.
[46] Z. M. Kasirun and S. S. Salim, “Focus Group [59] P. G. Scholar, “Security Requirements Elicitation
Discussion Model for Requirements Elicitation Activity,” Using View Points for Online System Ashish Agarwal
pp. 101–105, 2008. Dept . of Computer Science,” pp. 1238–1243, 2008.
[47] C. Ribeiro, C. Farinha, J. Pereira, and M. Mira da [60] S. Tiwari, S. S. Rathore, and A. Gupta,
Silva, “Gamifying requirement elicitation: Practical “Selecting Requirement Elicitation Techniques for
implications and outcomes in improving stakeholders Software Projects,” 2012.
collaboration,” Entertain. Comput., vol. 5, no. 4, pp. 335–
345, 2014. [61] M. Geisser and T. Hildenbrand, “A Method for
Collaborative Requirements Elicitation and Decision-
[48] M. Shibaoka, H. Kaiya, and M. Saeki, Supported Requirements Analysis,” vol. 219, pp. 108–
“GOORE : Goal-Oriented and Ontology Driven 122, 2006.
Requirements Elicitation Method,” pp. 225–234, 2007.
[62] K. Oshiro, “Goal-Oriented Idea Generation
[49] S. M. Butt and W. F. W. Ahmad, “Handling Method for Requirements Elicitation,” pp. 3–4, 2003.
requirements using FlexREQ model,” ICSESS 2012 -
Proc. 2012 IEEE 3rd Int. Conf. Softw. Eng. Serv. Sci., pp. [63] L. Singer and K. Schneider, “Utilizing Rule
661–664, 2012. Deviations in IT Ecosystems for Implicit Requirements
Elicitation,” 2010.
[50] J. Kim, S. Park, and V. Sugumaran, “Improving
use case driven analysis using goal and scenario
19 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
[64] H. Ghanbari, J. Similä, and J. Markkula, “The [78] V. Dheepa, D. J. Aravindhar, and C.
Journal of Systems and Software Utilizing online serious Vijayalakshmi, “A Novel Method for Large Scale
games to facilitate distributed requirements elicitation,” Requirement Elicitation,” vol. 2, no. 7, pp. 375–379,
vol. 109, pp. 32–49, 2015. 2013.
[65] N. Hallberg and T. Timpka, “Using the critical [79] A. M. Sen and S. K. Jain, “An Agile Technique
incident technique to define a minimal data set for for Agent Based Goal Refinement to Elicit Soft Goals in
requirements elicitation in public health,” vol. 68, pp. Goal Oriented Requirements Engineering,” 2007.
165–174, 2002.
[80] M. Sadiq, “An Approach for Eliciting Software
[66] N. Boulila, A. Hoffmann, and A. Herrmann, Requirements and its Prioritization using Analytic
“Using Storytelling to record requirements: Elements for Hierarchy Process,” 2009.
an effective requirements elicitation approach,” 2011 4th
Int. Work. Multimed. Enjoyable Requir. Eng. - Beyond [81] C. M. Z. J and G. González-calderón, “An
Mere Descr. with More Fun Games, MERE’11 - Co- approach for using procedure manuals as a source for
located with 19th IEEE Int. Requir. Eng. Conf., RE'11, pp. requirements elicitation,” 2012.
9–16, 2011.
[82] H. Kaiya and M. Saeki, “Using domain ontology
[67] S. Shahidi and I. Technology, “Using as domain knowledge for requirements elicitation,” in
ethnography techniques in developing a mobile tool for Requirements Engineering, 14th IEEE International
requirements elicitation Department of Software Conference, 2006, pp. 189–198.
Engineering Information Technology , University
Malaya,” pp. 510–513, 2009. [83] B. Decker, E. Ras, J. Rech, P. Jaubert, and M.
Rieth, “Wiki-Based Stakeholder Participation in
[68] G. N. Aranda, A. Vizcaíno, A. Cechich, M. Requirements Engineering,” 2007.
Piattini, and U. Nacional, “Towards a Cognitive-Based
Approach to Distributed Requirement Elicitation [84] A. Sajid, A. Nayyar, and A. Mohsin, “Modern
Processes,” 2004. trends towards requirement elicitation,” in Proceedings of
the 2010 National Software Engineering Conference,
[69] D. Mishra, A. Mishra, and A. Yazici, 2010, p. 9.
“Successful requirement elicitation by combining
requirement engineering techniques,” 1st Int. Conf. Appl. [85] I. Widya, R. G. a Bults, B. J. F. Van Beijnum, L.
Digit. Inf. Web Technol. ICADIWT 2008, pp. 258–263, Sandsjö, L. Schaake, M. H. a Huis In’t Veld, V. Jones,
2008. and H. J. Hermens, “Requirements elicitation in a
telemedicine pain-treatment trial,” Proc. IEEE Int. Conf.
[70] N. Seyff, F. Graf, and N. Maiden, “Using Mobile Requir. Eng., pp. 309–314, 2009.
RE Tools to Give End-Users their Own Voice,” 2010.
[86] M. Aoyama, “Persona-Scenario-Goal
[71] C. Farinha, I. S. T. Opensoft, and M. Mira, Methodology for User-Centered Requirements
“Web-Based Focus Groups for Requirements Elicitation,” Engineering Persona-Scenario-Goal,” pp. 185–194, 2007.
no. c, pp. 504–509, 2011.
[87] J. Portillo-rodríguez, A. Vizcaíno, M. Piattini,
[72] L. R. Elicitation, S. L. Lim, and A. Finkelstein, and S. Beecham, “Tools used in Global Software
“StakeRare : Using Social Networks and Collaborative Engineering : A systematic mapping review,” vol. 54, pp.
Filtering for,” vol. 38, no. 3, pp. 707–735, 2012. 663–685, 2012.
[73] A. Krishna and H. Lu, “Requirements elicitation [88] S. Sachdeva and M. Malhotra, “Requirement
using goal-based organizational model,” pp. 543–551, Elicitation Of Large Web Projects,” vol. 3, no. 7, pp.
2008. 6880–6887, 2014.
[74] F. Requirements, “Task Descriptions as [89] S. Kausar, S. Tariq, S. Riaz, and A. Khanum,
Functional Requirements,” pp. 225–240, 2003. “Guidelines for the Selection of Elicitation Techniques,”
2010.
[75] N. Seyff, F. Graf, and N. Maiden, “Using Mobile
RE Tools to Give End-Users their Own Voice,” 2010. [90] L. Jiang, A. Eberlein, and B. H. Far, “A
methodology for the selection of requirements
[76] C. J. Neill and P. A. Laplante, “the state of the engineering techniques,” pp. 303–328, 2008.
practice Requirements Engineering : The State of the
Practice,” 2003. [91] D. Zowghi and C. Coulin, “2 Requirements
Elicitation : A Survey of Techniques , Approaches , and
[77] L. R. Elicitation, S. L. Lim, and A. Finkelstein, Tools.”
“StakeRare : Using Social Networks and Collaborative
Filtering for,” vol. 38, no. 3, pp. 707–735, 2012.
20 | P a g e
www.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications
Vol. 10, No. 1, 2019
21 | P a g e
www.thesai.org