Professional Documents
Culture Documents
International Journal of
Engineering and Applied Computer Science
Volume: 04, Issue: 02, March 2022 ISBN: 9780995707542
10.24032/IJEACS/0402/001
© 2022 by the author(s); licensee Empirical Research Press Ltd. United Kingdom. This is an open access article
distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license.
(http://creativecommons.org/licenses/by/4.0/).
www.ijeacs.com 19
Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022
Introspection The smart and Comprehensive Prototyping Developing a Time and cost
useful technique knowledge of new system both are utilized
has almost no business areas is becomes easy at a high rate.
cost. demanded. due to the
involvement of
Card Sorting Differentiation Work in stakeholders,
between collaboration is especially in
different more realistic making GUI.
requirements. and useful
Customer compared to Ethnography Social
Multiple
knowledge is this technique. behaviors are
Communities
analyzed. brought into
can create a
context to get
hurdle in using
Cognitive R.E. Techniques
III. CHARACTERISTICS BASED ANALYSIS OF vague and irrelevant data. But in both cases, the values to be
DIFFERENT REQUIREMENT ELICITATION TECHNIQUES entered in the required field would be ‘small’ and ‘large’ as the
case may be [17].
The characteristics of every elicitation technique are
different from each other in various aspects which are Lastly, the numbers of stakeholders are also discussed to
discussed in Table II. Every technique has different analyze the people involved in every elicitation technique. This
characteristics concerning the location of analysts and is because involving the stakeholders every time is time
stakeholders, the role of the analyst, mode of conduction, type consuming and difficult task which leads to delays in finalizing
of data, size of data, and the number of stakeholders [2, 14]. the end product. In Table II the values ‘One’ or ‘Many’ can be
entered according to the suitable case.
TABLE II. CHARACTERISTICS BASED ANALYSIS OF REQUIREMENT
ELICITATION TECHNIQUES IV. FRAMEWORK FOR SELECTING SUITABLE
TECHNIQUE
After a complete analysis of the system, a complete
framework is hereby proposed (Figure. 1) which can be used to
find out the best requirement elicitation technique according to
the proposed system’s attributes, characteristics of all the
above-mentioned techniques, situation based/ on-ground
analysis by the analyst.
In the column ‘mode of conduction,’ it is decided that if the All the elicitation techniques are also defined in the
elicitation technique is designed for direct elicitation purpose, framework, which is essential to mention here to map them
then the value ‘direct’ is entered, and if the elicitation technique with the system which is to be created. The characteristics are
is performing some other functions as well, then ‘indirect’ is comprehensively discussed earlier in this study and are well
entered in the required field. ‘Size of data’ plays a huge role in versed to map them with the system which is to be created. The
the elicitation process because if the data provided at the output characteristics are comprehensively discussed earlier in this
is small, then there might be a lack of complete data according study and are well versed to implement in any upcoming
to the situation, but if it is large, then there is the probability of system.
On-ground analysis are also given as input to the end-users/ customers. The administrator and employees
framework, which is done by the analyst because the are always available for requirement elicitation, but
observation is compulsory before requirement engineering. In clients/ customers are not present at the time of the startup
requirement engineering, one of the basic things is to identify of the said web portal. So, in this on-ground analysis, the
the social environment in which the proposed system will be analyst has to perform some functions to collect the
used and grow. The criteria are changed as the situation gets customer needs from the portal, which is mandatory.
changed and the elicitation technique is also changed according
to realities. B. Step 2: If we talk about the scope of the project, we have
various users on the platform. So, we have to go for those
All three inputs are applied to a mapping function that takes Characteristics which ensure that multiple users can access
the inputs from three sides and maps them with each other to the system without any difficulty.
provide outcomes with the resultant techniques which are most
suitable to the system attributes given by the stakeholders, C. Step 3: As the number of customers accessing the system
characteristics provided by this analysis, and situations is very large. All the customers have different intellectual
regarding the use of the internet and web app. So,
mentioned by the analyst.
situational measures are also to be performed so that all
Lastly in our framework, results are mentioned, in which customers can use the web system reliably.
the analyst finds the result of all the processes and finds the
best technique for elicitation of requirements which is more D. Step 4: In this project, the characteristics which are
likely to produce a successful product at the end of the process demanded, are also present in the projects previously
of software development life cycle. made. This project is not of a new sort, so use cases can
also be implemented to evaluate the elicitation technique.
depending on case to case. So, the characteristics-based [16] M. A. Iqbal, & A. Shah, (2021). Stakeholder’s Evaluation Process for
techniques can also be implemented on the sample taken from GSD Based Requirements Elicitation Frameworks. Pakistan Journal of
Engineering and Technology, 4(01), 175-183.
any specific region or industry type as well.
[17] V. Singh, D. Pandey, K. Sahu, & M. W. Khan, Optimizing the Impact of
Security Attributes in Requirement Elicitation Techniques using
REFERENCES FAHP. communications, 14, 15.
[1] S. Tiwari, S. S. Rathore, & A. Gupta, (2012, September). Selecting [18] K. L. Hobbs, A. R. Collins, & E. M. Feron, (2021). Risk-based formal
requirement elicitation techniques for software projects. In 2012 CSI requirement elicitation for automatic spacecraft maneuvering. In AIAA
Sixth International Conference on Software Engineering Scitech 2021 Forum (p. 1122).
(CONSEG) (pp. 1-10). IEEE.
[19] D. Gobov, & I. Huchenko, (2021). Software Requirements Elicitation
[2] M. A. Abbasi, J. Jabeen, Y. Hafeez, D. Batool, & N. Fareen, (2015). Techniques Selection Method for the Project Scope Management.
Assessment of requirement elicitation tools and techniques by various In ITPM (pp. 1-10).
parameters. Software Engineering, 3(2), 7-11.
[20] N. C. Alflen, L. C. Santos, E. P. Prado, & A. Grotta, (2021). Using
[3] M. Tariq, S. Farhan, H. Tauseef, & M. A. Fahiem, (2015). A Combined Techniques for Requirements Elicitation: A Brazilian Case
comparative analysis of elicitation techniques for the design of smart Study.
requirements using situational characteristics. International Journal of
Multidisciplinary Sciences and Engineering, 6(8), 30-38. [21] D. A. P. Sari, A. Y. Putri, M. Hanggareni, A. Anjani, M. L. O.
Siswondo, & I. K. Raharjana, (2021, February). Crowdsourcing as a tool
[4] H. Dar, M. I. Lali, H. Ashraf, M. Ramzan, T. Amjad, & B. Shahzad, to elicit software requirements. In AIP Conference Proceedings (Vol.
(2018). A systematic study on software requirements elicitation 2329, No. 1, p. 050001). AIP Publishing LLC.
techniques and their challenges in mobile application
development. IEEE Access, 6, 63859-63867.
[5] A. Nawaz, A. U. Rehman, & W. H. Butt, (2020). A Survey of AUTHORS PROFILE
Requirement Engineering Process in Android Application
Development. arXiv preprint arXiv:2008.13113.
Mr. Attique Ahmed has completed
[6] G. C. Sampada, T. I. Sake, & M. Chhabra, (2020, November). A Review his BS degree in Computer Science
on Advanced Techniques of Requirement Elicitation and Specification from Hazara University, Mansehra,
in Software Development Stages. In 2020 Sixth International
Conference on Parallel, Distributed and Grid Computing (PDGC) (pp.
Pakistan. Presently, He is pursuing
215-220). IEEE. M.Phil. degree in Computer Science
from Abbottabad University of
[7] B. Zachariah, & O. F. Nonyelum, (2020). A Comparative Analysis of
Science and Technology, Abbottabad,
Requirement Gathering Techniques. IUP Journal of Computer
Sciences, 14(2), 7-32. Pakistan.
[8] S. W. Kamal, M. Yaseen, A. U. Rahman, M. Bacha, & I. Kazim, (2020). Dr. Muhammad Naeem is an
Practices for Implementing Collaborative Tools and Modern Associate Professor and Head of the
Technologies during Requirement Elicitation in Global Software
Development. i-Manager's Journal on Software Engineering, 14(4), 20.
Department of Computer Science at
Abbottabad University of Science and
[9] I. Udousoro, (2020). Effective requirement engineering process model in Technology, Abbottabad, Pakistan.
software engineering. Software Engineering, 8(1), 1.
He has completed his Ph.D. from
[10] Z. Sofyan,(2020, March). User requirements elicitation in web-based Leicester University, United
Participatory Geographic Information System interface design. In IOP Kingdom.
Conference Series: Materials Science and Engineering (Vol. 796, No. 1,
p. 012028). IOP Publishing.
[11] A. H. Zahid, A. Liaqat, M. S. Farooq, & S. Naseer, (2020). Requirement
Elicitation issues and Challenges in Pakistan Software Industry. VFAST
Transactions on Software Engineering, 8(1), 28-36.
[12] A. Jarzębowicz, & K. Poniatowska, (2020). Exploring Impact of
Requirements Engineering on Other IT Project Areas–Case
Study. Computer Science, 21(3).
[13] I. H. Hussein, J. Din, S. Baharom, & M. B. Jasser, (2021). An Approach
for Selecting the Suitable Requirement Elicitation Technique. Turkish
Journal of Computer and Mathematics Education (TURCOMAT), 12(3),
2083-2087.
[14] S. Hunzai, & I. A. Shah, (2021). Impact of Elicitation Techniques on
Requirement Validation in Software Industry in Pakistan. International
Journal of Computer Science and Information Security (IJCSIS), 19(3).
[15] D. Gobov, & I. Huchenko, (2021, January). Influence of the Software
Development Project Context on the Requirements Elicitation
Techniques Selection. In International Conference on Computer Science,
Engineering and Education Applications (pp. 208-218). Springer, Cham.