Requirements Elicitation – What ’ s Missing ?
نویسندگان
چکیده
In this paper we show that interviews between IT consultants and clients are considered best practice in terms of methods for eliciting IS requirements as part of IS development projects. The process of conducting successful conversations with clients as part of requirements elicitation interviews is not well understood. The paper reports a literature survey which established current understanding. To date this understanding has been achieved through research which: considered conversations as black boxes; proposed and implemented treatments to be applied by consultants; and then measured the quality and quantity of the requirements elicited. The treatments have not been successful as poor requirements elicitation continues to be a major problem in IS development. Our analysis of current understanding indicated that consultants’ experiences of the nature of conversations with clients and approach to conducting conversations have not been studied. It would seem imperative to look inside the black box of consultants’ experiences of conducting conversations with clients if improvements to the outcomes of requirements elicitation are to be made. A study is proposed which aims to examine variation in how consultants experience requirements elicitation conversations. Through analyzing the variation in the light of current best practice it is aimed to identify the critical aspects of successfully conceived and conducted conversations. These critical aspects can then be used in IS education and practitioner training programs.
منابع مشابه
What stakeholders will or will not say: A theoretical and empirical study of topic importance in Requirements Engineering elicitation interviews
Interviewing stakeholders is a way to elicit information about requirements for a system-to-be. A difficulty when preparing such elicitation interviews is to select the topics to discuss, so as to avoid missing important information. Stakeholders may spontaneously share information on some topics, but remain silent on others, unless asked explicitly. We propose the Elicitation Topic Map (ETM) t...
متن کامل’ s repository of research publications and other research outputs Arguing satisfaction of security requirements
The chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is construc...
متن کاملThe Open University ’ s repository of research publications and other research outputs Arguing satisfaction of security requirements
The chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the system, then uses these goals to derive security requirements in the form of constraints. Next, a satisfaction argument for the system is construc...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008