Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value
نویسندگان
چکیده
Few studies have examined how information systems development is practiced in the Arab world. To fill this gap, this study reports on current Requirement Engineering (RE) practices within an Arab country. The aim of this study is to investigate the perceptions of 19 RE techniques in Kuwait in term of three criteria " awareness " , " use " , and " perceived value generated over past system development projects ". Also, this study aims to examine possible relationships between these RE techniques and two information system development success factors. Results show that: (i) Arab culture influence perception of RE techniques; (ii) most companies have good knowledge of different techniques; (iii) several different techniques for identifying and analyzing customer requirements are used; (iv) the most highly valued RE techniques are decision trees, goal oriented, prototyping, DFD, and interviews; (v) Six techniques (tree analysis, role playing, UML, K.J. method, flow charts, and Ishikawa) were found to have the least perceived value; (vi) Only two techniques (prototyping and decision tree) are highly correlated with the statement "Obtaining the right requirements is a critical success factor for system development", while other three techniques (quality function deployment, DFD and role playing) are correlated with " We experienced problems during past system developments projects because of wrong requirements collection ". The Paper discusses these issues which are relevant for research and practice.
منابع مشابه
Perspective on Information Requirement Determination Practices in Kuwait: Familiarity, Usage and Perceived Value
Few studies have examined how Information Requirement Determination (IRD) is practiced in the Arab world. To lessen the gap, this empirical study reports on the perception of 19 IRD methods in Kuwait, an Arab country. Based on a sample of 87 software stakeholders, this study reports on the most known, widely used and highly valued IRD methods. Results show that Arab culture influences perceptio...
متن کاملA study of designer familiarity with product and user during requirement elicitation
This paper reports on a preliminary study that explores the differences in requirements elicitation between user-familiarity and product-familiarity in engineering design. Two observational studies are used to investigate the effects of such designer familiarity with their ability to elicit requirements. The results illustrated that there appears to be great disparity between designers familiar...
متن کاملRequirements Gathering Methods in System Engineering
The requirements engineering is mandatory phase which all development process start with. Mistakes in requirements elicitation therefore take very important role in a project success. In these article requirements elicitation methods are described in context of the system development and finally the generic requirements engineering process is described. Key-Words: requirements elicitation, requ...
متن کاملEmpirical Evaluation of Requirements Elicitation Techniques
The success of any software development cycle for producing the software product is based on the software requirements. The elicitation of requirements is the first and most important activity in the Requirement Engineering (RE). The problems in requirement elicitation process will result in poor requirements which can lead to the development of unsatisfactory software system. Moreover, the dev...
متن کاملContext-Driven Elicitation of Default Requirements: an Empirical Validation
In Requirements Engineering, requirements elicitation aims the acquisition of information from the stakeholders of a system-to-be. An important task during elicitation is to identify and render explicit the stakeholders’ implicit assumptions about the system-to-be and its environment. Purpose of doing so is to identify omissions in, and conflicts between requirements. This paper offers a concep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2009