SlideShare uma empresa Scribd logo
1 de 30
Software Requirements Elicitation Methods
Muhammad Naeem
Software Requirement Elicitation Methods
 Introduction
 Problems in Requirements Elicitation
 Requirements Elicitation Methods
 New Techniques for Requirements Elicitation
 Building Operational definitions based on keyword mapping
 Process Flow
 Requirements Elicitation using QFD
 Risk Analysis Using CMM
 Evaluation Methods
 Conclusion
Introduction
Introduction
 Requirements elicitation is the practice of collecting the
requirements of a system from users, customers and
other stakeholders
Problems in Requirements
Elicitation
Problems in Requirements Elicitation
 Problems of scope
 Problems of understanding.
 Problems of volatility.
Requirements Elicitation Methods
Requirements Elicitation Methods
 Dealing with the problem of lack of user input
 Structured and Unstructured Interview with stakeholders
 Template document for keywords
 Define precise system requirements
 Requirements should be meaningful, precise and realistic
New Techniques for Requirements
Elicitation
New Techniques for Requirements Elicitation
 Training sessions to eliminate “lack of user input” and
“poor understanding”
 Recording keywords
 Pictorial representation of needs and wants to reduce
language barriers
 Keyword Mapping
 Operational definition extraction
Building Operational definitions
based on keyword mapping
Building operational definitions based on
keyword mapping
 Collection and Identification of Keywords
 Categorization of Keywords
 Attribute Set = {(k1), (k2), (k3), (k4),(k6), (k7)}
 Behavioral Keyword set = {(k1), (k2), (k3), (k4)}
 Non-functional Keyword set = {(k1), (k2), (k3),(k4)}
 Functional Keyword set = {(k1), (k2), (k3), (k4)}
Building operational definitions based on
keyword mapping
 Mapped Keywords
representation
Map(Att,Behav) =
{(k2,k3), ( k4,k2)}
Map(Non-funct,Att) =
{(k4,k3) , (k3,k7)}
Building operational definitions based on
keyword mapping
 Mapping Nested Sets
Map(Map(Attr, Behav), Map (Nonfunct,Attr)) =
{ [(k2,k3), (k3,k7)], [(k4,k2), (k4,k3)] }
Now the keywords k2,k3,k3,k7,k4,k2,k4,k3 form a
sentence.
Process Flow
The process flow diagram is another representation of the
elicitation process,
Domain Specific
Requirement
Classifying & Prioritizing system
requirements using QFD
Domain Specific Req
Quality Inspection
Requirement Specification
Risk Analysis Using CMM
Analyze and build
Product
User Training
Sessions
Available Resources and
Computer Limitations
Development and
other stakeholder’s
abilities and skills
Available Resources and
Computer Limitations
Interview1 Interview2 Interview3 Interview4
New Technique for
requirement
Extraction
Keyword recording and
Extraction
Keyword mapping
Technique
Operational Definitions for
system Requirements
Requirements Elicitation using QFD
Requirements Elicitation using QFD
 What is QFD?
 A systematic process for motivating a business to focus on its
customers.
 Based on market research: understanding customers’ needs
and desires, and the effectiveness of relevant products in
meeting those needs and desires.
 Why QFD?
 To improve the communication of customer needs
throughout the organization.
 To improve the completeness of specifications and to
make them traceable directly to customer wants and
needs.
Components of QFD
Risk Analysis Using CMM
Risk Analysis Using CMM
 The Capability Maturity Model for Risk Management
is a model for describing both the present maturity of
risk management processes in an organization, and
for studying those processes in order to develop a
more mature, i.e. effective, risk management process.
 The CMM is divided into five maturity levels
 1. Initial.
 2. Repeatable.
 3. Defined.
 4. Managed.
 5. Optimizing
Evaluation Methods
Evaluation Methods
 Effective data collection method for evaluating software
development methodologies
 Evaluated by collecting data from domain experts and from other
users who have studied the technique thoroughly
 Evaluate the technique subjectively, by questions including the
following:
 (true/false) In current software elicitation, many important things are overlooked.
 (true/false) Pictorial representations of keywords help to make their meanings
clear and unambiguous.
 (true/false)The sentences generated by collecting, mapping and relating keywords
can easily be converted to accurate system requirements.
 (true/false)The technique eliminates irrelevant, redundant or trivial requirements.
 (true/false)When many keywords (e.g. several hundred or thousand) are collected,
the mapping process and its results are still manageable.
 Is this technique simple?
 Is this technique effective?
Evaluation Methods(cont..)
 The technique will be applied to actual elicitation situations of
various scales, and stakeholders will be asked about their satisfaction
with various parameters of the elicitation:
 Are the requirements complete?
 Are they within the scope of the system?
 Have irrelevant, redundant and trivial requirements been avoided?
 Do the requirements accurately represent the expressed needs of the users?
Conclusion
Conclusion
 Goal
 To develop a new methodology for improved requirements elicitation
 Proposal
 Training of users in the capabilities and limits of the computer and of
software developers;
 Collection of keywords from stakeholders in all categories;
 Pictorial representation of keywords to facilitate agreement on their
meaning;
 Keyword mapping to generate system requirements;
 Quality Function Deployment (QFD) to make sure that requirements
are relevant to the task and to the users’ needs;
 Capability Maturity Model (CMM) to make sure that requirements take
into account the risks the system will encounter or generate.
References
References
 [1]. Requirements Engineering A good practice guide, Ramos Rowel and Kurts Alfeche, JohnWiley and Sons,
1997
 [2].A. Umber, M.S. Naweed, andT. Bashir, I. S. Bajwa, (2012). Requirements Elicitation Methods,Advanced
Materials Research, 433-440 pp.6000-6006,2012
 [3]. Prasad Rajagopal, Roger Lee,Thomas Ahlswede, Chia-Chu Chiang, Dale Karolak. "A New Approach for
Software Requirements Elicitation". Proceedings of the Sixth International Conference on Software
Engineering,Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS
InternationalWorkshop on Self-AssemblingWireless Networks (SNPD/SAWN’05) 0-7695-2294-7/05
$20.00 © 2005 IEEE
 [4]. Soto,Alejandro and Preeti S. Malik,“QFD”. iSixSigma Dictionary,
http://www.isixsigma.com/dictionary/QFD-103.htm, 2003


 [5] InternationalTechneGroup Inc.,“The Basics of QFD”,
 http://www.iti-oh.com/cppd/qfd/qfd_basics.htm,2004
 [6] Squires,Ted,“Description of the QFD Process”,
 http://www.masetllc.com/products/418.shtml, 2005

 [7] Fox, Nevill,“Capability Maturity Model (RM-CMM) for Risk Management”, Silicon Rose,
 http://www.siliconrose.com.au/Articles/RiskCMM.htm, 2005.

 [8] Sullivan, L.P. Quality function deployment. Quality Progress 19, 6 (June 1986).

Mais conteúdo relacionado

Mais procurados

Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringvucevic
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation TechniquesShwetha-BA
 
Requirements elicitation techniques
Requirements elicitation techniquesRequirements elicitation techniques
Requirements elicitation techniquesTeniola Alimi
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitationSHIVANGI GOEL
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisWebx
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationNishu Rastogi
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitationvivacemente
 
Requirements Engineering - Lecture 1.pdf
Requirements Engineering - Lecture 1.pdfRequirements Engineering - Lecture 1.pdf
Requirements Engineering - Lecture 1.pdfFlavia Tembo Kambale
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Requirement Elicitation
Requirement ElicitationRequirement Elicitation
Requirement ElicitationRavikanth-BA
 
Software requirements engineering
Software requirements engineeringSoftware requirements engineering
Software requirements engineeringDr. Hamdan Al-Sabri
 
Lecture4 requirement engineering
Lecture4 requirement engineeringLecture4 requirement engineering
Lecture4 requirement engineeringShahid Riaz
 
5 investigating system requirements
5 investigating system requirements5 investigating system requirements
5 investigating system requirementsricardovigan
 
The importance of requirement elicitation and analysis
The importance of requirement elicitation and analysisThe importance of requirement elicitation and analysis
The importance of requirement elicitation and analysisTunde Adeniran
 
Requirements Elicitation Techniques
Requirements Elicitation Techniques  Requirements Elicitation Techniques
Requirements Elicitation Techniques JaveriaAslam10
 
Requirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationRequirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationMohamed Shaaban
 
Business requirement analysis session 5
Business requirement analysis   session 5Business requirement analysis   session 5
Business requirement analysis session 5sampad_senapati
 
software engineering
software engineeringsoftware engineering
software engineeringSnow Queenzz
 

Mais procurados (20)

Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Requirement Elicitation Techniques
Requirement Elicitation TechniquesRequirement Elicitation Techniques
Requirement Elicitation Techniques
 
Requirements elicitation techniques
Requirements elicitation techniquesRequirements elicitation techniques
Requirements elicitation techniques
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
Requirements Engineering - Lecture 1.pdf
Requirements Engineering - Lecture 1.pdfRequirements Engineering - Lecture 1.pdf
Requirements Engineering - Lecture 1.pdf
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Requirement Elicitation
Requirement ElicitationRequirement Elicitation
Requirement Elicitation
 
Software requirements engineering
Software requirements engineeringSoftware requirements engineering
Software requirements engineering
 
Lecture4 requirement engineering
Lecture4 requirement engineeringLecture4 requirement engineering
Lecture4 requirement engineering
 
5 investigating system requirements
5 investigating system requirements5 investigating system requirements
5 investigating system requirements
 
The importance of requirement elicitation and analysis
The importance of requirement elicitation and analysisThe importance of requirement elicitation and analysis
The importance of requirement elicitation and analysis
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
 
Requirements Elicitation Techniques
Requirements Elicitation Techniques  Requirements Elicitation Techniques
Requirements Elicitation Techniques
 
Requirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationRequirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and Elicitation
 
Business requirement analysis session 5
Business requirement analysis   session 5Business requirement analysis   session 5
Business requirement analysis session 5
 
Process Support for requirements engineering
Process Support for requirements engineeringProcess Support for requirements engineering
Process Support for requirements engineering
 
software engineering
software engineeringsoftware engineering
software engineering
 

Destaque

Elicitation techniques
Elicitation techniquesElicitation techniques
Elicitation techniquesdaisy92081
 
Mastering Current Global Software Development Challenges
Mastering Current Global Software Development ChallengesMastering Current Global Software Development Challenges
Mastering Current Global Software Development ChallengesMichael Heiss
 
Requirements engineering in global environment 2.0
Requirements engineering in global environment   2.0Requirements engineering in global environment   2.0
Requirements engineering in global environment 2.0khush bakhat
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation TechniquesSwati Sinha
 
Social and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringSocial and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringImran Hussain Khan
 
Agile or traditional Software Engineering?
Agile or traditional Software Engineering? Agile or traditional Software Engineering?
Agile or traditional Software Engineering? Dagmar Monett
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...Dagmar Monett
 
Walking the path from the MOOC to my classroom: My collection of methods and ...
Walking the path from the MOOC to my classroom: My collection of methods and ...Walking the path from the MOOC to my classroom: My collection of methods and ...
Walking the path from the MOOC to my classroom: My collection of methods and ...Dagmar Monett
 
Using BDI-extended NetLogo Agents in Undergraduate CS Research and Teaching
Using BDI-extended NetLogo Agents in Undergraduate CS Research and TeachingUsing BDI-extended NetLogo Agents in Undergraduate CS Research and Teaching
Using BDI-extended NetLogo Agents in Undergraduate CS Research and TeachingDagmar Monett
 
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]Dagmar Monett
 
Joint Software Engineering to support STEM Education: Experiences before, dur...
Joint Software Engineering to support STEM Education: Experiences before, dur...Joint Software Engineering to support STEM Education: Experiences before, dur...
Joint Software Engineering to support STEM Education: Experiences before, dur...Dagmar Monett
 
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...Dagmar Monett
 
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...Dagmar Monett
 
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...Dagmar Monett
 
Teaching Students Collaborative Requirements Engineering. Case Study Red:Wire
Teaching Students Collaborative Requirements Engineering. Case Study Red:WireTeaching Students Collaborative Requirements Engineering. Case Study Red:Wire
Teaching Students Collaborative Requirements Engineering. Case Study Red:WireDagmar Monett
 
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Dagmar Monett
 
Agile Project-Based Teaching and Learning
Agile Project-Based Teaching and LearningAgile Project-Based Teaching and Learning
Agile Project-Based Teaching and LearningDagmar Monett
 
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertation
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertationAgent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertation
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertationDagmar Monett
 
Experiences in Software Testing (lecture slides)
Experiences in Software Testing (lecture slides)Experiences in Software Testing (lecture slides)
Experiences in Software Testing (lecture slides)Dagmar Monett
 
Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Dagmar Monett
 

Destaque (20)

Elicitation techniques
Elicitation techniquesElicitation techniques
Elicitation techniques
 
Mastering Current Global Software Development Challenges
Mastering Current Global Software Development ChallengesMastering Current Global Software Development Challenges
Mastering Current Global Software Development Challenges
 
Requirements engineering in global environment 2.0
Requirements engineering in global environment   2.0Requirements engineering in global environment   2.0
Requirements engineering in global environment 2.0
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation Techniques
 
Social and cultural issues in requirements engineering
Social and cultural issues in requirements engineeringSocial and cultural issues in requirements engineering
Social and cultural issues in requirements engineering
 
Agile or traditional Software Engineering?
Agile or traditional Software Engineering? Agile or traditional Software Engineering?
Agile or traditional Software Engineering?
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...
 
Walking the path from the MOOC to my classroom: My collection of methods and ...
Walking the path from the MOOC to my classroom: My collection of methods and ...Walking the path from the MOOC to my classroom: My collection of methods and ...
Walking the path from the MOOC to my classroom: My collection of methods and ...
 
Using BDI-extended NetLogo Agents in Undergraduate CS Research and Teaching
Using BDI-extended NetLogo Agents in Undergraduate CS Research and TeachingUsing BDI-extended NetLogo Agents in Undergraduate CS Research and Teaching
Using BDI-extended NetLogo Agents in Undergraduate CS Research and Teaching
 
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]
Predicting Star Ratings based on Annotated Reviewss of Mobile Apps [Slides]
 
Joint Software Engineering to support STEM Education: Experiences before, dur...
Joint Software Engineering to support STEM Education: Experiences before, dur...Joint Software Engineering to support STEM Education: Experiences before, dur...
Joint Software Engineering to support STEM Education: Experiences before, dur...
 
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...
Simulating the Fractional Reserve Banking using Agent-based Modelling with Ne...
 
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...
Understanding the Cuban Blogosphere: Retrospective and Perspectives based on ...
 
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...
Evolving Lesson Plans to Assist Educators: From Paper-Based to Adaptive Lesso...
 
Teaching Students Collaborative Requirements Engineering. Case Study Red:Wire
Teaching Students Collaborative Requirements Engineering. Case Study Red:WireTeaching Students Collaborative Requirements Engineering. Case Study Red:Wire
Teaching Students Collaborative Requirements Engineering. Case Study Red:Wire
 
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
 
Agile Project-Based Teaching and Learning
Agile Project-Based Teaching and LearningAgile Project-Based Teaching and Learning
Agile Project-Based Teaching and Learning
 
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertation
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertationAgent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertation
Agent-Based Configuration of (Metaheuristic) Algorithms - Doctoral dissertation
 
Experiences in Software Testing (lecture slides)
Experiences in Software Testing (lecture slides)Experiences in Software Testing (lecture slides)
Experiences in Software Testing (lecture slides)
 
Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)Key Issues for Requirements Engineering (lecture slides)
Key Issues for Requirements Engineering (lecture slides)
 

Semelhante a Software Requirements Elicitation Methods

An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...
An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...
An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...zillesubhan
 
Qm0013 quality management tools
Qm0013  quality management toolsQm0013  quality management tools
Qm0013 quality management toolssmumbahelp
 
Qm0013 quality management tools
Qm0013  quality management toolsQm0013  quality management tools
Qm0013 quality management toolssmumbahelp
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assuranceIJCSES Journal
 
Lightweight Processes: A Definition
Lightweight Processes: A DefinitionLightweight Processes: A Definition
Lightweight Processes: A DefinitionGlen Alleman
 
Performance Evaluation of Software Quality Model
Performance Evaluation of Software Quality ModelPerformance Evaluation of Software Quality Model
Performance Evaluation of Software Quality ModelEditor IJMTER
 
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...A Comparative Study of Software Requirement, Elicitation, Prioritization and ...
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...IJERA Editor
 
A Novel Method for Quantitative Assessment of Software Quality
A Novel Method for Quantitative Assessment of Software QualityA Novel Method for Quantitative Assessment of Software Quality
A Novel Method for Quantitative Assessment of Software QualityCSCJournals
 
Cba Ipi Cmm Intro Session 1.1
Cba   Ipi   Cmm Intro   Session 1.1Cba   Ipi   Cmm Intro   Session 1.1
Cba Ipi Cmm Intro Session 1.1Phuong Vy
 
How Does IT Provide A Consistently Effective Service
How Does IT Provide A Consistently Effective ServiceHow Does IT Provide A Consistently Effective Service
How Does IT Provide A Consistently Effective ServiceJusto Stoll
 
Feb2008 Service Desk Maturity Models & Fram
Feb2008 Service Desk Maturity Models & FramFeb2008 Service Desk Maturity Models & Fram
Feb2008 Service Desk Maturity Models & FramIT Service and Support
 
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
EVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACHEVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACH
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACHPriyanka Karancy
 
QAI - Cmmi Overview - Induction ppt
QAI - Cmmi Overview - Induction pptQAI - Cmmi Overview - Induction ppt
QAI - Cmmi Overview - Induction pptQAIites
 
Improved Customer Churn Behaviour by using SVM
Improved Customer Churn Behaviour by using SVMImproved Customer Churn Behaviour by using SVM
Improved Customer Churn Behaviour by using SVMIRJET Journal
 
Capability Maturity Model (CMM)
Capability Maturity Model (CMM)Capability Maturity Model (CMM)
Capability Maturity Model (CMM)Ali Sadhik Shaik
 

Semelhante a Software Requirements Elicitation Methods (20)

An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...
An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...
An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...
 
Qm0013 quality management tools
Qm0013  quality management toolsQm0013  quality management tools
Qm0013 quality management tools
 
Qm0013 quality management tools
Qm0013  quality management toolsQm0013  quality management tools
Qm0013 quality management tools
 
Presentation
PresentationPresentation
Presentation
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assurance
 
QA in RE
QA in REQA in RE
QA in RE
 
Lightweight Processes: A Definition
Lightweight Processes: A DefinitionLightweight Processes: A Definition
Lightweight Processes: A Definition
 
Performance Evaluation of Software Quality Model
Performance Evaluation of Software Quality ModelPerformance Evaluation of Software Quality Model
Performance Evaluation of Software Quality Model
 
Sqm2mark
Sqm2markSqm2mark
Sqm2mark
 
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...A Comparative Study of Software Requirement, Elicitation, Prioritization and ...
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...
 
Capability Maturity Model Integration
Capability Maturity Model IntegrationCapability Maturity Model Integration
Capability Maturity Model Integration
 
A Novel Method for Quantitative Assessment of Software Quality
A Novel Method for Quantitative Assessment of Software QualityA Novel Method for Quantitative Assessment of Software Quality
A Novel Method for Quantitative Assessment of Software Quality
 
Cba Ipi Cmm Intro Session 1.1
Cba   Ipi   Cmm Intro   Session 1.1Cba   Ipi   Cmm Intro   Session 1.1
Cba Ipi Cmm Intro Session 1.1
 
How Does IT Provide A Consistently Effective Service
How Does IT Provide A Consistently Effective ServiceHow Does IT Provide A Consistently Effective Service
How Does IT Provide A Consistently Effective Service
 
Feb2008 Service Desk Maturity Models & Fram
Feb2008 Service Desk Maturity Models & FramFeb2008 Service Desk Maturity Models & Fram
Feb2008 Service Desk Maturity Models & Fram
 
Introduction to CMMI-DEV v1.3 - Day 1
Introduction to CMMI-DEV v1.3  - Day 1Introduction to CMMI-DEV v1.3  - Day 1
Introduction to CMMI-DEV v1.3 - Day 1
 
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
EVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACHEVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACH
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
 
QAI - Cmmi Overview - Induction ppt
QAI - Cmmi Overview - Induction pptQAI - Cmmi Overview - Induction ppt
QAI - Cmmi Overview - Induction ppt
 
Improved Customer Churn Behaviour by using SVM
Improved Customer Churn Behaviour by using SVMImproved Customer Churn Behaviour by using SVM
Improved Customer Churn Behaviour by using SVM
 
Capability Maturity Model (CMM)
Capability Maturity Model (CMM)Capability Maturity Model (CMM)
Capability Maturity Model (CMM)
 

Último

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Último (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Software Requirements Elicitation Methods

  • 1. Software Requirements Elicitation Methods Muhammad Naeem
  • 2. Software Requirement Elicitation Methods  Introduction  Problems in Requirements Elicitation  Requirements Elicitation Methods  New Techniques for Requirements Elicitation  Building Operational definitions based on keyword mapping  Process Flow  Requirements Elicitation using QFD  Risk Analysis Using CMM  Evaluation Methods  Conclusion
  • 4. Introduction  Requirements elicitation is the practice of collecting the requirements of a system from users, customers and other stakeholders
  • 6. Problems in Requirements Elicitation  Problems of scope  Problems of understanding.  Problems of volatility.
  • 8. Requirements Elicitation Methods  Dealing with the problem of lack of user input  Structured and Unstructured Interview with stakeholders  Template document for keywords  Define precise system requirements  Requirements should be meaningful, precise and realistic
  • 9.
  • 10. New Techniques for Requirements Elicitation
  • 11. New Techniques for Requirements Elicitation  Training sessions to eliminate “lack of user input” and “poor understanding”  Recording keywords  Pictorial representation of needs and wants to reduce language barriers  Keyword Mapping  Operational definition extraction
  • 13. Building operational definitions based on keyword mapping  Collection and Identification of Keywords  Categorization of Keywords  Attribute Set = {(k1), (k2), (k3), (k4),(k6), (k7)}  Behavioral Keyword set = {(k1), (k2), (k3), (k4)}  Non-functional Keyword set = {(k1), (k2), (k3),(k4)}  Functional Keyword set = {(k1), (k2), (k3), (k4)}
  • 14. Building operational definitions based on keyword mapping  Mapped Keywords representation Map(Att,Behav) = {(k2,k3), ( k4,k2)} Map(Non-funct,Att) = {(k4,k3) , (k3,k7)}
  • 15. Building operational definitions based on keyword mapping  Mapping Nested Sets Map(Map(Attr, Behav), Map (Nonfunct,Attr)) = { [(k2,k3), (k3,k7)], [(k4,k2), (k4,k3)] } Now the keywords k2,k3,k3,k7,k4,k2,k4,k3 form a sentence.
  • 16. Process Flow The process flow diagram is another representation of the elicitation process,
  • 17. Domain Specific Requirement Classifying & Prioritizing system requirements using QFD Domain Specific Req Quality Inspection Requirement Specification Risk Analysis Using CMM Analyze and build Product User Training Sessions Available Resources and Computer Limitations Development and other stakeholder’s abilities and skills Available Resources and Computer Limitations Interview1 Interview2 Interview3 Interview4 New Technique for requirement Extraction Keyword recording and Extraction Keyword mapping Technique Operational Definitions for system Requirements
  • 19. Requirements Elicitation using QFD  What is QFD?  A systematic process for motivating a business to focus on its customers.  Based on market research: understanding customers’ needs and desires, and the effectiveness of relevant products in meeting those needs and desires.  Why QFD?  To improve the communication of customer needs throughout the organization.  To improve the completeness of specifications and to make them traceable directly to customer wants and needs.
  • 21.
  • 23. Risk Analysis Using CMM  The Capability Maturity Model for Risk Management is a model for describing both the present maturity of risk management processes in an organization, and for studying those processes in order to develop a more mature, i.e. effective, risk management process.  The CMM is divided into five maturity levels  1. Initial.  2. Repeatable.  3. Defined.  4. Managed.  5. Optimizing
  • 25. Evaluation Methods  Effective data collection method for evaluating software development methodologies  Evaluated by collecting data from domain experts and from other users who have studied the technique thoroughly  Evaluate the technique subjectively, by questions including the following:  (true/false) In current software elicitation, many important things are overlooked.  (true/false) Pictorial representations of keywords help to make their meanings clear and unambiguous.  (true/false)The sentences generated by collecting, mapping and relating keywords can easily be converted to accurate system requirements.  (true/false)The technique eliminates irrelevant, redundant or trivial requirements.  (true/false)When many keywords (e.g. several hundred or thousand) are collected, the mapping process and its results are still manageable.  Is this technique simple?  Is this technique effective?
  • 26. Evaluation Methods(cont..)  The technique will be applied to actual elicitation situations of various scales, and stakeholders will be asked about their satisfaction with various parameters of the elicitation:  Are the requirements complete?  Are they within the scope of the system?  Have irrelevant, redundant and trivial requirements been avoided?  Do the requirements accurately represent the expressed needs of the users?
  • 28. Conclusion  Goal  To develop a new methodology for improved requirements elicitation  Proposal  Training of users in the capabilities and limits of the computer and of software developers;  Collection of keywords from stakeholders in all categories;  Pictorial representation of keywords to facilitate agreement on their meaning;  Keyword mapping to generate system requirements;  Quality Function Deployment (QFD) to make sure that requirements are relevant to the task and to the users’ needs;  Capability Maturity Model (CMM) to make sure that requirements take into account the risks the system will encounter or generate.
  • 30. References  [1]. Requirements Engineering A good practice guide, Ramos Rowel and Kurts Alfeche, JohnWiley and Sons, 1997  [2].A. Umber, M.S. Naweed, andT. Bashir, I. S. Bajwa, (2012). Requirements Elicitation Methods,Advanced Materials Research, 433-440 pp.6000-6006,2012  [3]. Prasad Rajagopal, Roger Lee,Thomas Ahlswede, Chia-Chu Chiang, Dale Karolak. "A New Approach for Software Requirements Elicitation". Proceedings of the Sixth International Conference on Software Engineering,Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS InternationalWorkshop on Self-AssemblingWireless Networks (SNPD/SAWN’05) 0-7695-2294-7/05 $20.00 © 2005 IEEE  [4]. Soto,Alejandro and Preeti S. Malik,“QFD”. iSixSigma Dictionary, http://www.isixsigma.com/dictionary/QFD-103.htm, 2003    [5] InternationalTechneGroup Inc.,“The Basics of QFD”,  http://www.iti-oh.com/cppd/qfd/qfd_basics.htm,2004  [6] Squires,Ted,“Description of the QFD Process”,  http://www.masetllc.com/products/418.shtml, 2005   [7] Fox, Nevill,“Capability Maturity Model (RM-CMM) for Risk Management”, Silicon Rose,  http://www.siliconrose.com.au/Articles/RiskCMM.htm, 2005.   [8] Sullivan, L.P. Quality function deployment. Quality Progress 19, 6 (June 1986).