SlideShare uma empresa Scribd logo
1 de 26
Requirements elicitation is the practice of collecting
the requirements of a system from users, customers
and other stakeholders. The practice is also sometimes
referred to as requirements gathering.
Presented By:
Muhammad Imran Hussain Khan
0300-6519990
Stakeholder Analysis
Brainstorming
One On One Interview
Group Interview
Document Analysis
Focus Group
Interface Analysis
Observation Social Analysis
Prototyping
Facilitated sessions
Joint Application Development (JAD)
Questionnaire
Survey
Use cases and scenarios (UCD)
Reused Requirements
Request for proposals (RFPs)
Reverse Engineering
Stakeholder analysis identifies
all the users and stakeholders
who may influence or be
impacted by the system. This
helps ensure that the needs of
all those involved are taken into
account
Benefits
1. Ensures that all relevant
stakeholders are considered
1. All important
stakeholders are captured,
and yet that irrelevant
actors are not included
Drawbacks
There is a danger that too much
time is spent on
identifying roles and
relationships, and the team is
swamped with data.
Basic Rules
1. Start out by clearly
stating the objective of
the brainstorming
session.
2. Generate as may ideas as
possible.
3. Let your imagination
soar.
4. Do not allow criticism or
debate while you are
gathering information.
5. Once information is
gathered, reshape and
combine ideas.
The most common technique for
gathering requirements is to sit
down with the clients and ask
them what they need. The
discussion should be planned
out ahead of time based on the
type of requirements you’re
looking for
• Privacy of everyone
• in-depth a stakeholder’s
thoughts and get his or
her perspective
Benefits
• Time Consuming
• Misunderstandings
Risks & Drawbacks
If there are more then one
person during interview usually
2 or 4 these people must be on
some level must be on some level
less time required
• we can get hidden requirements
• uncover a richer set of
requirements in a shorter period
of time
• Uncover ambiguities
Benefits
• Not relaxed environment
• Conflicts
• The allotted time have been
exhausted
Risks & Drawbacks
Document Analysis is an
important gathering technique.
Evaluating the documentation of a
present system can assist when
making AS-IS process documents
and also when driving the gap
analysis for scoping of the
migration projects.
• validating the requirement
completeness.
• Chunks of information are mostly
buried in present documents
• A beginning point for documenting
all current requirements.
Benefits
• Time Consuming
• Conflicts
• Exhausted
• Not Found Real Figures
Risks & Drawbacks
A focus group is actually gathering of
people who are customers or users
representatives for a product to gain its
feedback. The feedback can be collected
about opportunities, needs, and
problems to determine requirements or
it can be collected to refine and validate
the already elicited requirements.
• Managed process with particular
participants
• refine and validate the already
elicited requirements
• Allows analyst to rapidly obtain a
wide variety of user views and
possibly a consensus.
Benefits
• following the crowd and some
people think that focus groups
are at best unproductive
• end up with is with least common
denominator features.
• Recruitment effort to
• Assemble groups. Dominant
participants may influence group
disproportionately
Risks & Drawbacks
Interface for any software product will either be human or machine.
Integration with external devices and systems is another interface. The
user centric design approaches are quite effective to ensure that you
make usable software. Interface analysis- analyzing the touch points
with another external system- is vital to ensure that you do not overlook
requirements that are not instantly visible to the users.
Social analysis is also known as
Observation. Observation is the method
of collecting requirements by observing
the people doing their normal work.
This method is generally used to find the
additional requirements needed by the
user, when the user is unable to explain
their expected requirements from the
new product and problems with the
existing product
• The ability to record and
report all findings that are
true
• it is more practical
• no long calculation has to be
done
Benefits
• The viewer's or researcher's
own perception
• few trials/studies/or objects
observed to make an end
conclusion
• results may contain human
error
Risks & Drawbacks
Prototyping is a relatively modern technique
for gathering requirements. In this approach,
you gather preliminary requirements that you
use to build an initial version of the solution
— a prototype. You show this to the client,
who then gives you additional requirements.
You change the application and cycle around
with the client again. This repetitive process
continues until the product meets the critical
mass of business needs or for an agreed
number of iterations.
• prototypes can be ideal
reduce design risk
• it is more practical
• Screen mock-ups
• Using animation tools
• provides an understanding
of functionality
Benefits
• takes time to build
• more costly to build
• false sense of security
Risks & Drawbacks
In a facilitated session, you bring a larger
group (five or more) together for a common
purpose. In this case, you are trying to gather
a set of common requirements from the group
in a faster manner than if you were to
interview each of them separately.
• Less Time
• Reach Group Of People
• Brainstorming sessions
(virtual or face-to-face)
Benefits
• More Expensive
• need for extra facilities
to allow for group work
etc
• Handouts, readings
Risks & Drawbacks
JAD or joint application design, these
workshops can be efficient for gathering
requirements. The requirements workshops
are more organized and structured than a
brainstorming session where the involved
parties get together to document
requirements. Creation of domain model
artifacts like activity programs or static
diagrams is one of the ways to capture the
collaboration. A workshop with two analysts is
more effective than one in which on works as a
facilitator and the other scribes the work
together.
• group typically stays in the
session until the session
objectives are completed
• participants stay in session
until a complete set of
requirements
• documented and agreed to
Benefits
• takes time to build
• more costly to build
• false sense of security
Risks & Drawbacks
Questionnaires are much more informal, and
they are good tools to gather requirements
from stakeholders in remote locations or
those who will have only minor input into the
overall requirements. Questionnaires can also
be used when you have to gather input from
dozens, hundreds, or thousands of people.
• Less cost
• Reach Large No of Peoples
• The responses are gathered
in a standardized way
Benefits
• Difficult filling for users
• participants may forget
important issues
• Stockholders may not be
willing to answer the
questions
Risks & Drawbacks
When gathering information from many
people: to many to interview with time
constraints and less budget: a questionnaire
survey can be used. The survey insists the
users to choose from the given options agree /
disagree or rate something. Do not think that
you can make a survey on your own but try to
add meaningful insight in it. A well designed
survey must give qualitative guidance for
characterizing the market. It should not be
utilized for prioritizing of requirements or
features.
• Less cost
• Reach Large No of
Peoples
• A detailed critical
inspection
Benefits
• Difficult filling for users
• participants may forget
important issues
• Stockholders may not be
willing to answer the
questions
Risks & Drawbacks
Use cases are basically stories that describe
how discrete processes work. The stories
include people (actors) and describe how the
solution works from a user perspective. Use
cases may be easier for the users to articulate,
although the use cases may need to be
distilled later into the more specific detailed
requirements.
• provide the best return on
invested effort
• explain how that system will
be implemented
• Each use case provides a set
of scenarios that convey how
the system should interact
Benefits
• Poor identification of
structure and flow
• Time-consuming to generate
• Scenario management is
difficult
Risks & Drawbacks
In the field of software engineering
reusing the requirements of the
existing system is common method of
requirements elicitation. Using the
existing knowledge to develop the
new product has many advantages
that include low cost and less time.
Though each product has their own
type of stake holders and users, there
is still number of situations that the
reusing of the requirements take
places
• Reused requirements
are already validated
and analyzed thus
reducing the time of
testing
Benefits
• Some time proposed
product is completely
different form the
existing product
Risks & Drawbacks
If you are a vendor, you may receive
requirements through an RFP. This list
of requirements is there for you to
compare against your own capabilities to
determine how close a match you are to
the client’s needs.
The RFP presents preliminary
requirements for the commodity or
service, and may dictate to varying
degrees the exact structure and format
of the supplier's response. Effective RFPs
typically reflect the strategy and
short/long-term business objectives,
providing detailed insight upon which
suppliers will be able to offer a matching
perspective
Is this a last resort or starting point? When a migration project
is not having enough documentation of the current system,
reverse engineering will determine what system does? It will
not determine what the thing went wrong with the system and
what a system must do?
A critical activity for any ERP implementation is gathering
business requirements
Often we spend too much time and effort focusing on
gathering requirements that do not support key business
results and then gloss over the key business activities because
of implementation time constraints. Prioritizing business
results is an activity that we need to initiate before gather
requirements, not during fit/gap when expectations are
harder to manage and negotiate.
26
Selecting Appropriate Techniques
Interview JAD Question
-naires
Documen
t Analysis
Observati
on
Type of
information
As-is,
improves,
to-be
As-is,
improves,
to-be
As-is,
improves
As-is As-is
Depth of info High High Medium Low Low
Breadth of info Low Medium High High Low
Info integration Low High Low Low Low
User
involvement
Medium High Low Low Low
Cost Medium Low-
medium
Low Low Low-
medium
As-is : understanding current system
Improves: identifies improvements
To-be: developing the new system

Mais conteúdo relacionado

Mais procurados

Requirement elicitation technique “one on one interview“
Requirement elicitation technique “one on one interview“Requirement elicitation technique “one on one interview“
Requirement elicitation technique “one on one interview“maaano786
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitationAbdul Basit
 
Software Development Life Cycle-SDLC
Software Development Life Cycle-SDLCSoftware Development Life Cycle-SDLC
Software Development Life Cycle-SDLCAdeel Rasheed
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software ReviewPhilip Johnson
 
5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad SessionsLizLavaveshkul
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessYolanda Williams
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineeringRa'Fat Al-Msie'deen
 
Lecture7 use case modeling
Lecture7 use case modelingLecture7 use case modeling
Lecture7 use case modelingShahid Riaz
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process ModelAchmad Solichin
 
Software engineering project(srs)!!
Software engineering project(srs)!!Software engineering project(srs)!!
Software engineering project(srs)!!sourav verma
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysisMena M. Eissa
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testingCOEPD HR
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.Xebrio
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality planKittitouch Suteeca
 

Mais procurados (20)

Requirement elicitation technique “one on one interview“
Requirement elicitation technique “one on one interview“Requirement elicitation technique “one on one interview“
Requirement elicitation technique “one on one interview“
 
Gathering requirements
Gathering requirementsGathering requirements
Gathering requirements
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitation
 
Software Development Life Cycle-SDLC
Software Development Life Cycle-SDLCSoftware Development Life Cycle-SDLC
Software Development Life Cycle-SDLC
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitation
 
Software requirements
Software requirementsSoftware requirements
Software requirements
 
acceptance testing
acceptance testingacceptance testing
acceptance testing
 
Introduction to Software Review
Introduction to Software ReviewIntroduction to Software Review
Introduction to Software Review
 
5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
 
Requirements validation - requirements engineering
Requirements validation - requirements engineeringRequirements validation - requirements engineering
Requirements validation - requirements engineering
 
Lecture7 use case modeling
Lecture7 use case modelingLecture7 use case modeling
Lecture7 use case modeling
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
 
Software engineering project(srs)!!
Software engineering project(srs)!!Software engineering project(srs)!!
Software engineering project(srs)!!
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testing
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
 
Srs for project
Srs for projectSrs for project
Srs for project
 

Semelhante a Software Requirement Elicitation Techniques http://www.imran.xyz

Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsSUFYAN SATTAR
 
Requirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data DiscoveryRequirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data DiscoveryJoe Newbert
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniquesimthiyasbtm
 
Facts finding techniques in Database
Facts finding techniques in Database Facts finding techniques in Database
Facts finding techniques in Database Afrasiyab Haider
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation ProcessRajon
 
What is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptxWhat is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptxtadudemise
 
Paper id 28201431
Paper id 28201431Paper id 28201431
Paper id 28201431IJRAT
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).pptWaniHBisen
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial OverviewKumail Raza
 
How To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar SlidesHow To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar SlidesAudrey Perelshtein
 
169960087 j2 ee-project-report
169960087 j2 ee-project-report169960087 j2 ee-project-report
169960087 j2 ee-project-reporthomeworkping8
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXLarry Burks
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooDavid Harmer
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile ProjectsDavid Pedreno
 
Business_analysis_methodologies.pptx
Business_analysis_methodologies.pptxBusiness_analysis_methodologies.pptx
Business_analysis_methodologies.pptxptgo po
 
Chp3 requirments analysis
Chp3 requirments analysisChp3 requirments analysis
Chp3 requirments analysisasmaanawaiseh
 
11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptxZahirahZairul2
 

Semelhante a Software Requirement Elicitation Techniques http://www.imran.xyz (20)

Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
 
Requirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data DiscoveryRequirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data Discovery
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
 
Facts finding techniques in Database
Facts finding techniques in Database Facts finding techniques in Database
Facts finding techniques in Database
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation Process
 
What is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptxWhat is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptx
 
Paper id 28201431
Paper id 28201431Paper id 28201431
Paper id 28201431
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).ppt
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
 
How To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar SlidesHow To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar Slides
 
169960087 j2 ee-project-report
169960087 j2 ee-project-report169960087 j2 ee-project-report
169960087 j2 ee-project-report
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UX
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
 
Agile projects
Agile projectsAgile projects
Agile projects
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
 
Business_analysis_methodologies.pptx
Business_analysis_methodologies.pptxBusiness_analysis_methodologies.pptx
Business_analysis_methodologies.pptx
 
Chp3 requirments analysis
Chp3 requirments analysisChp3 requirments analysis
Chp3 requirments analysis
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx
 

Último

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Último (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

Software Requirement Elicitation Techniques http://www.imran.xyz

  • 1. Requirements elicitation is the practice of collecting the requirements of a system from users, customers and other stakeholders. The practice is also sometimes referred to as requirements gathering. Presented By: Muhammad Imran Hussain Khan 0300-6519990
  • 2. Stakeholder Analysis Brainstorming One On One Interview Group Interview Document Analysis Focus Group Interface Analysis Observation Social Analysis Prototyping
  • 3. Facilitated sessions Joint Application Development (JAD) Questionnaire Survey Use cases and scenarios (UCD) Reused Requirements Request for proposals (RFPs) Reverse Engineering
  • 4. Stakeholder analysis identifies all the users and stakeholders who may influence or be impacted by the system. This helps ensure that the needs of all those involved are taken into account Benefits 1. Ensures that all relevant stakeholders are considered 1. All important stakeholders are captured, and yet that irrelevant actors are not included Drawbacks There is a danger that too much time is spent on identifying roles and relationships, and the team is swamped with data.
  • 5. Basic Rules 1. Start out by clearly stating the objective of the brainstorming session. 2. Generate as may ideas as possible. 3. Let your imagination soar. 4. Do not allow criticism or debate while you are gathering information. 5. Once information is gathered, reshape and combine ideas.
  • 6.
  • 7. The most common technique for gathering requirements is to sit down with the clients and ask them what they need. The discussion should be planned out ahead of time based on the type of requirements you’re looking for • Privacy of everyone • in-depth a stakeholder’s thoughts and get his or her perspective Benefits • Time Consuming • Misunderstandings Risks & Drawbacks
  • 8. If there are more then one person during interview usually 2 or 4 these people must be on some level must be on some level less time required • we can get hidden requirements • uncover a richer set of requirements in a shorter period of time • Uncover ambiguities Benefits • Not relaxed environment • Conflicts • The allotted time have been exhausted Risks & Drawbacks
  • 9. Document Analysis is an important gathering technique. Evaluating the documentation of a present system can assist when making AS-IS process documents and also when driving the gap analysis for scoping of the migration projects. • validating the requirement completeness. • Chunks of information are mostly buried in present documents • A beginning point for documenting all current requirements. Benefits • Time Consuming • Conflicts • Exhausted • Not Found Real Figures Risks & Drawbacks
  • 10. A focus group is actually gathering of people who are customers or users representatives for a product to gain its feedback. The feedback can be collected about opportunities, needs, and problems to determine requirements or it can be collected to refine and validate the already elicited requirements. • Managed process with particular participants • refine and validate the already elicited requirements • Allows analyst to rapidly obtain a wide variety of user views and possibly a consensus. Benefits • following the crowd and some people think that focus groups are at best unproductive • end up with is with least common denominator features. • Recruitment effort to • Assemble groups. Dominant participants may influence group disproportionately Risks & Drawbacks
  • 11. Interface for any software product will either be human or machine. Integration with external devices and systems is another interface. The user centric design approaches are quite effective to ensure that you make usable software. Interface analysis- analyzing the touch points with another external system- is vital to ensure that you do not overlook requirements that are not instantly visible to the users.
  • 12. Social analysis is also known as Observation. Observation is the method of collecting requirements by observing the people doing their normal work. This method is generally used to find the additional requirements needed by the user, when the user is unable to explain their expected requirements from the new product and problems with the existing product • The ability to record and report all findings that are true • it is more practical • no long calculation has to be done Benefits • The viewer's or researcher's own perception • few trials/studies/or objects observed to make an end conclusion • results may contain human error Risks & Drawbacks
  • 13. Prototyping is a relatively modern technique for gathering requirements. In this approach, you gather preliminary requirements that you use to build an initial version of the solution — a prototype. You show this to the client, who then gives you additional requirements. You change the application and cycle around with the client again. This repetitive process continues until the product meets the critical mass of business needs or for an agreed number of iterations. • prototypes can be ideal reduce design risk • it is more practical • Screen mock-ups • Using animation tools • provides an understanding of functionality Benefits • takes time to build • more costly to build • false sense of security Risks & Drawbacks
  • 14. In a facilitated session, you bring a larger group (five or more) together for a common purpose. In this case, you are trying to gather a set of common requirements from the group in a faster manner than if you were to interview each of them separately. • Less Time • Reach Group Of People • Brainstorming sessions (virtual or face-to-face) Benefits • More Expensive • need for extra facilities to allow for group work etc • Handouts, readings Risks & Drawbacks
  • 15. JAD or joint application design, these workshops can be efficient for gathering requirements. The requirements workshops are more organized and structured than a brainstorming session where the involved parties get together to document requirements. Creation of domain model artifacts like activity programs or static diagrams is one of the ways to capture the collaboration. A workshop with two analysts is more effective than one in which on works as a facilitator and the other scribes the work together. • group typically stays in the session until the session objectives are completed • participants stay in session until a complete set of requirements • documented and agreed to Benefits • takes time to build • more costly to build • false sense of security Risks & Drawbacks
  • 16. Questionnaires are much more informal, and they are good tools to gather requirements from stakeholders in remote locations or those who will have only minor input into the overall requirements. Questionnaires can also be used when you have to gather input from dozens, hundreds, or thousands of people. • Less cost • Reach Large No of Peoples • The responses are gathered in a standardized way Benefits • Difficult filling for users • participants may forget important issues • Stockholders may not be willing to answer the questions Risks & Drawbacks
  • 17. When gathering information from many people: to many to interview with time constraints and less budget: a questionnaire survey can be used. The survey insists the users to choose from the given options agree / disagree or rate something. Do not think that you can make a survey on your own but try to add meaningful insight in it. A well designed survey must give qualitative guidance for characterizing the market. It should not be utilized for prioritizing of requirements or features. • Less cost • Reach Large No of Peoples • A detailed critical inspection Benefits • Difficult filling for users • participants may forget important issues • Stockholders may not be willing to answer the questions Risks & Drawbacks
  • 18.
  • 19. Use cases are basically stories that describe how discrete processes work. The stories include people (actors) and describe how the solution works from a user perspective. Use cases may be easier for the users to articulate, although the use cases may need to be distilled later into the more specific detailed requirements. • provide the best return on invested effort • explain how that system will be implemented • Each use case provides a set of scenarios that convey how the system should interact Benefits • Poor identification of structure and flow • Time-consuming to generate • Scenario management is difficult Risks & Drawbacks
  • 20.
  • 21. In the field of software engineering reusing the requirements of the existing system is common method of requirements elicitation. Using the existing knowledge to develop the new product has many advantages that include low cost and less time. Though each product has their own type of stake holders and users, there is still number of situations that the reusing of the requirements take places • Reused requirements are already validated and analyzed thus reducing the time of testing Benefits • Some time proposed product is completely different form the existing product Risks & Drawbacks
  • 22. If you are a vendor, you may receive requirements through an RFP. This list of requirements is there for you to compare against your own capabilities to determine how close a match you are to the client’s needs. The RFP presents preliminary requirements for the commodity or service, and may dictate to varying degrees the exact structure and format of the supplier's response. Effective RFPs typically reflect the strategy and short/long-term business objectives, providing detailed insight upon which suppliers will be able to offer a matching perspective
  • 23. Is this a last resort or starting point? When a migration project is not having enough documentation of the current system, reverse engineering will determine what system does? It will not determine what the thing went wrong with the system and what a system must do? A critical activity for any ERP implementation is gathering business requirements Often we spend too much time and effort focusing on gathering requirements that do not support key business results and then gloss over the key business activities because of implementation time constraints. Prioritizing business results is an activity that we need to initiate before gather requirements, not during fit/gap when expectations are harder to manage and negotiate.
  • 24.
  • 25.
  • 26. 26 Selecting Appropriate Techniques Interview JAD Question -naires Documen t Analysis Observati on Type of information As-is, improves, to-be As-is, improves, to-be As-is, improves As-is As-is Depth of info High High Medium Low Low Breadth of info Low Medium High High Low Info integration Low High Low Low Low User involvement Medium High Low Low Low Cost Medium Low- medium Low Low Low- medium As-is : understanding current system Improves: identifies improvements To-be: developing the new system