Requirements elicitation techniques: a systematic literature review based on the maturity of the techniques

被引:68
|
作者
Pacheco, Carla [1 ]
Garcia, Ivan [1 ]
Reyes, Miryam [1 ]
机构
[1] Univ Tecnol Mixteca, Div Estudios Posgrad, Carretera Acatlima Km 2-5, Huajuapan De Leon, Oaxaca, Mexico
关键词
systems analysis; formal specification; formal verification; requirements engineering process; software requirements; requirements elicitation; USER REQUIREMENTS; DOMAIN KNOWLEDGE; ONTOLOGY; COLLABORATION; EXPERIENCES; QUALITY; PARTICIPATION; DISCOVERY; SCENARIOS; EDUCATION;
D O I
10.1049/iet-sen.2017.0144
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Requirements elicitation is a critical activity that forms part of the requirements engineering process because it has to discover what the software must do through a solid understanding of the wishes and needs of the various stakeholders and to transform them into software requirements. However, in spite of its relevance, there are only a few systematic literature reviews that provide scientific evidence about the effectiveness of the techniques used to elicit software requirements. This study presents a systematic review of relevant literature on requirements elicitation techniques, from 1993 to 2015, by addressing two research questions: Which mature techniques are currently used for eliciting software requirements? and Which mature techniques improve the elicitation effectiveness? Prior literature assumes that such maturity' leads to a better-quality understanding of stakeholders' desires and needs, and thus an increased likelihood that a resulting software will satisfy those requirements. This research paper found 140 studies to answer these questions. The findings describe which elicitation techniques are effective and in which situations they work best, taking into account the product which must be developed, the stakeholders' characteristics, the type of information obtained, among other factors.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [31] Requirements elicitation with indirect knowledge elicitation techniques: Comparison of three methods
    Hudlicka, E
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, 1996, : 4 - 11
  • [32] Spam Review Detection Techniques: A Systematic Literature Review
    Hussain, Naveed
    Mirza, Hamid Turab
    Rasool, Ghulam
    Hussain, Ibrar
    Kaleem, Mohammad
    APPLIED SCIENCES-BASEL, 2019, 9 (05):
  • [33] Phishing Classification Techniques: A Systematic Literature Review
    Abdillah, Rahmad
    Shukur, Zarina
    Mohd, Masnizah
    Murah, Ts. Mohd Zamri
    IEEE Access, 2022, 10 : 41574 - 41591
  • [34] Phishing Classification Techniques: A Systematic Literature Review
    Abdillah, Rahmad
    Shukur, Zarina
    Mohd, Masnizah
    Murah, Ts Mohd Zamri
    IEEE ACCESS, 2022, 10 : 41574 - 41591
  • [35] A Systematic Study on Software Requirements Elicitation Techniques and Its Challenges in Mobile Application Development
    Dar, Hafsa
    Lali, M. Ikramullah
    Ashraf, Humaira
    Ramzan, Muhammad
    Amjad, Tehmina
    Shahzad, Basit
    IEEE ACCESS, 2018, 6 : 63859 - 63867
  • [36] Dengue models based on machine learning techniques: A systematic literature review
    Hoyos, William
    Aguilar, Jose
    Toro, Mauricio
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2021, 119
  • [37] Framework for matching requirements elicitation techniques to project characteristics
    Tsumaki, Toshihiko
    Tamai, Tetsuo
    Software Process Improvement and Practice, 2006, 11 (05): : 505 - 519
  • [38] Requirements Elicitation Techniques and Tools in the Context of Artificial Intelligence
    de Sousa Silva, Andre Filipe
    Sousa Silva, Geovana Ramos
    Canedo, Edna Dias
    INTELLIGENT SYSTEMS, PT I, 2022, 13653 : 15 - 29
  • [39] A review of Requirement Elicitation techniques in OSSD
    Saeed, Shehla
    Fatima, Umbreen
    Iqbal, Faiza
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 86 - 92
  • [40] Intelligent Requirements Elicitation and Modeling: A Literature Review
    Wang Y.
    Chen J.
    Xia X.
    Jiang B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 683 - 705