Search results

1 – 10 of over 1000
Article
Publication date: 16 November 2010

Hakim Bendjenna, Nacer‐eddine Zarour and Pierre‐Jean Charrel

The requirements engineering (RE) process constitutes the earliest phase of the information system development life cycle. Requirements elicitation is considered as one of the…

Abstract

Purpose

The requirements engineering (RE) process constitutes the earliest phase of the information system development life cycle. Requirements elicitation is considered as one of the most critical activities of this phase. Moreover, requirements elicitation is still a challenge, especially in the distributed environment of so‐called inter‐company cooperative information systems (ICISs). The purpose of this paper is to propose a methodology to elicit requirements for an ICIS.

Design/methodology/approach

An analytical research approach was conducted. The current RE approaches, which are based either on goal, scenario or viewpoint were evaluated. Then the role of the elicitation technique selection step within the requirements elicitation process was examined. Finally the factors that affect this step in a distributed environment were studied. An example from the textile industry is used to illustrate the applicability of the proposed methodology.

Findings

Though existing requirements elicitation approaches based either on goal, scenario or viewpoint are effective techniques, they do not fit exactly to a cooperative distributed environment: more issues are created by inadequate communication, time difference between sites, cultural, language and characteristics diversity of stakeholders which affect the elicitation technique selection step and thus the requirements elicitation process. In order to tackle these issues, this paper presents a methodology called MAMIE (from Macro‐ to Micro‐level requirements Elicitation) to elicit requirements for an ICIS. A prototype tool has been developed to support the operation of the methodology.

Research limitations/implications

The major limitation of the paper is that has not yet been tested in an existing organization.

Practical implications

To provide the analyst with well‐defined steps in order to elicit requirements of an ICIS. To understand the role of the elicitation technique selection step within the requirements elicitation process and identifying the factors which have an impact on this step. To select an appropriate elicitation technique according to these factors.

Originality/value

MAMIE integrates the three notions of goal, scenario and viewpoint to elicit requirements for an ICIS. The paper argues that these concepts may be used simultaneously and in a complementary way to improve the requirements elicitation process. Moreover, in order to increase the quality of the elicited requirements and thus the quality of the system‐to‐be, selecting an elicitation technique in MAMIE is not based on personal preferences but on situation assessment.

Details

Journal of Systems and Information Technology, vol. 12 no. 4
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 12 March 2018

Aslina Saad and Christian Dawson

This paper presents a recommendation on how one requirement elicitation technique supports the other techniques in defining system requirement for a case-based system. A…

Abstract

Purpose

This paper presents a recommendation on how one requirement elicitation technique supports the other techniques in defining system requirement for a case-based system. A case-based lesson planning system aims to assist teachers in constructing quality lesson plans through its cycle which begins with case retrieval. To retrieve relevant lesson plans, appropriate inputs should be used and the intended output needs to be identified via suitable requirement elicitation techniques. The use of a single technique might result in inadequate requirement specification, thus affecting the quality of the output requirements as well as quality of the final information system.

Design/methodology/approach

Requirement elicitation was carried out in three phases: phase I involved document review, phase II was an interview and phase III used a survey. Respondents of the study comprised experienced teachers as well as new teachers. This research used both qualitative and quantitative approaches to answer the research questions, which involved semi-structured interviews, document review and survey to collect the relevant data. Documents were reviewed by analysing lesson plans from three different countries. In addition, a review of lesson plans prepared by teachers and the standard syllabus were carried out. Findings from the document review were used in structured interviews using a teach-back technique, sorting and matrix of attribute-values. A questionnaire was then constructed based on the interviews and document review.

Findings

The findings of this initial study, as part of a larger research investigation, would help in knowledge modelling and representation. This will contribute to effective case retrieval via good design of the system input and output. The study identifies important elements of a lesson plan according to their ranking. Keywords that were used by teachers as input for retrieval were identified together with the expected output.

Research limitations/implications

The main goal of requirement elicitation is to specify complete and detailed requirements of the proposed system. There are two main types of requirement: functional and non-functional requirements. This paper only focuses on functional requirements – specifically case retrieval with appropriate input and output.

Practical implications

Various requirement engineering (RE) techniques can be applied in different phases of requirement elicitation. Suitable technique should be chosen at different phases of RE, as it is important for triangulation purposes. Incomplete RE will affect the modelling part of system development, and, thus, affect the design and implementation of an information system.

Social implications

Software engineer or anybody involved in system development should plan accordingly for the RE process. They should be creative and reasonable in selecting suitable RE techniques to be applied.

Originality/value

This study aims to gain understanding of the various aspects of lesson planning. Crucial knowledge in lesson planning that was gathered from the elicitation phase is modelled to have a good understanding of the problems and constraints among teachers. The findings of this initial study, as part of a larger research investigation, would help in knowledge modelling and representation. This will contribute to effective case retrieval via a good design of the system input and output.

Details

Journal of Systems and Information Technology, vol. 20 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 17 July 2009

Kamel Rouibah and Sulaiman Al‐Rafee

The purpose of this paper is to investigate the perceptions of 19 requirement engineering (RE) techniques in Kuwait in term of three criteria “awareness,” “use,” and “perceived…

1861

Abstract

Purpose

The purpose of this paper is to investigate the perceptions of 19 requirement engineering (RE) techniques in Kuwait in term of three criteria “awareness,” “use,” and “perceived value generated over past system development projects.” Also, this paper aims to examine possible relationships between these RE techniques and two information system development success factors.

Design/methodology/approach

This paper develops a questionnaire and tests with a sample of respondents from 175 organizations in Kuwait.

Findings

Results show that: Arab culture influence perception of RE techniques; most companies have good knowledge of different techniques; several different techniques for identifying and analyzing customer requirements are used; the most highly valued RE techniques are decision trees, goal oriented, prototyping, data flow diagram (DFD), and interviews; six techniques (tree analysis, role playing, unified modeling language, Kawakita Jiro method, flow charts, and Ishikawa) are found to have the least perceived value; and only two techniques (prototyping and decision tree) are highly correlated with the statement “Obtaining the right requirements is a critical success factor for system development,” while other three techniques (quality function deployment, DFD and role playing) are correlated with “We experienced problems during past system developments projects because of wrong requirements collection.”

Research limitations/implications

The study sheds light on perceptions on RE techniques perception in Kuwait where less is known about the subject from Western researchers.

Practical implications

This paper suggests re‐examining university curriculums in order to prepare students for familiarity with techniques that have proven their effectiveness elsewhere and call for more collaboration between academia and practitioners in order to appropriate research outcomes. In addition, this paper is of benefit to foreign consulting companies willing to penetrate the Gulf Cooperative Council.

Originality/value

This is the first Arab study that sheds light on system development practices in the Arab world.

Details

Information Management & Computer Security, vol. 17 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 2003

Heng‐Li Yang and Jih‐Hsin Tang

Although requirement elicitation is generally acknowledged to be very important in traditional information systems development (ISD), it does not get enough attention in most…

2467

Abstract

Although requirement elicitation is generally acknowledged to be very important in traditional information systems development (ISD), it does not get enough attention in most Web‐based information systems development (WISD). This paper highlighted the difference between ISD and WISD, and proposed a three‐stage model of user requirements elicitation for Web‐based information systems. This model divides the requirements definition into three stages: initial analysis, key user requirements elicitation and regular user responses. Most current WIS design methodologies consider only initial analysis, and neglect actual users’ requirements. Key user input is emphasized in this model, and social network analysis is proposed as a tool for identifying key users. Requirements analysis for WISD is no longer considered a one‐stop step, but is better regarded as a continuous evolving process. Finally, managerial implications are also provided in this paper.

Details

Industrial Management & Data Systems, vol. 103 no. 6
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 4 January 2008

Mariele Evers

The purpose of this paper is to review the crucial elements of integrated river basin management (IRBM) and their legal frameworks which have to be considered in a comprehensive…

1390

Abstract

Purpose

The purpose of this paper is to review the crucial elements of integrated river basin management (IRBM) and their legal frameworks which have to be considered in a comprehensive management approach. A wide range of decision support systems (DSS) have been developed for IRBM‐related fields during the last few decades. However, most of the developed systems are either not used in practice or are used by people other than those they were designed for. The paper also discusses whether DSS are useful for IRBM and presents the requirements which have to be considered in the development of IRBM‐DSS.

Design/methodology/approach

Beside literature research, a variety of requirement elicitation techniques such as interviews, buzz groups, questionnaire and prototype evaluation were employed. Feedback from roughly 200 experts representing different work fields and river basins in Central and Western Europe was collected.

Findings

Different legal frameworks of IRBM fields were analysed with a view to determining whether they can be applied in a comprehensive approach. Broad elicitations affirm that DSS can assist in various phases of planning and management processes. Some general requirements of DSS for IRBM can be identified which should be considered in DSS development. DSS can be described as socio‐technical instruments and “communication vehicles” because of their multiple roles in participation processes.

Practical implications

The paper illustrates different elicitation techniques used to specify what users require of DSS. Furthermore, it describes some essential requirements for DSS development such as the main added value, key functionalities and factors for successful implementation.

Originality/value

The described results are based on my own studies and elicitations which have been conducted in the course of the past two years.

Details

Management of Environmental Quality: An International Journal, vol. 19 no. 1
Type: Research Article
ISSN: 1477-7835

Keywords

Article
Publication date: 20 December 2021

Youseef Alotaibi and Ahmad F. Subahi

This paper aims to introduce the goal-oriented requirements extraction approach (GOREA). It is an elicitation approach that uses, specifically, healthcare business goals to derive…

Abstract

Purpose

This paper aims to introduce the goal-oriented requirements extraction approach (GOREA). It is an elicitation approach that uses, specifically, healthcare business goals to derive the requirements of e-health system to be developed.

Design/methodology/approach

GOREA consists of two major phases: (1) modelling e-health business requirements phase and (2) modelling e-health information technology (IT) and systems requirements phase. The modelling e-health business requirements phase is divided into two main stages: (1) model e-health business strategy stage and (2) model e-health business environment stage. The modelling e-health IT and systems requirements phase illustrates the process of obtaining requirements of e-health system from the organizational goals that are determined in the previous phase. It consists of four main steps that deal with business goals of e-health system: (1) modelling e-health business process (BP) step; (2) modelling e-health business goals step; (3) analysing e-health business goals step; and (4) eliciting e-health system requirements step. A case study based on the basic operations and services in hospital emergency unit for checking patient against COVID-19 virus and taking its diagnostic testing has been set and used to examine the validity of the proposed approach by achieving the conformance of the developed system to the business goals.

Findings

The results indicate that (1) the proposed GOREA has a positive influence on the system implementation according to e-health business expectations; and (2) it can successfully fulfil the need of e-health business in order to save the citizens life by checking them against COVID-19 virus.

Research limitations/implications

The proposed approach has some limitations. For example, it is only validated using one e-health business goal and thus it has to be authenticated with different e-health business goals in order to address different e-health problems.

Originality/value

Many e-health projects and innovations are not established based on robust system requirements engineering phase. In order to ensure the success delivery of e-health services, all characteristics of e-health systems and applications must be understood in terms of technological perspectives as well as the all system requirements.

Details

Business Process Management Journal, vol. 28 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 8 October 2018

Simon N. Foley and Vivien Rooney

In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit…

Abstract

Purpose

In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit their security needs.

Design/methodology/approach

Recognizing that the codes uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed and machine learning is used to build a Bayesian network-based policy from the subsequent (grounded theory) analysis of the interview data.

Findings

Using a running example – based on a social psychology research study centered around photograph sharing – the paper demonstrates that in principle, qualitative research techniques can be used in a systematic manner to elicit security policy requirements.

Originality/value

While in principle qualitative research techniques can be used to elicit user requirements, the originality of this paper is a systematic methodology and its mapping into what is actionable, that is, providing a means to generate a machine-interpretable security policy at the end of the elicitation process.

Details

Information & Computer Security, vol. 26 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 March 2013

Anthony S. White

Many project failures can be attributed to changes in requirements as the project progresses. The purpose of this paper is to review several system dynamics models of the…

Abstract

Purpose

Many project failures can be attributed to changes in requirements as the project progresses. The purpose of this paper is to review several system dynamics models of the requirements process from the literature, especially the model of Andersson and Karlsson. This model addresses the deficiencies in the system dynamics model devised hitherto to create a model than can be used to predict requirements acquisition and staff resources for different levels of project complexity and size.

Design/methodology/approach

A new control‐theoretic model of requirements gathering is devised using the Software Test Model of Cangussu as a framework. Conventional control system techniques are then used to compute typical responses.

Findings

The results agree with the limited published data. This model can be used to predict an estimate of the possible number of requirements that could be devised for the project. It allows the incorporation of workforce, quality and complexity information to predict the time to complete the requirements process. This model is then used to predict how the requirements process responds to requirements creep and to changes in workforce used.

Research limitations/implications

This model is theoretical and is proposed so that it can be simple tested. It makes a number of assumptions not yet recorded by industry that would have to be obtained.

Practical implications

If it is supported by experimental data then a better project development model can be created with the prospect of greater control of project development.

Originality/value

This work, although based on the work of Cangussu et al., is devised by the author.

Article
Publication date: 18 May 2020

Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni and Beatriz Gallego-Nicasio Crespo

General data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data…

1029

Abstract

Purpose

General data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform.

Design/methodology/approach

The platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors.

Findings

The findings provide the process for the DEFeND platform requirementselicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements.

Practical implications

The proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry.

Social implications

It is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives.

Originality/value

This is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 August 2019

Sobeida Margarita Giraldo, Luis Joyanes Aguilar, Lillyana María Giraldo and Iván Darío Toro

This paper aims to explore the requirements of organizational knowledge management initiatives using requirements engineering techniques, identifying the optimal techniques…

1186

Abstract

Purpose

This paper aims to explore the requirements of organizational knowledge management initiatives using requirements engineering techniques, identifying the optimal techniques configuration and serving as a management tool for knowledge engineers.

Design/methodology/approach

The method is selection attributes. Knowledge management enablers are characterized and mapped with the coverage capabilities of requirements engineering techniques, using the attributes of the elicited object and a box-plot analysis. The information is gathered from 280 references, 32 companies and 16 experts in requirements engineering.

Findings

Requirements of organizational knowledge management initiatives are got optimally by combining interviews, use cases, scenarios, laddering and focus group techniques. The requirements of structure and processes are more complex to identify, while culture requirements are the best covered.

Research limitations/implications

Knowledge management enablers are analyzed according to the current studies and comprehension of engineering techniques.

Practical implications

Knowledge engineers need to consider the coverage capabilities of engineering techniques to design an optimal requirement identification and meet the objectives of organizational knowledge acquisition initiatives. Requirement engineers can improve the requirements identification by a staged selection process.

Social implications

The requirements of knowledge management initiatives that impact the community can be identified and traced to ensure the knowledge objectives. Requirements related to culture and people, like shared values, beliefs, and behaviors, are also considered.

Originality/value

To the best of the authors’ knowledge, this is the first study about formal requirement identification of knowledge management initiatives in the organizational context, providing the optimal configuration. A novel staged process is proposed for requirements engineering techniques selection, analyzing the enablers at component level and identifying the attributes associated with the elicited object.

Details

Journal of Knowledge Management, vol. 23 no. 7
Type: Research Article
ISSN: 1367-3270

Keywords

1 – 10 of over 1000