SlideShare a Scribd company logo
1 of 5
Download to read offline
Common pitfalls and preventive measures to keep in view during the
requirement development phase to ensure delivery of a solution that
meets customer needs and delivers better ROI.
Requirement Elicitation: Common
Pitfalls and Preventive Measures
View Point
2Maveric Systems
Executive Summary
The process of requirement elicitation is straight forward. The business analyst interviews the identified
stakeholders, identifies and defines the tasks, and documents the same in detail. Is it all really that simple and
straight forward? Or there is more that goes into this crucial and foremost phase of requirement engineering?
Missing or ambiguous requirements not only lead to delayed projects and budget overruns but also the loss of
business and brand image. This paper aims to present some of the common pitfalls and preventive measures that
can be taken during requirement elicitation.
Requirement Elicitation – Common Pitfalls and Preventive Measures
Introduction
The toughest part in building a software application is not to build it but to decide what to build. This decision is
solely made on the identified and agreed upon requirements. Requirements define the must have, should have and
the nice-to have capabilities (functional) and behaviour (non-functional).
Business analysts are often expected to participate in the process of building applications much before the actual
process starts. Their role begins at the very first level of change/need/opportunity management where the initial
business requirement is identified and defined using various tools and techniques. The quantum and nature of
requirements may be small or large and transformational, the role of business analyst remains ever evolving.
Requirements Engineering
Requirements engineering plays a vital and crucial role in ensuring the overall success of software engineering.
Requirements engineering is a process that involves identifying stakeholder needs and documenting them for
analysis, communication and management of requirements. It can further be decomposed into elicitation,
specification and validation. Most of the times these activities may be considered to be sequential they are rather
iterative with the said activities being visited and revisited multiple times.
Many problems in a system creation can be tracked back to requirement elicitation thus making it an important to
project phase. The same has been proved time and again which has resulted to development of tools and
techniques in order to mitigate the pitfalls as much as possible. There cannot be a fool proof way of covering 100%
requirements but domain knowledge, BA skills in general and requirements management in particular and its
implementation can reduce the gaps to minimum.
1. Requirements Elicitation – Foundation of requirements engineering: Definition: Very often requirement
elicitation is interchangeably used as requirement gathering. Requirements gathering generally is considered
document analysis and a subset of elicitation. Requirement elicitation is the first phase (post pre-planning
sessions) of a software development project. It is in this phase that the business analyst is expected to figure
out what the client wants and the delivery of these wants is generally used to define the success of the
implemented product.
In a practical world, requirements evolve at an uneven pace and tend to generate further requirements from
the earlier definition thus proving to be non-terminating at times. Therefore requirements is iterative in nature
and elicitation non-separable from the subsequent activities.
2. Activities Involved: Requirement elicitation can be further broken down into the activities of fact-finding,
information gathering, and integration. Rzepka further decomposes the elicitation process as follows [Rzepka
89]:
 Identify the relevant stakeholders that shall be the consumer of requirements at any point or in any form.
End users, an interfacing systems, or environmental factors any of these could be the stakeholders in
consideration
 Gather the “wish list” (however ambiguous, incomplete or infeasible) for each stakeholder
 Document and refine the “wish list”. The list includes all important activities and data (typically high level,
domain specific and in user specific terms), and is repeatedly refined till self-consistent
3Maveric SystemsRequirement Elicitation – Common Pitfalls and Preventive Measures
 Integrate the wish lists across the various stakeholders, ensuring that they all fall within feasibility limits,
consistency is maintained throughout and conflicts, if any are resolved
 Determine the non-functional requirements, such as performance, environment, parameters and reliability
issues and mention these in the requirements document
The resultant from the eliciting phase is a subset of goals from various stakeholders. It is this set that the other
requirements engineering processes consider for validation to verify if this is what actually the sponsor and user
actually intended.
3. Techniques Used: Below are some of the common requirement elicitation techniques
 Requirement Workshops: Involves gathering with previously identified stakeholders in a structured setting
for a defined amount of time in order to elicit, refine, and/or edit requirements
 Document Analysis: In the absence of an SME, the existing documentation help to gather relevant
information
 Brainstorming: Involves multiple stakeholders at the same time and produces various ideas within the set
time frame
 Observation: Also known as Job Shadow, is studying a stakeholder work environment
4. Components of Requirement Elicitation: Requirement elicitation is composed of the following four
components. One has to be mindful of pitfalls from these components
 Domain: This deals with the knowledge of area where the system is applied. E.g., Core Banking
 Issue in consideration: This deals with the exact customer problem that needs to be dealt with
 Business context: Is the interaction of different systems and how they contribute to the resolution of the
overall problem statement
 Stakeholder needs and constraints: Involves identifying various stakeholders, their expectation from the
solution, their exact needs and constraints
Common Pitfalls in Requirement Elicitation
A good requirements elicitation process supports the development of a specification that is clear, complete, correct
and traceable. Lack of any of these requirements quality parameters is due to problems of requirements elicitation
covering:
 Scope: Wherein details of requirements are insufficient or too much information
 Comprehension: Within groups as well as between groups such as users, developers and testers
 Volatility: Frequent changes to requirements
REQUIREMENT ELICITATION – COMPONENTS AND PITFALLS
Application Domain
Issues in
Consideration
Business Context
Stakeholder Needs
and Constraints
 Focus on solution
and not requirement
 Scope creep  Lack of
communication of
standard project
terminologies
 Overwhelming trust
on process
 Missing to know
relevant
stakeholders
 Stakeholder knows
better approach
Figure 1
4Maveric Systems
1. Focus on Solution and Not Requirement: Eliciting techniques can be over ambitious at times and results in
influence of a preconceived solution while eliciting requirements. Very often the business requirement
document (BRD) is seen to include solution requirement sections such as documentation, training etc. How can
you know the solution even before you know what you need? Past solutioning experiences or other business
motives often tend to bias the analysts towards steering the conversation in a particular direction that might
indicate usage/ preference of a particular product over other. This not only hinders the identification of real
business need but also create trust issues with stakeholders.
2. Scope Creep: Requirement elicitation is iterative process. At each iteration it is necessary to consider if the
current version of iteration delivers and fulfils customer needs. This needs to be visited and revisited till the
same meets customer needs. Most of the times this leads to scope creep that further results in delivering much
more than what was initially agreed.
A business analyst is expected to differentiate between must have, should have and nice-to have requirements.
While the must haves and should haves should never be compromised and ideal point of stopping the iterations
is when they further lead only to nice-to have requirements.
3. Lack of Communication of Standard project terminologies: Different business units may have different
terminologies being used in their day to day business. Most of the times this can create ambiguities and more
so gaps between the customer expectations and what is actually delivered. Most of the times one misses to
establish standard terminologies to avoid confusion. Defining all the terminology that will be used by the team,
and making it available in a project glossary, will help prevent this problem and minimize the pitfalls involved
Requirement Elicitation – Common Pitfalls and Preventive Measures
Figure 2
4. Overwhelming trust on Processes: Requirement elicitation is more of an art rather than being a science. The
standard tools, templates and matrices are to aid. Most of the times, business analysts stick to these visible
standard tools and forget the importance of the invisible soft skills. Requirement elicitation may be looked upon
as an iceberg with merely 20% of it being visible and the rest being invisible. The key to unveil the rest is
experience
5. Missing to know relevant stakeholders: While this may seem to be the easiest and obvious of all but it still
constitutes the biggest mistake of all. Although stakeholder analysis is one of the first activities that a business
analyst is usually expected to complete upon being assigned to a project this is not a one-time exercise.
The same needs to be done across the project timeframe since roles and responsibilities often evolve as the
project progresses. Not knowing the stakeholders, the impact of systems on them and their limitations are sure
call for trouble
ABOUT MAVERIC
Started in 2000, Maveric Systems is a leading provider of IT Lifecycle Assurance with expertise across
requirements to release. With a strong focus on the Banking and Telecom sectors, Maveric has built a business on
the principles of deep domain expertise and innovation. Maveric’s client portfolio includes a wide array of
renowned banks, financial institutions, insurance companies, leading software product companies and telecom
companies.
Maveric Systems Limited (Corporate Office): “Lords Tower” Block 1, 2nd Floor, Plot No 1&2 NP, Jawaharlal Nehru
Road, Thiru Vi Ka Industrial Estate, Ekkatuthangal, Chennai 600032
India | Singapore | Saudi Arabia | UAE | UK | USA
Write to us at info@maveric-systems.com | www.maveric-systems.com
6. Stakeholder knows better approach: Biggest mistake that one can make is assuming that the stakeholders
know what they need and they know it better. Often this thought process serves as a mental block and
prevents the analyst from further asking questions. The result is a compromised project since stakeholder
wants and desires are mistaken to be the required solution.
Thus getting to learn the systems from stakeholders might sometimes prove to be risky given that most of the
times each stakeholder is not aware of the acceptable standards and what really goes into the making.
The best way to avoid the involved pitfall is to approach the stakeholders and keep asking the right questions till
such the problem statement is arrived. Unlearn and re-learn each time you go to a different stakeholder. The
intersection of all the sessions and document analysis shall help to reach at what the customer really needs.
Conclusion
Business requirements describe why the organisation is implementing a system and the business benefits the
organisation hopes to realize. The hardest single part of building a software system is deciding precisely what to
build. No other part of the work so cripples the resulting system if done wrong. No other part is more difficult to
rectify later1.
It requires an iterative and interactive approach to ensure that customer needs are met. A structured requirement
elicitation process ensures keeping the stakeholders involved, accountable and in good rapport with the business
analyst.
References
http://www.batimes.com/articles/the-top-8-mistakes-in-requirements-elicitation.html
https://www.site.uottawa.ca/~bochmann/SEG3101/Notes/SEG3101-ch2-2%20-%20IntroductionToElicitation.pdf
http://www.iai.uni-bonn.de/III/lehre/vorlesungen/SWT/RE05/slides/05_Requirements%20Elicitation%201-2.pdf
About the Author
Namita is an Associate Consultant working with Requirements Assurance Practice at Maveric Systems. Former
banker and a management student, she has worked in engagements with banks. Namita has more than 6 years of
experience in client facing roles. She has worked in both waterfall and agile SDLC models across requirement
engineering, use case modelling and engineering of test scenarios.
1 Brooks, F, 1987: No Silver Bullet : Essence and Accidents of Software Engineering

More Related Content

What's hot

5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad SessionsLizLavaveshkul
 
Requirements elicitation techniques
Requirements elicitation techniquesRequirements elicitation techniques
Requirements elicitation techniquesTeniola Alimi
 
Software Requirements Elicitation Methods
Software Requirements Elicitation MethodsSoftware Requirements Elicitation Methods
Software Requirements Elicitation Methodsmnaeem22
 
Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsSUFYAN SATTAR
 
Benefiting from a Quality Problem Management Program
Benefiting from a Quality Problem Management ProgramBenefiting from a Quality Problem Management Program
Benefiting from a Quality Problem Management ProgramHDI Orange County
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzImran Hussain Khan
 
Introspection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation TechniqueIntrospection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation TechniqueFahad Farooq
 
Requirements Elicitation Techniques
Requirements Elicitation Techniques  Requirements Elicitation Techniques
Requirements Elicitation Techniques JaveriaAslam10
 
Planning for and assessing an itsm program
Planning for and assessing an itsm programPlanning for and assessing an itsm program
Planning for and assessing an itsm programTroy DuMoulin
 
BABOK V3.0 Business Analysis Models
BABOK V3.0 Business Analysis ModelsBABOK V3.0 Business Analysis Models
BABOK V3.0 Business Analysis Modelsamorshed
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitationvivacemente
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC MethodologiesRavikanth-BA
 
Requirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationRequirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationMohamed Shaaban
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6koolkampus
 
Presentation by parag saha
Presentation by parag sahaPresentation by parag saha
Presentation by parag sahaPMI_IREP_TP
 
JAD - Joint Applications Development
JAD - Joint Applications DevelopmentJAD - Joint Applications Development
JAD - Joint Applications DevelopmentJohn Crosby
 

What's hot (20)

5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions5 Steps To Effective Jad Sessions
5 Steps To Effective Jad Sessions
 
Requirements elicitation techniques
Requirements elicitation techniquesRequirements elicitation techniques
Requirements elicitation techniques
 
Software Requirements Elicitation Methods
Software Requirements Elicitation MethodsSoftware Requirements Elicitation Methods
Software Requirements Elicitation Methods
 
Business Requirement Document
Business Requirement DocumentBusiness Requirement Document
Business Requirement Document
 
OOAD and UML
OOAD and UMLOOAD and UML
OOAD and UML
 
Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
 
Benefiting from a Quality Problem Management Program
Benefiting from a Quality Problem Management ProgramBenefiting from a Quality Problem Management Program
Benefiting from a Quality Problem Management Program
 
Requirements Elicitation
Requirements ElicitationRequirements Elicitation
Requirements Elicitation
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyz
 
Introspection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation TechniqueIntrospection. Software Requirement Elicitation Technique
Introspection. Software Requirement Elicitation Technique
 
Requirements Elicitation Techniques
Requirements Elicitation Techniques  Requirements Elicitation Techniques
Requirements Elicitation Techniques
 
Planning for and assessing an itsm program
Planning for and assessing an itsm programPlanning for and assessing an itsm program
Planning for and assessing an itsm program
 
BABOK V3.0 Business Analysis Models
BABOK V3.0 Business Analysis ModelsBABOK V3.0 Business Analysis Models
BABOK V3.0 Business Analysis Models
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC Methodologies
 
Requirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and ElicitationRequirements Management Part 1 - Management and Elicitation
Requirements Management Part 1 - Management and Elicitation
 
Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6Requirements Engineering Processes in Software Engineering SE6
Requirements Engineering Processes in Software Engineering SE6
 
Presentation by parag saha
Presentation by parag sahaPresentation by parag saha
Presentation by parag saha
 
JAD - Joint Applications Development
JAD - Joint Applications DevelopmentJAD - Joint Applications Development
JAD - Joint Applications Development
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Similar to Requirement elicitation

Chapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraChapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraKriza Matro
 
Business analyst interview questions and answers
Business analyst interview questions and answersBusiness analyst interview questions and answers
Business analyst interview questions and answersRobin G
 
Software Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summarySoftware Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summaryAhmed Kamel Taha
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development Mark Opanasiuk
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation ProcessRajon
 
Agile project management and normative
Agile project management and normativeAgile project management and normative
Agile project management and normativeGlen Alleman
 
Agile Project Methodology.pptx
Agile Project Methodology.pptxAgile Project Methodology.pptx
Agile Project Methodology.pptxAnandPrasad84
 
Software Engineering.pptx
Software Engineering.pptxSoftware Engineering.pptx
Software Engineering.pptxDevarsh14
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
System Level Requirements Gathering
System Level Requirements GatheringSystem Level Requirements Gathering
System Level Requirements GatheringComputing Cage
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationVishal Singh
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needshunni123
 
Discover Requirement
Discover RequirementDiscover Requirement
Discover Requirementzeyadtarek13
 
Enterprise Software Implementation
Enterprise Software ImplementationEnterprise Software Implementation
Enterprise Software Implementationbrh184
 
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxThe Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxtodd241
 

Similar to Requirement elicitation (20)

Cbap babok ppt day 1 bapm ea
Cbap babok ppt day 1   bapm eaCbap babok ppt day 1   bapm ea
Cbap babok ppt day 1 bapm ea
 
Chapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraChapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by Cabrera
 
Business analyst interview questions and answers
Business analyst interview questions and answersBusiness analyst interview questions and answers
Business analyst interview questions and answers
 
Software Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summarySoftware Requirements (3rd Edition) summary
Software Requirements (3rd Edition) summary
 
Business Requirements development
Business Requirements development Business Requirements development
Business Requirements development
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation Process
 
Agile project management and normative
Agile project management and normativeAgile project management and normative
Agile project management and normative
 
Agile Project Methodology.pptx
Agile Project Methodology.pptxAgile Project Methodology.pptx
Agile Project Methodology.pptx
 
Software Engineering.pptx
Software Engineering.pptxSoftware Engineering.pptx
Software Engineering.pptx
 
Unit 2
Unit 2Unit 2
Unit 2
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
System Level Requirements Gathering
System Level Requirements GatheringSystem Level Requirements Gathering
System Level Requirements Gathering
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Discover Requirement
Discover RequirementDiscover Requirement
Discover Requirement
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
 
Enterprise Software Implementation
Enterprise Software ImplementationEnterprise Software Implementation
Enterprise Software Implementation
 
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxThe Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
 

More from drishtipuro1234

T24 Core Banking: Benefits
T24 Core Banking: BenefitsT24 Core Banking: Benefits
T24 Core Banking: Benefitsdrishtipuro1234
 
Digital Transformation in Banking Financial Services Industry
Digital Transformation in Banking Financial Services IndustryDigital Transformation in Banking Financial Services Industry
Digital Transformation in Banking Financial Services Industrydrishtipuro1234
 
Banking Transformations Setting up for Failure
Banking Transformations Setting up for FailureBanking Transformations Setting up for Failure
Banking Transformations Setting up for Failuredrishtipuro1234
 
Islamic Asset Management A new Iceberg
Islamic Asset Management A new IcebergIslamic Asset Management A new Iceberg
Islamic Asset Management A new Icebergdrishtipuro1234
 
Anti Money Laundering AML Market Dynamics Technology Challenges Spanish
Anti Money Laundering AML Market Dynamics Technology Challenges SpanishAnti Money Laundering AML Market Dynamics Technology Challenges Spanish
Anti Money Laundering AML Market Dynamics Technology Challenges Spanishdrishtipuro1234
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Controldrishtipuro1234
 
Challenges in New Age Banking
Challenges in New Age BankingChallenges in New Age Banking
Challenges in New Age Bankingdrishtipuro1234
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance servicesdrishtipuro1234
 
Platforms offered by maveric systems
Platforms offered by maveric systemsPlatforms offered by maveric systems
Platforms offered by maveric systemsdrishtipuro1234
 
Software testing solutions
Software testing solutionsSoftware testing solutions
Software testing solutionsdrishtipuro1234
 

More from drishtipuro1234 (12)

T24 Core Banking: Benefits
T24 Core Banking: BenefitsT24 Core Banking: Benefits
T24 Core Banking: Benefits
 
Digital Transformation in Banking Financial Services Industry
Digital Transformation in Banking Financial Services IndustryDigital Transformation in Banking Financial Services Industry
Digital Transformation in Banking Financial Services Industry
 
Banking Transformations Setting up for Failure
Banking Transformations Setting up for FailureBanking Transformations Setting up for Failure
Banking Transformations Setting up for Failure
 
Islamic Asset Management A new Iceberg
Islamic Asset Management A new IcebergIslamic Asset Management A new Iceberg
Islamic Asset Management A new Iceberg
 
step on cloud payments
step on cloud paymentsstep on cloud payments
step on cloud payments
 
Anti Money Laundering AML Market Dynamics Technology Challenges Spanish
Anti Money Laundering AML Market Dynamics Technology Challenges SpanishAnti Money Laundering AML Market Dynamics Technology Challenges Spanish
Anti Money Laundering AML Market Dynamics Technology Challenges Spanish
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Control
 
Data quality
Data qualityData quality
Data quality
 
Challenges in New Age Banking
Challenges in New Age BankingChallenges in New Age Banking
Challenges in New Age Banking
 
AML testing and assurance services
AML testing and assurance servicesAML testing and assurance services
AML testing and assurance services
 
Platforms offered by maveric systems
Platforms offered by maveric systemsPlatforms offered by maveric systems
Platforms offered by maveric systems
 
Software testing solutions
Software testing solutionsSoftware testing solutions
Software testing solutions
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 

Recently uploaded (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Requirement elicitation

  • 1. Common pitfalls and preventive measures to keep in view during the requirement development phase to ensure delivery of a solution that meets customer needs and delivers better ROI. Requirement Elicitation: Common Pitfalls and Preventive Measures View Point
  • 2. 2Maveric Systems Executive Summary The process of requirement elicitation is straight forward. The business analyst interviews the identified stakeholders, identifies and defines the tasks, and documents the same in detail. Is it all really that simple and straight forward? Or there is more that goes into this crucial and foremost phase of requirement engineering? Missing or ambiguous requirements not only lead to delayed projects and budget overruns but also the loss of business and brand image. This paper aims to present some of the common pitfalls and preventive measures that can be taken during requirement elicitation. Requirement Elicitation – Common Pitfalls and Preventive Measures Introduction The toughest part in building a software application is not to build it but to decide what to build. This decision is solely made on the identified and agreed upon requirements. Requirements define the must have, should have and the nice-to have capabilities (functional) and behaviour (non-functional). Business analysts are often expected to participate in the process of building applications much before the actual process starts. Their role begins at the very first level of change/need/opportunity management where the initial business requirement is identified and defined using various tools and techniques. The quantum and nature of requirements may be small or large and transformational, the role of business analyst remains ever evolving. Requirements Engineering Requirements engineering plays a vital and crucial role in ensuring the overall success of software engineering. Requirements engineering is a process that involves identifying stakeholder needs and documenting them for analysis, communication and management of requirements. It can further be decomposed into elicitation, specification and validation. Most of the times these activities may be considered to be sequential they are rather iterative with the said activities being visited and revisited multiple times. Many problems in a system creation can be tracked back to requirement elicitation thus making it an important to project phase. The same has been proved time and again which has resulted to development of tools and techniques in order to mitigate the pitfalls as much as possible. There cannot be a fool proof way of covering 100% requirements but domain knowledge, BA skills in general and requirements management in particular and its implementation can reduce the gaps to minimum. 1. Requirements Elicitation – Foundation of requirements engineering: Definition: Very often requirement elicitation is interchangeably used as requirement gathering. Requirements gathering generally is considered document analysis and a subset of elicitation. Requirement elicitation is the first phase (post pre-planning sessions) of a software development project. It is in this phase that the business analyst is expected to figure out what the client wants and the delivery of these wants is generally used to define the success of the implemented product. In a practical world, requirements evolve at an uneven pace and tend to generate further requirements from the earlier definition thus proving to be non-terminating at times. Therefore requirements is iterative in nature and elicitation non-separable from the subsequent activities. 2. Activities Involved: Requirement elicitation can be further broken down into the activities of fact-finding, information gathering, and integration. Rzepka further decomposes the elicitation process as follows [Rzepka 89]:  Identify the relevant stakeholders that shall be the consumer of requirements at any point or in any form. End users, an interfacing systems, or environmental factors any of these could be the stakeholders in consideration  Gather the “wish list” (however ambiguous, incomplete or infeasible) for each stakeholder  Document and refine the “wish list”. The list includes all important activities and data (typically high level, domain specific and in user specific terms), and is repeatedly refined till self-consistent
  • 3. 3Maveric SystemsRequirement Elicitation – Common Pitfalls and Preventive Measures  Integrate the wish lists across the various stakeholders, ensuring that they all fall within feasibility limits, consistency is maintained throughout and conflicts, if any are resolved  Determine the non-functional requirements, such as performance, environment, parameters and reliability issues and mention these in the requirements document The resultant from the eliciting phase is a subset of goals from various stakeholders. It is this set that the other requirements engineering processes consider for validation to verify if this is what actually the sponsor and user actually intended. 3. Techniques Used: Below are some of the common requirement elicitation techniques  Requirement Workshops: Involves gathering with previously identified stakeholders in a structured setting for a defined amount of time in order to elicit, refine, and/or edit requirements  Document Analysis: In the absence of an SME, the existing documentation help to gather relevant information  Brainstorming: Involves multiple stakeholders at the same time and produces various ideas within the set time frame  Observation: Also known as Job Shadow, is studying a stakeholder work environment 4. Components of Requirement Elicitation: Requirement elicitation is composed of the following four components. One has to be mindful of pitfalls from these components  Domain: This deals with the knowledge of area where the system is applied. E.g., Core Banking  Issue in consideration: This deals with the exact customer problem that needs to be dealt with  Business context: Is the interaction of different systems and how they contribute to the resolution of the overall problem statement  Stakeholder needs and constraints: Involves identifying various stakeholders, their expectation from the solution, their exact needs and constraints Common Pitfalls in Requirement Elicitation A good requirements elicitation process supports the development of a specification that is clear, complete, correct and traceable. Lack of any of these requirements quality parameters is due to problems of requirements elicitation covering:  Scope: Wherein details of requirements are insufficient or too much information  Comprehension: Within groups as well as between groups such as users, developers and testers  Volatility: Frequent changes to requirements REQUIREMENT ELICITATION – COMPONENTS AND PITFALLS Application Domain Issues in Consideration Business Context Stakeholder Needs and Constraints  Focus on solution and not requirement  Scope creep  Lack of communication of standard project terminologies  Overwhelming trust on process  Missing to know relevant stakeholders  Stakeholder knows better approach Figure 1
  • 4. 4Maveric Systems 1. Focus on Solution and Not Requirement: Eliciting techniques can be over ambitious at times and results in influence of a preconceived solution while eliciting requirements. Very often the business requirement document (BRD) is seen to include solution requirement sections such as documentation, training etc. How can you know the solution even before you know what you need? Past solutioning experiences or other business motives often tend to bias the analysts towards steering the conversation in a particular direction that might indicate usage/ preference of a particular product over other. This not only hinders the identification of real business need but also create trust issues with stakeholders. 2. Scope Creep: Requirement elicitation is iterative process. At each iteration it is necessary to consider if the current version of iteration delivers and fulfils customer needs. This needs to be visited and revisited till the same meets customer needs. Most of the times this leads to scope creep that further results in delivering much more than what was initially agreed. A business analyst is expected to differentiate between must have, should have and nice-to have requirements. While the must haves and should haves should never be compromised and ideal point of stopping the iterations is when they further lead only to nice-to have requirements. 3. Lack of Communication of Standard project terminologies: Different business units may have different terminologies being used in their day to day business. Most of the times this can create ambiguities and more so gaps between the customer expectations and what is actually delivered. Most of the times one misses to establish standard terminologies to avoid confusion. Defining all the terminology that will be used by the team, and making it available in a project glossary, will help prevent this problem and minimize the pitfalls involved Requirement Elicitation – Common Pitfalls and Preventive Measures Figure 2 4. Overwhelming trust on Processes: Requirement elicitation is more of an art rather than being a science. The standard tools, templates and matrices are to aid. Most of the times, business analysts stick to these visible standard tools and forget the importance of the invisible soft skills. Requirement elicitation may be looked upon as an iceberg with merely 20% of it being visible and the rest being invisible. The key to unveil the rest is experience 5. Missing to know relevant stakeholders: While this may seem to be the easiest and obvious of all but it still constitutes the biggest mistake of all. Although stakeholder analysis is one of the first activities that a business analyst is usually expected to complete upon being assigned to a project this is not a one-time exercise. The same needs to be done across the project timeframe since roles and responsibilities often evolve as the project progresses. Not knowing the stakeholders, the impact of systems on them and their limitations are sure call for trouble
  • 5. ABOUT MAVERIC Started in 2000, Maveric Systems is a leading provider of IT Lifecycle Assurance with expertise across requirements to release. With a strong focus on the Banking and Telecom sectors, Maveric has built a business on the principles of deep domain expertise and innovation. Maveric’s client portfolio includes a wide array of renowned banks, financial institutions, insurance companies, leading software product companies and telecom companies. Maveric Systems Limited (Corporate Office): “Lords Tower” Block 1, 2nd Floor, Plot No 1&2 NP, Jawaharlal Nehru Road, Thiru Vi Ka Industrial Estate, Ekkatuthangal, Chennai 600032 India | Singapore | Saudi Arabia | UAE | UK | USA Write to us at info@maveric-systems.com | www.maveric-systems.com 6. Stakeholder knows better approach: Biggest mistake that one can make is assuming that the stakeholders know what they need and they know it better. Often this thought process serves as a mental block and prevents the analyst from further asking questions. The result is a compromised project since stakeholder wants and desires are mistaken to be the required solution. Thus getting to learn the systems from stakeholders might sometimes prove to be risky given that most of the times each stakeholder is not aware of the acceptable standards and what really goes into the making. The best way to avoid the involved pitfall is to approach the stakeholders and keep asking the right questions till such the problem statement is arrived. Unlearn and re-learn each time you go to a different stakeholder. The intersection of all the sessions and document analysis shall help to reach at what the customer really needs. Conclusion Business requirements describe why the organisation is implementing a system and the business benefits the organisation hopes to realize. The hardest single part of building a software system is deciding precisely what to build. No other part of the work so cripples the resulting system if done wrong. No other part is more difficult to rectify later1. It requires an iterative and interactive approach to ensure that customer needs are met. A structured requirement elicitation process ensures keeping the stakeholders involved, accountable and in good rapport with the business analyst. References http://www.batimes.com/articles/the-top-8-mistakes-in-requirements-elicitation.html https://www.site.uottawa.ca/~bochmann/SEG3101/Notes/SEG3101-ch2-2%20-%20IntroductionToElicitation.pdf http://www.iai.uni-bonn.de/III/lehre/vorlesungen/SWT/RE05/slides/05_Requirements%20Elicitation%201-2.pdf About the Author Namita is an Associate Consultant working with Requirements Assurance Practice at Maveric Systems. Former banker and a management student, she has worked in engagements with banks. Namita has more than 6 years of experience in client facing roles. She has worked in both waterfall and agile SDLC models across requirement engineering, use case modelling and engineering of test scenarios. 1 Brooks, F, 1987: No Silver Bullet : Essence and Accidents of Software Engineering