SlideShare a Scribd company logo
1 of 7
REQUIREMENT ELICITATION
TECHNIQUES FOR SOFTWARE
Arbab (23126)
Qasim Ali (22772)
Adeel hassan ( )
Submited by :
REQUIREMENT ELICITATION
Requirements elicitation is the
collection of the requirements
of any given system or product
from users, customers and other
important stakeholders
REQUIREMENT GATHERING TECHNIQUE
Stake holder analysis
Brainstorming
One on one interview
Group Interview
Document Analysis
Focus Group
Interface Analysis
Observation
Prototyping
Requirements Workshop
Reverse Engineering
Survey
STAKE HOLDER ANALYSIS
Definition:
 Stake holder analysis identifies all the
user and stakeholders who may
influence or be impacted by the
system. This this help ensure that the
needs of all those involved are taken
into account.
Benefits:
 Ensure that all relevant stakeholder are
considered
 All important stakeholder are captured, yet
that irrelevant actors are not included.
Drawbacks:
 There is danger that to much time is spent
on identifying roles and relationships and
the teams is swamped data.
BRAINSTORMING
Definition:
It is utilized in requirements elicitation to
gather good number of ideas from a
group of people. Usually brainstorming is
used in identifying all possible solutions
to problems and simplifies the detail of
opportunities.
Basic Rules
 Generate may idea as possible
 Let your imagination soar
 It casts a broad net, determining
various discreet possibilities.
Benefits
 Generate the variety of idea in a short
time
 Produce new and creative ideas
ONE ON ONE INTERVIEW
Definition:
 The most common technique for
gathering requirements is to sit down
with the clients and ask them that they
need. The discussion should be
planned out ahead of time based on
the type of requirements you are
looking for
benefits
 Privacy of everyone in-depth a
stakeholder thoughts and get his or her
perspective
Risks:
 Time consuming
 Misunderstanding
INTERVIEW
Interviews of users and
stakeholders are
important in creating
wonderful software.
Without knowing the
expectations and goal of
the stakeholders and
users, you are highly
unlikely to satiate them

More Related Content

What's hot

System analysis and design
System analysis and design System analysis and design
System analysis and design
Razan Al Ryalat
 
Future of systems analysis
Future of systems analysisFuture of systems analysis
Future of systems analysis
Jeane Paguio
 
Roles responsibilities of system analyst
Roles responsibilities of system analyst Roles responsibilities of system analyst
Roles responsibilities of system analyst
Fazreen Rashid
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
jatin Sareen
 
Determining Requirements Complexity - White Paper
Determining Requirements Complexity - White PaperDetermining Requirements Complexity - White Paper
Determining Requirements Complexity - White Paper
Saurabh Goel
 

What's hot (20)

System analysis and design
System analysis and design System analysis and design
System analysis and design
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analyst
 
Basic Concept of Expert System
Basic Concept  of Expert System Basic Concept  of Expert System
Basic Concept of Expert System
 
SYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment helpSYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment help
 
Ch01
Ch01Ch01
Ch01
 
Sdlc presentation
Sdlc presentation Sdlc presentation
Sdlc presentation
 
Ch02
Ch02Ch02
Ch02
 
System Information
System InformationSystem Information
System Information
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
 
Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development Alternative Methodologies for Systems Development
Alternative Methodologies for Systems Development
 
Facts finding techniques in Database
Facts finding techniques in Database Facts finding techniques in Database
Facts finding techniques in Database
 
Future of systems analysis
Future of systems analysisFuture of systems analysis
Future of systems analysis
 
Roles responsibilities of system analyst
Roles responsibilities of system analyst Roles responsibilities of system analyst
Roles responsibilities of system analyst
 
Decision support systems
Decision support systemsDecision support systems
Decision support systems
 
System Analysis Fact Finding Methods
System Analysis Fact Finding MethodsSystem Analysis Fact Finding Methods
System Analysis Fact Finding Methods
 
Determining Requirements Complexity - White Paper
Determining Requirements Complexity - White PaperDetermining Requirements Complexity - White Paper
Determining Requirements Complexity - White Paper
 
Stan bio
Stan bioStan bio
Stan bio
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 

Similar to Requirement elicitation techniques for software

DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
cscpconf
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
Dhairya Joshi
 

Similar to Requirement elicitation techniques for software (20)

7. requirement-engineering
7. requirement-engineering7. requirement-engineering
7. requirement-engineering
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Requirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdfRequirement Analysis - Dr. Hu.pdf
Requirement Analysis - Dr. Hu.pdf
 
sadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdfsadfinal2007-121022230733-phpapp01.pdf
sadfinal2007-121022230733-phpapp01.pdf
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Software Development Process - REQUIREMENTS ANALYSIS / ANALYSIS OF TECHNICAL...
Software Development Process -  REQUIREMENTS ANALYSIS / ANALYSIS OF TECHNICAL...Software Development Process -  REQUIREMENTS ANALYSIS / ANALYSIS OF TECHNICAL...
Software Development Process - REQUIREMENTS ANALYSIS / ANALYSIS OF TECHNICAL...
 
6. ch 5-understanding requirements
6. ch 5-understanding requirements6. ch 5-understanding requirements
6. ch 5-understanding requirements
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
 
Software Analytics = Sharing Information
Software Analytics = Sharing InformationSoftware Analytics = Sharing Information
Software Analytics = Sharing Information
 
SAD REPORTING GROUP 2 BSIT 3B LALALA .pptx
SAD REPORTING GROUP 2 BSIT 3B LALALA .pptxSAD REPORTING GROUP 2 BSIT 3B LALALA .pptx
SAD REPORTING GROUP 2 BSIT 3B LALALA .pptx
 
System analysis fundamentals
System analysis fundamentalsSystem analysis fundamentals
System analysis fundamentals
 
Sadchap3
Sadchap3Sadchap3
Sadchap3
 
Information Technology for Managers Module 3 PPT.pdf
Information Technology for Managers  Module 3 PPT.pdfInformation Technology for Managers  Module 3 PPT.pdf
Information Technology for Managers Module 3 PPT.pdf
 
JAD Workshops
JAD WorkshopsJAD Workshops
JAD Workshops
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
Sdlc
SdlcSdlc
Sdlc
 
Requirements Analysis.pptx
Requirements Analysis.pptxRequirements Analysis.pptx
Requirements Analysis.pptx
 
Requirement Engineering Processes & Eliciting Requirement
Requirement Engineering Processes & Eliciting Requirement Requirement Engineering Processes & Eliciting Requirement
Requirement Engineering Processes & Eliciting Requirement
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
 

Recently uploaded

Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 

Requirement elicitation techniques for software

  • 1. REQUIREMENT ELICITATION TECHNIQUES FOR SOFTWARE Arbab (23126) Qasim Ali (22772) Adeel hassan ( ) Submited by :
  • 2. REQUIREMENT ELICITATION Requirements elicitation is the collection of the requirements of any given system or product from users, customers and other important stakeholders
  • 3. REQUIREMENT GATHERING TECHNIQUE Stake holder analysis Brainstorming One on one interview Group Interview Document Analysis Focus Group Interface Analysis Observation Prototyping Requirements Workshop Reverse Engineering Survey
  • 4. STAKE HOLDER ANALYSIS Definition:  Stake holder analysis identifies all the user and stakeholders who may influence or be impacted by the system. This this help ensure that the needs of all those involved are taken into account. Benefits:  Ensure that all relevant stakeholder are considered  All important stakeholder are captured, yet that irrelevant actors are not included. Drawbacks:  There is danger that to much time is spent on identifying roles and relationships and the teams is swamped data.
  • 5. BRAINSTORMING Definition: It is utilized in requirements elicitation to gather good number of ideas from a group of people. Usually brainstorming is used in identifying all possible solutions to problems and simplifies the detail of opportunities. Basic Rules  Generate may idea as possible  Let your imagination soar  It casts a broad net, determining various discreet possibilities. Benefits  Generate the variety of idea in a short time  Produce new and creative ideas
  • 6. ONE ON ONE INTERVIEW Definition:  The most common technique for gathering requirements is to sit down with the clients and ask them that they need. The discussion should be planned out ahead of time based on the type of requirements you are looking for benefits  Privacy of everyone in-depth a stakeholder thoughts and get his or her perspective Risks:  Time consuming  Misunderstanding
  • 7. INTERVIEW Interviews of users and stakeholders are important in creating wonderful software. Without knowing the expectations and goal of the stakeholders and users, you are highly unlikely to satiate them