SlideShare a Scribd company logo
Requirements elicitation is the practice of collecting
the requirements of a system from users, customers
and other stakeholders. The practice is also sometimes
referred to as requirements gathering.
Presented By:
Muhammad Imran Hussain Khan
0300-6519990
Stakeholder Analysis
Brainstorming
One On One Interview
Group Interview
Document Analysis
Focus Group
Interface Analysis
Observation Social Analysis
Prototyping
Facilitated sessions
Joint Application Development (JAD)
Questionnaire
Survey
Use cases and scenarios (UCD)
Reused Requirements
Request for proposals (RFPs)
Reverse Engineering
Stakeholder analysis identifies
all the users and stakeholders
who may influence or be
impacted by the system. This
helps ensure that the needs of
all those involved are taken into
account
Benefits
1. Ensures that all relevant
stakeholders are considered
1. All important
stakeholders are captured,
and yet that irrelevant
actors are not included
Drawbacks
There is a danger that too much
time is spent on
identifying roles and
relationships, and the team is
swamped with data.
Basic Rules
1. Start out by clearly
stating the objective of
the brainstorming
session.
2. Generate as may ideas as
possible.
3. Let your imagination
soar.
4. Do not allow criticism or
debate while you are
gathering information.
5. Once information is
gathered, reshape and
combine ideas.
The most common technique for
gathering requirements is to sit
down with the clients and ask
them what they need. The
discussion should be planned
out ahead of time based on the
type of requirements you’re
looking for
• Privacy of everyone
• in-depth a stakeholder’s
thoughts and get his or
her perspective
Benefits
• Time Consuming
• Misunderstandings
Risks & Drawbacks
If there are more then one
person during interview usually
2 or 4 these people must be on
some level must be on some level
less time required
• we can get hidden requirements
• uncover a richer set of
requirements in a shorter period
of time
• Uncover ambiguities
Benefits
• Not relaxed environment
• Conflicts
• The allotted time have been
exhausted
Risks & Drawbacks
Document Analysis is an
important gathering technique.
Evaluating the documentation of a
present system can assist when
making AS-IS process documents
and also when driving the gap
analysis for scoping of the
migration projects.
• validating the requirement
completeness.
• Chunks of information are mostly
buried in present documents
• A beginning point for documenting
all current requirements.
Benefits
• Time Consuming
• Conflicts
• Exhausted
• Not Found Real Figures
Risks & Drawbacks
A focus group is actually gathering of
people who are customers or users
representatives for a product to gain its
feedback. The feedback can be collected
about opportunities, needs, and
problems to determine requirements or
it can be collected to refine and validate
the already elicited requirements.
• Managed process with particular
participants
• refine and validate the already
elicited requirements
• Allows analyst to rapidly obtain a
wide variety of user views and
possibly a consensus.
Benefits
• following the crowd and some
people think that focus groups
are at best unproductive
• end up with is with least common
denominator features.
• Recruitment effort to
• Assemble groups. Dominant
participants may influence group
disproportionately
Risks & Drawbacks
Interface for any software product will either be human or machine.
Integration with external devices and systems is another interface. The
user centric design approaches are quite effective to ensure that you
make usable software. Interface analysis- analyzing the touch points
with another external system- is vital to ensure that you do not overlook
requirements that are not instantly visible to the users.
Social analysis is also known as
Observation. Observation is the method
of collecting requirements by observing
the people doing their normal work.
This method is generally used to find the
additional requirements needed by the
user, when the user is unable to explain
their expected requirements from the
new product and problems with the
existing product
• The ability to record and
report all findings that are
true
• it is more practical
• no long calculation has to be
done
Benefits
• The viewer's or researcher's
own perception
• few trials/studies/or objects
observed to make an end
conclusion
• results may contain human
error
Risks & Drawbacks
Prototyping is a relatively modern technique
for gathering requirements. In this approach,
you gather preliminary requirements that you
use to build an initial version of the solution
— a prototype. You show this to the client,
who then gives you additional requirements.
You change the application and cycle around
with the client again. This repetitive process
continues until the product meets the critical
mass of business needs or for an agreed
number of iterations.
• prototypes can be ideal
reduce design risk
• it is more practical
• Screen mock-ups
• Using animation tools
• provides an understanding
of functionality
Benefits
• takes time to build
• more costly to build
• false sense of security
Risks & Drawbacks
In a facilitated session, you bring a larger
group (five or more) together for a common
purpose. In this case, you are trying to gather
a set of common requirements from the group
in a faster manner than if you were to
interview each of them separately.
• Less Time
• Reach Group Of People
• Brainstorming sessions
(virtual or face-to-face)
Benefits
• More Expensive
• need for extra facilities
to allow for group work
etc
• Handouts, readings
Risks & Drawbacks
JAD or joint application design, these
workshops can be efficient for gathering
requirements. The requirements workshops
are more organized and structured than a
brainstorming session where the involved
parties get together to document
requirements. Creation of domain model
artifacts like activity programs or static
diagrams is one of the ways to capture the
collaboration. A workshop with two analysts is
more effective than one in which on works as a
facilitator and the other scribes the work
together.
• group typically stays in the
session until the session
objectives are completed
• participants stay in session
until a complete set of
requirements
• documented and agreed to
Benefits
• takes time to build
• more costly to build
• false sense of security
Risks & Drawbacks
Questionnaires are much more informal, and
they are good tools to gather requirements
from stakeholders in remote locations or
those who will have only minor input into the
overall requirements. Questionnaires can also
be used when you have to gather input from
dozens, hundreds, or thousands of people.
• Less cost
• Reach Large No of Peoples
• The responses are gathered
in a standardized way
Benefits
• Difficult filling for users
• participants may forget
important issues
• Stockholders may not be
willing to answer the
questions
Risks & Drawbacks
When gathering information from many
people: to many to interview with time
constraints and less budget: a questionnaire
survey can be used. The survey insists the
users to choose from the given options agree /
disagree or rate something. Do not think that
you can make a survey on your own but try to
add meaningful insight in it. A well designed
survey must give qualitative guidance for
characterizing the market. It should not be
utilized for prioritizing of requirements or
features.
• Less cost
• Reach Large No of
Peoples
• A detailed critical
inspection
Benefits
• Difficult filling for users
• participants may forget
important issues
• Stockholders may not be
willing to answer the
questions
Risks & Drawbacks
Use cases are basically stories that describe
how discrete processes work. The stories
include people (actors) and describe how the
solution works from a user perspective. Use
cases may be easier for the users to articulate,
although the use cases may need to be
distilled later into the more specific detailed
requirements.
• provide the best return on
invested effort
• explain how that system will
be implemented
• Each use case provides a set
of scenarios that convey how
the system should interact
Benefits
• Poor identification of
structure and flow
• Time-consuming to generate
• Scenario management is
difficult
Risks & Drawbacks
In the field of software engineering
reusing the requirements of the
existing system is common method of
requirements elicitation. Using the
existing knowledge to develop the
new product has many advantages
that include low cost and less time.
Though each product has their own
type of stake holders and users, there
is still number of situations that the
reusing of the requirements take
places
• Reused requirements
are already validated
and analyzed thus
reducing the time of
testing
Benefits
• Some time proposed
product is completely
different form the
existing product
Risks & Drawbacks
If you are a vendor, you may receive
requirements through an RFP. This list
of requirements is there for you to
compare against your own capabilities to
determine how close a match you are to
the client’s needs.
The RFP presents preliminary
requirements for the commodity or
service, and may dictate to varying
degrees the exact structure and format
of the supplier's response. Effective RFPs
typically reflect the strategy and
short/long-term business objectives,
providing detailed insight upon which
suppliers will be able to offer a matching
perspective
Is this a last resort or starting point? When a migration project
is not having enough documentation of the current system,
reverse engineering will determine what system does? It will
not determine what the thing went wrong with the system and
what a system must do?
A critical activity for any ERP implementation is gathering
business requirements
Often we spend too much time and effort focusing on
gathering requirements that do not support key business
results and then gloss over the key business activities because
of implementation time constraints. Prioritizing business
results is an activity that we need to initiate before gather
requirements, not during fit/gap when expectations are
harder to manage and negotiate.
26
Selecting Appropriate Techniques
Interview JAD Question
-naires
Documen
t Analysis
Observati
on
Type of
information
As-is,
improves,
to-be
As-is,
improves,
to-be
As-is,
improves
As-is As-is
Depth of info High High Medium Low Low
Breadth of info Low Medium High High Low
Info integration Low High Low Low Low
User
involvement
Medium High Low Low Low
Cost Medium Low-
medium
Low Low Low-
medium
As-is : understanding current system
Improves: identifies improvements
To-be: developing the new system

More Related Content

What's hot

Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
Nishu Rastogi
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
Gyanmanjari Institute Of Technology
 
Agile software development and extreme Programming
Agile software development and extreme Programming  Agile software development and extreme Programming
Agile software development and extreme Programming
Fatemeh Karimi
 
All-Reduce and Prefix-Sum Operations
All-Reduce and Prefix-Sum Operations All-Reduce and Prefix-Sum Operations
All-Reduce and Prefix-Sum Operations
Syed Zaid Irshad
 
Join ordering in fragment queries
Join ordering in fragment queriesJoin ordering in fragment queries
Join ordering in fragment queries
Ifzalhussainkhan
 
Extreme Programming
Extreme ProgrammingExtreme Programming
Extreme Programming
pearlcatcharro
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
Sharda University Greater Noida
 
Database Performance Tuning
Database Performance Tuning Database Performance Tuning
Database Performance Tuning
Arno Huetter
 
Deadlock
DeadlockDeadlock
Deadlock
Rajandeep Gill
 
Distributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit ProtocolsDistributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit Protocols
Sachin Chauhan
 
8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.
Xebrio
 
Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlAbDul ThaYyal
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation TechniquesSwati Sinha
 
Dynamic Systems Development Method (DSDM) - Agile
Dynamic Systems Development Method (DSDM) - AgileDynamic Systems Development Method (DSDM) - Agile
Dynamic Systems Development Method (DSDM) - Agile
Maruf Abdullah (Rion)
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
Pooja Dixit
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
Shyam Bahadur Sunari Magar
 
Requirements engineering for agile methods
Requirements engineering for agile methodsRequirements engineering for agile methods
Requirements engineering for agile methods
Syed Zaid Irshad
 
Project Scheduling
Project SchedulingProject Scheduling
Project Scheduling
MSharmilaDeviITDEPT
 

What's hot (20)

Software Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and SpecificationSoftware Engineering- Requirement Elicitation and Specification
Software Engineering- Requirement Elicitation and Specification
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Agile software development and extreme Programming
Agile software development and extreme Programming  Agile software development and extreme Programming
Agile software development and extreme Programming
 
All-Reduce and Prefix-Sum Operations
All-Reduce and Prefix-Sum Operations All-Reduce and Prefix-Sum Operations
All-Reduce and Prefix-Sum Operations
 
Join ordering in fragment queries
Join ordering in fragment queriesJoin ordering in fragment queries
Join ordering in fragment queries
 
Extreme Programming
Extreme ProgrammingExtreme Programming
Extreme Programming
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
 
Database Performance Tuning
Database Performance Tuning Database Performance Tuning
Database Performance Tuning
 
Deadlock
DeadlockDeadlock
Deadlock
 
Distributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit ProtocolsDistributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit Protocols
 
8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.8 Most Effective Requirements Gathering Techniques.
8 Most Effective Requirements Gathering Techniques.
 
Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency control
 
Elicitation Techniques
Elicitation TechniquesElicitation Techniques
Elicitation Techniques
 
Dynamic Systems Development Method (DSDM) - Agile
Dynamic Systems Development Method (DSDM) - AgileDynamic Systems Development Method (DSDM) - Agile
Dynamic Systems Development Method (DSDM) - Agile
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Requirements engineering for agile methods
Requirements engineering for agile methodsRequirements engineering for agile methods
Requirements engineering for agile methods
 
Project Scheduling
Project SchedulingProject Scheduling
Project Scheduling
 

Similar to Software Requirement Elicitation Techniques http://www.imran.xyz

Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
SUFYAN SATTAR
 
Requirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data DiscoveryRequirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data Discovery
Joe Newbert
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
imthiyasbtm
 
Facts finding techniques in Database
Facts finding techniques in Database Facts finding techniques in Database
Facts finding techniques in Database
Afrasiyab Haider
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
zimalfayzankhan
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation Process
Rajon
 
What is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptxWhat is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptx
tadudemise
 
Paper id 28201431
Paper id 28201431Paper id 28201431
Paper id 28201431
IJRAT
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).ppt
WaniHBisen
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
Kumail Raza
 
How To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar SlidesHow To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar Slides
Audrey Perelshtein
 
169960087 j2 ee-project-report
169960087 j2 ee-project-report169960087 j2 ee-project-report
169960087 j2 ee-project-report
homeworkping8
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UX
Larry Burks
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
David Pedreno
 
Agile projects
Agile projectsAgile projects
Agile projects
David Pedreno
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
David Harmer
 
Business_analysis_methodologies.pptx
Business_analysis_methodologies.pptxBusiness_analysis_methodologies.pptx
Business_analysis_methodologies.pptx
ptgo po
 
Chp3 requirments analysis
Chp3 requirments analysisChp3 requirments analysis
Chp3 requirments analysis
asmaanawaiseh
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
drishtipuro1234
 

Similar to Software Requirement Elicitation Techniques http://www.imran.xyz (20)

Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
 
Requirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data DiscoveryRequirements Elicitation Techniques For Data Discovery
Requirements Elicitation Techniques For Data Discovery
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
 
Facts finding techniques in Database
Facts finding techniques in Database Facts finding techniques in Database
Facts finding techniques in Database
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation Process
 
What is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptxWhat is requirement gathering chap3 1.pptx
What is requirement gathering chap3 1.pptx
 
Paper id 28201431
Paper id 28201431Paper id 28201431
Paper id 28201431
 
req engg (1).ppt
req engg (1).pptreq engg (1).ppt
req engg (1).ppt
 
The Requirements - An Initial Overview
The Requirements - An Initial OverviewThe Requirements - An Initial Overview
The Requirements - An Initial Overview
 
How To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar SlidesHow To Buy Online Qualitative - Digsite Webinar Slides
How To Buy Online Qualitative - Digsite Webinar Slides
 
169960087 j2 ee-project-report
169960087 j2 ee-project-report169960087 j2 ee-project-report
169960087 j2 ee-project-report
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UX
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
 
Agile projects
Agile projectsAgile projects
Agile projects
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
 
Business_analysis_methodologies.pptx
Business_analysis_methodologies.pptxBusiness_analysis_methodologies.pptx
Business_analysis_methodologies.pptx
 
Chp3 requirments analysis
Chp3 requirments analysisChp3 requirments analysis
Chp3 requirments analysis
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 

Recently uploaded

Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 

Recently uploaded (20)

Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

Software Requirement Elicitation Techniques http://www.imran.xyz

  • 1. Requirements elicitation is the practice of collecting the requirements of a system from users, customers and other stakeholders. The practice is also sometimes referred to as requirements gathering. Presented By: Muhammad Imran Hussain Khan 0300-6519990
  • 2. Stakeholder Analysis Brainstorming One On One Interview Group Interview Document Analysis Focus Group Interface Analysis Observation Social Analysis Prototyping
  • 3. Facilitated sessions Joint Application Development (JAD) Questionnaire Survey Use cases and scenarios (UCD) Reused Requirements Request for proposals (RFPs) Reverse Engineering
  • 4. Stakeholder analysis identifies all the users and stakeholders who may influence or be impacted by the system. This helps ensure that the needs of all those involved are taken into account Benefits 1. Ensures that all relevant stakeholders are considered 1. All important stakeholders are captured, and yet that irrelevant actors are not included Drawbacks There is a danger that too much time is spent on identifying roles and relationships, and the team is swamped with data.
  • 5. Basic Rules 1. Start out by clearly stating the objective of the brainstorming session. 2. Generate as may ideas as possible. 3. Let your imagination soar. 4. Do not allow criticism or debate while you are gathering information. 5. Once information is gathered, reshape and combine ideas.
  • 6.
  • 7. The most common technique for gathering requirements is to sit down with the clients and ask them what they need. The discussion should be planned out ahead of time based on the type of requirements you’re looking for • Privacy of everyone • in-depth a stakeholder’s thoughts and get his or her perspective Benefits • Time Consuming • Misunderstandings Risks & Drawbacks
  • 8. If there are more then one person during interview usually 2 or 4 these people must be on some level must be on some level less time required • we can get hidden requirements • uncover a richer set of requirements in a shorter period of time • Uncover ambiguities Benefits • Not relaxed environment • Conflicts • The allotted time have been exhausted Risks & Drawbacks
  • 9. Document Analysis is an important gathering technique. Evaluating the documentation of a present system can assist when making AS-IS process documents and also when driving the gap analysis for scoping of the migration projects. • validating the requirement completeness. • Chunks of information are mostly buried in present documents • A beginning point for documenting all current requirements. Benefits • Time Consuming • Conflicts • Exhausted • Not Found Real Figures Risks & Drawbacks
  • 10. A focus group is actually gathering of people who are customers or users representatives for a product to gain its feedback. The feedback can be collected about opportunities, needs, and problems to determine requirements or it can be collected to refine and validate the already elicited requirements. • Managed process with particular participants • refine and validate the already elicited requirements • Allows analyst to rapidly obtain a wide variety of user views and possibly a consensus. Benefits • following the crowd and some people think that focus groups are at best unproductive • end up with is with least common denominator features. • Recruitment effort to • Assemble groups. Dominant participants may influence group disproportionately Risks & Drawbacks
  • 11. Interface for any software product will either be human or machine. Integration with external devices and systems is another interface. The user centric design approaches are quite effective to ensure that you make usable software. Interface analysis- analyzing the touch points with another external system- is vital to ensure that you do not overlook requirements that are not instantly visible to the users.
  • 12. Social analysis is also known as Observation. Observation is the method of collecting requirements by observing the people doing their normal work. This method is generally used to find the additional requirements needed by the user, when the user is unable to explain their expected requirements from the new product and problems with the existing product • The ability to record and report all findings that are true • it is more practical • no long calculation has to be done Benefits • The viewer's or researcher's own perception • few trials/studies/or objects observed to make an end conclusion • results may contain human error Risks & Drawbacks
  • 13. Prototyping is a relatively modern technique for gathering requirements. In this approach, you gather preliminary requirements that you use to build an initial version of the solution — a prototype. You show this to the client, who then gives you additional requirements. You change the application and cycle around with the client again. This repetitive process continues until the product meets the critical mass of business needs or for an agreed number of iterations. • prototypes can be ideal reduce design risk • it is more practical • Screen mock-ups • Using animation tools • provides an understanding of functionality Benefits • takes time to build • more costly to build • false sense of security Risks & Drawbacks
  • 14. In a facilitated session, you bring a larger group (five or more) together for a common purpose. In this case, you are trying to gather a set of common requirements from the group in a faster manner than if you were to interview each of them separately. • Less Time • Reach Group Of People • Brainstorming sessions (virtual or face-to-face) Benefits • More Expensive • need for extra facilities to allow for group work etc • Handouts, readings Risks & Drawbacks
  • 15. JAD or joint application design, these workshops can be efficient for gathering requirements. The requirements workshops are more organized and structured than a brainstorming session where the involved parties get together to document requirements. Creation of domain model artifacts like activity programs or static diagrams is one of the ways to capture the collaboration. A workshop with two analysts is more effective than one in which on works as a facilitator and the other scribes the work together. • group typically stays in the session until the session objectives are completed • participants stay in session until a complete set of requirements • documented and agreed to Benefits • takes time to build • more costly to build • false sense of security Risks & Drawbacks
  • 16. Questionnaires are much more informal, and they are good tools to gather requirements from stakeholders in remote locations or those who will have only minor input into the overall requirements. Questionnaires can also be used when you have to gather input from dozens, hundreds, or thousands of people. • Less cost • Reach Large No of Peoples • The responses are gathered in a standardized way Benefits • Difficult filling for users • participants may forget important issues • Stockholders may not be willing to answer the questions Risks & Drawbacks
  • 17. When gathering information from many people: to many to interview with time constraints and less budget: a questionnaire survey can be used. The survey insists the users to choose from the given options agree / disagree or rate something. Do not think that you can make a survey on your own but try to add meaningful insight in it. A well designed survey must give qualitative guidance for characterizing the market. It should not be utilized for prioritizing of requirements or features. • Less cost • Reach Large No of Peoples • A detailed critical inspection Benefits • Difficult filling for users • participants may forget important issues • Stockholders may not be willing to answer the questions Risks & Drawbacks
  • 18.
  • 19. Use cases are basically stories that describe how discrete processes work. The stories include people (actors) and describe how the solution works from a user perspective. Use cases may be easier for the users to articulate, although the use cases may need to be distilled later into the more specific detailed requirements. • provide the best return on invested effort • explain how that system will be implemented • Each use case provides a set of scenarios that convey how the system should interact Benefits • Poor identification of structure and flow • Time-consuming to generate • Scenario management is difficult Risks & Drawbacks
  • 20.
  • 21. In the field of software engineering reusing the requirements of the existing system is common method of requirements elicitation. Using the existing knowledge to develop the new product has many advantages that include low cost and less time. Though each product has their own type of stake holders and users, there is still number of situations that the reusing of the requirements take places • Reused requirements are already validated and analyzed thus reducing the time of testing Benefits • Some time proposed product is completely different form the existing product Risks & Drawbacks
  • 22. If you are a vendor, you may receive requirements through an RFP. This list of requirements is there for you to compare against your own capabilities to determine how close a match you are to the client’s needs. The RFP presents preliminary requirements for the commodity or service, and may dictate to varying degrees the exact structure and format of the supplier's response. Effective RFPs typically reflect the strategy and short/long-term business objectives, providing detailed insight upon which suppliers will be able to offer a matching perspective
  • 23. Is this a last resort or starting point? When a migration project is not having enough documentation of the current system, reverse engineering will determine what system does? It will not determine what the thing went wrong with the system and what a system must do? A critical activity for any ERP implementation is gathering business requirements Often we spend too much time and effort focusing on gathering requirements that do not support key business results and then gloss over the key business activities because of implementation time constraints. Prioritizing business results is an activity that we need to initiate before gather requirements, not during fit/gap when expectations are harder to manage and negotiate.
  • 24.
  • 25.
  • 26. 26 Selecting Appropriate Techniques Interview JAD Question -naires Documen t Analysis Observati on Type of information As-is, improves, to-be As-is, improves, to-be As-is, improves As-is As-is Depth of info High High Medium Low Low Breadth of info Low Medium High High Low Info integration Low High Low Low Low User involvement Medium High Low Low Low Cost Medium Low- medium Low Low Low- medium As-is : understanding current system Improves: identifies improvements To-be: developing the new system