Software Requirement Ambiguity Avoidance Framework (SRAAF) for Selecting Suitable Requirement Elicitation Techniques for Software Projects

Ambiguity is an intrinsic deficiency of natural language written requirement documents. Requirement Engineers face difficulties while communicating with stakeholders from different backgrounds and knowledge to extract requirements. The selection of a suitable requirement elicitation technique plays a critical role to improve the quality of elicited requirements. Differences among elicitation techniques are very large; it implies that some techniques may perform better than others for a particular situation. Generally, requirement engineers select elicitation techniques based on their interests, knowledge, and experience. The selection of the right technique is critical as all techniques can not fit into different situations. In addition, before starting the new project, there is no software available that can help in selecting suitable elicitation techniques based on the situation. This paper proposed a software-based selection of suitable elicitation techniques used in SRAAF (Software Requirement Ambiguity Avoidance Framework). The tool focuses on the first phase of SRAAF, specifically the situational parameter based selection of effective elicitation techniques. These situational parameters are mapped onto the knowledge base for the selection process. The tool takes situational parameters as input related to three categories: project, requirement engineer, and stakeholders. The tool suggests a technique based on situational parameters under the current settings. If any new evidence related to situational parameters, elicitation technique or contextual value is originated, these values or information can be easily included in the tool.

[1]  Nazir Ahmad,et al.  Deep Learning Model for Selecting Suitable Requirements Elicitation Techniques , 2022, Applied Sciences.

[2]  M. Lali,et al.  Reducing Requirements Ambiguity via Gamification: Comparison with Traditional Techniques , 2022, Computational intelligence and neuroscience.

[3]  Ibrahim Hassan Hussein Et.al An Approach for Selecting the Suitable Requirement Elicitation Technique , 2021, Turkish Journal of Computer and Mathematics Education (TURCOMAT).

[4]  Aziz Deraman,et al.  A framework for software requirement ambiguity avoidance , 2019 .

[5]  Ashok Kumar Gupta,et al.  Algorithmic Solution for Effective Selection of Elicitation Techniques , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[6]  Shams Tabrez Siddiqui Significance of Security Metrics in Secure Software Development , 2017 .

[7]  Jéssyka Vilela,et al.  Applications of ontologies in requirements engineering: a systematic review of the literature , 2015, Requirements Engineering.

[8]  Mehrdad Sabetzadeh,et al.  Automated Checking of Conformance to Requirements Templates Using Natural Language Processing , 2015, IEEE Transactions on Software Engineering.

[9]  Devesh C. Jinwala,et al.  Resolving Ambiguities in Natural Language Software Requirements: A Comprehensive Survey , 2015, SOEN.

[10]  Geoffrey Mayoka Kituyi,et al.  A theoretical framework for requirements engineering and process improvement in small and medium software companies , 2015, Bus. Process. Manag. J..

[11]  Mohammad Ubaidullah Bokhari,et al.  TSSR: A Proposed Tool for Secure Software Requirement Management , 2014 .

[12]  Mehrdad Sabetzadeh,et al.  Requirement boilerplates: Transition from manually-enforced to automatically-verifiable natural language patterns , 2014, 2014 IEEE 4th International Workshop on Requirements Patterns (RePa).

[13]  Natalia Juristo Juzgado,et al.  Systematizing requirements elicitation technique selection , 2014, Inf. Softw. Technol..

[14]  Daniyal M. Alghazzawi,et al.  Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software , 2014 .

[15]  Daniel M. Berry,et al.  The Design of SREE - A Prototype Potential Ambiguity Finder for Requirements Specifications and Lessons Learned , 2013, REFSQ.

[16]  Sumaira Kausar,et al.  Guidelines for the selection of elicitation techniques , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[17]  Yan Tang,et al.  Requirement Engineering Techniques Selection and Modeling An Expert System Based Approach , 2009, 2009 International Conference on Machine Learning and Applications.

[18]  Marcos R. S. Borges,et al.  Athena: A collaborative approach to requirements elicitation , 2009, Comput. Ind..

[19]  Behrouz Homayoun Far,et al.  A methodology for the selection of requirements engineering techniques , 2008, Software & Systems Modeling.

[20]  D. Zowghi,et al.  Requirements Elicitation: A Survey of Techniques, Approaches, and Tools , 2005 .

[21]  Alan M. Davis,et al.  Elicitation technique selection: how do experts do it? , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[22]  Alan M. Davis,et al.  Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[23]  Venkataraman Ramesh,et al.  Improving information requirements determination: a cognitive perspective , 2002, Inf. Manag..

[24]  Alan M. Davis,et al.  Requirements Researchers: Do We Practice What We Preach? , 2002, Requirements Engineering.

[25]  Ian Sommerville,et al.  Requirements Engineering: Processes and Techniques , 1998 .

[26]  Neil A. M. Maiden,et al.  ACRE: selecting methods for requirements acquisition , 1996, Softw. Eng. J..

[27]  K. Siakas,et al.  Requirements Volatility in Multicultural Situational Contexts , 2022, EuroSPI.

[28]  M. Farooq,et al.  A Survey on Blockchain Acquainted Software Requirements Engineering: Model, Opportunities, Challenges, and Future Directions , 2022, IEEE Access.

[29]  Shams Tabrez Siddiqui,et al.  A SURVEY OF SOFTWARE REQUIREMENTS SPECIFICATION AMBIGUITY , 2019 .

[30]  Sabrina Hirsch,et al.  Requirements By Collaboration Workshops For Defining Needs , 2016 .

[31]  S. T. Siddiqui,et al.  Comparative study and design of software requirement tools for secure software development , 2014 .

[32]  Mohammad Ubaidullah Bokhari,et al.  Metrics for Requirements Engineering and Automated Requirements Tools , 2011 .

[33]  Mohammad Ubaidullah Bokhari,et al.  A Comparative Study of Software Requirements Tools for Secure Software Development , 2009 .

[34]  Capers Jones,et al.  Patterns of software system failure and success , 1996 .