Project complexity: Medium, Cost Constraints: High,
Project category: Semi-detached, Requirements volatility:
Low, Project Type: New, Project safety: High.
• Organizational Characteristics: Organization size:
Large, Organization and customer relationship: New
• Stakeholder Characteristics: No. of stakeholder-
Single.
• Analyst Characteristics: Analyst Industrial
Knowledge: High, Problem domain knowledge: High
Results: when we analyzed known attributes with
mapping table, we identified Interview, Ethnography, JAD,
Card sorting are best techniques which produces effective
results.
C. Lok Mitra
It is the first electronic service in the state of Rajasthan.
Its purpose is to arrange Information Technology for the
assistance of the common people. With this, people get well-
organized effective services through IT driven interfaces. It
is an e-governance project in which a single server is
connected to different Departmental servers via Devoted
Leased Line & Dial-up Network with various electronic-
counters, which can manage all related services. It also
provided facilities of making payments with the help of
Internet by means of Credit Card.
Lok Mitra majorly having types of users- Administrator
and Citizens. Following listed some known characteristics:
• Project Characteristics: Project size- Large, project
Complexity should be high, time and cost constraints would
be medium, Project Scope can be public, Project Status-
existing, project safety will be high and User involvement-
high.
• Process characteristics: Waterfall Model
• Organizational Characteristics: Organizational
Size- Organization can be large and Impact of
organizational culture- existing.
• Stakeholder Characteristics: Geographical
distribution- Same, No. of Stakeholder- Group, Stakeholder
Availability Required- Yes, Stakeholder Experienced-
Fresher
• Analyst Characteristics: Analyst Industrial
Knowledge: High, Problem domain knowledge: Medium
Results: when we analyzed known attributes with
mapping table, we identified card sorting, survey, Interview,
Brainstorming, introspection and analysis laddering are the
techniques which gives effective results.
V. CONCLUSION
In this paper, we have presented a meaningful deep
insight into various types of requirements elicitation
techniques along with their strengths and weaknesses.
Requirements Elicitation process is extremely affected by
stakeholder characteristics, software project attributes,
software process model involved and organizational
attributes. Elicitation technique has possessed specific set of
unique features that is focused to related application. In this
paper, we outline a way to elect a set of requirements
elicitation methods for getting the best results in
requirement elicitation process. A mapping table is created
for each factor with respect to requirements elicitation
techniques. Problem domain is a known attribute for the
problem under construction. It acts as an input for mapping
table and results will be the set of effective elicitation
techniques that gives optimal results for gathering
requirements. The requirements elicitation is still one of the
major challenging area in software development. By
examining problem domain with respect to above mentioned
five factors helps the effective way to make an optimal
choice of picking requirements elicitation techniques. Future
work is to identify other factors and incorporate it in this
framework for making it better way to select best
requirement elicitation techniques for particular
circumstances.
REFERENCES
1. Bourque, P. and Fairley, R.E. “Guide to the software
engineering body of knowledge”, Version 3.0. IEEE
Computer Society. Retrieved April 2, 2019, from
www.swebok.org,.https://www.computer.org/education/bodi
es-of-knowledge/software-engineering
2. Mulla, N. and Girase, S. “A new approach to requirement
elicitation based on stakeholder recommendation and
collaborative filtering”. International Journal of Software
Engineering & Applications (IJSEA), 3(3), 51-61, 2012.
3. Sommerville, I. Software engineering (9th ed.). Boston:
AddisonWesley,(2011)..https://inspirit.net.in/books/academic
/Ian%20Sommerville%20Software%20Engineering,%209th
%20Edition%20%20%20%202011.pdf
4. Batra, Mona and Bhatnagar Dr. Archana, “Requirements
Prioritization: A Review”, International Journal of Advanced
Research in Science, Engineering and Technology, Vol. 3,
Issue 11, November 2016.
http://www.ijarset.com/upload/2016/november/6_IJARSET_
monabatra.pdf
5. Pressman, R. Software engineering: a practitioner's approach
(7th ed.). New York: McGraw-Hill higher
education,2010.http://dinus.ac.id/repository/docs/ajar/RPL7t
h_ed_software_engineering_a_practitioners_approach_by_ro
ger_s._pressman_.pdf
6. Nuseibeh, B.; and Easterbrook, S. Requirements engineering:
a roadmap. Proceedings of the 22nd International Conference
on Software Engineering ICSE'00. Limerick, Ireland, 4-11,
2000.
https://www.cs.toronto.edu/~sme/papers/2000/ICSE2000.pdf
7. Pohl, K. Requirements engineering: Fundamentals,
principles, and techniques. Springer. Berlin, Germany, 2010.
http://elearn.dsum.org/pluginfile.php/2357/mod_resource/con
tent/0/_Klaus_Pohl_Chris_Rupp_Requirements_Engineering
_b-%20%281%29.pdf
8. Wiegers, K. E. (1999). Software requirements. Microsoft
Press.https://dl.acm.org/citation.cfm?id=519610
9. Batra, Mona and Bhatnagar Dr. Archana “A Comparative
Study of Requirements Engineering Process Model”
International Journal of Advanced Research in Computer
Science, Volume 8, No. 3, March – April
2017.https://www.academia.edu/35642649/A_Comparative_
Study_of_Requirements_Engineering_Process_Model
10. Batra, Mona and Pandey S.K., “Security Testing in
Requirements Phase of SDLC”, International Journal of
Computer Applications (0975 – 8887) Volume 68– No.9,
April 2013.
11. Batra, Mona and Bhatnagar Dr. Archana, “Descriptive
Literature Review of Requirements Engineering Models”,
International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 5,
Issue2,February2015.http://ijarcsse.com/Before_August_201
7/docs/papers/Volume_5/2_February2015/V5I2-0331.pdf