A Collaborative Approach for Effective Requirement Elicitation in Oblivious Client Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Acquiring the desired requirements from customer through requirement elicitation process is a big deal as entire project depends on this initial important activity. Poor requirement elicitation affects software quality. Various factors in the oblivious client environment like culture, linguistic, gender, nationality, race and politics; can affect the final deliverables. The interaction of complex values, attitudes, behavioral norms, beliefs and communication approaches by stakeholders with different values may lead towards misunderstanding and misinterpretation. This could lead towards failure or dissatisfaction of the final outcome which might cause loss to both parties. The project requires redesign or modification that could take extra time and cost to get the desired results. The oblivious nature of the client’s working environment is the major cause of poor requirement elicitation. This study focuses the issues in oblivious client environment where client is reluctant to provide desired information. This work proposes a novel requirement elicitation model for effective software development in oblivious client environment. The quality improvement results of software after using this model were verified using a qualitative survey.
Authors and Affiliations
Muhammad Kashif Hanif, Muhammad Ramzan Talib, Nauman Ul Haq, Arfan Mansoor, Muhammad Umer Sarwar, Nafees Ayub
Segmentation of Touching Arabic Characters in Handwritten Documents by Overlapping Set Theory and Contour Tracing
Segmentation of handwritten words into characters is one of the challenging problem in the field of OCR. In presence of touching characters, make this problem more difficult and challenging. There are many obstacles/chal...
Application of the Scattering Bond Graph Methodology for Composite Right/Left Handed Transmission Lines
The approach of the metamaterials based on the theory of transmission lines has an influence on the development of the radiofrequency domain, so the types and techniques of elaboration of these artificial lines are quite...
Double Authentication Model using Smartphones to Enhance Student on-Campus Network Access
Computers are widely used by all universities to provide network access to students. Therefore, the securities of these computers play a major role in protecting the network. In light of that, a strong access control is...
Image Transmission Model with Quality of Service and Energy Economy in Wireless Multimedia Sensor Network
The objective of this article is to present the efficiency of image compression in the Wireless Multimedia Sensor Network (WMSN), the method used in this work is based on the lifting scheme coupled with the SPIHT coding...
A Multi-Criteria Decision Method in the DBSCAN Algorithm for Better Clustering
This paper presents a solution based on the unsupervised classification for the multiple-criteria analysis problems of data, where the characteristics and the number of clusters are not predefined, and the objects of dat...