Requirement Elicitation in Web Applications: Challenges
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate stakeholders and exploring their needs and the quality of requirements. This is greatly influenced by techniques adopted during requirements elicitation process. Complete and structured requirements can make projects more consistent. The most common challenges faced by the analyst during elicitation process are to guarantee effectual communication between stakeholders and acquisition of implicit knowledge. Most of the faults in the systems are mainly due to poor communication between stakeholder and analyst, and these faults require more time and money to correct them. The improper understandability during elicitation process of web applications can lead to requirements ambiguity, inconsistency, incorrect and unfeasible [1]. Conversational, Observational, Analytical and Synthetic are available elicitation methods to deal with the difficulty during requirement elicitation process. Selection of an appropriate method or set of methods for the unambiguous, consistent and correct requirement gathering is a challenge for analysts.
Authors and Affiliations
Swarnalatha K S, Srinivasan G N, Pooja Bhandary, Kishore P V, Rakesh R
Decentralized information accountability framework for cloud
With the rapid changes around and the increasing demands for computing solutions, cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Users’ data are usuall...
Decentralized Probabilistic Text Clustering by using Distributed Hierarchical peer to peer Clustering
Document clustering (or text clustering) is the application of cluster analysis to textual documents. It has applications in automatic document organization, topic extraction and fast information retrieval or filteri...
A Unified System to Ensure Data Security In Cloud Computing
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapi...
Delegating Auditing Task to TPA for Security in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. Extension is introducing Third Party auditing users can sa...
Design and Development of Multitasking Robot
A method for integrating real time obstacle avoidance capability in two-legged walking robots i.e.Biped using parallel leg mechanism. Elaborating the way of different task assign to a robot i.e., introducing a multit...