Requirement Elicitation in Web Applications: Challenges
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate stakeholders and exploring their needs and the quality of requirements. This is greatly influenced by techniques adopted during requirements elicitation process. Complete and structured requirements can make projects more consistent. The most common challenges faced by the analyst during elicitation process are to guarantee effectual communication between stakeholders and acquisition of implicit knowledge. Most of the faults in the systems are mainly due to poor communication between stakeholder and analyst, and these faults require more time and money to correct them. The improper understandability during elicitation process of web applications can lead to requirements ambiguity, inconsistency, incorrect and unfeasible [1]. Conversational, Observational, Analytical and Synthetic are available elicitation methods to deal with the difficulty during requirement elicitation process. Selection of an appropriate method or set of methods for the unambiguous, consistent and correct requirement gathering is a challenge for analysts.
Authors and Affiliations
Swarnalatha K S, Srinivasan G N, Pooja Bhandary, Kishore P V, Rakesh R
Effective Keyword Search on XML data- Using FMADM
Efficient state of the art query retrieval systems are implemented over RDBMS databases but not for XML based storages. Fuzzy type-ahead search, though not a new concept for RDBMS based systems, it is a new informati...
Power Optimization for a Datapath of A Genral Purpose Processor
Data path is the core of the processor; it is where all computations are performed. The other blocks in the processor are supporting units. At present, most of the popular processor hardware synthesis tools give highe...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
Minimizing End-To-End Delay in Interactive Network Applications
Multiple users interaction in network applications such as teleconferencing, network gaming, and online trading are gaining popularity but these applications require that the delay difference in between multiple clie...
Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploi...