International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.5, No.3, Feb. 2013

Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies

Full Text (PDF, 258KB), PP.40-48

Views:311   Downloads:51


Tousif ur Rehman, Muhammad Naeem Ahmed Khan, Naveed Riaz

Index Terms

Requirement Engineering, Requirement Elicitation, Joint Application Development


Requirement engineering is an integral part of the software development lifecycle since the basis for developing successful software depends on comprehending its requirements in the first place. Requirement engineering involves a number of processes for gathering requirements in accordance with the needs and demands of users and stakeholders of the software product. In this paper, we have reviewed the prominent processes, tools and technologies used in the requirement gathering phase. The study is useful to perceive the current state of the affairs pertaining to the requirement engineering research and to understand the strengths and limitations of the existing requirement engineering techniques. The study also summarizes the best practices and how to use a blend of the requirement engineering techniques as an effective methodology to successfully conduct the requirement engineering task. The study also highlights the importance of security requirements as though they are part of the non-functional requirement, yet are naturally considered fundamental to secure software development.

Cite This Paper

Tousif ur Rehman, Muhammad Naeem Ahmed Khan, Naveed Riaz,"Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.3, pp.40-48, 2013.DOI: 10.5815/ijitcs.2013.03.05


[1]Pandey, D., Suman, U. & Ramani, A.K., 2010. An Effective Requirement Engineering Process Model for Software Development and Requirements Management. 2010 International Conference on Advances in Recent Technologies in Communication and Computing, 0, p.287-291. 

[2]Davey, B. & Cope, C., 2008. Requirements Elicitation – What ’ s Missing ?Issues in Informing Science and Information Technology, 5(1), p.53-57. 

[3]Arif.S., Khan. Q. & Gahyyur. S.A.K., (2009-2010). Requirement Engineering Processes, Tools/Technologies, & Methodologies, International Journal of Reviews in Computing (IJRIC), ISSN: 2076-3328, Vol.2 

[4]Nuseibeh, B. & Easterbrook, S., 2000. Requirements engineering: a roadmap C. Ghezzi, M. Jazayeri, & A. L. Wolf, eds. Context, 1(258), p.35-46.

[5]Kauppinen, M. et al., 2004. Implementing requirements engineering processes throughout organizations: success factors and challenges.Information and Software Technology, 46(14), p.937-953.

[6]Gunda S. G., (2008). Requirements engineering: elicitation techniques. Trollhättan; 

[7]Zowghi. D., & Coulin. C., (2005). Requirements Elicitation: A Survey of Techniques, Approaches, and Tools, Engineering and Managing Software Requirements, Aurum, A & Wohlin, C (Eds.), Springer, USA, 

[8]Paetsch, F., Eberlein, A. & Maurer, F., (2003). Requirements engineering and agile software development. WET ICE 2003 Proceedings Twelfth IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprises 2003, 2(3), p.308-313

[9]Vijayan, J. & Raju, G., 2011. A New approach to Requirements Elicitation Using Paper Prototype. Science and Technology, 28, p.9-16.

[10]Hadavi M. A.,. Hamishagi V. S, Sangchi H. M., Security Requirements Engineering; State of the Art and Research Challenges. Proceedings of the International Multi Conference of Engineers and Computer Scientists 2008 Vol I, IMECS 2008, 19-21 March, 2008, Hong Kong.

[11]Hickey, A.M. & Davis, A.M., 2003. Elicitation Technique Selection : How Do Experts Do It ? In M. D. Alan, ed. Requirements Engineering. IEEE Computer Society, p. 169. 

[12]Carrizo, D., Dieste, O. & Juristo, N., 2008. Study of Elicitation Techniques Adequacy. In 11th Workshop on Requirements Engineering WER2008. pp. 104-114.

[13]Jain, S. & Ingle, M., 2011. Software Security Requirements Gathering Instrument. IJACSA International Journal of Advanced Computer Science and Applications, 2(7), p.116-121. 

[14]Z. Zhang. 2007. Effective Requirements Development - A Comparison of Requirements Elicitation Techniques. In Proceedings of the 15th Software Quality Management Conference: (SQM ’07), pages 225–240, Tampere, Finland, British Computer Society

[15]Sadiq M., & Shahid. M., 2009. Elicitation and Prioritization of Software Requirements, International Journal of Recent Trends in Engineering, Vol 2, No. 3 

[16]Lloyd, W.J., Rosson, M.B. & Arthur, J.D., 2002. Effectiveness of elicitation techniques in distributed requirements engineering. Proceedings IEEE Joint International Conference on Requirements Engineering, 0, p.311-318.