Skip to main content

An Insight into Requirements Engineering Processes

  • Conference paper
Advances in Communication, Network, and Computing (CNC 2012)

Abstract

Requirements Engineering (RE) determines the requirements of software according to the needs of customers. Requirements engineering process includes requirements elicitation, requirements modeling, requirements analysis, requirements verification & validation, and requirements management. Among these sub-processes, requirements elicitation plays an important role in extracting the needs of stakeholders, since it is the first requirements engineering sub-process and has cascading effect. It means errors occurring during requirements elicitation will affect the remaining RE processes. Improper understanding of requirements engineering processes may lead to failure of software projects. This article presents an insight into requirements engineering processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albayrak, O., Hulya, Bicakcr, M.: Incomplete Software Requirements and Assumptions made by Software Engineers. In: 16th Asia Pacific Software Engineering Conference, pp. 333–339 (2009)

    Google Scholar 

  2. Bell, T.E., Thayer, T.A.: Software Requirements: Are They Really a Problem? In: ICSE-2: 2nd International Conference on Software Engineering, San Francisco, pp. 61–68 (1976)

    Google Scholar 

  3. Brooks, F.P.: No Silver Bullet: Essence and Accidents of Software Engineering. IEEE Computer 20(4), 10–19 (1987)

    Article  MathSciNet  Google Scholar 

  4. Cheng, B.H.C., Atlee, J.M.: Current and Future Research Directions in Requirements Engineering. In: Lyytinen, K., Loucopoulos, P., Mylopoulos, J., Robinson, B. (eds.) Design Requirements Workshop. LNBIP, vol. 14, pp. 11–43. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Davis, C.J., et al.: Communication Challenges in Requirements Elicitation and the use of the Repertory Grid Technique. Journal of Computer Information System, Special Issue, 78–86 (2006)

    Google Scholar 

  6. Goguen, J.A., Linde, C.: Techniques for Requirements Elicitation. In: Proceedings, Requirement Engineering, pp. 152–164 (1993)

    Google Scholar 

  7. Hickey, A.M., Davis, A.M.: Elicitation Technique Selection: How Do Experts Do It? In: 11th IEEE International Conference on Requirement Engineering (2003)

    Google Scholar 

  8. Jiang, L., Eberlein, A., Far, B.H.: Combining Requirements Engineering Techniques- Theory and Case Study. In: Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer –Based systems (ECBS 2005), pp. 105–112 (2005)

    Google Scholar 

  9. Keller, T.: Contextual Requirements Elicitation: An Overview. Seminar in Requirement Engineering, Department of Informatics. University of Zurich

    Google Scholar 

  10. Kukkanen, J., Vakevainen, K., Kauppinen, M., Uusitalo, E.: Applying a systematic Approach to Link Requirements and Testing: A Case Study. In: 16th IEEE Asia pacific Software Engineering Conference, pp. 482–488 (2009)

    Google Scholar 

  11. Lamsweerde, A.V.: Requirements Engineering in the Year 00: A Research perspective. In: 22nd International Conference on Software Engineering (2000)

    Google Scholar 

  12. Lapouchnian, A.: Goal Oriented Requirements Engineering: An Overview of the Current Research. Technical Report, Department of Computer Science, University of Toronto (June 28, 2005)

    Google Scholar 

  13. Nurmuliani, N., Zowghi, D., Williams, S.P.: Using card Sorting technique to Classify Requirements Change. In: Proceedings of the 12th IEEE International Requirement Engineering Conference (RE 2004) (2004)

    Google Scholar 

  14. Nuseibeh, B., Easterbrook, S.: Requirements Engineering: A Roadmap. In: Proceedings of the Conference on the Future of Software Engineering, New York (2000)

    Google Scholar 

  15. Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modelling Language Reference Manual, 2nd edn. Pearson Education

    Google Scholar 

  16. Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirement Engineering Journal, 34–44 (2005)

    Google Scholar 

  17. Uusitalo, E., Komssi, M., Kauppinen, M., Davis, A.M.: Linking Requirements and Testing in Practice. In: 16th IEEE International Requirements Engineering Conference, pp. 265–270 (2008)

    Google Scholar 

  18. Zave, P.: Classification of Research Efforts in Requirements Engineering. ACM Computing Surveys, 315–321 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Sadiq, M., Jain, S.K. (2012). An Insight into Requirements Engineering Processes. In: Das, V.V., Stephen, J. (eds) Advances in Communication, Network, and Computing. CNC 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35615-5_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35615-5_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35614-8

  • Online ISBN: 978-3-642-35615-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics