Approach and case study of requirement analysis where end users take an active role

J. M. Drake, W. W. Xie, W. T. Tsai, I. A. Zualkernan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

In the traditional approach to software analysis, systems analysts interview end users to capture requirements. We propose an approach called Automated User Requirements Acquisition (AURA) where end users take an active role in analysis by identifying requirements. This approach takes advantage of end users' domain knowledge. AURA uses a question-and-answer model to guide end users in describing their problem. Additionally, AURA provides problem domain knowledge to suggest answers for the questions. We choose the business application domain to explain and demonstrate our approach. While the AURA approach can benefit any analysis technique, we select an object-oriented analysis technique as the underlying technique. A prototype tool, AURA-BIZ, was developed to demonstrate AURA in the business domain. We evaluated AURA-BIZ through a case study where end users created the analyses of their business problem. The data collected showed that the end users successfully modeled their problem by following the questions and using the suggestions.

Original languageEnglish (US)
Title of host publicationProceedings - International Conference on Software Engineering
PublisherPubl by IEEE
Pages177-185
Number of pages9
ISBN (Print)0818637005
StatePublished - 1993
Externally publishedYes
EventProceedings of the 15th International Conference on Software Engineering - Baltimore, MD, USA
Duration: May 17 1993May 21 1993

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Other

OtherProceedings of the 15th International Conference on Software Engineering
CityBaltimore, MD, USA
Period5/17/935/21/93

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Approach and case study of requirement analysis where end users take an active role'. Together they form a unique fingerprint.

Cite this