Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Techniques
Analyzing the Gap between Technology
Availability and Technology Use
INTRODUCTION
279
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
280
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
BACKGROUND
Using either of the first two approaches yields the potential for disas-
trous consequences: alienated customers, incorrect requirements, and sys-
tems that fail to meet the customers’ needs. Both researchers and practi-
tioners seem to recognize that poor requirements elicitation, and by exten-
281
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
Table 1
REQUIREMENTS ELICITATION TECHNIQUES
Interviewing is the process of analysts asking Interviewing has been performed since the
questions and prompting one or more stake- dawn of computers in the 1950s. Goal-Ori-
holders to verbalize their thoughts, opinions, ented Elicitation during interviews or work-
concerns, and needs. Gause and Weinberg shops was first referenced in 1993
(1989) provide a wealth of ideas on how to (Dardenne, van Lamsweerde, & Fickas,
interview. 1993).
Workshops involve gathering multiple stake- The earliest documented cases of using facili-
holders together in structured, facilitated tated workshops for elicitation date back to
workshops to define the requirements for a the Joint Application Development (JAD) ap-
system. Facilitators lead stakeholders through proach developed by IBM in the late 1970s
a series of preplanned activities designed to (Wood & Silver, 1995). Role Playing in work-
produce the requirements deliverables needed. shops was first referenced as a means to elicit
Gottesdiener (2002) provides an outstanding requirements in 2000 (Leffingwell & Widrig,
compendium of ideas on how to use work- 2000).
shops for requirements elicitation.
Prototyping is the process of creating a partial Prototyping has been around for as long as
implementation of a system, demonstrating it humans have manufactured products. Its use
to stakeholders, and perhaps allowing them to gather requirements feedback from poten-
to play with it. Davis (1995) provides an ex- tial users and customers seems to go back as
cellent overall summary of prototyping tech- far as 1977 (Bally, Brittan, & Wagner, 1977).
niques and effects.
Questionnaires are collections of closed- and Questionnaires are one of the oldest tech-
open-ended questions that are distributed to niques for gathering data from large popula-
many stakeholders. Responses are analyzed to tions, and have been used since the dawn of
understand general trends and stakeholders’ computers in the 1950s.
opinions.
Modeling involves the creation of graphical or Modeling of systems has been performed
textual representations of the problem or its since the dawn of computers with the earliest
solutions to increase communication and pro- record of flow charts and decision trees dating
vide fresh insights into the problem or solu- back to the 1950s (Couger, 1973); data flow
tion. A wide range of modeling approaches diagrams to 1977 (Ross, 1977); scenarios to
continued
282
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
Table 1
REQUIREMENTS ELICITATION TECHNIQUES (continued)
exists, including: object diagrams, data flow the 1970s (Alford & Burns, 1975; Davis,
diagrams (DFD), the Unified Modeling 1982); Quality Function Deployment (QFD)
Language (UML), Z, finite state machines appearing in 1986 (Haag, Raja, & Schkade,
(FSM), Petri nets, the System Description 1996); statecharts to their invention in 1987
Language (SDL), statecharts, flow charts, (Harel, 1987); use cases to 1993 (Jacobson,
use cases, scenarios, decision tables and Christerson, Jonsson, & Overgaard, 1992)
trees, and so on. See Davis (1993a), Kowal and the Unified Modeling Language (UML)
(1992), and Wieringa (1996) for descrip- to 1995 (Rational Software Corporation,
tions of most of these notations. 1997).
283
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
284
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
RESEARCH APPROACH
285
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
286
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
287
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
288
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
brainstorming were widely used (93% and 89%, respectively), about half
of the techniques have been used by between 40% and 66% of the respon-
dents, and 4 have been used by fewer than one third of the respondents.
These data are consistent with the experts’ perception that interviews and
brainstorming are widely used in practice and that many, even well-
known, techniques are less used. Therefore, we believe these results gen-
erally support our hypothesis that a gap does exist between the availabili-
ty and use of new requirements elicitation techniques.
The theories concerning the factors that impact the transfer of require-
ments elicitation techniques to practice were listed in an earlier section.
This section presents our results concerning these factors, grouped by
Rogers’ (1995) four main elements in the diffusion of innovations.
time
289
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
290
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
Table 2
TECHNIQUE KNOWLEDGE AND USE AS FUNCTION OF AGE
≥ 40 97 72
20–30 88 62
10–20 53 28
< 10 77 39
All 84 56
291
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
the innovation
292
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
Seven of the experts we interviewed laid part of the blame for poor
technology transfer on the practitioners and their organizations. One ex-
pert emphasized that organizations do not understand the risk of not
doing requirements, or, as another stated, the resources it takes to do
requirements correctly. Another expert felt that organizations often do not
recognize the need to improve: “We’re doing fine. Our products fail in the
marketplace for reasons other than poor elicitation.” A third expert ob-
served that organizations have been burned before by oversold techniques,
and are now risk averse. Not surprisingly, therefore, as mentioned by four
of those interviewed, few companies or analysts dedicate the resources to
finding, let alone learning or implementing, new elicitation techniques.
Another said that there are too many political and cultural barriers in
industry to be able to effectively assimilate new elicitation techniques.
Furthermore, they are mostly looking for “silver bullets that require less
effort, not more effort. Developing on time is far more important to most
companies than doing it right.” Another stated that corporate egos and
limited budgets can interfere with acceptance of a new technique. Finally,
one of those interviewed summarized his feelings by saying that industry
has too much “apathy, ignorance, and inertia.”
293
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
communication channels
294
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
that are associated with doing good requirements. One expert emphasized
the need to blame poor requirements more often during litigation; this type
of negative press is bound to make more companies pay more attention to
requirements. Two experts expressed the key role that the technology
champion plays in making new techniques work in practice.
Other ideas for improvement relating to the innovation itself include
the need for a clearer definition of requirements elicitation techniques.
Most of the experts interviewed complained that when a new technique is
unveiled, they are unable to understand what the technique is or whether
it is any different from techniques they already know. If this is a problem
for the experts, it must be overwhelming for the typical practitioner. Re-
searchers, working with industry, also need to determine and document
which techniques have value in which situations; they must identify best
practices. Only after this is done, can we begin to build business cases for
individual elicitation techniques. In our research, we found just one (Got-
tesdiener, 2002) documentation of a template for making the business case
for a specific technique; in this case, collaborative workshops. Most of
those interviewed had not themselves even thought about how they select
a technique. To make matters worse, almost all the experts reported their
frustration with vendors who oversell their techniques as “silver bullets.”
Another expert suggested that techniques tend to be more easily adopted
when packaged with some type of automated tool. Two of the experts em-
phasized the critical role played by business cases, case studies, or project
retrospectives to help future projects understand how well or poorly cer-
tain techniques worked in the past.
The experts and our own observations indicate a critical need for im-
provements in the communication channels used to transfer requirements
elicitation techniques from research to practice. First, we must eliminate
the mismatch between where researchers publish and what practitioners
read. Faculty members are rewarded for publishing in the most research-
oriented journals, yet practitioners have time to read only the most practi-
cal of publications. We also must improve education. Unfortunately, most
academic institutions teach students prescriptive approaches, rather than
the more important skill of critical thinking, which is essential for effective
requirements elicitation. In addition, mechanisms must be established to
encourage practitioners to become academic instructors. One expert said
that educational institutions do not give their students enough experience
working in teams. To support continuing education, we need to increase
the number of practitioner-oriented conferences. One expert interviewed
stated that enlightened organizations allow and in fact encourage their
employees to attend conferences so they can improve their understanding
295
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
of the field. However, the same expert also reported that few conferences
are designed for the practitioner. Many claim to be for the practitioner, but
are organized by academics and attract mostly fellow academics.
Three final areas address both the social system and communication
channels. Many studies (Potts, 1993) have shown that successful technol-
ogy transfer can be enhanced via close collaboration between industry,
consultants, and academe. The result of such collaboration is that re-
searchers better understand real problems in industry and are able to
develop techniques to solve them, and industry better understands how
new technologies apply to their situation. However, only two experts sug-
gested closer collaboration in response to our open-ended question, “How
would you fix the technology transfer problem?” One expert did suggest
changing the consultant role so that consultants do less of the actual work
while undertaking an assignment. Instead, they should spend more time
facilitating work so the organization becomes trained, leaving nuggets of
new ideas. Consultants need to keep up to date and translate academic
research into terms that practitioners understand. Finally, although not
mentioned directly in the interviews, analysis of many of the experts’ rec-
ommendations made it clear that the inconsistency between the academic
reward structure and technology transfer must be resolved. Academic
rewards at most research institutions are based on successful publication
of research results in journals of little interest to practitioners. Moreover,
once published, little or no incentive exists to see the results transferred to
practice. Some possibilities for addressing this issue are profit sharing from
patents and encouraging faculty to take sabbaticals in industry.
LIMITATIONS
The primary limitations of our research results relate to the survey. The
survey respondents may not be representative of our desired practitioner
population from two perspectives: (1) 29 of the respondents were atten-
dees at requirements engineering and information systems conferences,
which attract a high percentage of attendees from academia versus indus-
try, and (2) the 17 practicing analysts who responded may be more expe-
rienced than average practitioners. Limiting the survey to 17 techniques,
while providing interesting results regarding those techniques, impacts the
generalizability of our results to all elicitation techniques. We also need to
fine tune the measures to gain a better understanding of the extent of the
knowledge and use of those techniques.
In addition, although expert interviews provided a rich source of
296
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
Our research goals, survey and interview results, and the limitations of
our research provide the following opportunities for future research on the
transfer of requirements elicitation techniques from research to practice.
A more comprehensive survey instrument could be developed based on
these results to evaluate a greater number of elicitation techniques using
more exact measures of knowledge that could then be distributed to a larg-
er, more representative sample of practicing analysts. This survey could
also explore respondents’ assessments of the factors impacting technology
transfer of requirements elicitation techniques identified in this paper.
The recommendations presented in this paper could be extended in
several ways. For general factors relating to Rogers’ four elements, a liter-
ature search should identify how other fields are addressing these issues.
For factors unique to requirements elicitation, ideas could be identified
through further discussions with experts, working groups at requirements
conferences, and additional targeted research. Specifically, anticipating
that one of the factors is analysts’ lack of understanding of when to apply
elicitation techniques, we have already begun complementary research
into how experts select elicitation techniques so that their expertise can be
shared with practicing analysts (Hickey & Davis, 2002, 2003).
The graph depicted in Figure 7 seems logical to us, but represents a
model of technology adoption that we have not seen in the technology
transfer literature. More research could be done to validate the rate of ab-
sorption, and understand the conditions under which adoption demon-
strates this phenomenon rather than following more traditional S-curves.
This paper reports results of our research into the factors impacting the
transfer requirements elicitation techniques from research to practice.
Results of our interviews with 11 experts and a survey of 46 individuals
support our hypothesis that a gap between the availability and use of
297
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
298
Hickey, Davis, and Kaiser | REQUIREMENT ELICITATION TECHNIQUES
ACKNOWLEDGMENTS
The authors would like to thank Daedra Studniarz, the Colorado Insti-
tute for Technology Transfer and Implementation (CITTI), and El Pomar
Foundation for their financial support and encouragement to pursue this
research. We would also like to thank Dean Gary Klein and the entire
College of Business at the University of Colorado at Colorado Springs for
establishing an environment where research is rewarding, rewarded, and
enjoyable.
REFERENCES
299
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
Greiner, M., & Franza, R. (2003). Barriers and bridges for successful environ-
mental technology transfer. Journal of Technology Transfer, 28(2), 167–77.
Haag, S., Raja, M., & Schkade, L. (1996). Quality function deployment—Usage
in software development. Communications of the ACM, 39(1), 41–49.
Harel, D. (1987). Statecharts: A visual formalism for complex systems. Science
of Computer Programming, 8, 231–74.
Heslop, L., McGregor, E., & Griffith, M. (2001). Development of a technology
readiness assessment measure: The cloverleaf model of technology transfer.
Journal of Technology Transfer, 26(4), 369–84.
Hickey, A., & Davis, A. (2002). The role of requirements elicitation techniques
in achieving software quality. Requirements Engineering Workshop: Founda-
tions for Software Quality (REFSQ ’02) (pp. 165–71). Essen, Germany:
Essener Informatik Beiträge.
Hickey, A., & Davis, A. (2003). Elicitation technique selection: How do experts
do it? 11th IEEE International Requirements Engineering Conference.
Los Alamitos, CA: IEEE Computer Society Press.
Hudlicka, E. (1996). Requirements elicitation with indirect knowledge elicita-
tion techniques: Comparison of three methods. 2nd International Conference
on Requirements Engineering (ICRE ’96) (pp. 4–11). Los Alamitos, CA:
IEEE Computer Society Press.
Jacobson, I., Christerson, M., Jonsson, P., & Overgaard, G. (1992). Object-
Oriented Software Engineering: A Use Case Driven Approach. Reading, MA:
Addison-Wesley.
Jones, C. (1991). Applied Software Measurement: Assuring Productivity and
Quality. New York: McGraw Hill.
Jones, C. (1995). Why is technology transfer so hard? IEEE Computer, 28(6),
86–87.
Jones, C. (1996). Patterns of Software Systems Failure and Success (p. 55).
Boston, MA: Thomson Computer Press.
Kotonya, G., & Sommerville, I. (1998). Requirements Engineering. New York:
Wiley.
Kowal, J. (1992). Behavior Models. Upper Saddle River, NJ: Prentice Hall.
Kremic, T. (2003). Technology transfer: A contextual approach. Journal of
Technology Transfer 28, 149–58.
Lauesen, S. (2002). Software Requirements: Styles and Techniques. London:
Addison-Wesley.
Leffingwell, D., & Widrig, D. (2000). Managing Software Requirements.
Reading, MA: Addison-Wesley.
Macaulay, L. (1996). Requirements Engineering. London: Springer.
Maiden, N., & Rugg, G. (1996). ACRE: Selecting methods for requirements
acquisition. Software Engineering Journal, 11(5), 183–92.
Moore, G. (1991). Crossing the Chasm. New York: HarperCollins.
Osborne, A. (1963). Applied Imagination. New York: Scribner.
Parkin, A. (1980). Systems Analysis. Cambridge, MA: Winthrop.
Potts, C. (1993). Software engineering research revisited. IEEE Software, 10(5),
19–28.
300
NOTES from the FIELD
APPENDIX A
SURVEY INSTRUMENT
1. Name: (optional)
___________________________________________________________
301
Comparative Technology Transfer and Society, December 2003, vol. 1, no. 3
Value
(check one column for each technique)
I know of I have It has It has no
its existence used it value for value for I don’t
Technique (Y or N) (Y or N) elicitation elicitation know
Brainstorming
Interviewing
Joint Application
Development (JAD)
Quality Function
Deployment (QFD)
Questionnaires
Prototyping
Facilitated Workshop
Scenarios
Use Cases
Modeling
Unified Modeling
Language (UML)
Observation
Goal-Oriented
Elicitation
Role Playing
Decision Trees
Statecharts
302