StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Collection Techniques to Elicit Requirements - Essay Example

Cite this document
Summary
This paper 'Data Collection Techniques to Elicit Requirements' tells us that data collection techniques to select the most appropriate data collection technique. Data collection is one of the fundamental techniques to elicit requirements. We can use a variety of techniques and tools to gather the system development requirements…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Data Collection Techniques to Elicit Requirements
Read Text Preview

Extract of sample "Data Collection Techniques to Elicit Requirements"

However, there are certain limitations of this method, for example, a large amount of qualitative data can be hard to analyze and it is extremely difficult to compare diverse respondents (Fisher & Foreit, 2002; Summerhill & Taylor, 1992).

Questionnaires

This is a significant data collection technique to elicit requirements. This method allows us to collect data and information quickly from a large number of people. Here we can easily manage this process remotely. This can also offer a great deal of support for collecting data about beliefs, attitudes, and characteristics. However, there are also certain problems with this method like that its simplistic (presupposed) categories offer a very small background. Here we also have no room for users to communicate their real requirements (Fisher & Foreit, 2002; Summerhill & Taylor, 1992).

Meetings

This data collection technique to elicit requirements is used for summarization as well as feedback. Here we can discuss the outcome of the data collection stage. This method also allows us to extract a set of requirements. We can use this data collection technique as a significant management tool. However, the scope of this technique is very limited (depending on the discussion) (Fisher & Foreit, 2002; Summerhill & Taylor, 1992).

Group Elicitation Techniques

This data collection technique to elicit requirements is based on the brainstorming and project team. This technique allows us to make use of more natural communication between people as compared to a formal interview. In this scenario, canto measures reaction to motivation materials (for example storyboards, mock-ups, etc.). This method has also some disadvantages for instance it is can create unnatural groups (uncomfortable intended for participants) (Fisher & Foreit, 2002; Summerhill & Taylor, 1992).

Participant Observation

In this data collection technique, we observe and spend time with the subjects. In this scenario, we spend a lot of time with the subject to become a member of the group. The main advantage is that it contextualizes and reveals particulars. However, this method is very time-consuming. The output of this method appears in the form of a rich picture that is hard to analyze (Fisher & Foreit, 2002; Summerhill & Taylor, 1992).

Preferred Method

There are numerous data collection techniques, and, in this paper, we have discussed some of the most important data collection techniques. I have assessed that each method is important in a particular context. But I will prefer to use interviews for data collection. In this technique, we directly interview the person for whom we are going to develop a system. Thus, it becomes easy to correctly elicit requirements.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What are the main data collection techniques to elicit requirements Is Essay”, n.d.)
What are the main data collection techniques to elicit requirements Is Essay. Retrieved from https://studentshare.org/information-technology/1593447-what-are-the-main-data-collection-techniques-to-elicit-requirements-is-one-better-than-another-what-is-the-preferred-method
(What Are the Main Data Collection Techniques to Elicit Requirements Is Essay)
What Are the Main Data Collection Techniques to Elicit Requirements Is Essay. https://studentshare.org/information-technology/1593447-what-are-the-main-data-collection-techniques-to-elicit-requirements-is-one-better-than-another-what-is-the-preferred-method.
“What Are the Main Data Collection Techniques to Elicit Requirements Is Essay”, n.d. https://studentshare.org/information-technology/1593447-what-are-the-main-data-collection-techniques-to-elicit-requirements-is-one-better-than-another-what-is-the-preferred-method.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Collection Techniques to Elicit Requirements

Customer Relationship Management in IBM

The paper will analyze the term ‘explicit bargain' and data collection tools in relation to a consumer packaged goods company named IBM for developing good relationships with the customers.... In order to enhance the relationship there is need for understanding their requirements and provide personalized products or services accordingly.... By the use of explicit bargains, organizations can manage all the queries of customers and accordingly collect related information about them so that their requirements are recognized....
5 Pages (1250 words) Essay

Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements

Research design indicates the techniques to be used in gathering data, the type of sampling to be used and how to deal with time and cost constraints, hence the need to focus on a specific research design.... The focus of this paper was on understanding the system requirements and deliverables through a deeper understanding of existing work processes, user expectations and system capabilities that helped in designing an effective system for the DHS.... The research methodology employed assisted in obtaining data relating to the current business processes in the Department of Human Settlements (DHS), that is to capture the functional requirements of the system and the users' perceptions of the proposed system to develop an internet based housing demand database system for the KwaZulu-Natal DHS for improved housing service provisioning....
12 Pages (3000 words) Essay

Developing an Interactive Secure Website

The photo sharing website information system is an application that encompasses the conveyance of information in regards to the possible socialization techniques of the community.... The photo sharing website information system is an application that encompasses the conveyance of information in regards to the possible socialization techniques of the community.... The ability to create, store, manipulate and distribute data portrays the interaction of information systems, human beings and work....
22 Pages (5500 words) Essay

Reducing Ambiguities in Customer Requirements Through Historical Knowledge

The capstone project 'Reducing Ambiguities in Customer requirements Through Historical Knowledge' demonstrates that for successful requirements engineering, it is important for the stakeholders to have a good communication bridge.... The implementation of the ontology and knowledge base creates the development of a conceptual method for reducing ambiguities in Web-based customer requirements forms.... The theory is to demonstrate that ambiguities in customer requirements can be reduced with the use of a historical knowledge base of previously created Web-based forms....
49 Pages (12250 words) Capstone Project

Collection Development Policy

CDP articulates collection goals and policies which help ensure that the literary requirements of the communities they serve are effectively and efficiently met.... From the paper "collection Development Policy" it is clear that a CDP represents a contract between these institutions and the community or society that they serve.... The core values or principles that are at the center of CDP are policy formulation, selection, and de-selection, budgeting, collection evaluation, and acquisition....
10 Pages (2500 words) Essay

Formulating and Clarifying the Research Topic

Identifying a topic as a delicate very of e-government and m-government services makes it possible to choose a good research strategy, data collection, and analytical methods.... This paper ''Formulating and Clarifying the Research Topic'' expects the researcher to generate ideas that will help identify an appropriate topic for research, attributes of the case, and transformation of the images into the mobile government project with objectives and questions....
7 Pages (1750 words) Outline

Security Quality Requirements

This paper 'Security Quality requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build Security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc.... The authors present a detailed explanation as to why software security entails more than simply getting rid of vulnerabilities and carrying out penetration tests, ' determining that such requirements have been satisfied will do nothing to ensure that the software will also behave securely even when it operates correctly' (31)....
20 Pages (5000 words) Annotated Bibliography

Issues in Cyber Forensics Affecting ICT

Currently, cyberspace has turned into a platform where law officers have to frequently get in touch with the public given that forensics investigation requires the utilization of directly managed analytical techniques to detect and investigate evidence traces remaining subsequent to a committed felony (Jaishankar, 2010).... Owing to the rise in cybercrime in recent times, Newville (2001) claims that digital forensics has grown to be of absolute importance taking into consideration that collection and investigating of appropriate evidence for trial has time after time confirmed to be a versatile task....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us