Search
  Advanced Search
 
Journal search
Journal cover: Information Management & Computer Security

Information Management & Computer Security

ISSN: 0968-5227

Online from: 1993

Subject Area: Information and Knowledge Management

Content: Latest Issue | icon: RSS Latest Issue RSS | Previous Issues

Options: To add Favourites and Table of Contents Alerts please take a Emerald profile

Icon: .Table of Contents.Next article.Icon: .

Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value


Document Information:
Title:Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value
Author(s):Kamel Rouibah, (Department of Quantitative Methods and Information Systems, College of Business Administration, Kuwait University, Safat, Kuwait), Sulaiman Al-Rafee, (College of Business Administration, Kuwait University, Safat, Kuwait)
Citation:Kamel Rouibah, Sulaiman Al-Rafee, (2009) "Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value", Information Management & Computer Security, Vol. 17 Iss: 3, pp.192 - 217
Keywords:Kuwait, Manufacturing resource planning, Systems analysis
Article type:Research paper
DOI:10.1108/09685220910978086 (Permanent URL)
Publisher:Emerald Group Publishing Limited
Acknowledgements:This research is supported by Kuwait University, Grant No. IQ 03/07.
Abstract:

Purpose – The purpose of this paper is to investigate the perceptions of 19 requirement engineering (RE) techniques in Kuwait in term of three criteria “awareness,” “use,” and “perceived value generated over past system development projects.” Also, this paper aims to examine possible relationships between these RE techniques and two information system development success factors.

Design/methodology/approach – This paper develops a questionnaire and tests with a sample of respondents from 175 organizations in Kuwait.

Findings – Results show that: Arab culture influence perception of RE techniques; most companies have good knowledge of different techniques; several different techniques for identifying and analyzing customer requirements are used; the most highly valued RE techniques are decision trees, goal oriented, prototyping, data flow diagram (DFD), and interviews; six techniques (tree analysis, role playing, unified modeling language, Kawakita Jiro method, flow charts, and Ishikawa) are found to have the least perceived value; and only two techniques (prototyping and decision tree) are highly correlated with the statement “Obtaining the right requirements is a critical success factor for system development,” while other three techniques (quality function deployment, DFD and role playing) are correlated with “We experienced problems during past system developments projects because of wrong requirements collection.”

Research limitations/implications – The study sheds light on perceptions on RE techniques perception in Kuwait where less is known about the subject from Western researchers.

Practical implications – This paper suggests re-examining university curriculums in order to prepare students for familiarity with techniques that have proven their effectiveness elsewhere and call for more collaboration between academia and practitioners in order to appropriate research outcomes. In addition, this paper is of benefit to foreign consulting companies willing to penetrate the Gulf Cooperative Council.

Originality/value – This is the first Arab study that sheds light on system development practices in the Arab world.



Fulltext Options:

Login

Login

Existing customers: login
to access this document

Login


- Forgot password?
- Athens/Institutional login

Purchase

Purchase

Downloadable; Printable; Owned
HTML, PDF (140kb)Purchase

To purchase this item please login or register.

Login


- Forgot password?

Recommend to your librarian

Complete and print this form to request this document from your librarian


Marked list


Bookmark & share

Reprints & permissions