Prioritizing Software Requirements by Combining the Usage Monitoring and User Feedback Data

被引:0
|
作者
Tanveer, Syeda S. [1 ]
Rana, Zeeshan A. [1 ]
机构
[1] Natl Univ Comp & Emerging Sci Lahore, Dept Comp Sci, Lahore 54770, Pakistan
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Monitoring; Software; Correlation; Recommender systems; Electronic mail; User experience; Stakeholders; Usability; Software evolution; usage monitoring data; user feedback data; requirements prioritization; ELICITATION;
D O I
10.1109/ACCESS.2024.3409847
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elicitation of requirements for systems in use is known as continuous requirements elicitation. Monitoring and feedback data have been used in the literature for the continuous elicitation and prioritization of requirements. Frameworks and techniques are available for gathering usage monitoring and user feedback data but the existing work does not correlate the user feedback and usage monitoring data for continuous requirements elicitation and prioritization, the scope of monitoring is limited and the elicitation and prioritization process involves manual intervention resulting in lower user satisfaction level. To overcome these limitations and achieve higher user satisfaction, our goal is to provide a mechanism to prioritize requirements through a recommender system in a semi-automated manner by correlating usage monitoring and user feedback data granular to the use case level. For this, we introduce a four-step method in which the first step deals with acquiring granular usage monitoring and user feedback data to the use-case level, and the second step performs the correlation of user feedback and usage monitoring data. Based on the correlation found, the requirements priorities are recommended in the third step. In this step, default priority is assigned using a matrix similar to the Eisenhower Decision Matrix. In the fourth step, this default priority is given a priority score according to the frequency of the feedback messages. We performed an evaluation by comparing the requirements prioritization list received from our proposed technique to the requirements prioritized by the requirements engineer. A comparison with existing works also shows the superiority of our approach. These comparisons indicate that requirements prioritization using correlated user feedback and usage monitoring data has resulted in achieving higher user satisfaction level towards requirements prioritization.
引用
收藏
页码:82825 / 82841
页数:17
相关论文
共 50 条
  • [31] Mining Twitter Feeds for Software User Requirements
    Williams, Grant
    Mahmoud, Anas
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 1 - 10
  • [32] The use of knapsack 0/1 in prioritizing software requirements and Markov chain to predict software success
    Armah I.A.
    Hayfron-Acquah J.B.
    Takyi K.
    Gyening R.-M.O.M.
    Eshun M.
    International Journal of Information Technology, 2024, 16 (3) : 1967 - 1979
  • [33] Software Quality Models: Purposes, Usage Scenarios and Requirements
    Deissenboeck, Florian
    Juergens, Elmar
    Lochmann, Klaus
    Wagner, Stefan
    WOSQ: 2009 ICSE WORKSHOP ON SOFTWARE QUALITY, 2009, : 9 - 14
  • [34] Combining Data Analytics with Team Feedback to Improve the Estimation Process in Agile Software Development
    Vetro, Antonio
    Duerre, Rupert
    Conoscenti, Marco
    Fernandez, Daniel Mendez
    Jorgensen, Magne
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2018, 43 (04) : 305 - 334
  • [35] Prioritizing Web Links Based on Web Usage and Content Data
    Chaudhary, Kamika
    Gupta, Santosh Kumar
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 546 - 551
  • [36] FAVe: Visualizing User Feedback for Software Evolution
    Guzman, Emitza
    Bhuvanagiri, Padma
    Bruegge, Bernd
    2014 SECOND IEEE WORKING CONFERENCE ON SOFTWARE VISUALIZATION (VISSOFT), 2014, : 167 - 171
  • [37] An ontology of online user feedback in software engineering
    Morales-Ramirez, Itzel
    Perini, Anna
    Guizzardi, Renata S. S.
    APPLIED ONTOLOGY, 2015, 10 (3-4) : 297 - 330
  • [38] The usage-centric security requirements engineering (USeR) method
    Hallberg, Niklas
    Hallberg, Jonas
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 34 - +
  • [39] Combining problem frames and UML in the description of software requirements
    Lavazza, L
    Del Bianco, V
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2006, 3922 : 199 - 213
  • [40] Combining Classifiers and User Feedback for Disambiguating Author Names
    de Souza, Emilia A.
    Ferreira, Anderson A.
    Goncalves, Marcos Andre
    PROCEEDINGS OF THE 15TH ACM/IEEE-CS JOINT CONFERENCE ON DIGITAL LIBRARIES (JCDL'15), 2015, : 259 - 260