ding to false-positive requirements). To mitigate such
a threat, we did not considered processes detailing
elements outside the scope of the system. The dif-
ferent levels of details present in the Requirements
Document and covered by the REMO technique can
also threat the validity of the study. This mainly
occurs because the Requirements Document descri-
bes only high level requirements and business neces-
sities, while the REMO technique often leads to more
detailed requirements. To solve this divergence, two
participants documented a comparative analysis bet-
ween the requirements identified in the Requirements
Document and the ones used in the REMO technique.
We could have investigated other relevant factors
about the use of the REMO technique, such as the
time required to obtain the requirements (effort) and
the possible degree of REMO automation. We pos-
tpone this kind of research to a future work. Par-
ticularly because an effort analysis in this context
will probably require a higher degree of control—
typically supported by a controlled experiment, which
will increase the threats related to external validity. In
addition, as far as we know, there is only an incipient
tool support for the REMO technique.
6 FINAL REMARKS
This article presented the conduction of an empirical
study of the REMO technique, carried out in a context
of cooperation between an university and a military
agency.
Such empirical study involved the elicitation of
requirements from 14 business processes, randomly
selected from a pool of 190 processes whose soft-
ware requirements had already been elicited and ap-
proved by a board of domain specialists and stakehol-
ders interested in the system. The main objective of
the study was to answer to research questions: (RQ1)
How effective is REMO as a requirement elicitation
technique? and (RQ2) What is the perception of the
analysts regarding the usage of the REMO technique?
In regard to the first research question, a quan-
titative analysis indicates that the REMO technique
was effective in requirements elicitation, compared to
the conventional technique (without using heuristics).
In relation to the second research question, we ob-
served that the usage of business processes diagrams,
coupled with the heuristics proposed by the REMO
technique, facilitates the identification of the functio-
nal requirements.
REFERENCES
Basili, V. Rombach, H. (1988). The tame project: Towards
improvement-oriented software environments. IEEE
Transactions on Software Engineering, pages 758–
773.
Bleistein, S. J., Cox, K., Verner, J., and Phalp, K. T. (2006).
Requirements engineering for e-business advantage.
Requirements Engineering, 11(1):4–16.
Davis, F. D. (1989). Perceived usefulness, perceived ease of
use, and user acceptance of information technology.
MIS Quarterly, 13(3):319–340.
Dietz, J. L. and Albani, A. (2005). Basic notions regar-
ding business processes and supporting information
systems. Requirements Engineering, 10(3):175–183.
Jackson, M. (2001). Problem frames: analysing and
structuring software development problems. Addison-
Wesley.
Jacobson, I. (2004). Use cases–yesterday, today, and tomor-
row. Software and Systems Modeling, 3(3):210–220.
Jacobson, I., Booch, G., Rumbaugh, J., Rumbaugh, J., and
Booch, G. (1999). The unified software development
process, volume 1. Addison-wesley Reading.
Kang, K. C., Cohen, S. G., Hess, J. A., Novak, W. E., and
Peterson, A. S. (1990). Feature-oriented domain ana-
lysis (foda) feasibility study. Technical report, DTIC
Document.
Ramesh, B., Jain, R., Nissen, M., and Xu, P. (2005). Ma-
naging context in business process management sys-
tems. Requirements Engineering, 10(3):223–237.
Regev, G., Soffer, P., and Bider, I. (2005). Coordinated de-
velopment of business processes and their support sy-
stems. Requirements Engineering, 10(3):173–174.
Surendran, P. (2012). Technology acceptance model: A sur-
vey of literature. International Journal of Business
and Social Research, 2(4):175–178.
Van Lamsweerde, A. (2001). Goal-oriented requirements
engineering: A guided tour. In Requirements Engi-
neering, 2001. Proceedings. Fifth IEEE International
Symposium on, pages 249–262. IEEE.
Van Lamsweerde, A. (2009). Requirements engineering:
from system goals to UML models to software specifi-
cations. Wiley Publishing.
Vieira, S. R. C., Viana, D., do Nascimento, R., and Conte, T.
(2012a). Evaluating a technique for requirements ex-
traction from business process diagrams through em-
pirical studies. In Informatica (CLEI), 2012 XXXVIII
Conferencia Latinoamericana En, pages 1–10.
Vieira, S. R. C., Viana, D., do Nascimento, R., and
Conte, T. (2012b). Using empirical studies to eva-
luate the REMO requirement elicitation technique.
In Proceedings of the 24th International Conference
on Software Engineering & Knowledge Engineering
(SEKE’2012), pages 33–38.
Wiegers, K. and Beatty, J. (2013). Software requirements.
Pearson Education.
Yu, E. (2011). Modelling strategic relationships for process
reengineering. Social Modeling for Requirements En-
gineering, 11:2011.
ICEIS 2017 - 19th International Conference on Enterprise Information Systems
332