Fehlmann, T. and Kranich, E. (2013). Customer-driven soft-
ware product development software products for the
social media world? a case study. Communications in
Computer and Information Science, 364 CCIS:300–
312.
Fernandes, J., Duarte, D., Ribeiro, C., Farinha, C., Pereira,
J., and Da Silva, M. (2012). Ithink : A game-based
approach towards improving collaboration and partic-
ipation in requirement elicitation. volume 15, pages
66–77, Genoa. Elsevier B.V.
Gil, A. C. (2008). M
´
etodos e t
´
ecnicas de pesquisa social.
Atlas SA, S
˜
ao Paulo, Brasil.
Gill, K., Zaidi, A., and Kiani, M. (2014). Eliciting futuristic
end-user requirements through contributory apprecia-
tive inquiry. pages 49–54. Institute of Electrical and
Electronics Engineers Inc.
Gonzales, C. and Leroy, G. (2011). Eliciting user require-
ments using appreciative inquiry. Empirical Software
Engineering, 16(6):733–772.
Hajri, I., Goknil, A., Briand, L., and Stephany, T. (2018).
Configuring use case models in product families. Soft-
ware and Systems Modeling, 17(3):939–971.
Katina, P., Keating, C., and Jaradat, R. (2014). System
requirements engineering in complex situations. Re-
quirements Engineering, 19(1):45–62.
Knauss, E., Yussuf, A., Blincoe, K., Damian, D., and
Knauss, A. (2018). Continuous clarification and emer-
gent requirements flows in open-commercial software
ecosystems. Requirements Engineering, 23(1):97–
117.
Li, H., Li, X., Hao, J., Xu, G., Feng, Z., and Xie, X. (2017).
Fesr: A framework for eliciting security requirements
based on integration of common criteria and weakness
detection formal model. pages 352–363. Institute of
Electrical and Electronics Engineers Inc.
Mishra, D., Aydin, S., Mishra, A., and Ostrovska, S. (2018).
Knowledge management in requirement elicitation:
Situational methods view. Computer Standards and
Interfaces, 56:49–61.
Mobasher, B. and Cleland-Huang, J. (2011). Recommender
systems in requirements engineering. AI Magazine,
32(3):81–89.
Nuseibeh, B. and Easterbrook, S. (2000). Requirements en-
gineering: A roadmap. In Proceedings of the Con-
ference on The Future of Software Engineering, ICSE
’00, pages 35–46, New York, NY, USA. ACM.
Pinto, R., Silva, L., Lucena, M., and Aleixo, F. A. (2017).
A software process line for combinational creativity-
based requirements elicitation. In Proceedings of the
19th International Conference on Enterprise Informa-
tion Systems - Volume 2: ICEIS,, pages 360–369. IN-
STICC, SciTePress.
Pitula, K. and Radhakrishnan, T. (2011). On eliciting re-
quirements from end-users in the ict4d domain. Re-
quirements Engineering, 16(4):323–351.
Ramakrishnan, L., Poon, S., Hendrix, V., Gunter, D., Pa-
storello, G., and Agarwal, D. (2014). Experiences
with user-centered design for the tigres workflow api.
volume 1, pages 290–297. Institute of Electrical and
Electronics Engineers Inc.
Ramesh, R. M. and Reddy, S. C. (2016). A survey on se-
curity requirement elicitation methods: Classification,
merits and demerits. International Journal of Applied
Engineering Research, 11(1):64–70.
Raspotnig, C., Karpati, P., and Opdahl, A. (2018). Com-
bined assessment of software safety and security re-
quirements: An industrial evaluation of the chassis
method. Journal of Cases on Information Technology,
20(1):46–69.
Romero, M., Vizca
´
ıno, A., and Piattini, M. (2009). Teach-
ing requirements elicitation within the context of
global software development. In 2009 Mexican In-
ternational Conference on Computer Science, pages
232–239.
Saad, A. and Dawson, C. (2018). Requirement elicitation
techniques for an improved case based lesson plan-
ning system. Journal of Systems and Information
Technology, 20(1):19–32.
Sadiq, M., Ghafir, S., and Shahid, M. (2009). An approach
for eliciting software requirements and its prioritiza-
tion using analytic hierarchy process. pages 790–795,
Kottayam, Kerala.
Seyff, N., Graf, F., and Maiden, N. (2010). Using mobile re
tools to give end-users their own voice. pages 37–46,
Sydney, NSW.
Todoran, I., Seyff, N., and Glinz, M. (2013). How
cloud providers elicit consumer requirements: An ex-
ploratory study of nineteen companies. pages 105–
114, Rio de Janeiro. IEEE Computer Society.
Tondel, I., Jaatun, M., and Meland, P. (2008). Security re-
quirements for the rest of us: A survey. IEEE Soft-
ware, 25(1):20–27.
Vijayan, J., Raju, G., and Joseph, M. (2016). Collabora-
tive requirements elicitation using elicitation tool for
small projects. In 2016 International Conference on
Signal Processing, Communication, Power and Em-
bedded System (SCOPES), pages 340–344.
Younas, M., Jawawi, D., Ghani, I., and Kazmi, R. (2017).
Non-functional requirements elicitation guideline for
agile methods. Journal of Telecommunication, Elec-
tronic and Computer Engineering, 9:137–142.
A Model for Evaluating Requirements Elicitation Techniques in Software Development Projects
249