Considering Stakeholders’ Feedback in Requirements Prioritization using Social Network Analysis

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 10
Year of Publication : 2016
Authors : Muyassar Dalli Hamad, Ashraf Elsayed, Walid Abdelmoez, Mahmoud M. El-Borai

How to Cite?

Muyassar Dalli Hamad, Ashraf Elsayed, Walid Abdelmoez, Mahmoud M. El-Borai, "Considering Stakeholders’ Feedback in Requirements Prioritization using Social Network Analysis," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 10, pp. 25-40, 2016. Crossref,


Requirements prioritization plays a significant role to ensure successful planning of software releases. It helps software stakeholders to discover the most desirable requirements. In this paper, we propose requirements prioritization approach using social network analysis based on stakeholders’ feedback. The social network models the relationships among stakeholders, their feedback and the system requirements. A string-matching algorithm is used to automate the discovery process of the relationship between stakeholders’ feedbacks and requirements specifications based on text similarity. Then, the network is analysed to identify the priority of requirements depending on relevant groups of stakeholders and their feedbacks. As an attempt to validate the results, focus group is conducted to discover the relationship between the stakeholders’ feedbacks and the requirements by manually matching each feedback with its related system requirement. Then, social network is built based on the results of the focus group and the system requirements are prioritized based on the network. The results of the two approaches are compared. The experimental results proved that there is a difference between the approach that uses string-matching and the focus group approach. The string-matching approach does not seem to be very appropriate in capturing the real relationship between the stakeholders’ feedbacks and the requirements.


Requirement; Feedback; Social Network Analysis; Requirements Prioritization


[1] M. Asaem, M. Ramzan & A. Jaffar, "Analysis and optimization of software requirements prioritization techniques", IEEE, DOI,10.1109/ICIET.5625687, pp: 3-9,, Pakistan (2010).
[2] J. Azar, R. K. Smith & D. Cordes, "Value-oriented requirements prioritization in a small development organization", IEEE, vol. 24, no. 1, pp: 32 - 37, USA(2007).
[3] P. Berander, "Evolving Prioritization for Software Product Management", Ph.D. Dissertation, ISBN 978-91-7295-108-2, No:07, Sweden (2007).
[4] A. Hermann & M. Daneva, "Requirements prioritization based on benefit and cost prediction: An agenda for future research", IEEE DOI 10.1109/RE, pp: 125-134, Spain(2008).
[5] D. Port, A. Olkov & T. Menzies, "Using simulation to investigate requirements prioritization strategies", IEEE, DOI: 10.1109/ASE.37, pp: 268 - 277, Spain(2008).
[6] P. Fitsilis and G. Vassilis, "Supporting the Requirements Prioritization Process Using SNA Techniques", IEEE, DOI 10.1109/WETICE.2010.24, No 11465613,pp: 110-115, Greece(2010).
[7] L. Azzopardi, G. Kazai, Stephen, "Advances in Information Retrieval Theory", Second ICTIR, ISBN 13-978-3-642-04416-8, UK(2009).
[8] G. Zuccon, S. Geva, H. Joho, "Information Retrieval Technology", 11th Asia Information Retrieval Societies Conference, ISBN: 978-3-319-28939-7, Asturalia(2015). [9] G. Bongiovanni, G. Gambosi, "Algorithms and Complexity", 4th Italian Conference, CIAC, ISBN 3540671595, Italian (2000).
[10] Institute of Electrical & Electronics IEC, "Systems and Software Engineering - System Life Cycle Processes", SEBoK, ISO/IEC/IEEE 15288 > System Requirements,, Geneva(2015).
[11] Syllabus, "Advanced Level Requirements Management", Version 2.0, , (2015).
[12] U. Eriksson, "The difference between functional and non-functional requirements", ReQtest, article, (2015).
[13] N. Afreen, A. Khatoon & M. Sadiq, "A Taxonomy of Software’s Non-functional Requirements", Springer, DOI: 10.1007/978-81- 322-2517-1_6, (2016).
[14] S. Izukura, et al, "Bridging Non-functional Requirements and IT Service Design", Elsevier, DOI:10.1016/j.procir.02.104, Vol. 30, pp;24-29, Japan(2015).
[15] W. Maalej & A.K. Thurimella, "An Introduction to Requirements Knowledge", Springer, DOI 10.1007/978-3-642-34419-0_1, pp: 398, Berlin(2013).
[16] D. Mairiza & D. Zowghi, "Constructing a catalogue of conflicts among non-functional nrequirements", Springer-CCIS 230, pp: 31– 44, Berlin(2011).
[17] D. Mairiza and et al, "An investigation into the notion on nonfunctional requirements", SAC10, DOI:10.1145/1774088.1774153, pp. 22–26, Australia(2010).
[18] R. Lutz, et al, "Mining requirements from operational experience. In: Managing requirements knowledge", Springer, Chapter 3, DOI:10.1007/978-3-642-34419-0_3, pp 49-73, Berlin (2013).
[19] M. Pergher; B. Rossi, "Requirements prioritization in software engineering: a systematic mapping study", IEEE, DOI:10.1109/EmpiRE.6615215, pp: 40–44, Italy (2013).
[20] P. Tonella, A. Susi, F. Palma, "Interactive requirements prioritization using a genetic algorithm", Information and Software Technology, Vol. 55, Issue 1, pp. 173–187, Italy(2013).
[21] P. Achimugu, and et al, A systematic literature review of software requirements prioritization research, Information and Software Technology, Vol. 56, Issue 6, pp. 568–585, Malaysia(2014).
[22] P. Nielsen, and G. Tjørnehøj, “Social networks in software process improvement”, J. Softw. Maint. Evol., Vo.l 22, Issue 1, DOI: 10.1002/spip.419, pp. 33–51, Denmark(2010).
[23] H. Wi and e. al, "A team formation model based on knowledge and collaboration", IEEE, Vol.40, Issue:1, DOI:10.1109/EMR.2012.6172769, pp.44 - 57, Korea(2009).
[24] M. Dalli, W. Abdelmoez, A. Elsayed, et al , "Software Product Requirements Prioritization Techniques: Hardly Easy", IJAIM, Vol 4, Issue 6, ISSN 2320–5121, Egypt(2016).
[25] B. Hoppe, C. Reinelt, "Social network analysis and the evaluation of leadership networks", ELSEVIER,Vol. 21, Issue 4, DOI:10.1016/j.leaqua.2010.06.004, pp.600 - 619, U.S(2010).
[26] My T. Thai; Nam P. Nguyen; Shen Huawei, "Computational Social Networks", 4th International Conference on (CSoNet 2015), pp. 382-386, China(2015)..
[27] A. Srivastava, Anuradha and D. J. Gupta, "Social Network Analysis: Hardly Easy", IEEE, DOI: 10.1109/ICROIT.2014.6798311, pp.128 - 135, India(2014).
[28] OECD, NEA, "Stakeholder Involvement in Decision Making: A Short Guide to Issues, Approaches and Resources", ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT, © OECD 2015 9, Nuclear Energy Agency, NEA report No. 7189,, USA(2015).
[29] [Online] MicrosoftTechnet Forum is available at [], (2016).
[30], 3985-43d8-8bf8-1902a2cab8de/excel-2016-slowperformance? forum=Office2016ITPro, (2016).
[31] US/home?brandIgnore=True&sort=relevancedesc&searchTerm=Ex cel+2016.
[33] Y. Zhang, M. Harman and S. L. Lim, "Empirical evaluation of search based requirements interaction management", Information and Software Technology, Vol. 55 Issue, pp:126-152, USA (2013).
[34] Greg, "How The NSA Uses Social Network Analysis To Map Terrorist Networks", uses-social-network-analysis-to-map-terrorist-networks/, (2013).
[35] X. Li and N. Lavrac, "Analysis of the NETSCIENCE Social Network", Atlantis Press(CISIA), DOI:10.2991/cisia-15.2015.124, pp.456-459, Thailand (2015).
[36] KDnuggets, "Top 30 Social Network Analysis and Visualization Tools", visualization-tools.html, (2016).
[37] M. Bastian, S. Heymann and M. Jacomy, "Gephi: an open source software for exploring and manipulating networks", Third International ICWSM Conference pp.361-362, USA(2009).
[38] M. Uhl-Bien and R. Marion, "Complexity Leadership. Part I: Conceptual Foundations", IAP Information Age, USA (2008).
[39] E. Kolaczyk, "Statistical Analysis of Network Data Methods and Models", Springer Series in Statistics, ISBN: 978-0-387-88145-4, USA(2009).
[40] M. Vestola, "A Comparison of Nine Basic Techniques for Requirements Prioritization", Helsinki University of Technology, Helsinki (2010).
[41] T. Saaty, Vargas and G. Luis, "Models, methods, concepts & applications of the analytic hierarchy", 2nd Edition, (2012).
[42] J. Karlsson, C. Wohlin and B. Regnell, "An evaluation of methods for prioritizing software requirements", Inf. and SW Technology, Vol. 39, No.14-15, pp: 939-947 , Sweden(1998).
[43] A. S. Danesh and R. Ahmad, "Study of prioritization techniques using students as subjects", IEEE, DOI:10.1109/ICIME.2009.37, pp. 390–394, Malaysia(2009).
[44] R. Wieringa and A. Persson, "Requirements Engineering: Foundation for Software Quality",, 16th International Working Conference, REFSQ, Germany, (2010).
[45] C. Otero, E. Dell, A. Qureshi and L. Otero, "A quality-based requirement prioritization framework using binary inputs", IEEE, DOI:10.1109/AMS.2010.48, pp. 187-192, Malaysia(2010).
[46] N. Kukreja, "Decision theoretic requirements prioritization A twostep approach for sliding towards value realization", ICSE 2013, ,ACM Student Research Competition IEEE, No 13799249, pp:1465-1467, USA(2013).
[47] A. Ejnioui, C. Otero and A. Qureshi, "Software requirement prioritization using fuzzy multi-attribute decision making", IEEE, DOI: 10.1109/ICOS.2012.6417646, pp. 1-6, Malaysia (2012).
[48] D. Lima, F. Freitas, G. Campos and J. Souza, "A Fuzzy Approach to Requirements Prioritization", Vol. 6956 of the series Lecture Notes in Computer Science, pp. 64-69, Hungary(2011).
[49] K. Carley and J. Reminga, "ORA: Organization Risk Analyzer", CMU-ISRI-04-106, pp:1- 45, USA (2004).
[50] A. Tordai, et al, "Lost in Translation? Empirical Analysis of Mapping Compositions for Large Ontologies", Stanford University, Proc. Ontology Matching Workshop @ ISWC, USA(2010).
[51] "Ontology Alignment Evaluation Initiative":, .