{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T10:18:49Z","timestamp":1770718729349,"version":"3.49.0"},"reference-count":52,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2003,8,1]],"date-time":"2003-08-01T00:00:00Z","timestamp":1059696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,8,1]]},"abstract":"<jats:p>Although requirement elicitation is generally acknowledged to be very important in traditional information systems development (ISD), it does not get enough attention in most Web\u2010based information systems development (WISD). This paper highlighted the difference between ISD and WISD, and proposed a three\u2010stage model of user requirements elicitation for Web\u2010based information systems. This model divides the requirements definition into three stages: initial analysis, key user requirements elicitation and regular user responses. Most current WIS design methodologies consider only initial analysis, and neglect actual users\u2019 requirements. Key user input is emphasized in this model, and social network analysis is proposed as a tool for identifying key users. Requirements analysis for WISD is no longer considered a one\u2010stop step, but is better regarded as a continuous evolving process. Finally, managerial implications are also provided in this paper.<\/jats:p>","DOI":"10.1108\/02635570310479972","type":"journal-article","created":{"date-parts":[[2003,7,8]],"date-time":"2003-07-08T19:33:28Z","timestamp":1057692808000},"page":"398-409","source":"Crossref","is-referenced-by-count":19,"title":["A three\u2010stage model of requirements elicitation for Web\u2010based information systems"],"prefix":"10.1108","volume":"103","author":[{"given":"Heng\u2010Li","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jih\u2010Hsin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022013020463714700_B1","doi-asserted-by":"crossref","unstructured":"Abels, E.G., White, M.D. and Hahn, K. (1997), \u201cIdentifying user\u2010based criteria for Web pages\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 7 No. 4, pp. 252\u201062.","DOI":"10.1108\/10662249710187141"},{"key":"key2022013020463714700_B2","doi-asserted-by":"crossref","unstructured":"Abels, E.G., White, M.D. and Hahn, K. (1998), \u201cA user\u2010based design process for Web sites\u201d,Internet Research: Electronic Networking Applications and Policy, Vol. 8 No. 1, pp. 39\u201048.","DOI":"10.1108\/10662249810368879"},{"key":"key2022013020463714700_B3","unstructured":"Armstrong, A. and Hagel, III J. (1996), \u201cThe real value of on\u2010line communities\u201d, Harvard Business Review, May\u2010June, pp. 134\u201041."},{"key":"key2022013020463714700_B4","doi-asserted-by":"crossref","unstructured":"Artz, J.M. (1996), \u201cA top\u2010down methodology for building corporate Web applications\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 6 No. 2\u20103, pp. 64\u201074.","DOI":"10.1108\/10662249610127337"},{"key":"key2022013020463714700_B5","doi-asserted-by":"crossref","unstructured":"Baldwin, T.T., Bedell, M.D. and Johnson, J.L. (1997), \u201cThe social fabric of a team\u2010based MBA program: network effects on student satisfaction and performance\u201d, Academy of Management Journal, Vol. 40 No. 6, pp. 1369\u201097.","DOI":"10.2307\/257037"},{"key":"key2022013020463714700_B6","doi-asserted-by":"crossref","unstructured":"Basu, C., Poindexter, S., Drosen, J. and Addo, T. (2000), \u201cDiffusion of executive information systems in organizations and the shift to Web technologies\u201d, Industrial Management & Data Systems, Vol. 100 No. 6, pp. 271\u20106.","DOI":"10.1108\/02635570010320484"},{"key":"key2022013020463714700_B7","doi-asserted-by":"crossref","unstructured":"Browne, G.J. and Rogich, M.B. (2001), \u201cAn empirical investigation of user requirements elicitation: comparing the effectiveness of prompting techniques\u201d, Journal of Management Information Systems, Vol. 17 No. 4, Spring, pp. 223\u201049.","DOI":"10.1080\/07421222.2001.11045665"},{"key":"key2022013020463714700_B8","doi-asserted-by":"crossref","unstructured":"Chatzoglou, P.D. and Soteriou, A.C. (1999), \u201cA DEA framework to access the efficiency of the software requirements capture and analysis process\u201d, Decision Sciences, Vol. 30 No. 2, pp. 503\u201031.","DOI":"10.1111\/j.1540-5915.1999.tb01620.x"},{"key":"key2022013020463714700_B9","doi-asserted-by":"crossref","unstructured":"Cunliffe, D. (2000), \u201cDeveloping usable Web sites: a review and model\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 10 No. 4, pp. 295\u2010307.","DOI":"10.1108\/10662240010342577"},{"key":"key2022013020463714700_B10","doi-asserted-by":"crossref","unstructured":"Davenport, T.H. (1997), \u201cTen principles of knowledge management and four case studies\u201d, Knowledge and Process Management, Vol. 4 No. 3, pp. 187\u2010208.","DOI":"10.1002\/(SICI)1099-1441(199709)4:3<187::AID-KPM99>3.0.CO;2-A"},{"key":"key2022013020463714700_B11","doi-asserted-by":"crossref","unstructured":"DeLone, W.L. and McLean, E.R. (1992), \u201cInformation system success: the quest for dependent variable\u201d, Information Systems Research, Vol. 3 No. 1, March, pp. 60\u201093.","DOI":"10.1287\/isre.3.1.60"},{"key":"key2022013020463714700_B12","doi-asserted-by":"crossref","unstructured":"De Troyer, O.M.F. and Leune, C.J. (1998), \u201cWSDM: a user centered design method for Web sites\u201d, paper presented at the Seventh International Worldwide Web Conference, Brisbane.","DOI":"10.1016\/S0169-7552(98)00042-7"},{"key":"key2022013020463714700_B13","doi-asserted-by":"crossref","unstructured":"Detlor, B. (2000), \u201cThe corporate portal as information infrastructure: towards a framework for portal design\u201d, International Journal of Information Management, Vol. 20, pp. 91\u2010101.","DOI":"10.1016\/S0268-4012(99)00058-4"},{"key":"key2022013020463714700_B14","unstructured":"Deville, B. (1995), \u201cInternet for market researchers\u201d, Marketing Research, Vol. 17 No. 3, pp. 36\u20108."},{"key":"key2022013020463714700_B15","doi-asserted-by":"crossref","unstructured":"El Louadi, M., Galletta, D.F. and Sampler, J.L. (1998), \u201cAn empirical validation of a contingency model for information requirements determination\u201d, The DATA BASE for Advances in Information Systems, Vol. 29 No. 3, pp. 31\u201051.","DOI":"10.1145\/313310.313333"},{"key":"key2022013020463714700_B16","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B. (1997), \u201cThe use of systems development methodologies in practice: a field study\u201d, Information Systems Journal, Vol. 7, pp. 201\u201012.","DOI":"10.1046\/j.1365-2575.1997.d01-18.x"},{"key":"key2022013020463714700_B17","doi-asserted-by":"crossref","unstructured":"Fraternali, P. (1999), \u201cTools and approaches for developing data\u2010intensive Web applications: a survey\u201d, ACM Computing Survey, Vol. 31 No. 3, September, pp. 227\u201063.","DOI":"10.1145\/331499.331502"},{"key":"key2022013020463714700_B18","doi-asserted-by":"crossref","unstructured":"Garton, L., Haythornthwaite, C. and Wellman, B. (1999), \u201cStudying on\u2010line social networks\u201d, in Jones, S. (Ed.), Doing Internet Research, Sage, Thousand Oaks, CA.","DOI":"10.4135\/9781452231471.n4"},{"key":"key2022013020463714700_B19","doi-asserted-by":"crossref","unstructured":"Guinan, P., Cooprider, J. and Faraj, S. (1998), \u201cEnabling software development team performance during requirements definition: a behavioral versus technical approach\u201d, Information Systems Research, Vol. 9 No. 2, June, pp. 101\u201025.","DOI":"10.1287\/isre.9.2.101"},{"key":"key2022013020463714700_B20","unstructured":"Hagel, J. and Armstrong, A. (1997), Net Gain: Expanding Markets Through Virtual Communities, McKinsey & Company, New York, NY."},{"key":"key2022013020463714700_B21","doi-asserted-by":"crossref","unstructured":"Hidding, G.J. and Catterall, S.M. (1998), \u201cAnatomy of a learning organization: turing knowledge into capital at Anderson Consulting\u201d, Knowledge and Process Management, Vol. 5 No. 1, pp. 3\u201013.","DOI":"10.1002\/(SICI)1099-1441(199803)5:1<3::AID-KPM8>3.0.CO;2-O"},{"key":"key2022013020463714700_B22","unstructured":"IEEE (1997), IEEE Software Engineering Standards Collection, IEEE Computer Society Press, Los Alamitos, CA."},{"key":"key2022013020463714700_B23","doi-asserted-by":"crossref","unstructured":"Isakowitz, T., Bieber, M. and Vitali, F. (1998), \u201cWeb information systems\u201d, Communications of ACM, Vol. 41 No. 7, July, pp. 78\u201080.","DOI":"10.1145\/278476.278490"},{"key":"key2022013020463714700_B24","doi-asserted-by":"crossref","unstructured":"Isakowitz, T., Stohr, E. and Balasubramanian, P. (1995), \u201cA methodology for structured hypermedia design\u201d, Communications of the ACM, Vol. 38 No. 8, pp. 34\u201044.","DOI":"10.1145\/208344.208346"},{"key":"key2022013020463714700_B25","doi-asserted-by":"crossref","unstructured":"Kim, E.B. and Eom, S.B. (2002), \u201cDesigning effective cyber store user interface\u201d, Industrial Management & Data Systems, Vol. 102 No. 5, pp. 241\u201051.","DOI":"10.1108\/02635570210428276"},{"key":"key2022013020463714700_B26","unstructured":"Korgaonkar, P.K. and Wolin, L.D. (1999), \u201cA multivariate analysis of Web usage\u201d, Journal of Advertising Research, April, pp. 53\u201068."},{"key":"key2022013020463714700_B27","doi-asserted-by":"crossref","unstructured":"Krackhardt, D. (1990), \u201cAssessing the political landscape: structure, cognition, and power in organizations\u201d, Administrative Science Quarterly, Vol. 35, pp. 342\u201069.","DOI":"10.2307\/2393394"},{"key":"key2022013020463714700_B28","unstructured":"Lee, C.L. (1999), \u201cIDM: a methodology for intranet design\u201d, ACM Computing Survey, Vol. 31 No. 4 December, pp. 51\u201067."},{"key":"key2022013020463714700_B29","unstructured":"Liu, C., Arnett, K., Capella, L. and Taylor, R. (2001), \u201cKey dimensions of Web design quality as related to consumer response\u201d, Journal of Computer Information Systems, Fall, pp. 70\u201082."},{"key":"key2022013020463714700_B30","doi-asserted-by":"crossref","unstructured":"Loughman, T., Fleck, R. and Snipes, R. (2000), \u201cA cross\u2010disciplinary model for improved information systems analysis\u201d, Industrial Management & Data Systems, Vol. 100 No. 8, pp. 359\u201069.","DOI":"10.1108\/02635570010353848"},{"key":"key2022013020463714700_B31","unstructured":"McCarthy, R.V. and Aronson, J.E. (2001), \u201cActivating consumer response: a model for Web site design strategy\u201d, Journal of Computer Information Systems, Fall, pp. 70\u201082."},{"key":"key2022013020463714700_B32","doi-asserted-by":"crossref","unstructured":"Maiden, N.A.M. and Rugg, G. (1996), \u201cACRE: selecting methods for requirements acquisition\u201d, Software Engineering Journal, May, pp. 183\u201092.","DOI":"10.1049\/sej.1996.0024"},{"key":"key2022013020463714700_B33","doi-asserted-by":"crossref","unstructured":"Nielsen, J. (1993), Usability Engineering, Morgan Kaufman, San Francisco, CA.","DOI":"10.1016\/B978-0-08-052029-2.50009-7"},{"key":"key2022013020463714700_B34","doi-asserted-by":"crossref","unstructured":"Overmyer, S.P. (2000), \u201cWhat\u2019s different about requirements engineering for Web sites\u201d, Requirements Engineering, Vol. 5, pp. 62\u20105.","DOI":"10.1007\/PL00010343"},{"key":"key2022013020463714700_B35","doi-asserted-by":"crossref","unstructured":"Perkowitz, M. and Etzioni, O. (2000), \u201cTowards adaptive Web sites: conceptual framework and case study\u201d, Artificial Intelligence, Vol. 118, pp. 245\u201075.","DOI":"10.1016\/S0004-3702(99)00098-3"},{"key":"key2022013020463714700_B36","doi-asserted-by":"crossref","unstructured":"Saiedian, H. and Dale, R. (2000), \u201cRequirements engineering: making the connection between the software developer and customer\u201d, Information and Software Technology, Vol. 42, pp. 419\u201028.","DOI":"10.1016\/S0950-5849(99)00101-9"},{"key":"key2022013020463714700_B37","doi-asserted-by":"crossref","unstructured":"Sampson, S. (1998), \u201cGathering customer feedback via the Internet: instruments and prospects\u201d, Industrial Management & Data Systems, Vol. 98 No. 2, pp. 71\u201082.","DOI":"10.1108\/02635579810205511"},{"key":"key2022013020463714700_B38","unstructured":"Sass, R.K. (1997), \u201cFrom commerce to community: virtual success on the Web\u201d, Proceedings of The Sixth International World Wide Web Conference, Santa Clara, CA."},{"key":"key2022013020463714700_B39","doi-asserted-by":"crossref","unstructured":"Schwabe, D. and Rossi, G. (1995), \u201cThe object\u2010oriented hypermedia design model\u201d, Communications of the ACM, Vol. 38 No. 8, pp. 45\u20106.","DOI":"10.1145\/208344.208354"},{"key":"key2022013020463714700_B40","unstructured":"Scott, J. (2000), Social Network Analysis, Sage Publications, London."},{"key":"key2022013020463714700_B41","doi-asserted-by":"crossref","unstructured":"Sherrell, L.B. and Chen, L.D. (2001), \u201cThe W cycle model and associated methodology for corporate Web site development\u201d, Communications of AIS, Vol. 5 No. 7.","DOI":"10.17705\/1CAIS.00507"},{"key":"key2022013020463714700_B42","doi-asserted-by":"crossref","unstructured":"Shneiderman, B. (1997), \u201cDesigning information\u2010abundant Web sites: issues and recommendations\u201d, International Journal of Human\u2010Computer Studies, Vol. 47, pp. 5\u201029.","DOI":"10.1006\/ijhc.1997.0127"},{"key":"key2022013020463714700_B43","unstructured":"(The) Standish Group (1995), The Scope of Software Development Project Failures, The Standish Group, Dennis, MA."},{"key":"key2022013020463714700_B44","doi-asserted-by":"crossref","unstructured":"Taggart, W.M. and Tharp, M.O. (1977), \u201cA survey of information requirements analysis techniques\u201d, Computing Survey, Vol. 9 No. 4, December, pp. 273\u201090.","DOI":"10.1145\/356707.356710"},{"key":"key2022013020463714700_B45","doi-asserted-by":"crossref","unstructured":"Wang, S.H. (2001), \u201cToward a general model for Web\u2010based information systems\u201d, International Journal of Information Management, Vol. 21, pp. 385\u201096.","DOI":"10.1016\/S0268-4012(01)00029-9"},{"key":"key2022013020463714700_B46","doi-asserted-by":"crossref","unstructured":"Wang, S.H. (2002), \u201cDesigning information systems for electronic commerce\u201d, Industrial Management & Data Systems, Vol. 101 No. 6, pp. 304\u201014.","DOI":"10.1108\/EUM0000000005580"},{"key":"key2022013020463714700_B47","doi-asserted-by":"crossref","unstructured":"Wasserman, S. and Faust, K. (1994), Social Network Analysis, Cambridge.","DOI":"10.1017\/CBO9780511815478"},{"key":"key2022013020463714700_B48","doi-asserted-by":"crossref","unstructured":"Wellman, B. (2001), \u201cComputer networks as social networks\u201d, Science, Vol. 293, September, pp. 2031\u20104","DOI":"10.1126\/science.1065547"},{"key":"key2022013020463714700_B49","doi-asserted-by":"crossref","unstructured":"Wen, H.J., Chen, H.G. and Huang, H.G. (2001), \u201cE\u2010commerce Web site design: strategies and models\u201d, Information Management & Computer Security, Vol. 9 No. 1, pp. 5\u201012.","DOI":"10.1108\/09685220110366713"},{"key":"key2022013020463714700_B50","unstructured":"Whitley, E.A. (1998), \u201cMethod\u2010ism in practice: investigating the relationship between method and understanding in Web page design\u201d, Proceedings of International Conference on Information Systems, Helsinki."},{"key":"key2022013020463714700_B51","unstructured":"Wiegers, K.E. (1999), Software Requirements, Microsoft Press, Redmond, WA, pp. 37\u201054."},{"key":"key2022013020463714700_B52","unstructured":"Yu, C.C. (2000), \u201cA hypermedia development process for Web information systems\u201d, Proceedings of the International Conference on Electronic Conference, Seoul, pp. 331\u20107."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570310479972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570310479972\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570310479972\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:14Z","timestamp":1753400234000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/103\/6\/398-409\/182324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,8,1]]},"references-count":52,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,8,1]]}},"alternative-id":["10.1108\/02635570310479972"],"URL":"https:\/\/doi.org\/10.1108\/02635570310479972","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2003,8,1]]}}}