{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T02:16:11Z","timestamp":1774318571771,"version":"3.50.1"},"reference-count":156,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100007446","name":"Deanship of Scientific Research at King Khalid University","doi-asserted-by":"publisher","award":["RGP.2\/111\/43"],"award-info":[{"award-number":["RGP.2\/111\/43"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012639","name":"Prince Sultan University for paying the Article Processing Charges (APC) of this publication","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3152073","type":"journal-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T20:43:44Z","timestamp":1644957824000},"page":"30982-31011","source":"Crossref","is-referenced-by-count":15,"title":["A Comparative Systematic Analysis of Stakeholder\u2019s Identification Methods in Requirements Elicitation"],"prefix":"10.1109","volume":"10","author":[{"given":"Fahim Muhammad","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Software Engineering, National University of Modern Languages, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3306-1195","authenticated-orcid":false,"given":"Javed Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, University of Science and Technology Bannu, Bannu, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7331-5351","authenticated-orcid":false,"given":"Muhammad","family":"Assam","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Ahmed S.","family":"Almasoud","sequence":"additional","affiliation":[{"name":"Department of Information System, College of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"given":"Abdelzahir","family":"Abdelmaboud","sequence":"additional","affiliation":[{"name":"Department of Information System, College of Science and Arts, King Khalid University, Abha, Muhayil, Aseer, Saudi Arabia"}]},{"given":"Manar Ahmed Mohammed","family":"Hamza","sequence":"additional","affiliation":[{"name":"Department of Computer and Self Development, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1057\/9781137509888_3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1995.512550"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RePriCo.2014.6895219"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.10.044"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.biocon.2008.07.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/08941920802199202"},{"key":"ref37","article-title":"Stakeholder identification for a structured release planning approach in the automotive domain","author":"marner","year":"2020","journal-title":"arXiv 2011 00227"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72988-4_26"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/1750458918810149"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCSI.2017.8391892"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2015.7393045"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1477-9552.2006.00051.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.01.095"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0069-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2013.07.032"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.256"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048543"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/IEMC.2004.1407508"},{"key":"ref25","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"keele","year":"2007"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.878"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-09-2013-0224"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.015"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3390\/engproc2021007027"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3120177"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-019-00314-z"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110851"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-017-0073-0"},{"key":"ref152","first-page":"3","article-title":"Proposal of metrics for software requirements elicitation in the context of a small-sized software enterprise","author":"pacheco","year":"2021","journal-title":"Proc Int Conf Softw Process Improvement"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-021-00353-5"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69143-1_55"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72660-7_44"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/RE51729.2021.00074"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69717-4_21"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1108\/13552510710735096"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0017-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2017.1313140"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2016.06.201"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3382026.3431249"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICETAS.2017.8277907"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/REBPM.2014.6890730"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016336118528"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2012.06037.x"},{"key":"ref4","first-page":"9","article-title":"Recommended requirements gathering practices","volume":"15","author":"young","year":"2002","journal-title":"Crosstalk"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.059"},{"key":"ref6","first-page":"137","article-title":"Tailoring the software engineering institute&#x2019;s (SEI) capability maturity model (CMM) to a software sustaining engineering organization","author":"drew","year":"1992","journal-title":"Proc Conf Softw Maintenance"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2019.0262"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2016.06.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1108\/BEPAM-06-2014-0030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2016.7856459"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2001.0481"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.136"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2008.05.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4236\/ojbm.2014.21007"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1954824"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1643823.1643912"},{"key":"ref44","first-page":"1","article-title":"Exploration and validation through animation of scenario specifications","author":"gabrysiak","year":"2011","journal-title":"Proc Doctoral Symp 19th IEEE Int Requirements Eng Conf (RE)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.010"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.09.004"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.01.136"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.119"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2016.7753119"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1504\/IJPOM.2015.068002"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6993145"},{"key":"ref129","first-page":"1","article-title":"Requirements prioritization using analytic network process (ANP)","volume":"7","author":"khan","year":"2016","journal-title":"Int J Sci Eng Res"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2741-y"},{"key":"ref128","first-page":"80","article-title":"Evaluation of mutual influences of software quality characteristics based ISO 25010","author":"hovorushchenko","year":"2016","journal-title":"Proc 11th Int Sci Tech Conf Comput Sci Inf Technol (CSIT)"},{"key":"ref70","first-page":"202","article-title":"Stakeholder identification in requirements engineering: Comparison of methods","author":"tovar","year":"2006","journal-title":"Proc Softw Eng Appl (SEA)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.65"},{"key":"ref77","author":"lauesen","year":"2002","journal-title":"Software Requirements Styles and Techniques"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2015.11.06"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334905"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337636"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15538-4_18"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0070"},{"key":"ref78","author":"robertson","year":"1999","journal-title":"Mastering the Requirements Process"},{"key":"ref131","first-page":"2309e","article-title":"Conceptualising, extracting and analysing requirements arguments in users&#x2019; forums: The CrowdRE-Arg framework","volume":"32","author":"ali khan","year":"2020","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0151-6"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2019.00018"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21410-8_40"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-020-00985-w"},{"key":"ref138","first-page":"2309e","article-title":"Conceptualising, extracting and analysing requirements arguments in users&#x2019; forums: The CrowdRE-Arg framework","volume":"32","author":"khan","year":"2020","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2009.5291868"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.28945\/353"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330223"},{"key":"ref62","first-page":"83","article-title":"Stakeholder&#x2019;s evaluation process for GSD based requirements elicitation frameworks","volume":"4","author":"iqbal","year":"2021","journal-title":"Pakistan Journal of Engineering Technology & Science"},{"key":"ref61","article-title":"Understanding the human context in requirements elicitation","author":"fuentes-fern\u00e1ndez","year":"2009","journal-title":"Requirements Engineering"},{"key":"ref63","article-title":"A systematic stakeholder selection model in requirements elicitation for software projects: A systematic mapping study","author":"zhao","year":"2018"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s00766-019-00310-3","article-title":"A method for analyzing stakeholders&#x2019; influence on an open source software ecosystem&#x2019;s requirements engineering process","volume":"25","author":"lin\u00e5ker","year":"2020","journal-title":"Requirements Eng"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.09.005"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2016.726.738"},{"key":"ref141","article-title":"I&#x2019;m not chatting, i&#x2019;m innovating! Locating lead users in open source software communities","author":"breach","year":"2008"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.04.009"},{"key":"ref142","first-page":"59","article-title":"Improving requirements specification in webREd-tool by using a NFR&#x2019;s classification","author":"aguilar","year":"2013","journal-title":"Proc Int Conf Comput Sci Appl"},{"key":"ref67","first-page":"250","article-title":"Selecting the right stakeholders for requirements elicitation: A systematic approach","volume":"33","author":"razali","year":"2011","journal-title":"J Theo and Appl"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"211","DOI":"10.12700\/APH.9.6.2012.6.14","article-title":"Applying model-driven paradigm for the improvement of web requirement validation","volume":"9","author":"arag\u00f3n-serrano","year":"2012","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342477"},{"key":"ref2","author":"pressman","year":"2005","journal-title":"Software Engineering A Practitioner&#x2019;s Approach"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95171-3_26"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955848"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ARTCom.2010.24"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62404-4_50"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-005-4254-x"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1108\/13287261211255365"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/APAQS.2001.990019"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.04.004"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20060034"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232787"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00071-1"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2013.0216"},{"key":"ref91","author":"smith","year":"2000","journal-title":"Project Clarity Through Stakeholder Analysis"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/1-4020-8095-6_48","article-title":"How stakeholder analysis can be mobilized with actor-network theory to identify actors","volume":"143","author":"pouloudi","year":"2004","journal-title":"IFIP International Federation for Information Processing"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2008.11"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/BF02812443"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9533-y"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.2307\/259247"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.18533\/ijbsr.v7i8.1061"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936219"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2017.143.159"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-5999-6"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2003.07.002"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1982143.1982178"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34732-5_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985983"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.36"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.1999.795198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/PICMET.2017.8125350"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12237-013-9703-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2010.25"},{"key":"ref82","first-page":"4","article-title":"Focus issue on legacy information systems and business process engineering: The role of the stakeholder in managing change","volume":"2","author":"coakes","year":"1999","journal-title":"Commun AIS"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1080\/01446193.2017.1411599"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.landusepol.2015.12.032"},{"key":"ref81","first-page":"92","article-title":"A bootstrapping approach for identifying stakeholders in public-comment corpora","volume":"228","author":"arguello","year":"2007","journal-title":"Proc 8th Annu Int Conf Digit Government Res Bridging Disciplines Domains"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.9790\/0661-1557378"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.55"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.075"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00032-6"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232754"},{"key":"ref114","author":"wiegers","year":"2003","journal-title":"Software Requirements"},{"key":"ref113","first-page":"71","article-title":"Cause- and-effect perspective on software quality: Application to ISO\/IEC 25000 series SQuaRE&#x2019;s product quality model","volume":"23","author":"koh","year":"2016","journal-title":"J Inf Technol Appl Manage"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1259199"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881755"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.001"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317449"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2009.02.011"},{"key":"ref121","author":"bittner","year":"2003","journal-title":"Use Case Modeling"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.68"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9677-4"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.42"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-002-0155-8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2001.960592"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09714300.pdf?arnumber=9714300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T14:53:25Z","timestamp":1700232805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9714300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":156,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3152073","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}