{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T08:58:43Z","timestamp":1768985923955,"version":"3.49.0"},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174229","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":56,"title":["Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes"],"prefix":"10.1109","author":[{"given":"A.M.","family":"Hickey","sequence":"first","affiliation":[]},{"given":"A.M.","family":"Davis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/48529.48533"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/506218.506231"},{"key":"ref33","author":"gause","year":"1989","journal-title":"Exploring Requirements Quality Before Design"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1080\/07421222.2001.11045665","article-title":"An Empirical Investigation of User Requirements Elicitation: Comparing the Effectiveness of Prompting Techniques","volume":"17","author":"browne","year":"2001","journal-title":"Journal of Management Information Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1998.667811"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1998.667822"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200007"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/07421222.1997.11518180","article-title":"Enabling the Effective Involvement of Multiple Users: Methods and Tools for Collaborative Software Engineering","volume":"14","author":"dean","year":"1997","journal-title":"Journal of Management Information Systems"},{"key":"ref35","author":"maciaszek","year":"2001","journal-title":"Requirements analysis and system design"},{"key":"ref34","author":"pressman","year":"0","journal-title":"Adaptable Software Model Preparing for Software Requirements Elicitation"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/52.268953"},{"key":"ref27","author":"robertson","year":"1999","journal-title":"Mastering the Requirements Process"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/382294.382725"},{"key":"ref2","article-title":"The Chaos Report","year":"1995","journal-title":"The Standish Group"},{"key":"ref1","author":"gottesdeiner","year":"2002","journal-title":"Requirements by Collaboration"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267581"},{"key":"ref22","author":"pohl","year":"1996","journal-title":"Process-Centered Requirements Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1994.0035"},{"key":"ref24","author":"loucopoulos","year":"1995","journal-title":"System Requirements Engineering"},{"key":"ref23","author":"thayer","year":"1994","journal-title":"Standards Guidelines and Examples on System and Software Requirements Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1998.667824"},{"key":"ref25","first-page":"19","article-title":"Software Requirements Elicitation: Problems, Tools, and Techniques","volume":"9","author":"playle","year":"1996","journal-title":"Crosstalk"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2307\/249704"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1996.0022"},{"key":"ref10","author":"kotonya","year":"1998","journal-title":"Requirements Engineering"},{"key":"ref11","author":"lauesen","year":"2002","journal-title":"Software Requirements Styles and Techniques"},{"key":"ref40","first-page":"521","article-title":"Criteria for the Selection of a Software Process Model","volume":"1991","author":"alexander","year":"0","journal-title":"Proc of The IEEE Fifteenth Compsac"},{"key":"ref12","author":"leffingwell","year":"2000","journal-title":"Managing Software Requirements"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-1005-7","author":"macaulay","year":"1996","journal-title":"Requirements Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1996.0024"},{"key":"ref15","author":"wiegers","year":"1999","journal-title":"Software Requirements"},{"key":"ref16","article-title":"Managing the Development of Large Software Systems","author":"royce","year":"1970","journal-title":"WESCON '70"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1996.506458"},{"key":"ref18","article-title":"Integrated Scenario and Process Modeling Support for Collaborative Requirements Elicitation","author":"hickey","year":"1999"},{"key":"ref19","author":"graham","year":"1998","journal-title":"Requirements Engineering and Rapid Development"},{"key":"ref4","author":"gause","year":"1990","journal-title":"Are Your Lights On?"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936219"},{"key":"ref6","author":"wood","year":"1995","journal-title":"Joint Application Development"},{"key":"ref5","author":"jackson","year":"2001","journal-title":"Problem Frames"},{"key":"ref8","author":"davis","year":"1993","journal-title":"Software Requirements Objects Functions and States"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(88)90013-1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/21.31050"},{"key":"ref9","first-page":"152","article-title":"Software Requirements Analysis and Specification in Europe: An Overview","author":"goguen","year":"1993","journal-title":"First International Symposium on Requirements Engineering"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.17705\/1CAIS.00107","article-title":"Knowledge Management Systems: Issues, Challenges, and Benefits","volume":"1","author":"alavi","year":"1999","journal-title":"Communications of The Association for Information Systems"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/21.31064"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1201\/9781420041125"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3304-4"},{"key":"ref41","article-title":"The Use of MM-Paths in Constructive Software Development","author":"jorgensen","year":"1985"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/5254.912383"},{"key":"ref43","first-page":"139","article-title":"Pinpointing Requirements","author":"scharer","year":"1981","journal-title":"Datamation"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","location":"Big Island, HI, USA","start":{"date-parts":[[2003,1,9]]},"end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174229.pdf?arnumber=1174229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T14:06:18Z","timestamp":1585836378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174229","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}