How do we trace requirements: An initial study of analyst behavior in trace validation tasks

Wei Keat Kong, Jane Huffman Hayes, Alex Dekhtyar, Jeff Holden

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Traceability recovery is a tedious, error-prone, person-power intensive task, even if aided by automated traceability tools. Human analysts must vet candidate traceability links retrieved by such tools and must often go looking for links that such tools fail to locate as they build a traceability matrix. This paper examines a research version of the traceability tool REquirements TRacing On target (RETRO) that logs analyst actions. We examine the user logs in order to understand how analysts work on traceability recovery tasks. Such information is a pre-requisite to understanding how to better design traceability tools to best utilize analyst time while developing a high quality final traceability matrix.

Original languageEnglish
Title of host publicationCHASE'11 - Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering, Co-located with ICSE 2011
Pages32-39
Number of pages8
DOIs
StatePublished - 2011
Event4th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2011, Co-located with ICSE 2011 - Waikiki, Honolulu, HI, United States
Duration: May 21 2011May 21 2011

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Conference

Conference4th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2011, Co-located with ICSE 2011
Country/TerritoryUnited States
CityWaikiki, Honolulu, HI
Period5/21/115/21/11

Keywords

  • effort
  • logging
  • study of the analyst
  • traceability

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'How do we trace requirements: An initial study of analyst behavior in trace validation tasks'. Together they form a unique fingerprint.

Cite this