Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document
DOI:
https://doi.org/10.21015/vtse.v10i1.920Abstract
The preparation of Software Requirement Specification (SRS) document is a critical task as the successful completion of software depends heavely upon the SRS. The requirements gathering phase in Software Development Life Cycle SDLC is equally important as it witnesses the creation of an SRS document. The quality of an SRS document is dubious as there is a scarcity of proficient inspection methods for detecting the defects in the software. There are various reading based inspection techniques such as Checklist Based Reading technique (CBR), Defect Based Reading technique (DBR) and Perspective Based Reading technique (PBR). There are certain problems with these techniques such as the CBR only covers potential types of defects, The DBR focused on various defects but the problem is that it is not structured in nature. Likewise, PBR is not suitable as it mainly focused on use-cases. As owing to the absence of a suitable inspection technique, the main focus of this study is to highlight the Fagan based inspection technique. This technique is not only formal and lightweight but it also overcome the limitations of reading base d techniques. The Fagan is a structured approach and finds defects in specification, programming code, design and also others during the SDLC. During analysis a questionnaire based survey is conducted in almost 300 national and international software industries. As a result, 150 responses are received. The likert scale is used for developing the questionnaire. SPSS tool is also utilized for data entry and analysis. The consequences are drawn by developing hypothesis and using the Chi-square test. More satisfactory results are gained at international level than at the national level. The satisfaction level of defect detection is 59.2%, time saved is 48.3% and cost reduction is 40.0%. Thus, the obtained outcome is positive and satisfies the requirements.
References
Tian J., Quality Assurance Alternatives and Techniques: A Defect Based Survey and Technique, 3(3), pp. 1-5, 2001.
Alshazly A. A., Elfatatry A. M., Abougabal M. S., Detecting Defects in Software Requirements Specification. Alexandria Engineering Journal, 53(3), pp. 513-27, 2014. DOI: https://doi.org/10.1016/j.aej.2014.06.001
Ibrahim N., Kadir W. M. N. W., Deris S., Halim S. A., Jurnal Teknologi, 13(10), pp. 21–28. 2015.
Fagan E. M., Advances in Software Inspections, IEEE Transactions on Software Engineering, 12(7), pp. 744-75, 1986. DOI: https://doi.org/10.1109/TSE.1986.6312976
Hamid A. I. F. N., Hasan K., Quality Model for Telecommunication Industry in Malaysia. Jurnal Teknologi, 1(5), pp. 13–19, 2013.
Neill O., Issues in Software Inspection. IEEE Software, 14(1), pp. 18-19, 1997. DOI: https://doi.org/10.1109/52.566420
Jeary S., Phalp K., Milsom F., Hughes L., Webster S., Holroyd J., Can using Fagan Inspections improve the quality of specification in 2011? A Case Study, 2011.
Ferreira L. A., MacHado R. J., Silva J. G., Batista R. F., Costa L., Paulk M. C., An apporach to improving software inspections performance, IEEE International Conference on Software Maintenance, ICSM, 2010. DOI: https://doi.org/10.1109/ICSM.2010.5609700
Francisca O. O., Ebere U. G., Automated Visual Software Inspection System : Re-Making the Fagan Methodology, 4(1), pp. 19–24, 2014.
Capers J., Software Defect Removal and Origin Method, pp.1-31, 2012.
Tomar A., Thakare V. M., Identification and listing of factors affecting, pp. 43–47, 2012.
Rattan D., Bhatia R., Singh M., Software clone detection : A systematic review. Information and Software Technology, 55(6), 2013. DOI: https://doi.org/10.1016/j.infsof.2013.01.008
Mustafa A. B., Ghafory H., Investigating the Inspection Effectiveness of Software Requirements Specification with UML Diagrams : A Concept Paper, 4(11), 2013.
Ali D., Javed A., Tanveer A., Saleem S., An Improved, Efficient and Cost Effective Software Inspection Meeting Process, International Journal of Modern Education and Computer Science, 5(2), pp. 48–54, 2013. DOI: https://doi.org/10.5815/ijmecs.2013.02.07
Nayak K. S., Khan R. A., Beg M. R., Requirement Defect Identification : An Early Stage Perspective, International Journal of Computer Science Issues, 9(5), pp. 237–243, 2012.
Suma V., Nair T. R. G., Four-Step Approach Model of Inspection {(FAMI)} for Effective Defect Management in Software Development, 2012.
Taba H. N., Ow S. H., Software Defect Management Using a Comprehensive Software Inspection Model, Software Engineering, 2(4), pp. 160–164, 2012.
Margarido L. I., Faria J. P., Vidal R. M., Vieira M., Information Systems and Technologies (CISTI), 2011 6th Iberian Conference on. IEEE, 1(1), pp.1–6, 2011.
Suma V., Nair T. R. G., Better defect detection and prevention through improved inspection and testing approach in small and medium scale software industry, International Journal of Productivity and Quality Management, 6(1), pp. 71–90, 2010. DOI: https://doi.org/10.1504/IJPQM.2010.033885
Shull F., Feldmann R. L., Seaman C., Regardie M., Godfrey S., Fully employing software inspections data, pp. 243–254, 2012. DOI: https://doi.org/10.1007/s11334-010-0132-1
Kollanus S., Koskinen J., Survey of Software Inspection Research, The Open Software Engineering Journal, 3(1), pp. 15–34, 2009. DOI: https://doi.org/10.2174/1874107X00903010015
Nam J., Survey on Software Defect Prediction. Master’s Thesis. 2009.
Gursimran S. W., Jeffrey C. C., A systematic literature review to identify and classify software requirement errors, Information and Software Technology Journal, 51(7), pp. 1087-1109, 2009. DOI: https://doi.org/10.1016/j.infsof.2009.01.004
Aceituna D., Walia G., Do H., Lee S., Model-based requirements verification method : Conclusions from two controlled experiments. Information and Software Technology, 56(3), 321–334, 2014. DOI: https://doi.org/10.1016/j.infsof.2013.11.004
Aurum A., Petersson H., Wohlin C., State-of-the-art : software inspections after 25 years, 154(2), pp. 133–154, 2002. DOI: https://doi.org/10.1002/stvr.243
Ahmed, K., Myers, T., Wen, L. and Sattar, M. Detecting Requirements Defects Utilizing A Mathematical Framework for Behavior Engineering, 3(3), 2013.
Liu S., Chen Y., Nagoya F., Mcdermid J. A., Formal Specification-Based Inspection for Verification of Programs, 38(5), pp. 1100–1122, 2012. DOI: https://doi.org/10.1109/TSE.2011.102
Shahid A. M. M., Sulaiman S., A Review of Software Operational Profile in Software Reliability Engineering. 8th Malaysian Software Engineering Conference, 1–6, 2014.
Saito S., Takeuchi M., Hiraoka M., Requirements Clinic : Third Party Inspection Methodology and Practice for Improving the Quality of Software Requirements Specifications, pp. 290–295, 2013. DOI: https://doi.org/10.1109/RE.2013.6636732
Saito S., Takeuchi M., Yamada S., Aoyama M., RISDM : A Requirements Inspection Systems Design Methodology, pp. 223–232, 2014.
Faisal M., Beg M. R., Sadia H., An Efficient Approach for Requirement Volatility Identification, 101(15), pp. 88-97, 2014. DOI: https://doi.org/10.5120/17767-8884
Yin Y., Feng Y., Zhang X., Song L., Analysis of Typical Defects in SRS by Taking the Recall Cases as Examples, 642(1), pp. 809–812, 2014. DOI: https://doi.org/10.4028/www.scientific.net/AMM.641-642.809
Rawat S. M., Dubey S. K., Software defect prediction models for quality improvement: A literature study. International Journal of Computer Science Issues, 9(5), pp. 288–296, 2012.
Achimugu P., Selamat A., Ibrahim R., Jurnal Teknologi, 9(11), pp. 127–137, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY