Vous êtes sur la page 1sur 14

In Proceedings, Requirements Engineering '93, edited by Stephen Fickas and Anthony Finkelstein, IEEE Computer Society, 1993, pages

152{164.

Techniques for Requirements Elicitation1


Joseph A. Goguen Charlotte Linde
Centre for Requirements and Foundations Institute for Research on Learning
Oxford University Computing Lab Palo Alto, California

Abstract proceeds; i.e., the life cycle phases are a useful scheme
for classifying the activities that occur in system devel-
This paper surveys and evaluates some techniques for opment, but it is far from true that these activities occur
eliciting requirements of computer-based systems, paying in strict linear order. Suchman [43] explains that natu-
particular attention to how they deal with social issues. rally occurring plans are typically used as after-the-fact
The methods surveyed include introspection, interviews, explanations to lend coherence to past events. Indeed,
questionnaires, and protocol, conversation, interaction, requirements are constantly reconsidered in both design
and discourse analyses. Although they are relatively un- and coding, and often activities that can be classi ed as
tried in Requirements Engineering, we believe there is Requirements Engineering are done by programmers and
much promise in the last three techniques, which grew managers relatively near system delivery, or even after
out of ethnomethodology and sociolinguistics. In partic- system delivery. Moreover, much of this work remains
ular, they can elicit tacit knowledge by observing actual undocumented. (See [8] for an ethnographic study that
interactions in the workplace, and can also be applied to supports these assertions.)
the system development process itself.
Once a need is expressed and an initial plan devel-
oped, the requirements team tries to identify what prop-
1 Introduction erties the system should have to meet that need. Note
that setting up a requirements team involves choosing
A basic question in Requirements Engineering is how to representatives of the client; their background knowledge
nd out what users really need. Research has shown that and experience can play a very strong r^ole in the de-
many large projects fail because of inadequate require- velopment process. Relevant properties may include not
ments [5]; moreover, this inadequacy is often related to just high-level functional requirements, but also response
social, political and cultural factors. This paper describes time, cost, security, portability, reliability, and modi a-
and assesses techniques for requirements elicitation. We bility. In addition, there may be requirements for the
rst review some traditional techniques, including intro- development process, such as certain quality control pro-
spection, questionnaires, interviews, focus groups, and cedures, reporting schemes, tools, or limits on cost or
protocol analysis. Then we discuss some techniques from time. Some of these are not easily quanti ed; however,
discourse analysis, which we take to include conversation some imprecision may even be desirable, to accommodate
and interaction analyses, as well as the analysis of dis- the trade-o s that inevitably arise.
course structure. Finally, we compare the various ap-
proaches. There is a fairly large bibliography. The next phase after requirements is \design," where
Developing a large system2 is a complex and dicult engineers try to x the main components of the system,
process. In the early days of computing, there was no par- their requirements, and interactions. This resembles how
ticular organisation to this process: programmers just sat an architect designs a house, once requirements have been
down and tried to write code that would be useful. To- agreed with a client. A more detailed design phase may
day, few doubt that a task that can consume hundreds of follow. (Of course, an actual execution of this idealised
person-years should be carefully planned and managed. plan will generally interleave the various activities.)
Therefore the system \life cycle" has been broken into The analogy with architecture should make it clear
a number of so called \phases," of which Requirements that eliciting requirements can be far from easy: clients
Engineering is the earliest phase3 that lies largely within may change their minds once they see the possibilities
Computing Science. The requirements phase is typically more clearly, and discoveries made during later phases
preceeded by business planning, and is formally initiated may also force retro tting requirements. The require-
by the client. ments of real systems are rarely static. There are very
It is more accurate to view the division of the life cy- good reasons why clients often do not, or cannot, know
cle into phases as a management technique, than as a exactly what they need; they may want to see models, ex-
model of how the system development process actually plore alternatives, and envision new possibilities. Often
2 There is little di erence between the development cycles of software and hardware systems, and most large real systems involve both
aspects.
3 There is no widely accepted terminology for phases, nor even any widely accepted division into phases.
these possibilities are closely intertwined with social, po- only classical experimental psychology (e.g., ergonomics
litical, legal, nancial, and/or psychological factors. For for keyboard layout, or the psychology of perception for
example, certain ways of using a database may be ille- display colours). Many e orts have tried to model the
gal; others may be politically undesirable; some may be cognitive process of individual users, but this approach
incompatible with the corporate organisation of the user has not been very successful with the larger social, polit-
(e.g., they may cross administrative boundaries); others ical, and cultural factors that so often cause failure.
may be too slow unless very expensive equipment is used. Very few system development e orts have tried to use
In the extreme, a project may be doomed, because no sys- any social science methods beyond (for example) elemen-
tem can be built that satis es its requirements or because tary guidelines for the conduct of interviews. Among
the agreed requirements do not re ect the real needs. these, very few indeed have tried to use techniques based
A major goal of Requirements Engineering is to avoid on what we regard as the most promising areas, namely
such problems. This will often involve putting signi cant ethnomethodology and sociolinguistics (see [17, 28] for
e ort into requirements elicitation. Unfortunately, Re- related discussion).
quirements Engineering is an immature discipline, per- It seems worth emphasising that many requirements
haps not entirely unfairly characterised as a battle eld methods available in the marketplace, even though they
occupied by competing commercial methods4 , ring com- may refer to certain social, organisation, or linguistic is-
peting claims at each other, and leaving the consumers sues, do not do so in a systematic manner, and in fact, do
weary and confused. not have any proper scienti c basis at all. Of course, this
is not to deny that there may be a great deal of practical
1.1 Why Social Science? experience behind the recommendations and notations of
some of the better methods, or that they may be useful
The problems of requirements elicitation cannot be solved in many practical situations.
in a purely technological way, because social context is This paper begins to explore a scienti c basis for re-
much more crucial than in the programming, speci ca- quirements elicitation, by considering the basic issue of
tion and design phases. Some Computing Scientists might how to acquire the necessary information. Introspection
think that requirements elicitation is where science stops is undoubtedly the most common current source of infor-
and chaos begins. This raises the fundamental questions mation; but experience shows that it can be very mislead-
of whether there is any order in the social world, and ing. Interviews and questionnaires are also widely used,
if so, how it can be studied. If there is order in the and sometimes protocol analysis is used. Any of these
social world, then a precise understanding of how it is can be useful. But this paper argues that conversation,
constructed and maintained should help with methodol- interaction, and discourse analyses are more detailed and
ogy for requirements elicitation. If not, then requirements precise, and hence likely to be more accurate.
elicitation must remain a mysterious process, fraught with
frequent unexplained failures, and occasional unexplained Acknowledgements
successes.
The premise of this paper, as of social science gener- The rst author wishes to thank Kathleen Goguen for
ally, is that the social world is ordered. We also make many valuable comments on this paper, and the mem-
two further assertions: social order may not be imme- bers of the Centre for Requirements and Foundations at
diately obvious, or immediately describable, by common Oxford for their friendly enthusiasm. Both authors wish
sense; and social order cannot be assumed to have an to thank Dr. Susan Leigh Star for her very helpful com-
a priori structure. Therefore, social order can only be ments on a draft of the paper.
determined by immersion in the actual unfolding of so-
cial phenomena, rather than (for example) by collecting
statistics about the occurrence of certain pre-given cate-
gories. Detailed arguments for these assertions are given
2 Introspection
later. Introspection is the rst and most obvious method for try-
The majority of computer-based systems are devel- ing to understand what properties a system should have
oped without any systematic help from the social sciences in order to succeed. It amounts to imagining what kind
(sociology, psychology, linguistics, anthropology, etc.). of system I would want if I were doing this job, using this
This means that the needs of the user, both as individual equipment, etc. This method can be very useful, but it
and as organisation, are not addressed systematically; in has the problem that the introspection of an expert in a
general, they are only incompletely known to the devel- di erent eld, such as Requirements Engineering, is un-
opment team, and there are often some serious miscon- likely to re ect the experience of actual users. Experts
ceptions. Among the systems that have been developed tend to work from what they remember or imagine of
with some help from the social sciences, most have used themselves; for user interface design, this experience can
4 What we call \methods" are often called \methodologies" by practitioners. But in an academic context, the word \methodology"
should properly be used for the study and comparison of methods, and that is how we use it in this paper.

2
be very far from the questions, assumptions and fears of 3.1 Questionnaire Interviews
actual users. In viewing tapes of novice users learning Questionnaire interviews are very widely used, and have
a new interface, interface designers and cognitive scien- the bene t of appearing scienti c, because they use sta-
tists were consistently shocked by what they saw as in- tistical analysis. The following is from a discussion by
competent and inconsistent behaviour [25]. For example, Suchman and Jordan ([46] p. 232):
experts might be surprised that, when a word processer
does something a user nds surprising, such as centering 1. There is an unresolved tension between the survey
a headline further to the right than expected, the user interview as an interactional event and as a neutral
does not attempt to understand why; in fact, users seem measurement instrument. On the one hand, the
to believe that computers just are sometimes puzzling or interview is commonly acknowledged to be funda-
irritating, and that it is not necessary or valuable to ex- mentally an interaction. On the other hand, in the
plain why. Cognitive scientists may be surprised at this, interest of turning the interview into an instrument,
because their model suggests that a user who nds that many of the interactional resources of ordinary con-
a model is incorrect should correct the model. Designers versation are disallowed.
may be upset because they feel that the subjects are not
using their designs correctly. 2. The success of the interview as an instrument turns
on the premise that (a) relevant questions can be
Similarly, requirements engineers cannot introspect decided in advance of the interaction and (b) ques-
what work settings look like, or the conditions under tions can be phrased in such a way that, as long as
which a new technology will be learned. For example, they are read without variation, they will be heard
many subjects must learn to use new technology in con- in the intended way and will stimulate a valid re-
ditions that require multiple and ongoing splitting of at- sponse.
tention. However, requirements rarely take account of
this. 3. The premises of 2. fail insofar as (a) topics that
come from outside the conversation run the risk of
Finally, we note that the phrase \naive user" can con- irrelevance, and (b) as an ordinary language pro-
fuse the issue. So called naive users are often experts in cedure, the survey interview is inherently available
their own speciality, about which the requirements engi- for multiple interpretations of the meaning of both
neers are naive. Although this is obvious, the point is questions and answers.
that the phrase focuses attention on the users' relation to
the new technology, and may suggest that the users' task 4. Compared with ordinary conversation, the survey
is to learn the technology properly and fully, instead of interview suppresses those interactional resources
just doing their own job better using the new technology. that routinely mediate uncertainties of relevance
We conclude not that introspection is an inadmissible and interpretation.
method, as claimed by many current psychologists, but Suchman and Jordan [46] argue that validity is not as-
rather that introspection without careful consideration of sured by having the same words repeated to subjects in
its limits can be (and often is) highly inaccurate (an in- each interview, because these words will mean di erent
teresting discussion of introspection can be found in [47]). things to di erent people in di erent contexts. In nor-
Hence, we suggest that if there is room for doubt, intro- mal interaction, these issues of interpretation are nego-
spection should be checked by some of the more empirical tiated between participants; but in a survey interview,
methods described below. the method and training given to interviewers speci cally
forbids such negotiation. The following example should
make this point more vivid [46]5 :
I: Generally speaking, do you usually think of yourself
3 Interviews as a Republican, Democrat, Independent, or what?
R: As a person.
Interviews are used in an extraordinary variety of do- I: As a Republican::
mains, and are often quite successful; see [30] for a good R: No.
survey. This section discusses questionnaires, open ended I: Democrat::
interviews, and focus groups, showing that the inter-
view process involves some (usually unstated) assump- R: No.
tions about the interaction between interviewer and sub- I: Independent or what.
ject. We argue that some of these assumptions are quite R: Uhm:: I think of myself as a (pause) Christian.
problematic, and raise doubts about using these methods I: Okay. (writing) But politically, would you have any
for some applications. particular:: (inaudible)
5 In this transcription system, colons after a sound indicate that it is lengthened, and the number of colons indicates the degree of
lengthening.

3
R: I am one of Jehovah's Witnesses so, you know, when problem; also, philosophers speak of tacit knowledge. The
it comes to:: moral is this: Don't ask people to describe activities that
I: I see. they do not normally describe, or if you do, then don't
R: So I'm, I am acclimated toward government, but it believe the answers.
is that of Jehovah God's kingdom.
I: Yes. Now let us consider interview questions that people
Here, the interviewer presupposes a system of political can and do answer in what seems a useful way, and ask
categories, and asks the respondent to choose one for self how this compares with their practice; we must consider
identity. But the respondent does not share this system, not only the practice that they describe, but also their
and thus cannot choose. This mismatch could be the be- discourse practice. For this, we must compare the dis-
ginning of an interesting exploration of the respondent's course produced when the topic is elicited with that pro-
religious and political categories, and in an ordinary con- duced in a related but non-elicited situation; that is, we
versational situation, probably would be. But because ask whether the interview data is the same, is wholly dif-
this is forbidden for survey interviewers, this fascinating ferent, or bears some partial but regular similarity to the
informant probably ends up as a bleached \Don't Know" non-elicited speech. One approach is to observe sponta-
or \Other." The point is a general one: categories and neous speech. For example, in studying apartment layout
concepts that are transparent to one community can be descriptions, we can observe whether they occur in spon-
entirely opaque to members of another community, and taneous speech, and whether they are the same or closely
the fact that this opacity exists may not be noticed in the similar to instances gathered in an interview situation
course of discussions unless speci c attention is paid to [23, 27]; such informal checking must be done after the
the possibility. actual analysis of elicited data has suggested some struc-
Here is another example (cited in [30]) of an answer tures of interest, because memory for linguistic structure
that must be classi ed as \other": in natural settings is generally not suciently reliable. In
practice, such observation requires interest in the adven-
I: Are you a virgin? tures of friends searching for apartments, and following
R: Not yet. strangers down the street when their conversation turns
to this topic. Such are the exigencies of empirical re-
3.2 Open Ended Interviews search.
The open ended interview is much used in anthropology It is even better to compare interview data with
and psychology, and avoids many problems of the ques- recorded, non-elicited data, to see if they are usably simi-
tionnaire method. In it, the interviewer poses a question, lar. For example, [51] shows that elicited narratives di er
and then allows subjects to answer as they wish. The in- from spontaneously produced narratives on a ne level of
terviewer may probe for more detail, but does not set the detail, including use of the historical present tense. This
terms of the interview. This sounds much more benign di erence arises because performing a narrative, so that
than the survey interview, but the issues of whether the the addressee can visualise the event, encourages use of
question asked can be answered at all, and whether the the historical present. Performed narratives are much
answer is part of the normal discourse repertoire of the more likely to be produced when the speaker and ad-
speaker, still remain. dressee share characteristics such as age, occupation or
Let us rst consider questions that cannot be an- ethnicity, or when they are friends. Because these char-
swered at all. For example, in linguistics and education acteristics are not likely to be shared by participants in
research, subjects are sometimes asked how they tie their an interview situation, the tense system will be at least
shoelaces. This produces some marvelous examples of slightly di erent. Similarly, the form of evaluation (see
linguistic incompetence. But there is no reason why sub- Section 6.2) in elicited narratives may di er from that of
jects should be competent at this task, because people do spontaneous narratives, because spontaneous narratives
not tell each other how to tie bowknots | rather, it is can include negotiations between the primary speaker and
taught by showing. (But a sailor or a ship model maker other interlocutors that an interviewer may be unwilling
may give a much more competent performance, because to undertake, for fear of biasing the data.
these experts have vocabulary for knots and the parts of
knots.)
Let us generalise. People know how to do many things Whether such di erences matter depends on the na-
that they cannot describe. It is a commonplace in ethnog- ture of the investigation, and must be determined for each
raphy that people's descriptions of how they weave a bas- case. If nely detailed data is needed, then elicited narra-
ket or choose a chief or write a program bear a complex tives cannot be considered identical to spontaneous nar-
and opaque relation to how they can be seen to do these ratives. But if only less detailed, or higher level structure
things when they are observed. This problem is so famil- is needed, then open ended interview data may be ade-
iar that it has a nickname in social science: the say-do quate.

4
3.3 Focus and Application Development agree to a design that fails to satisfy them when built.
Groups The Workplace Project7 [7, 44, 45] found a case where
some workers who wanted a space for working together,
The focus group is a kind of group interview, rather agreed to a protruding addition to a long tabletop. How-
widely used in marketing research [42], but less used in ever, when built, the angle of the protrusion made it
pure social science research ([29] gives a favourable re- harder to view documents jointly than before.
view of the potential of focus groups in social science). Similar issues arise in requirements elicitation, be-
In this technique, groups are brought together to discuss cause requirements engineers often come from commu-
some topic of interest to the researcher. In market re- nities with di erent values, assumptions, concerns, etc.
search, this is often done using stimulus materials such as from those of users. For example, [6] describes a case
lms, story boards, or product mockups as a focus (hence where two management information consultants working
the name), and is commonly used to get the opinions of for a large U.S. university encounter diculties in pro-
representative potential customers on new products. moting schemes to help students, and then explain those
Focus groups have the advantage of allowing more diculties with the theory that the administration is re-
natural interactions between people than questionnaire ally concerned with \the care and feeding of the faculty,"
interviews, or even open ended interviews. However, the but cannot say so because this con icts with the univer-
groups are usually not natural communities, such as peo- sity's ocial mission statement.
ple who eat lunch together, or all the purchasing agents Questionnaires, administered either orally or in writ-
of a particular corporation, but rather are an ad hoc col- ing, are often used in Requirements Engineering to de-
lection, constituted for the occasion by the researcher, termine characteristics or concerns of user populations.
usually on the basis of demographic considerations. Fur- They can be useful when the population is large enough,
ther, although focus groups may be valuable for elicit- and the issues addressed are clear enough to all concerned.
ing responses to products whose features and trade-o s However, they will fail when subjects are asked about top-
customers understand (for example, whether they would ics that they do not have ways to talk about, or do not
be willing to pay more for upscale gourmet dog food for want to talk about.
their Dobermann Pinschers), they are not useful in elic-
iting opinions on design issues where the subjects are not
experts, and therefore must respond within the categories
and structures provided by the researcher.
4 Protocol Analysis
So called JAD or RAD groups6 have recently become Protocol analysis asks a subject to engage in some task
popular in Requirements Engineering, especially for In- and concurrently talk aloud, explaining his/her thought
formation Systems applications, because of their claim to process. Proponents claim that this kind of language can
greatly accelerate the development of requirements [1]. be considered a \direct verbalization of speci c cognitive
This method is closely related to focus groups, and can processes" ([12], p. 16). Protocol analysis is also used to
be expected to su er from some of the same problems. In re ect on problem solving, or some other task, retrospec-
particular, participants will certainly be unable to artic- tively, i.e., after it has been accomplished. This section
ulate tacit knowledge. Also, even though group facilita- considers concurrent talk-aloud protocols, because they
tors try to avoid imposing their own categories on partic- are more common; however, we note that the arguments
ipants, there is no guarantee that the participants will in of previous sections apply to the retrospective approach.
fact share categories with each other. Moreover, because There seem to be two main arguments for talk-aloud
participants may have widely di erent status within the protocols: that they are possible, and that they work.
organisation, there is a danger that some will not feel free The argument for possibility must overcome arguments
to say what they really think, especially if it is unpopu- in psychology about the method of introspection used in
lar. Finally, it will often be dicult for non-technical par- the nineteenth and early twentieth centuries. It is claimed
ticipants to assess the signi cance of technical decisions. [32] that the arguments against introspection do not ap-
Although this method appears promising, we believe its ply, because the subject is not introspecting, but rather is
potential limitations should be studied empirically. emitting a stream of behaviour that does not di er in kind
from producing a galvanic skin response or a muscular
3.4 Discussion movement. Therefore, talk-aloud protocols are possible
data in the framework of behaviourist psychology.
Interview methods can fail if the interviewer and respon- The argument that protocol analysis works in [12] is
dent do not share a category system. For example, be- based on the apparent success of the GPS (General Prob-
cause the clients of architects are usually unfamiliar with lem Solver) system. GPS was originally developed as a
the conventions of architectural drawings, they can easily research vehicle for problem solving in Arti cial Intelli-
6These acronyms stand for Joint Application Development and Rapid Application Development, respectively.
7This study, conducted by Xerox Palo Alto Research Center, used as its data an airline operations room that was redesigned for a
move to a new terminal.

5
gence. It reduces goals to subgoals, and then attempts ti cially simple and arti cially without social context) to
to solve each subgoal that remains open by reducing it impose their preconceptions on the data.
to further subgoals, until all subgoals are solved. In [32], Beyond this demonstration of its fallibility, one can
the goals are to deduce certain symbolic logic expressions give two further arguments against protocol analysis, one
from others, and the transformations are certain elemen- general, and one speci c to requirements. The rst argu-
tary steps of deduction8 . ment is this: As we have said, the assumption in staging
The results of this research have not stood the test of and studying protocols is that people can produce lan-
time. Even within the Arti cial Intelligence community, guage that gives a trace of autonomous cognitive activ-
it is hard to nd researchers who still believe in top down ity. The problem with this assumption is that language
backtrack problem solving that is driven simply by match- is intrinsically social, created for a partner in conversa-
ing rules to goals to generate subgoals. For example, in tion. (This property is called recipient design in conver-
motion planning, e.g., for robots, it is becoming increas- sation analysis.) When an experimenter asks a person to
ingly clear that developing a complete plan in advance solve a problem and talk aloud, then that person has to
of execution is dicult, inecient, in exible, and does imagine an experimenter with certain desires, and try to
not correspond to how humans carry out actions. For the provide what the experimenter wants. (Or the subject
rst point, studies in computational complexity show that may be rebellious, and try to frustrate the imagined ex-
producing complete, precise mathematical plans is an in- perimenter.) Thus, protocols are an unnatural discourse
tractable problem [9]. For the second, it has been found form, and moreover, are unnatural in ways that are di-
that inexact, heuristic methods work better; indeed, so cult to specify.
called \opportunistic planning," which produces partial Let us consider the protocol given by Newell and Si-
plans, and then incrementally replans in response to new mon [32], produced by a student doing a problem in ele-
information, works much better in practice, because the mentary symbolic logic:
sensory information and background knowledge available
to robots (as to humans) is generally inexact, incomplete, Well, looking at the left hand side of the equation,
ongoing, and subject to change. For a detailed summary rst we want to eliminate one of the sides by using
of recent research on human planning, see [43]. rule 8. It appears to be too complicated to work
Even in mechanical theorem proving, where the dif- with rst. Now | no, | no I can't do that because
culties of being embedded in the physical world do not I will be eliminating either the Q or the P in that
arise, current research uses a variety of heuristics, and total expression. I won't do that at rst. Now I'm
also employs techniques that support exible replanning looking for a way to get rid of the horseshoe inside
| as do human mathematicians. No current generation the two brackets that appear on the left and right
Arti cial Intelligence systems bear more than a super - sides of the equation. And I don't see it. Yeh, if
cial resemblance to GPS. Prolog [10], which at rst glance you apply rule 6 to both sides of the equation, from
might seem similar, in fact di ers greatly in that it has there I'm going to see if I can apply rule 7.
logical variables, uni cation, cut, and other non-logical I can almost apply rule 7, but one R needs a tilde.
features to force evaluations that are not top down. (See So I'll have to look for another rule. I'm going to
[4] for a survey of mechanical theorem proving systems.) see if I can change that R to a tilde R. As a matter
In fact, protocols were not used inductively for devel- of fact, I should have used rule 6 on only the left
oping GPS; rather, GPS was developed on the basis of hand side of the equation. So use rule 6, but only
a priori principles about mathematical problem solving, on the left hand side.
and then used as a basis for describing and critiquing the Now I'll apply rule 7 as it is expressed. Both | ex-
arguments in empirically obtained protocols. Of course, cuse me, excuse me, it can't be done because of the
GPS was a signi cant advance in its time, and indeed, had horseshoe. So | now I'm looking | scanning the
to be explored thoroughly before moving on. We have no rules here for a second, and seeing if I can change
wish to minimise its historical importance in Arti cial In- the R to a tilde R in the second equation, but don't
telligence, or its in uence on cognitive psychology, both of see any way of doing it. (Sigh.) I'm just sort of lost
which were considerable. However, we do wish to point for a second.
out that its claims about human problem solving were
wrong, even allowing a narrow interpretation of its do- There are speci c linguistic features demonstrating the
main, as were its claims about ecient mechanical prob- unnatural provenance of this passage. First, it uctu-
lem solving. This implies that the experimental method ates between the language of talking to oneself and the
used must have been awed, and that is our main point: language of talking to an interlocutor who is physically
protocol analysis is not a reliable guide to what subjects present and involved. One sign of this uctuation is the
are thinking, and is open to serious misinterpretation by shift in pronoun choice: \we," \I," and \you" all appear.
analysts, who can choose a small sample of protocols (just \You" seems to be the rst choice in language that is
one was used in [32]!) for an unrealistic problem (both ar- speci cally produced to be understood by an overhearer
8 The anthropomorphic language used here is just a convenient shorthand for sketching the design of a computer program.

6
as talking to oneself. A rst person plural expression like nities about the nature of research.
\ rst we want to eliminate one of the sides by using rule We have previously asserted the orderliness of the so-
8" is much more characteristic of a lecturer talking to an cial world as a working principle; we will now examine in
audience. Similarly, the use of impersonal constructions, detail how certain aspects of social order are produced.
such as \Well, looking at the left hand side" in the rst Conventional approaches in sociology, anthropology, and
sentence, and \It appears to be" in the second, is charac- the other social sciences assume pre-existing categories,
teristic of the language of successful science [20]. Phrases such as social class, norm, r^ole, etc., and then explain the
like \excuse me, excuse me, it can't be done because of observed social order as a re ection of these categories
the horseshoe" are produced for an interlocutor; it is in- in practice. However, this approach does not explain how
coherent for a speaker to provide this kind of excuse to pre-given categories can act upon the moment to moment
him/herself. Finally, a phrase like \I'm just sort of lost world of practice, to produce the order we observe. This
for a second" may most naturally be interpreted as an critique of traditional social science is relevant to require-
excuse to an interlocutor for a pause. In particular, note ments elicitation because most existing approaches are
that the phrase \for a second" functions as a mitigation based on it. If we are right, then the results of require-
of the diculty, as a kind of excuse for the pause, rather ments studies that assume pre-given categories can easily
than as a bare description of a mental state. be more inaccurate and misleading than necessary.
The most telling argument against protocol analysis Ethnomethodology [13] and conversation analysis
is that it does not work, as demonstrated by its use to (which grew out of ethnomethodology) arose in response
support GPS as a model of human problem solving, once to these problems. These elds consider that social order
considered a spectacular success, but now seen to be a is accomplished by members in their moment by moment
failure. Moreover, protocol analysis is based on a sim- activities. For example, consider a seminar. Although
plistic cognitivist model of human thinking as essentially the word \seminar" suggests a pre-existing category, it
computational, involving abstract representations of con- is in fact constructed by the members' furnishing of a
cepts, and their transformation by algorithms that are room, or choice of a room furnished in a certain way, in
precisely speci ed by computer programs (e.g., see [31]). the arrangement of chairs, in the orientation of partici-
Finally, even if it were possible to get a trace of a pants towards someone understood to be the speaker, in
speaker's autonomous cognitive activity, such an object the allotment of a very long turn to the speaker, etc. It
would be inappropriate for the requirements process, be- is the work of the participants that makes a seminar, not
cause the client does not have any pre-existing mental the category of \seminar" that makes the participants
model of the desired system. Rather, the client has knowl- behave in a speci ed way. The view that social order is
edge about business and organisational needs, while the constructed by participants' actions, rather than being a
requirements team has knowledge about technical pos- pre-existing category that shapes people's actions, may
sibilities. The process of producing requirements from be unfamiliar to many readers, and adopting it may re-
these two di erent kinds of knowledge is necessarily con- quire a di erent approach to studying social phenomena.
versational, because they must be combined. Thus, the This section discusses some fundamental premises that
requirements problem is intrinsically social, and cannot underlie ethnomethodology, using examples from a vari-
be solved using only methods that take individual cogni- ety of elds, because the necessary research has not yet
tion as fundamental. been done in the Requirements Engineering setting.

5 The Question of Social Order 5.1 Natural Setting


To understand social order as an accomplishment of par-
We have now surveyed a number of methods, and dis- ticipants, we must study it in natural settings. A lab-
cussed some problems that arise from their underlying oratory setting is constructed by an experimenter for a
assumptions. The methods surveyed so far all impose an particular purpose, and it is considered bad experimental
analyst's order on the social world, with no guarantee that technique to reveal that purpose to the subjects. How-
this is the same as the order that members perceive, and ever, because humans are above all sense-making animals,
with no way of even posing this as a research question. they do not just sit with blank minds in a white room,
Note that the question of whose social order is assumed passively enduring whatever comes. Rather, they con-
can be signi cant in requirements elicitation, where peo- tinuously try to construct an understanding of the sit-
ple from two or more possibly very di erent communities uation they are in, and then use this understanding to
try to craft an understanding that is workable for all of shape their behaviour as participants in the experiment,
them. An interesting discussion of some communication whether cooperative or subversive. Although the exper-
diculties between sociologists and computer scientists imenter has control over the experimental setting, this
is given in [36], based on actual experience at Lancaster does not determine what kind of sense their subjects make
University; one source of these diculties appears to be of it. Therefore, we may not get reliable results on the sit-
the very di erent assumptions made in these two commu- uation the experiment was intended to elucidate, because

7
we do not know what setting the participants think they textualised from the relation between speaker and hearer,
are in, and their construction may well be very di erent their relative states of knowledge, etc. ([40], pp. 57{98).
from the setting that the experimenter had in mind.
For example, early studies of American black chil- 5.2 Member's Categories
dren's language argued that these children had a language
de cit, and that sound educational policy required teach- Perhaps the most important notion underlying the anal-
ing them how to speak [3]. This research was based on ev- ysis of social order is that of member's categories. This
idence from experimental settings, in which a single child notion comes from ethnomethodology and conversation
was brought into a room with an adult experimenter, usu- analysis. The idea is to nd the categories that members
ally white, shown some toy, like a plastic spaceship, and themselves use to order their social world, rather than to
asked, \Now Johnny, I want you to tell me everything impose an analyst's order on it. For example, it is not
you can about this spaceship." In this context, the chil- useful to approach a given piece of interaction with the
dren tended to give short, simple, minimal descriptions, assumption that participants are doing a shockingly bad
with an uncertain intonation, such as [3] \It's red? [Long job of whatever it is the analyst decides they are doing.
pause] An' uh [pause] it's pointy?" Rather, it is important to determine what the partici-
Looking at such responses, especially in contrast with pants are actually doing. The fundamental idea is that
the uent responses of middle class white children, one the social world is already orderly, and this order is an
might well be tempted to say that the black children on-going creation of the participants. Further, we as ana-
needed to be taught how to talk. However, a di erent lysts don't know in advance what the relevant categories
view was taken by Labov [21]. He went into a classroom are, so we should not come to the data with a pre-given
with a rabbit and tape recorder, and told the children coding scheme.
that the rabbit was shy and needed to be talked to so that For example [25], consider a party of eight people at
it wouldn't be frightened. Then he and the teacher left a restaurant after a conference session. An analyst could
the room. The language produced in this setting was ex- use any number of category systems, e.g., three Xerox
tensive, uent, and of startlingly greater complexity and employees and ve non-Xerox employees, seven employ-
competence than in the arti cial test situation described ees of large organisations and one self-employed person,
above. four people who had just given a paper and four who had
Such ndings raise two important questions: \What not, one person who was pregnant, and seven who were
is the di erence between the two settings?" and \What not, four with blue eyes and four with brown eyes, six
causes the di erence between the performance of black people who drank and two who did not, or one man and
and white children in the arti cial test setting?" The seven women. And of course this list could be multiplied
original test setting is so familiar and unproblematic to inde nitely. The analyst needs to know what categories
academics, who have had a lifetime of dealing with it, are relevant, and what relevance might mean. The notion
that we must pause to consider what it might mean to of members' categories implies that the analyst should
a black child. The child is asked to describe an object consider what categories the members themselves use to
to a questioner who is at least as capable of seeing and organise their interaction, that is, what categories they
describing it, because he owns the object. This is very orient to. Thus in this situation, participants oriented to
di erent from the most common form of question, where the category of pregnancy or non-pregnancy in deciding
the speaker does not know the answer, and has reason whether to take a taxi to the restaurant. They oriented to
to believe that the hearer may. In a situation of such the nature of the participants' employers in determining
an enormous power di erential | black child and white what kinds of receipts were required. The waiter oriented
adult | the child in fact shows considerable social under- to gender (and to recent developments in understanding
standing in deciding that minimal talk is the least dan- the economic consequences of gender) in placing the bill
gerous policy. That is, because the child does not under- in the center of the table facing the one man in the party,
stand the desire of the experimenter, he cannot construct but not within his immediate reach. There was no evi-
the appropriate response, which in this case is to describe dence that eye colour was an organising category for any
the object as if the experimenter could not see it and had activity.
never seen it before. It might be objected that white mid- Let us consider further what it means for a phe-
dle class children of a similar age can do just this kind of nomenon to organise an activity. The analyst should state
task. However, this does not show that their language what level of activity is of concern. There are striking
abilities in general are greater. Rather, there is evidence phenomena that do not organise interaction at any level
that middle class white parents train children in just such we care about. For example, a video of people interacting
decontextualised descriptions as a preparation for school: may clearly reveal particular ways that women with long
\Look at the kitty. What colour is the kitty?" Because nails and manicures use their hands, to protect their nail
the mother can see the kitty as well as the child, she does polish, which is easily chipped. But there is no evidence
not need to be told that it is grey. But she is preparing that other participants relate to this way of using the
the child for this kind of school question, which is decon- hands, or orient to it in organising their interaction. For

8
example, they do not pass objects to one another di er- make sense of their world. To a great extent, this comes
ently depending on whether the recipient has a manicure. from the desire to be as \scienti c" as the hard sciences,
However, an analysis of this way of using the hands may which are taken as prototypical of how to do science, com-
be very relevant to the design of certain products, partic- bined with a fundamentally awed understanding of how
ularly packaging. research is conducted in the hard sciences. The naive
It is implicit in the notion of members' categories as view of the hard sciences is that they achieve objectivity
organising activity that analysts do not reconstruct in- by banishing the experimenter from the experiment. But
tentions or mental processes, except in so far as these are it is well known in quantum mechanics that measurements
evident to those involved in the activity. Thus, if someone necessarily disturb systems, and it is also widely recog-
starts writing on the upper left corner of a white board, nised in the philosophy of science that all measurements
we can say that this action projects that the board will are necessarily made in the context of some theory, held
probably be covered. by some theorist [22]. Thus the \method" of science that
Another example is body torque: a posture in which is used by traditional social science as a model does not
and legs face front while the head and shoulders, or head hold even in the sciences that are taken to be exemplary.
shoulders and trunk, are turned sideways. This posture This model of objectivity has always been dubious
requires considerable muscular tension to hold for a long in social sciences such as anthropology and sociology in
period. Therefore, conversations in torque, in which one which participant observation is a key method. Partic-
interlocutor is partially turned towards another, are likely ipant observation is a method in which the observer at-
to be short. Thus, if a visitor walks into the oce of tempts to become part of the community of interest, by
someone working at a terminal, and the occupant turns developing a legitimate r^ole within that community. For
his head and neck to greet the visitor while leaving his example, researchers have apprenticed as a mid-wife, jazz
hands on the keyboard, the visitor can project that a musician, waitress, etc. Recently, the post-modern move-
short conversation is likely [18, 39]. ment in ethnography has studied the process of becoming
This illustrates the demonstration of intention that is a member, and the assumptions that underlie the belief
needed for this kind of analysis. Analysts cannot simply that the ethnographer has become a member (e.g., [19]).
construct subjects' mental models or intentions. Rather, The assumption that social science methods di er
it is necessary to demonstrate what participants are do- from those used by the people studied is challenged by
ing that allows other participants to infer their intentions. ethnomethodology, which argues that social scientists em-
Thus, the activity of the analyst in postulating intentions ploy the same kinds sense-making activities as members
is not di erent from that of the participants, and pro- of the culture studied [13]. This argues against scienti c
ceeds on the same evidence. This leads to the discussion objectivity, or at least, against the claim that analysts
of members' methods. have a unique access to objectivity.

5.3 Member's Methods 6 Discourse Analysis


Suppose you are a musician who wishes to study Balinese Within linguistics, the phrase \discourse analysis" is used
music. One approach is to transcribe Balinese pieces on most broadly to describe the study of structures larger
Western music paper, based on the modern Western 12 than the sentence. This section describes both interac-
tone equal tempered scale. This would lead you to con- tional and linguistic approaches to such structures. The
clude that Balinese scales are wrong, in that some notes interactional approaches arise from ethnomethodology,
are a little too at, and others a little too sharp. Sim- and illustrate how social order is reproduced in the par-
ilarly, you might conclude that Balinese rhythmic and ticular but very important domain of conversation. The
musical structures are awed and \primitive." But is this linguistic approaches arise from sociolinguistics, and con-
the right method for studying such music? In fact, Ba- cern the internal structure of certain discourse forms.
linese musicians are highly accomplished, and have their
own methods for teaching their music. They also have 6.1 Conversation Analysis
their own musical theory, according to which their scales,
rhythms, and structures are correct; they do not orient Conversation Analysis grew out of ethnomethodology (see
to the twelfth root of two. (See [2] for a discussion of Ba- Section 5). It attempts to describe the underlying social
linese musical practice.) But in the nineteenth century organisation that makes conversation orderly and intelli-
and before, ethnocentric approaches were the norm, and gible. Conversation is one of the most prevalent yet in-
non-Western culture was systematically devalued by such visible forms of social interaction, and may be considered
analyses. This paper suggests that similar things may be typical of how people construct their world in an orderly
going on in much of today's Requirements Engineering. way [16].
Much traditional social science is based on a social Conversation is a folk term for activities that mem-
scientist who stands outside the situation, using methods bers might describe as sitting around and chatting, just
di erent from those used by the members of the culture to talking, socialising, etc. However, as a technical term in

9
Conversation Analysis, conversation is that interactional noticeable absence. At any point in a conversation, the
system in which turns are not preallocated, i.e., in which range of things that are not said is in nite; but because
the order of interaction is negotiated in real time, as the the rst pair part projects (or sets up the expectation of)
conversation procedes. By contrast, in forms of interac- the production of the second pair part, we can notice its
tion such as debates, rituals, and seminars, the order of absence. In fact, we as analysts can see speakers orient-
events, speakers, etc. is prearranged. For example, the or- ing to such an absence; for example, someone might say,
der and the orderliness of a church service is not produced \Don't you say hello?" in response to the absence of a
by the participants in the course of enacting it; there is second greeting. Such a response from a speaker shows
no on-the-spot negotiation of whether the sermon shall that adjacency pairs are not merely a construct of the an-
precede or follow the collection. alyst, but in fact are categories that speakers themselves
use to organise their conversations.
6.1.1 Turntaking
Within conversation, turntaking is the basic system for 6.2 Discourse Units
creating social order. The order that it creates is the nor- Another approach within linguistics that is relevant for
mative form of conversation: there should be one speaker requirements elicitation is the study of the discourse unit ,
at a time, with no gaps or overlaps [38]. It is important the linguistic unit directly above the sentence. Some very
to note that what counts as a gap or overlap is culturally common examples of the discourse unit that have been
determined [41]. For example, what sounds like a long studied extensively are the oral narrative of personal ex-
pause for a New Yorker may be barely noticeable for a perience [21, 24, 35], the joke [37], the explanation [15],
New Englander. the spatial description [23, 27], and the plan [26]. As a
In brief, to achieve turntaking, the current speaker structural unit, the discourse unit has two criterial prop-
speaks until he/she comes to a possible turn-transition erties: it has de ned boundaries, and a describable inter-
place, i.e., a point which is semantically and syntactically nal structure.
a possible end of sentence. Then he/she may select an-
other speaker, either verbally, by gesture, or by eye gaze, The property of de nable boundaries means that the
or another participant may self-select as the next speaker, discourse unit is a bounded unit ; for example, with some
or there may be a gap, i.e., a silence long enough in the interesting exceptions, we know when a speaker is or is
particular culture to be noticed as such. The speaker may not engaged in telling a narrative. Of course, there may
then continue, so that the possible between-turn gap be- be boundary disputes, either at the beginning, during
comes a within-turn gap. When there are overlaps, i.e., which a speaker negotiates with hearers whether the nar-
when two speakers speak at once, one drops out. rative will be told, or at the end, where the speaker may
The important point is that turntaking is achieved in negotiate the proper response to the unit with hearers
the moment by moment interaction of the participants. It [37, 34, 35]. However, such negotiations do not mean
is not the case that there are certain rules that de ne the that the unit is not structurally bounded. Rather, they
set of all possible conversations; rather, the application of imply that the establishment of boundaries is a social con-
rules to particular situations is a matter of on-going work struction, with serious social consequences for how the
by the participants, who may, for example, negotiate the interaction can proceed.
status of a particular silence. One important e ect of establishing of the boundaries
of a discourse unit concerns turntaking. As we have seen,
6.1.2 Adjacency Pairs other things being equal, the sentence is the potential
unit of turn exchange; i.e., a second speaker may begin
While turntaking is an important part of the syntax of to speak when the rst speaker has reached a permissible
conversational organisation, adjacency pairs are a par- end for his sentence. However, if the rst speaker has
tially syntactic, partially semantic organisational struc- negotiated permission to produce a recognised discourse
ture. An adjacency pair is a pair (or larger set) of ut- unit, such as a joke or a story, then that speaker has the
terances \whose central characteristic is the rule that a oor until the unit is completed. A second speaker may
current action (a ` rst pair part' such as a greeting or contribute questions, appreciations, side sequences, etc.,
question) requires the production of a reciprocal action but the discourse unit and topic in progress will not be
(or `second pair part') at the rst possible opportunity changed until the unit is recognised as completed.
after the completion of the rst" ([16], p. 287). The second important property of the discourse unit
Examples are sequences like question-answer and is that it has a precise internal structure that is just as
greeting-greeting, where one speaker's production of a describable as sentential syntax. The description of this
question or greeting projects another speaker's produc- internal structure is necessary for understanding the in-
tion of an answer or second greeting. teractional process of discourse construction, because the
Once a speaker has produced the rst part of an adja- task of hearers is quite di erent, for example, in di erent
cency pair, the second pair part can be noticeably absent. sections of a narrative. Moreover, discourse structure can
It is important to distinguish between an absence and a be described with just as much mathematical precision as

10
sentential syntax (see [26, 15] for some appropriate math- r^oles. A successful interruption is an example of a vio-
ematical apparatus). lation of a speaker's turn in which participant A begins
We expect that narratives will be particularly impor- to speak, participant B begins to speak while A is still
tant for understanding the requirements process, because speaking, and A then drops out. It has been found in
much of what is communicated between the parties will U.S. data [52] that interruptions are very rare in same-
be framed as stories, e.g., about what our group does, sex conversations. In cross-sex conversations, from 75%
what we hope to accomplish with the new system, what to 90% of successful interruptions involve men interrupt-
our problems are, etc. For example, a study of experi- ing women. (The percentages di er slightly, depending
enced photocopy repair personnel [33] shows that they on the situation, and the degree of acquaintance of the
often use narratives for informal training of novices in conversational partners.)
problems that are not covered in ocial manuals and Why is this? West and Zimmerman [48, 49] suggest
training courses. These \war stories" are an important that interruption by one's conversation partner is not only
part of the work life of photocopy repair mechanics, al- a consequence of lesser status, but is also a way of es-
though management may see this activity as `goo ng o ' tablishing and maintaining a status di erential. For this
rather than as a legitimate part of the job. Also, [14] formulation to make sense, it is necessary to understand
mentions a case study by the authors of this paper, in in detail how participants in an interruption negotiate
which evaluations extracted from jokes and stories were who is to drop out. When two participants start talking
used to reconstruct a value system for an organisation, at once, or when one participant begins to speak while
and where task oriented discourse was used to determine another is still speaking, one or both speakers may be-
work structure. come louder, and continue to increase volume until the
participant who is speaking more softly drops out. This
6.3 Reproducing Social Order appears to be a gender neutral description of the mecha-
nism. However the social meaning of increasing volume is
We have discussed the orderly nature of social interac- di erent for men and women. It is an indication of what
tion, and indicated that this social order is produced by kind of a person one is: in the case of men, a person who
the participants in their moment to moment interactions. stands up for his rights, in the case of women, a strident
We have not yet considered how familiar social orders are and aggressive person. These di erent social meanings
reproduced: although participants are continuously pro- for the same behaviour ensure that it is almost always
ducing social order, it always seems to be substantially the woman who drops out of an overlap.
the same order that is reproduced | the relations of Some larger scale studies of social reproduction have
class, gender, age, power etc., do not suddenly disappear, considered class distinctions among adolescent school
and are not suddenly produced in unusual or surprising children in Britain and the United States [50, 11]. In
ways. This observation is a necessary correction to a pos- each case, working class students' attitudes towards the
sible view of members' categories and members' methods importance of friendship networks and school culture ex-
which says that (for example) the structures of gender actly reproduced the kinds of behaviours, attitudes, pref-
privilege, or of a ten ton truck bearing down upon you, erences and skills that led to their being tracked to skilled
are just your construction of the world, and if you don't or unskilled labouring jobs, rather than to higher educa-
like them, then you can just construct something else. tion or managerial and professional work.
Although few people will take such a naive constructivist The reproduction of social order is an important is-
attitude towards a truck, some do take it toward social sue for Requirements Engineering, because it is necessary
structures, and thus the question must be explored. to consider the e ect of a new system on social struc-
There are material artifacts, histories of behaviour, tures, as suggested by the following questions: Will the
interpretations of behaviour, social expectations of conse- new system reproduce the existing social order? Or will
quences, individual tastes and preferences, etc. that lead the order be altered in signi cant ways? Do the existing
participants towards reproducing the same social order. social structures suggest requirements that would negate
For example, to illustrate the r^ole of material artifacts in the improvements expected from the new system?
our example of the construction of a seminar, the social
category of seminar is partly constructed by the turntak-
ing behaviour of the participants. It is also constructed
by the material artifacts and the ways in which people
7 Discussion
use them: the arrangement of a table in the room in a Every method has some limitations. Questionnaire-based
position that is understood to be the head, a board and interviews are limited by their stimulus-response model of
writing materials that one participant uses and the others interaction, which assumes that a given question (as stim-
don't, perhaps a glass of water for one participant. ulus) always has the same meaning to subjects. Moreover,
To illustrate the r^ole of the interpretation of be- this method excludes the kinds of interaction that could
haviour, we consider an example from turntaking, namely be used to establish shared meaning between the subject
interruptions and overlaps, and their relation to gender and the interviewer. Open ended interviews allow less

11
constrained interaction between the interviewer and the limitations of other techniques. Some previous joint work
interviewee, who is no longer considered the subject of of the authors, brie y described in [14], shows how the
an experiment. However, this method is still limited by discourse analysis of stories can be used to explore the
the need for the participants to share basic concepts and value system of an organisation, and how the discourse
methods, without which they will be unable to negotiate analysis of explanations can be used for a kind of situ-
shared meanings for the questions asked. Open ended in- ated task analysis. Interaction analysis can be used to
terviews are also more vulnerable to distortion by inter- discover details of non-verbal interaction in real work en-
viewer bias. These limitations also apply to focus groups, vironments [18]; but the e ort required to produce video
and to their cousins in Requirements Engineering, JAD transcripts suggests that this method should be used very
(or RAD) groups. In addition, these methods are vulner- selectively. Ethnography should be used continually to
able to political manipulations by participants. Protocol provide context for results obtained by other methods.
analysis involves an arti cial discourse form, and is based To sum up, we recommend a \zooming " method of
on an incorrect cognitivist model of human thought that requirements elicitation, whereby the more expensive but
entirely ignores social context. None of these methods can detailed methods are only employed selectively for prob-
elicit tacit knowledge, and all are subject to the say-do lems that have been determined by other techniques to
problem. be especially important. From this point of view, the var-
The principles of ethnomethodology, such as mem- ious techniques based on ethnomethodology can be seen
bers' concepts and members' methods, provide a powerful as analoguous to an electron microscope: they provide an
framework for a deeper consideration of these limitations, instrument that is very accurate and powerful, but that is
and suggest that traditional sociology and its methods are also expensive, and requires careful preparation to ensure
based on faulty assumptions about how social interaction that the right thing is examined.
is organised. It is interesting to notice that all of these methods,
Conversation, discourse and interaction analyses are including zooming, can be used not only for requirements
only applicable to situations where there is signi cant so- elicitation, but also for studying the system development
cial interaction; conversation and discourse analyses are process itself, including the Requirements Engineering
only applicable to verbal data. But the most important process. In this way, we may hope to develop a scien-
limitation of these methods is that they are very labour ti c methodology for systems development; in fact, we
intensive. In particular, it can take a highly skilled person have already tried to do this in a limited way in this pa-
a very long time to produce a transcript from a videotape per, by using concepts from ethnomethodology to explore
of live interaction. Another limitation is that these meth- the limitations of more traditional methods.
ods cannot be (directly) applied to the study of systems We close this paper with some research tasks that
that have not yet been built. However, they can be used seem to merit further investigation:
to obtain tacit knowledge, because they bypass the un-
reliable explanations of users, and instead examine what 1. Do detailed empirical studies of the entire system
they actually do. lifecycle, including the r^ole of planning, manage-
Despite their limitations, we do not wish to suggest ment and phases, using ideas of Suchman [43]; in
that any of these methods cannot be useful in require- particular, investigate the hypotheses that require-
ments elicitation (with the possible exception of protocol ments activities are distributed throughout the life-
analysis). In fact, their strengths seem to some extent cycle, and that plans serve at least as much to jus-
complementary, so that combinations of the various meth- tify actions as they do to predict them.
ods can be usefully applied to particular problems. In 2. Do case studies to determine the r^ole of political
particular, we suggest it is often a good idea to start with considerations in Requirements Engineering, and
an ethnographic study to uncover basic aspects of social how they a ect the use of various commercial meth-
order, such as the basic category systems used by mem- ods and tools.
bers, the division into social groups, the goals of various
social groups, typical patterns of work, how current tech- 3. Do case studies to determine the limitations and
nology is used, etc. (see [36] for a review of ethnography strengths of JAD groups, in relation to the entire
in relation to Requirements Engineering). After this, one system lifecycle.
might use questionnaires or interviews to explore what 4. Work out detailed guidelines for the zoom method
problems members see as most important, how members described above, and try it in some case studies. In
place themselves in various classi cation schemes, etc. particular, work out the relationships between dis-
Then one might apply conversation, discourse or inter- course, conversation and interaction structures, and
action analysis to get a deeper understanding of selected when each should be applied.
problematic aspects.
Techniques from discourse analysis can be useful when 5. Do detailed empirical studies of the comparative ef-
verbal communication is important to the system being fectiveness of various commercial methods and tools
developed; conversation analysis can also help to uncover for various purposes.

12
We believe that if research projects along these lines [15] Joseph Goguen, James Weiner, and Charlotte Linde.
were completed, then Requirements Engineering would Reasoning and natural explanation. International
be much closer to having a sound scienti c foundation. Journal of Man-Machine Studies, 19:521{559, 1983.
[16] Charles Goodwin and John Heritage. Conversation
References analysis. Annual Review of Anthropology, 19:283{
307, 1990.
[1] Dorine C. Andrews. JAD: A crucial demension for
rapid applications development. Journal of Systems [17] Marina Jirotka. Ethnomethodology and require-
Management, pages 23{31, March 1991. ments engineering. Technical report, Centre for
Requirements and Foundations, Oxford University
[2] Judith Becker and Alton Becker. A musical icon: Computing Lab, 1991.
Power and meaning in Javanese gamelan music. In
Wendy Steiner, editor, The Sign in Music and Lit- [18] Adam Kendon. Conducting Interaction: Patterns of
erature, pages 203{228. University of Texas, 1981. Behavior in Focused Encounters. Cambridge Univer-
[3] Carl Bereiter and Siegfried Engelmann. Teaching sity, 1990. Studies in Interactional Sociolinguistics
Disadvantaged Children in the Pre-school. Prentice- Number 7.
Hall, 1966. [19] D.K. Kondo. Crafting Selves: Power, Gender and
[4] Woodrow Wilson Bledsoe and Donald Loveland (ed- Discourses of Identity in a Japanese Workplace.
itors). Automated Theorem Proving: After 25 Years. Chicago, 1990.
American Mathematical Society, 1984. Volume 29 of [20] Gunter Kress and Robert Hodges. Language and Ide-
Contemporary Mathematics Series. ology. Kegan Paul, 1979.
[5] Barry Boehm. Software Engineering Economics.
Prentice-Hall, 1981. [21] William Labov. The transformation of experience
in narrative syntax. In Language in the Inner City,
[6] Richard Boland. In search of management account- pages 354{396. University of Pennsylvania, 1972.
ing: Explorations of self and organization. Technical
report, Case Western University, 1991. [22] Imre Lakatos. The Methodology of Scienti c Re-
search Programmes. Cambridge, 1978.
[7] Francoise Brun-Cottan. Talk in the workplace: Oc-
cupational relevance. Research on Language and So- [23] Charlotte Linde. The Linguistic Encoding of Spatial
cial Interaction, 24:277{295, 1990/1991. Information. PhD thesis, Columbia University, 1974.
[8] Graham Button and Wes Sharrock. Occasioned prac- Department of Linguistics.
tises in the work of implementing development [24] Charlotte Linde. Private stories in public discourse.
methodologies, 1992. Draft, Rank Xerox EuroPARC. Poetics, 15:183{202, 1986.
[9] John Canny. The Complexity of Robot Motion Plan- [25] Charlotte Linde. Personal experience, 1992. Institute
ning. MIT, 1988. for Research on Learning, Palo Alto CA.
[10] William F. Clocksin and Christopher Mellish. Pro- [26] Charlotte Linde and Joseph Goguen. Structure of
gramming in Prolog. Springer, 1981. planning discourse. Journal of Social and Biological
[11] Penelope Eckert. Jocks and Burnouts. Teachers Col- Structures, 1:219{251, 1978.
lege, 1989.
[27] Charlotte Linde and William Labov. Spatial net-
[12] K. Anders Ericsson and Herbert A. Simon. Protocol works as a site for the study of language and thought.
Analysis: Verbal Reports as Data. MIT, 1984. Language, 51(4):924{939, 1975.
[13] Harold Gar nkel. Studies in Ethnomethodology. [28] Paul Lu , David Frohlich, and Nigel Gilbert, editors.
Prentice-Hall, 1967. Computers and Conversation. Academic, 1990.
[14] Joseph Goguen. The dry and the wet. In Eck- [29] David L. Morgan. Focus Groups as Qualitative Re-
hard Falkenberg, Colette Rolland, and El-Sayed search. Sage, 1988.
Nasr-El-Dein El-Sayed, editors, Information Sys-
tems Concepts, pages 1{17. Elsevier North-Holland, [30] Claus Moser and Graham Kalton. Survey Methods
1992. Proceedings, IFIP Working Group 8.1 Con- in Social Investigation. Gower, 1971.
ference (Alexandria, Egypt); also, Programming
research Group, Technical Monograph PRG{100, [31] Allen Newell. Physical symbol systems. Cognitive
March 1992, Oxford. Science, 4:135{183, 1980.

13
[32] Allen Newell and Herbert Simon. GPS, a program [43] Lucy Suchman. Plans and Situated Actions: The
that simulates human thought. In Edward Feigen- Problem of Human-machine Communication. Cam-
baum and Julian Feldman, editors, Computers and bridge University, 1987.
Thought, pages 279{293. McGraw-Hill, 1963.
[44] Lucy Suchman. Constituting shared workspaces. In
[33] Julian Orr. Narratives at work: Story telling as co- Yrjo Engestrom and David Middleton, editors, Cog-
operative diagnostic activity. In Proceedings, Con- nition and Communication at Work. Cambridge, to
ference on Computer Supported Cooperative Work appear.
(SIGCHI). Association for Computing Machinery,
1986. [45] Lucy Suchman. Technologies of accountability: Of
[34] Livia Polanyi. So what's the point? Semiotica, 25(3{ lizards and airplanes. In Graham Button, editor,
4):208{224, 1978. Technology in Working Order: Studies of Work, In-
teractioin and Technology. Routledge, to appear.
[35] Livia Polanyi. Telling the American Story. MIT,
1989. [46] Lucy Suchman and Brigitte Jordan. Interactional
troubles in face-to-face survey interviews. Journal of
[36] Dave Randall, John Hughes, and Dan Shapiro. Steps the American Statistical Association, 85(409):232{
toward a partnership: Ethnography and system de- 241, 1990.
sign, 1992. Draft, Lancaster University.
[37] Harvey Sacks. An analysis of the course of a joke's [47] Francisco Varela, Evan Thompson, and Eleanor
telling in conversation. In Richard Baumann and Rosch. The Embodied Mind. MIT, 1991.
Joel Scherzer, editors, Explorations in the Ethnog- [48] Candace West and Don H. Zimmerman. Women's
raphy of Speaking, pages 337{353. Cambridge, 1974. place in everyday talk: Re ections on parent-child
[38] Harvey Sacks, Emanuel Scheglo , and Gail Je er- interaction. Social Problems, 24:521{529, 1977.
son. A simplest systematics of the organization of
turn-taking in conversation. Language, 504:696{735, [49] Candace West and Don H. Zimmerman. Small in-
1974. sults: A study of interruptions in cross-sex con-
versations between unacquainted persons. In Barrie
[39] Emmanuel Scheglo . Body torque, 1990. Paper pre- Thorne, Cheris Kramarae, and Nancy Henley, edi-
sented at 89th Annual Meeting of the American An- tors, Language, Gender and Society, pages 102{117.
thropological Association, New Orleans LA, Novem- Newbury House (Rowley MA), 1983.
ber 1990.
[40] Ron Scollon and Suzanne B.K. Scollon. Narrative, [50] Paul Willis. Learning to Labor: How Working Class
Kids Get Working Class Jobs. Columbia University,
Literacy and Face in Interethnic Communication. 1977.
Ablex, 1981. The Literate Two-year-old: The Fic-
tionalization of Self. [51] Nessa Wolfson. The Conversational Historical
[41] Ron Scollon and Suzanne B.K. Scollon. Narrative, Present in American English Narrative. Foris, 1982.
Literacy and Face in Interethnic Communication.
Ablex, 1981. Chapter 2: Athabaskan-English In- [52] Don H. Zimmerman and Candace West. Sex roles,
terethnic Communication, pp.11{38. interruptions and silences in conversations. In Barrie
Thorne and Nancy Henley, editors, Langauge and
[42] David Stewart and Prem Shamdasani. Focus Groups: Sex: Di erence and Dominance. Newbury House
Theory and Practice. Sage, 1990. (Rowley MA), 1975.

14

Vous aimerez peut-être aussi