Affiliation:
1. City University of Science and Information Technology, Peshawar, Pakistan
Abstract
Requirement engineering has gained tremendous popularity among the research and developers communities and comprises five activities, i.e., feasibility study, elicitation, analysis, specification, and validation. In the elicitation phase, the data is collected from different stakeholders. Hence, the overall system, process, and even data may be compromised and sometimes lead to privacy threats if the data is shared with a third party. To this end, this work proposes a comparative analysis of the eminent techniques, including privacy violation factors. The authors targeted 32 techniques for analysis from different project scenarios. This study may help the analysts with adequate knowledge and help project management teams to select the best and most secure elicitation techniques concerning the nature of projects.