A Participant Recruitment Framework for Crowdsourcing based Software Requirement Acquisition

Hao Wang, Yasha Wang, Jiangtao Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

18 Citations (Scopus)

Abstract

The opportunity to leverage crowd sourcing-based model to facilitate software requirements acquisition has been recognized to maximize the advantages of the diversity of talents and expertise available within the crowd. Identifying well-suited participants is a common issue in crowd sourcing system. Requirements acquisition tasks call for participants with particular kind of domain knowledge. However, current crowd sourcing system failed to provide such kind of identification among participants. We observed that participants with a particular kind of domain knowledge often have the opportunity to cluster in particular spatiotemporal spaces. Based on this observation, we propose a novel opportunistic participant recruitment framework to enable organizers to recruit participants with desired kind of domain knowledge in a more efficient way. We analyzed the feasibility of our opportunistic approach through both theoretic study on analytical model and simulated experiment on real world mobility model. The results showed the feasibility of our approach.
Original languageEnglish
Title of host publication2014 IEEE 9th International Conference on Global Software Engineering
PublisherIEEE
Pages65-73
Number of pages9
ISBN (Print)9781479943609
DOIs
Publication statusPublished - Aug 2014
Externally publishedYes
Event2014 IEEE 9th International Conference on Global Software Engineering - Shangha, China
Duration: 18 Aug 201421 Sept 2014
Conference number: 9

Conference

Conference2014 IEEE 9th International Conference on Global Software Engineering
Country/TerritoryChina
CityShangha
Period18/08/1421/09/14

Keywords

  • Crowdsourcing
  • Opportunistic Network

Fingerprint

Dive into the research topics of 'A Participant Recruitment Framework for Crowdsourcing based Software Requirement Acquisition'. Together they form a unique fingerprint.

Cite this