On Exploiting End-User Feedback in Requirements Engineering

Size: px
Start display at page:

Download "On Exploiting End-User Feedback in Requirements Engineering"

Transcription

1 On Exploiting End-User Feedback in Requirements Engineering Center for Information and Communication Technology, FBK-ICT International Doctoral School ICT- University of Trento, Italy Advisor Anna Perini Doctoral Symposium at REFSQ2013 Essen, Germany,

2 Outline 1.- Introduc=on Context & Problem? 2.- Research Methodology 3.- Related Work End- user Feedback in RE Vs. Mul=disciplinary perspec=ve 4.- Progress & Conclusion 1

3 Introduction Definition What is feedback? Primary results of introducing the implemented software system into the real world. There is an immediate response to the system. [Madhavji06] Information about reactions to a person's performance of a task, etc., used as a basis for improvement. [Oxford American Dictionary] 2

4 End-user feedback Introduction Context Descrip=on Meaningful information For instance with the purpose of suggesting to software applications. New needs Modifica=ons open- source sonware Strategic behaviours, etc. Unstructured feedback organised by topics. Semi-structured feedback by product, component, version, summary. 3

5 Problem of managing end-user feedback Classified as a bug Heterogeneity of abstrac=ons levels Huge amount of feedback and discussions Mismatching of the purpose We believe that end-user feedback can be a valuable source of requirements knowledge contained in discussion forums of open-source software. 4

6 Research objective Define a systematic approach for acquiring end-user feedback and deriving requirements knowledge from it RQ1. What is the appropriate conceptualisation of end-user feedback? RQ2. Which are the suitable techniques to collect explicit, direct and indirect, end-user feedback? RQ3. How can analysts derive requirements knowledge from it? 5

7 Research Methodology Definition of the problem Reading of the state of the art Observation of the problem Reading related work Software evolution Gathering of feedback Definition of end-user feedback Revisiting the definition Conceptual model Basis } Mo=va=on of the research } RQ1. Conceptualisa=on of feedback 6

8 Research Methodology Research Selection of case study Defining the motivation Establishing fine-grained problems Investigating current end-user feedback Design of experiments } Sampling data Revealing hidden structure of feedback Analysing current discussion } RQ1. Conceptualisa=on of feedback RQ3. Discovering RE knowledge RQ1 RQ2. Techniques to collect feedback RQ3 7

9 Related works End- User feedback Mobile devices Dashboards Discussion forums - irequire [Seyff et al. 10] - ConTexter [Schneider 11] - IdeaScale - User voice - HabboHotel - LiquidFeedback Semi- structured feedback, filtered by sensed en==es, votes, forms with fields to fill in. Bug repor=ng - Mozilla bugzilla - OpenOffice bugzilla 8

10 Proposed approach Multidisciplinary perspective base on Feedback structured by system s behaviour RE techniques Giorgini et al Tropos methodology Requirements modelling 9

11 Proposed approach Multidisciplinary perspective HCI principles Conceptualisa1on of feedback purpose Apply Emoticons Mohammad 2011 Colourful language 10

12 Proposed approach Multidisciplinary perspective NL techniques Direc1ve and Expressive acts VS Noise Written speech acts Searle 1975 Speech acts 11

13 Progress so far RQ1. What is the appropriate conceptualisation of end-user feedback? Case study: Apache OpenOffice Looking at the textual component RQ3. How can analysts derive requirements knowledge from it? 12

14 Progress so far End-user feedback meta-model Conceptualisation centred on the purpose of the feedback. End-user +iduser 1 provides 0..n End-user Feedback +content 1 has 1..n Purpose User feedback metamodel 0..n Speech act formulated 1 Comment Clarification Improvement Correction Negotiation Others Directive Expressive 0..n <<enumeration>> Action addition deletion modification Function Improvement Quality Improvement Execution Improvement Support Rejection 13

15 Progress so far End-user feedback patterns Identification of patterns by revealing written speech acts. 14

16 Conclusion Context: software evolution driven by end-user feedback Problem: acquiring feedback and deriving requirements knowledge Methodology: steps followed towards the research objective Progress: Selected case study in the context of open-source software Patterns and conceptualisation 15

17 Conclusion Expected impact Helping analysts in managing feedback Avoiding missing feedback which is relevant for requirements (not simply for bug-fixing) Future work Investigation of argumentation-based platforms Compare text processing techniques (natural language vs. structured feedback) 16

18 Thank you for your attention! Questions? 17

19 References [Giorgini et al. 2010] P. Giorgini, J. Mylopoulos, A. Perini, and A. Susi, The Tropos Methodology and Software Development Environment, in Social Modeling for Requirements Engineering, Yu, Giorgini, Maiden, and Mylopoulos, Eds. MIT Press, 2010, pp [Jureta et al. 2009] I. Jureta, J. Mylopoulos, and S. Faulkner. Analysis of multi-party agreement in requirements validation. In RE, pp IEEE Computer Society, [Searle 1975] J. R. Searle, A taxonomy of illocutionary acts. Minneapolis: University of Minnesota Press, 1975c, pp [Mohammad 2011] S. Mohammad. Colourful language: measuring word-colour associations. CMCL '11, pp , Stroudsburg, PA, USA, FlexiGuided GmbH. Liquidfeedback. #Software,

Exploiting Online Discussions As a Tool For Database Development Project

Exploiting Online Discussions As a Tool For Database Development Project Exploiting Online Discussions in Collaborative Distributed Requirements Engineering Itzel Morales-Ramirez, Matthieu Vergne, Mirko Morandini, Anna Perini, and Angelo Susi Fondazione Bruno Kessler Via Sommarive

More information

Information governance: What is it? How is it implemented?

Information governance: What is it? How is it implemented? Information Technology Decision Support Systems Laboratory Information governance: What is it? How is it implemented? Sindy Madrid-Torres Part of the doctoral research: The conceptualisation and implementation

More information

OHJ-1860 Software Systems Seminar: Global Software Development. Open-source software development. 11.12.2007 By Antti Rasmus

OHJ-1860 Software Systems Seminar: Global Software Development. Open-source software development. 11.12.2007 By Antti Rasmus 1 OHJ-1860 Software Systems Seminar: Global Software Development Open-source software development 11.12.2007 By Antti Rasmus Outline 2 Open-source software (OSS) development Motivation: IDC study on open

More information

On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements

On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements Proceedings of the 2n d International Conference on Information Technology, ICIT 2010 28-30 June 2010, Gdansk, Poland. On Efficient Collaboration between Lawyers and Software Engineers when Transforming

More information

A Holistic Approach to Security Attack Modeling and Analysis

A Holistic Approach to Security Attack Modeling and Analysis A Holistic Approach to Security Attack Modeling and Analysis Tong Li 1, Jennifer Horkoff 2, Kristian Beckers 3, Elda Paja 1, and John Mylopoulos 1 1 University of Trento, Trento, Italy {tong.li,paja,jm}@unitn.it

More information

On the Adequacy of i* Models for Representing and Analyzing Software Architectures

On the Adequacy of i* Models for Representing and Analyzing Software Architectures On the Adequacy of i* Models for Representing and Analyzing Software Architectures Gemma Grau and Xavier Franch Universitat Politècnica de Catalunya c/ Jordi Girona 1-3, Barcelona E-08034, Spain {ggrau,

More information

Social Team Characteristics and Architectural Decisions: a Goal-oriented Approach

Social Team Characteristics and Architectural Decisions: a Goal-oriented Approach Social Team Characteristics and Architectural Decisions: a Goal-oriented Approach Johannes Meißner 1 and Frederik Schulz 2 1 Research and Development, SK8DLX Services GmbH, Jena, Germany, johannes.meissner@sk8dlx.de

More information

Goal-Based Self-Contextualization

Goal-Based Self-Contextualization Goal-Based Self-Contextualization Raian Ali, Fabiano Dalpiaz Paolo Giorgini University of Trento - DISI, 38100, Povo, Trento, Italy {raian.ali, fabiano.dalpiaz, paolo.giorgini}@disi.unitn.it Abstract.

More information

Rouch, Jean. Cine-Ethnography. Minneapolis, MN, USA: University of Minnesota Press, 2003. p 238

Rouch, Jean. Cine-Ethnography. Minneapolis, MN, USA: University of Minnesota Press, 2003. p 238 Minneapolis, MN, USA: University of Minnesota Press, 2003. p 238 http://site.ebrary.com/lib/uchicago/doc?id=10151154&ppg=238 Minneapolis, MN, USA: University of Minnesota Press, 2003. p 239 http://site.ebrary.com/lib/uchicago/doc?id=10151154&ppg=239

More information

Customer Experience Management

Customer Experience Management Customer Experience Management Best Practices for Voice of the Customer (VoC) Programmes Jörg Höhner Senior Vice President Global Head of Automotive SPA Future Thinking The Evolution of Customer Satisfaction

More information

An Agent-based Middleware for Adaptive Systems

An Agent-based Middleware for Adaptive Systems An Agent-based Middleware for Adaptive Systems Nauman A. Qureshi, Anna Perini Software Engineering Research Group Fondazione Bruno Kessler - IRST Via Sommarive, 18, 38050 Trento, Italy {qureshi, perini}@fbk.eu

More information

Big Data Analytics- Innovations at the Edge

Big Data Analytics- Innovations at the Edge Big Data Analytics- Innovations at the Edge Brian Reed Chief Technologist Healthcare Four Dimensions of Big Data 2 The changing Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human

More information

Business Information Systems. IT Enabled Services And Emerging Technologies. Chapter 4: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA

Business Information Systems. IT Enabled Services And Emerging Technologies. Chapter 4: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA Business Information Systems IT Enabled Services And Emerging Technologies Chapter 4: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1 Business Information Systems Task Statements 1.6 Consider the

More information

Addressing Challenges to Open Source Collaboration With the Semantic Web

Addressing Challenges to Open Source Collaboration With the Semantic Web Addressing Challenges to Open Source Collaboration With the Semantic Web Anupriya Ankolekar James D. Herbsleb Katia Sycara Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University

More information

Web Engineering: Software Engineering for Developing Web Applications

Web Engineering: Software Engineering for Developing Web Applications Web Engineering: Software Engineering for Developing Web Applications Sharad P. Parbhoo prbsha004@myuct.ac.za Computer Science Honours University of Cape Town 15 May 2014 Web systems are becoming a prevalent

More information

Establishing Regulatory Compliance for Software Requirements

Establishing Regulatory Compliance for Software Requirements Establishing Regulatory Compliance for Software Requirements UNVERSTY OF TRENTO - TALY Silvia ngolfo 30 th nternational Conference on Conceptual Modeling Brussels, Belgium October 31, 2011 John Mylopoulos

More information

FNSPIM403 Educate clients on personal injury management issues

FNSPIM403 Educate clients on personal injury management issues FNSPIM403 Educate clients on personal injury management Release: 1 FNSPIM403 Educate clients on personal injury management Modification History Release Release 1 Comments This version first released with

More information

(2) Question 2: Size of Mozilla community.

(2) Question 2: Size of Mozilla community. Open Source Software Development Case Studies CSE564 Group 17 HW1 Shihuan Shao, Tuyue Chen, Yongming Zhang 1. Introduction Open source software(oss) development is considered to be a competitive rivalry

More information

Agile Requirements Definition for Software Improvement and Maintenance in Open Source Software Development

Agile Requirements Definition for Software Improvement and Maintenance in Open Source Software Development Agile Requirements Definition for Software Improvement and Maintenance in Open Source Software Development Stefan Dietze Fraunhofer Institute for Software and Systems Engineering (ISST), Mollstr. 1, 10178

More information

HLTAHA012 Support the development of speech and communication skills

HLTAHA012 Support the development of speech and communication skills HLTAHA012 Support the development of speech and communication skills Release: 1 HLTAHA012 Support the development of speech and communication skills Modification History Release Release 1 Comments This

More information

Identifying Candidate Aspects with I-star Approach

Identifying Candidate Aspects with I-star Approach Identifying Candidate Aspects with I-star Approach Fernanda Alencar 1 *, Carla Silva 2, Ana Moreira 3, João Araújo 3, Jaelson Castro 2 1 Dept. Eletrônica e Sistemas - Universidade Federal de Pernambuco

More information

How To Understand The Value Of Big Data

How To Understand The Value Of Big Data Big Data Is Not Yet Another IT Project Krish Krishnan President, Sixth Sense Advisors Inc Bridge to Big Data Oct 23 rd 2012 Background Applications, OLTP Systems, Traditional Data Warehouse and Business

More information

Towards an Agent Oriented approach to Software Engineering

Towards an Agent Oriented approach to Software Engineering Towards an Agent Oriented approach to Software Engineering Anna Perini and Paolo Bresciani ITC-IRST Via Sommarive 18, 38055 Povo, Trento, Italy perini,bresciani @irst.itc.it John Mylopoulos Department

More information

Deriving Use Cases from Organizational Modeling

Deriving Use Cases from Organizational Modeling Deriving Use Cases from Organizational Modeling Victor F.A. Santander * Jaelson F. B. Castro Universidade Federal de Pernambuco Centro de Informática Cx. Postal 7851, CEP 50732-970, Recife-PE, BRAZIL Phone:

More information

Software Requirements Engineering for Sustainability. Debra Richardson* with Bill Tomlinson* and Birgit Penzenstadler** * UCIrvine, ** TUMünchen

Software Requirements Engineering for Sustainability. Debra Richardson* with Bill Tomlinson* and Birgit Penzenstadler** * UCIrvine, ** TUMünchen Software Requirements Engineering for Sustainability Debra Richardson* with Bill Tomlinson* and Birgit Penzenstadler** * UCIrvine, ** TUMünchen Software Engineering has been Underutilized for Sustainability

More information

Survey Results: Requirements and Use Cases for Linguistic Linked Data

Survey Results: Requirements and Use Cases for Linguistic Linked Data Survey Results: Requirements and Use Cases for Linguistic Linked Data 1 Introduction This survey was conducted by the FP7 Project LIDER (http://www.lider-project.eu/) as input into the W3C Community Group

More information

Delivering Smart Answers!

Delivering Smart Answers! Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved

More information

A Meta-model for Legal Compliance and Trustworthiness of Information Systems

A Meta-model for Legal Compliance and Trustworthiness of Information Systems A Meta-model for Legal Compliance and Trustworthiness of Information Systems Fatemeh Zarrabi, Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, David Preston School of Architecture, Computing

More information

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology A.Fatemi 1, N.NematBakhsh 2,B. Tork Ladani 3 Department of Computer Science, Isfahan University,

More information

Information Governance

Information Governance WHITE PAPER Information Governance Irrelevant, overhead or central to survival? Setting the information governance agenda Table of Contents Introduction... 1 Defining the importance of information governance...

More information

Use of e-participation Tools for Support of Policy Modelling at Regional Level

Use of e-participation Tools for Support of Policy Modelling at Regional Level The 5th Mediterranean Conference on Information Systems September 12-14, 2010, Tel-Aviv-Yaffo Use of e-participation Tools for Support of Policy Modelling at Regional Level Karol Furdik - Tomas Sabol Technical

More information

Customer Experience Management

Customer Experience Management Customer Experience Management 10 tips for the successful development and execution of Chris Bland Research Director SPA Future Thinking Introduction, sometimes referred to as Customer Feedback Programmes,

More information

Data Governance Best Practice

Data Governance Best Practice Data Governance Best Practice Business Connexion Michelle Grimley Senior Manager EIM +27 (0)11 266 6499 Michelle.Grimley@bcx.co.za Inri Möller Master Data Manager +27 (0)11 266 5146 Inri.Möller@bcx.co.za

More information

Aligning Data Warehouse Requirements with Business Goals

Aligning Data Warehouse Requirements with Business Goals Aligning Data Warehouse Requirements with Business Goals Alejandro Maté 1, Juan Trujillo 1, Eric Yu 2 1 Lucentia Research Group Department of Software and Computing Systems University of Alicante {amate,jtrujillo}@dlsi.ua.es

More information

Towards Engineering Transparency as a Requirement in Socio-technical Systems

Towards Engineering Transparency as a Requirement in Socio-technical Systems Towards Engineering Transparency as a Requirement in Socio-technical Systems Mahmood Hosseini, Alimohammad Shahri, Keith Phalp, Raian Ali Faculty of Science and Technology Bournemouth University, United

More information

Towards unstructured and just-in-time learning: the Virtual ebms e-learning system

Towards unstructured and just-in-time learning: the Virtual ebms e-learning system Towards unstructured and just-in-time learning: the Virtual ebms e-learning system G. Elia 1, G. Secundo, C. Taurino e-business Management Section, Scuola Superiore ISUFI, University of Lecce, via per

More information

Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words

Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words , pp.290-295 http://dx.doi.org/10.14257/astl.2015.111.55 Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words Irfan

More information

Supporting Natural Language Queries across the Requirements Engineering Process

Supporting Natural Language Queries across the Requirements Engineering Process Supporting Natural Language Queries across the Requirements Engineering Process Sugandha Lohar School of Computing DePaul University, Chicago, IL, 60604, USA slohar@cs.depaul.edu Abstract. [Context and

More information

Session Two. Organizational Knowledge Management

Session Two. Organizational Knowledge Management Knowledge Management Session Two Organizational Knowledge Management Intellectual capital Intellectual capital is combination of the Intellectual property (IP) held by a business and the people in that

More information

Enterprise Architecture and Knowledge Perspectives on Continuous Requirements Engineering

Enterprise Architecture and Knowledge Perspectives on Continuous Requirements Engineering Enterprise Architecture and Knowledge Perspectives on Continuous Requirements Engineering Marite Kirikova Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV- 1658, Latvia

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Business Process and Regulations Compliance Management Technology

Business Process and Regulations Compliance Management Technology Business Process and Regulations Compliance Management Technology Ilze Buksa Riga Technical University, Institute of Applied Computer Systems, Meza street 1/4, LV-1048, Riga, Latvia ilze.buksa@rtu.lv Supervisor

More information

FNSPIM406 Develop and maintain knowledge of personal injury management insurance

FNSPIM406 Develop and maintain knowledge of personal injury management insurance FNSPIM406 Develop and maintain knowledge of management Release: 1 FNSPIM406 Develop and maintain knowledge of management Date this document was generated: 23 April 2015 FNSPIM406 Develop and maintain knowledge

More information

Application of Data Mining Methods in Health Care Databases

Application of Data Mining Methods in Health Care Databases 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Application of Data Mining Methods in Health Care Databases Ágnes Vathy-Fogarassy Department of Mathematics and

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Navigating Big Data business analytics

Navigating Big Data business analytics mwd a d v i s o r s Navigating Big Data business analytics Helena Schwenk A special report prepared for Actuate May 2013 This report is the third in a series and focuses principally on explaining what

More information

Improving context-aware applications for the well-being domain Model-driven design guided by medical knowledge

Improving context-aware applications for the well-being domain Model-driven design guided by medical knowledge Improving contextaware applications for the wellbeing domain Modeldriven design guided by medical knowledge Steven Bosems and Marten van Sinderen Faculty of Electrical Engineering, Mathematics and Computer

More information

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,

More information

Towards Collaborative Requirements Engineering Tool for ERP product customization

Towards Collaborative Requirements Engineering Tool for ERP product customization Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,

More information

D 8.2 Application Definition - Water Management

D 8.2 Application Definition - Water Management (FP7 609081) Date 31st July 2014 Version [1.0] Published by the Almanac Consortium Dissemination Level: Public Project co-funded by the European Commission within the 7 th Framework Programme Objective

More information

Please quote as: Geihs, K.; Leimeister, J. M.; Roßnagel, A. & Schmidt, L. (2012): On Socio-technical Enablers for Ubiquitous Computing Applications.

Please quote as: Geihs, K.; Leimeister, J. M.; Roßnagel, A. & Schmidt, L. (2012): On Socio-technical Enablers for Ubiquitous Computing Applications. Please quote as: Geihs, K.; Leimeister, J. M.; Roßnagel, A. & Schmidt, L. (2012): On Socio-technical Enablers for Ubiquitous Computing Applications. In: 3rd Workshop on Enablers for Ubiquitous Computing

More information

Location-based Software Modeling and Analysis: Tropos-based Approach

Location-based Software Modeling and Analysis: Tropos-based Approach Location-based Software Modeling and Analysis: Tropos-based Approach Raian Ali, Fabiano Dalpiaz, and Paolo Giorgini University of Trento - DISI, 38100, Povo, Trento, Italy. {raian.ali, fabiano.dalpiaz,

More information

Quality Practices and Problems in Free Software Projects

Quality Practices and Problems in Free Software Projects Quality Practices and Problems in Free Software Projects Martin Michlmayr, Francis Hunt, David Probert Centre for Technology Management University of Cambridge Cambridge, CB2 1RX, UK martin@michlmayr.org

More information

{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information}

{Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect. {Add local information} Job Description Business Analyst Organisation: Location: Reports to: Supervises: Working conditions: Last updated: {Add company name} {Add geographical location} {Add/edit as required} Enterprise Architect

More information

Do Onboarding Programs Work?

Do Onboarding Programs Work? Do Onboarding Programs Work? Adriaan Labuschagne and Reid Holmes School of Computer Science University of Waterloo Waterloo, ON, Canada alabusch,rtholmes@cs.uwaterloo.ca Abstract Open source software systems

More information

Requirements Engineering Process

Requirements Engineering Process Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their

More information

Enterprise and Business Processes - How to Interoperate? The Standards View

Enterprise and Business Processes - How to Interoperate? The Standards View Enterprise and Business Processes - How to Interoperate? The Standards View Kurt Kosanke 1, Richard Martin 2 1 CIMOSA Association, Germany 2 a. kosanke@cimosa.de Tinwisle, USA, Convenor of ISO TC 184 SC5/WG1

More information

Lecture 3 Topics on Requirements Engineering

Lecture 3 Topics on Requirements Engineering Lecture 3 Topics on Requirements Engineering Some material taken from the Tropos project at U of T Copyright Yijun Yu, 2005 Course information Let s vote Course Project/Final Exam 50-50 or 60-40? Midterm/Final

More information

AN OVERVIEW OF INDUSTRIAL SOFTWARE DOCUMENTATION PRACTICES

AN OVERVIEW OF INDUSTRIAL SOFTWARE DOCUMENTATION PRACTICES AN OVERVIEW OF INDUSTRIAL SOFTWARE DOCUMENTATION PRACTICES Marcello Visconti 1 Departamento de Informática Universidad Técnica Federico Santa María Valparaíso, CHILE visconti@inf.utfsm.cl Curtis R. Cook

More information

RE4ES: Support Environmental Sustainability by Requirements Engineering

RE4ES: Support Environmental Sustainability by Requirements Engineering RE4ES: Support Environmental Sustainability by Requirements Engineering Birgit Penzenstadler 1, Bill Tomlinson 2 and Debra Richardson 2 1 Technische Universität München, Germany penzenst@in.tum.de 2 University

More information

FIRST Project Public Presentation

FIRST Project Public Presentation FIRST Project Public Presentation 2012 Agenda Why FIRST? What is FIRST? Who is behind FIRST? FIRST Vision FIRST Innovations Expected Outcomes Impact Large scale information extraction and Integration infrastructure

More information

Exploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability

Exploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability Exploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability Alberto Siena 1, Neil Maiden 2, James Lockerbie 2, Kristine Karlsen 2, Anna Perini 1, Angelo

More information

Reports to: Business Solutions Manager Date: November 2011

Reports to: Business Solutions Manager Date: November 2011 Position Description Job Title: Solutions Consultant EDRMS, ECM and Change Management Category: Process Reports to: Business Solutions Manager Date: November 2011 1. Purpose of Position The purpose of

More information

EASYWAY ES5 RULES OF PROCEDURE FOR CHANGE CONTROL AND RELEASE MANAGEMENT OF DATEX II. Page 1 of 21. March 2011

EASYWAY ES5 RULES OF PROCEDURE FOR CHANGE CONTROL AND RELEASE MANAGEMENT OF DATEX II. Page 1 of 21. March 2011 EASYWAY ES5 RULES OF PROCEDURE FOR CHANGE CONTROL AND RELEASE MANAGEMENT OF DATEX II March 2011 European Commission Directorate General for Mobility and Transport Copyright 2011 Page 1 of 21 Document Control

More information

MSc Data Science at the University of Sheffield. Started in September 2014

MSc Data Science at the University of Sheffield. Started in September 2014 MSc Data Science at the University of Sheffield Started in September 2014 Gianluca Demar?ni Lecturer in Data Science at the Informa?on School since 2014 Ph.D. in Computer Science at U. Hannover, Germany

More information

How To Understand Business Intelligence

How To Understand Business Intelligence An Introduction to Advanced PREDICTIVE ANALYTICS BUSINESS INTELLIGENCE DATA MINING ADVANCED ANALYTICS An Introduction to Advanced. Where Business Intelligence Systems End... and Predictive Tools Begin

More information

Data Analytics in Organisations and Business

Data Analytics in Organisations and Business Data Analytics in Organisations and Business Dr. Isabelle E-mail: isabelle.flueckiger@math.ethz.ch 1 Data Analytics in Organisations and Business Some organisational information: Tutorship: Gian Thanei:

More information

Alignment of Misuse Cases with Security Risk Management

Alignment of Misuse Cases with Security Risk Management Alignment of Misuse Cases with Security Risk Management Raimundas Matulevičius PReCISE, University of Namur, rue Grandgagnage 21, B-5000 Namur, Belgium rma@info.fundp.ac.be Nicolas Mayer CRP Henri Tudor

More information

The Dynamics of Creativity in Software Development *

The Dynamics of Creativity in Software Development * The Dynamics of Creativity in Software Development * Daniel Graziotin Free University of Bozen-Bolzano daniel.graziotin@unibz.it Abstract. Software is primarily developed for people by people and human

More information

Transforming Socio-Technical Security Requirements in SecBPMN Security Policies

Transforming Socio-Technical Security Requirements in SecBPMN Security Policies Transforming Socio-Technical Security Requirements in SecBPMN Security Policies Mattia Salnitri and Paolo Giorgini University of Trento, Italy {mattia.salnitri, paolo.giorgini}@unitn.it Abstract. Socio-Technical

More information

How To Write A Social Service Planner

How To Write A Social Service Planner LLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION SOCIAL SERVICE PLANNER SERIES CLASS TITLE POSITION CODE SOCIAL SERVICE COMMUNITY PLANNER 41295 SOCIAL SERVICE PROGRAM PLANNER I 41311

More information

Release: 1. AHCCCF410A Support individuals in resource management change processes

Release: 1. AHCCCF410A Support individuals in resource management change processes Release: 1 AHCCCF410A Support individuals in resource management change processes AHCCCF410A Support individuals in resource management change processes Modification History Not Applicable Unit Descriptor

More information

Current Research Topic In Software Engineering

Current Research Topic In Software Engineering Current Research Topic In Software Engineering A PROJECT REPORT Submitted by MD. Mithun Ahamed Id: 13-96937-2 Under the guidance of DR. Dip Nandi in partial fulfillment for the award of the degre of Master

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Security Attack Testing (SAT) testing the security of information systems at design time $

Security Attack Testing (SAT) testing the security of information systems at design time $ Information Systems 32 (2007) 1166 1183 www.elsevier.com/locate/infosys Security Attack Testing (SAT) testing the security of information systems at design time $ Haralambos Mouratidis a,, Paolo Giorgini

More information

Customer Driven Big-Data Analytics for the Companies Servitization

Customer Driven Big-Data Analytics for the Companies Servitization Customer Driven Big-Data Analytics for the Companies Servitization Eugen Molnár, Natalia Kryvinska, Michal Greguš Comenius University in Bratislava, Faculty of Management Principal interactions in a PSS

More information

A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks Khalil Salah Advanced Informatics School Universiti Teknologi Malaysia Kuala Lumpur, 54100, Malaysia Ardavan Ashabi

More information

Information Systems. CSM21 Strategic Information Management Introduction. Matthew Casey

Information Systems. CSM21 Strategic Information Management Introduction. Matthew Casey Information Systems CSM21 Strategic Information Management Introduction m.casey@surrey.ac.uk Matthew Casey What are Information Systems? Systems used to manage, collate and distribute information Essential

More information

On the Socialness of Software

On the Socialness of Software 2011 Ninth IEEE Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing On the Socialness of Software Walid Maalej Technische Universität München Munich, Germany maalejw@cs.tum.edu

More information

Performance Management Systems: Conceptual Modeling

Performance Management Systems: Conceptual Modeling 2011 International Conference on Economics and Business Information IPEDR vol.9 (2011) (2011) IACSIT Press, Bangkok, Thailand Performance Management Systems: Conceptual Modeling Dmitry Isaev Business Analytics

More information

Privacy challenges in mobile technology acceptance research

Privacy challenges in mobile technology acceptance research Page 112 of 296 Privacy challenges in mobile technology acceptance research Elisabeth Pergler, Daniela Glatz evolaris next level GmbH Hugo-Wolf-Gasse 8-8a, 8010 Graz, Austria {elisabeth.pergler, daniela.glatz}@evolaris.net

More information

Designing Law-Compliant Software Requirements

Designing Law-Compliant Software Requirements Designing Law-Compliant Software Requirements Alberto Siena 1, John Mylopoulos 2, Anna Perini 1, Angelo Susi 1 1 FBK - Irst, via Sommarive 18 - Trento, Italy {siena,perini,susi}@fbk.eu 2 University of

More information

ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES

ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES Maria José de Miranda Nazaré Loureiro, Universidade de Aveiro,

More information

Workshop Series on Open Source Research Methodology in Support of Non-Proliferation

Workshop Series on Open Source Research Methodology in Support of Non-Proliferation The International Centre for Security Analysis The Policy Institute at King s King s College London Workshop Series on Open Source Research Methodology in Support of Non-Proliferation Workshop 1: Exploiting

More information

Release: 1. ICTPRG502 Manage a project using software management tools

Release: 1. ICTPRG502 Manage a project using software management tools Release: 1 ICTPRG502 Manage a project using software management ICTPRG502 Manage a project using software management Modification History Release Release 1 Comments This version first released with ICT

More information

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning

More information

Improving Agility in Model-Driven Web Engineering

Improving Agility in Model-Driven Web Engineering Improving Agility in Model-Driven Web Engineering José Matías Rivero 1,2, Julián Grigera 1, Gustavo Rossi 1,2, Esteban Robles Luna 1, Nora Koch 3,4 1 LIFIA, Facultad de Informática, UNLP, La Plata, Argentina

More information

A Pattern-Based Method for Identifying and Analyzing Laws

A Pattern-Based Method for Identifying and Analyzing Laws A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of

More information

Tool-supported Development with Tropos: The Conference Management System Case Study.

Tool-supported Development with Tropos: The Conference Management System Case Study. Tool-supported Development with Tropos: The Conference Management System Case Study. M. Morandini, D. C. Nguyen, A. Perini, A. Siena, and A. Susi Fondazione Bruno Kessler - IRST Via Sommarive, 18 38050

More information

ICTICT423 Select cloud storage strategies

ICTICT423 Select cloud storage strategies ICTICT423 Select cloud storage strategies Release: 1 ICTICT423 Select cloud storage strategies Modification History Release Release 1 Comments This version first released with ICT Information and Communications

More information

Requirements Engineering: Elicitation Techniques

Requirements Engineering: Elicitation Techniques 2008:PR003 Requirements Engineering: Elicitation Techniques Sai Ganesh. Gunda Source:http://www.marcocioffi.com/archives/2005/04/requirements-engineering/ MASTER S THESIS Software Engineering, 2008 Department

More information

locuz.com Big Data Services

locuz.com Big Data Services locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.

More information

Monalessa Perini Barcellos 1,2, Ana Regina C. da Rocha (advisor) 1, Ricardo de A. Falbo (advisor) 2

Monalessa Perini Barcellos 1,2, Ana Regina C. da Rocha (advisor) 1, Ricardo de A. Falbo (advisor) 2 An Ontology-based Approach for Software Measurement and Suitability Measurement Repository Evaluation to Apply Statistical Software Process Control in High Maturity Organizations Monalessa Perini Barcellos

More information

Towards Privacy aware Big Data analytics

Towards Privacy aware Big Data analytics Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy

More information

Take Advantage of Social Media. Monitoring. www.intelligencepathways.com

Take Advantage of Social Media. Monitoring. www.intelligencepathways.com Take Advantage of Social Media Monitoring WHY PERFORM COMPETITIVE ANALYSIS ON SOCIAL MEDIA? Analysis of social media is an important part of a competitor overview analysis, no matter if you have just started

More information

Find the signal in the noise

Find the signal in the noise Find the signal in the noise Electronic Health Records: The challenge The adoption of Electronic Health Records (EHRs) in the USA is rapidly increasing, due to the Health Information Technology and Clinical

More information

Executive summary. Today s researchers require skills beyond their core competencies

Executive summary. Today s researchers require skills beyond their core competencies EXECUTIVE SUMMARY 9 Executive summary Today s researchers require skills beyond their core competencies The formation and careers of researchers are important policy issues and training for transferable

More information

ICT Perspectives on Big Data: Well Sorted Materials

ICT Perspectives on Big Data: Well Sorted Materials ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in

More information

FNSPIM502 Facilitate workplace assessment with stakeholders for personal injury cases

FNSPIM502 Facilitate workplace assessment with stakeholders for personal injury cases FNSPIM502 Facilitate workplace assessment with stakeholders for personal injury cases Release: 1 FNSPIM502 Facilitate workplace assessment with stakeholders for personal injury cases Modification History

More information

Open Source Software Usage in the Schools conceptual strategy

Open Source Software Usage in the Schools conceptual strategy Open Source Software Usage in the Schools conceptual strategy Kliment Simoncev simoncev@gmail.com open source advocate on behalf of MoES Drafting conceptual strategy Leverage open source software in different

More information