Skip to main content
Top

2018 | OriginalPaper | Chapter

Eliciting Requirements for Improving Users’ Behavior Using Transparency

Authors : Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka

Published in: Requirements Engineering for Internet of Things

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A software system is developed for satisfying requirements of stakeholders. Each requirement will be never satisfied without the collaboration of several components such as the system, devices and people interacting with them, i.e. users. However, a user does not or cannot always behave toward the other components according to their expectations. For example, a user sometimes makes mistake or even misuse of the system. The system thus has to encourage users to behave according to such expectations as well as possible. In this paper, we propose a method for eliciting software requirements that will improve users’ behavior with respect to the expectations. We rely on transparency, i.e. the open flow of information amongst stakeholders because no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
I had this experience at the small supermarket in Sweden.
 
Literature
1.
go back to reference Blaine, J.D., Cleland-Huang, J.: Software quality requirements: how to balance competing priorities. IEEE Softw. 25(2), 22–24 (2008)CrossRef Blaine, J.D., Cleland-Huang, J.: Software quality requirements: how to balance competing priorities. IEEE Softw. 25(2), 22–24 (2008)CrossRef
2.
go back to reference Imperial chemical industries: A guide to hazard and operability studies. Chemical Industry Safety and Health Council of the Chemical Industries Association (1977) Imperial chemical industries: A guide to hazard and operability studies. Chemical Industry Safety and Health Council of the Chemical Industries Association (1977)
3.
5.
go back to reference Dekker, S.: The Field Guide to Understanding Human Error. Ashgate Publishing, Ltd. (2014) Dekker, S.: The Field Guide to Understanding Human Error. Ashgate Publishing, Ltd. (2014)
6.
go back to reference do Prado Leite, J.C.S., Cappelli, C.: Software transparency. Bus. Inform. Syst. Eng. 2(3), 127–139 (2010)CrossRef do Prado Leite, J.C.S., Cappelli, C.: Software transparency. Bus. Inform. Syst. Eng. 2(3), 127–139 (2010)CrossRef
7.
go back to reference Dromey, R.G.: A model for software product quality. IEEE Trans. Software Eng. 21(2), 146–162 (1995)CrossRef Dromey, R.G.: A model for software product quality. IEEE Trans. Software Eng. 21(2), 146–162 (1995)CrossRef
8.
go back to reference Burkart, H., Holzner, L.: Transparency in Global Change: The Vanguard of the Open Society Burkart Holzner and Leslie Holzner. University of Pittsburgh Press Pittsburgh, PA (2006) Burkart, H., Holzner, L.: Transparency in Global Change: The Vanguard of the Open Society Burkart Holzner and Leslie Holzner. University of Pittsburgh Press Pittsburgh, PA (2006)
9.
go back to reference Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Towards engineering transparency as a requirement in socio-technical systems. In: 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, 24–28 August 2015, pp. 268–273 (2015) Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Towards engineering transparency as a requirement in socio-technical systems. In: 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, 24–28 August 2015, pp. 268–273 (2015)
10.
go back to reference Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Foundations for transparency requirements engineering. In: Requirements Engineering: Foundation for Software Quality - 22nd International Working Conference, Proceedings, REFSQ 2016, Gothenburg, Sweden, 14–17 March 2016, pp. 225–231 (2016) Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Foundations for transparency requirements engineering. In: Requirements Engineering: Foundation for Software Quality - 22nd International Working Conference, Proceedings, REFSQ 2016, Gothenburg, Sweden, 14–17 March 2016, pp. 225–231 (2016)
11.
13.
go back to reference Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001) Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001)
14.
go back to reference Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: Information flow diagram and analysis method for unexpected obstacle specification of embedded software. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 115–124 (2006) Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: Information flow diagram and analysis method for unexpected obstacle specification of embedded software. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 115–124 (2006)
15.
go back to reference Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: A conceptual model for analysis method of extracting unexpected obstacles of embedded systems. In Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, 25–28 August 2008, University of Piraeus, Piraeus, Greece, pp. 22–31 (2008) Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: A conceptual model for analysis method of extracting unexpected obstacles of embedded systems. In Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, 25–28 August 2008, University of Piraeus, Piraeus, Greece, pp. 22–31 (2008)
16.
go back to reference Kemball-Cook, A.: Winning the trust of millennials. Global Coaching, p. 30 (2015) Kemball-Cook, A.: Winning the trust of millennials. Global Coaching, p. 30 (2015)
17.
go back to reference McDermott, J.P., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6–10 December 1999, Scottsdale, AZ, USA, pp. 55–64 (1999) McDermott, J.P., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6–10 December 1999, Scottsdale, AZ, USA, pp. 55–64 (1999)
18.
go back to reference Mise, T., Shinyashiki, Y., Nakatani, T., Ubayashi, N., Katamine, K., Hashimoto, M.: A method for extracting unexpected scenarios of embedded systems. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 41–50 (2006) Mise, T., Shinyashiki, Y., Nakatani, T., Ubayashi, N., Katamine, K., Hashimoto, M.: A method for extracting unexpected scenarios of embedded systems. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 41–50 (2006)
19.
go back to reference Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: MASG: advanced misuse case analysis model with assets and security goals. JIP 22(3), 536–546 (2014) Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: MASG: advanced misuse case analysis model with assets and security goals. JIP 22(3), 536–546 (2014)
20.
go back to reference Reifer, D.J.: Software failure modes and effects analysis. IEEE Trans. Reliab. 28(3), 247–249 (1979)CrossRef Reifer, D.J.: Software failure modes and effects analysis. IEEE Trans. Reliab. 28(3), 247–249 (1979)CrossRef
21.
go back to reference Salehie, M., Tahvildari, L.: Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Systems (TAAS) 4(2), 14 (2009) Salehie, M., Tahvildari, L.: Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Systems (TAAS) 4(2), 14 (2009)
22.
go back to reference Shinyashiki, Y., Mise, T., Hashimoto, M., Katamine, K., Ubayashi, N., Nakatani, T.: Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software. In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5–7 December 2007, Nagoya, Japan, pp. 326–333 (2007) Shinyashiki, Y., Mise, T., Hashimoto, M., Katamine, K., Ubayashi, N., Nakatani, T.: Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software. In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5–7 December 2007, Nagoya, Japan, pp. 326–333 (2007)
23.
go back to reference Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34–44 (2005)CrossRef Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34–44 (2005)CrossRef
24.
go back to reference Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: 16th IEEE International Requirements Engineering Conference, RE 2008, 8–12 September 2008, Barcelona, Catalunya, Spain, pp. 3–12 (2008) Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: 16th IEEE International Requirements Engineering Conference, RE 2008, 8–12 September 2008, Barcelona, Catalunya, Spain, pp. 3–12 (2008)
25.
go back to reference van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009) van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)
26.
go back to reference van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Software Eng. 26(10), 978–1005 (2000)CrossRef van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Software Eng. 26(10), 978–1005 (2000)CrossRef
27.
go back to reference Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press, Cambridge (2010) Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press, Cambridge (2010)
Metadata
Title
Eliciting Requirements for Improving Users’ Behavior Using Transparency
Authors
Haruhiko Kaiya
Nobukazu Yoshioka
Hironori Washizaki
Takao Okubo
Atsuo Hazeyama
Shinpei Ogata
Takafumi Tanaka
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7796-8_4

Premium Partner