Skip to main content

What Users Do: SA&D with the ATSA Method

  • Conference paper
  • First Online:
Information Systems Development

Abstract

Incomplete or inefficient elicitation, comprehension and transmission of client requirements are all sources of information system (IS) failure rates. Requirements may be missed, misunderstood or miscommunicated for the lack of a single, consistent, informing theory. Structured requirements elicitations techniques impose time delays. Cursory techniques can fail to reach any mutual understanding with the stakeholder. Formal methods can fail to cope with non-functional requirements and coder-oriented methods can put the cart before the horse, delivering something other than required. Agile methods can deliver hasty product, cobbled to meet first-cut requirements, perhaps justified by a notion that users cannot reach stable conclusions.

This chapter introduces the Activity Theoretic Software Architecture (ATSA) method (formerly known under the working title ‘5S’), which deploys Activity Theory (AT) as it’s informing theoretical framework to address complex human ‘doings’ in a non-burdensome way, to elicit requirements and generate feasible specifications with some confidence as to fidelity and consensual agreement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Brown RBK (2010) The ATSA method for specifying both system and user interface requirements. Ph.D. thesis, University of Wollongong, Australia

    Google Scholar 

  • Brown RBK, Hyland P, Piper IC (2006) Specifying system requirements using the 5S method. ACIS 2006 proceedings, Paper 100. http://aisel.aisnet.org/acis2006/100

  • Constantine LL, Lockwood LAD (1999) Software for use a practical guide to the models and methods of usage-centred design. Addison-Wesley, Boston

    Google Scholar 

  • Crear J (2009) CIO Standish Group. http://www1.standishgroup.com/newsroom/chaos_2009.php. Accessed 24 Mar 2010

  • Engström Y (1987) Learning by expanding: an activity-theoretical approach to developmental research. Orienta-Konsultit Oy, Helsinki

    Google Scholar 

  • Kuutti K (1991) Activity theory and its applications to information systems research and development. In: Nissen HE, Klein HK, Hirsheims R (eds) Information systems research: contemporary approaches and emergent traditions. Elsevier Science, Amsterdam, pp 529–549

    Google Scholar 

  • Leont’ev AN (1978) Activity, consciousness, and personality. Prentice Hall, Englewood Cliffs

    Google Scholar 

  • Martins LEG, Daltrini BM (1999) An approach to software requirements elicitation using precepts from activity theory. Fourth IEEE international conference on automated software engineering, pp15–23

    Google Scholar 

  • OASIG (1995) in http://www.it-cortex.com/Stat_Failure_Rate.htm#The%20OASIG%20Study%20. Rudin W (1976). Accessed 15 Mar 2007

  • Otwell A (2005) Activity theory and user-centered design. Blog: heyblog: a space for half-formed thoughts. (July 29, 2005). http://www.heyotwell.com/heyblog/archives/2005/07/activity_theory.html. Accessed 20 Aug 2008

  • Räsänen M, Nyce JM (2006) A new role for anthropology? – Rewriting ‘Context’ and ‘Analysis’ in HCI. Nordic conference on human-computer interaction: changing roles (NORDICHI’06), Oslo, Norway, Proceedings New York, NY, USA. ACM Press, pp 175–184

    Google Scholar 

  • Sommerville I, Sawyer P, Viller S (1998) Viewpoints for requirements elicitation: a practical approach. In: Proceedings of the 3rd IEEE international conference on requirements engineering (ICRE’98), Colorado Springs, USA, pp 74–81

    Google Scholar 

  • The Standish Group (1995) The CHAOS report (1994). http://www.standishgroup.com/sample_research/chaos_1994_1.php. Accessed 24 Mar 2010

  • Verenikina I, Gould E (1998) Cultural-historical psychology and activity theory. In: Hasan H, Gould E, Hyland P (eds) Information systems and activity theory: tools in context, 1st edn. University of Wollongong Press, Wollongong

    Google Scholar 

  • Vrazalic L (2004) Towards holistic human-computer interaction evaluation research and practice: development and validation of the distributed usability evaluation method. Ph.D. thesis, University of Wollongong, Australia

    Google Scholar 

  • Vygotsky LS (1978) Mind in society. Harvard University Press, Cambridge, MA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert B. K. Brown .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Brown, R.B.K., Piper, I.C. (2013). What Users Do: SA&D with the ATSA Method. In: Pooley, R., Coady, J., Schneider, C., Linger, H., Barry, C., Lang, M. (eds) Information Systems Development. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4951-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4951-5_25

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4950-8

  • Online ISBN: 978-1-4614-4951-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics