Abstract
Social networks, public and private media, administrative and business processes are based on a multitude of interconnected information systems. These growing software infrastructures, called social software in the following, get more and more entangled with everyday life and the processes of the society. Social software and society together form complex sociotechnical systems. In this paper, we describe how such sociotechnical systems can be modeled in a way that integrates social and software processes. The models can be reflective in the sense that they include the processes for their own modification. This way, system evolution can be expressed and studied as part of the model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
E.g. compared to [18].
- 2.
Except maybe for copyright regulations.
- 3.
For better readability, we use different line formats for associations and emphasize the directions of the associations by arrowheads.
- 4.
Such as the form of study plans.
- 5.
Different from [2], we relate the stakeholders to an STSS and not to a product.
- 6.
We use the terms “process model” and “process description” synonymously.
References
Abadi M (2003) Logic in access control. In: LICS, Ottawa. IEEE Computer Society, Los Alamitos, p 228
Alexander IF, Robertson S (2004) Understanding project sociology by modeling stakeholders. IEEE Softw 21(1):23–27
Bennett KH, Rajlich V (2000) Software maintenance and evolution: a roadmap. In: Finkelstein A (ed) ICSE – future of SE track, Limerick. ACM, pp 73–87
Cheng BHC, Atlee JM (2007) Research directions in requirements engineering. In: Briand LC, Wolf AL (eds) FOSE, Minneapolis, pp 285–303
Cheng EC (2000) An object-oriented organizational model to support dynamic role-based access control in electronic commerce. Decis Support Syst 29(4):357–369
Chronopoulos K, Gouseti M, Kiayias A (2013) Resource access control in the facebook model. In: Abdalla M, Nita-Rotaru C, Dahab R (eds) CANS, Paraty. Volume 8257 of Lecture notes in computer science. Springer, pp 179–198
Dittrich Y (2014, to appear) Software engineering beyond the project – sustaining software eco-systems. Inf Softw Technol
Härder T, Reuter A (1983) Principles of transaction-oriented database recovery. ACM Comput Surv 15(4):287–317
Ko AJ, Abraham R, Beckwith L, Blackwell AF, Burnett MM, Erwig M, Scaffidi C, Lawrance J, Lieberman H, Myers BA, Rosson MB, Rothermel G, Shaw M, Wiedenbeck S (2011) The state of the art in end-user software engineering. ACM Comput Surv 43(3):21
Lim SL, Finkelstein A (2012) StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation. IEEE Trans Softw Eng 38(3):707–735
Lim SL, Ncube C (2013) Social networks and crowdsourcing for stakeholder analysis in system of systems projects. In: SoSE, Maui. IEEE, pp 13–18
Mertens P (2012) Schwierigkeiten mit IT-Projekten der Öffentlichen Verwaltung – Neuere Entwicklungen. Inform Spektrum 35(6):433–446
Monteiro E, Pollock N, Hanseth O, Williams R (2013) From artefacts to infrastructures. Comput Support Coop Work 22(4–6):575–607
Ni Q, Bertino E, Lobo J, Brodie C, Karat C-M, Karat J, Trombetta A (2010) Privacy-aware role-based access control. ACM Trans Inf Syst Secur 13(3)
Paech B (2000) Aufgabenorientierte Softwareentwicklung – integrierte Gestaltung von Unternehmen, Arbeit und software. Springer, Berlin/New York
Pipek V, Wulf V (2009) Infrastructuring: toward an integrated perspective on the design and use of information technology. J AIS 10(5)
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47
Wikipedia: Social software. Visited 17 Jan 2014
Sommerville I (2007) Software engineering, 8th edn. Addison-Wesley, London/Reading
Star SL, Bowker GC (2002) How to infrastructure. In: Lieverouw LA, Livingstone S (eds) Handbook of new media: social shaping and social consequences of ICTs. SAGE, London/Thousand Oaks, pp 151–162
van der Aalst WMP (2013) Business process management: a comprehensive survey. ISRN Softw Eng 2013:37p
Wainer J, Kumar A, Barthelmess P (2007) DW-RBAC: a formal security model of delegation and revocation in workflow systems. Inf Syst 32(3):365–384
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Poetzsch-Heffter, A., Paech, B., Weber, M. (2014). Integrated Modeling and Evolution of Social Software. In: Zweig, K., Neuser, W., Pipek, V., Rohde, M., Scholtes, I. (eds) Socioinformatics - The Social Impact of Interactions between Humans and IT. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-319-09378-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-09378-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09377-2
Online ISBN: 978-3-319-09378-9
eBook Packages: Computer ScienceComputer Science (R0)