Abstract
A software system is developed for satisfying requirements of stakeholders. Each requirement will be never satisfied without the collaboration of several components such as the system, devices and people interacting with them, i.e. users. However, a user does not or cannot always behave toward the other components according to their expectations. For example, a user sometimes makes mistake or even misuse of the system. The system thus has to encourage users to behave according to such expectations as well as possible. In this paper, we propose a method for eliciting software requirements that will improve users’ behavior with respect to the expectations. We rely on transparency, i.e. the open flow of information amongst stakeholders because no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
I had this experience at the small supermarket in Sweden.
References
Blaine, J.D., Cleland-Huang, J.: Software quality requirements: how to balance competing priorities. IEEE Softw. 25(2), 22–24 (2008)
Imperial chemical industries: A guide to hazard and operability studies. Chemical Industry Safety and Health Council of the Chemical Industries Association (1977)
Cheng, B.H.C., et al.: Software engineering for self-adaptive systems: a research roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol. 5525, pp. 1–26. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02161-9_1
Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. Springer Science & Business Media, Boston (2012). https://doi.org/10.1007/978-1-4615-5269-7
Dekker, S.: The Field Guide to Understanding Human Error. Ashgate Publishing, Ltd. (2014)
do Prado Leite, J.C.S., Cappelli, C.: Software transparency. Bus. Inform. Syst. Eng. 2(3), 127–139 (2010)
Dromey, R.G.: A model for software product quality. IEEE Trans. Software Eng. 21(2), 146–162 (1995)
Burkart, H., Holzner, L.: Transparency in Global Change: The Vanguard of the Open Society Burkart Holzner and Leslie Holzner. University of Pittsburgh Press Pittsburgh, PA (2006)
Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Towards engineering transparency as a requirement in socio-technical systems. In: 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, 24–28 August 2015, pp. 268–273 (2015)
Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Foundations for transparency requirements engineering. In: Requirements Engineering: Foundation for Software Quality - 22nd International Working Conference, Proceedings, REFSQ 2016, Gothenburg, Sweden, 14–17 March 2016, pp. 225–231 (2016)
Hosseini, M., Shahri, A., Phalp, K., Ali, R.: A modelling language for transparency requirements in business information systems. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 239–254. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39696-5_15
Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Four reference models for transparency requirements in information systems. Requirements Engineering, March 2017. https://doi.org/10.1007/s00766-017-0265-y
Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001)
Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: Information flow diagram and analysis method for unexpected obstacle specification of embedded software. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 115–124 (2006)
Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: A conceptual model for analysis method of extracting unexpected obstacles of embedded systems. In Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, 25–28 August 2008, University of Piraeus, Piraeus, Greece, pp. 22–31 (2008)
Kemball-Cook, A.: Winning the trust of millennials. Global Coaching, p. 30 (2015)
McDermott, J.P., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6–10 December 1999, Scottsdale, AZ, USA, pp. 55–64 (1999)
Mise, T., Shinyashiki, Y., Nakatani, T., Ubayashi, N., Katamine, K., Hashimoto, M.: A method for extracting unexpected scenarios of embedded systems. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 41–50 (2006)
Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: MASG: advanced misuse case analysis model with assets and security goals. JIP 22(3), 536–546 (2014)
Reifer, D.J.: Software failure modes and effects analysis. IEEE Trans. Reliab. 28(3), 247–249 (1979)
Salehie, M., Tahvildari, L.: Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Systems (TAAS) 4(2), 14 (2009)
Shinyashiki, Y., Mise, T., Hashimoto, M., Katamine, K., Ubayashi, N., Nakatani, T.: Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software. In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5–7 December 2007, Nagoya, Japan, pp. 326–333 (2007)
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34–44 (2005)
Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: 16th IEEE International Requirements Engineering Conference, RE 2008, 8–12 September 2008, Barcelona, Catalunya, Spain, pp. 3–12 (2008)
van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)
van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Software Eng. 26(10), 978–1005 (2000)
Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press, Cambridge (2010)
Acknowledgement
This work was supported by JSPS KAKENHI Grant Number 15H02686, 16H02804, 15K00109, 17K00475 and 16K00196. The authors also thank to Prof. Takako Nakatani who suggested important related works.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kaiya, H. et al. (2018). Eliciting Requirements for Improving Users’ Behavior Using Transparency. In: Kamalrudin, M., Ahmad, S., Ikram, N. (eds) Requirements Engineering for Internet of Things. APRES 2017. Communications in Computer and Information Science, vol 809. Springer, Singapore. https://doi.org/10.1007/978-981-10-7796-8_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-7796-8_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7795-1
Online ISBN: 978-981-10-7796-8
eBook Packages: Computer ScienceComputer Science (R0)