Skip to main content

Eliciting Requirements for Improving Users’ Behavior Using Transparency

  • Conference paper
  • First Online:
Requirements Engineering for Internet of Things (APRES 2017)

Abstract

A software system is developed for satisfying requirements of stakeholders. Each requirement will be never satisfied without the collaboration of several components such as the system, devices and people interacting with them, i.e. users. However, a user does not or cannot always behave toward the other components according to their expectations. For example, a user sometimes makes mistake or even misuse of the system. The system thus has to encourage users to behave according to such expectations as well as possible. In this paper, we propose a method for eliciting software requirements that will improve users’ behavior with respect to the expectations. We rely on transparency, i.e. the open flow of information amongst stakeholders because no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    I had this experience at the small supermarket in Sweden.

References

  1. Blaine, J.D., Cleland-Huang, J.: Software quality requirements: how to balance competing priorities. IEEE Softw. 25(2), 22–24 (2008)

    Article  Google Scholar 

  2. Imperial chemical industries: A guide to hazard and operability studies. Chemical Industry Safety and Health Council of the Chemical Industries Association (1977)

    Google Scholar 

  3. Cheng, B.H.C., et al.: Software engineering for self-adaptive systems: a research roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol. 5525, pp. 1–26. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02161-9_1

    Chapter  Google Scholar 

  4. Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. Springer Science & Business Media, Boston (2012). https://doi.org/10.1007/978-1-4615-5269-7

    MATH  Google Scholar 

  5. Dekker, S.: The Field Guide to Understanding Human Error. Ashgate Publishing, Ltd. (2014)

    Google Scholar 

  6. do Prado Leite, J.C.S., Cappelli, C.: Software transparency. Bus. Inform. Syst. Eng. 2(3), 127–139 (2010)

    Article  Google Scholar 

  7. Dromey, R.G.: A model for software product quality. IEEE Trans. Software Eng. 21(2), 146–162 (1995)

    Article  Google Scholar 

  8. Burkart, H., Holzner, L.: Transparency in Global Change: The Vanguard of the Open Society Burkart Holzner and Leslie Holzner. University of Pittsburgh Press Pittsburgh, PA (2006)

    Google Scholar 

  9. Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Towards engineering transparency as a requirement in socio-technical systems. In: 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, 24–28 August 2015, pp. 268–273 (2015)

    Google Scholar 

  10. Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Foundations for transparency requirements engineering. In: Requirements Engineering: Foundation for Software Quality - 22nd International Working Conference, Proceedings, REFSQ 2016, Gothenburg, Sweden, 14–17 March 2016, pp. 225–231 (2016)

    Google Scholar 

  11. Hosseini, M., Shahri, A., Phalp, K., Ali, R.: A modelling language for transparency requirements in business information systems. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 239–254. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39696-5_15

    Google Scholar 

  12. Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Four reference models for transparency requirements in information systems. Requirements Engineering, March 2017. https://doi.org/10.1007/s00766-017-0265-y

  13. Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001)

    Google Scholar 

  14. Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: Information flow diagram and analysis method for unexpected obstacle specification of embedded software. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 115–124 (2006)

    Google Scholar 

  15. Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: A conceptual model for analysis method of extracting unexpected obstacles of embedded systems. In Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, 25–28 August 2008, University of Piraeus, Piraeus, Greece, pp. 22–31 (2008)

    Google Scholar 

  16. Kemball-Cook, A.: Winning the trust of millennials. Global Coaching, p. 30 (2015)

    Google Scholar 

  17. McDermott, J.P., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6–10 December 1999, Scottsdale, AZ, USA, pp. 55–64 (1999)

    Google Scholar 

  18. Mise, T., Shinyashiki, Y., Nakatani, T., Ubayashi, N., Katamine, K., Hashimoto, M.: A method for extracting unexpected scenarios of embedded systems. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28–31 August 2006, Tallinn, Estonia, pp. 41–50 (2006)

    Google Scholar 

  19. Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: MASG: advanced misuse case analysis model with assets and security goals. JIP 22(3), 536–546 (2014)

    Google Scholar 

  20. Reifer, D.J.: Software failure modes and effects analysis. IEEE Trans. Reliab. 28(3), 247–249 (1979)

    Article  Google Scholar 

  21. Salehie, M., Tahvildari, L.: Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Systems (TAAS) 4(2), 14 (2009)

    Google Scholar 

  22. Shinyashiki, Y., Mise, T., Hashimoto, M., Katamine, K., Ubayashi, N., Nakatani, T.: Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software. In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5–7 December 2007, Nagoya, Japan, pp. 326–333 (2007)

    Google Scholar 

  23. Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34–44 (2005)

    Article  Google Scholar 

  24. Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: 16th IEEE International Requirements Engineering Conference, RE 2008, 8–12 September 2008, Barcelona, Catalunya, Spain, pp. 3–12 (2008)

    Google Scholar 

  25. van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)

    Google Scholar 

  26. van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Software Eng. 26(10), 978–1005 (2000)

    Article  Google Scholar 

  27. Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press, Cambridge (2010)

    Google Scholar 

Download references

Acknowledgement

This work was supported by JSPS KAKENHI Grant Number 15H02686, 16H02804, 15K00109, 17K00475 and 16K00196. The authors also thank to Prof. Takako Nakatani who suggested important related works.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haruhiko Kaiya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaiya, H. et al. (2018). Eliciting Requirements for Improving Users’ Behavior Using Transparency. In: Kamalrudin, M., Ahmad, S., Ikram, N. (eds) Requirements Engineering for Internet of Things. APRES 2017. Communications in Computer and Information Science, vol 809. Springer, Singapore. https://doi.org/10.1007/978-981-10-7796-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7796-8_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7795-1

  • Online ISBN: 978-981-10-7796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics