Skip to main content

Method Engineering: A Formal Description

  • Chapter
  • First Online:
Information Systems Development

Abstract

The development of information systems (IS) requires methods that recommend how to act during the development process. In some cases existing methods cannot cope with the requirements of the project situation at hand. Therefore, new methods must be developed. Method engineering (ME) attends to this application field. In this chapter, we provide a detailed overview of IS method engineering approaches in order to describe the concept of method engineering. Based on a literature review we derive a formal description of methods that can be used to describe them in a basic way and transfer them to other fields of application. With the formal description of methods this chapter facilitates the process of understanding method engineering both for method user and its engineer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Nilsson makes a difference between strategic, process-oriented and system-oriented development, see [16].

  2. 2.

    The third dimension abstraction level is not the subject of consideration.

  3. 3.

    Cited in [8].

  4. 4.

    Process and product fragments in [10, 19], process and notation in [21].

  5. 5.

    5 To be read: for a process fragment p element of P there exists (at least) one product fragment r element of R, for that applies: p requires r.

  6. 6.

    CCTA's (Central Computer and Telecommunications Agency of the UK Government) Risk Analysis and Management Methodology, see Baskerville [3].

  7. 7.

    Information security risk analysis method, see Karabacak and Sogukpinar [12]

  8. 8.

    For details to the mentioned formula (67.2), see Karabacak and Sogukpinar [12].

  9. 9.

    For details to the mentioned formula (67.2), see Karabacak and Sogukpinar [12].

References

  1. Avison, D.E., Fitzgerald, G. (1995) Information Systems Development: Methodologies, Techniques and Tools. McGraw-Hill, New York.

    Google Scholar 

  2. Ayed, M.B., Ralyté, J. and Rolland, C. (2004) Constructing the Lyee Method with a Method Engineering Approach. In: Knowledge-Based Systems, Vol. 17, pp. 239–248.

    Article  Google Scholar 

  3. Baskerville, R. (1993) Information Systems Security Design Methods: Implications for Information Systems Development. In: ACM Computing Surveys, Vol. 25, No. 4, pp. 375–414.

    Article  Google Scholar 

  4. Braun, C., Wortmann, F., Hafner, M. and Winter, R. (2005) Method Construction – A Core Approach to Organizational Engineering. In: ACM Symposium on Applied Computing SAC’05, March 13–17, Santa Fe, New Mexico, USA.

    Google Scholar 

  5. Brinkkemper, S. (1996) Method Engineering: Engineering of Information Systems Development Methods and Tools. In: Information and Software Technology, Vol. 38, No. 4, pp. 275–280.

    Article  Google Scholar 

  6. Brinkkemper, S., Saeki, M. and Harmsen, F. (1999) Meta-Modelling Based Assembly Techniques For Situational Method Engineering. In: Information Systems, Vol. 24, No. 3, pp. 209–228.

    Article  Google Scholar 

  7. Chen, P. Pin-Shan (1976) The Entity-Relationship Model – Toward a Unified View of Data. In: ACM Transactions on Database Systems, Vol. 1, No. 1, pp. 9–36.

    Article  Google Scholar 

  8. Cronholm, S. and Ågerfalk, P.J. (1999) On the Concept of Method in Information Systems Development. In: http://citeseer.ist.psu.edu/283885.html.

  9. Harel, D. (1987) Statecharts: A Visual Formalism for Complex Systems. In: Science of Computer Programming, Vol. 8, pp. 231–274.

    Article  MathSciNet  MATH  Google Scholar 

  10. Harmsen, F., Brinkkemper, S. and Oei, H. (1994) Situational Method Engineering for Information System Project Approaches. In: A.A. Verrijn-Stuart, T.W. Olle (Eds.), Methods and Associated Tools for the Information Systems Life Cycle. Elsevier Science B.V., Amsterdam 1994, pp. 169–194.

    Google Scholar 

  11. Huber, M., Sunyaev, A. and Krcmar, H. (2008): Security Analysis of the Health Care Telematics Infrastructure in Germany. In: ICEIS 2008 – Proceedings of the Tenth International Conference on Enterprise Information Systems, Barcelona, Spain, Vol. ISAS-2, pp. 144–153.

    Google Scholar 

  12. Karabacak, B. and Sogukpinar, I. (2005) ISRAM: information security risk analysis method. In: Computers & Security Vol. 24, pp. 147–159.

    Article  Google Scholar 

  13. Karlsson, F., Ågerfalk, P.J. and Hjalmarsson, A. (2001) Method Configuration with Development Tracks and Generic Project Types. In: 6th CaiSE/IFIP8.1 International Workshop on Evaluation of Modeling Methods in System Analysis and Design (EMMSAD’01), Interlaken, Switzerland, 4–5 June 2001.

    Google Scholar 

  14. Karlsson, F. and Wistrand, K. (2004) MC Sandbox – Tool Support for Method Configuration. In: http://www.nuigalway.ie/acc/documents/fredrik_karlsson_NUIG-seminar-21052004.pdf.

  15. Martin, J. (1990) Information Engineering, Book II – Planning and Analysis. Prentice Hall, Englewood Cliffs 1990.

    Google Scholar 

  16. Nilsson, A.G. (1999) The Business Developer’s Toolbox: Chains and Alliances between Established Methods. In: A.G. Nilsson, C. Tolis and C. Nellborn (Eds.), Perspectives on Business Modelling, Understanding and Changing Organisations. Springer-Verlag, Berlin, Heidelberg 1999, pp. 217–241.

    Google Scholar 

  17. Object Management Group OMG (2008) The Object Management Group. In: http://www.omg.org/.

  18. Oxford Online Dictionary (2008) Fragment. In: http://www.askoxford.com/concise_oed/fragment?view=uk.

  19. Ralyté, J. and Rolland, C. (2001) An Approach for Method Reengineering. In: H.S. Kunii, S. Jajodia, A. Solvberg (Eds.), Conceptual Modeling. Proceedings of the 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27–30, 2001. Springer-Verlag, Berlin, Heidelberg 2001, pp. 471–484.

    Google Scholar 

  20. Rolland, C. (1997) A Primer for Method Engineering. In: http://citeseer.ist.psu.edu/rolland97primer.html.

  21. Röstlinger, A. and Goldkuhl, G. (1994) In Swedish: Generisk flexibilitet – På väg mot en komponentbaserad metodsyn. Presenterat på VITS Höstseminarium 1994. Institutionen för datavetenskap, Linköpings universitet.

    Google Scholar 

  22. Ter Hofstede, A.H.M., Verhoef, T.F. (1997) On the Feasibility of Situational Method Engineering. In: Information Systems, Vol. 22, No. 6/7, pp. 401–422.

    Article  MATH  Google Scholar 

  23. Webster, J. and Wason, R.T. (2002) Analyzing the Past to Prepare for the Future: Writing a Literature Review. In: MIS Quarterly, Vol. 26, No. 2, pp. xiii–xxiii.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Sunyaev, A., Hansen, M., Krcmar, H. (2009). Method Engineering: A Formal Description. In: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S., Zupancic, J. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/b137171_67

Download citation

  • DOI: https://doi.org/10.1007/b137171_67

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-84809-9

  • Online ISBN: 978-0-387-84810-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics