Skip to main content
Log in

Empirical comparisons of animation and narration in requirements validation

  • Original Article
  • Published:
Requirements Engineering Aims and scope Submit manuscript

Abstract

Increasingly powerful computing technology suggests an expansion of multimedia features in requirements engineering methods. It is not obvious, however, that techniques such as animation and narration would improve the effectiveness of communicating domain information to stakeholders for validation. Three principles from the cognitive theory of multimedia learning (CTML) are used to compare validation methods using animation and narration with more traditional methods using static diagrams and text. Results suggest animation and narration can have significant positive impact on the level of domain understanding attained by participants. In particular, narration yielded strongly significant results. While these results should be viewed as preliminary, they indicate a potential advantage in the use of narration and possibly animation in requirements validation. The results provide justification for further research on the integration of multimedia techniques in developing and validating requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Gane C, Sarson T (1979) Structured systems analysis: tools and techniques. Prentice-Hall, Englewood Cliffs, NJ

    Google Scholar 

  2. Avison DE, Fitzgerald G (1995) Information systems development: methodologies, techniques, and tools, 2nd edn. McGraw-Hill, London

    Google Scholar 

  3. Chatzoglou PD, Macaulay LA (1996) Requirements capture and IS methodologies. Info Syst J 6:209–225

    Google Scholar 

  4. Jayaratna N (1990) Understanding and evaluating methodologies, NIMSAD: a systemic framework. McGraw-Hill, Maidenhead

  5. Oei JLH, van Hemmen LJ, Falkenberg ED, Brinkkemper S (1992) The meta model hierarchy: a framework for information systems concepts and techniques. Technical report, Department of Informatics, Faculty of Mathematics and Informatics. Katholieke Universiteir, Nijmegen, No 92-17, July 1992, pp 1–30

    Google Scholar 

  6. Chen D, Chen W, Kavi K (2002) Visual requirement representation. J Syst Software 61:129–143

    Article  Google Scholar 

  7. Lalioti V (1997) Animation for validation of business system specifications. In: Hawaii international conference on system sciences 30, The dynamics of business systems engineering, Wailea, Hawaii, January 1997, pp 7–10

  8. Lalioti V, Loucopoulos O (1994) Visualisation of conceptual specifications. Info Syst J 19:291–309

    Article  Google Scholar 

  9. Mayer RE (2001) Multimedia learning. Cambridge University Press, New York

  10. Kung CH Solvberg A (1986) Activity modelling and behaviour modelling. In: Olle TW, Sol HG, Verrijn-Stuart AA (eds) Information systems design methodologies: improving the practice. North Holland, Amsterdam, pp 145–171

  11. Bubenko JA Jr (1986) Information system methodologies: a research review. In: Olle TW, Sol HG, Verrijn-Stuart AA (eds) Information systems design methodologies: improving the practice. North Holland, Amsterdam, pp 289–317

  12. Olle TW, Sol HG, Verrjin-Stuart AA (eds) (1982) Information system design methodologies—a comparative review. CRIS ‘82 Proceedings, North Holland, Amsterdam

  13. Johnson RA (2002) Object-oriented system development: a review of empirical research. Commun Assoc Info Syst 8:65–81

    Google Scholar 

  14. Topi H, Ramesh V (2002 ) Human factors research on data modeling: an extended framework and future research directions. J Database Manage 13(2):3–20

    Google Scholar 

  15. Wand Y, Weber R (2002) Information systems and conceptual modeling a research agenda. Info Sys Res 13:203–223

    Google Scholar 

  16. Vessey I, Conger S (1994) Requirements specification: learning object, process, and data methodologies. Comm ACM 37:102–113

    Article  Google Scholar 

  17. Brosey M, Shniederman B (1978) Two experimental comparisons of relational and hierarchical database models. Int J Man-Machine Studies 10:625–37

    Google Scholar 

  18. Nosek, J, Ahrens J (1986) An experiment to test user validation of requirements: data flow diagrams vs. task oriented menus. Int J Man-Machine Studies 25:675–84

    Google Scholar 

  19. Ramsey R, Atwood M, Van Doren J (1993) Flowcharts versus program design languages: an experimental comparison. Comm ACM 26:445–449

    Article  Google Scholar 

  20. Yadav S, Bravococ R, Chatfield A, Rajkumar T (1988) Comparison of analysis techniques for information requirements determination. Comm ACM 31:1090–97

    Article  Google Scholar 

  21. Vessey I, Jarvenpaa S, Tractinsky N (1992) Evaluation of vendor products: CASE tools as methodology companions. Comm ACM 35:90–105

    Article  Google Scholar 

  22. Jarvenpaa S, Machesky J (1989) Data analysis and learning: an experimental study of data modeling tools. Int J Man-Machine Studies 31:367–91

    Google Scholar 

  23. Batra D, Hoffer J, Bostrom R (1990) Comparing representations with relational and eer models. Comm ACM 33:126–139

    Article  Google Scholar 

  24. Siau KL (1996) Empirical studies in information modeling. Dissertation, University of British Columbia, Canada

  25. Mayer RE (1989) Models for understanding. Rev Educ Res 59:43–64

    Google Scholar 

  26. Bodart F, Patel A, Sim M, Weber R (2001) Should optional properties be used in conceptual modeling? A theory and three empirical tests. Info Syst Res 12:384–405

    Google Scholar 

  27. Burton-Jones A, Meso P (2002) How good are these UML diagrams? an empirical test of the Wand and Weber good decomposition model. In: Applegate L, Galliers R, DeGross JI (eds) Proceedings of the international conference on information systems 2002, Barcelona, Spain, 15–18 December 2002

  28. Gemino A (1999) Empirical methods for comparing system analysis techniques. Dissertation, University of British Columbia, Canada

  29. Sukaviriya P (1990) Coupling a UI framework with automatic generation of context sensitive animated help. In: Proceedings of the ‘90 ACM SIGGRAPH symposium on user interface software and technology, pp 152–166

  30. Baecker R, Small I (1990) Animation at the interface. In: Laurel B (ed) The art of human-computer interface design. Addison-Wesley, Reading, MA, pp 251–267

  31. Palmiter S (1993) The effectiveness of animated demonstrations for computer-based tasks: a summary, model, and future research. J Visual Lang Comput 4:71–89

    Article  Google Scholar 

  32. Rieber LP, Boyce MJ, Assad C (1990) The effects of computer animation on adult learning and retrieval tasks. J Computer-Based Interaction 17:46–52

    Google Scholar 

  33. Byrne MD, Catrambone R, Stasko JT (1996) Do algorithms aid learning? Technical report, GIT-GVU-96-18, Georgia Institute of Technology, Atlanta

  34. Narayanan NH, Hegarty M (2002) Multimedia design for communication of dynamic information. Int J Human-Comput Studies 57:279–315

    Google Scholar 

  35. Narayanan NH, Hegarty M (1996) On designing comprehensible interactive hypermedia manuals. Int J Human-Computer Studies 48:267–301

    Google Scholar 

  36. Hegarty M, Just MA (1993) Constructing mental models of text and diagrams. J Memory Lang 32:717–742

    Article  Google Scholar 

  37. Faraday P, Sutcliffe A (1997) Designing effective multimedia presentations. Proceedings CHI’97 ACM, Atlanta, Georgia, 22–27 March 1997, pp 92–98

  38. Vetere F, Howard S (1999) Redundancy effects in instructional multimedia systems. In: Sasse MA, Johnson C (eds) INTERACT 99’ TC 13 international conference on human computer interaction, 30 August–3 September 1999, IOS Press, Edinburgh, 1:589–596

  39. Paivio A (1991) Dual coding theory retrospect and current status. Can J Psychol 45:255–287

    Google Scholar 

  40. Mayer RE, Anderson RB (1991) Animations need narrations: an experimental test of a dual-coding hypothesis. J Educ Psychol 83:484–490

    Article  Google Scholar 

  41. Mayer RE, Moreno R (1998) A split-attention effect in multimedia learning: evidence for dual processing systems in working memory. J Educ Psychol 90:312–320

    Article  Google Scholar 

  42. Wand Y, Weber R (1993) On the ontological expressiveness of information systems analysis and design grammars. J Info Syst 3:217–237

    Google Scholar 

  43. Gemino A, Wand Y (2003) Evaluating modeling techniques based on models of learning. Comm ACM 46:79–84

    Article  Google Scholar 

  44. Bruner J (1966) Toward a theory of instruction. Harvard University Press, Cambridge, MA

  45. Mayer RE, Gallini JK (1990) When is an illustration worth ten thousand words? J Educ Psychol 82:715–726

    Article  Google Scholar 

  46. Lim KH, Benbasat I (2002) The influence of multimedia on improving the comprehension of organizational information. JMIS 2002 19:99–127

    Google Scholar 

  47. Mayer RE, Sims VK(1994) For whom is a picture worth a thousand words? Extensions of a dual-coding theory of multimedia learning. J Educ Psychol 86:389–401

    Article  Google Scholar 

  48. Coad P, Yourdon E (1991) Object oriented analysis. Yourdon Press, Englewood Cliffs, NJ

  49. Wand Y, Woo CC (1993) Object-oriented analysis—is it really that simple? In: Proceedings of the workshop on information technologies and systems, Orlando, FL, pp 186–195

  50. Stevens J (1992) Applied multivariate statistics for the social sciences, 2nd edn. Lawrence Erlbaum, Hillsdale, NJ

Download references

Acknowledgements

The author would like to acknowledge the work of Ryan Gunther in collecting empirical results and Denise Thomson in helping to prepare this manuscript. This research is supported by the Natural Science and Engineering Research Council (NSERC) of Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Gemino.

Experiment materials

Experiment materials

1.1 Text descriptions

1.1.1 Description for Conference case

An IFIP Working Conference is an international conference centered on a topic of specific interest to one or more IFIP working groups. Participation in the conference is by invitation only. Two objectives of the conference organizers are to ensure that members of the involved working group(s) and technical committee(s) are invited and that attendance is sufficient for financial break-even without exceeding the capacity of the facilities available.

Two committees are involved in organizing an IFIP working conference: a program committee and an organizing committee. The program committee deals with the technical content of the conference, and the organizing committee handles financial and local arrangements, along with invitations and publicity. These committees work together closely and have a need for common information.

When an IFIP conference is to be held, the program committee is responsible for several activities. These include preparing a mailing list of potential authors and sending a call for papers to each of these individuals. If the potential authors reply with a letter of intent indicating they will submit a paper to the conference, the program committee registers the participant’s intent to participate. When the paper is received, the paper is also registered.

After receiving the papers, the program committee assigns a set of reviewers for each paper and then sends the papers to the respective reviewers. Reviewers create a review report and send their reports to the committee. The committee then groups accepted papers into sessions and assigns session chairs. The list of accepted authors is forwarded to the organizing committee. This session information makes up the itinerary for the conference.

The organizing committee begins by preparing a list of people to invite to the conference. The committee issues priority invitations to national representatives and to members of related working groups. The organizing committee also ensures that each of the contributing authors receives an invitation. Individuals who receive an invitation and who intend to come to the conference must indicate their intent to participate by sending an acceptance of invitation to the organizing committee. The final list of participants is then generated by the committee, who makes an effort to avoid sending duplicate invitations to any individual.

1.2 Description for Event case

A company that owns a large sports and entertainment complex holds a variety of events in their building, including professional sports, concerts and conventions. The program of events is planned several months in advance. While no more than one event can take place at any given time, it is possible for more than one event to occur on the same day.

To book an event, a promoter contacts the marketing department for the complex and explains the type of event being promoted, the expected attendance, and a requested date and time for the event. After reviewing the promoter’s application, the marketing department either accepts the application and places the event in the program of events, or rejects the application. Once an event application is accepted, the promoter is responsible for sending a seating plan for the event to the operations department of the complex.

The operations department reviews all seating plans and decides on the appropriate number of security personnel, cleaners and customer service representatives for the event. These estimates for staffing requirements are reviewed with the promoter before they are finalized. Once the staffing requirements are finalized, a deployment sheet is created by the operations department. The deployment sheet lists the start time, end time, location and skill requirements for every shift that will be required for the event. The completed deployment sheets are then passed to the human resource department, who is responsible for scheduling staff to work the event.

The human resource department creates a schedule two weeks in advance for all of the events to be held in the upcoming two-week period. The deployment sheets from all of the events in the two-week period are used to assign shifts to the employees. The scheduler works through an entire deployment sheet one shift at a time. Employees are required to fill out an employee availability card indicating their availability and skills. No employee can work over 30 h a week. In order for the scheduler to assign a shift to an employee, the employee must have the right skills and be available for the event. When the scheduler is finished this process, the final schedule is posted for the employees.

1.3 Diagrams for cases

1.3.1 OOA for Conference case

 

structure 1

1.3.2 OOA for Event case

 

structure 2

1.4 Pretest questions

Prior use of analysis methods

  • Have you ever used object-oriented diagrams to model a business organization? Y/N

Familiarity with analysis methods

  • How familiar are you with object-oriented diagrams? 0–7

Competence with analysis methods

  • How competent are you in reading from object-oriented diagrams? 0–7

Confidence in analysis methods

  • How confident are you in reading from object-oriented diagrams? 0–7

1.4.1 Pretest, knowledge of domain: Conference and Event case

1.4.1.1 Conference case

Please indicate your level of knowledge of the following businesses:

  • -Organizing an academic conference: 0–7

Please indicate which of the activities listed below you have done:

  • Attended an academic conference: Y/N

  • Helped to organize a conference: Y/N

  • Reviewed a paper for a conference: Y/N

  • Submitted a paper for a conference: Y/N

  • Created a mailing list for a large group: Y/N

1.4.1.2 Event case

Please indicate your level of knowledge of the following businesses:

  • Organizing an entertainment event: 0–7

Please indicate which of the activities listed below you have done:

  • Helped to organize an entertainment event: Y/N

  • Worked at a large entertainment event: Y/N

  • Promoted an entertainment event: Y/N

  • Delegated work for a group of employees: Y/N

  • Arranged security for an entertainment event: Y/N

1.5 Post-test questions

1. What did you like/dislike about the diagrams shown to you in this experiment?

2. Which did you find more useful, the diagrams or narration (written or verbal)?

3. Please provide any general comments you have in the space provided below.

1.5.1 Comprehension questions and answers

Comprehension questions and answers are provided here:

Comprehension questions

Comprehension questions

Conference case

Event case

No.

Question

Ans.

No.

Question

Ans.

1

Is the organizing committee responsible for preparing the final list of participants?

Y

1

Is the operations department responsible for deciding when events are to be held at the complex?

N

2

Does an author know if the program committee has accepted their paper?

Y

2

Does a promoter know that their event application has been accepted and placed into the program of events?

Y

3

Is the organizing committee responsible for developing the conference itinerary?

N

3

Is the human resource department responsible for creating the deployment sheets?

N

4

Does a participant have to be an author to be placed on the final list of participants?

N

4

Can an employee be scheduled on days they are not available?

N

5

Is the program committee responsible for maintaining a list of accepted authors?

Y

5

Is the promoter the person who determines the number of employees who should work an event?

N

6

Does the program committee offer invitations to participants?

N

6

Is the operations department responsible for creating the employee schedule?

N

7

Do the program committee and organizing committee have to interact with each other?

Y

7

Do the marketing department and the operations department share similar information?

Y

8

Does the program committee keep track of all the papers that are submitted to the conference?

Y

8

Is the marketing department responsible for keeping track of all of the events that will be held in the upcoming months?

Y

9

Are all of the papers that are submitted to the program committee accepted by the program committee?

N

9

Are all of the seating plans provided by the promoter accepted by the operations department?

U

10

Can an author also be a part of the organizing committee?

U

10

Do all employees work every event?

N

11

Does the program committee have access to the final list of participants?

N

11

Is the operations department responsible for creating a seating plan for every event?

N

12

Is a paper the first thing that an author sends to the program committee?

N

12

Is the seating plan directly used in the development of the employee schedule?

U

1.5.2 Problem-solving questions and example accepted answers

1.5.2.1 Conference case

Question 1

Is it possible for the same individual to receive two invitations to an IFIP conference? If you answer yes, indicate how this duplication might occur. (Provide as many suggestions as you can think of.) If you answered no, indicate why it cannot happen. (Provide as many suggestions as you can think of.)

Acceptable answers

  1. 1.

    Yes. An individual could be both in the potential participation list and the list of accepted authors.

  2. 2.

    Yes. Duplication in the potential participation list.

  3. 3.

    Yes. Duplication in potential authors participation list.

  4. 4.

    Yes. An author may have more than one paper.

  5. 5.

    No. If invitation is sent out at end of process (after list of accepted authors), then no duplication.

  6. 6.

    Individual was a special representative and an author.

  7. 7.

    Individual was a national representative and part of a related working group.

Question 2

Suppose that a person was invited to submit a paper but has not yet received an invitation. What could have happened? (Provide as many possible suggestions as you can think of.)

Acceptable answers

  1. 1.

    Person’s paper was rejected.

  2. 2.

    Invitation was supposed to be sent but there was a delay in processing.

  3. 3.

    Person did not submit an ‘intent to submit paper’ (no registration occurred).

  4. 4.

    Author has moved and conference mailing list has not been changed.

  5. 5.

    Reviewer did not return the paper.

  6. 6.

    The person never submitted a paper.

  7. 7.

    Program committee has not sent his name to the organizing committee.

  8. 8.

    The paper is still under review.

  9. 9.

    Paper was lost during review.

  10. 10.

    Person sent a note indicating they could not attend.

  11. 11.

    Submitted paper after deadline.

  12. 12.

    Two authors with the same name.

Question 3

Neither the program committee nor the organizing committee is directly responsible for maintaining the mailing list of potential authors and participants. What organizational problems do you think could arise from this situation? (Provide as many possible suggestions as you can think of.)

Acceptable answers

  1. 1.

    Inconsistencies between two mailing lists (organizing and Program committee lists).

  2. 2.

    Invitations sent to incorrect addresses. This may lead to poor turnout.

  3. 3.

    Redundancy (duplication) across mailing lists. Likely to invite same people twice.

  4. 4.

    Miss potential participants by assuming they are present on the other mailing list.

  5. 5.

    Receive information twice.

Question 4

Suppose that a very highly respected author indicated that she would like to present a paper in the conference but she has given the program committee only two weeks notice. What problems would be faced by the committees in accepting the author’s wish? (Provide as many possible suggestions as you can think of.)

Acceptable answers

  1. 1.

    Not enough time for review process.

  2. 2.

    Not enough time to generate invitation from organizing committee.

  3. 3.

    Requires change in the conference itinerary (which have been printed).

  4. 4.

    No time left in the conference itinerary.

  5. 5.

    Notices of change will have to be sent.

  6. 6.

    Sets a dangerous precedent. Other authors may want to do the same.

  7. 7.

    There is no process in place to support this (no exception handling).

  8. 8.

    Modify the list of participants (printed material must be changed).

  9. 9.

    No time to promote the author’s presence at the conference.

Question 5

Suppose that instead of inviting specific authors to submit papers and inviting only selected participants to come to the conference, the two committees agreed to open participation to any individuals and all interested authors. What problems would arise if the current system was used to organize the conference? (Provide as many suggestions as you can think of.)

Acceptable answers

  1. 1.

    Keep track of number of participants (by registering those interested).

  2. 2.

    Reviewers may be overwhelmed with papers. Screening papers may be necessary.

  3. 3.

    Would have to advertise for authors.

  4. 4.

    Would have to advertise for participants.

  5. 5.

    Would no longer need to send invitations or compile invitation list.

  6. 6.

    Larger event to organize.

  7. 7.

    Ticketing arrangement would be needed.

  8. 8.

    Two committees may not be necessary.

  9. 9.

    Keep track of accepted authors.

  10. 10.

    Budgeting for conference (how many?).

  11. 11.

    Loss of prestige.

1.5.2.2 Event case (questions only)

Question 1

Suppose that an employee was available to work on a Saturday but they were not scheduled to work. How could this have occurred? (Provide as many possible suggestions as you can think of.)

Question 2

Suppose that it is a very busy two weeks for the sport complex, with events scheduled for every day of the week. What problems might be encountered due to this busy schedule? (Provide as many possible suggestions as you can think of.)

Question 3

Suppose that a promoter underestimated the number of people who wanted to attend an event. The promoter now wants to increase the number of seats available for an event. Given that there are some seats that could be opened, what problems would be created by opening more seats? (Provide as many possible suggestions as you can think of.)

Question 4

Some events take a long time and a large number of people to set up and take down (this is referred to as conversion time). What organizational problems can be caused by events with a long conversion time? (Provide as many possible suggestions as you can think of.)

Question 5

Assume that the marketing department, operations department and human resources department act independently of each other. What problems might occur if the departments do not share their information quickly or work closely with the other departments? (Provide as many possible suggestions as you can think of.)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gemino, A. Empirical comparisons of animation and narration in requirements validation. Requirements Eng 9, 153–168 (2004). https://doi.org/10.1007/s00766-003-0182-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00766-003-0182-0

Keywords

Navigation