The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ongoing trend towards distributed development activities causes a growing need for specification activities and techniques. Each component leads to a large number of specification documents being exchanged, change managed and committed. The quality of the specifications influences the timing, costs and success of the development task. However, the quality of such specifications is often far from...
It is sometimes a challenge to access to specific skills assessments and training programs for children with special needs. In the case of visual perception, and more specifically eye-motor coordination, methods like the Frostig one are not adapted to all children. In this paper, we present a two steps co-design process with therapists and children in order to come up with an alternative solution...
The design thinking approach places the customer up front, with an emphasis on building empathy with users, observing their behavior, and drawing conclusions about what people want and need. When manifested in multidisciplinary teams, this approach leverages design processes and promotes realization of the required user experience, including usability and accessibility requirements. In this positional...
Crowd-based requirements engineering (CrowdRE) is promising to derive requirements by gathering and analyzing information from the crowd. Setting up CrowdRE in practice seems challenging, although first solutions to support CrowdRE exist. In this paper, we report on a German software company's experience on crowd involvement by using feedback communication channels and a monitoring solution for user-event...
Task analysis defines the user-centered tasks that users will carry out to use a system, and it serves as the basis for the definition of usability requirements related to efficiency and effectiveness. Usability and UX (User eXperience) are especially important for mobile application development. We aim to provide support to task modelling for Android application development, and to specify user events...
Just-in-time (JIT) requirements are characterized as not following the traditional requirement engineering approach, instead focusing on elaboration when the implementation begins. In this experience report, we analyze both functional and nonfunctional JIT requirements from three successful open source software (OSS) projects, including Firefox, Lucene, and Mylyn, to explore the common activities...
Most system requirements are currently written in common, i.e., unstructured, natural language, which existing requirements analysis tools are poorly equipped to handle. Extracting mentions of model elements from common natural language requirements is a first step toward the automation of model-driven requirements analysis. We propose an approach in which we identify mentions of elements of a component...
Trade-off analysis through goal model evaluation has been a valuable tool for requirements elicitation and analysis. This is also true in the context of reuse. When goal models are used to describe reusable artifacts and to represent the impacts of reusable artifacts on high-level goals and qualities, they can guide the selection of reusable artifacts to build reuse hierarchies. In previous work,...
Requirements are the keystone of complex systems development. In order to reduce inconsistencies, requirements analysis is an important issue of systems engineering. In this context, there is a need for conciliating views of several stakeholders from different domains and for tracing these requirements from specification to realization. The computerization of analysis, with the help of a clearly defined...
User story literature nearly exclusively studies how to create, prioritise, or ensure the quality of a user story. Little is known about other activities and artefacts involved preceding or following these activities in systems development. Consequentially, software teams seeking to leverage user stories’ full potential do not know how to incorporate user stories into all aspects of their software...
Quality can be a very elusive concept that can be approached from a number of perspectives dependent on once take and interest. Evidence that relates software process to quality is often anecdotal or, when data is presented, it is to some extent contradictory or clashes with opposite evidence coming from different samples. Also, the influence of quality on software architecture is mostly described...
Behavior-Driven Development (BDD) is a set of software engineering practices which uses a ubiquitous language, one that business and technical people can understand, to describe and model a system by a series of textual scenarios. However, we believe that the value of those textual scenarios is connected with how well they convey and document the details discussed by the team about the behaviors needed...
Goal understanding and communication of requirements are vital for ensuring that large and complex project organizations collaborate efficiently. We have used a design science approach to explore and address the problem of communication for large IT projects. We designed a method for avoiding communication gaps by eliciting information regarding stakeholders and information flows. The MAPS (Mapping...
Companies are obliged to have privacy policies in place to notify the users about their privacy practices. However, privacy policies are not generally efficient and they fail to help users make informed decisions. The privacy policy challenges get worse when dealing with Internet of Things (IoT) as these devices have access to very sensitive data about users. Much research have addressed these problems...
Designing usable and secure software is hard without tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities, its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper...
There are several security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss security aspect in comments by providing code snippets, attachments, and external resource links...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.