SlideShare une entreprise Scribd logo
1  sur  15
Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation Leif Singer, Olesia Brill, Sebastian Meyer, Kurt Schneider Software Engineering Group Leibniz Universität Hannover {leif.singer, olesia.brill, sebastian.meyer, kurt.schneider}@inf.uni-hannover.de
Overview Definition of an IT ecosystem Ourapproach Short Example Open Questions Ongoingresearch Conclusions Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 2 L. Singer, O. Brill, S. Meyer, K. Schneider
Whatis an IT ecosystem? An IT ecosystem is an ultra-large-scalesoftwaresystem consists of a large number of actors The technologyof an IT ecosystemistightlyintegratedintoeverydayslife may not beperceivedas an IT system usersmay not knowoforare not interested in thecapabilitiesofthesystem Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 3 L. Singer, O. Brill, S. Meyer, K. Schneider
Actors in IT ecosystems An IT ecosystemconsistsofvariousactors An actorcanbe an technicalsubsystem E.g. trafficlights An actorcan also be an autonomousagent Like a human end useror a transportrobot Eachactorusestheinfrastructurethatisofferedbythe IT ecosystemtoachievetheirgoals Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 4 L. Singer, O. Brill, S. Meyer, K. Schneider
Problems in RequirementElicitation Requirements (for IT ecosystems) havetobedefinedandvalidatedby all stakeholders End usersmay not beawareofthesurroundingsystem Orare not interested in it Thosearetheinterestingstakeholdersforus The lack ofinterestorawarenessresults in toolittlemotivationfortakingpart in classicalelicitation Making thefindingofnewrequirementsandvalidationofexistingrequirementsdifficult Methodsforrequirementselicitationshouldbeasunobstrusiveaspossible in order tobeuseful in thissetting Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 5 L. Singer, O. Brill, S. Meyer, K. Schneider
Rule-based IT ecosystems Interaction ofsubsystems must becontrolled in order tokeepthe IT ecosystemupandrunning The interactionoftheactorscanleadtouncontrolledemergenteffects A rule-basedinfrastructurecanhelptominimizetheimpactofunwantedeffects Rules havetobeseparatedintohardruleswhich must beadheredtoandruleswhichmaybebroken Actors must usethe IT ecosystem‘sinfrastructuretocommunicatewitheachother Thiscanbeusedtoensureruleadherence Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 6 L. Singer, O. Brill, S. Meyer, K. Schneider
Iterative processofrefiningrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 7 L. Singer, O. Brill, S. Meyer, K. Schneider Initial Rule Set introduced Requirementsexpressed as Rules Users developnewRequirements Addition/Modification of Rules User BehaviordeviatesfromRules RequirementsEngineerreviewsDeviations System logs deviations Preprocessing of Deviations
ObservingRuleDeviations Autonomousactorscandecideto break rules Thosedeviationscanbemonitoredbytheinfrastructure Eachdeviationof a ruleisloggedwith an associatedcontext If a ruleisadheredto, thisis also loggedtoget a relative measurementofruledeviations The loggedruledeviationscanbeusedtoextractneworrefinedrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 8 L. Singer, O. Brill, S. Meyer, K. Schneider
ExtractionofRequirements Breaking of rules may imply errors in the underlying requirements Autonomousagentsthat break a rulearenormally not interested in creatingnewrequirements Thereforeweneed an unobtrusiveapproach Based on theloggeddeviations, patternscanautomaticallybederived E.g. usinginformationretrievaltechniques The actualextractionofrequirementsfromthesefilteredruledeviationshastobedonemanually Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 9 L. Singer, O. Brill, S. Meyer, K. Schneider
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 10 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 11 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 12 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair Observation: Drivers chooseparking lots whichare in theshadows New Rule: On sunnydays, allocateparkinglot in theshadows.
Open Questions Whataretherequirementsfor a rule-basedinfrastructure? Distinctionbetweenhardrules / soft goalssufficient? Whatis a rightcontext? Howcanwederiveitfor a deviation? Is thecontextdefinedbytheecosystemorbytheactorsitself? Possible Solution:  Use an ontologythatrelatesobjectsanddata. A ruledeviationcan log whichobjectsparticipated in thedeviationandcreatethecorrectcontext Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 13 L. Singer, O. Brill, S. Meyer, K. Schneider
Ongoingresearch The presented approach is still in its early stages and could not be evaluated yet.  In a joint project with two other universities from Lower Saxony we are currently creating the foundations for a prototype that will be used to evaluate the presented approach. The current focus is building a suitable rule-system supporting the approach. Subsequently, data mining and pattern recognition techniques will be selected and evaluated to derive the potential changes in requirementsfromruledeviations. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 14 L. Singer, O. Brill, S. Meyer, K. Schneider
Conclusions In IT ecosystems, the main interest of end users is deriving actual utility from the system Due to emergent effects of many actors interacting with each other, requirements for an IT ecosystem are changing Requirements elicitation is challenging in this setting Utilize behavior of end users, specifically: rule deviations  Analyze for candidates for potential new or changed requirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 15 L. Singer, O. Brill, S. Meyer, K. Schneider

Contenu connexe

En vedette

EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL Emily Gross
 
Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?IT-Cluster Odessa
 
Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?George Hutton
 
Love Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusLove Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusGeorge Hutton
 
Présentation IA
Présentation IAPrésentation IA
Présentation IAchmod0
 
Conozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasConozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasProBogotá Región
 
2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Indexsocprog
 
Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016socprog
 
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4Mark McClure
 
Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Julien Deneuville
 

En vedette (15)

Programaciones 03 12-16
Programaciones 03 12-16Programaciones 03 12-16
Programaciones 03 12-16
 
By and-until
By and-untilBy and-until
By and-until
 
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
 
Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?
 
Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?
 
Love Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusLove Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A Genius
 
Présentation IA
Présentation IAPrésentation IA
Présentation IA
 
Times of India
Times of IndiaTimes of India
Times of India
 
Conozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasConozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas Metropolitanas
 
2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index
 
Chara
CharaChara
Chara
 
Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016
 
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
 
Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016
 
DIGITAL BRANDING
DIGITAL BRANDINGDIGITAL BRANDING
DIGITAL BRANDING
 

Similaire à 12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation

Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...IJARTES
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docpraveena06
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniquesijdmtaiir
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET Journal
 
GRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxGRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxDAYARNABBAIDYA3
 
NetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiNetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiAlexander Pico
 
Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Alexander Decker
 
Software aging prediction – a new approach
Software aging prediction – a new approach Software aging prediction – a new approach
Software aging prediction – a new approach IJECEIAES
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyAnsgar Koene
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...International Center for Biometric Research
 
A systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaA systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaPubrica
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdfAdhySugara2
 

Similaire à 12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation (20)

Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.doc
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
 
GRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxGRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptx
 
B04302018024
B04302018024B04302018024
B04302018024
 
NetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiNetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno Schwikowski
 
Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...
 
Software aging prediction – a new approach
Software aging prediction – a new approach Software aging prediction – a new approach
Software aging prediction – a new approach
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and Policy
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
Ijcet 06 07_004
Ijcet 06 07_004Ijcet 06 07_004
Ijcet 06 07_004
 
Towards the Adoption of Cyber-Physical Systems of Systems Paradigm in Smart ...
Towards the Adoption of Cyber-Physical Systems of  Systems Paradigm in Smart ...Towards the Adoption of Cyber-Physical Systems of  Systems Paradigm in Smart ...
Towards the Adoption of Cyber-Physical Systems of Systems Paradigm in Smart ...
 
A systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaA systematic review of network analyst - Pubrica
A systematic review of network analyst - Pubrica
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdf
 

Plus de Walid Maalej

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AIWalid Maalej
 
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...Walid Maalej
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Walid Maalej
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Walid Maalej
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4uploadWalid Maalej
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Walid Maalej
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehensionWalid Maalej
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of SoftwareWalid Maalej
 
Context aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachContext aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachWalid Maalej
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU GrazWalid Maalej
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsWalid Maalej
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Walid Maalej
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?Walid Maalej
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements ExplicitWalid Maalej
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert StakeholdersWalid Maalej
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements ElicitationWalid Maalej
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...Walid Maalej
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...Walid Maalej
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product LinesWalid Maalej
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements KnowledgeWalid Maalej
 

Plus de Walid Maalej (20)

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AI
 
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4upload
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehension
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of Software
 
Context aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachContext aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approach
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU Graz
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering Tools
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation

  • 1. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation Leif Singer, Olesia Brill, Sebastian Meyer, Kurt Schneider Software Engineering Group Leibniz Universität Hannover {leif.singer, olesia.brill, sebastian.meyer, kurt.schneider}@inf.uni-hannover.de
  • 2. Overview Definition of an IT ecosystem Ourapproach Short Example Open Questions Ongoingresearch Conclusions Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 2 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 3. Whatis an IT ecosystem? An IT ecosystem is an ultra-large-scalesoftwaresystem consists of a large number of actors The technologyof an IT ecosystemistightlyintegratedintoeverydayslife may not beperceivedas an IT system usersmay not knowoforare not interested in thecapabilitiesofthesystem Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 3 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 4. Actors in IT ecosystems An IT ecosystemconsistsofvariousactors An actorcanbe an technicalsubsystem E.g. trafficlights An actorcan also be an autonomousagent Like a human end useror a transportrobot Eachactorusestheinfrastructurethatisofferedbythe IT ecosystemtoachievetheirgoals Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 4 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 5. Problems in RequirementElicitation Requirements (for IT ecosystems) havetobedefinedandvalidatedby all stakeholders End usersmay not beawareofthesurroundingsystem Orare not interested in it Thosearetheinterestingstakeholdersforus The lack ofinterestorawarenessresults in toolittlemotivationfortakingpart in classicalelicitation Making thefindingofnewrequirementsandvalidationofexistingrequirementsdifficult Methodsforrequirementselicitationshouldbeasunobstrusiveaspossible in order tobeuseful in thissetting Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 5 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 6. Rule-based IT ecosystems Interaction ofsubsystems must becontrolled in order tokeepthe IT ecosystemupandrunning The interactionoftheactorscanleadtouncontrolledemergenteffects A rule-basedinfrastructurecanhelptominimizetheimpactofunwantedeffects Rules havetobeseparatedintohardruleswhich must beadheredtoandruleswhichmaybebroken Actors must usethe IT ecosystem‘sinfrastructuretocommunicatewitheachother Thiscanbeusedtoensureruleadherence Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 6 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 7. Iterative processofrefiningrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 7 L. Singer, O. Brill, S. Meyer, K. Schneider Initial Rule Set introduced Requirementsexpressed as Rules Users developnewRequirements Addition/Modification of Rules User BehaviordeviatesfromRules RequirementsEngineerreviewsDeviations System logs deviations Preprocessing of Deviations
  • 8. ObservingRuleDeviations Autonomousactorscandecideto break rules Thosedeviationscanbemonitoredbytheinfrastructure Eachdeviationof a ruleisloggedwith an associatedcontext If a ruleisadheredto, thisis also loggedtoget a relative measurementofruledeviations The loggedruledeviationscanbeusedtoextractneworrefinedrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 8 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 9. ExtractionofRequirements Breaking of rules may imply errors in the underlying requirements Autonomousagentsthat break a rulearenormally not interested in creatingnewrequirements Thereforeweneed an unobtrusiveapproach Based on theloggeddeviations, patternscanautomaticallybederived E.g. usinginformationretrievaltechniques The actualextractionofrequirementsfromthesefilteredruledeviationshastobedonemanually Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 9 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 10. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 10 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
  • 11. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 11 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
  • 12. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 12 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair Observation: Drivers chooseparking lots whichare in theshadows New Rule: On sunnydays, allocateparkinglot in theshadows.
  • 13. Open Questions Whataretherequirementsfor a rule-basedinfrastructure? Distinctionbetweenhardrules / soft goalssufficient? Whatis a rightcontext? Howcanwederiveitfor a deviation? Is thecontextdefinedbytheecosystemorbytheactorsitself? Possible Solution: Use an ontologythatrelatesobjectsanddata. A ruledeviationcan log whichobjectsparticipated in thedeviationandcreatethecorrectcontext Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 13 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 14. Ongoingresearch The presented approach is still in its early stages and could not be evaluated yet. In a joint project with two other universities from Lower Saxony we are currently creating the foundations for a prototype that will be used to evaluate the presented approach. The current focus is building a suitable rule-system supporting the approach. Subsequently, data mining and pattern recognition techniques will be selected and evaluated to derive the potential changes in requirementsfromruledeviations. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 14 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 15. Conclusions In IT ecosystems, the main interest of end users is deriving actual utility from the system Due to emergent effects of many actors interacting with each other, requirements for an IT ecosystem are changing Requirements elicitation is challenging in this setting Utilize behavior of end users, specifically: rule deviations  Analyze for candidates for potential new or changed requirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 15 L. Singer, O. Brill, S. Meyer, K. Schneider