Daniel Aceituna, Hyunsook Do, G. Walia, Seok-Won Lee
{"title":"Evaluating the use of model-based requirements verification method: A feasibility study","authors":"Daniel Aceituna, Hyunsook Do, G. Walia, Seok-Won Lee","doi":"10.1109/EmpiRE.2011.6046248","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046248","url":null,"abstract":"Requirements engineering is one of the most important and critical phases in the software development life cycle, and should be carefully performed to build high quality and reliable software. However, requirements are typically gathered through various sources and represented in natural language (NL), making requirements engineering a difficult, fault prone, and a challenging task. To address this challenge, we propose a model-based requirements verification method called NLtoSTD, which transforms NL requirements into a state transition diagram (STD) that can be verified through automated reasoning. This paper analyzes the effect of NLtoSTD method in improving the quality of requirements. To do so, we conducted an empirical study at North Dakota State University in which the participants employed the NLtoSTD method during the inspection of requirement documents to identify the amibiguities and incompleteness of requirements. The experiment results show that the proposed method is capable of finding ambiguities and missing functionalities in a set of NL requirements, and provided us with insights and feedback to improve the method. The results are promising and have motivated the refinement of NLtoSTD method and future empirical evaluation.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing think-pair-square in distributed modeling of use case diagrams","authors":"U. Erra, G. Scanniello","doi":"10.1109/EmpiRE.2011.6046249","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046249","url":null,"abstract":"In this paper, we propose a new method for the modeling of use case diagrams in the context of global software development. It is based on think-pair-square, a widely used cooperative method for active problem solving. The validity of the developed technology (i.e., the method and its supporting environment) has been assessed through two controlled experiments. In particular, the experiments have been conducted to compare the developed technology with a brainstorming session based on face-to-face interaction. The comparison has been performed with respect to the time needed to model use case diagrams and the quality of the produced models. The data analysis indicates a significant difference in favor of the brainstorming session for the time, with no significant impact on the requirements specification.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements comprehension: A controlled experiment on conceptual modeling methods","authors":"Mirko Morandini, A. Marchetto, A. Perini","doi":"10.1109/EmpiRE.2011.6046256","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046256","url":null,"abstract":"Several Requirements Engineering (RE) methods have been proposed to analyze and model requirements specifications. However, these methods have often been only partially evaluated and few attempts exist in literature to study and evaluate RE methods through experiments. In this paper, we document an empirical study that has been performed to evaluate the comprehension of requirements which were expressed in Tropos4AS. Tropos4AS specializes the goal-oriented software engineering methodology Tropos for the case of self-adaptive systems. In the experiment, we asked subjects to perform comprehension tasks on requirements specifications expressed in Tropos4AS and in Tropos, respectively. Results show that Tropos4AS is more effective than Tropos in describing requirements of self-adaptive systems, especially when the models are used by novice requirements engineers.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. N. Franqueira, Zornitza Bakalova, T. Tun, M. Daneva
{"title":"Towards agile security risk management in RE and beyond","authors":"V. N. Franqueira, Zornitza Bakalova, T. Tun, M. Daneva","doi":"10.1109/EmpiRE.2011.6046253","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046253","url":null,"abstract":"Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security state of the system being developed. This paper takes the position that (1) these isolated security assurance practices should be fully integrated and should be embedded in short iterations of risk assessment, treatment and acceptance, providing input for updating security requirements and for security risk management, and that (2) available empirical data from public catalogs and databases should be used as a source of expertise, to leverage past experiences, and therefore reduce, although not eliminate, subjectivity of human judgment. Borrowing from the agile software development and project management philosophy, we introduce the idea of a light weight, agile approach to security risk management integrated to the development life cycle.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130919180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ahab's Leg dilemma: On the design of a controlled experiment","authors":"L. Sabatucci, M. Ceccato, A. Marchetto, A. Susi","doi":"10.1109/EmpiRE.2011.6046258","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046258","url":null,"abstract":"To meet stakeholder non-technical background, requirements are often presented by analysts in terms of scenarios. While translating requirements into scenarios, details and over-specifications (called Ahab's Legs) need to be added to make requirements concrete and understandable to stakeholders. Despite the expected benefits that they should convey, Ahab's Legs could disturb the requirement validation session. They can, in fact, distract the attention of stakeholders. Valuable discussion time may be wasted when focusing on irrelevant details rather than on the actually relevant ones. In the present paper, we address the Ahab's Leg dilemma and its potential impact on requirement validation sessions. We discuss how to measure the distraction due to Ahab's Legs and what are the possible approaches an analyst can adopt to limit it. Moreover, we present the design of a controlled experiment devoted to measure the impact of Ahab's Legs on requirement validation sessions. In particular, the experiment is meant to (1) estimate the magnitude of the distracting effect, and to (2) assess one of the most promising way to alleviate their negative effect, i.e. by making stakeholder aware of the Ahab's Legs before the validation session.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Precise is better than light” a document analysis study about quality of business process models","authors":"G. Reggio, Maurizio Leotta, F. Ricca","doi":"10.1109/EmpiRE.2011.6046257","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046257","url":null,"abstract":"Business process modelling is often used in the initial phases of traditional software development to reduce faulty requirements and as starting point for building SOA based applications. Often, modellers produce business process models without following recognized guidelines and opt for “light” models where nodes representing the actions are simply decorated with natural language text. The potential consequence of this practice is that the quality of built business process models may be low. In this paper, we propose a method based on manual transformations to detect flaws in “light” business process models expressed as activity diagrams. Using that method we have executed a document analysis study with 14 business process models taken by books and websites. Preliminary results of this study show that almost all the analysed business process models contain errors and style violations (precisely 92% of them).","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"8 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miguel A. Teruel, Elena Navarro, Víctor López-Jaquero, Francisco Montero Simarro, P. González
{"title":"Assesing the understandability of collaborative systems requirements notations: An empirical study","authors":"Miguel A. Teruel, Elena Navarro, Víctor López-Jaquero, Francisco Montero Simarro, P. González","doi":"10.1109/EMPIRE.2011.6046250","DOIUrl":"https://doi.org/10.1109/EMPIRE.2011.6046250","url":null,"abstract":"As for single user systems, a proper specification of software requirements is a very important issue to achieve the quality of the collaborative systems. Nevertheless, many of these requirements are from a non-functional nature because are related to the user's need of being aware of other users, that is, the workspace awareness. In order to model these special kind of requirements, CSRML, an extension of i∗ has been proposed. In this paper, we present a controlled experiment to assess the understandability of this notation compared to i∗. The specification of two different systems was used as experimental material and undergraduate students of Computer Science with an average of two years experience in Requirements Engineering were the experimental subjects.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proximity-based traceability: An empirical validation using ranked retrieval and set-based measures","authors":"Wei-Keat Kong, J. Hayes","doi":"10.1109/EmpiRE.2011.6046255","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046255","url":null,"abstract":"The automatic generation of traceability links attempts to reduce the burden of building requirements traceability matrices (RTMs) that will be vetted by a human analyst before use in verification and validation tasks such as criticality assessment or change impact analysis. Information Retrieval (IR) techniques, notably the Vector Space Model (VSM), have been used with some success to build textual artifact traceability matrices. A limitation of the VSM is that it disregards word or term location and the relationship between words in the textual artifacts being traced. This paper presents a VSM enhancement with consideration for term location, validating it on four datasets using ranked retrieval and set-based measures. These two types of measures provide a more detailed comparison between the two traceability techniques.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nelly Condori-Fernández, M. Daneva, K. Sikkel, A. Herrmann
{"title":"Practical relevance of experiments in comprehensibility of requirements specifications","authors":"Nelly Condori-Fernández, M. Daneva, K. Sikkel, A. Herrmann","doi":"10.1109/EmpiRE.2011.6046251","DOIUrl":"https://doi.org/10.1109/EmpiRE.2011.6046251","url":null,"abstract":"Recently, the Requirements Engineering (RE) community has become increasingly aware of the importance of carrying out industry-relevant research. Researchers and practitioners should be able to evaluate the relevance of their empirical research to increase the likely adoption of RE methods in software industry. It is in this perspective that we evaluate 24 experimental studies on comprehensibility of software requirements specifications to determine their practical value. To that end a checklist based on Kitchenham's approach was operationalized from a practitioner's perspective and an analysis with respect to the main factors that affecting on comprehensibility was carried out. Although 100% of the papers reviewed reported statistically significant results, and 96% of them take examples from a real-life project. 80% of the papers do not scale to real life, 54% of the papers do not specify the context in which the results are expected to be useful. We also found that there is a lack of underlying theory in the formulation of comprehensibility questions.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring complexity and completeness of KAOS goal models","authors":"Patrícia Espada, M. Goulão, João Araújo","doi":"10.1109/EMPIRE.2011.6046252","DOIUrl":"https://doi.org/10.1109/EMPIRE.2011.6046252","url":null,"abstract":"KAOS is one of the most well-known goal-oriented requirements engineering approaches. Nevertheless, building large KAOS models sometimes results in incomplete and/or complex requirements models that are difficult to understand and maintain. These shortcomings often lead to an increase in costs of product development and evolution. Therefore, for large-scale systems, the ability to manage the complexity and completeness of KAOS models is essential. In this paper, we propose a metrics suite for supporting the quantitative assessment of KAOS models complexity and completeness, in order to support their early identification. We apply the metrics to an example taken from a health club system specification.","PeriodicalId":128168,"journal":{"name":"Workshop on Empirical Requirements Engineering (EmpiRE 2011)","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}