{"title":"通过分析用户造成的威胁来引出需求","authors":"E. Ivankina, C. Salinesi","doi":"10.1109/SERA.2005.38","DOIUrl":null,"url":null,"abstract":"Eliciting requirements is an important issue of system development projects. Some approaches propose to identify requirements by analysing system malfunctioning. Different sources of malfunctioning are dealt with by these approaches: obstacles, conflicts, risks, etc. Our proposal is to analyse each of these sources of malfunctioning using a single notion that we call \"threat\". We propose to use this notion in a method that guides the identification and analysing of each of these sources of malfunctioning. The method helps eliciting requirements to prevent the threat. A threat is defined by a number of variables. This paper presents a literature review of all threats that relate to users. The review is based on a framework that includes several perspectives to analyse user error. The user threats is part of a global threats classification that also covers hardware, environment, design and project types of threats.","PeriodicalId":424175,"journal":{"name":"Third ACIS Int'l Conference on Software Engineering Research, Management and Applications (SERA'05)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Eliciting requirements by analysing threats caused by users\",\"authors\":\"E. Ivankina, C. Salinesi\",\"doi\":\"10.1109/SERA.2005.38\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Eliciting requirements is an important issue of system development projects. Some approaches propose to identify requirements by analysing system malfunctioning. Different sources of malfunctioning are dealt with by these approaches: obstacles, conflicts, risks, etc. Our proposal is to analyse each of these sources of malfunctioning using a single notion that we call \\\"threat\\\". We propose to use this notion in a method that guides the identification and analysing of each of these sources of malfunctioning. The method helps eliciting requirements to prevent the threat. A threat is defined by a number of variables. This paper presents a literature review of all threats that relate to users. The review is based on a framework that includes several perspectives to analyse user error. The user threats is part of a global threats classification that also covers hardware, environment, design and project types of threats.\",\"PeriodicalId\":424175,\"journal\":{\"name\":\"Third ACIS Int'l Conference on Software Engineering Research, Management and Applications (SERA'05)\",\"volume\":\"157 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-08-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third ACIS Int'l Conference on Software Engineering Research, Management and Applications (SERA'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SERA.2005.38\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third ACIS Int'l Conference on Software Engineering Research, Management and Applications (SERA'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERA.2005.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Eliciting requirements by analysing threats caused by users
Eliciting requirements is an important issue of system development projects. Some approaches propose to identify requirements by analysing system malfunctioning. Different sources of malfunctioning are dealt with by these approaches: obstacles, conflicts, risks, etc. Our proposal is to analyse each of these sources of malfunctioning using a single notion that we call "threat". We propose to use this notion in a method that guides the identification and analysing of each of these sources of malfunctioning. The method helps eliciting requirements to prevent the threat. A threat is defined by a number of variables. This paper presents a literature review of all threats that relate to users. The review is based on a framework that includes several perspectives to analyse user error. The user threats is part of a global threats classification that also covers hardware, environment, design and project types of threats.