SlideShare a Scribd company logo
Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation Leif Singer, Olesia Brill, Sebastian Meyer, Kurt Schneider Software Engineering Group Leibniz Universität Hannover {leif.singer, olesia.brill, sebastian.meyer, kurt.schneider}@inf.uni-hannover.de
Overview Definition of an IT ecosystem Ourapproach Short Example Open Questions Ongoingresearch Conclusions Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 2 L. Singer, O. Brill, S. Meyer, K. Schneider
Whatis an IT ecosystem? An IT ecosystem is an ultra-large-scalesoftwaresystem consists of a large number of actors The technologyof an IT ecosystemistightlyintegratedintoeverydayslife may not beperceivedas an IT system usersmay not knowoforare not interested in thecapabilitiesofthesystem Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 3 L. Singer, O. Brill, S. Meyer, K. Schneider
Actors in IT ecosystems An IT ecosystemconsistsofvariousactors An actorcanbe an technicalsubsystem E.g. trafficlights An actorcan also be an autonomousagent Like a human end useror a transportrobot Eachactorusestheinfrastructurethatisofferedbythe IT ecosystemtoachievetheirgoals Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 4 L. Singer, O. Brill, S. Meyer, K. Schneider
Problems in RequirementElicitation Requirements (for IT ecosystems) havetobedefinedandvalidatedby all stakeholders End usersmay not beawareofthesurroundingsystem Orare not interested in it Thosearetheinterestingstakeholdersforus The lack ofinterestorawarenessresults in toolittlemotivationfortakingpart in classicalelicitation Making thefindingofnewrequirementsandvalidationofexistingrequirementsdifficult Methodsforrequirementselicitationshouldbeasunobstrusiveaspossible in order tobeuseful in thissetting Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 5 L. Singer, O. Brill, S. Meyer, K. Schneider
Rule-based IT ecosystems Interaction ofsubsystems must becontrolled in order tokeepthe IT ecosystemupandrunning The interactionoftheactorscanleadtouncontrolledemergenteffects A rule-basedinfrastructurecanhelptominimizetheimpactofunwantedeffects Rules havetobeseparatedintohardruleswhich must beadheredtoandruleswhichmaybebroken Actors must usethe IT ecosystem‘sinfrastructuretocommunicatewitheachother Thiscanbeusedtoensureruleadherence Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 6 L. Singer, O. Brill, S. Meyer, K. Schneider
Iterative processofrefiningrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 7 L. Singer, O. Brill, S. Meyer, K. Schneider Initial Rule Set introduced Requirementsexpressed as Rules Users developnewRequirements Addition/Modification of Rules User BehaviordeviatesfromRules RequirementsEngineerreviewsDeviations System logs deviations Preprocessing of Deviations
ObservingRuleDeviations Autonomousactorscandecideto break rules Thosedeviationscanbemonitoredbytheinfrastructure Eachdeviationof a ruleisloggedwith an associatedcontext If a ruleisadheredto, thisis also loggedtoget a relative measurementofruledeviations The loggedruledeviationscanbeusedtoextractneworrefinedrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 8 L. Singer, O. Brill, S. Meyer, K. Schneider
ExtractionofRequirements Breaking of rules may imply errors in the underlying requirements Autonomousagentsthat break a rulearenormally not interested in creatingnewrequirements Thereforeweneed an unobtrusiveapproach Based on theloggeddeviations, patternscanautomaticallybederived E.g. usinginformationretrievaltechniques The actualextractionofrequirementsfromthesefilteredruledeviationshastobedonemanually Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 9 L. Singer, O. Brill, S. Meyer, K. Schneider
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 10 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 11 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 12 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair Observation: Drivers chooseparking lots whichare in theshadows New Rule: On sunnydays, allocateparkinglot in theshadows.
Open Questions Whataretherequirementsfor a rule-basedinfrastructure? Distinctionbetweenhardrules / soft goalssufficient? Whatis a rightcontext? Howcanwederiveitfor a deviation? Is thecontextdefinedbytheecosystemorbytheactorsitself? Possible Solution:  Use an ontologythatrelatesobjectsanddata. A ruledeviationcan log whichobjectsparticipated in thedeviationandcreatethecorrectcontext Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 13 L. Singer, O. Brill, S. Meyer, K. Schneider
Ongoingresearch The presented approach is still in its early stages and could not be evaluated yet.  In a joint project with two other universities from Lower Saxony we are currently creating the foundations for a prototype that will be used to evaluate the presented approach. The current focus is building a suitable rule-system supporting the approach. Subsequently, data mining and pattern recognition techniques will be selected and evaluated to derive the potential changes in requirementsfromruledeviations. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 14 L. Singer, O. Brill, S. Meyer, K. Schneider
Conclusions In IT ecosystems, the main interest of end users is deriving actual utility from the system Due to emergent effects of many actors interacting with each other, requirements for an IT ecosystem are changing Requirements elicitation is challenging in this setting Utilize behavior of end users, specifically: rule deviations  Analyze for candidates for potential new or changed requirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 15 L. Singer, O. Brill, S. Meyer, K. Schneider

More Related Content

Viewers also liked

EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL Emily Gross
 
Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?IT-Cluster Odessa
 
Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?George Hutton
 
Love Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusLove Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusGeorge Hutton
 
Présentation IA
Présentation IAPrésentation IA
Présentation IAchmod0
 
Conozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasConozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasProBogotá Región
 
2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Indexsocprog
 
Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016socprog
 
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4Mark McClure
 
Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Julien Deneuville
 

Viewers also liked (15)

Programaciones 03 12-16
Programaciones 03 12-16Programaciones 03 12-16
Programaciones 03 12-16
 
By and-until
By and-untilBy and-until
By and-until
 
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
EMILY GROSS_INTERACTIVE PORTFOLIO 3 DIGITAL
 
Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?Смешанное обучение: с чего начать?
Смешанное обучение: с чего начать?
 
Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?Are You An Island Savage Or A Conscious Creator?
Are You An Island Savage Or A Conscious Creator?
 
Love Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A GeniusLove Your Mistakes And You'll Become A Genius
Love Your Mistakes And You'll Become A Genius
 
Présentation IA
Présentation IAPrésentation IA
Présentation IA
 
Times of India
Times of IndiaTimes of India
Times of India
 
Conozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas MetropolitanasConozca las Actuales Áreas Metropolitanas
Conozca las Actuales Áreas Metropolitanas
 
2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index2016 EU Regional Social Progress Index
2016 EU Regional Social Progress Index
 
Chara
CharaChara
Chara
 
Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016Professor Michael E Porter at #WhatWorks2016
Professor Michael E Porter at #WhatWorks2016
 
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
IMBA TRAIL SOLUTIONS PORTFOLIO MARK MCCLURE 2015 V.4
 
Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016Machine Learning & SEO - SEO Camp'Us Paris 2016
Machine Learning & SEO - SEO Camp'Us Paris 2016
 
DIGITAL BRANDING
DIGITAL BRANDINGDIGITAL BRANDING
DIGITAL BRANDING
 

Similar to 12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation

Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...IJARTES
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docpraveena06
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniquesijdmtaiir
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET Journal
 
GRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxGRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxDAYARNABBAIDYA3
 
NetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiNetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiAlexander Pico
 
Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Alexander Decker
 
Software aging prediction – a new approach
Software aging prediction – a new approach Software aging prediction – a new approach
Software aging prediction – a new approach IJECEIAES
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyAnsgar Koene
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...International Center for Biometric Research
 
A systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaA systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaPubrica
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdfAdhySugara2
 

Similar to 12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation (20)

Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.doc
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
 
GRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptxGRIFFOR_OxfordU CPS 20Mar2017.pptx
GRIFFOR_OxfordU CPS 20Mar2017.pptx
 
B04302018024
B04302018024B04302018024
B04302018024
 
NetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno SchwikowskiNetBioSIG2013-KEYNOTE Benno Schwikowski
NetBioSIG2013-KEYNOTE Benno Schwikowski
 
Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...Finding new framework for resolving problems in various dimensions by the use...
Finding new framework for resolving problems in various dimensions by the use...
 
Software aging prediction – a new approach
Software aging prediction – a new approach Software aging prediction – a new approach
Software aging prediction – a new approach
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and Policy
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
Ijcet 06 07_004
Ijcet 06 07_004Ijcet 06 07_004
Ijcet 06 07_004
 
Towards the Adoption of Cyber-Physical Systems of Systems Paradigm in Smart ...
Towards the Adoption of Cyber-Physical Systems of  Systems Paradigm in Smart ...Towards the Adoption of Cyber-Physical Systems of  Systems Paradigm in Smart ...
Towards the Adoption of Cyber-Physical Systems of Systems Paradigm in Smart ...
 
A systematic review of network analyst - Pubrica
A systematic review of network analyst - PubricaA systematic review of network analyst - Pubrica
A systematic review of network analyst - Pubrica
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdf
 

More from Walid Maalej

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AIWalid Maalej
 
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...Walid Maalej
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Walid Maalej
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Walid Maalej
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4uploadWalid Maalej
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Walid Maalej
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehensionWalid Maalej
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of SoftwareWalid Maalej
 
Context aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachContext aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachWalid Maalej
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU GrazWalid Maalej
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsWalid Maalej
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Walid Maalej
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?Walid Maalej
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements ExplicitWalid Maalej
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert StakeholdersWalid Maalej
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements ElicitationWalid Maalej
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...Walid Maalej
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...Walid Maalej
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product LinesWalid Maalej
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements KnowledgeWalid Maalej
 

More from Walid Maalej (20)

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AI
 
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4upload
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehension
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of Software
 
Context aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachContext aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approach
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU Graz
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering Tools
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 

12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation

  • 1. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation Leif Singer, Olesia Brill, Sebastian Meyer, Kurt Schneider Software Engineering Group Leibniz Universität Hannover {leif.singer, olesia.brill, sebastian.meyer, kurt.schneider}@inf.uni-hannover.de
  • 2. Overview Definition of an IT ecosystem Ourapproach Short Example Open Questions Ongoingresearch Conclusions Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 2 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 3. Whatis an IT ecosystem? An IT ecosystem is an ultra-large-scalesoftwaresystem consists of a large number of actors The technologyof an IT ecosystemistightlyintegratedintoeverydayslife may not beperceivedas an IT system usersmay not knowoforare not interested in thecapabilitiesofthesystem Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 3 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 4. Actors in IT ecosystems An IT ecosystemconsistsofvariousactors An actorcanbe an technicalsubsystem E.g. trafficlights An actorcan also be an autonomousagent Like a human end useror a transportrobot Eachactorusestheinfrastructurethatisofferedbythe IT ecosystemtoachievetheirgoals Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 4 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 5. Problems in RequirementElicitation Requirements (for IT ecosystems) havetobedefinedandvalidatedby all stakeholders End usersmay not beawareofthesurroundingsystem Orare not interested in it Thosearetheinterestingstakeholdersforus The lack ofinterestorawarenessresults in toolittlemotivationfortakingpart in classicalelicitation Making thefindingofnewrequirementsandvalidationofexistingrequirementsdifficult Methodsforrequirementselicitationshouldbeasunobstrusiveaspossible in order tobeuseful in thissetting Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 5 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 6. Rule-based IT ecosystems Interaction ofsubsystems must becontrolled in order tokeepthe IT ecosystemupandrunning The interactionoftheactorscanleadtouncontrolledemergenteffects A rule-basedinfrastructurecanhelptominimizetheimpactofunwantedeffects Rules havetobeseparatedintohardruleswhich must beadheredtoandruleswhichmaybebroken Actors must usethe IT ecosystem‘sinfrastructuretocommunicatewitheachother Thiscanbeusedtoensureruleadherence Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 6 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 7. Iterative processofrefiningrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 7 L. Singer, O. Brill, S. Meyer, K. Schneider Initial Rule Set introduced Requirementsexpressed as Rules Users developnewRequirements Addition/Modification of Rules User BehaviordeviatesfromRules RequirementsEngineerreviewsDeviations System logs deviations Preprocessing of Deviations
  • 8. ObservingRuleDeviations Autonomousactorscandecideto break rules Thosedeviationscanbemonitoredbytheinfrastructure Eachdeviationof a ruleisloggedwith an associatedcontext If a ruleisadheredto, thisis also loggedtoget a relative measurementofruledeviations The loggedruledeviationscanbeusedtoextractneworrefinedrequirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 8 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 9. ExtractionofRequirements Breaking of rules may imply errors in the underlying requirements Autonomousagentsthat break a rulearenormally not interested in creatingnewrequirements Thereforeweneed an unobtrusiveapproach Based on theloggeddeviations, patternscanautomaticallybederived E.g. usinginformationretrievaltechniques The actualextractionofrequirementsfromthesefilteredruledeviationshastobedonemanually Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 9 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 10. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 10 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
  • 11. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 11 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair
  • 12. Example Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 12 L. Singer, O. Brill, S. Meyer, K. Schneider Rule: AllocateparkinglotneartheentrancetotheSmartFair Observation: Drivers chooseparking lots whichare in theshadows New Rule: On sunnydays, allocateparkinglot in theshadows.
  • 13. Open Questions Whataretherequirementsfor a rule-basedinfrastructure? Distinctionbetweenhardrules / soft goalssufficient? Whatis a rightcontext? Howcanwederiveitfor a deviation? Is thecontextdefinedbytheecosystemorbytheactorsitself? Possible Solution: Use an ontologythatrelatesobjectsanddata. A ruledeviationcan log whichobjectsparticipated in thedeviationandcreatethecorrectcontext Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 13 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 14. Ongoingresearch The presented approach is still in its early stages and could not be evaluated yet. In a joint project with two other universities from Lower Saxony we are currently creating the foundations for a prototype that will be used to evaluate the presented approach. The current focus is building a suitable rule-system supporting the approach. Subsequently, data mining and pattern recognition techniques will be selected and evaluated to derive the potential changes in requirementsfromruledeviations. Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 14 L. Singer, O. Brill, S. Meyer, K. Schneider
  • 15. Conclusions In IT ecosystems, the main interest of end users is deriving actual utility from the system Due to emergent effects of many actors interacting with each other, requirements for an IT ecosystem are changing Requirements elicitation is challenging in this setting Utilize behavior of end users, specifically: rule deviations  Analyze for candidates for potential new or changed requirements Utilizing Rule Deviations in IT Ecosystems for Implicit Requirements Elicitation 15 L. Singer, O. Brill, S. Meyer, K. Schneider