SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
M i S d b U biliMapping Study about Usability 
Requirements ElicitationRequirements Elicitation
Yeshica Isela Ormeño, Jose Ignacio Panach
Index
1. Introduction
2. Mapping Study Designpp g y g
3. Results
4 Conclusions4. Conclusions
1. Introduction
How to capture functional requirements?
1. Introduction
How to capture functional requirements?
1. Introduction
How to capture interaction requirements?
Create suscriberCreate suscriber
Process suscriberCategory
[ ]>>
g y
1. Introduction
How to capture usability requirements?
1. Introduction
• Usability requirements aim to improve the system
usability.
• The goal of developing usable systems has been dealt
with the Human Computer Interaction (HCI) and
Software Engineering (SE) fieldsSoftware Engineering (SE) fields.
– HCI has proposed several usability guidelines, but they are too
abstract.
– SE has defined sound methods to capture functional
requirements, but usability is relegated to last stages.
I thi i t d i t id tif th i ti• In this mapping study we aim to identify the existing
methods for capturing usability requirements.
1. Introduction
• MS provides an objective procedure for identifying the
t d t t f th h th t i il bl tnature and extent of the research that is available to
answer a particular question.
We aim to identify gaps in current research and to• We aim to identify gaps in current research and to
suggest areas for further investigation.
• In particular we focus on finding works to capture• In particular, we focus on finding works to capture
usability requirements in the MDD methods.
Index
1. Introduction
2. Mapping Study Designpp g y g
3. Results
C4. Conclusions
2. Mapping Study Design
• The MP has been defined according to Kitchenham’s
kworks.
• There are previous MP related to usability but none of
them focuses on usability requirementsthem focuses on usability requirements.
2.1 Research Question
• Research question: “What are the proposals to elicit
bilit i t th h t th ftusability requirements throughout the software
development process?”
1 Methods to elicit usability requirements– 1.Methods to elicit usability requirements
– 2.Methods to elicit interaction requirements
– 3.Usability guidelines to elicit usability requirementsy g y q
2.1 Research Question
• Research question: “What are the proposals to elicit
bilit i t th h t th ftusability requirements throughout the software
development process?”
1 Methods to elicit usability requirements– 1.Methods to elicit usability requirements
– 2.Methods to elicit interaction requirements
– 3.Usability guidelines to elicit usability requirementsy g y q
– 4 Tools to support usability requirements elicitation
– 5 Notations to elicit usability requirements
– 6 Empirical validation environment
2.2 Search Strategy
• Search strategy: We have used the following search
IEEE l ACM Di it l Lib S i Li ksources: IEEExplore, ACM Digital Library, Springer Link,
and Science Direct.
• We have used Scopus as search tool• We have used Scopus as search tool.
• The sources explored were the proceedings of
conferences journals books and workshops (from 2000conferences, journals, books, and workshops (from 2000
to 2011).
RESEARCH SEARCH SELECTIONRESEARCH
QUESTION
SEARCH
STRATEGY
SELECTION
CRITERIA
PUBLICATIONS
SELECTION
QUALITY
ASSESSMENT
DATA
EXTRACTION
STRATEGY
2.2 Search Strategy
• Search strategy: The search string is a set of terms to
obtain the publications that answer the research questionobtain the publications that answer the research question.
• Search string = (Usability Requirement) AND (Software
Engineering)Engineering)
– Usability Requirement = (usability requirement OR user
requirement OR usability elicitation OR interaction requirement OR
f ti l OR bilit id li )non-functional OR usability guidelines).
– Software Engineering = (MDD OR model-driven OR MDA OR
notation OR tool OR interface OR engineering OR test).g g )
2.3 Selection Criteria
• Selection criteria: Inclusion and exclusion criteria are
d t i ddetermined
– Inclusion criteria:
• Publications that define how to extract usability requirementsPublications that define how to extract usability requirements.
• Approaches applied to an environment based on MDD conceptual
models.
P blications that define ho to represent the sabilit req irements• Publications that define how to represent the usability requirements.
RESEARCH SEARCH SELECTIONRESEARCH
QUESTION
SEARCH
STRATEGY
SELECTION
CRITERIA
PUBLICATIONS
SELECTION
QUALITY
ASSESSMENT
DATA
EXTRACTION
STRATEGY
2.3 Selection Criteria
• Selection criteria: Inclusion and exclusion criteria are
d t i ddetermined:
– Inclusion criteria:
• Publications that define how to extract usability requirementsPublications that define how to extract usability requirements.
• Approaches applied to an environment based on MDD conceptual
models.
P blications that define ho to represent the sabilit req irements• Publications that define how to represent the usability requirements.
– Exclusion criteria:
• Publications focused on guidelines, notations, and tools whereg
usability has not been considered or has not been included.
• Publications that consider only functional requirements.
• Publications written in a language that is not EnglishPublications written in a language that is not English.
2.4 Publication Selection
• Publication Selection with a systematic process:
– Reading the title and the abstract. From 150 papers, we chose
65 (potential publications).
– Reading the whole publication. From 65 papers, we chose 27Reading the whole publication. From 65 papers, we chose 27
(initial selected publications).
– Searching in references. We added two new publications,
res lting in a total of 29 papers (selected p blications)resulting in a total of 29 papers (selected publications).
RESEARCH SEARCH SELECTIONRESEARCH
QUESTION
SEARCH
STRATEGY
SELECTION
CRITERIA
PUBLICATIONS
SELECTION
QUALITY
ASSESSMENT
DATA
EXTRACTION
STRATEGY
2.5 Quality Assessment
• Quality assessment: to specify the quality of the
l t d bli tiselected publications.
• We use a Likert-questionnaire to specify the quality.
RESEARCH
QUESTION
SEARCH
STRATEGY
SELECTION
CRITERIA
PUBLICATIONS
SELECTION
QUALITY
ASSESSMENT
DATA
EXTRACTION
SELECTIONASSESSMENT
STRATEGY
2.5 Quality Assessment
Subjective Questions 1=Yes 0=Partially -1=No
1. Is the method to elicit the usability requirements clear?
2. Are the guidelines to elicit requirements comprehensible?
3. Are the guidelines to elicit requirements useful in other contexts?
4. Are the publications tools downloadable?
5. Is there a clear case study or example illustrating the proposal?
6. Is the whole proposal empirically validated?
7. Are the results clearly explained?
8. Is the notation to elicit requirements easy to learn?
Objective Questions
1 Has the publication been published in journal or conference1. Has the publication been published in journal or conference
proceedings?
1=Very important 0=Important -1=Not important
2 Has the publication been cited by other authors?2. Has the publication been cited by other authors?
1= More than 4 0=Between 2 and 4 -1=Less than 2
2.6 Data Extraction Strategy
• Data extraction strategy: it consists of classifying the
ibl f h h b tipossible answers for each research subquestion.
RESEARCH
QUESTION
SEARCH
STRATEGY
SELECTION
CRITERIA
PUBLICATIONSQUALITY
DATA
EXTRACTION
SELECTIONASSESSMENT
EXTRACTION
STRATEGY
Index
1. Introduction
2 Mapping Study Design2. Mapping Study Design
3. Results
4. Conclusions
3. Results
• SQ1 Methods to elicit usability requirements.
– Existing methods deal with usability requirements together with
other NFR.
– NFR are elicited at the same time the system functionality andNFR are elicited at the same time the system functionality and
architecture are defined.
– A holistic quality model that fits every context does not exist, and
th d t li it NFR l id b i i tmethods to elicit NFR only provide basic requirements
management by means of extensions.
– A few approaches deal with usability requirements at earlypp y q y
stages.
3. Results
• SQ2 Methods to elicit interaction requirements.
– Most methods are based on patterns or models.
– Some methods improve usability by means of applying formal
modellingmodelling.
– However, further work is needed to deal with dynamic
specifications that depend on system functionality.
3. Results
• SQ3 Guidelines to elicit usability requirements.
– There is a huge variety of guidelines.
– The application of these guidelines is not easy.
A few works propose a definition of new guidelines– A few works propose a definition of new guidelines.
– Some representations are based on patterns, templates, or
models and they can be adapted according to which usability
requirements are being captured.
– Nowadays, the guidelines do not provide precise support to
address usability requirements elicitation at the early stagesaddress usability requirements elicitation at the early stages.
3. Results
• SQ4 Tools to support usability requirements elicitation
– Selected publications present tools to support: frameworks,
structured styles, scenarios, notations and methods.
– Some tools incorporate a mechanism of transformation (forSome tools incorporate a mechanism of transformation, (for
example, from task flow diagrams to formal representations).
– A few tools are model-based and they can resolve traceability
b t i t d t tbetween requirements and next stages.
3. Results
• SQ5 Notations to elicit usability requirements:
– More than one notation is usually applied to the development
method.
– The user requirements specifications are usually presented toThe user requirements specifications are usually presented to
end-users in normal text, even though the analyst works with
languages based on models.
S l i t i t t f ti l i t d– Some proposals aim to integrate functional requirements and
NFR in the same elicitation process.
3. Results
• SQ6 Empirical validation environment:
– There is not explicit metrics to evaluate the usability
requirements elicitation.
– Existing validations are focused on quantitative and qualitativeExisting validations are focused on quantitative and qualitative
usability requirements.
– Studied publications are focused on evaluating a few usability
f tfeatures.
– Patterns, scenario management, checklists, work sessions, and
templates are the most common artefacts used to evaluatep
usability.
3. Results
Studied Publications Quality of Publications
13
15
POTENTIAL PUBLICATIONS
SELECTED PUBLICATIONS
12
16
14
16
18
8
6 6
8
7 7
8
5
10
12
6
8
10
12
2 2 2
3
12 1 1
5
3 3 3 3
0
1
0
2
4
Very good Good Bad
3.1 Discussion
• Usability requirements are elicited once all functional
requirements have been capturedrequirements have been captured.
• Existing approaches do not propose a precise and
unambiguous notation to represent usabilityunambiguous notation to represent usability
requirements.
• Guidelines are not defined such a way end-users canGuidelines are not defined such a way end users can
understand them.
• Guidelines are not a holistic support to develop usablepp p
systems.
• The methods are inflexible and require considerable
effort to be applied in contexts that are different from the
contexts where they have been defined.
Index
1. Introduction
2 Mapping Study Design2. Mapping Study Design
3. Results
4. Conclusions
4. Conclusions
• We have explored the development methods that
consider usability as a requirement.y q
• A total of 29 publications were selected from an initial set
of 150 publications returned by the search string.
• 97% of selected publications have a good quality.
• If we focus on MDD, there are few works in this field
• We plan to develop a framework to elicit usability
requirements in such a way that it could be used in any
MDD method.
• We plan to develop transformation rules from the
bilit i t t t l i d d iusability requirements to generate analysis and design
models
Th k !Thanks!
Questions?Questions?

Más contenido relacionado

Similar a Ignacio panach ormeño et-al_caise2013

Planning and usability evaluation methods
Planning and usability evaluation methodsPlanning and usability evaluation methods
Planning and usability evaluation methodsAndres Baravalle
 
What is program evaluation lecture 100207 [compatibility mode]
What is program evaluation lecture   100207 [compatibility mode]What is program evaluation lecture   100207 [compatibility mode]
What is program evaluation lecture 100207 [compatibility mode]Jennifer Morrow
 
Design and Evaluation techniques unit 5
Design and Evaluation techniques unit  5Design and Evaluation techniques unit  5
Design and Evaluation techniques unit 5KrishnaVeni451953
 
Modern elicitation trends asma & ayesha paper presentation
Modern elicitation trends  asma & ayesha paper presentationModern elicitation trends  asma & ayesha paper presentation
Modern elicitation trends asma & ayesha paper presentationAsma Sajid
 
Usability requirements and their elicitation
Usability requirements and their elicitationUsability requirements and their elicitation
Usability requirements and their elicitationLucas Machado
 
Introduction to ORoperationresearch UTC.pdf
Introduction to ORoperationresearch UTC.pdfIntroduction to ORoperationresearch UTC.pdf
Introduction to ORoperationresearch UTC.pdfolfaharrabi2
 
Usability evaluations (part 3)
Usability evaluations (part 3) Usability evaluations (part 3)
Usability evaluations (part 3) Andres Baravalle
 
UX Evaluation Design of an Online Editor for Infographics Creation
UX Evaluation Design of an Online Editor for Infographics CreationUX Evaluation Design of an Online Editor for Infographics Creation
UX Evaluation Design of an Online Editor for Infographics CreationNadia Serveti
 
HCI(Human Computer Interaction)-PPT-REPORT.pptx
HCI(Human Computer Interaction)-PPT-REPORT.pptxHCI(Human Computer Interaction)-PPT-REPORT.pptx
HCI(Human Computer Interaction)-PPT-REPORT.pptxvliencycapateiii
 
Evaluation of Interactive Systems Design or Prototype or Product
Evaluation of Interactive Systems Design or Prototype or ProductEvaluation of Interactive Systems Design or Prototype or Product
Evaluation of Interactive Systems Design or Prototype or ProductKhalid Md Saifuddin
 
Introduction to Usability Testing for Survey Research
Introduction to Usability Testing for Survey ResearchIntroduction to Usability Testing for Survey Research
Introduction to Usability Testing for Survey ResearchCaroline Jarrett
 
Measuring the usefulness of Knowledge Organization Systems in Information Ret...
Measuring the usefulness of Knowledge Organization Systems in Information Ret...Measuring the usefulness of Knowledge Organization Systems in Information Ret...
Measuring the usefulness of Knowledge Organization Systems in Information Ret...GESIS
 
Evaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsEvaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsDebbie_at_IDS
 
Context-aware and user centered evaluation of assistive systems
Context-aware and user centered evaluation of assistive systemsContext-aware and user centered evaluation of assistive systems
Context-aware and user centered evaluation of assistive systemsJesús Fontecha
 
Unit 3_Evaluation Technique.pptx
Unit 3_Evaluation Technique.pptxUnit 3_Evaluation Technique.pptx
Unit 3_Evaluation Technique.pptxssuser50f868
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability EvaluationSaqib Shehzad
 
Software Testing - Introduction
Software Testing - IntroductionSoftware Testing - Introduction
Software Testing - IntroductionAjeng Savitri
 

Similar a Ignacio panach ormeño et-al_caise2013 (20)

Planning and usability evaluation methods
Planning and usability evaluation methodsPlanning and usability evaluation methods
Planning and usability evaluation methods
 
What is program evaluation lecture 100207 [compatibility mode]
What is program evaluation lecture   100207 [compatibility mode]What is program evaluation lecture   100207 [compatibility mode]
What is program evaluation lecture 100207 [compatibility mode]
 
Design and Evaluation techniques unit 5
Design and Evaluation techniques unit  5Design and Evaluation techniques unit  5
Design and Evaluation techniques unit 5
 
Modern elicitation trends asma & ayesha paper presentation
Modern elicitation trends  asma & ayesha paper presentationModern elicitation trends  asma & ayesha paper presentation
Modern elicitation trends asma & ayesha paper presentation
 
Mobile Healthcare App
Mobile Healthcare AppMobile Healthcare App
Mobile Healthcare App
 
Usability requirements and their elicitation
Usability requirements and their elicitationUsability requirements and their elicitation
Usability requirements and their elicitation
 
Introduction to ORoperationresearch UTC.pdf
Introduction to ORoperationresearch UTC.pdfIntroduction to ORoperationresearch UTC.pdf
Introduction to ORoperationresearch UTC.pdf
 
Usability evaluations (part 3)
Usability evaluations (part 3) Usability evaluations (part 3)
Usability evaluations (part 3)
 
UX Evaluation Design of an Online Editor for Infographics Creation
UX Evaluation Design of an Online Editor for Infographics CreationUX Evaluation Design of an Online Editor for Infographics Creation
UX Evaluation Design of an Online Editor for Infographics Creation
 
HCI(Human Computer Interaction)-PPT-REPORT.pptx
HCI(Human Computer Interaction)-PPT-REPORT.pptxHCI(Human Computer Interaction)-PPT-REPORT.pptx
HCI(Human Computer Interaction)-PPT-REPORT.pptx
 
Evaluation of Interactive Systems Design or Prototype or Product
Evaluation of Interactive Systems Design or Prototype or ProductEvaluation of Interactive Systems Design or Prototype or Product
Evaluation of Interactive Systems Design or Prototype or Product
 
Introduction to Usability Testing for Survey Research
Introduction to Usability Testing for Survey ResearchIntroduction to Usability Testing for Survey Research
Introduction to Usability Testing for Survey Research
 
Measuring the usefulness of Knowledge Organization Systems in Information Ret...
Measuring the usefulness of Knowledge Organization Systems in Information Ret...Measuring the usefulness of Knowledge Organization Systems in Information Ret...
Measuring the usefulness of Knowledge Organization Systems in Information Ret...
 
Systematic Literature Review
Systematic Literature ReviewSystematic Literature Review
Systematic Literature Review
 
Evaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsEvaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation Methods
 
Context-aware and user centered evaluation of assistive systems
Context-aware and user centered evaluation of assistive systemsContext-aware and user centered evaluation of assistive systems
Context-aware and user centered evaluation of assistive systems
 
Unit 3_Evaluation Technique.pptx
Unit 3_Evaluation Technique.pptxUnit 3_Evaluation Technique.pptx
Unit 3_Evaluation Technique.pptx
 
software project management
software project managementsoftware project management
software project management
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
 
Software Testing - Introduction
Software Testing - IntroductionSoftware Testing - Introduction
Software Testing - Introduction
 

Más de caise2013vlc

Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-modelscaise2013vlc
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caascaise2013vlc
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013finalcaise2013vlc
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentationcaise2013vlc
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalcaise2013vlc
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slidescaise2013vlc
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vfcaise2013vlc
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aisecaise2013vlc
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013caise2013vlc
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2caise2013vlc
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handoutscaise2013vlc
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013caise2013vlc
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentationcaise2013vlc
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aisecaise2013vlc
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18ccaise2013vlc
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_caise2013vlc
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caisecaise2013vlc
 
Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3caise2013vlc
 

Más de caise2013vlc (20)

Caise panel
Caise panelCaise panel
Caise panel
 
Markus keuneke partial data-models
Markus keuneke   partial data-modelsMarkus keuneke   partial data-models
Markus keuneke partial data-models
 
Jelena zdravkovic c ai-se 2013 capability caas
Jelena zdravkovic  c ai-se 2013 capability caasJelena zdravkovic  c ai-se 2013 capability caas
Jelena zdravkovic c ai-se 2013 capability caas
 
Sagar sen caise2013final
Sagar sen caise2013finalSagar sen caise2013final
Sagar sen caise2013final
 
David aguilera presentation
David aguilera   presentationDavid aguilera   presentation
David aguilera presentation
 
Sonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_finalSonja kabicher fuchs presentation-caise13_final
Sonja kabicher fuchs presentation-caise13_final
 
Suriadi caise2013 slides
Suriadi caise2013 slidesSuriadi caise2013 slides
Suriadi caise2013 slides
 
Fadila caise2013 vf
Fadila caise2013 vfFadila caise2013 vf
Fadila caise2013 vf
 
Michael mrissa c aise
Michael mrissa c aiseMichael mrissa c aise
Michael mrissa c aise
 
Razvan petrusel presentation caise 2013
Razvan petrusel   presentation caise 2013Razvan petrusel   presentation caise 2013
Razvan petrusel presentation caise 2013
 
Ramezani taghiabadi temporal compliance checking 2
Ramezani taghiabadi   temporal compliance checking 2Ramezani taghiabadi   temporal compliance checking 2
Ramezani taghiabadi temporal compliance checking 2
 
Ferreira c ai-se2013-final-handouts
Ferreira   c ai-se2013-final-handoutsFerreira   c ai-se2013-final-handouts
Ferreira c ai-se2013-final-handouts
 
Sonja meyer caise 2013
Sonja meyer caise 2013Sonja meyer caise 2013
Sonja meyer caise 2013
 
Tony clark caise 13-presentation
Tony clark  caise 13-presentationTony clark  caise 13-presentation
Tony clark caise 13-presentation
 
Miguel goulao 2013 c-aise
Miguel goulao 2013 c-aiseMiguel goulao 2013 c-aise
Miguel goulao 2013 c-aise
 
Jorge cardoso caise-usdl-tosca-2013-06-18c
Jorge cardoso   caise-usdl-tosca-2013-06-18cJorge cardoso   caise-usdl-tosca-2013-06-18c
Jorge cardoso caise-usdl-tosca-2013-06-18c
 
Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_Kerrstin klemishc c-aise2013_
Kerrstin klemishc c-aise2013_
 
Peter sawyer caise
Peter sawyer  caisePeter sawyer  caise
Peter sawyer caise
 
Scekic caise13-
Scekic caise13-Scekic caise13-
Scekic caise13-
 
Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3Malinda scalability c_ai_se_2013_v3
Malinda scalability c_ai_se_2013_v3
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Ignacio panach ormeño et-al_caise2013

  • 1. M i S d b U biliMapping Study about Usability  Requirements ElicitationRequirements Elicitation Yeshica Isela Ormeño, Jose Ignacio Panach
  • 2. Index 1. Introduction 2. Mapping Study Designpp g y g 3. Results 4 Conclusions4. Conclusions
  • 3. 1. Introduction How to capture functional requirements?
  • 4. 1. Introduction How to capture functional requirements?
  • 5. 1. Introduction How to capture interaction requirements? Create suscriberCreate suscriber Process suscriberCategory [ ]>> g y
  • 6. 1. Introduction How to capture usability requirements?
  • 7. 1. Introduction • Usability requirements aim to improve the system usability. • The goal of developing usable systems has been dealt with the Human Computer Interaction (HCI) and Software Engineering (SE) fieldsSoftware Engineering (SE) fields. – HCI has proposed several usability guidelines, but they are too abstract. – SE has defined sound methods to capture functional requirements, but usability is relegated to last stages. I thi i t d i t id tif th i ti• In this mapping study we aim to identify the existing methods for capturing usability requirements.
  • 8. 1. Introduction • MS provides an objective procedure for identifying the t d t t f th h th t i il bl tnature and extent of the research that is available to answer a particular question. We aim to identify gaps in current research and to• We aim to identify gaps in current research and to suggest areas for further investigation. • In particular we focus on finding works to capture• In particular, we focus on finding works to capture usability requirements in the MDD methods.
  • 9. Index 1. Introduction 2. Mapping Study Designpp g y g 3. Results C4. Conclusions
  • 10. 2. Mapping Study Design • The MP has been defined according to Kitchenham’s kworks. • There are previous MP related to usability but none of them focuses on usability requirementsthem focuses on usability requirements.
  • 11. 2.1 Research Question • Research question: “What are the proposals to elicit bilit i t th h t th ftusability requirements throughout the software development process?” 1 Methods to elicit usability requirements– 1.Methods to elicit usability requirements – 2.Methods to elicit interaction requirements – 3.Usability guidelines to elicit usability requirementsy g y q
  • 12. 2.1 Research Question • Research question: “What are the proposals to elicit bilit i t th h t th ftusability requirements throughout the software development process?” 1 Methods to elicit usability requirements– 1.Methods to elicit usability requirements – 2.Methods to elicit interaction requirements – 3.Usability guidelines to elicit usability requirementsy g y q – 4 Tools to support usability requirements elicitation – 5 Notations to elicit usability requirements – 6 Empirical validation environment
  • 13. 2.2 Search Strategy • Search strategy: We have used the following search IEEE l ACM Di it l Lib S i Li ksources: IEEExplore, ACM Digital Library, Springer Link, and Science Direct. • We have used Scopus as search tool• We have used Scopus as search tool. • The sources explored were the proceedings of conferences journals books and workshops (from 2000conferences, journals, books, and workshops (from 2000 to 2011). RESEARCH SEARCH SELECTIONRESEARCH QUESTION SEARCH STRATEGY SELECTION CRITERIA PUBLICATIONS SELECTION QUALITY ASSESSMENT DATA EXTRACTION STRATEGY
  • 14. 2.2 Search Strategy • Search strategy: The search string is a set of terms to obtain the publications that answer the research questionobtain the publications that answer the research question. • Search string = (Usability Requirement) AND (Software Engineering)Engineering) – Usability Requirement = (usability requirement OR user requirement OR usability elicitation OR interaction requirement OR f ti l OR bilit id li )non-functional OR usability guidelines). – Software Engineering = (MDD OR model-driven OR MDA OR notation OR tool OR interface OR engineering OR test).g g )
  • 15. 2.3 Selection Criteria • Selection criteria: Inclusion and exclusion criteria are d t i ddetermined – Inclusion criteria: • Publications that define how to extract usability requirementsPublications that define how to extract usability requirements. • Approaches applied to an environment based on MDD conceptual models. P blications that define ho to represent the sabilit req irements• Publications that define how to represent the usability requirements. RESEARCH SEARCH SELECTIONRESEARCH QUESTION SEARCH STRATEGY SELECTION CRITERIA PUBLICATIONS SELECTION QUALITY ASSESSMENT DATA EXTRACTION STRATEGY
  • 16. 2.3 Selection Criteria • Selection criteria: Inclusion and exclusion criteria are d t i ddetermined: – Inclusion criteria: • Publications that define how to extract usability requirementsPublications that define how to extract usability requirements. • Approaches applied to an environment based on MDD conceptual models. P blications that define ho to represent the sabilit req irements• Publications that define how to represent the usability requirements. – Exclusion criteria: • Publications focused on guidelines, notations, and tools whereg usability has not been considered or has not been included. • Publications that consider only functional requirements. • Publications written in a language that is not EnglishPublications written in a language that is not English.
  • 17. 2.4 Publication Selection • Publication Selection with a systematic process: – Reading the title and the abstract. From 150 papers, we chose 65 (potential publications). – Reading the whole publication. From 65 papers, we chose 27Reading the whole publication. From 65 papers, we chose 27 (initial selected publications). – Searching in references. We added two new publications, res lting in a total of 29 papers (selected p blications)resulting in a total of 29 papers (selected publications). RESEARCH SEARCH SELECTIONRESEARCH QUESTION SEARCH STRATEGY SELECTION CRITERIA PUBLICATIONS SELECTION QUALITY ASSESSMENT DATA EXTRACTION STRATEGY
  • 18. 2.5 Quality Assessment • Quality assessment: to specify the quality of the l t d bli tiselected publications. • We use a Likert-questionnaire to specify the quality. RESEARCH QUESTION SEARCH STRATEGY SELECTION CRITERIA PUBLICATIONS SELECTION QUALITY ASSESSMENT DATA EXTRACTION SELECTIONASSESSMENT STRATEGY
  • 19. 2.5 Quality Assessment Subjective Questions 1=Yes 0=Partially -1=No 1. Is the method to elicit the usability requirements clear? 2. Are the guidelines to elicit requirements comprehensible? 3. Are the guidelines to elicit requirements useful in other contexts? 4. Are the publications tools downloadable? 5. Is there a clear case study or example illustrating the proposal? 6. Is the whole proposal empirically validated? 7. Are the results clearly explained? 8. Is the notation to elicit requirements easy to learn? Objective Questions 1 Has the publication been published in journal or conference1. Has the publication been published in journal or conference proceedings? 1=Very important 0=Important -1=Not important 2 Has the publication been cited by other authors?2. Has the publication been cited by other authors? 1= More than 4 0=Between 2 and 4 -1=Less than 2
  • 20. 2.6 Data Extraction Strategy • Data extraction strategy: it consists of classifying the ibl f h h b tipossible answers for each research subquestion. RESEARCH QUESTION SEARCH STRATEGY SELECTION CRITERIA PUBLICATIONSQUALITY DATA EXTRACTION SELECTIONASSESSMENT EXTRACTION STRATEGY
  • 21. Index 1. Introduction 2 Mapping Study Design2. Mapping Study Design 3. Results 4. Conclusions
  • 22. 3. Results • SQ1 Methods to elicit usability requirements. – Existing methods deal with usability requirements together with other NFR. – NFR are elicited at the same time the system functionality andNFR are elicited at the same time the system functionality and architecture are defined. – A holistic quality model that fits every context does not exist, and th d t li it NFR l id b i i tmethods to elicit NFR only provide basic requirements management by means of extensions. – A few approaches deal with usability requirements at earlypp y q y stages.
  • 23. 3. Results • SQ2 Methods to elicit interaction requirements. – Most methods are based on patterns or models. – Some methods improve usability by means of applying formal modellingmodelling. – However, further work is needed to deal with dynamic specifications that depend on system functionality.
  • 24. 3. Results • SQ3 Guidelines to elicit usability requirements. – There is a huge variety of guidelines. – The application of these guidelines is not easy. A few works propose a definition of new guidelines– A few works propose a definition of new guidelines. – Some representations are based on patterns, templates, or models and they can be adapted according to which usability requirements are being captured. – Nowadays, the guidelines do not provide precise support to address usability requirements elicitation at the early stagesaddress usability requirements elicitation at the early stages.
  • 25. 3. Results • SQ4 Tools to support usability requirements elicitation – Selected publications present tools to support: frameworks, structured styles, scenarios, notations and methods. – Some tools incorporate a mechanism of transformation (forSome tools incorporate a mechanism of transformation, (for example, from task flow diagrams to formal representations). – A few tools are model-based and they can resolve traceability b t i t d t tbetween requirements and next stages.
  • 26. 3. Results • SQ5 Notations to elicit usability requirements: – More than one notation is usually applied to the development method. – The user requirements specifications are usually presented toThe user requirements specifications are usually presented to end-users in normal text, even though the analyst works with languages based on models. S l i t i t t f ti l i t d– Some proposals aim to integrate functional requirements and NFR in the same elicitation process.
  • 27. 3. Results • SQ6 Empirical validation environment: – There is not explicit metrics to evaluate the usability requirements elicitation. – Existing validations are focused on quantitative and qualitativeExisting validations are focused on quantitative and qualitative usability requirements. – Studied publications are focused on evaluating a few usability f tfeatures. – Patterns, scenario management, checklists, work sessions, and templates are the most common artefacts used to evaluatep usability.
  • 28. 3. Results Studied Publications Quality of Publications 13 15 POTENTIAL PUBLICATIONS SELECTED PUBLICATIONS 12 16 14 16 18 8 6 6 8 7 7 8 5 10 12 6 8 10 12 2 2 2 3 12 1 1 5 3 3 3 3 0 1 0 2 4 Very good Good Bad
  • 29. 3.1 Discussion • Usability requirements are elicited once all functional requirements have been capturedrequirements have been captured. • Existing approaches do not propose a precise and unambiguous notation to represent usabilityunambiguous notation to represent usability requirements. • Guidelines are not defined such a way end-users canGuidelines are not defined such a way end users can understand them. • Guidelines are not a holistic support to develop usablepp p systems. • The methods are inflexible and require considerable effort to be applied in contexts that are different from the contexts where they have been defined.
  • 30. Index 1. Introduction 2 Mapping Study Design2. Mapping Study Design 3. Results 4. Conclusions
  • 31. 4. Conclusions • We have explored the development methods that consider usability as a requirement.y q • A total of 29 publications were selected from an initial set of 150 publications returned by the search string. • 97% of selected publications have a good quality. • If we focus on MDD, there are few works in this field • We plan to develop a framework to elicit usability requirements in such a way that it could be used in any MDD method. • We plan to develop transformation rules from the bilit i t t t l i d d iusability requirements to generate analysis and design models