Sam Supakkul Lawrence Chung The University of Texas at Dallas

Slides:



Advertisements
Similar presentations
1 GRL Introduction Lin Liu University of Toronto April 2001.
Advertisements

Centralize or Decentralize? A Requirements Engineering Perspective on Internet-Scale Architectures Eric Yu University of Toronto July 2000.
Microsoft Operations Framework (MOF) 4.0
Security Design Patterns – Overview –Software Development Lifecycle –Enterprise Software Design Process and Artifacts –Pattern Format –Aspect Oriented.
© Eric Yu Strategic Actor Relationships Modelling with i* Eric Yu University of Toronto December 13-14, 2001 IRST, Trento, Italy.
A UML Profile for Goal-Oriented and Use Case-Driven Representation of NFRs and FRs Sam Supakkul Titat Software LLC Lawrence Chung The.
Towards a Unified Business Strategy Language: A Meta-model of Strategy Maps Constantinos Giannoulis Michael Petit Jelena Zdravkovic.
The Relationship between Nuclear Safety, Security and Safeguards
lamsweerde Part 2: Building System Models for RE © 2009 John Wiley and Sons 1 Part 2: Building System Models for RE Introduction.
© Eric Yu Agenda Session 1 – Introduction December 13, 14:30-16:30 Motivations Basic concepts –The Strategic Dependency Model –The Strategic Rationale.
Developing MAS The GAIA Methodology A Brief Summary by António Castro and Prof. Eugénio Oliveira.
Amirkabir University of Technology, Computer Engineering Faculty, Intelligent Systems Laboratory,Requirements Engineering Course, Dr. Abdollahzadeh 1 Requirements.
Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering Vahid Jalali Amirkabir university of technology, Department of computer.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
SE 555 Software Requirements & Specification 1 Misuse Cases.
Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering درس مهندسی نیازمندی ها استاد دکتر عبداله زاده دانشجو خیرالنسا مرچانت.
1 درس مهندسي نيازمندي استاد دكتر عبداله زاده دانشجو خيرالنسا مرچانت RE in The Year 00: A Research Perspective.
Refactoring workshop, WCRE'03 Software refactoring guided by multiple soft-goals Yijun Yu, John Mylopoulos, Eric Yu, Julio C. Leite, Linda Lin Liu, University.
Amirkabir University of Technology, Computer Engineering Faculty, Intelligent Systems Laboratory,Requirements Engineering Course, Dr. Abdollahzadeh 1 Towards.
NON-FUNCTIONAL PROPERTIES IN SOFTWARE PRODUCT LINES: A FRAMEWORK FOR DEVELOPING QUALITY-CENTRIC SOFTWARE PRODUCTS May Mahdi Noorian
Toward Component Non-functional Interoperability Analysis: A UML- based and Goal-oriented Approach Sam Supakkul and Lawrence Chung The University of Texas.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
Model Driven Security Framework for Definition of Security Requirements for SOA Based Applications Authors: Muhammad Qaisar Saleem, Jafreezal Jaafar, and.
Capturing, Organizing, and Reusing Knowledge of NFRs: An NFR Pattern Approach Sam Supakkul 1 Tom Hill 2 Ebenezer Akin Oladimeji 3 Lawrence Chung 1 1 The.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
CSCE 548 Secure Software Development Test 1 Review.
lamsweerde Requirements Engineering © 2009 John Wiley and Sons 1 Requirements Engineering From System Goals to UML Models.
Virtual OSGi Framework and Telecommunications Sam Supakkul Yotta Networks Digital Pockets, LLC Dallas, Texas Lawrence Chung Dept.
Loc-based Variability for Mobile Information Systems Raian Ali, Fabiano Dalpiaz, Paolo Giorgini CAiSE’ June 2008.
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The.
1 Sobah Abbas Petersen Adjunct Associate Professor TDT4252 Modelling of Information Systems Advanced Course Lecture 5: i*modelling.
1 From GORE (not the US presidential candidate) to AORE (Agent-Oriented Requirements Engineering) Eric Yu University of Toronto November 2000.
1 An Agent-Oriented Methodology for Requirements Elicitation Luiz Marcio Cysneiros Dept. of Math and Stat Information Technology Program York University.
1 Security in the Context of Dependability Tacksoo Im John D. McGregor School of Computing Clemson University ORNL Presentation.
Lecture 7: Requirements Engineering
For Goal-Driven Business Process Modeling Saeed A.Behnam,  Daniel Amyot, Gunter Mussbacher SITE, University of.
Summary.ppt1 TDT Modelling of information systems, Fall 2004 Summary of the course Guttorm Sindre / Hallvard Trætteberg, IDI.
Using Meta-Model-Driven Views to Address Scalability in i* Models Jane You Department of Computer Science University of Toronto.
Capturing and Reusing Functional and Non-functional Requirements Knowledge: A Goal-Object Pattern Approach Lawrence Chung and Sam Supakkul The University.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Misuse Cases: Use Cases with Hostile Intent Presented by: Frank Xu Gannon University.
Developing Adaptable Software Architectures for Real-Time Systems Using Design Patterns Lawrence Chung, Kendra Cooper, Anna Yi The University of Texas.
Requirements Management with Use Cases Module 3: Analyze the Problem Requirements Management with Use Cases Module 3: Analyze the Problem.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 Structuring Knowledge for a Security Trade-offs Knowledge Base Golnaz Elahi Department of Computer Science Eric Yu Faculty of Information Study University.
 2001 John Mylopoulos STRAW’ Software Architectures as Social Structures John Mylopoulos University of Toronto First ICSE Workshop titled “From.
Inferring Declarative Requirements Specification from Operational Scenarios IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 12, DECEMBER, 1998.
Requirement Engineering
Software Architecting Using Goals, Scenarios, Patterns and Objects Lawrence Chung The University of Texas at Dallas.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Presented by Chin-Yi Tsai.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Sam Supakkul Network Surveillance Systems MCI Lawrence Chung Dept. of.
Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
 Authors  Purpose  Main Phases  Related Literature  PDD  Examples  Conclusions.
Rule-based Context-aware Adaptation Using a Goal-Oriented Ontology Hongyuan Wang (Jilin University, China) Rutvij Mehta (The University of Texas at Dallas,USA)
Week 3 Research Method in Abnormal Psychology. Scientific Study Systematic attempts to test our assumptions based on the following steps: 1. Formulating.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Page 1 An Overview of The COTS-Aware Requirements Engineering and Software Architecting Project (CARE/SA) The University of Texas at Dallas Department.
CSCE 548 Secure Software Development Use Cases Misuse Cases
Lab Roles and Lab Report
A rationale for security (mis)use cases
CSCE 548 Secure Software Development Test 1 Review
The University of Texas at Dallas
A Tutorial for a RE-Tool
NFR Framework Workshop
A rationale for security (mis)use cases
NFR Framework Workshop
Integrating FRs and NFRs: A Use Case and Goal Driven Approach
Database Security &Threats
TDT4252 Modelling of Information Systems Advanced Course
Detecting Conflicts of Interest
Presentation transcript:

Sam Supakkul Lawrence Chung The University of Texas at Dallas Extending Problem Frames to Deal with Stakeholder Problems: An Agent- and Goal-Oriented Approach Sam Supakkul Lawrence Chung The University of Texas at Dallas

A storm is coming… Is it a problem? http://www.skystef.be/images/Lightning/slides/2008-06-02-1818-Kampenhout.jpg

Yes, if we want outdoor fun http://www.alphabetgolf.co.uk/alphabetgolf.co.uk/Outdoor%20Party%20Dance.jpg

No, if we’re dying for it want healthy crops http://earthfirst.com/wp-content/uploads/2008/09/egypt-drought.jpg http://coofweb.deza.admin.ch/pictures/nepal/nrm/en_maize_farmer.jpg

Same phenomenon problem blessing http://www.batt69.com/wp-content/uploads/2008/09/little-boy-who-didnt-buy-an-eddie-bauer-umbrella-he-got-caught-in-the-rain.gif

situational phenomenon “Being wet” situational phenomenon “have outdoor fun” goal negatively affect cause phenomenon negatively affects someone’s goals “Storm” causal phenomenon

How to deal with stakeholder problems in software related applications?

London Ambulance Services (LAS) 1994 manual dispatch debacle http://www.publicrecordsguy.com/wp-content/uploads/jayci-yaeger.jpg http://upload.wikimedia.org/wikipedia/commons/thumb/b/bc/London_Ambulance_at_Abbey_Road.jpg/800px-London_Ambulance_at_Abbey_Road.jpg http://www.geograph.org.uk/photos/67/30/673019_1ca5dedb.jpg http://www.lancashire.police.uk/uploads/pics/hatecrime3.jpg

“Ineffective manual dispatch” situation Nasima’s “safety” goal negatively affect a sub-problem of cause “Ineffective comm. in the call center” situation “Physical movement of incident forms” operation Source:http://pro.corbis.com/images/42-15211039.jpg?size=67&uid={e94b3c3f-0338-426a-8bb8-a1289c55c307} http://www.raf-upper-heyford.org/Vehicle_Ops_Dispatch_office.jpg http://www.dr-dude.com/images/PaperStack.jpg http://www.royblakeley.name/roy_james_blakeley/lyndon_johnson_situation_room19680216.jpg http://www.keepnitsimple.org/images/purestock_1574r-01116.medium.jpg

LAS was developing a CAD system in early 90’s solves? How to ensure system solves stakeholder problem? http://upload.wikimedia.org/wikipedia/commons/thumb/b/bc/London_Ambulance_at_Abbey_Road.jpg/800px-London_Ambulance_at_Abbey_Road.jpg http://www.mobilecomms-technology.com/projects/astrid/images/new1.jpg http://www.ukemergency.co.uk/ambulance/dsc09044.jpg http://upload.wikimedia.org/wikipedia/commons/thumb/4/44/London_Ambulance_on_Hamilton_Terrace_.jpg/250px-London_Ambulance_on_Hamilton_Terrace_.jpg

Requirements and specifications = software problem domains specifications requirements phenomena Software problem = what to be built by developers

How to make sure solves? software problem solves stakeholder problem?

“A problem unstated is a problem unsolved” -- Douglas Ross, 1977

Concepts to represent soft-problem softgoal Undesirable Situation “Ineffective manual dispatch” situation Nasima’s “safety” goal soft-problem negatively affect softgoal Undesirable Situation Sub-problem of cause sub-problem Undesirable Mechanism “Ineffective comm. in the call center” situation “Physical movement of incident forms” operation

Type[Topic] stakeholder problem = Phenomenon…negatively affects someone’s goals Ineffective manual dispatch breaks patient’s safety Type[Topic]

stakeholder problem = phenomenon…hurts someone’s goals Ineffective manual dispatch breaks patient’s safety

stakeholder problem = phenomenon…affects someone’s goals Ineffective manual dispatch affects patient’s safety

Problem Interdependency Graph Root-cause analysis Problem Interdependency Graph (PIG)

Solving stakeholder problems Recover “Ineffective manual dispatch” situation Nasima’s “safety” goal negatively affect Detect Sub-problem of Prevent cause “Ineffective comm. in the call center” situation “Physical movement of incident forms” operation Contain/quarantine

Solving stakeholder problem Integrated Problem Interdependency Graph (PIG) and Softgoal Interdependency Graph (SIG)

Stakeholder problem sufficiently addressed? OR AND AND OR v (OR) ^ (AND)

How to make sure solves? software problem solves stakeholder problem?

Extended problem diagram Integrated PIG - SIG

Benefits of integrated problem- and goal-oriented analysis Ineffectiveness[ManualDispatch] problem vs. 1992 CAD solution

Limitations behavioral solutions not traceable to domain and phenomena non- behavioral solutions not traceable

Observations Syntactic Semantic Problem ≠ negated goal Soft-problem Softgoal Solution ≠ negated problem

Conclusion Contributions Future Work stakeholder problems representation Soft-problem (Undesirable Situation, Undesirable Mechanism) Integrated root-cause and solution analysis PIG - SIG Traceability: agents, goals, stakeholder problems, s/w problems Extended problem diagram Future Work Detailed traceability solutions and domains/phenomena Integration with negative models e.g. anti-goal and abuse frames

no problem PIG – Problem Interdependency Graph Thank you

Benefits of using goal-oriented reasoning Recover affect Crew’s “safe return” goal “Loss of power and oxygen” situation Detect caused by caused by A number of ways to address stakeholder problems: We could try to prevent the root causes, so the undesirable situation cannot be realized. Or we could detect the undesirable situations, then recover from it like what Apollo 13 did successfully although in a little too exciting fashion. But how do we deal with stakeholder problems in software related applications? Contain/quarantine Prevent the cause “explosion of fuel cells” phenomenon

Fishbone Diagram http://www.diegm.uniud.it/create/Handbook/techniques/List/Immagini/FishboneDiagram.gif

Fault Tree http://www.qualitytrainingportal.com/resources/problem_solving/images/fault_tree.gif

The i* Framework Lin Liu, Eric Yu, and John Mylopoulos, “Security and Privacy Requirements Analysis within a Social Setting“, RE’03

Anti-goal Axel van Lamsweerde, “Elaborating Security Requirements by Construction of Intentional Anti-Models”, ICSE’04

Misuse Cases Guttorm Sindre and Andreas L. Opdahl, “Eliciting security requirements with misuse cases”, RE Journal, 2005

Abuse Frames L.Lin, et. al, “Analysing Security Threats and Vulnerabilities Using Abuse Frames”, Technical Report, October 2003

An integration of goals and problem frames Steven J. Bleistein, Karl Cox, and June Verner, “Validating strategic alignment of organizational IT requirements using goal modeling and problem diagrams”, Journal of Systems and Software, 2005