Requirements engineering for business information systems : a dimension-oriented approach

Part of : WSEAS transactions on business and economics ; Vol.10, No.3, 2013, pages 229-242

Issue:
Pages:
229-242
Author:
Abstract:
In previous work, we developed a software engineering theory, called dimension-orientation, which is capable of explaining and predicting the characteristics of the requirements space in the domain of business information systems. The dimension-oriented theory serves as a solid foundation for the design of more effective software engineering processes in the domain of business information systems. Accordingly, In this paper, we develop a theory-backed approach for the engineering of requirements in business information systems, which is based on the dimension-oriented theory. We further provide a mathematical formalism for the theory and evaluate its theoretical and methodological aspects within the two standard frameworks of design science research and software engineering theory goodness criteria.
Subject:
Subject (LC):
Keywords:
requirements engineering, software engineering theory, design science, dimension orientation, business information system, domain engineering, theory goodness criteria, requirements taxonomy
Notes:
Περιέχει πίνακες και βιβλιογραφία
References (1):
  1. [1] R.J. Boland, Design in the Punctuation of managementscience, in Managing as Design: Creatinga Vocabulary for Management Educationand Research, R. Boland (ed.), Frontiers ofManagementWorkshop,WeatherheadSchoolofManagement,June 2002.[2] X. Feng, and D.L. Parnas, and T.H. Tse,T. O’Callaghan, A Comparison of TabularExpression-Based Testing Strategies, in IEEETransactions on Software Engineering, IEEEComputer Society, Vol. 37, No. 5, September/October2011,pp. 616-634.[3] A. Ghazarian, Characterization of FunctionalSoftware Requirements Space: The Law of RequirementsTaxonomic Growth, in Proceedingsof 20th IEEE International Requirements EngineeringConference (RE’2012), Chicago, USA,September2012.[4] A. Ghazarian, Coordinated Software Development:A Framework for Reasoning about TraceLinks in Software Systems, Proc. of the IEEE13th Int’l Conf. on Intelligent Engineering Systems(INES2009), April 2009, pp. 39–44.[5] A. Ghazarian, Effects of Source Code Regularityon Software Maintainability: An EmpiricalStudy, Proc. of the IASTED Int’l Conf. on SoftwareEngineeringandApplications(SEA2010),Marinadel Rey,USA, November2010.[6] A. Ghazarian, A Probabilistic MathematicalModel to Measure Software Regularity, Proceedingsofthe15thIASTEDInternationalConferenceon Software Engineering and Applications(SEA2011),Dallas,December2011,USA.[7] A. Ghazarian, A Domain-Specific ArchitecturalFoundation for Engineering of Numerical SoftwareSystems,WSEASTransactionsonSystems,No.7, Vol.10, July 2011, pp. 193–208.[8] A. Ghazarian, Traceability Patterns: An Approachto Requirement-Component TraceabilityinAgileSoftwareDevelopment,Proc.ofthe8thWSEASInt’lConf.onAppliedComputerScience(ACS’08),Venice,2008, pp. 236–241.[9] A. Ghazarian, A Formal Scheme for SystematicTranslationofSoftwareRequirementstoSourceCode, Proceedings of WSEAS Applied ComputingConference (ACC 2011), Angers, France,November2011, pp. 44–49.[10] A. Ghazarian, A Matrix-Less Model for TracingSoftwareRequirementstoSourceCode,Int’lJournal of Computers, NAUN, ISSN: 19984308,Issue3, Volume2, 2008, pp. 301–309.[11] A.Ghazarian,M.Sagheb-Tehrani,andA.Ghazarian,A Software Requirements SpecificationFramework for Objective Pattern Recognition:A Set-Theoretic Classification Approach, Proc.of the 16th IEEE Intl Conf. on Engineeringof Complex Computer Systems (CECCS 2011),USA,2011, pp. 211–220.[12] A.Ghazarian,R.Chughtai,Dimension-OrientedInspection of Use Case-Based RequirementsSpecifications, Proceedings of the EuropeanConference of Computer Science (ECCS12),WSEAS/NAUN,Paris,France, December 2012.[13] A. Ghazarian, Dimension-Driven Software DevelopmentThrough Traceability Patterns, Proceedingsof the European Conference of ComputerScience(ECCS12),WSEAS/NAUN,Paris,France,December 2012.[14] A.R. Hevner, and S.T. March, and J. Park, andS. Ram, Design Science in Information SystemsResearch, MIS Quarterly, Vol. 28, No. 1, March2004,pp. 75-105.[15] S. T. March, and G. Smith, Design and NaturalScience Research on Information Technology,Decision Support Systems (15:4), December1995,pp. 251-266.[16] F. Neri, Learning and Predicting Financial TimeSeriesbyCombiningEvolutionaryComputationand Agent Simulation, Applications of EvolutionaryComputation, EvoApplications, LNCS6625,pp.111–119,Springer,Heidelberg(2011).[17] J. Nunamaker, and M. Chen, and T. D. M. Purdin,Systems Development in Information SystemsResearch, Journal of Management InformationSystems(7:3),inter 1991a, pp. 89-106.[18] K. Popper, The Logic of Scientific Discovery,Hutchison,London, 1959.[19] R. Pulavarthi, and A. Ghazarian, An InteractiveNetwork of Events with Geographic Perspective,WSEAS Transactions on Information Scienceand Applications, No. 12, Vol. 9, pp. 369378,WorldScientificandEngineeringAcademyandSociety,December 2012.[20] D. A. Schon, The Reflective Practitioner: HowProfessionals Think in Action, Basic Books,NewYork,1983[21] L. Shuang, W. Zhixin, W. Guoqiang, A FeedbackLinearization Based Control Strategy forVSC-HVDC Transmission Converters, WSEASTransactions on Systems, Issue 2, Volume 10,pp.49-58, February 2011.[22] H. A. Simon, The Sciences of the Artificial, 3rdEdition,MIT Press, Cambridge, MA, 1996.[23] D.I.K. Sjoberg, T. Dyba, B.C.D. Anda, and J.E.Hannay,Building Theories in SOftware Engineering,GuidetoAdvancedEmpiricalSoftwareengineering,F.Shulletal.(eds.),Springer,2008,pp.312-336.[24] T-S Tsay, Intelligent Guidance and ControlLaws for an Autonomous Underwater Vehicle,WSEAS Transactions on Systems, Issue 5, Volume9,pp. 463-475, May 2010.[25] S-G Yoo, K-Y Park, J. Kim,Software ArchitectureofJTAGSecuritySystem,WSEASTransactionson Systems, Issue 8, Volume 11, pp. 398408,August2012.[26] R. Weber, Editor’s Comments:Still DesperatelySeeking the IT Artifact, MIS Quarterly (27:2),June2003, pp. iii-xi.