Software development companies experience the road mapping and requirements ranking process to be complex as product management (PdM) strives in getting timely and accurate feedback from the customers. Often, companie...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Software development companies experience the road mapping and requirements ranking process to be complex as product management (PdM) strives in getting timely and accurate feedback from the customers. Often, companies have insufficient knowledge about how their products are being used, what features the customers appreciate and which ones will generate revenue. To address this problem, this research aims at helping the companies in closing the 'open' feedback loop that exists between PdM and customers. Moreover, the research strives at exploring techniques that can be used to involve customers in continuous validation of software functionality in order to provide PdM with the evidence needed for accurate R&D investments.
Startups are creating innovative new products and services while seeking fast growth with little resources. The capability to produce software products with good user experience (UX) can help the startup to gain posit...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Startups are creating innovative new products and services while seeking fast growth with little resources. The capability to produce software products with good user experience (UX) can help the startup to gain positive attention and revenue. Practices and needs for UX design in startups are not well understood. Research can provide insight on how to design UX with little resources as well as to gaps about what kind of better practices should be developed. In this paper we describe the results of an interview study with eight startups operating in Finland. Current UX practices, challenges and needs for the future were investigated. The results show that personal networks have a significant role in helping startups gain professional UX advice as well as user feedback when designing for UX. When scaling up startups expect usage data and analytics to guide them towards better UX design.
Uncertainty is an inevitable fact of software development that can determine success or failure of entire projects. Although often associated with risk or threat, uncertainty bears much overlooked qualities regarding ...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Uncertainty is an inevitable fact of software development that can determine success or failure of entire projects. Although often associated with risk or threat, uncertainty bears much overlooked qualities regarding market opportunities. Adopting a conceptualization of uncertainty that includes both threat and opportunity, we investigate different possibilities to manage the uncertainties preceding the creation of novel ideas and innovation. In this qualitative study, we empirically explore the concept of uncertainty beyond the focus on requirement uncertainty that prevails in the literature and explicitly emphasize its multidimensionality. We argue that the failure to distinguish between different dimensions of uncertainty can lead to their inadequate management at high cost. Our results show how teams exploit practices to manage different uncertainties in order to mitigate threats while remaining open to opportunities. We discuss the implications of our findings for product development teams as well as for the design of supportive organizational structures.
In recent years, the business process modelling is matured towards expressing enterprise's organisational behaviour. This shows potential to perform early security analysis to capture enterprise security needs. Tr...
详细信息
ISBN:
(纸本)9783319192703;9783319192697
In recent years, the business process modelling is matured towards expressing enterprise's organisational behaviour. This shows potential to perform early security analysis to capture enterprise security needs. Traditionally security in business processes is addressed either by representing security concepts graphically or by enforcing security constraints. But such security approaches miss the elicitation of security needs and their translation to security requirements for system-to-be. This paper proposes a method to elicit security objectives from business process models and translate them to security requirements. As a result, the method contributes to an alignment of business processes with the technology that supports the execution of business processes. The approach applicability is illustrated in few examples and its validity is reported in the comparative study.
This position paper defends the idea that the development of the Web to its full potential requires addressing the challenge of massive multidisciplinarity.
ISBN:
(纸本)9783319270302;9783319270296
This position paper defends the idea that the development of the Web to its full potential requires addressing the challenge of massive multidisciplinarity.
The increase in large biomedical data objects stored in long term archives that continuously need to be processed and analyzed requires new storage paradigms. We propose expanding the storage system from only storing ...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
The increase in large biomedical data objects stored in long term archives that continuously need to be processed and analyzed requires new storage paradigms. We propose expanding the storage system from only storing biomedical data to directly producing value from the data by executing computational modules - storlets - close to where the data is stored. This paper describes the Storlet Engine, an engine to support computations in secure sandboxes within the storage system. We describe its architecture and security model as well as the programming model for storlets. We experimented with several data sets and storlets including de-identification storlet to de-identify sensitive medical records, image transformation storlet to transform images to sustainable formats, and various medical imaging analytics storlets to study pathology images. We also provide a performance study of the Storlet Engine prototype for OpenStack Swift object storage.
Tagging mechanisms allow users to label content, which mainly resides in Internet resources or Web 2.0 social tools, with descriptive terms (without relying on a controlled vocabulary) for navigation, filtering, searc...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Tagging mechanisms allow users to label content, which mainly resides in Internet resources or Web 2.0 social tools, with descriptive terms (without relying on a controlled vocabulary) for navigation, filtering, search and retrieval. The current paper presents two tagging models. The first combines structured, automatically generated metadata, with manually inserted unstructured tagging labels, to facilitate annotation of content that enhances knowledge transfer and usage;and embeds tagging capabilities within a business process model for activation during execution. The second describes a tagged knowledge cycle that allows process performers to create and tag their knowledge and experiences as the process is carried out, and have it transferred for use by an associated stakeholder. The benefits of the models are discussed in the context of service processes, using an illustrative scenario of an inbound telesales process workflow with embedded Web 2.0. social tools.
The community of voting system experts is largely divided on the issue of the best voting rule. Some - perhaps a majority - of the community stresses the performance related to Condorcet's intuition, while others ...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
The community of voting system experts is largely divided on the issue of the best voting rule. Some - perhaps a majority - of the community stresses the performance related to Condorcet's intuition, while others take a more "positional" view of the voting rules. This paper approaches the choice of the rule from the viewpoint of the individuals that will subsequently be applying the chosen rule in solving opinion aggregation problems. Our first starting point is that each individual has a preference ranking over the criteria. This starting point reduces the rule selection into the classic social choice problem. Using the Borda count one is able to construct a vector of weights that reflects the importance that the individuals assign to various criteria. Using the analytic results on the compatibility of various rules and criteria we can then associate each rule with a value that reflects the aggregated opinion of the importance criteria. Hence, the choice of the rules gets its justification from the views that the individuals have on the significance of the criteria. Our second starting point is based on weights that individuals associate with the criteria. The collective weights are then determined as in range voting. Again a justification of the chosen rules can be expressed in terms of the importance that individual assign to criteria.
Background - Startup companies are becoming important suppliers of innovative and software intensive products. The failure rate among startups is high due to lack of resources, immaturity, multiple influences and dyna...
详细信息
ISBN:
(纸本)9783319195933;9783319195926
Background - Startup companies are becoming important suppliers of innovative and software intensive products. The failure rate among startups is high due to lack of resources, immaturity, multiple influences and dynamic technologies. However, software product engineering is the core activity in startups, therefore inadequacies in applied engineering practices might be a significant contributing factor for high failure rates. Aim - This study identifies and categorizes software engineering knowledge areas utilized in startups to map out the state-of-art, identifying gaps for further research. Method - We perform a systematic literature mapping study, applying snowball sampling to identify relevant primary studies. Results - We have identified 54 practices from 14 studies. Although 11 of 15 main knowledge areas from SWEBOK are covered, a large part of categories is not. Conclusions - Existing research does not provide reliable support for software engineering in any phase of a startup life cycle. Transfer of results to other startups is difficult due to low rigor in current studies.
Idea evaluation is necessary in most modern organizations to identify the level of novelty and usefulness of new ideas. However, current idea evaluation research hinders creativity by primarily supporting convergent t...
详细信息
ISBN:
(纸本)9783319217833;9783319217826
Idea evaluation is necessary in most modern organizations to identify the level of novelty and usefulness of new ideas. However, current idea evaluation research hinders creativity by primarily supporting convergent thinking (narrowing down ideas to a few tangible solutions), while divergent thinking (the development of wildly creative and novel thoughts patterns) is discounted. In this paper, this current view of idea evaluation is challenged through the development of a prototype that supports dynamic idea evaluation. The prototype uses knowledge created during evaluative processes to facilitate divergent thinking in a Group Creativity Support System (GCSS) designed from state-of-the-art research. The prototype is interpretively explored through a field experiment in a Danish IS research department. Consequently, the prototype demonstrates the ability to including divergent thinking in GCSS driven idea evaluation.
暂无评论