D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
for the defined success criteria. On the various transcripts, the code percentage coverage<br />
was performed to display the percentage of occurrence of a code in comparison with<br />
other codes. The percentage coverage diagram reported in Figure 3 shows that the conversations<br />
related to operational procedures and change management procedures have<br />
maximum coverage on the transcription.<br />
Table 4. Description of codes used.<br />
Code<br />
Description<br />
AMAN The specific discussion points related to AMAN which covers the<br />
factors considered as constraints for AMAN, the expectations of the<br />
experts from AMAN and the procedures associated with AMAN.<br />
Change Managemencludes<br />
the steps of Brain Storming, Risk Assessment, Simulation,<br />
The discussions on the change management procedure which in-<br />
Human Verification, Type of Change, Evolution, Change Management<br />
Procedure and Constraints for change management.<br />
Functionality The specific functionality mentioned in accordance to the role of<br />
either the Controller or the Coordinator.<br />
Goals The discussions related to goal refinement and goal sharing concepts<br />
in i*-based requirements modeling language.<br />
Operational The operational procedures followed by Air Traffic Controllers in<br />
Procedure the real situation.<br />
Organizational The composition of organizational roles in ENAV.<br />
Role<br />
Feedback on The feedback obtained on the graphical representation of evolution<br />
Graphical Representation<br />
presented by the requirement engineers.<br />
Behavior The behavior observed apart from the discussion points as silence,<br />
indirect answer and not interested.<br />
4.4 Threats to Validity<br />
We consider threats to construct, internal, external and conclusion validity [17] as relevant<br />
for our user study.<br />
– Construct Validity:Threats to construct validity are related to decide to which extent<br />
what was to be measured was actually measured.The main construct validity<br />
threat in this study regards the design of the measurement instrument: are the questions<br />
formulated so that the interviews answer our research questions? Our main<br />
measurement instrument is the interview guide which includes the questions to be<br />
asked. Three requirement analysts have constructed it by analyzing the research<br />
questions and creating sub-questions. The list of questions have been reviewed by<br />
the consultants to check for completeness and consistency; therefore we believe<br />
9