23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

for the defined success criteria. On the various transcripts, the code percentage coverage<br />

was performed to display the percentage of occurrence of a code in comparison with<br />

other codes. The percentage coverage diagram reported in Figure 3 shows that the conversations<br />

related to operational procedures and change management procedures have<br />

maximum coverage on the transcription.<br />

Table 4. Description of codes used.<br />

Code<br />

Description<br />

AMAN The specific discussion points related to AMAN which covers the<br />

factors considered as constraints for AMAN, the expectations of the<br />

experts from AMAN and the procedures associated with AMAN.<br />

Change Managemencludes<br />

the steps of Brain Storming, Risk Assessment, Simulation,<br />

The discussions on the change management procedure which in-<br />

Human Verification, Type of Change, Evolution, Change Management<br />

Procedure and Constraints for change management.<br />

Functionality The specific functionality mentioned in accordance to the role of<br />

either the Controller or the Coordinator.<br />

Goals The discussions related to goal refinement and goal sharing concepts<br />

in i*-based requirements modeling language.<br />

Operational The operational procedures followed by Air Traffic Controllers in<br />

Procedure the real situation.<br />

Organizational The composition of organizational roles in ENAV.<br />

Role<br />

Feedback on The feedback obtained on the graphical representation of evolution<br />

Graphical Representation<br />

presented by the requirement engineers.<br />

Behavior The behavior observed apart from the discussion points as silence,<br />

indirect answer and not interested.<br />

4.4 Threats to Validity<br />

We consider threats to construct, internal, external and conclusion validity [17] as relevant<br />

for our user study.<br />

– Construct Validity:Threats to construct validity are related to decide to which extent<br />

what was to be measured was actually measured.The main construct validity<br />

threat in this study regards the design of the measurement instrument: are the questions<br />

formulated so that the interviews answer our research questions? Our main<br />

measurement instrument is the interview guide which includes the questions to be<br />

asked. Three requirement analysts have constructed it by analyzing the research<br />

questions and creating sub-questions. The list of questions have been reviewed by<br />

the consultants to check for completeness and consistency; therefore we believe<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!