23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that the interview guide is accurate. Moreover, to reduce this threat we have used a<br />

number of information sources and data collection techniques.<br />

– Internal Validity:Internal validity is an inductive estimate of the degree to which<br />

conclusions about causal relationships can be made (e.g. cause and effect), based<br />

on the measures used, the research setting, and the whole research design. A threat<br />

to internal validity in our case study was related to communication issues with the<br />

ATM experts. First of all there was a communication gap between the requirements<br />

analysts and the ATM domain experts: certain concepts have a different meaning<br />

for them. A second issue was related to language barriers: the ATM expert had to<br />

provide feedbacks not in their mother tongue language. For these reasons, some<br />

useful feedbacks might not have been given to the requirement analysts.<br />

– External Validity:External validity concerns the extent to which the (internally<br />

valid) results of a study can be held to be true for other cases, for example to different<br />

people, places or times. Since we have conducted a qualitative user study,<br />

our objective was not to do any generalization of the results to other contexts, but<br />

understand the change management process adopted when a new tool is introduced<br />

in complex and critical systems such as air traffic management systems and to investigate<br />

the applicability of the approach to model and reason on evolution. To<br />

generalized the findings of this user study we are planning to consider other complex<br />

systems in different application domains.<br />

– Conclusion Validity:This threat is concerned with the degree to which conclusions<br />

reached are justified. Our conclusions are based on the remarks and comments<br />

given by the ATM experts. The video recorded discussions between the ATM<br />

experts and requirement analysts have been analyzed to provide evidence in accordance<br />

to the real context of the ATM domain. To have an effective discussion with<br />

the ATM experts, the requirement analysts also had a prior meeting with them to<br />

confirm the protocol for the discussion.<br />

5 Analysis of the Results<br />

This section summarizes the feedbacks that were collected during the two workshops<br />

WS1 and WS2 and analysis of the feedbacks by the requirement analysts.<br />

5.1 Feedbacks During the Experiments Execution<br />

On the applicability to the ATM domain of the approach to model and reason on requirements<br />

evolution the participants P5 and P12 have pointed out that the approach could<br />

be very useful during the initial phase of the change management process adopted by<br />

ANSPs. The approach can help managers, technicians and controllers to understand the<br />

implications and impacts of a proposed change. P5 and P12 suggested that Evolution<br />

Elicitation and Probability Estimation might be useful to identify the alternative operational<br />

requirements associated with a proposed change. The Reasoning phase instead<br />

can be used to support the decision makers in identifying the best solution at operational<br />

level to be implemented.<br />

A challenge in applying the approach to model and reason on requirements evolution<br />

was reported by participants P6 and P9. They argued that due to the complexity of<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!