The WOSP Model: Balanced Information System Design and Evaluation

IS researchers may wonder why computing advances often confound expectations. The leisure society, the paperless office, and programmer decline are just a few predictions that didn’t happen. If current expectations are to be any more accurate, we must learn from experience. As we create e-systems to rival ourselves, and networks to match society, the problem may be a limited view of system performance. The Technology Acceptance Model (TAM) sees performance as functionality plus usability. The Web Of System Performance (WOSP) model presented in this paper extends TAM to include other requirements common in performance research literature. WOSP is a theoretical framework for the balanced design and evaluation of advanced information systems, as now being created on the Internet and elsewhere. It analyses performance via four fundamental system elements: boundary, internal structure, effectors and receptors. Each can be designed for opportunity or risk, giving eight performance goals, whose design tension comprises a “web” of performance. It explains why advances sometimes “bite back”, and need creative system requirements integration. The theory applies to hardware, software, cognitive, or social system levels, but as each level is a different “world”, it cannot be instantiated across levels. The WOSP model should interest those designing or evaluating advanced software systems.

[1]  Brian Whitworth,et al.  Measuring disagreement in groups facing limited-choice problems , 1999, DATB.

[2]  Steven L. Alter Which Life Cycle - Work System, Information System, or Software? , 2001, Commun. Assoc. Inf. Syst..

[3]  Chris W. Clegg,et al.  Software development: Some critical views , 1997, Behav. Inf. Technol..

[4]  J. Casti Would-Be Worlds: How Simulation Is Changing the Frontiers of Science , 1996 .

[5]  Brian A. Nixon,et al.  Managing performance requirements for information systems , 1998, WOSP '98.

[6]  Edward Tenner,et al.  Why Things Bite Back , 1997 .

[7]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[8]  Julio Cesar Sampaio do Prado Leite,et al.  Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.

[9]  Nils J. Nilsson,et al.  Artificial Intelligence , 1974, IFIP Congress.

[10]  Marie A. Wright,et al.  The erosion of privacy , 1997, CSOC.

[11]  David J. DeWitt,et al.  Benchmarking Database Systems A Systematic Approach , 1983, VLDB.

[12]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[13]  K. Popper,et al.  The Open Society and Its Enemies , 1946 .

[14]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[15]  Sara Kiesler,et al.  Social psychological aspects of computer-mediated communication , 1984 .

[16]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[17]  Omar El Sawy,et al.  Toward the Design of Robust Information Systems , 1989, J. Manag. Inf. Syst..

[18]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[19]  Heather A. Smith,et al.  New Developments in Practice III: Riding the Wave: Extracting Value from Mobile Technology , 2002, Commun. Assoc. Inf. Syst..

[20]  Steven L. Alter A General, Yet Useful Theory of Information Systems , 1999, Commun. Assoc. Inf. Syst..

[21]  John Mylopoulos,et al.  Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.

[22]  Gregory Tassey,et al.  Prepared for what , 2007 .

[23]  Richard Hackworth,et al.  OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.

[24]  David A. Duce,et al.  Systems, interactions, and macrotheory , 2000, TCHI.

[25]  Juliet B. Schor,et al.  The Overworked American: The Unexpected Decline Of Leisure , 1991 .

[26]  R. McQueen,et al.  A Cognitive Three-Process Model of Computer-Mediated Group Interaction , 2000 .

[27]  George R. Ribeiro-Justo,et al.  A framework for building non-functional software architectures , 2001, SAC.

[28]  E. C. Pielou,et al.  An introduction to mathematical ecology , 1970 .

[29]  Paul Dickson The official rules and explanations , 1980 .

[30]  David A. Fisher,et al.  Survivability—a new technical and business perspective on security , 1999, NSPW '99.

[31]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[32]  Walid G. Aref,et al.  Security models for web-based applications , 2001, CACM.

[33]  William E. McCarthy,et al.  Agility---: the key to survival of the fittest in the software market , 2003, CACM.

[34]  Willis H. Ware,et al.  Information systems security and privacy , 1984, CACM.

[35]  David Brin,et al.  The Transparent Society , 1998 .

[36]  Nathaniel S. Borenstein,et al.  Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System , 1991, Int. J. Man Mach. Stud..

[37]  K. L. Wheatley,et al.  The pitfalls of portability . . or . . why more is not better , 1991, Proceedings of the Twenty-Fourth Annual Hawaii International Conference on System Sciences.

[38]  Deborah Hix,et al.  Human-computer interface development tools: a methodology for their evaluation , 1991, CACM.

[39]  Sirkka L. Jarvenpaa,et al.  Information technology alignment or “fit” in highly turbulent environments: the concept of flexibility , 1994, SIGCPR '94.

[40]  K. Boulding General Systems Theory---The Skeleton of Science , 1956 .

[41]  M. Lea,et al.  Rationalist assumptions in cross-media comparisons of computer-mediated communication. , 1991 .

[42]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.

[43]  Karl R. Popper,et al.  The Open Society and Its Enemies , 1946 .

[44]  Nancy C. Goodwin,et al.  Functionality and usability , 1987, CACM.

[45]  William A. Wulf,et al.  A practical approach to security assessment , 1998, NSPW '97.

[46]  Mark S. Sanders,et al.  Human Factors in Engineering and Design , 1957 .

[47]  Ivo Düntsch,et al.  The IsoMetrics usability inventory: An operationalization of ISO 9241-10 supporting summative and formative evaluation of software systems , 1999, Behav. Inf. Technol..

[48]  Brian Whitworth,et al.  Generating Agreement in Computer-Mediated Groups , 2001 .

[49]  António Dias de Figueiredo,et al.  Programming for Serendipity , 2002 .

[50]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[51]  Mark Fischetti,et al.  Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .

[52]  Lauren Ruth Wiener Digital woes - why we should not depend on software , 1993 .

[53]  F. Darley,et al.  Brain Mechanisms Underlying Speech and Language , 1967 .

[54]  Alan R. Dennis,et al.  Rethinking media richness: towards a theory of media synchronicity , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[55]  H. Maturana The tree of knowledge , 1987 .

[56]  Tom Brier,et al.  Communications of the Association for Information Systems , 1999 .

[57]  João Araújo,et al.  Crosscutting quality attributes for requirements engineering , 2002, SEKE '02.

[58]  E. C. Pielou An introduction to mathematical ecology , 1970 .

[59]  R. Wright Nonzero: The Logic of Human Destiny , 1999 .

[60]  Abraham Bernstein,et al.  Software infrastructure and design challenges for ubiquitous computing applications , 2002, CACM.

[61]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[62]  M Esfeld,et al.  Holism and analytic philosophy , 1998 .

[63]  Tom Standage The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , 1998 .

[64]  Eugene H. Spafford,et al.  The Power of Standards , 1993 .

[65]  Herbert H. Blumberg,et al.  Small Groups and Social Interaction , 1983 .

[66]  C. West Churchman,et al.  The Systems Approach , 1979 .

[67]  Catherine A. Meadows Three paradigms in computer security , 1998, NSPW '97.

[68]  B. Alberts,et al.  Molecular Biology of the Cell, Third Edition , 1994 .

[69]  Brian Whitworth,et al.  Legitimate by design: towards trusted virtual community environments , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[70]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[71]  J. Davies,et al.  Molecular Biology of the Cell , 1983, Bristol Medico-Chirurgical Journal.

[72]  Ilze Zigurs,et al.  A test of task-technology fit theory for group support systems , 1999, DATB.

[73]  Lotfi A. Zadeh,et al.  General System Theory , 1962 .

[74]  Thomas Herrmann,et al.  Vagueness in models of socio-technical systems , 1999, Behav. Inf. Technol..

[75]  Bill McCarty,et al.  Java Distributed Objects , 1998 .

[76]  Susan M. Dray The importance of designing usable systems , 1995, INTR.

[77]  Peter G. Neumann,et al.  Risks in our information infrastructures , 2000, UBIQ.