Correlations between invisibility and usability in ubicomp and IoT applications: partial results

Quality characteristics present several difficulties to be addressed. Negative correlations are one of these issues developers must deal during software development. These correlations mean that supporting a characteristic can negatively impact another one. A well-known solution to help developers identifying such correlations is through non-functional requirements (NFRs) catalogs. Although there are several correlations catalogs proposed in the literature, they do not take into account new characteristics that have arisen with the Ubiquitous Computing (UbiComp) and the Internet of Things (IoT) environment, such as Invisibility. In a previous study, a process for defining a catalog of correlations for quality characteristics was proposed. In this paper, we present partial results of the execution of this process for Invisibility and Usability. We also discuss some challenges regarding catalogs for quality characteristics.

[1]  Káthia Marçal de Oliveira,et al.  Towards a catalog of conflicts for HCI quality characteristics in UbiComp and IoT applications: Process and first results , 2018, 2018 12th International Conference on Research Challenges in Information Science (RCIS).

[2]  Káthia Marçal de Oliveira,et al.  AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications , 2018, J. Syst. Softw..

[3]  Juliet M. Corbin,et al.  Basics of Qualitative Research (3rd ed.): Techniques and Procedures for Developing Grounded Theory , 2008 .

[4]  Julio Cesar Sampaio do Prado Leite,et al.  On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.

[5]  Ankit Agrawal,et al.  All your Google and Facebook logins are belong to us: A case for single sign-off , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[6]  Eric Yu,et al.  Non-Functional Requirements Elicitation , 2019, International Journal of Recent Technology and Engineering.

[7]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[8]  Gian Luigi Ferrari,et al.  Formalising Security in Ubiquitous and Cloud Scenarios , 2012, CISIM.

[9]  Luiz Marcio Cysneiros,et al.  Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements , 2007, WER.

[10]  Káthia Marçal de Oliveira,et al.  What Changes from Ubiquitous Computing to Internet of Things in Interaction Evaluation? , 2017, HCI.

[11]  Jean Scholtz,et al.  Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..

[12]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[13]  Tuomas Aura,et al.  Logout in single sign-on systems: Problems and solutions , 2014, J. Inf. Secur. Appl..

[14]  Giancarlo Guizzardi,et al.  A Method for Eliciting Goals for Business Process Models based on Non-Functional Requirements Catalogues , 2011, Int. J. Inf. Syst. Model. Des..

[15]  Jean-Philippe Vasseur,et al.  Interconnecting Smart Objects with IP: The Next Internet , 2010 .

[16]  Kirstie Hawkey,et al.  What makes users refuse web single sign-on?: an empirical investigation of OpenID , 2011, SOUPS.

[17]  Alexander Egyed,et al.  Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help , 2004, IEEE Software.

[18]  Fanny Andalia,et al.  Implementation of Analytical Hierarchy Process On Airplane Ticket Booking Application Selection With Software Quality Requirements and Evaluation ISO / IEC 25010 : 2011 , 2018 .

[19]  Káthia Marçal de Oliveira,et al.  Quality characteristics and measures for human–computer interaction evaluation in ubiquitous systems , 2017, Software Quality Journal.

[20]  Rainara Maia Carvalho Dealing with Conflicts Between Non-functional Requirements of UbiComp and IoT Applications , 2017, 2017 IEEE 25th International Requirements Engineering Conference (RE).

[21]  Rossana M. de Castro Andrade,et al.  Requirements and challenges for building service-oriented pervasive middleware , 2009, ICPS '09.

[22]  Serge Egelman,et al.  My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.

[23]  Maurício Serrano,et al.  Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue , 2013, ER@BR.

[24]  Didar Zowghi,et al.  Constructing a Catalogue of Conflicts among Non-functional Requirements , 2010, ENASE.

[25]  Christophe Kolski,et al.  Catalog of Invisibility Requirements for UbiComp and IoT Applications , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).