Model Transformation Patterns for Introducing Suitable Information Systems

When information systems are introduced in a social setting such as a business, the systems will give bad and good impacts on stakeholders in the setting. Requirements analysts have to predict such impacts in advance because stakeholders cannot decide whether the systems are really suitable for them without such prediction. In this paper, we propose a method based on model transformation patterns for introducing suitable information systems. We use metrics of a model to predict whether a system introduction is suitable for a social setting. Through a case study, we show our method can avoid an introduction of a system, which was actually bad for some stakeholders. In the case study, we use a strategic dependency model in i* to specify the model of systems and stakeholders, and attributed graph grammar for model transformation. We focus on the responsibility and the satisfaction of stakeholders as the criteria for suitability about systems introduction in this case study.

[1]  Geert Poels,et al.  Practical Challenges for Methods Transforming i* Goal Models into Business Process Models , 2009, 2009 17th IEEE International Requirements Engineering Conference.

[2]  R. Dorf,et al.  The Balanced Scorecard: Translating Strategy Into Action , 1997, Proceedings of the IEEE.

[3]  Akio Koide,et al.  Business Process Transformation Wizard: a Bridge between Business Analysts and Business Process Transformation Technology , 2007, IEEE International Conference on Services Computing (SCC 2007).

[4]  Alistair G. Sutcliffe Trust: From Cognition to Conceptual Models and Design , 2006, CAiSE.

[5]  Marion Murzek,et al.  Structural Patterns for the Transformation of Business Process Models , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06).

[6]  Kazutaka Matsuda,et al.  Bidirectionalizing graph transformations , 2010, ICFP '10.

[7]  Arda Goknil,et al.  Survey of Traceability Approaches in Model-Driven Engineering , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).

[8]  John Mylopoulos,et al.  Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).

[9]  Gabriele Taentzer,et al.  AGG: A Graph Transformation Environment for Modeling and Validation of Software , 2003, AGTIVE.

[10]  Eric S. K. Yu,et al.  Towards modelling and reasoning support for early-phase requirements engineering , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.

[11]  Haruhiko Kaiya,et al.  Metrics for a Model Driven Development Context , 2008, ENASE.

[12]  Shinpei Hayashi,et al.  Facilitating Business Improvement by Information Systems using Model Transformation and Metrics , 2012, CAiSE Forum.

[13]  劉清明,et al.  [評Robin cooper etc.,Implementing Activity-based Cost Management: Moving from Analysis to Action]作業制成本管理之實施(上) , 1993 .

[14]  Xavier Franch,et al.  Towards a Catalogue of Patterns for defining Metrics over i* Models , 2008, JISBD.

[15]  Hajo A. Reijers,et al.  On the Formal Generation of Process Redesigns , 2008, Business Process Management Workshops.

[16]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..