Towards a catalog of conflicts for HCI quality characteristics in UbiComp and IoT applications: Process and first results

Conflicts between non-functional requirements (NFRs) can happen when a particular solution favors the first NFR but creates difficulty for the second one. Usually, in the literature, the conflict identification uses catalogs to indicate conflicting NFRs. The authors focus on NFRs that are generic to any system. However, applications from Ubiquitous Computing (UbiComp) and Internet of Things (IoT) introduce new kind of NFRs (e.g., Context-Awareness and Mobility). They are not included in these catalogs and can impact the traditional ones (e.g., Security and Usability). Therefore, there is a need to create a catalog that considers conflicts among quality characteristics for UbiComp and IoT applications. However, the literature lacks a process or guideline about how to create a catalog. This paper aims then to present a process and initial findings towards a catalog of conflicts between specific HCI quality characteristics in UbiComp and IoT applications and Usability.

[1]  Káthia Marçal de Oliveira,et al.  Evaluating an IoT Application Using Software Measures , 2017, HCI.

[2]  Káthia Marçal de Oliveira,et al.  Quality characteristics and measures for human–computer interaction evaluation in ubiquitous systems , 2017, Software Quality Journal.

[3]  Apostolos Ampatzoglou,et al.  Investigating quality trade-offs in open source Critical Embedded Systems , 2015, 2015 11th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA).

[4]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[5]  Jukka Riekki,et al.  Evaluating the Calmness of Ubiquitous Applications , 2004, PROFES.

[6]  Káthia Marçal de Oliveira,et al.  AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications , 2018, J. Syst. Softw..

[7]  Fabio Massacci,et al.  The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals , 2015, REFSQ.

[8]  Didar Zowghi,et al.  An ontological framework to manage the relative conflicts between security and usability requirements , 2010, 2010 Third International Workshop on Managing Requirements Knowledge.

[9]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[10]  Káthia Marçal de Oliveira,et al.  What Changes from Ubiquitous Computing to Internet of Things in Interaction Evaluation? , 2017, HCI.

[11]  Mark T True,et al.  Software Requirements , 2005 .

[12]  Dharma P. Agrawal,et al.  Choices for interaction with things on Internet and underlying issues , 2015, Ad Hoc Networks.

[13]  Alexander Egyed,et al.  Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help , 2004, IEEE Software.

[14]  Luiz Marcio Cysneiros,et al.  Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements , 2007, WER.

[15]  Mohd. Sadiq,et al.  A Taxonomy of Software’s Non-functional Requirements , 2016 .

[16]  Maurício Serrano,et al.  Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue , 2013, ER@BR.

[17]  Didar Zowghi,et al.  Constructing a Catalogue of Conflicts among Non-functional Requirements , 2010, ENASE.

[18]  Jiannong Cao,et al.  Application mobility in pervasive computing: A survey , 2013, Pervasive Mob. Comput..

[19]  George M. Giaglis,et al.  Delineating the Degree of 'Pervasiveness' in Pervasive Information Systems: An Assessment Framework and Design Implications , 2008, 2008 Panhellenic Conference on Informatics.

[20]  Giancarlo Guizzardi,et al.  A Method for Eliciting Goals for Business Process Models based on Non-Functional Requirements Catalogues , 2011, Int. J. Inf. Syst. Model. Des..

[21]  Jean Scholtz,et al.  Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..

[22]  Gian Luigi Ferrari,et al.  Formalising Security in Ubiquitous and Cloud Scenarios , 2012, CISIM.

[23]  Rossana M. de Castro Andrade,et al.  Requirements and challenges for building service-oriented pervasive middleware , 2009, ICPS '09.

[24]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[25]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.