<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Teaching Information Systems: an i*-based approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Juan</forename><forename type="middle">Pablo</forename><surname>Carvallo</surname></persName>
							<email>pablo.carvallo@ucuenca.edu.ec</email>
							<affiliation key="aff0">
								<orgName type="department">Computer Science Department</orgName>
								<orgName type="institution">University of Cuenca</orgName>
								<address>
									<country key="EC">Ecuador</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Teaching Information Systems: an i*-based approach</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0C421224FBA74E2C3360271E2818F8C5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T09:07+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Modern enterprises rely on information systems (IS) both to support their operation and provide information required to endorse strategic decisions. Because of their increasing complexity, such systems are usually constructed by integrating software components of different nature and origins, into hybrid systems, for which architectural design plays a fundamental role. If well engineered, it becomes the blueprint required for IS to add value to the organization. However, IS architecting is not an easy task, mainly due to the fact that engineers often lack of knowledge related to business strategy and operations, but also proper training in methods and techniques required to conduct IS architectural design in a well-structured way, without losing focus on business strategy. In this paper we present an i*-based approach to lecture information systems, which keeps in mid both business strategy and technology.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Modern enterprises rely their strategy on Information Systems (IS) required to, support and orchestrate their operation, provide information to endorse decision making, and eventually add value to their businesses. Because of their complexity, such systems are currently built by integrating components of different nature into Hybrid Systems <ref type="bibr" target="#b0">[1]</ref>, encompassing third-party Off-The-Shelf components <ref type="bibr" target="#b1">[2]</ref>, legacy and bespoke systems. IS architecture plays a fundamental role. It is used to guide components construction and/or selection, and integration into a dependable systems, in which components interact in a reliable and coordinated way to support business strategy.</p><p>However, IS architecting is not an easy task; engineers are usually trained in methods and technologies required to design and build components from the scratch, but often lack knowledge related to business strategy and operations. This leads them to prioritize technology over strategy and thus, to assemble IS that do not fully comply with needs or add value to organizations. It also leads them to adopt merely operative, subordinated roles, instead of visionary, managerial and strategic ones, hampering professional growth.</p><p>It is therefore highly relevant to improve their training to include curricula covering these aspects. This paper presents an i* based approach to lecture IS, intended to develop skills related to business modeling and strategy, and the understanding of their impact on IS architecture and vice versa.</p><p>The remaining of this paper is structured as follows; section 2 introduces the context and the course; section 3 describes the lecturing method; Section 4 gives some concluding remarks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>The context and objectives of the course Cuenca University is one of the top five ranked universities in Ecuador. Its Engineering Faculty offers major degrees in several engineering fields including Systems Engineering. This five years long program includes, in addition to general education, courses mainly related to the ACM software engineering curricula <ref type="bibr" target="#b2">[3]</ref>, but also some in relation to Computer Science. Information Systems is a core course in the Systems Engineering program. Lectured in the second semester of the fourth academic year, it encompasses 64 core hours of classroom activities. Its learning objectives are:  Understand the managerial role of the systems engineers and its responsibility as value generators for the organization.  Identify the responsibility (dependencies) of an organization in relation to its context and the strategy required to fulfill it.  Understand enterprise organization (value chain -see next section-) and the roles of organizational areas to support enterprise strategy.  Identify the benefits that a IS could bring to the organization in order to support its strategy (external requirements) and operation (internal requirements)  Define the IS architecture required to support decision making at different organizational levels, and the goals for software components required to implement it.</p><p>The main goal of the course is getting students to understand and keep focus on business strategy, in order to design IS architectures required to construct systems that generate value to the organization and the actors in its context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3</head><p>The lecturing method</p><p>The course is conducted in a semi-industrial way; students are required to complete analysis and modelling activities in industrial settings (organizations that agreed to cooperate with the program). Students work in couples to complete assignments, supported by responsible of the assigned organizations. At the end of academic period, organizations are provided with all documents produced in the course. Academic process starts by constructing Context Models (CM) of the organization and ends with the identification of the IS architecture (actors that structure the system, services that must be covered by each of them and their relationships). The course is divided into 7 units (in addition to its introduction). The first three units provided basic information in relation to methods, models and notations to be used, whilst units 4 through 7 are intended to guide students on the core assignments, making strong use of i* models and modelling techniques (see Fig. <ref type="figure" target="#fig_0">1</ref>). The next paragraphs resume activities conducted in each of these units.</p><p> Unit 1: The business strategy framework. Strategic framework is based in Porter's models of market forces and value chain <ref type="bibr" target="#b5">[6]</ref>. The first is designed to analyze the influence of five competitive forces on business context (threat of new entrants; threat of substitution; bargain power of customers; bargain power of suppliers; and rivalry among current competitors) and reason about strategies to make organizations profitable.  <ref type="figure" target="#fig_1">2</ref>). Next, they are required to analyze the organization in relation to each market force, with support of representatives of each OA, and identify Context Actors (CA) in relation to them, e.g. types of suppliers (services/raw materials/supplies, domestic/international, etc.), types of consumers (local/national/international, cash/credit, etc.). We advise students to acknowledge four types of actor's hardware, software, organizations and people.   <ref type="figure" target="#fig_0">1</ref>). Guidelines included in <ref type="bibr" target="#b4">[5]</ref> are provided to help identify CD and ID. Graphical guidelines are also provided e.g., change the graphical representation of dependencies from standard curved lines with oriented "D"s, to straight lines with arrowheads (see Fig. <ref type="figure" target="#fig_0">1</ref>).  Unit 5: Modelling the environment of the system. An IS-to-be is placed into the organization, and the impact that it has over the context is analysed. Strategic dependencies identified in unit 4 (internal and external), are examined to determine which of them may be totally or partially satisfied by IS. These dependencies are redirected inside the i* SD diagram to the IS. The model includes the organization itself as an actor in IS environment, its needs are modelled as strategic dependencies over the IS (see Unit 5 of Fig. <ref type="figure" target="#fig_0">1</ref>). Context Model resulting from unit 4 is transformed to its tabular form as proposed in <ref type="bibr" target="#b5">[6]</ref> (see first 5 columns of table <ref type="table" target="#tab_1">1</ref>), to help manage size. Columns "Total" and "Partial" are used to state which dependencies can be fully or partially automated. These dependencies structure the Context Model of the IS (SCM). "Why" column is used to state reasons why dependencies are considered to be automatable (for teacher validation purposes).</p><p> Unit 6: Decomposition of system goals and identification of system actors. Dependencies included in the SCM are analysed and decomposed into a hierarchy of goals required to satisfy them. The goals represent the services that IS must provide, to support interaction with CA and OA activities. An i* SR diagram for the system is built, using means-end links of type goal-goal (representing then a decomposition of objectives into sub-objectives) (see Unit 6 of Fig. <ref type="figure" target="#fig_0">1</ref>). Column "How" is added to the table resulting from unit 5, to state goals and sub-goas in the tabular representation (see table <ref type="table" target="#tab_1">1</ref>). As a hint for goal identification we ask students to think about basic data to be stored, transactions and processes required to manage and transform it and, basic queries and reports to be obtained. Sub-goals are refined until they represent services atomic enough, such that it does not makes sense to further reduce them. The process is complete when all the CD and ID have been considered and linked to appropriated sub-goals required for their fulfillment.  Unit 7: Identification of system architecture. Finally, goals included in the SR model are analysed and systematically grouped into System Actors (SA). Objectives are clustered into services, according to an analysis of the strategic dependencies with the environment and an exploration of software components marketplace. Relationships between SA that form IS architecture are described according to the direction of the means-end links that exist among the objectives included inside them (See Unit 7 of Fig. <ref type="figure" target="#fig_0">1</ref>). Additional columns are added to the table, one for each SA identified (see table <ref type="table" target="#tab_1">1</ref>). Goals and sub-goal are linked to SA by placing a capital letter "I" in the proper cell (SA column; goal/sub-goal row) if they have to be implemented in SA, and a "D" when they require data or supporting functionality from other SAs (interoperability requirements). SA are not software components; they represent atomic software domains for which several situations may occur: there can be a software component covering the functionality of several SA; the functionality of a single SA is covered by several software components for ubiquity reasons e.g. mobile and local applications; or there can be cases for which no software components exist, leading to the need of bespoke software. </p><formula xml:id="formula_0"> CD1.1 OA3 X Just 1 G 3 D I CA1  CD1.2 OA1 CA1  CD1.3 OA1 CA2  CD2.1 OA3 X Just 2 G 3 D I CA2  CD2.2 OA3 X Just 3 G 5 D I … CAn  CDn.1 Oan CAn  CDn.2 … CAn  CDn.3 Can X Just 4 G n D I G1 I G2 D I G3 D I G4 D I OA3  ID2 … X Just 6 G 4 D I … OAn  Idn OA4 X Just 7 G 4 D I Just 5 OA1  ID1 OA3 X<label>4</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Concluding remarks</head><p>This paper presents an i*-based approach for lecturing IS and IS architecture. The approach helps students to keep focus on business strategy and technology at a time. It starts by modelling the environment of the organization and concludes with the definition of the IS architecture required to support its operation and the strategic interactions with actors in its context. The lecturing method makes intensive use of i* models; after conducting the course in several editions, we have found that the method provides several benefits for students:</p><p>1. It helps to organize their work making IS architecting more structured.</p><p>2. The learning process constantly addresses strategic needs, helping students to keep focus on them. 3. It makes evident the interaction among IS components, consequently architectural design can be used to support the selection and/or construction of components that may integrate more seamlessly. 4. The architecture oriented nature the method, allows for the definition of IT strategic plans. Projects can be better justified to managers, in terms of the services that they will provide to CA and OA, and how they satisfy strategic internal and external needs.</p><p>Although we find the lecturing method very valuable and the evaluation of students is usually positive, there are problems of different nature that we have to address: Notational (organic nature of graphical notation, difficulties to scale and poor tool support, problems typically associated to i* models); Semantic (confusion among dependency types, their direction or the correct way to state their descriptions); Decomposition and groping of goals; and Organizational (lack of organizations willing to cooperate, or size of the ones willing to do it -too large o too small-).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Sketch of the method proposed in units 4 to 7.</figDesc><graphic coords="3,141.36,391.44,312.48,290.88" type="vector_box" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Mapping of OA to VA (left) and identification of CA in relation to market forces (right). Unit 2 and 3: Introductory concepts. Unit 2 provides basic training on composite hybrid systems<ref type="bibr" target="#b0">[1]</ref>, types of components that can be used for their construction, empirics to support the decision whether to acquire or build a component from the scratch and a quick review of integration techniques. Unit 3, introduces students to i* modelling notation; SD and SR models and their constructs are reviewed and several examples are provided. The course adopts the simplified version of the i* metamodel reported in [5] e.g. actors are treated in a generic manner, without distinguishing roles, positions and agents; use only is-a and is-part-of actor links; avoid task dependencies since they are too low level (focus on goals that can be operationalised by them); use just goals as intentional elements and goal decompositions as intentional elements links, inside actors' boundaries, etc.  Unit 4: Modelling the enterprise context. The organization and its strategy are analysed in detail, to identify its role inside the context. CA identified in unit 1 are examined in relation to each OA in the value chain, to identify strategic needs among them (Context Dependencies -CD-). Also OAs are analysed in relation to each other to identify their strategic interactions (Internal Dependencies -ID-). Students are asked to construct an i* SD context model from the perspective of each OA, including their related CA and OAs as well as their CD and ID. Resulting models are combined into a single enterprise Context Model (see Unit 4 of Fig.1). Guidelines included in<ref type="bibr" target="#b4">[5]</ref> are provided to help identify CD and ID. Graphical guidelines are also provided e.g., change the graphical representation of dependencies from standard curved lines with oriented "D"s, to straight lines with arrowheads (see Fig.1).  Unit 5: Modelling the environment of the system. An IS-to-be is placed into the organization, and the impact that it has over the context is analysed. Strategic dependencies identified in unit 4 (internal and external), are examined to determine which of them may be totally or partially satisfied by IS. These dependencies are redirected inside the i* SD diagram to the IS. The model includes the organization itself as an actor in IS environment, its needs are modelled as strategic dependencies over the IS (see Unit 5 of Fig.1). Context Model resulting from unit 4 is transformed to its tabular form as proposed in<ref type="bibr" target="#b5">[6]</ref> (see first 5 columns of table 1), to help manage size. Columns "Total" and "Partial" are used to state which dependencies can be fully or partially automated. These dependencies structure the Context Model of the IS (SCM). "Why" column is used to state reasons why dependencies are considered to be automatable (for teacher validation purposes).</figDesc><graphic coords="4,133.92,147.12,327.36,114.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Sketch of tabular represetnation of i* SD and SR models in relation to Fig.1</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Actor 1 Type Direction Dependency Actor 2 Total Parcial Why How SA1 SA2 SA3 … SAn CA1</head><label></label><figDesc></figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">1st International iStar Teaching Workshop (iStarT</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2015" xml:id="foot_1"> 2015)   </note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">Proceedings of the 7 th International Intl. Conference on Composition-Based Software Systems (ICCBSS)</title>
				<meeting>the 7 th International Intl. Conference on Composition-Based Software Systems (ICCBSS)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components</title>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE TSE</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The Joint Task Force for Computing Curricula</title>
		<ptr target="https://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf" />
	</analytic>
	<monogr>
		<title level="m">Computing Curricula 2015</title>
				<imprint>
			<date type="published" when="2005">2005. 2006</date>
		</imprint>
	</monogr>
	<note>ACM and IEEE</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Competitive Strategy</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Porter</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1980">1980</date>
			<publisher>Free Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">On the Use of i* for Architecting Hybrid Systems: A Method and an Evaluation Report</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Carvallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PoEM 2009</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Building Strategic Enterprise Context Models with i*: A Pattern-Based Approach</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Carvallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012. 2012</date>
			<publisher>Springer</publisher>
			<pubPlace>TEAR</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A Comparative Analysis of i*-based Agent-Oriented Modeling Languages</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ayala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SEKE</title>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
