<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The importance of teaching goal-oriented analysis techniques: an experience report</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elda Paja</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jennifer Horko</string-name>
          <email>horkoff@city.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John Mylopoulos</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>City University London</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Trento</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>37</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>In this paper, we report on our experience in teaching i* and related goal-oriented techniques at a master-level course at the University of Trento. In our experience, we have observed that analysis is an important factor that in uences learning and understanding of i*. Analysis allows students to not only evaluate the satisfaction of goals in their model, but also to better understand their models, helping to re ne models until they are more meaningful and more likely to ful ll their intended purpose.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>For goal models to be used in practice, goal-oriented requirements languages and
techniques must be taught through university and professional courses. They are
often taught as topics in the syllabus of courses on requirements engineering,
sometimes at the graduate level. As instructors, we want students to be capable
to build useful models, e ectively using models for system comprehension and
decision making. More importantly, we want students to value their learning
experience. How can we improve our teaching practices to achieve these goals?</p>
      <p>
        One of the features of goal-oriented models is their capability to facilitate
systematic satisfaction analysis of model elements. It is possible to use existing
analysis techniques, such as [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], to answer \What if?" or "Is this achievable?"
questions. These procedures allow students to explore the meaning of the
connections within their models, understanding the consequences of alternative
selection. Such analysis is intended to help nd problematic areas in the model,
and to help choose the best mitigation or alternative for such problems. Similar
analysis procedures have been introduced for complementary frameworks, such
as the Business Intelligence Model (BIM) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>In this paper, we argue that the teaching of goal models should be coupled
with one or more systematic analysis procedures. It is through such analysis that
students understand whether their models are meaningful and whether or not
they ful ll their purpose. In our experience, it is analysis that makes students
appreciate the bene ts of models and modeling.</p>
      <p>
        Our thesis has been tested with a qualitative study involving a
masterslevel course at the University of Trento. The course is titled \Organizational
Information Systems" and has been o ered for more than 10 years with 20-35
enrollments per year. The course covers enterprise modeling, strategic objectives
modeling and analysis with i* [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], business process modeling and simulation
with Adonis [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Course requirements included a course project worked on in
teams involving modeling and analysis of an enterprise of each team's choice.
Recent editions of the course have placed more emphasis on systematic goal
model analysis.
      </p>
      <p>The rest of the paper is structured as follows. In section 2 we present more
details about the course syllabus, while in section 3 we describe the requirements
for the students' projects. Section 4 summarizes course project results by drawing
our lessons learned, and section 5 concludes.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Course syllabus</title>
      <p>The Organizational Information Systems (OIS) course is taught at the master
level with the objectives of (i) teaching students basic concepts about modeling
business organizations and business processes; (ii) teaching information system
technologies and architectures that support the operation of organizations; (iii)
understanding how to manage organization information systems; and (iv)
introducing new trends in organizational information systems.</p>
      <p>Students are required to have a general knowledge of software engineering,
including knowledge of UML, as well as a general knowledge of databases and
information systems.</p>
      <p>
        The course is organized as follows. First, it provides an introduction to
organizations and organizational information systems, organizational structures, and
organizational business processes. Second, it presents students with modeling
approaches for organizations, standards and reference architectures. Among others,
it presents approaches for organizational modeling such as i * [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and strategic
business modeling such as BIM [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and Tactical BIM (TBIM) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Emphasis is
placed on teaching systematic analysis for both i* and BIM [
        <xref ref-type="bibr" rid="ref5 ref7">5,7</xref>
        ]. Third, the
course covers modeling and analysis approaches for business processes, based
on Adonis 3 or BPMN 2.0 4. Fourth, it discusses OISs Management { plan,
implement, deliver, monitor, evaluate, and improve organizational information
systems. Finally, the course discusses information assurance, presenting methods
for IT Goal-Risk-Compliance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], and Information Security [
        <xref ref-type="bibr" rid="ref3 ref4 ref9">3,4,9</xref>
        ].
      </p>
      <p>
        It is worth emphasizing that over the years the syllabus of the course has been
continuously updated to accommodate new and emerging techniques. Although
many goal model analysis procedures exist ([
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]) we have chosen to teach the
students qualitative, interactive analysis as this type of analysis is relatively simple,
does not require detailed domain information and comes with relatively stable
tool support. Similarly, we chose [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to teach quantitative BIM analysis using
indicators, supporting business decision making, in part due to it's similarity to
i*-speci c techniques from [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
3 http://www.boc-group.com/it/products/adonis/
4 http://www.omg.org/spec/BPMN/2.0/
      </p>
    </sec>
    <sec id="sec-3">
      <title>Students' roles and course projects</title>
      <p>Student evaluation is performed via a course project, completed by teams of
two or three. Students choose their own teammates. Each team project involves
using state-of-art tools to model and analyze an organization of their choice,
representing the organizational structure, the organizational goals and strategic
objectives. The student projects model and analyze business processes within
that organization to design (or improve) an information system that supports
some of these processes. The project is discussed in a nal oral exam.
Roles. Students are required to play interchangeably the roles of the
requirements analyst and stakeholders, in order to capture both perspectives when
building and analyzing the models. Students have interacted directly with real
stakeholders and customers in only a few cases.</p>
      <p>Project description. Student projects are divided into two assignments. The
rst assignment is focused on modeling, while the second focuses on analysis,
intended to support the improvement of the organization.</p>
      <p>A1. In the rst assignment, students report on the problem by initially
describing the organization in natural language (English/Italian). This description
provides an overview of the organization (sector, size, location, services, etc.),
speci c features (what makes it di erent from competitors), and hypothetical
plans about the future of the organization. Students should de ne the scope of
the project (especially for big organizations), i.e. the parts of the organization
for which they will design an information system.</p>
      <p>In the rest of the rst assignment students are required to model the
existing organization (within the de ned scope), representing important actors, their
goals and interdependencies. This modeling is performed with i*, for which
students are free to use state-of-art tools of their choice. Moreover, an important
step of the modeling activities involves capturing strategic goals of the
organization, including relevant situations and indicators, typically represented with
BIM or TBIM models. Finally, students are required to identify and model at
least three complex business processes with BPMN or Adonis.</p>
      <p>A2. The purpose of the second assignment is twofold: (1) to analyze the chosen
organization in order to identify weaknesses, bottlenecks, and under-performance.
Emphasis is placed on the instruction of strategic analysis for i* and BIM/TBIM,
as well as business process analysis and simulation with ADONIS components;
(2) to improve the current organization by designing part of an organizational
information system. Ideally, the system will overcome the identi ed limitations.
This should be demonstrated using further analysis.</p>
      <p>To achieve these objectives, students should analyze their i* models and
BIM/TBIM models to determine goal satisfaction or denial. Most importantly,
they are required to describe how these changes a ect the identi ed business
processes. As far as business process analysis is concerned, students are required
to execute: (i) consistency queries for all the models, to show that the models
are syntactically correct and complete; (ii) they should run some queries to elicit
useful information from the business processes (path analysis, capacity analysis).</p>
    </sec>
    <sec id="sec-4">
      <title>Lessons learned</title>
      <p>As stated earlier, over the years the course has been reshaped to accommodate
new emerging state-of-the-art techniques. While initially it focused mainly on
enterprise architecture and business process modeling and analysis, using goal
models only to describe the chosen organization, in the last two course
instantiations, we have required students to make more use of systematic analysis
techniques to assess their goal models. We report on our observations of how the
use of goal model analysis in uenced students' understanding.</p>
      <p>We noticed qualitatively that the outcomes of the projects were much
improved. In the oral exam and presentations in the recent year we observed that
students they demonstrate a better understanding of goal models after applying
analysis, which allowed them to iteratively and incrementally build goal models
that adequately capture the intended domain and ful ll their purpose. We have
observed that the results of the goal-analysis help students to understand what
organizational changes can be made to better achieve goals. Moreover, they have
used BIM analysis to identify the strategies that support those goals. Out of the
9 projects from previous year 8 performed extensive goal analysis over i * and
BIM models, and only 1 (single student) failed to do so. Of the 8 projects, 6
reran analysis over the i * models which were improved by previous analysis
results, while 2 provided suggestions for improvement, without evaluating these
improvements with systematic analysis. We illustrate improvements made by
students providing excerpts from a representative student project that
applied analysis to iteratively improve goal-models. They have constructed the i *
models, performing in total 7 iterations and have performed evaluations running
both forward (\what if?") and backward (\is this possible?") analysis.</p>
      <p>Fig. 1 shows part of the i * model proposed by the students and the results of
the backward analysis. After checking the analysis results, students noticed that
for instance the goal Make pro t (circled in bold) for their chosen organization
is not satis able neither completely nor partially based upon backward analysis.
They revised the model, following these intuitions for this goal: \Make pro t
depends on cost saving in our goal diagram. However, this goal model lacks which
tasks really help in increasing income and better pro ts. So, it might be good to
add goals in Marketing Manager that help in generating income, such as
obtaining new projects. Also building software will help in generating income, hence a
link should be added from building software to Make Pro t." Then, they reran the
backward analysis over the revised model, see Fig. 2. Now the goal Make pro t
is satis ed. Similarly they performed changes for the softgoal Quality Software.</p>
      <p>They have performed three other iterations to make the improvements,
following forward analysis results as well. We do not present the models for those
iterations here due to lack of space.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Discussion and conclusions</title>
      <p>In this paper we have discussed our experience in teaching goal-modeling
techniques at a graduate level course. We noticed that the use of each type of analysis
o ered students a deeper understanding of the activities they performed, from
the modeling of the organization at a high level (with i *), to strategic modeling
(with BIM/TBIM), to business process modeling, and information system
design. Our experiences so far are reported based on our informal recollections and
observations. We are currently working to quantify and qualify such observations
more precisely.</p>
      <p>The presented results are from the previous two course instances; thus, we
need to test our thesis further in the future course o erings. Our conclusions
have some threats to validity: (1) the groups of students might have been better
than those of previous years; (2) we had method designers teaching the analysis
techniques.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This research was partially supported by the ERC advanced grant 267856,
`Lucretius: Foundations for Software Evolution', www.lucretius.eu. Jennifer
Horko is supported by an ERC Marie Skodowska-Curie Intra European
Fellowship (PIEF-GA-2013-627489) and by a Natural Sciences and Engineering
Research Council of Canada Postdoctoral Fellowship (Sept. 2014 - Aug. 2016).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Asnar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Goal-driven risk assessment in requirements engineering</article-title>
          .
          <source>REJ</source>
          ,
          <volume>16</volume>
          (
          <issue>2</issue>
          ):
          <volume>101</volume>
          {
          <fpage>116</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>F.</given-names>
            <surname>Francesconi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Tbim: A language for modeling and reasoning about business plans</article-title>
          .
          <source>In Proc. of the 32nd ER Conference</source>
          , pages
          <volume>33</volume>
          {
          <fpage>46</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Massacci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Zannone</surname>
          </string-name>
          .
          <article-title>Modeling security requirements through ownership, permission and delegation</article-title>
          .
          <source>In Proc. of the 13th IEEE International Conference on RE</source>
          , pages
          <volume>167</volume>
          {
          <fpage>176</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Massacci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Zannone</surname>
          </string-name>
          .
          <article-title>Requirements engineering for trust management: model, methodology, and reasoning</article-title>
          .
          <source>IJIS</source>
          ,
          <volume>5</volume>
          :
          <fpage>257</fpage>
          {
          <fpage>274</fpage>
          ,
          <year>October 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>J.</given-names>
            <surname>Horko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Barone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amyot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Borgida</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Strategic business modeling: representation and reasoning</article-title>
          .
          <source>Software &amp; Systems Modeling</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ):
          <volume>1015</volume>
          {
          <fpage>1041</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>J.</given-names>
            <surname>Horko</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Analyzing goal models: di erent approaches and how to choose among them</article-title>
          .
          <source>In SAC</source>
          , pages
          <volume>675</volume>
          {
          <fpage>682</fpage>
          . ACM,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>J.</given-names>
            <surname>Horko</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Interactive goal model analysis for early requirements engineering</article-title>
          .
          <source>REJ</source>
          , pages
          <volume>1</volume>
          {
          <fpage>33</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>D.</given-names>
            <surname>Karagiannis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Junginger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Strobl</surname>
          </string-name>
          .
          <article-title>Introduction to business process management systems concepts</article-title>
          .
          <source>In BPM</source>
          , pages
          <volume>81</volume>
          {
          <fpage>106</fpage>
          . Springer,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>E.</given-names>
            <surname>Paja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          .
          <article-title>Managing security requirements con icts in socio-technical systems</article-title>
          .
          <source>In Proc. of the 32nd ER Conference</source>
          , volume
          <volume>8217</volume>
          <source>of LNCS</source>
          , pages
          <volume>270</volume>
          {
          <fpage>283</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. E. Yu,
          <string-name>
            <given-names>P.</given-names>
            <surname>Giorgini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Maiden</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          .
          <article-title>Social Modeling for Requirements Engineering</article-title>
          . MIT Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>