<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Required Changes in Requirements Engineering Approaches for Socio-Cyber-Physical Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ksenija</forename><surname>Lace</surname></persName>
							<email>ksenija.lace@cs.rtu.lv</email>
							<affiliation key="aff0">
								<orgName type="institution">Riga Technical University</orgName>
								<address>
									<country key="LV">Latvia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marite</forename><surname>Kirikova</surname></persName>
							<email>marite.kirikova@cs.rtu.lv</email>
							<affiliation key="aff0">
								<orgName type="institution">Riga Technical University</orgName>
								<address>
									<country key="LV">Latvia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Required Changes in Requirements Engineering Approaches for Socio-Cyber-Physical Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A5357B0AAA52D09D7F3FBE2690772FF4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T17:39+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Requirements Engineering</term>
					<term>Socio-Cyber-Physical System</term>
					<term>Cyber-Physical System</term>
					<term>Continuous Requirements Engineering</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Requirements engineering has been mainly focused on software development, which represents relatively homogenous, stable and predictable cyber space. But even there, problems in requirements (e.g., changing, missing or irrelevant requirements) are considered as main reasons for project failure. Entering a new era of socio-cyber-physical systems, which are complex, heterogeneous systems of systems, will make requirements engineering even more challenging. Not only it is a standard practice that requirements change and evolve, and new requirements emerge frequently during the system life cycle. In socio-cyberphysical systems, requirements cannot be defined just for the cyber space, but must cover also the socio and physical spaces. There are also highly complex interrelationships, interactions and impacts between components of systems that can lead to unexpected and even unacceptable consequences in system structure and behaviour. One of the promising approaches supporting adaptability and emergency of systems is continuous requirements engineering, based on agility, flexibility and emergence. Therefore it is necessary to identify gaps in existing requirements engineering practices with respect to socio-cyber-physical systems and to propose required adjustments and enhancements in requirements engineering process.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Socio-cyber-physical systems, as complex heterogeneous and adaptive emergent systems, will bring new challenges for the requirements engineering discipline <ref type="bibr" target="#b0">[1]</ref>. These challenges will encumber requirements engineering efficiency and potentially will raise the question whether the requirements engineering is possible and useful in sociocyber-physical systems engineering.</p><p>To answer that question, the research process was conducted in four sequential phases: (1) analysis of the "traditional" requirements engineering discipline and known issues, (2) analysis of socio-cyber-physical systems and important specifics related to requirements engineering in their context, (3) consideration of a business case of sociocyber-physical system as an example of system characteristics influencing requirements engineering, (4) identification of required enhancements in requirements engineering approaches.</p><p>The main questions for the first phase of research were: Why the requirements engineering discipline was introduced? What is the main purpose and objectives for this discipline? What are the common practises used? Are there any issues identified for this discipline to be efficient in achieving these objectives in context of socio-cyberphysical systems?</p><p>The focus for the second phase was to describe the paradigm of socio-cyber-physical systems as well as main characteristics of such systems that can directly or indirectly impact achievement of requirements engineering objectives.</p><p>During the third phase, additional objectives for requirements engineering in sociocyber-physical systems context were defined and for each of them the list of required actions was proposed. The proposed actions are currently just theoretical recommendations, but in further research it is intended to define more specific techniques and assess effectiveness of these techniques in real case study examples.</p><p>In the fourth phase the example of requirements engineering for one specific type of socio-cyber-physical system was investigated where defined challenges and proposed solutions were illustrated.</p><p>In conclusion, targets for further research were identified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Issues of "Traditional" Requirements Engineering</head><p>Requirements engineering discipline was introduced in 1990s and refers to the process of eliciting, documenting and maintaining requirements in the systems engineering process. It is important to respect the difference between systems engineering area, where "system" means many different components of any type forming one whole, from the more narrow software engineering area, where only software components are forming a system <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref>. For a long time the requirements engineering discipline was mainly addressing software system development. Fig. <ref type="figure">1</ref> illustrates typical relationships between software development and requirements engineering activities.</p><p>There are many software development approaches widely used, but all of them consist of the following sequential phases (Fig. <ref type="figure">1</ref> (1)): planning, investigation, implementation, testing, production and maintenance of the developed system <ref type="bibr" target="#b3">[4]</ref>- <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Traditional Requirements Engineering Approach</head><p>Planning and investigation phases always include more or less formal and detailed requirements development activity. The main goal of this activity is to develop requirements for the system to be implemented. All further phases include requirements management activity, with the goal of ensuring requirements implementation and handling changes in requirements <ref type="bibr" target="#b3">[4]</ref>- <ref type="bibr" target="#b5">[6]</ref>.</p><p>Requirements development and management constitute requirements engineering (Fig. <ref type="figure">1</ref> (2)). There are several standards for the requirements engineering process. Some of them have focus only on software development, some cover also required changes in business processes. But all of them propose that requirements engineering should include the following sequential steps and corresponding objectives (Fig. <ref type="figure">1</ref> (3)) <ref type="bibr" target="#b4">[5]</ref>, <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b7">[8]</ref>  ─ Activity: requirements validation from content, documentation and agreement perspectives.</p><p>─ Objective: requirements are validated with all stakeholders. • Step 5 -Negotiation:</p><p>─ Activity: requirements communication and negotiation between involved stakeholders. ─ Objective: agreement about requirements achieved between all stakeholders.</p><p>• Step 6 -Management:</p><p>─ Activity: maintaining requirements implementation and changes. ─ Objective: changes in requirements do not lead to any inconsistency between requirements.</p><p>Effectiveness of requirements engineering is the accuracy and completeness with which defined objectives are achieved. Effectiveness of requirements engineering impacts effectiveness of software development and quality of the developed system. However, several reports <ref type="bibr" target="#b4">[5]</ref>- <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr" target="#b9">[10]</ref> show that existing requirements engineering practices are not effective enough, as often irrelevant and poorly formulated requirements are given to the software development. It leads to requirements changes and rework.</p><p>Frequently mentioned problems in software development caused by ineffective requirements engineering are illustrated in Fig. <ref type="figure" target="#fig_0">2</ref> (1) [5]- <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b8">[9]</ref>- <ref type="bibr" target="#b11">[12]</ref>:</p><p>• Ineffective elicitation is the reason of missing, unnecessary and irrelevant requirements. • Ineffective analysis causes that developed system does not achieve stated goals.</p><p>• Ineffective documentation leads to incorrectly interpreted requirements.</p><p>• Ineffective validation results in the functionality of the system that cannot be effectively and efficiently used. • Ineffective negotiation is the root cause of the significant changes in the system required after the development is done. • Due to ineffective management changes negatively affect system's effectiveness. • During all requirements engineering process: lack of communication or ineffective communication between system stakeholders. • During elicitation and analysis: business and user requirements are often omitted, and not sufficient initial analysis of software system context is performed, including social and physical environments. • During analysis and documentation: qualitative requirements (in some sources named as non-functional requirements) play secondary role, often stated in high level, vague and ambiguous format. • During documentation and validation: requirements are formulated as incomplete, vague or ambiguous statements. • During validation and negotiation: validation and negotiation phases often are superfluous, requirements engineering is a linear process without feedback loops. • During negotiation and management: requirements change is a chaotic, uncontrolled process, not including proper change impact analysis.</p><p>All these issues are applicable also on requirements engineering for socio-cyberphysical systems, and should be resolved there.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Socio-Cyber-Physical Systems</head><p>As mentioned above, requirements engineering nowadays is used mainly in software engineering area. It means that requirements are defined mainly for the cyber space. However, the Internet of Things started a new phase in the evolution of cyber systems, where cyber space is closely integrated with physical space <ref type="bibr" target="#b0">[1]</ref>. And recently next phase of this evolution has started, where cyber and physical spaces are intertwined with a social space. Thus we can envision that in the near future, in the majority of cases, requirements engineering will be used not just for software (cyber) systems, but rather for complex systems combining all three dimensions -socio, cyber and physical ones.</p><p>[1], <ref type="bibr" target="#b12">[13]</ref>, <ref type="bibr" target="#b13">[14]</ref>. "Socio-cyber-physical system" is a relatively new term, and its exact definition varies between different sources. This system can be seen as the intersection of the several categories of systems (see also Fig. <ref type="figure" target="#fig_1">3</ref>) <ref type="bibr" target="#b14">[15]</ref>- <ref type="bibr" target="#b16">[17]</ref>:</p><p>From structure content perspective:</p><p>• Cyber-physical system, which combines mechanisms that are controlled or monitored by computer-based algorithms, tightly integrated with the Internet. • Socio-cyber system, which combines digital structures that interact with social systems and facilitate, enhance and scale human endeavours.</p><p>From structure organisation perspective:</p><p>• Open system, which has external interactions with its environment.</p><p>• Complex system, which combines a high number of components, which form complex inter-relationships and produce nonlinear emerged behaviour. • System of systems, which combines other systems to pool their resources and capabilities for better performance.</p><p>From behaviour perspective:</p><p>• Real time system, which is a subject to a "real-time constraint".</p><p>• Adaptive system, which is able to respond to environmental changes or in the changes inside the system itself. • Smart system, which uses the functions of sensing, actuation and control in order to analyse a situation, and make decisions based on the available data in a predictive or adaptive manner. From a structural perspective, a socio-cyber-physical system includes all of the following components <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b17">[18]</ref>- <ref type="bibr" target="#b19">[20]</ref> (Fig. The structure of socio-cyber-physical system is highly complex with many interrelationships and interdependencies between components. Some example fields where socio-cyber-physical systems can be used are [ <ref type="bibr" target="#b12">[13]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b20">[21]</ref>- <ref type="bibr" target="#b26">[27]</ref>]:</p><p>• Operation in dangerous environments (e.g. search and rescue, firefighting).</p><p>• Exploration in inaccessible environments (e.g. deep sea, space).</p><p>• Precision operation (e.g. robotic surgery and nano-tolerance manufacturing).</p><p>• Large scale distributed coordination (e.g. traffic control, production networks).</p><p>• Situated intervention with a quick response (e.g. autonomous collision avoidance) • Augmentation of human capabilities (e.g. assistive technologies).</p><p>• Enhancement of societal wellbeing (e.g. ubiquitous healthcare monitoring and delivery)</p><p>But these are just a few examples of numerous possible use cases. Socio-cyber-physical system has a distinguishing set of characteristics. Some of these characteristics also apply to other types of systems, but only socio-cyber-physical system has all of them. Below are listed the characteristics that should be supported in requirements engineering grouped in two categories (systems structure and system behaviour).</p><p>Regarding system structure <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b18">[19]</ref>, <ref type="bibr" target="#b19">[20]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b27">[28]</ref>:</p><p>• Diversity (heterogeneous components from all three spaces: social, physical and cyber spaces). • Complexity (can include other systems as components).</p><p>• Scalability (decentralized and geographically distributed components).</p><p>• Modularity (components, which can enter or leave system and emergent connections).</p><p>System behaviour <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b18">[19]</ref>, <ref type="bibr" target="#b19">[20]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b27">[28]</ref>, <ref type="bibr" target="#b28">[29]</ref>:</p><p>• Variability (system has many potential strategies for problem solving and is capable of choosing the most efficient one in specific circumstances). • Cooperation (system involves several components in cooperative problem solving). • Automation (system is self-sufficient and proactive in goal achievement). • Learning (system gathers and analyses historical data, and is able to evolve). • Prudence (system is context aware and adapts to changes in environment).</p><p>• Emergency (non-linear emergent behaviour due to complex bi-directional influence between components). • Security (system is protected against all security risks). • Reliability (system is highly stable and available).</p><p>• Real time (all communication and operations are subject of time constraint). These characteristics of socio-cyber-physical systems should be supported in requirements engineering by defining requirements that require specific characteristic (e.g. system availability or response time constraints) or by defining requirements for system functionality that implements specific characteristic (e.g. learning algorithms, context analysis functions, self-monitoring processes).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">An example of socio-cyber-physical system</head><p>One of application domains for socio-cyber-physical systems are smart cities. A smart city is a municipality that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare <ref type="bibr" target="#b29">[30]</ref>- <ref type="bibr" target="#b31">[32]</ref>. Smart city as a complex system consists of many smart sub-systems. One of these systems is waste collection. Today, waste collection is mostly a static manual process. In smart city, waste collection should be adaptive automated process, that would analyse the context and transform itself in order to achieve objectives in the most effective and efficient way <ref type="bibr" target="#b29">[30]</ref>, <ref type="bibr" target="#b32">[33]</ref>, <ref type="bibr" target="#b31">[32]</ref>.</p><p>The main objectives of this system are providing bins free capacity according to citizens needs with as low costs as possible.</p><p>System structure is of multiple substances, complex and decentralized, for instance, we can consider the following components <ref type="bibr" target="#b30">[31]</ref>, <ref type="bibr" target="#b33">[34]</ref>, <ref type="bibr" target="#b34">[35]</ref>:</p><p>• Mechanical hardware components: bins, trucks, dumps.</p><p>• Computing hardware components: computer hardware, mobile devices, sensors and actuators. • Computing software: municipality services, scheduling and routing.</p><p>• Human and society components: citizens, municipality, trucks drivers, dumps workers. • Data and knowledge components: data about bins location, capacity, contents and actual free space, data about trucks state, location, and free capacity, data about dumps location, data about available municipality services, data about configured route and schedule. Data is processed and saved as knowledge about the citizens habits, statistics about the time when bins are usually filled up quicker, history about typical time for trucks required to get from one place to another.</p><p>As can be seen, the system has not pure cyber nature, but also incorporates physical and social components. In this case requirements engineering should cover all three perspectives and requirements for physical parts (both, mechanical hardware and computing hardware) and social parts (humans, society, as well as related data and knowledge) should be defined. This requires also in-depth analysis of the interrelations and interdependencies between requirements from different perspectives.</p><p>The system should use cooperative problem solving and variable behaviour, with many potential strategies how to fulfil stated objectives, and also should be able learn from experience and find new strategies. Some strategies that can be used -finding optimal route for a truck and smart schedule of trucks during holidays. All requirements engineering activities should be focused on business goals defined for the system and clear measurable acceptance criteria. New approach required how to formulate requirements in a way that there is not one precise solution, but are several possible solutions defined by the acceptance criteria and constraints.</p><p>The system should be context aware and adapt to changes in the environment. For example, if bins get filled up quicker than usual, or trucks get broken. For this, the new types of functional requirements to be defined: context monitoring and adapting. Additionally, requirements for big data processing in real time should be defined.</p><p>The system should be scalable and modular, allowing components enter or leave the system. For example, more bins, trucks, dumps or even municipalities can be included or excluded. For supporting this, new ways to be found how to represent the model of the system structure not as a static model, but rather as a set of possible component types, components integration process and allowed interaction between components. However, the system should operate in predefined constraints and monitor itself. For example, the system should monitor that all trucks are located in allowed areas and bins are not damaged. For this precise constraints of allowed system structure and behaviour should be defined and new types of functional requirements to be introduced: self-monitoring and correcting. Additionally, requirements validation phase should include comprehensive system behaviour simulation activity and requirements changes according to simulation results.</p><p>The system also should be protected against security risks, be stable and available. This required in-depth analysis of different kinds of quality requirements: safety, security, performance, robustness. Potentially new types of quality requirements are required.</p><p>The high number of different stakeholders, the complexity of the system, the long life cycle of the implementation and operation will lead to the changes in system requirements, potentially including changes in the business goals. This means that requirements engineering can't be performed only once prior any implementation activities, but should be integrated in all further stages. Also, requirements engineering should become iterative process, with several sequential phases, each of them validating results of the previous phases, implementing changes in existing requirements, removing unneeded requirements and adding new requirements. For this new approach for managing requirements is required, perceiving changes in requirements not as a which would allow change requirements in more efficient and qualitative way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Required Changes in Requirements Engineering for Socio-Cyber-Physical Systems</head><p>For supporting engineering of socio-cyber-physical systems, requirements engineering activities should (1) improve requirements engineering effectiveness and (2) ensure previously defined characteristics of socio-cyber-physical systems.</p><p>For requirements engineering effectiveness, additional activities or improved quality of existing activities is required (Fig. <ref type="figure">5</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 5. Required Enhancements for Requirements Engineering Effectiveness</head><p>In particular, the following enhancements in requirements engineering are required <ref type="bibr" target="#b8">[9]</ref>- <ref type="bibr" target="#b11">[12]</ref>:</p><p>• Effective and sufficient communication between all system stakeholders during all requirements engineering process. • Detailed initial analysis of software system context, including social and physical environments. • Functional requirements defined only after business and user requirements are defined.</p><p>• Qualitative requirements play an important role, stated in unambiguous and measurable format. • Requirements are formulated as complete, clear and unambiguous statements.</p><p>• Comprehensive validation and negotiation phases.</p><p>• Requirements engineering is an iterative process with feedback loops.</p><p>• Requirements change is well organized and controlled process, including proper change impact analysis.</p><p>For supporting characteristics of socio-cyber-physical systems, additional activities in the scope of requirements engineering or more effort in the existing activities are required (Fig. <ref type="figure" target="#fig_4">6</ref>, (1) -system structure, (2) -system behaviour).</p><p>Identified requirements engineering activities for the waste management system example grouped by different characteristics of socio-cyber-physical systems, which are supported by these activities. Following activities in requirements engineering were identified (see Fig. <ref type="figure" target="#fig_5">7</ref>) <ref type="bibr" target="#b11">[12]</ref>, <ref type="bibr" target="#b16">[17]</ref>, <ref type="bibr" target="#b35">[36]</ref>- <ref type="bibr" target="#b46">[46]</ref>:</p><p>• Due to diversity, extend the requirements scope to cover all three dimensions: cyber, physical and social dimensions. Existing requirements engineering practices to be tested for physical and social dimensions, and new practices / adjustments in existing practices to be proposed. • For scalability and modularity, build a model for system structure, consisting of interacting components. And due to an emergency, allow these components to perform and interact by defined rules for stated business goals and observe emerging behaviours. • Due to the modularity and emergency, define how the system can monitor itself and how it should perform in case of any failures. • Due to the complexity and for learning, be prepared that we will not be able to define initially all requirements in a precise and detailed format therefore iterate requirements engineering activities. • Due to the complexity and emergency define how different requirements can impact each other and to what consequences it will lead. • For variability and cooperation, focus on business requirements and goals for the system, rather than on functional system requirements. • For variability and automation, define requirements in such manner, that there are several possible correct solutions for system structure and behaviour, depending on the context. Additionally, requirements how system will detect and handle changes in the environment should be defined.</p><p>• For learning and prudence, prepare the system for analysing huge volume of data and learn through this. Additionally, teach a system how to adapt and allow the system to achieve business goals in the most efficient way, so that system is able to select the most efficient strategy and even is able to introduce new strategies. • For learning, variability, automation and emergency, focus on defining constraints for allowed system behaviour rather than defining behaviour itself. • Due to an emergency, simulate the system behaviour, detect possible negative scenarios and adjust requirements before implementation. In each socio-cyber-physical system each moment numerous events, decisions and actions may happen. There are many possible futures, only one of them will happen, but we need to be prepared for as many as possible of them. • For automation, security, reliability and real time, define comprehensive requirements in a measurable and precise way, especially: real-time responsiveness, robustness, reliability, security. So that system performs according to stated quality standards, regarding of external impacts. The unique combination of all activities for requirements engineering effectiveness and activities required for supporting characteristics of socio-cyber-physical systems (Fig. <ref type="figure" target="#fig_5">7</ref> (2)) mapped to the appropriate requirements engineering steps (Fig. <ref type="figure" target="#fig_5">7</ref> (1)) defines main focus areas during the requirements engineering process for socio-cyberphysical systems. All these activities should be planned as mandatory and cannot be omitted for effective requirements engineering in socio-cyber-physical systems development. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>Cyber systems evolution is entering new era of socio-cyber-physical systems. These systems have highly complex heterogeneous structure with many interrelationships between components, and context aware adaptive and learning behaviour.</p><p>In order to be able to build such systems, comprehensive requirements should be developed and well managed. Requirements development and management are executed during requirements engineering activity in the system development process.</p><p>But today the requirements engineering discipline still mainly focuses on cyber part of the systems and the scope of software system development projects. Also, there are</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Issues in Traditional Requirements Engineering</figDesc><graphic coords="4,124.80,505.20,345.84,130.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Socio-Cyber-Physical System and Existing Systems Categories</figDesc><graphic coords="6,200.64,322.80,193.44,154.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>4): • (1) Mechanical hardware components. • (2) Computing hardware components, that can be stand-alone components (computers) or embedded into mechanical hardware (smart devices). • (3) Software components, that are installed on computing hardware. • (4) Human components, that can form different social structure components. • (5) Data and knowledge components, that are part of computing software, human or social components. Data components are used for communication and data exchange between all other components. Data can be processed, transformed into information and saved as knowledge.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Structure of Socio-Cyber-Physical Systems</figDesc><graphic coords="7,124.80,147.36,348.96,291.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Required Activities in Requirements Engineering for Socio-Cyber-Physical Systems</figDesc><graphic coords="12,139.44,340.32,316.32,344.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Additional Activities in Requirements Engineering Process</figDesc><graphic coords="13,124.80,271.44,345.84,233.76" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,124.80,147.36,345.84,177.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="10,124.80,452.40,347.76,168.24" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>still open discussions about the effectiveness of existing requirements engineering approaches.</p><p>In this paper main existing issues in requirements engineering, that already cause problems in software development projects, were reviewed and required enhancements in requirements engineering were identified.</p><p>From another side, socio-cyber-physical systems were introduced, main characteristics of these systems were stated and additional activities in requirements engineering for supporting these characteristics were listed.</p><p>Activities for improving requirements engineering activities and for supporting characteristics of socio-cyber-physical systems were mapped to requirements engineering steps, illustrating main focus areas in the requirements engineering process.</p><p>In this work, required enhancements are still formulated as high-level activities, and future work will revise proposed activities in more detail, elaborate specific techniques, models and artefacts that can be used. Future direction of research is to investigate existing continuous requirements engineering approaches, methods, models and tools, and assess their impact on requirements engineering for socio-cyber-physical systems through applying for case study projects.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber-physical society-the science and engineering for future society</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhuge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="180" to="186" />
			<date type="published" when="2014-03">Mar. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Systems engineering for software and hardware systems: pointcounterpoint</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Sheard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">INCOSE Int. Symp</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="928" to="936" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Educating software engineers to become systems engineers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Koolmanojwong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Boehm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">24th IEEE-CS Conference on Software Engineering Education and Training (CSEE&amp;T)</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="209" to="218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Agile hardware and software system engineering for innovation</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Darrin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Knuth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2012 IEEE Aerospace Conference</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">System requirements engineering in complex situations</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Katina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Keating</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Jaradat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Requir. Eng</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="45" to="62" />
			<date type="published" when="2014-03">Mar. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Engineering requirements with Desiree: an empirical evaluation</title>
		<author>
			<persName><forename type="first">F.-L</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Horkoff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Borgida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guizzardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Adv. Inf. Syst. Eng</title>
		<imprint>
			<biblScope unit="volume">9694</biblScope>
			<biblScope unit="page" from="221" to="238" />
			<date type="published" when="2016-05">May 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Challenges and solutions in global requirements engineering -a literature survey</title>
		<author>
			<persName><forename type="first">K</forename><surname>Schmid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Quality. Model-Based Approaches for Advanced Software and Systems Engineering</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="85" to="99" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Requirements engineering</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Fernandes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Machado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Requirements in Engineering Projects</title>
				<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Analysis and classification of problems associated with requirements engineering education: towards an integrated view</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">N</forename><surname>Memon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Salim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ahmad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Arab. J. Sci. Eng</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1923" to="1935" />
			<date type="published" when="2014-03">Mar. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Assessing the quality of requirements engineering products</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E M</forename><surname>Champion</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software Quality and Productivity: Theory, practice, education and training</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Lee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B.-Z</forename><surname>Barta</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Juliff</surname></persName>
		</editor>
		<meeting><address><addrLine>Boston, MA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer US</publisher>
			<date type="published" when="1995">1995</date>
			<biblScope unit="page" from="215" to="218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Introduction to non-functional requirements</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Adams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Nonfunctional Requirements in Systems Analysis and Design</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="45" to="72" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Bridging the gap between requirements engineering and human-computer interaction</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ebert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Humayoun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Seyff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D J</forename><surname>Barbosa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Usability-and Accessibility-Focused Requirements Engineering</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">9312</biblScope>
			<biblScope unit="page" from="3" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Methodological basis of socio-cyber-physical systems structure-dynamics control and management</title>
		<author>
			<persName><forename type="first">B</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yusupov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Verzilin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sokolova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ignatjev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Digital Transformation and Global Society</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="610" to="617" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">OLD Internet of things, smart spaces, and</title>
		<author>
			<persName><forename type="first">S</forename><surname>Balandin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Andreev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Koucheryavy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">next generation networks and systems: 15th international conference, NEW2AN 2015 and 8th conference</title>
				<meeting><address><addrLine>ruSMART; St</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Elastic systems: towards cyberphysical ecosystems of people, processes, and things</title>
		<author>
			<persName><forename type="first">D</forename><surname>Moldovan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Copil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dustdar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comput. Stand. Interfaces</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="76" to="82" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Beyond advanced mechatronics: new design challenges of socialcyber-physical systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horvath</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACCM-Workshop on &quot;Mechatronic Design</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Cyber physical systems technologies and applications</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasilakos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="436" to="437" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Challenges and requirements for the application of industry 4.0: a special insight with the usage of cyber-physical system</title>
		<author>
			<persName><forename type="first">E</forename><surname>Mueller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X.-L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Riedel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chinese J. Mech. Eng</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1050" to="1057" />
			<date type="published" when="2017-09">Sep. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A reference architecture for the development of socio-cyber-physical condition monitoring systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fleischmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kohl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Franke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2016 11th System of Systems Engineering Conference (SoSE)</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A survey: cyber-physicalsocial systems and their system-level design methodology</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Cyber-physical augmentation -an exploration</title>
		<author>
			<persName><forename type="first">R</forename><surname>Vroom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horvath</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tools and Methods of Competitive Engineering</title>
				<meeting><address><addrLine>TMCE</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Software construction and analysis tools for future space missions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Lowry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tools and Algorithms for the Construction and Analysis of Systems: 8th International Conference, TACAS 2002 Held as Part of the Joint European Conferences on Theory and Practice of Software</title>
				<meeting><address><addrLine>ETAPS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A review of the smart world</title>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Considerations regarding the integration-intrication processing the nature and technology</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ioan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Tecaru Berekmeri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Blebea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACTA Univ. Cibiniensis</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">82</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Physical-cyber-social computing: an early 21st century approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sheth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Anantharam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Henson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Intell. Syst</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="78" to="82" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Cybermatics: a holistic field for systematic study of cyber-enabled new worlds</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="2270" to="2280" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Cybermatics: cyberphysical-social-thinking hyperspace based science and technology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Ning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Huang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="504" to="522" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Semantic linking through spaces for cyber-physical-socio intelligence: A methodology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhuge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">175</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="988" to="1019" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Self-adaptation for cyber-physical systems: a systematic literature review</title>
		<author>
			<persName><forename type="first">H</forename><surname>Muccini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sharaf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Weyns</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="75" to="81" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Smart city concept as socio-technical system</title>
		<author>
			<persName><forename type="first">H</forename><surname>Kopackova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Libalova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference on Information and Digital Technologies (IDT)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="198" to="205" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Smart city technologies and architectures: a literature review</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kyriazopoulou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2015 International Conference on Smart Cities and Green ICT Systems (SMARTGREENS)</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">How to improve WEEE management? Novel approach in mobile collection with application of artificial intelligence</title>
		<author>
			<persName><forename type="first">A</forename><surname>Król</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nowakowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mrówczyńska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Waste Manag</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="222" to="233" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Smart cities as cyber-physical social systems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">G</forename><surname>Cassandras</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Engineering</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="156" to="158" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A literature review on smart cities: paradigms, opportunities and open problems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arroub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zahi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sabir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sadik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="180" to="186" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Multi-level self-organization in cyber-physical-social Systems: smart home cleaning scenario</title>
		<author>
			<persName><forename type="first">A</forename><surname>Smirnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kashevnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ponomarev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia CIRP</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="329" to="334" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">A modular web framework for socio-CPS-based condition monitoring</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fleischmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kohl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Franke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE World Conference on Factory Communication Systems (WFCS)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">A modelling &amp; simulation based engineering approach for sociocyber-physical systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Nguyen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th International Conference on Networking, Sensing and Control (ICNSC)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="702" to="707" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Security analysis of socio-technical physical systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lenzini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mauw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ouchani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comput. Electr. Eng</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="258" to="274" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Towards improved requirements engineering with SysML and the user requirements notation</title>
		<author>
			<persName><forename type="first">D</forename><surname>Amyot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Anda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Baslyman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lessard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Bruel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 24th International Requirements Engineering Conference (RE)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="329" to="334" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Towards crowd-based requirements engineering a research preview</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">C</forename><surname>Groen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Doerr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Adam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Requirements Engineering: Foundation for Software Quality: 21st International Working Conference, REFSQ 2015</title>
				<editor>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Proceedings</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Fricker</surname></persName>
		</editor>
		<editor>
			<persName><surname>Schneider</surname></persName>
		</editor>
		<meeting><address><addrLine>Essen, Germany; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015">March 23-26, 2015. 2015</date>
			<biblScope unit="page" from="247" to="253" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Towards a conceptual framework for requirements interoperability in complex systems engineering</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Szejka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aubry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Panetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">C</forename><surname>Júnior</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Loures</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">On the Move to Meaningful Internet Systems: OTM 2014</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<monogr>
		<title level="m">Workshops</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="229" to="240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Cyber-physical systems security -a survey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Humayed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Luo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Things J</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1802" to="1831" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">So smart -modeling social contexts to improve smart objects awareness in pervasive computing environments</title>
		<author>
			<persName><forename type="first">G</forename><surname>Biamino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="393" to="394" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Modeling social contexts for pervasive computing environments</title>
		<author>
			<persName><forename type="first">G</forename><surname>Biamino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="415" to="420" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Social awareness and user modeling to improve objects intelligence</title>
		<author>
			<persName><forename type="first">G</forename><surname>Biamino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cena</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="118" to="121" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Cyber-physical systems technologies and application -part II</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasilakos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Futur. Gener. Comput. Syst</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page" from="83" to="84" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
