<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Use of iStar in Situational Method Engineering: An Ongoing Study</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Marcela</forename><surname>Ruiz</surname></persName>
							<email>marcela.ruiz@zhaw.ch</email>
							<affiliation key="aff0">
								<orgName type="institution">Zürich University of Applied Sciences</orgName>
								<address>
									<settlement>Winterthur</settlement>
									<country key="CH">Switzerland</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">University of Geneva</orgName>
								<address>
									<settlement>Geneva</settlement>
									<country key="CH">Switzerland</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Universitat Politecnica de Catalunya</orgName>
								<address>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Use of iStar in Situational Method Engineering: An Ongoing Study</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">FFCA2AE8AA84E158E15ABC2A8693F44B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T05:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Situational Method Engineering</term>
					<term>iStar 2.0</term>
					<term>Experimental Design</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Context. Situational Method Engineering (SME) is the discipline that aims at the systematic definition of methods adapted to specific contexts of use (situations). The use of goal-oriented methods for supporting SME is an active research line where the iStar 2.0 language is applied. Objective. We plan to conduct an experiment to investigate some designated pragmatic qualities, namely the perceived usefulness, ease of use and accuracy of iStar 2.0 when used in the SME context. Method. This paper presents our current work on designing an empirical study for the use of iStar 2.0 in SME. Next steps. We plan to refine our current study and run pilots until our measurement tools and sample population are ready for experimental execution.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Situational Method Engineering (SME) <ref type="bibr" target="#b0">[1]</ref> is the discipline that aims at the systematic definition of methods adapted to specific contexts of use (situations). The term was coined in the early 90s and has been subject of much research since then, which is summarised in Section 2. In that section, we also present one line of research in SME, namely the use of goal-oriented methods for supporting the construction of methods driven by the goals sought. Among the several alternatives, we are interested in the use of the i* framework and more precisely, the iStar2.0 language <ref type="bibr" target="#b1">[2]</ref>.</p><p>Although we have already reported some results in this direction <ref type="bibr" target="#b2">[3]</ref> [4] <ref type="bibr" target="#b4">[5]</ref>, we have focused more on the methodological aspects of SME than on the value that iStar 2.0 brings to our SME approach. This paper is the first step towards the search of evidence of this value. Following the recommendations given in the iStar 2.0 empirical evaluation roadmap <ref type="bibr" target="#b5">[6]</ref>, we are planning to conduct an experiment to investigate some designated pragmatic qualities, namely the perceived usefulness, ease of use and accuracy of iStar 2.0 when used in the SME context. We present the current protocol in Section 3 and discuss the next steps in Section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Object of Study</head><p>The discipline of Situational Method Engineering (SME) advocates the construction of a situation-specific method for each software development project in order to better fit its context and requirements <ref type="bibr" target="#b0">[1]</ref>. The building of a new method is based on the reuse of parts of existing software engineering methods and approaches, redefined as method chunks, and stored in a method repository <ref type="bibr" target="#b6">[7]</ref>. Building the method chunk repository is called method engineering for reuse. Method chunks are selected and assembled to compose a project-specific method, which is called method engineering by reuse.</p><p>Naturally, the notion of situation is a key concept in SME. It can be described by a set of context criteria. These criteria are used to specify, on one hand, the reuse context of the method chunks, and on the other hand, the characteristics of the software project. The method, to be built for the project, is expected to support the realization of different software development activities, and so, to help the engineer in achieving project goals. Each goal can be achieved with the help of one or several method chunks. Therefore, the concept of goal is also very important in SME as it is used to specify the intention of method chunks, as well as the requirements for the project-specific method.</p><p>The selection of the best fitting method chunks for the project at hand is done by matching their goals and context criteria. To facilitate this matching, in our recent work <ref type="bibr">[3] [4]</ref> [5], we have introduced contextual goal modelling as a means for specifying the reuse context of method chunks and for describing method requirements of software projects. We use an extension of iStar2.0 <ref type="bibr" target="#b1">[2]</ref> where goal models are annotated with context criteria. The case studies documented in the aforementioned publications demonstrate the applicability of contextual goal modelling in our SME approach. However, a further evaluation is still necessary.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Designing an Empirical Evaluation</head><p>We plan to perform a qualitative experiment to measure perceived usefulness, ease of use and accuracy of iStar 2.0 when used in the SME context. This experiment has been designed according to Wohlin et al. <ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Research Questions and Variables</head><p>The main research goal, according to the Goal/Question/Metric template is to gain empirical knowledge on the use of goal models in SME for the purpose of understanding whether goal models help to build methods in new situations with respect to perceived usefulness and ease of use, and built methods' accuracy from the point of view of method engineers and the researchers in the context of software engineering experts from industry and academia.</p><p>The main research questions are formulated below: RQ1: When the subjects use iStar 2.0 to build methods for new situations, what is the perceived usefulness? To answer this research question, we evaluate the perceived usefulness when subjects use iStar 2.0 models for scoping methods, specify context criteria, and finally select appropriate method chunks.</p><p>RQ2: When the subjects use iStar 2.0 to build methods for new situations, what is the perceived ease of use? To answer this research question, we evaluate the perceived ease of use when subjects use iStar 2.0 models for scoping methods, specify context criteria, and finally select appropriate method chunks.</p><p>RQ3: When the subjects use iStar 2.0 to build methods for new situations, to what extent all the elements that should appear in the resulting method are specified in the right way? To answer this research question, we measure the level of accuracy of the resulting method specification (iStar 2.0 models representing the scope, context criteria indicated in iStar 2.0 models, and selected method chunks).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Variables</head><p>We consider one independent variable:</p><p>• iStar 2.0 in SME usage. The use of iStar 2.0 in SME by reuse. This independent variable help us to understand the degree to which goal models help to build methods in new situations. We consider the following dependent variables, which are expected to be influenced to some extent by the independent variable. We have adapted the Method Evaluation Model (MEM) <ref type="bibr" target="#b8">[9]</ref> and the Technology Acceptance Model (TAM) <ref type="bibr" target="#b9">[10]</ref> to structure the variables of this study.</p><p>• Perceived usefulness (PU). The degree to which the subject considers that using iStar 2.0 in SME is effective in achieving its intended objectives. This and the next variable are measured by means of the MEM <ref type="bibr" target="#b8">[9]</ref> and TAM <ref type="bibr" target="#b9">[10]</ref> questionnaires, which uses a 5-point Likert scale format to obtain subject perceptions. • Perceived ease of use (PEOU). The degree to which a subject considers that using iStar 2.0 in SME is free of effort. • Accuracy (ACC). The degree to which all the elements that should appear in specified methods (giving a certain situation) are actually contained in the method specification. To facilitate this calculation, the researchers take into account a reference method containing the minimum indispensable elements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Subjects</head><p>Properly speaking, we plan to perform a quasi-experiment because the subjects were not sampled randomly across the population <ref type="bibr" target="#b10">[11]</ref>. We use convenience sampling, a nonprobability sampling technique for which nearest and most convenient persons are selected for our study. We select subjects with experience with the i* framework, and requirements engineering in general. For categorising the subjects, we plan to run a demographic questionnaire to investigate the following aspects:</p><p>• Experience in years with the i* framework • Experience in years with requirements engineering as a discipline</p><p>• Experience in years with the use of method engineering, method engineering concepts, and SME.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Profession</head><p>• Years of experience • Current and previous roles • Educational degree (PhD, postdoc, etc)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Procedure</head><p>As part of the experimental task, we provide the subjects with two different input cases for using iStar 2.0 in SME (A and B, see Fig. <ref type="figure">2</ref>). Case A is intended to allow subjects to get familiarised with the use of iStar 2.0 for SME. For this, we present a full case to the subjects to explain how iStar 2.0 is used when applying method engineering for reuse and by reuse (see Section 2). The topic selected for case A is related to the design of a requirements elicitation method, since this case must be easy to follow by selected subjects. Once the training case has been presented to the subjects, we make use of the understandability form to evaluate to what extent subjects have familiarised themselves with the use of iStar 2.0 for SME. These results will allow us to better understand the results of specified methods when subjects actually use iStar 2.0 in SME to solve the experimental task B (see step 6 in Fig. <ref type="figure">2</ref>). The topic selected for the experimental task B is the use of crowdsourcing for software engineering (Case B). Case A and Case B are different but are part of the software engineering domain. The design, according to <ref type="bibr" target="#b7">[8]</ref> is a "multi-test within object study", since it examines a single object (case B where iStar 2.0 is used for SME) across a set of subjects (see Table <ref type="table" target="#tab_0">1</ref>).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusion validity.</head><p>Reliability of measures. The understandability, MEM, and TAM questionnaires will be developed to avoid poor question wording. To mitigate possible threats to reliable measures, we will run a pilot to test the questionnaires and measurement tools. There is a risk that the variation in the experimental results related to random heterogeneity of subjects is larger than due to the treatment. We have decided to select a homogenous group of subjects to minimise the risk of having diverse results given individual differences. Nevertheless, we acknowledge that this fact reduces the external validity of the study. Internal validity. Single group threats. Given the fact that we do not consider a control group for this study, there are other possible factors that could cause the possible observed effects. Since we plan to conduct this study in different points in time to maximise the number of subjects, there is a risk that history affects the experimental results. To mitigate this threat, we plan to control the point in time in which each experimental task was conducted. In this way we can determine if a possible threat related to history is present. Given the current experimental design, we acknowledge a maturation threat. Subjects are trained in the use of goals for SME by means of the requirements elicitation case (see Task A in Fig. <ref type="figure">2</ref>). There is the threat that when solving the actual experimental task (see Task B in Fig. <ref type="figure">2</ref>), the subjects are more experts and confident with the treatment. We plan to mitigate this threat by providing subjects with completely different cases that relate to two different contexts in SME.</p><p>Construct validity. Mono-operation bias. Our study includes a single independent variable evaluated through a single case. The cause of the effect might be underrepresented by the prepared experimental task. We plan to pilot the experimental task to ensure the different parts of our object of study are actually evaluated. From a social point of view, it is possible that our subjects could guess what we would like to find as a result of this study. This hypothesis guessing threat is mitigated by specifying various questions for each qualitative variable in the MEM and TAM questionnaires. For measuring accuracy, we plan to design an experimental task where subjects do not need to clearly identify what is the right solution.</p><p>External validity. Since we have selected a homogeneous group from a non-randomised sample, our ability to generalise the results are limited. We acknowledge this threat and we plan to conduct a demographic questionnaire to characterise our population in a proper manner.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Next Steps</head><p>The protocol presented in this paper needs to be refined and executed. For refinement, besides our own further work, we count on the feedback given by reviewers and also on the feedback given by experts from other communities on the quality of the instrument (e.g., using some members of the ISERN 1 network). As usual, we plan to pilot the study before executing it. Once evaluation instruments are ready, we plan to make them available for further replication studies. As for execution, the two most critical points to decide are: the population, and the setting. Concerning the population (that we want with knowledge on i*), one option to explore is to use the iStar workshop itself to execute a first round of the study and then allow for a second round after the workshop (as we did in the past when designing the iStarML interchange format <ref type="bibr" target="#b11">[12]</ref>). Also, if we have the opportunity, we would like to replicate the study in a population without knowledge of i* in order to evaluate the impact of previous knowledge. Concerning the setting, given the current Covid-19 situation, it is difficult to predict how we will run the study, therefore we are keeping all doors open.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .. 5 Pre</head><label>15</label><figDesc>Fig. 1. Experimental procedure</figDesc><graphic coords="4,150.65,515.48,294.00,160.89" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 . Experimental design A set of subjects Input object Experimental task B</head><label>1</label><figDesc></figDesc><table><row><cell>Use iStar 2.0 in SME</cell><cell>Case B</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">International Software Engineering Research Network, https://isern.iese.de/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Situational method engineering</title>
		<author>
			<persName><forename type="first">B</forename><surname>Henderson-Sellers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ralyté</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Ågerfalk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rossi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">iStar 2.0 Language Guide</title>
		<author>
			<persName><forename type="first">F</forename><surname>Dalpiaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Horkoff</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016-05">May 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">OSSAP -A situational method for defining open source software adoption processes</title>
		<author>
			<persName><forename type="first">L</forename><surname>López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Costal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ralyté</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Méndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Annosi</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-39696-5_32</idno>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">9694</biblScope>
			<biblScope unit="page" from="524" to="539" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Using contextual goal models for constructing situational methods</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ralyté</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00847-5_31</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">11157</biblScope>
			<biblScope unit="page" from="440" to="448" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A situational approach for the definition and tailoring of a data-driven software evolution method</title>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-91563-0_37</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">10816</biblScope>
			<biblScope unit="page" from="603" to="618" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">An Empirical Evaluation Roadmap for iStar 2</title>
		<author>
			<persName><forename type="first">L</forename><surname>López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Başak Aydemir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Dalpiaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Horkoff</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">0</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Situational method engineering: Combining assembly-based and roadmap-driven approaches</title>
		<author>
			<persName><forename type="first">I</forename><surname>Mirbel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ralyté</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00766-005-0019-0</idno>
	</analytic>
	<monogr>
		<title level="j">Requir. Eng</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="58" to="78" />
			<date type="published" when="2006-03">Mar. 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Wohlin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wohlin</surname></persName>
		</author>
		<title level="m">Experimentation in software engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">The Method Evaluation Model: A Theoretical Model for Validating Information Systems Design Methods</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Moody</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Perceived usefulness, perceived ease of use, and user acceptance of information technology</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Davis</surname></persName>
		</author>
		<idno type="DOI">10.2307/249008</idno>
	</analytic>
	<monogr>
		<title level="j">MIS Q. Manag. Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="319" to="339" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Real world research : a resource for users of social research methods in applied settings</title>
		<author>
			<persName><forename type="first">C</forename><surname>Robson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Towards interoperability of i* models using iStarML</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cares</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Franch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Susi</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.csi.2010.03.005</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Standards and Interfaces</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="69" to="79" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
