<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Qualitative, Interactive Evaluation Procedure for Goal- and Agent-Oriented Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jennifer Horkoff</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eric Yu</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Faculty of Information, University of Toronto, Canada jenhork @ cs.utoronto.ca</institution>
          ,
          <addr-line>yu @ ischool.utoronto.ca</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2009</year>
      </pub-date>
      <fpage>19</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>Applying systematic analysis procedures to early requirements models can test the satisfaction of stakeholder goals and facilitate an evaluation of design alternatives. We introduce a qualitative and interactive model evaluation procedure for goal and agent-oriented models. In applying the procedure to a variety of case studies we found that the interactive nature of the procedure prompts model iteration, producing higher quality models.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Introduction
Goal- and agent-oriented modeling frameworks, such as i* [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], have been used to
perform “Early” Requirements Engineering (ERE), advocating for modeling and
exploration of the socio-technical domain before focusing on detailed system
functionality. In order to analyze such models, systematic analysis procedures are
needed, considering the chain of effects, propagating among goals and functionalities
throughout the network in a consistent way. The primary aim of such analysis is to
determine whether stakeholder’s goals can be achieved, given domain assumptions.
      </p>
      <p>
        The informal and incomplete nature of goal models calls for analysis procedures
which are interactive, qualitative, and simple to apply. We introduce such a
procedure for goal- and agent-oriented models. We describe the specifics of the
procedure in terms of the i* Framework, although the procedure can potentially be
applied to other similar models. The procedure is adapted from an evaluation
procedure originating from the NFR Framework [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. We expand on this work by
clearly describing the application of the procedure, taking into account agent-related
features, and examining the procedure’s role in model iteration. We discuss the
procedure’s benefits by briefly describing its application to various case studies.
As the flexibility of goal- and agent-oriented modeling allows application in many
stages of system development, different analysis approaches may be more appropriate
for different stages. For early-stage modeling, where specific quantitative measures
are scarce, qualitative, interactive evaluation is appropriate. Evaluation in the NFR
Framework propagates qualitative labels throughout a Softgoal Interdependency
Graph (SIG), prompting the user to resolve conflicts [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Case study experience has
found human intervention in the NFR procedure to be too restrictive, automatically
propagating conflicts and unknown values when the evaluator would prefer to have
input. Previous work assumed that the NFR procedure could be easily extended for
use with i*, without describing extensions to support additional syntax (e.g., [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]).
      </p>
      <p>
        Giorgini et al. have introduced qualitative and quantitative procedures for goal
model analysis which separately propagate negative and positive evidence, are fully
automated, and work in a forwards and backwards direction [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Recent work on
GRL [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], a variant of i*, includes several evaluation methods, ranging from
quantitative to qualitative. The full automation in these procedures does not give the
evaluator freedom to make decisions in the presence of conflicting, partial or
unknown information. The hard-coded rules used to resolve softgoals often result in
the proliferation of conflicts or partial values. Where quantitative values are not
derived from domain measures, they can be viewed as fine-grained qualitative
judgments. There is danger that users may place an undeserved amount of confidence
in the computed results, associating them with mathematical precision.
      </p>
      <p>
        For later stages of system analysis, where quantitative information is known and
where models are relatively stable, fully automated and quantitative evaluation can be
appropriate. Example methods more appropriate for this later-stage evaluation
include evaluation in the KAOS Framework [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the analysis of property metrics over
the structure of goal- and agent- oriented models [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], planning and simulation over
goal- and agent-oriented models [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and checks of properties over goal models [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
3
      </p>
      <p>
        The Qualitative, Interactive Evaluation Procedure
The procedure is designed to be applied either manually or semi-automatically. Here,
we focus on describing the procedure so that it can be applied manually. In order to
concretely describe the procedure, we apply it to the i* Framework [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This
Framework facilitates exploration of the system domain, emphasizing social aspects
by providing a graphical depiction of system actors, their intentions, dependencies,
and alternatives. The social aspect is represented by actors, who depend upon each
other for the accomplishment of tasks, the provision of resources, and the satisfaction
of goals and softgoals, goals without clear-cut criteria for satisfaction. Actors can be
“opened-up” using actor boundaries containing the desired elements (goals, softgoals,
tasks, and resources) of the actor. The interrelationships between elements inside an
actor are depicted with Decomposition links, showing elements necessary to
accomplish a task; Means-Ends links, showing alternative tasks to accomplish a goal;
and Contribution links, showing the effects of elements on softgoals.
Positive/negative contributions representing evidence which is strong enough to
satisfy/deny a softgoal are represented by Make/Break links. Contributions that are
not sufficient to satisfy/deny a softgoal are represented by Help/Hurt links.
      </p>
      <p>Procedure Overview: The proposed procedure starts with an analysis question
such as “How effective is this design option with respect to the desired goals?” The
procedure makes use of a set of qualitative evaluation labels, assigned to elements to
express their degree of satisfaction or denial. The process starts by assigning initial
label values to model elements representing the analysis question. These values are
propagated through the model links using defined rules. Human judgment is needed
when multiple conflicting or partial values must be combined to determine the
satisfaction or denial of a softgoal. The final satisfaction and denial values for the
elements of each actor are analyzed in light of the original question. An assessment is
made as to whether the design choice is satisficed (“good enough”), likely stimulating
further analysis and potential model refinement. More detail can be found in [10].</p>
      <p>Detailed Steps: We first provide the steps of the evaluation procedure, followed
by detailed explanation of the concepts.
1. Initiation: The evaluator decides on an analysis question and applies the initial
evaluation labels to the model. The initial values are added to a label queue.</p>
      <p>Iteratively, until the label queue is empty or a cycle is found:
2. Propagation: The evaluation labels in the label queue are propagated
through all outgoing adjacent model links. Resulting labels propagated through
non-contribution links are placed in the label queue. Results propagated through
contribution links are placed into a “label bag” for that element.
3. Softgoal Resolution: Label bags are manually resolved, producing a single
result label which is added to the label queue.
4. Analysis: The final results are examined to find an answer to the analysis
questions. Issues with the model can be discovered, prompting further analysis.</p>
      <p>Model Syntax: The procedure assumes that models are well-formed. However, as
propagation is dependent on link and not element type, most models can be evaluated.</p>
      <p>Qualitative Evaluation Labels: We adopt the qualitative labels used in NFR
evaluation (Table 1). The (Partially) Satisfied label represents the presence of
evidence which is (insufficient) sufficient to satisfy an element. Partially denied and
denied have the same definition with respect to negative evidence. Conflict indicates
the presence of both positive and negative evidence of roughly the same strength.
Unknown represents the situation where there is evidence, but its effect is unknown.
We introduce the “None” label to indicate a lack of any label. We adopt the use of
partial labels for non-softgoals to allow for greater expressiveness.</p>
      <p>Initial Evaluation Values: In order to start an evaluation of a model, a set of
initial evaluation values must be placed on the model, reflecting a particular analysis
question, comprising Step 1 of the procedure. Often, initial values are placed on
“leaf” elements in the model, elements that do not receive input from other elements.
However, initial values can also be placed on non-leaf elements. In this case, we
avoid overriding the initial labels with subsequent propagation.</p>
      <p>Evaluation Propagation Rules: We define rules in order to facilitate a standard
propagation of values given a link type and contributing label in Step 2 of the
procedure. Here, we must define how evaluation values should be propagated
through link types that are in i* but not in the NFR framework, namely, Means-Ends,
Decomposition, and Dependency links. The nature of a Dependency indicates that if
the dependee is satisfied then the dependum will be satisfied, and so will the
depender. Decomposition links depict the elements necessary to accomplish a task,
indicating the use of an AND relationship, selecting the "minimum" value amongst all
of the values. Similarly, the Means-Ends link depicts the alternative tasks which are
able to satisfy a goal, indicating an OR relationship, taking the maximum values of</p>
      <p>Contribution Link Type
Make Help Some+ Break</p>
    </sec>
    <sec id="sec-2">
      <title>Hurt</title>
    </sec>
    <sec id="sec-3">
      <title>Some</title>
    </sec>
    <sec id="sec-4">
      <title>Unkn.</title>
      <p>elements in the relation. To increase flexibility, the OR is interpreted to be inclusive.
We expand the order of the values presented in the NFR Framework to allow for
partial values, producing: None &lt; &lt; &lt; &lt; &lt; &lt;</p>
      <p>We adopt the contribution links propagation rules from the NFR procedure.
These rules intuitively reflect the semantics of contribution links. Note that the
“None” label is not propagated or placed in the label queue.</p>
      <p>Resolving Multiple Contributions: Softgoals are often the recipient of multiple
contribution links. We adopt the notion of a “Label Bag” from the NFR Framework,
used to store all incoming labels for a particular softgoal. Labels in the bag are
combined into a single label in Step 3, either by identifying specific cases where the
label can be determined without judgment (Table 2), or by human judgment.
Label Bag Contents Resulting Label
1. The bag has only one label : {&lt;v, es&gt;} the label: v
2. The bag has multiple full labels of the same polarity, and no the full label:
other labels. Ex: { , , } or { , }
3. All labels in the bag are of the same polarity, and a full label is the full label:
present. Ex: { , , } or { , }
4. The previous human judgment produced or , and a new the full label:
contribution is of the same polarity
or
or
or</p>
      <p>Human Judgment in Evaluation: Human judgment is used to decide on a label
for softgoals in Step 3, for the cases not covered in Table 2. Human judgment may be
as simple as promoting partial values to a full value, or may involve combining many
sources of conflicting evidence. When making judgments, domain knowledge related
to the destination and source elements should be used.</p>
      <p>Combinations of Links: Elements in i* are often the destination of multiple types
of links. “Hard” links (Decomposition, Means-Ends and Dependency) are combined
using an AND of the final results of each link type. If Contribution and Dependency
links share the same destination, the result of the Dependency links are treated as a
Make contribution, considered with the other contributions in the label bag.</p>
      <p>Incomplete Labels: In the procedure, information present in each step is
propagated, even if this information in incomplete, i.e., other incoming contributions
are missing. As a result, the same element may receive multiple evaluation labels in
pl eH PC Products Allow
Peer</p>
      <sec id="sec-4-1">
        <title>Desirable</title>
        <p>to-Peer</p>
      </sec>
      <sec id="sec-4-2">
        <title>Technology</title>
        <p>one evaluation, and the same softgoal may require human judgment multiple times.</p>
        <p>Detecting Cycles: Goal models often contain cycles, values which indirectly
contribute to themselves and may cause fluctuating values. Experience has shown
that the presence of cycles becomes apparent to the evaluator after a few iterations.</p>
        <p>Example: We provide a simplified example from the Trusted Computing (TC)
Case Study [10] in Fig. 1. This model depicts a simplistic view of the TC domain,
showing the intentions of the PC User, the PC Product Provider and the Data Pirate. In
our example evaluation, we ask: “If the PC User Obtains PC Products from the Data
Pirate, how does this affect the PC Product Provider’s ability to Sell PC Products for
Profit?” Initial values are circled and human judgment is annotated in the model.</p>
        <p>In this example, when PC Products are Obtained from the Data Pirate, PC Products are
Obtained Affordably, but the PC Product Provider does not Sell PC Products for Profit.
Further rounds of evaluation and model iteration are needed. In this simple model,
analysis results may be apparent without applying explicit procedures. However, in
larger goal models results are not apparent and are difficult to derive consistently.
 </p>
      </sec>
      <sec id="sec-4-3">
        <title>PC Products</title>
      </sec>
      <sec id="sec-4-4">
        <title>Be Obtained</title>
      </sec>
      <sec id="sec-4-5">
        <title>PC User</title>
      </sec>
      <sec id="sec-4-6">
        <title>Affordable</title>
      </sec>
      <sec id="sec-4-7">
        <title>PC Products</title>
        <p>D PCbyULsiecresnAsibnigdeD</p>
      </sec>
      <sec id="sec-4-8">
        <title>Regulations</title>
      </sec>
      <sec id="sec-4-9">
        <title>Abide By</title>
      </sec>
      <sec id="sec-4-10">
        <title>Licensing</title>
      </sec>
      <sec id="sec-4-11">
        <title>Regulations PC</title>
      </sec>
      <sec id="sec-4-12">
        <title>Products</title>
      </sec>
      <sec id="sec-4-13">
        <title>Data Pirate</title>
        <p> </p>
        <p>ProPdCuct Sell PC
Provider Products for</p>
      </sec>
      <sec id="sec-4-14">
        <title>Profit</title>
      </sec>
      <sec id="sec-4-15">
        <title>Profit</title>
      </sec>
      <sec id="sec-4-16">
        <title>Produce PC</title>
      </sec>
      <sec id="sec-4-17">
        <title>Products</title>
      </sec>
      <sec id="sec-4-18">
        <title>PC Users Abide</title>
        <p>by Licensing</p>
      </sec>
      <sec id="sec-4-19">
        <title>Regulations</title>
      </sec>
      <sec id="sec-4-20">
        <title>Allow Peerto-Peer</title>
      </sec>
      <sec id="sec-4-21">
        <title>Technology</title>
      </sec>
      <sec id="sec-4-22">
        <title>Purchase</title>
      </sec>
      <sec id="sec-4-23">
        <title>PC Products</title>
      </sec>
      <sec id="sec-4-24">
        <title>Obtain PC</title>
      </sec>
      <sec id="sec-4-25">
        <title>Products from</title>
      </sec>
      <sec id="sec-4-26">
        <title>Data Pirate</title>
        <p>Benefits of applying the procedure described in this work include both the ability to
answer strategic questions and the means to iterate upon and improve the quality of
the model and subsequent domain understanding. For example, in a case study
involving a large social service organization [12], the procedure was applied manually
to large models to evaluate the effectiveness of various technologies. Results showed
that a wiki was not effective in satisfying the goals of the organization, while a
discussion forum showed more promise. In another example, when applying the
procedure to the TC case study, the model appeared to be sufficiently complete;
however, analysis of the TC Opponent point of view revealed that PC Users would
not buy TC Technology. However, the makers of TC Technology must have
envisioned some way in which users would accept their product. This result
prompted model changes, adding factors such as product lock-in.</p>
        <p>In this work, we have introduced a relatively simple analysis procedure which
builds on the NFR procedure, providing specific instructions for manual application,
and expanding the algorithm to deal with i*-specific constructs. We have highlighted
the benefits of such a procedure, including analysis, and model iteration.</p>
        <p>
          This work can be expanded in several ways. For example, evaluating the
satisfaction of actors, as in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and expanding to “top-down” or backwards analysis
[13]. A version of the procedure is currently being re-implemented in the OpenOME
Tool [14]. We are in the process of administering experiments to further test the
procedure’s ability to facilitate analysis and provoke model iteration.
        </p>
        <p>Acknowledgements: Financial support has been provided by Bell University
Laboratories and the Ontario Graduate Scholarship Program.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering</article-title>
          .
          <source>In 3rd IEEE International Symposium on Requirements Engineering (RE'97)</source>
          , pp.
          <fpage>226</fpage>
          --
          <lpage>235</lpage>
          . IEEE Press, New York (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Chung</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nixon</surname>
            ,
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , J.:
          <article-title>Non-Functional Requirements in Software Engineering</article-title>
          . Kluwer Academic Publishers, Norwell, MA (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Designing Information Systems in Social Context: A Goal and Scenario Modelling Approach</article-title>
          .
          <source>Information Systems</source>
          .
          <volume>29</volume>
          (
          <issue>2</issue>
          ),
          <fpage>187</fpage>
          --
          <lpage>203</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sebastiani</surname>
          </string-name>
          , R.:
          <article-title>Simple and Minimum-Cost Satisfiability for Goal Models</article-title>
          . In: Persson,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Stirna</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds)
          <article-title>CAiSE 2004</article-title>
          . LNCS, vol.
          <volume>3084</volume>
          , pp.
          <fpage>20</fpage>
          -
          <issue>3</issue>
          -5. Springer, Heidelberg (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Amyot</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghanavati</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horkoff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Mussbacher</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peyton</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Evaluating Goal Models within the Goal-oriented Requirement Language. (Submitted manuscript)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Letier</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lamsweerde</surname>
            ,
            <given-names>A. van:</given-names>
          </string-name>
          <article-title>Reasoning about Partial Goal Satisfaction for Requirements and Design Engineering</article-title>
          ,
          <source>In: 12th ACM International Symposium on the Foundations of Software Engineering (FSE'04)</source>
          , pp.
          <fpage>53</fpage>
          --
          <lpage>62</lpage>
          . ACM, New York (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Franch</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>On the Quantitative Analysis of Agent-Oriented Models</article-title>
          : In Dubois, E.,
          <string-name>
            <surname>Pohl</surname>
            ,
            <given-names>K</given-names>
          </string-name>
          . (eds) CAiSE'
          <fpage>06</fpage>
          . LNCS, vol.
          <volume>4001</volume>
          , pp.
          <fpage>495</fpage>
          --
          <lpage>509</lpage>
          . Springer, Heidelberg (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gans</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarke</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lakemeyer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmitz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Deliberation in a Modeling and Simulation Environment for Inter-organizational Networks</article-title>
          . In: Eder J.,
          <string-name>
            <surname>Missikoff</surname>
            <given-names>M</given-names>
          </string-name>
          . (eds),
          <source>Proceedings CAiSE'03. LNCS</source>
          , vol.
          <volume>2681</volume>
          , pp.
          <fpage>242</fpage>
          --
          <lpage>257</lpage>
          , Springer, Heidelberg (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Fuxman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pistore</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Traverso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Model Checking Early Requirements Specifications in Tropos</article-title>
          .
          <source>In Fifth IEEE International Symposium on Requirements Engineering (RE01)</source>
          . pp.
          <fpage>174</fpage>
          -
          <lpage>181</lpage>
          . IEE Press, New York (
          <year>2001</year>
          )
          <fpage>10</fpage>
          .
          <string-name>
            <surname>Horkoff</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>An Evaluation Algorithm for the i* Framework</article-title>
          .
          <source>Master's Thesis</source>
          , Department of Computer Science, University of Toronto (
          <year>2006</year>
          )
          <fpage>11</fpage>
          .
          <string-name>
            <surname>Horkoff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analyzing Trust in Technology Strategies</article-title>
          . In: International Conference on Privacy,
          <source>Security and Trust (PST</source>
          <year>2006</year>
          ). pp.
          <fpage>21</fpage>
          --
          <lpage>32</lpage>
          . (
          <year>2006</year>
          )
          <fpage>12</fpage>
          .
          <string-name>
            <surname>Strohmaier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horkoff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aranda</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Easterbrook</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Can Patterns improve i* Modeling? Two Exploratory Studies</article-title>
          . In: Paech,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Rolland</surname>
          </string-name>
          , C. (eds) REFSQ'
          <fpage>08</fpage>
          . LNCS, vol.
          <volume>5025</volume>
          , pp.
          <fpage>153</fpage>
          --
          <lpage>167</lpage>
          . Springer, Heidelberg (
          <year>2008</year>
          )
          <fpage>13</fpage>
          .
          <string-name>
            <surname>Horkoff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Qualitative</surname>
          </string-name>
          , Interactive,
          <source>Backward Analysis of i* Models. In: 3rd International i* Workshop</source>
          . pp.
          <fpage>43</fpage>
          -
          <lpage>46</lpage>
          , CEUR-WS.org (
          <year>2008</year>
          )
          <article-title>14</article-title>
          .OpenOME, https://se.cs.toronto.edu/trac/ome/wiki
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>