=Paper= {{Paper |id=Vol-69/paper-7 |storemode=property |title=Modelling E-business Security Requirements: Developer and Client Expectations |pdfUrl=https://ceur-ws.org/Vol-69/paper07.pdf |volume=Vol-69 }} ==Modelling E-business Security Requirements: Developer and Client Expectations== https://ceur-ws.org/Vol-69/paper07.pdf
AWRE’2002                                                                                  111


    Modelling E-business Security Requirements: Developer and
                       Client Expectations

                                   Michael N Johnstone
                                   Donald C McDermid
                                    John R Venable*

                        School of Computer and Information Science
                                  Edith Cowan University
                               *School of Information Systems
                              Curtin University of Technology
                                  Perth, Western Australia
                       Email: {m.johnstone, d.mcdermid}@ecu.edu.au
                                 venablej@cbs.curtin.edu.au




Abstract
User perceptions of e-business systems’ security are, at best, that such systems are not as
secure as more traditional ways of doing business. As security is now considered to be so
crucial to e-Business success, the question of how security requirements are identified and
how users can become involved in identifying security requirements for their organisation has
become all the more important. This paper describes some of the results of an interpretive
study into requirements elicitation using the business rules diagram (BRD) method. An
interpretive analysis focusing on security provides some understanding of how users can
contribute to the process of security requirements specification. In the study, users became
active users of the BRD method and diagram in many requirements engineering areas,
including security. A model of cognition is proposed that explains the behaviour that resulted
during the study. The model posits two distinct modes of reasoning, formal and informal, and
shows how movement occurs between the modes as roles and expectations change over time.



Keywords:
Electronic Business, Security, Requirements Modelling, Requirements Elicitation

Introduction
The adoption of the Internet for e-business is hindered by the reticence of some consumers to
take part in transactions due to a perceived lack of security. These concerns are also evident
in businesses anxious to ensure that the integrity of their transactions is maintained. A global
survey by Ernst & Young (2001) found that 66% of the firms surveyed consider the lack of
security or privacy to be the biggest inhibitor to furthering their e-business goals.
A major issue for the design and implementation of web-based systems is how to deal with
the issue of maintaining transaction integrity whilst operating in a stateless environment.
However, this issue need not be a concern during requirements elicitation and engineering.
AWRE’2002                                                                                  112

Another issue for web-based systems development is how to specify web-based security
requirements in a manner that both involves users and allows them to be comfortable with the
process and tools used. The authors are particularly interested in the prospects for the use of
tools and methods (especially diagrams) as a communication mechanism between systems
analysts and users. Diagrams are a central part of many IS development (ISD) methodologies.
However, we believe that the way diagrams are actually used is an area that has not been
investigated in sufficient detail.
From our perspective, it is useful to have a method that integrates security with other aspects
of requirements. The Business Rules Diagram (BRD) developed by McDermid (1998) is a
state-based requirements elicitation and engineering method that can be used to engineer the
requirements of all functional aspects of a system, including its security mechanisms.
The results of the study reported in this paper attempt to address the above issues by exploring
and conceptualising how system developers and their clients model e-business processes. The
interpretive research described in this paper studied the shared use of the BRD (McDermid,
1998) by end-users and analysts in eliciting and modelling the requirements for a
subscription-based e-journal publishing system. As part of this effort, the security-oriented
concerns and elicitation and modelling behaviours of end-users became apparent and are
reported in this paper.
The study reported here focused on the BRD in particular. It is not intended to compare the
BRD with other approaches, which requires a different form of study. While space limitations
prevent a detailed discussion, Johnstone and McDermid (2001) compared the BRD method
with the UML at the analysis level (in terms of the SDLC), with the result that each method
has strengths in different areas and neither method is ontologically complete.
While focused on the BRD, with this paper we also propose more detailed theory about the
use of diagrams in order to improve requirements specification in general and e-business
security requirements specification in particular. We provide some evidence of the validity of
the theories espoused for the BRD, but other studies will be needed to investigate w hether the
theory applies to other methods.

The Role of Diagrams in Systems Development
There is a range of web design methods described in the literature, for example RMM
(Isakowitz et al., 1995), OOHDM (Schwabe and Rossi, 1995) and the Scenario-based
approach of Lee et al. (1999). These methods, however, focus on the design of EC systems
and not on requirements elicitation.
During requirements elicitation and engineering, diagrams serve two main roles. Diagrams
provide a vehicle for external processing (communication) and they facilitate reasoning or
internal processing (through mental models). The use of mental models is well documented
e.g. consider the well-known metaphor of Johnson-Laird (1983, p10) described thus: "human
beings understand the world by constructing working models of it in their minds. Since these
models are incomplete, they are simpler than the entities that they represent. In consequence,
models contain elements that are merely imitations of reality - there is no working model of
how their counterparts in the world operate, but only procedures that mimic their behavior."
As communication mechanisms, diagrams document claims about some situation that the
diagrams model, which are then used for various purposes by the receiver of the diagrammatic
information. In Information Systems Design, a diagrammatic model can describe to clients
what an analyst has learned and act as a vehicle for feedback about the validity or correctness
of that learning. The client is then expected to confirm or disconfirm the validity of the
AWRE’2002                                                                                    113

diagrams. Diagrams are also used to communicate the results of work in one phase of the
system development life cycle to others who do further work in later phases e.g. an entity-
relationship diagram may be passed on from an analyst to a database designer. The different
uses and users of diagrams in Information Systems Design present problems in the design of
diagramming techniques, as described by Moody et al. (1995).
Larkin and Simon (1987, p98) present several reasons for the superiority of diagrams over
other forms of representation, namely that diagrams can group together all information that is
used together; diagrams typically use location to group information and diagrams
automatically support a large number of perceptual inferences. It is this last point that is of
most interest in this research.
Diagrams and systems of diagrams combined with other model representations are used to
facilitate reasoning about requirements during ISD. Commonly, they are checked for
consistency and completeness, i.e. uncovering inconsistencies and gaps in requirements
elicited from users. Systems analysts usually perform these tasks (Bostrom and Thomas,
1983). However, reasoning with diagrams is not limited to systems analysts. It has been
proposed that users may also use diagrams to reason about systems as an aid to discovering
and documenting requirements (DeMarco, 1978). This requires either the development of
notations that are so intuitive that only brief explanation is necessary – or training of users in
how to make use of the diagrams.

Research Aims
The research in this study was part of an action research programme designed to enhance and
evaluate the Business Rules Diagram (BRD) method (McDermid, 1998). The work described
here reinterprets data collected during a study reported in Johnstone et al. (2000), which was
originally conceived to investigate the qualities of BRDs including analysis of e-business
systems.
The development of the BRD method is consonant with the re-emergence of business process
modelling as a tool for understanding the functions within organisations. That, coupled with
the necessity to maintain state information in today’s web-based transactions, suggests that
process-oriented techniques (such as the BRD) may be useful in modelling e-business
systems.

Summary of the BRD Method
A recent approach used to capture business rules is that of McDermid (1998). This approach,
called the Business Rules Diagram (BRD) method, utilises a state-based model which has a
notation similar to, but more powerful than, flowcharts. The BRD is used for eliciting and
analysing the requirements for an information system to support a notional human activity
system (Checkland, 1981). As an information systems development approach, the BRD
method is positioned between the use case approach of Jacobson et al. (1992) and more
complex object models. The steps used in the method to create a complete BRD are defined
as:


   •   identify candidate business rules;
   •   identify candidate events and signals;
   •   identify candidate objects;
AWRE’2002                                                                                      114

     •       construct Object Life Histories (OLHs);
     •       construct User Business Rule Diagram (UBRD);
     •       construct Business Rules Diagrams; and
     •       construct Event Specification Tables (ESTs).


A business rule, as defined by McDermid (1998), contains five explicit constructs, these being
states, events, conditions, signals and blobs (see, for example, figure 1). Connected
combinations of these constructs make up a User Business Rule Diagram (UBRD). States
(circles) reflect the status of a system or one of its components. For example, a visitor to an
electronic journal web site might traverse the states visiting, subscribed and unsubscribed.
Events (rectangles) are actions carried out internally by the organisation. Conditions
(diamonds) define the criteria by which objects of interest in the business move from one state
to the next as events take place and are sometimes known as "if-then rules" in other systems.
Signals (arrows) either enter or leave the human activity system. Signals that enter the system
typically initiate activity within the system and are called triggers (see T5 on figure 1).
Signals that leave the system serve to inform those outside the system boundary about what
has occurred inside the system and are called messages (see M11 on figure 1). The last
construct is the Harel blob (Harel 1988), which encapsulates other constructs and is used to
model selection or simultaneous action. The use of the blob construct in the full BRD
distinguishes the BRD from the UBRD (a precursor diagram).

                   S8
 T5 Change      Subscriber                            Processing
 password        options                                Blob
                  page




                                      C13                 Selection
                  E13 Enter         Current           S12           S8
                   current         password          Current     Subscriber
                  password                          password      options
                                    correct?
                                                   confirmed       page



                                                     M16 Current
                                                     p/w incorrect

                                                                          Selection
                                  E5                                               S33
                    E4                              C11             S15
                               Re-enter                                         Passwords
                   Enter                         Passwords       Passwords
                               password                                            not
                 password                         match?         confirmed
                                                                                confirmed



                                                                      M11 Passwords
                                                                       don't match

                          E33
                                                  S34
                         Commit                         M17 Password
                                               Password
                        password                          changed
                                                changed
                         change




                                 E6
                                                                                     S8
                               Move to                     S6             S7
                                                                                  Subscriber
                                page                      Home           Help
                                                                                   options

                                                               Navigation Blob



         Figure 1: Business Rules Diagram for “Change Password” Use Case.
AWRE’2002                                                                                               115


Research Context
This study describes a project involving the development of a business to consumer (B2C)
subscription-based electronic commerce system for a business group in a large Australasian
University. The domain was that of electronic publishing. A small project team was
established comprising a group of two clients and a trained business analyst (one of the
researchers) acting as the group facilitator. The researcher was skilled in the use of the
method. The first client (henceforth referred to as “Client F”) was a web site developer with
experience in paper-based publishing but no training in any formal (structured) systems
development method. The second client (Client G) was an academic with a strong interest in
web site development but no training (formal or informal) in systems development methods.
Both clients were taught the notation and stages of the BRD method and then attempted to
model the problem situation, aided by the researcher/analyst/facilitator. The group generated
84 business rules across twelve functional areas covering many aspects of journal publication
(both traditional paper-based and electronic). The web site provides a way for non-subscribers
to browse abstracts and journal tables of contents and allows them the option of subscribing
via credit card across the Internet or other, more conventional means. The site also gives
subscribers on-line access to full articles as well as the opportunity to provide an on-line
commentary on selected articles.
The process of the entire action research study is depicted in figure 2. The ISD activities
studied are shown with ovals. The researcher activities are shown with rectangles. Softboxes
(rounded rectangles) show the evidence collected.


                                                          Web Site Requirements
                                                          Sessions
                                      Session 1                                      Prior Situation:

                                      Session 2                                      World views of
   Researcher                                                   expectations       Analyst/Researcher
   Discussion,                        Sessio n 3                about
   Reflection,                                                                             & Clients
    and Re-                              …
                                                                  reflected on
    planning
                                      Session n                                Client Interview
                                                                                     and


        Analyst/Researcher           Session               Interview
             Journal                Transcripts           Transcripts


                             Discussing, Analysing, and
                               Determining Research
                                      Findings
                                             This and other papers



     Figure 2: The research process, evidence collected, and researchers’ analysis during
                this study
AWRE’2002                                                                                      116


Analysis of the Evidence
In this section we discuss themes that emerged from analysing the evidence. To support each
theme, relevant excerpts from interview transcripts are provided together with comments on
those responses. They are discussed under themes entitled:
    •   Ability to define detailed security requirements;
    •   Reasoning about new security requirements;
    •   Recognition of the benefits of diagrams over text;
    •   Ownership of models; and
    •   Re-alignment of client-analyst roles.
Collectively, these themes represent an emerging perspective on client-analyst interaction
during specification using diagrams. The headings are organised in such a manner as to show
growing development or sophistication in the way that clients look at the process. The first
two themes deal with the ability of the diagramming technique to support the e-business
security specification process.

Ability to define detailed security requirements
The following is an excerpt in which Client F confirms that the method assisted him in
modelling the detailed behaviour of the system. Figure 3 is an example of one of the
diagrams referred to in these excerpts.
        (Client F) I've only had some work on the sidelines of e-commerce developments
        through [another firm] but was not primarily involved in either systems creation or
        the planning. I was more involved in ensuring that current and future plans met with
        international and local government criteria.
        I found it [the BRD method] sensible and it broke down what happens in a system into
        a number of parts and it standardises ways of interaction within the system so it is easy
        to understand the specific events in a system and how things change so it seemed
        logical and flexible enough to use.
At another point in the interview Client F is quite explicit in explaining how he used the
method to reason about the complexities of the “rules” of the system, particularly being able
to recognise redundant behaviour as well as extract common behaviour.
One interesting aspect of the first excerpt is in understanding the initial mindset or world view
that the user has of user-analyst interaction. It is clear here that the user had a initial view
that the user is expected to specify the requirements at a high level of abstraction (e.g. by
specifying that something has to “happen” on the website without supplying all details) and
that further it is expected that the analyst will be able to pick this up, and fill in the gaps as it
were. Towards the end of the first excerpt it becomes clear that the user has begun to rethink
that viewpoint – in other words to acknowledge that the user is needed to supply more detail
in requirements.

Reasoning about new security requirements
The above excerpt was a response to questions about whether the diagram helped in defining
the detail of requirements. In themselves, the questions do not specifically ask if the diagram
supports the user in reasoning about the specification as opposed to describing or defining the
specification. The other participant, Client G, said:
AWRE’2002                                                                                                                117

                 (Client G) Oh, I mean, the flow diagram really brought out that, OK, you could
                 actually model the person in your own mind - "OK, I've done this, I've done this, I've
                 done this. Yeah, I...what do I do now?" It brought up questions that said "OK, if I'm
                 the user and I go through this process, what am I missing?". I could easily follow it
                 with the diagram whereas in my site I would put the stuff up, then I would find out as
                 a user, as I tried to use it "hey there is something wrong here". So I'd have to go back
                 and re-change the whole thing - does that make sense? I think that it allowed me to
                 see the sights in more detail and probably in a better flow system than I would if I'd
                 just done my normal method of just trying it out.
From the perspective of a researcher interested in how diagrams and techniques support the
development process, it is observed that here there were shifts in thinking from formal (“the
flow diagram really brought out…”) to informal (“you could actually model the person in
your own mind…”) to formal modes (“I could easily follow it with the diagram…”), an
observation which will be generalised in figure 4 later. The other client exhibited similar
shifts in thinking.

                     S1
                     Un-
  T1 Subscribe    subscribed




                     C1                              C3                              C5
                                    C2                               C4                            S2
  E1 Enter          Name                          Email addr.                      Answer                      S6
  personal                        Address                          Question                      Personal
                   entered?                        entered?                        entered?                   Home
   details                        entered?                         entered?                       details
                                                                                                 entered

     M1 enter                                                                                                  S7
                        M2 enter           M3 enter              M4 enter          M5 enter
      name                                                                                                    Help
                        address           email addr.            question           answer



                                                                                                               S8
                                      E2                C6                                                  Subscriber
                                    Connect             Can               S3                                 options
                                 to credit card       connect?         Connected
                                    provider


                                                      M6 Can't                                                 E6
                                                      transmit                                               Move to
                                                                                                              page



       E3               C7                C8                 C9                C10              S4
      Enter           Credit           Credit card         Expiry             Account       Transaction
   credit card         card             number              date              balance        approved
     details          valid?              ok?               ok?                 ok?



                     M7 Card             M8 Invalid        M9 Wrong         M10 Balance
                     cancelled            card #            exp date         insufficient



          C11                E5                   E4                 S15
        Passwords         Re-enter                                                      M11 Passwords
                                                Enter             Passwords
         match?           password                                                       don't match
                                              password            confirmed




                          S5
                         Sub-          M12
                        scribed      Username




          Figure 3: Business Rules Diagram Modelling the "Subscribe" Use Case.


The preceding excerpts were responses to questions regarding the BRD method and how it
aided the mechanics of specification. The next few excerpts discuss themes of a more
reflective nature that emerged from the interviews.
AWRE’2002                                                                                   118

Recognition of the benefits of diagrams over text
There is a considerable body of literature that expounds the benefits of diagrams as reasoning
tools over text-based (or other) representations. Not surprisingly in this context, several
comments were made by both clients in regard to this view as a means of articulating
specifications. The comments actually arose in answers to other questions i.e. questions not
specific to comparing diagrams to text as a specification medium.
        (Client F)… and so using the diagrams kind of enables people who are planning a site
       like we have been to weed out the kind of wishy-washy talk about "you'll be able to do
       this and you'll be able to do that". It really forces you to think in a very structured and
       coherent way, which is what you need to do to create a structured and coherent site.
       (Client G) It surfaced some of the underlying requirements that hadn't really been
       considered. So it surfaced those requirements and allowed them to sort of … "hey ,
       we've got a gap here. what's the problem. bring it out and see it" ...and also the
       linking of those diagrams because they go into different depths so it also allowed you
       to...you've got one diagram and from that another box that goes into another diagram
       and I found that quite useful 'cause you could then sort of follow the flow and that also
       fits in with what I used to do when I was strategic planning something - you'd do the
       flow diagram and then you'd have a box with a whole complex thing and that would
       be the next level so I was quite comfortable with that.
A point to note about the above excerpts is that the experience of this study encouraged the
clients to reflect upon the relative strengths and weaknesses of text and diagrams as
alternatives for specification. The fact that they chose to bring these observations up in
response to other questions strengthens the “value” of their responses and is indicative of the
level of cognitive reflection (formal/informal) i.e. that they are beginning to critique
alternative types of specification techniques.

Ownership of models
During one of the modelling sessions, client G took the marker pen from the analyst and drew
his own BRD on the whiteboard. This is indicative of both the level of confidence in and the
ownership of the BRD method exhibited by the clients. During the structured interview
session, the analyst asked Client G about this behaviour.
       (Client G) Yes, If Client F has a suggestion, then if he wants to describe it or he can
       do it, so give them pens and get them to do it.
As more diagrams were developed, the clients elected to omit the use case dialogue step and
chose to draw the diagrams directly. The clients also began to model abnormal behaviour
directly. At this stage the clients were able to take full control of the diagram and used it to
reason about the logic of web site navigation. The clients also used the diagram to analyse the
expected interactions between a user and the system as well as using it to check the logic and
validity of the business rules themselves to some extent, although this cross-checking was a
role they generally deferred to the analyst.
The fact that the clients were gaining ownership of the models and indeed of the process is
significant in terms of understanding the degree to which this study was succeeding in its
aims of providing a viable diagramming technique with which to specify requirements. It
demonstrated that the approach was “working” as far as the clients were concerned and also
that the declared semantics of the diagram (being able to support reasoning etc.) appeared to
be correct.
AWRE’2002                                                                                   119

Re-alignment of client-analyst roles
As the ownership of the modelling process was transferred from the analyst to the group, the
rate of progress increased markedly. At this stage the clients were not interested in the precise
syntax of the BRD method and clearly saw that role as being the domain of the analyst as
indicated by:
       (Client G) I know you are the facilitator type thing, but maybe it would be better if
       you let them get it down and then go back and start doing the detail and change it as
       necessary…So rather than you do it and then talk about what you've just done, that
       little bit, let us get it all down, then you back and facilitate the changes.
Here, questions are raised about user and analyst expectations in terms of what roles are
acceptable in a given situation. In attempting to measure the degree of sophistication that the
clients had achieved since the beginning of the study, clearly a shift emerges in the
active/passive relationship between client and analyst and also the level of participation.

Theoretical Explanations
In the previous section, we identified and discussed several themes, which acted to illustrate
how the expectations, roles, and behaviours of the analyst and clients related to, and changed
with, each other. We now propose a simple model of analyst/client interaction to explain the
link between the formal and informal aspects of shared understanding.
We suggest that the model in figure 4 represents the process by which the analyst/researcher
and the clients jointly attempted to perceive, discuss, and agree upon a satisfactory shared
interpretation of the previously unstructured business problem and choose a solution, using
the mechanism of a (semi-)formal diagram or model.                 At the outset, both the
analyst/researcher and the clients brought in their worldviews and expectations of how the
process ought to take place. The process itself used the mechanism of a diagramming
method (the BRD), to achieve a more detailed, precise, correct, and shared understanding of
requirements. This was arrived at through various forms of formal and informal
communication. In order to achieve a shared context, the analyst taught the modelling method
to the clients. This enabled both parties to establish common referents for the problem under
consideration. This is evidence of formal (rational) knowledge transfer. Informal (intuitive)
knowledge transfer also occurred between the analyst/researcher and the clients (as well as
between the clients themselves). This initially took the form of natural language statements.
Gradually, assertions about the business problem began to take the form of more formal
statements using the BRD. However, this doesn’t totally supplant the less formal
communications, as natural language statements are always needed that refer to the
formalisms (BRD in this case) and establish the formal language’s correspondence to the
business situation. Over time, a shared understanding is built using the formal diagram and,
when familiar enough, its capabilities for supporting reasoning lead to its adoption and usage
in the conversation about requirements.
AWRE’2002                                                                                   120




                                                                World views, expectations
                                       Analyst

                                       Informal

                                       Formal


                                                                      The
   Formal and                                                         Business
                              Shared                Changed           Problem
   Informal
                           understanding            behaviour         (unstructured)
   Communications




                                           Formal

                                       Informal

                                           Client               World views, expectations


     Figure 4: A Model of the Analyst/Client Interaction.

Conclusions and Future Research
It is acknowledged that the scale of this study was very small, consisting of a single analyst
and two clients, thus it is not easily generalisable. However, in terms of action research, the
reflective stage following the study provided insight into the nature of the complex
relationships that form during system development. At present, the conceptual model is
perhaps too general, and therefore several other studies in different domains are underway
which will provide further cases and will act to prove or disprove the utility of the model.
These new studies will also address concerns of generalisability. The BRD method is also
being extended in these studies to cover further phases of the SDLC.
We have presented an analysis of the nature of analyst/client interaction within the context of
defining requirements for an e-business electronic journal application using a particular
systems development method, the BRD method. We have identified a number of aspects of
the interaction in terms of web site security that may not have surfaced with a design-oriented
development method, such as those commonly used in the development of web-based
systems. We have also suggested new and extended existing theory that provides generalised
explanations of the findings.
At the beginning of the study, the various actors had expectations about the process. The
analyst/researcher had his expectations about how the tasks would proceed, what roles the
others would play, and how the technology (the BRD method) would be employed. The
clients also had their own expectations. To some extent these expectations were set by the
organisation. These expectations were then negotiated into ways of working with the
diagrams that evolved over time. In some cases, this resulted in changed behaviour as was
evidenced by the clients taking control of some tasks. At the same time, the diagram itself
evolved as the BRD method was modified. This then caused further re-negotiations. Thus,
over time, the expectations of people, their changing roles of the tasks within the BRD
method, and the diagram itself were negotiated and re-negotiated. In addition to, but
AWRE’2002                                                                                121

concomitant with this, we believe we observed a shift in the way that users perceived the
requirements elicitation process from a relatively simplistic and naïve position in which the
role of users was essentially one of providing requirements information, to a more
sophisticated and mature position in which it is recognised that requirements are often
unclear, uncertain and problematic and that sharing, negotiation and compromise through
modelling is a more productive and effective requirements elicitation process.
We strongly suggest that further qualitative, interpretive, and detailed research is needed on
the BRD and other diagrammatic techniques and methods to further explore their use in
practice as a means for improving their use and design – particularly with respect to the
increasingly critical domain of e-business security requirements specification. Across-method
research is also needed before we can generalise the findings of this research to other
diagrammatic methods.

References
Bostrom, R. P., and Thomas, R. D. (1983). ‘Achieving excellence in communications: a key
     to developing complete, accurate, and shared requirements’. Communications of the
     ACM. 11, pp1-13.
Checkland, P. (1981) Systems Thinking, Systems Practice. John Wiley & Sons.
DeMarco, T. (1978). Structured Analysis and System Specification. Englewood Cliffs, New
    Jersey: Prentice-Hall.
Ernst & Young (2001). Information Security Survey 2001.
Harel, D. (1988). On Visual Formalisms, Communications of the ACM, 31(5), pp. 514-530.
Isakowitz, T., Stohr, E. A., and Balasubranamian, P. (1995). ‘RMM: A Methodology for
     Structured Hypermedia Design’. Communications of the ACM, 38(8), pp34-44.
Jacobson, I., Christerson, M., Jonsson, P., and Övergaard. G. (1992). Object-Oriented
     Software Engineering. Reading, MA: Addison-Wesley.
Johnson-Laird, P. N. (1983). Mental Models. Cambridge, Massachusetts: Harvard University
     Press.
Johnstone, M.N., McDermid, D.C. and Venable, J.R. (2000) Teaching an New Dog Old
     Tricks: Modelling Electronic Commerce with Business Rules, in Gable, G. and Vitale,
     M. (eds), Proceedings of the 11th Australasian Conference on Information Systems.
     Brisbane, Queensland.
Johnstone, M.N., and McDermid, D.C. (2001) Using Ontological Ideas to Facilitate the
     Comparison of Requirements Elicitation Methods, in Finnie, G., Cecez-Kecmanovic, D.
     and Lo, B. (eds), Proceedings of the 12th Australasian Conference on Information
     Systems. Coffs Harbour, NSW.
Larkin, J. and Simon, H. A. (1987) Why a diagram is (sometimes) worth ten thousand words.
     Cognitive Science, 11, pp. 65-99.
Lee, H., Lee, C., and Yoo, C. (1999). ‘A Scenario-based Object-oriented Hypermedia Design
     Methodology’. Information & Management, 36, pp121-38.
McDermid, D. C. (1998) The Development of the Business Rules Diagram, PhD thesis, Curtin
    University of Technology.
AWRE’2002                                                                          122

Moody, D., Simsion, G., Shanks, G., Olson, N., and Venable, J. (1995) Stakeholder
    Perspectives in Conceptual Modelling, Proceedings of the 6th Australasian Conference
    on Information Systems, Curtin University, Perth, Western Australia, 26-29 September
    1995, pp. 187-205.
Schwabe, D., and Rossi, G. (1995). ‘The Object-Oriented Hypermedia Design Model’.
    Communications of the ACM, 38(8), pp45-46.