Skip to main content
Log in

Designing socio-technical systems: from stakeholder goals to social networks

  • Original Article
  • Published:
Requirements Engineering Aims and scope Submit manuscript

Abstract

Software systems are becoming an integral part of everyday life influencing organizational and social activities. This aggravates the need for a socio-technical perspective for requirements engineering, which allows for modelling and analyzing the composition and interaction of hardware and software components with human and organizational actors. In this setting, alternative requirements models have to be evaluated and selected finding a right trade-off between the technical and social dimensions. To address this problem, we propose a tool-supported process of requirements analysis for socio-technical systems, which adopts planning techniques for exploring the space of requirements alternatives and a number of social criteria for their evaluation. We illustrate the proposed approach with the help of a case study, conducted within the context of an EU project.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. http://www.serenity-project.org/.

  2. Most of the planning algorithms return a (partially) ordered sequence of actions as a resulting plan.

  3. Another related approach is planning with preferences (see, e.g. [5]). However, for reasons similar to those for the planning metrics case, most plan evaluation criteria discussed in this section cannot be incorporated into planning with preferences.

  4. By action removal we mean, for instance, temporal unavailability of an actor or the failure of a communication link.

  5. This is not always the case, as sometimes actors may want the workload to be the maximum they can handle, e.g. in looking for the reward like salary increase or a the recognition of the boss/colleagues.

References

  1. Albers S, Eilts S, Even-Dar E, Mansour Y, Roditty L (2006) On Nash equilibria for a network creation game. In: SODA’06, pp 89–98

  2. Anderson JS, Fickas S (1989) A proposed perspective shift: viewing specification design as a planning problem. In: IWSSD’89 pp 177–184

  3. Anshelevich E, Dasgupta A, Tardos E, Wexler T (2003) Near-optimal network design with selfish agents. In: STOC’03, pp 511–520

  4. Asnar Y, Bryl V, Giorgini P (2006) Using risk analysis to evaluate design alternatives. In: AOSE’06 post-proceedings, vol 4405. Springer, Heidelberg, pp 140–155

  5. Baier J, Bacchus F, McIlraith S (2007) A heuristic search approach to planning with temporally extended preferences. In: IJCAI’07, pp 1808–1815

  6. Biffl S, Aurum A, Boehm B, Erdogmus H, Grünbacher P (2005) Value-based software engineering. Springer, New York

    Google Scholar 

  7. Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004) Tropos: an agent-oriented software development methodology. JAAMAS 8(3):203–236

    Google Scholar 

  8. Bresciani P, Giorgini P, Mouratidis H, Manson G (2004) Multi-agent systems and security requirements analysis. In: Software engineering for multi-agent systems II, Springer, Heidelberg, pp 35–48

  9. Bryl V, Giorgini P (2006) Self-configuring socio-technical systems: redesign at runtime. In: SOAS’06

  10. Bryl V, Giorgini P, Mylopoulos J (2006) Designing cooperative IS: exploring and evaluating alternatives. In: CoopIS’06, pp 533–550

  11. Bryl V, Giorgini P, Mylopoulos J (2007) Supporting requirements analysis in Tropos: a planning-based approach. In: PRIMA’07

  12. Bryl V, Massacci F, Mylopoulos J, Zannone N (2006) Designing security requirements models through planning. In: CAiSE’06, pp 33–47

  13. Castillo L, Fdez-Olivares J, Gonzalez A (2003) Integrating hierarchical and conditional planning techniques into a software design process for automated manufacturing. In: ICAPS’03, pp 28–39

  14. Chung LK, Nixon BA, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer, Dordrecht

  15. Dardenne A, van Lamsweerde A, Fickas S (1993) Goal-directed requirements acquisition. Sci Comput Program 20:3–50

    Article  MATH  Google Scholar 

  16. Dash RK, Jennings NR, Parkes DC (2003) Computational mechanism design: a call to arms. IEEE Intell Syst 18(6):40–47

    Article  Google Scholar 

  17. Davidson M, Garagnani M (2002) Pre-processing planning domains containing language axioms. In: PlanSIG’02, pp 23–34

  18. Edelkamp S, Hoffmann J (2004) PDDL2.2: The language for the classical part of the 4th international planning competition. Technical Report 195, University of Freiburg, Germany

  19. Emery F (1959) Characteristics of socio-technical systems. Tavistock, London

    Google Scholar 

  20. Fox M, Long D (2003) PDDL2.1: an extension to PDDL for expressing temporal planning domains. JAIR 20:61–124

    MATH  Google Scholar 

  21. Franch X (2006) On the quantitative analysis of agent-oriented models. In: CAiSE’06, pp 495–509

  22. Gans G, Jarke M, Kethers S, Lakemeyer G (2001) Modeling the impact of trust and distrust in agent networks. In: AOIS’01, pp 45–58

  23. Garagnani M (2000) A correct algorithm for efficient planning with preprocessed domain axioms. Research and Development in Intelligent Systems XVII, Springer, Heidelberg, pp 363–374

  24. Garzetti M, Giorgini P, Mylopoulos J, Sannicolò F (2002) Applying Tropos methodology to a real case study: complexity and criticality analysis. In: WOA’02, pp 7–13

  25. Gazen BC, Knoblock CA (1997) Combining the expressivity of UCPOP with the efficiency of Graphplan. In: ECP’97, pp 221–233

  26. Gerevini A, Long D (2005) Plan constraints and preferences in PDDL3. Technical Report RT 2005-08-47, University of Brescia, Italy

  27. Ghallab M, Howe A, Knoblock C, McDermott D, Ram A, Veloso M, Weld D, Wilkins D (1998) PDDL—the planning domain definition language. In: AIPS’98

  28. Giacomo GD, Lesperance Y, Levesque HJ (2000) ConGolog, a concurrent programming language based on the situation calculus. Artif Intell 121(1–2):109–169

    Article  MATH  Google Scholar 

  29. Giorgini P, Mylopoulos J, Nicchiarelli E, Sebastiani R (2002) Reasoning with goal models. In: ER’02, pp 167–181

  30. Gross D, Yu ESK (2001) From non-functional requirements to design through patterns. Requir Eng 6(1):18–36

    Article  MATH  MathSciNet  Google Scholar 

  31. Kaiya H, Shinbara D, Kawano J, Saeki M (2005) Improving the detection of requirements discordances among stakeholders. Requir Eng 10(4):289–303

    Article  Google Scholar 

  32. Koehler J, Nebel B, Hoffmann J, Dimopoulos Y (1997) Extending planning graphs to an ADL subset. In: ECP’97, pp 273–285

  33. Koutsoupias E, Papadimitriou C Worst-Case Equilibria. In: STACS’99

  34. Lai K, Feldman M, Stoica I, Chuang J (2003) Incentives for cooperation in peer-to-peer networks. In: Workshop on economics of peer-to-peer systems

  35. Letier E, van Lamsweerde A (2004) Reasoning about partial goal satisfaction for requirements and design engineering. SIGSOFT Softw Eng Notes 29(6):53–62

    Article  Google Scholar 

  36. LPG Homepage. LPG-td Planner. http://zeus.ing.unibs.it/lpg/

  37. Moscibroda T, Schmid S, Wattenhofer R (2006) On the topologies formed by selfish peers. In: PODC’06, pp 133–142

  38. Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256

    Article  MATH  MathSciNet  Google Scholar 

  39. Osborne MJ, Rubinstein A (1994) A course in game theory. MIT Press, USA

  40. Peer J (2005) Web service composition as AI planning—a survey. Technical report, University of St. Gallen, Switzerland

  41. Polleres A (2003) Advances in answer set planning. PhD thesis, Vienna University of Technology, Austria

  42. Potts C, Newstetter WC (1997) Naturalistic inquiry and requirements engineering: reconciling their theoretical foundations. In: RE’97, p 118

  43. Ropohl G (1999) Philosophy of socio-technical systems. Soc Philos Technol 4(3):55–71

    Google Scholar 

  44. Security and Dependability Tropos Tool. http://sesa.dit.unitn.it/sistar_tool/

  45. Serenity: System Engineering for Security and Dependability. Deliverable A1.D2.1. Security and Privacy Requirements at Organizational Level. http://www.serenity-forum.org/Work-package-1-2.html

  46. Simon HA (1969) The science of the artificial. MIT Press, USA

  47. Sommerville I (2004) Software engineering, 7th edn. Addison-Wesley, USA

  48. Sutcliffe AG, Minocha S (1999) Linking business modelling to socio-technical system design. In: CAiSE’99. pp 73–87

  49. van Lamsweerde A (2000) Requirements engineering in the year 00: a research perspective. In: ICSE’00, pp 5–19

  50. Walker GH, Stanton NA, Salmon PM, Jenkins DP (2008) A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theor IssuesErgonomics Sci 9(6):479–499

    Google Scholar 

  51. Weiss M, Amyot D, Mussbacher G (2006) Formalizing architectural patterns with the goal-oriented requirement language. In: VikingPLoP’06

  52. Weld DS (1999) Recent advances in AI planning. AI Mag 20(2):93–123

    Google Scholar 

  53. Yu ESK (1996) Modelling strategic relationships for process reengineering. PhD thesis, University of Toronto, Canada

  54. Zannone N (2006) A requirements engineering methodology for trust, security, and privacy. PhD thesis, University of Trento, Italy

Download references

Acknowledgments

We thank the anonymous reviewers for the valuable comments and suggestions. This work has been partially funded by EU Commission through the SERENITY project, by MEnSA-PRIN project, and by the Provincial Authority of Trentino through the STAMPS project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Volha Bryl.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bryl, V., Giorgini, P. & Mylopoulos, J. Designing socio-technical systems: from stakeholder goals to social networks. Requirements Eng 14, 47–70 (2009). https://doi.org/10.1007/s00766-008-0073-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00766-008-0073-5

Keywords

Navigation