Advertisement

Tacit Knowledge in Software Evolution

  • Jan Ole JohanssenEmail author
  • Fabien Patrick Viertel
  • Bernd Bruegge
  • Kurt Schneider
Open Access
Chapter
  • 4.1k Downloads

Abstract

This chapter describes two perspectives on the identification and externalisation of tacit knowledge, that is expertise that is difficult to verbalise, within long-living and continuously evolving systems. During the design time of a software system, heuristics and machine learning classifiers can be used to identify and externalise tacit knowledge. For instance, externalised tacit security knowledge supports requirement engineers to understand security-related requirements. During the run time of a software system, tacit knowledge about a system’s usability can be captured through monitoring user interactions. The identification and extraction of tacit usage knowledge can improve usability-related aspects and even trigger new functional requirement requests.

References

  1. [Alk+17a]
    Rana Alkadhi et al. “Rationale in Development Chat Messages: An Exploratory Study”. In:Proceedings of the 14th International Conference on Mining Software Repositories MSR ’17. Buenos Aires, Argentina: IEEE Press, 2017, pp. 436–446.isbn: 978-1-5386-1544-7. https://doi.org/10.1109/msr.2017.43.
  2. [Alk+17b]
    Rana Alkadhi et al. “REACT: An Approach for Capturing Rationale in Chat Messages”. In:11th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM’17). Toronto, Ontario, Canada: IEEE, 2017. https://doi.org/10.1109/esem.2017.26.
  3. [BKK05]
    Petros Belsis, Spyros Kokolakis, and Evangelos Kiountouzis. “Information systems security from a knowledge management perspective”. In:Information Management & Computer Security13.3 (2005), pp. 189–202.issn: 0968-5227.https://doi.org/10.1108/09685220510602013.CrossRefGoogle Scholar
  4. [Bos14]
    Jan Bosch.Continuous Software Engineering: An Introduction. Springer, 2014, pp. 3–13.isbn: 978-3-319-11282-4.https://doi.org/10.1007/978-3-319-11283-1.Google Scholar
  5. [Con94]
    Sue A. Conger.The New Software Engineering. 1st. International Thomson Publishing, 1994.isbn: 0534171435.Google Scholar
  6. [FS17]
    Brian Fitzgerald and Klaas-Jan Stol. “Continuous software engineering: A roadmap and agenda”. In:Journal of Systems and Software123 (2017), pp. 176–189.issn: 01641212.https://doi.org/10.1016/j.jss.2015.06.063.CrossRefGoogle Scholar
  7. [KR07]
    Someswar Kesh and Pauline Ratnasingam. “A knowledge architecture for IT security”. In:Communications of the ACM 50.7 (2007).Google Scholar
  8. [Pag13]
    Dennis Pagano.PORTNEUF-A Framework for Continuous User Involvement. Verlag Dr. Hut, 2013.Google Scholar
  9. [Ras+01]
    Victor Raskin et al. “Ontology in information security: a useful theoretical foundation and methodological tool”. In:Proceedings of the Workshop on New security paradigms. NSPW. Cloudcroft, New Mexico: ACM, 2001, pp. 53–59.isbn: 1-58113-457-6.https://doi.org/10.1145/508171.508180.
  10. [Roe15]
    Tobias Roehm. “The MALTASE Framework For Usage-Aware Software Evolution”. Dissertation. München: Technische Universität München, 2015.Google Scholar
  11. [SFG99]
    Helen Sharp, Anthony Finkelstein, and Galal Galal. “Stakeholder identification in the requirements engineering process”. In:Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99. 1999, pp. 387–391. https://doi.org/10.1109/DEXA.1999.795198.

Copyright information

© The Author(s) 2019

Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Jan Ole Johanssen
    • 1
    Email author
  • Fabien Patrick Viertel
    • 2
  • Bernd Bruegge
    • 1
  • Kurt Schneider
    • 2
  1. 1.Technische Universität MünchenInstitut für Informatik I1GarchingGermany
  2. 2.Leibniz Universität HannoverFachgebiet Software EngineeringHannoverGermany

Personalised recommendations