Integrated Modeling and Evolution of Social Software

  • Arnd Poetzsch-Heffter
  • Barbara Paech
  • Mathias Weber
Conference paper
Part of the Springer Proceedings in Complexity book series (SPCOM)


Social networks, public and private media, administrative and business processes are based on a multitude of interconnected information systems. These growing software infrastructures, called social software in the following, get more and more entangled with everyday life and the processes of the society. Social software and society together form complex sociotechnical systems. In this paper, we describe how such sociotechnical systems can be modeled in a way that integrates social and software processes. The models can be reflective in the sense that they include the processes for their own modification. This way, system evolution can be expressed and studied as part of the model.


  1. 1.
    Abadi M (2003) Logic in access control. In: LICS, Ottawa. IEEE Computer Society, Los Alamitos, p 228Google Scholar
  2. 2.
    Alexander IF, Robertson S (2004) Understanding project sociology by modeling stakeholders. IEEE Softw 21(1):23–27CrossRefGoogle Scholar
  3. 3.
    Bennett KH, Rajlich V (2000) Software maintenance and evolution: a roadmap. In: Finkelstein A (ed) ICSE – future of SE track, Limerick. ACM, pp 73–87Google Scholar
  4. 4.
    Cheng BHC, Atlee JM (2007) Research directions in requirements engineering. In: Briand LC, Wolf AL (eds) FOSE, Minneapolis, pp 285–303Google Scholar
  5. 5.
    Cheng EC (2000) An object-oriented organizational model to support dynamic role-based access control in electronic commerce. Decis Support Syst 29(4):357–369CrossRefGoogle Scholar
  6. 6.
    Chronopoulos K, Gouseti M, Kiayias A (2013) Resource access control in the facebook model. In: Abdalla M, Nita-Rotaru C, Dahab R (eds) CANS, Paraty. Volume 8257 of Lecture notes in computer science. Springer, pp 179–198Google Scholar
  7. 7.
    Dittrich Y (2014, to appear) Software engineering beyond the project – sustaining software eco-systems. Inf Softw TechnolGoogle Scholar
  8. 8.
    Härder T, Reuter A (1983) Principles of transaction-oriented database recovery. ACM Comput Surv 15(4):287–317CrossRefGoogle Scholar
  9. 9.
    Ko AJ, Abraham R, Beckwith L, Blackwell AF, Burnett MM, Erwig M, Scaffidi C, Lawrance J, Lieberman H, Myers BA, Rosson MB, Rothermel G, Shaw M, Wiedenbeck S (2011) The state of the art in end-user software engineering. ACM Comput Surv 43(3):21CrossRefGoogle Scholar
  10. 10.
    Lim SL, Finkelstein A (2012) StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation. IEEE Trans Softw Eng 38(3):707–735CrossRefGoogle Scholar
  11. 11.
    Lim SL, Ncube C (2013) Social networks and crowdsourcing for stakeholder analysis in system of systems projects. In: SoSE, Maui. IEEE, pp 13–18Google Scholar
  12. 12.
    Mertens P (2012) Schwierigkeiten mit IT-Projekten der Öffentlichen Verwaltung – Neuere Entwicklungen. Inform Spektrum 35(6):433–446MathSciNetCrossRefGoogle Scholar
  13. 13.
    Monteiro E, Pollock N, Hanseth O, Williams R (2013) From artefacts to infrastructures. Comput Support Coop Work 22(4–6):575–607CrossRefGoogle Scholar
  14. 14.
    Ni Q, Bertino E, Lobo J, Brodie C, Karat C-M, Karat J, Trombetta A (2010) Privacy-aware role-based access control. ACM Trans Inf Syst Secur 13(3)Google Scholar
  15. 15.
    Paech B (2000) Aufgabenorientierte Softwareentwicklung – integrierte Gestaltung von Unternehmen, Arbeit und software. Springer, Berlin/New YorkzbMATHGoogle Scholar
  16. 16.
    Pipek V, Wulf V (2009) Infrastructuring: toward an integrated perspective on the design and use of information technology. J AIS 10(5)Google Scholar
  17. 17.
    Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47CrossRefGoogle Scholar
  18. 18.
    Wikipedia: Social software. Visited 17 Jan 2014Google Scholar
  19. 19.
    Sommerville I (2007) Software engineering, 8th edn. Addison-Wesley, London/ReadingGoogle Scholar
  20. 20.
    Star SL, Bowker GC (2002) How to infrastructure. In: Lieverouw LA, Livingstone S (eds) Handbook of new media: social shaping and social consequences of ICTs. SAGE, London/Thousand Oaks, pp 151–162Google Scholar
  21. 21.
    van der Aalst WMP (2013) Business process management: a comprehensive survey. ISRN Softw Eng 2013:37pGoogle Scholar
  22. 22.
    Wainer J, Kumar A, Barthelmess P (2007) DW-RBAC: a formal security model of delegation and revocation in workflow systems. Inf Syst 32(3):365–384CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Arnd Poetzsch-Heffter
    • 1
  • Barbara Paech
    • 2
  • Mathias Weber
    • 1
  1. 1.University of KaiserslauternKaiserslauternGermany
  2. 2.University of HeidelbergHeidelbergGermany

Personalised recommendations