{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:11:21Z","timestamp":1654143081878},"reference-count":66,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>This paper proposes representations for micro-business requirements patterns with associated software components. The patterns must be comprehensible enough for micro-business owners without technical backgrounds but at the same time be technical enough for the software developers who use them during the design and development of software. Both objectives are somewhat conflicting and trade-offs have to be made regarding their representations. The pattern representations use a combination of tables, business process models, goal graphs, labels, and UML component diagrams. First, the paper provides an example of a micro-business requirements pattern in the form of an inventory pattern and applies it in a real-world micro-business case, a clothes retail store. Through the example, it shows how the pattern is instantiated and associated with software components. Then, it shows how the patterns are applied in industrial practice, including the software development companies currently adapting and applying them, accompanied by observable strengths and weaknesses.<\/p>","DOI":"10.4018\/ijismd.2014100104","type":"journal-article","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T12:55:09Z","timestamp":1418129709000},"page":"71-90","source":"Crossref","is-referenced-by-count":0,"title":["Representing Micro-Business Requirements Patterns with Associated Software Components"],"prefix":"10.4018","volume":"5","author":[{"given":"RJ","family":"Macasaet","sequence":"first","affiliation":[{"name":"Department of Software Research and Development, Pentathlon Systems Resources Inc., Manila, Philippines"}]},{"given":"Manuel","family":"Noguera","sequence":"additional","affiliation":[{"name":"Department of Computer Languages and Systems, University of Granada, Granada, Spain"}]},{"given":"Mar\u00eda Luisa","family":"Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"Department of Computer Languages and Systems, University of Granada, Granada, Spain"}]},{"given":"Jos\u00e9 Luis","family":"Garrido","sequence":"additional","affiliation":[{"name":"Department of Computer Languages and Systems, University of Granada, Granada, Spain"}]},{"given":"Sam","family":"Supakkul","sequence":"additional","affiliation":[{"name":"Applications Architecture, Sabre Inc., Southlake, TX, USA"}]},{"given":"Lawrence","family":"Chung","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"2432","reference":[{"key":"ijismd.2014100104-0","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.74"},{"key":"ijismd.2014100104-1","author":"S.Ambler","year":"2002","journal-title":"Agile modeling"},{"key":"ijismd.2014100104-2","unstructured":"Aranda, J. (2010). Playing to the Strengths of Small Organizations. In Proceedings of the 1st Workshop on RE in Small Companies RESC, (pp. 141-144). Retrieved October 9, 2013, from http:\/\/www.icb.uni-due.de\/fileadmin\/ICB\/research\/research_reports\/ICBReportNo40.pdf"},{"key":"ijismd.2014100104-3","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.54"},{"key":"ijismd.2014100104-4","doi-asserted-by":"publisher","DOI":"10.1108\/14637150710721122"},{"key":"ijismd.2014100104-5","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2007.2"},{"key":"ijismd.2014100104-6","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2013.6577722"},{"key":"ijismd.2014100104-7","doi-asserted-by":"publisher","DOI":"10.4018\/jismd.2011040101"},{"key":"ijismd.2014100104-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.10.028"},{"key":"ijismd.2014100104-9","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon, B., Yu, E., & Mylopoulos, J. (2000). Non-functional Requirements in Software","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"ijismd.2014100104-10","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00148-0"},{"key":"ijismd.2014100104-11","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1670(199809)4:3<101::AID-SPIP103>3.0.CO;2-K"},{"issue":"5","key":"ijismd.2014100104-12","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1080\/08874417.2006.11645926","article-title":"Communication Challenges in Requirements Elicitation and the Use of the Repertory Grid Technique.","volume":"46","author":"C. J.Davis","year":"2006","journal-title":"Journal of Computer Information Systems"},{"key":"ijismd.2014100104-13","unstructured":"Desarrollo, T. I. C. (2013). Desarrollo TIC. Last accessed on October 9, 2013, at http:\/\/www.desarrollotic.com"},{"key":"ijismd.2014100104-14","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"ijismd.2014100104-15","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1145"},{"key":"ijismd.2014100104-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.01.008"},{"key":"ijismd.2014100104-17","unstructured":"European Commission. (2008). The New SME Definition User Guide and Model Declaration. Retrieved October 9, 2013, from http:\/\/www.ec.europa.eu\/enterprise\/enterprise_policy\/sme_definition\/sme_user_guide.pdf"},{"key":"ijismd.2014100104-18","unstructured":"Everyware. (2013). Everyware Technologies. Last accessed on October 9, 2013, at http:\/\/www.everywaretech.es"},{"key":"ijismd.2014100104-19","doi-asserted-by":"publisher","DOI":"10.1145\/330534.330555"},{"key":"ijismd.2014100104-20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14192-8_10"},{"key":"ijismd.2014100104-21","author":"B. G.Glaser","year":"1967","journal-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research"},{"key":"ijismd.2014100104-22","author":"R.Glushko","year":"2008","journal-title":"Document Engineering \u2013 Analyzing and Designing Documents for Business Informatics and Web Services"},{"key":"ijismd.2014100104-23","doi-asserted-by":"crossref","unstructured":"Hoffmann, A., S\u00f6llner, M., & Hoffmann, H. (2012). Twenty Software Requirement Patterns to Specify Recommender Systems that Users will Trust. European Conference on Information Systems ECIS. url: http:\/\/aisel.aisnet.org\/ecis2012\/185","DOI":"10.2139\/ssrn.2484462"},{"key":"ijismd.2014100104-24","author":"P.Hruby","year":"2006","journal-title":"Model-Driven Design Using Business Patterns"},{"key":"ijismd.2014100104-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.11.724"},{"key":"ijismd.2014100104-26","unstructured":"International Organization for Standardization (ISO). (2011). ISO\/IEC DTR 29110-1:2011 Software Engineering \u2013 Lifecycle Profiles for Very Small Entities (VSEs) \u2013 Part 1: Overview. ISO, Switzerland, 2011. Retrieved October 9, 2013, from http:\/\/standards.iso.org\/ittf\/PubliclyAvailableStandards\/index.html"},{"key":"ijismd.2014100104-27","unstructured":"Jantunen, S. (2010). The Benefit of Being Small: Exploring Market-Driven Requirements Engineering Practices in Five Organizations. In Proceedings of the 1st Workshop on RE in Small Companies RESC, (pp. 131-140). Retrieved October 9, 2013, from http:\/\/www.icb.uni-due.de\/fileadmin\/ICB\/research\/research_reports\/ICBReportNo40.pdf"},{"key":"ijismd.2014100104-28","unstructured":"Kamsties, E., Hormann, K., & Schlich, M. (1998). Requirements Engineering in Small and Medium Enterprises: State-of-the-Practice, Problems, Solutions, and Technology Transfer. In Conference on European Industrial Requirements Engineering CEIRE, London, United Kingdom. Retrieved October 9, 2013, from http:\/\/prof.kamsties.com\/download\/ceire98.pdf"},{"key":"ijismd.2014100104-29","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048504"},{"key":"ijismd.2014100104-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.04.002"},{"key":"ijismd.2014100104-31","doi-asserted-by":"publisher","DOI":"10.1108\/14626000910977206"},{"key":"ijismd.2014100104-32","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1122"},{"key":"ijismd.2014100104-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.001"},{"key":"ijismd.2014100104-34","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00022-8"},{"key":"ijismd.2014100104-35","author":"G.Kotonya","year":"2003","journal-title":"Requirements Engineering: Processes and Techniques"},{"key":"ijismd.2014100104-36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02414-6_4"},{"key":"ijismd.2014100104-37","author":"P.Kruchten","year":"2003","journal-title":"The Rational Unified Process: An Introduction"},{"key":"ijismd.2014100104-38","doi-asserted-by":"publisher","DOI":"10.1145\/2181101.2181114"},{"key":"ijismd.2014100104-39","doi-asserted-by":"publisher","DOI":"10.1145\/2424563.2424573"},{"key":"ijismd.2014100104-40","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2013.6577703"},{"key":"ijismd.2014100104-41","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"ijismd.2014100104-42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCBSS.2008.34"},{"key":"ijismd.2014100104-43","doi-asserted-by":"publisher","DOI":"10.4018\/jismd.2010040103"},{"key":"ijismd.2014100104-44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19858-8_7"},{"key":"ijismd.2014100104-45","unstructured":"Nikula, U., Sajeniemi, J., & Kalvianen, H. (2000). A state-of-the-practice survey on requirements engineering in small-and-medium-sized enterprises. In Telecom Business Research Center Lappeenranta Research Report 1, Lappeenrata University of Technology. Retrieved October 9, 2013, from https:\/\/www.uop.edu.jo\/Homeworks\/13544442010.pdf"},{"key":"ijismd.2014100104-46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34624-8_50"},{"key":"ijismd.2014100104-47","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2011.6009577"},{"key":"ijismd.2014100104-48","unstructured":"PSRI. (2013). Pentathlon Systems Resources Incorporated. Last accessed on October 9, 2013 at http:\/\/www.pentathlonsystems.com"},{"key":"ijismd.2014100104-49","unstructured":"PSRI Action Research. (2013). Action Research Material for Micro-businesses. Last accessed on October 9, 2013 at http:\/\/www.pentathlonsystems.com\/ar4mb.html"},{"key":"ijismd.2014100104-50","unstructured":"RE-Tools. (2013). RE-Tools. Last accessed on October 9, 2013 at http:\/\/www.utdallas.edu\/~supakkul\/tools\/RE-Tools\/index.html"},{"key":"ijismd.2014100104-51","unstructured":"Respect-IT. (2007). KAOS Tutorial Version 1.0. Retrieved January 15, 2013, from http:\/\/www.objectiver.com\/fileadmin\/download\/documents\/KaosTutorial.pdf"},{"key":"ijismd.2014100104-52","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359977"},{"key":"ijismd.2014100104-53","unstructured":"Sabre. (2013). Sabre Incorporated. Last accessed on October 9, 2013 at http:\/\/www.sabre.com"},{"key":"ijismd.2014100104-54","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00083-3"},{"key":"ijismd.2014100104-55","author":"H.Simon","year":"1992","journal-title":"The Sciences of the Artificial"},{"key":"ijismd.2014100104-56","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.23"},{"key":"ijismd.2014100104-57","author":"I.Sommerville","year":"2004","journal-title":"Software Engineering"},{"key":"ijismd.2014100104-58","doi-asserted-by":"publisher","DOI":"10.1145\/2304736.2304749"},{"key":"ijismd.2014100104-59","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345831"},{"key":"ijismd.2014100104-60","unstructured":"Supakkul, S., Chung, L., Macasaet, R., Noguera, M., Rodriguez, M., & Garrido, J. (2013). Modeling and Tracing Stakeholders' Goals across Notations using RE-Tools. In Proceedings of the 6th International i* Workshop iStar at the 25th International Conference on Advanced Information Systems Engineering CAiSE. Retrieved October 9, 2013, from http:\/\/ceur-ws.org\/Vol-978\/paper_23.pdf"},{"key":"ijismd.2014100104-61","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.31"},{"key":"ijismd.2014100104-62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25160-3_18"},{"key":"ijismd.2014100104-63","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693131"},{"key":"ijismd.2014100104-64","unstructured":"Virus. (2013). Virus Worldwide. Last accessed on October 9, 2013 at http:\/\/www.virusworldwide.com"},{"key":"ijismd.2014100104-65","author":"R.Young","year":"2004","journal-title":"The requirements engineering handbook"}],"container-title":["International Journal of Information System Modeling and Design"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=120174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:28:02Z","timestamp":1654140482000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijismd.2014100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijismd.2014100104","relation":{},"ISSN":["1947-8186","1947-8194"],"issn-type":[{"value":"1947-8186","type":"print"},{"value":"1947-8194","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}