2012
DOI: 10.2139/ssrn.2484462
|View full text |Cite
|
Sign up to set email alerts
|

Twenty Software Requirement Patterns to Specify Recommender Systems that Users Will Trust

Abstract: Trust has been shown as a crucial factor for the adoption of new technologies. Surprisingly, trust literature offers very little guidance for systematically integrating the vast amount of insights from behavioral research on trust into the development of computing systems. The aim of this article is to translate results from behavioral sciences into software requirement patterns that address user trust in recommender systems. Software requirement patterns are used in requirements engineering to recognize impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2013
2013
2016
2016

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 29 publications
0
3
0
1
Order By: Relevance
“…To strengthen this stream of research and enlarge the set of available techniques, further research into understanding and designing mutual and shared understanding is thus necessary. In requirements engineering, natural language software requirement patterns [30][31][32] could help to foster a mutual understanding by using standardised, well defined and discipline independent terms and formulations. Further, the Mutually Exclusive Individual Goals…”
Section: Discussionmentioning
confidence: 99%
“…To strengthen this stream of research and enlarge the set of available techniques, further research into understanding and designing mutual and shared understanding is thus necessary. In requirements engineering, natural language software requirement patterns [30][31][32] could help to foster a mutual understanding by using standardised, well defined and discipline independent terms and formulations. Further, the Mutually Exclusive Individual Goals…”
Section: Discussionmentioning
confidence: 99%
“…Forschungsarbeiten liefern bereits eine Auswahl an vertrauensbezogenen Anforderungen für verschiedenste IT-Systeme (Hoffmann et al 2012;Hoffmann/Söllner 2014;Hoffmann et al 2013). Cloud-Computing-Anbieter, welche den Prozess zur systematischen Vertrauensunterstützung durchlaufen, können die nachfolgenden vertrauensbezogenen Anforderungen als Grundlage verwenden, sollten aber kritisch prüfen, ob diese für den konkreten An-wendungsfall relevant sind.…”
Section: Schritt 4: Ableitung Vertrauensbezogener Anforderungenunclassified
“…Hoffmann et al (2012) developed twenty software requirement patterns and the pre-defined requirement templates that can be used to specify trust requirements in recommender system development. In general, pattern-based approaches have already established well within the field of information systems to facilitate complex designing processes.…”
Section: Limitations In Dq Requirements Analysis and Modellingmentioning
confidence: 99%
“…As mentioned in section 2.3.4, in literature the pattern are used in various other disciplines to create models, due to the muddling power that the patterns provide in modelling complex scenarios (Franch 2013;Hoffmann et al 2012;Rolland et al 1998). Therefore, in defining the meta-model for DQ requirements, we want to define each construct in the meta-model as a DQ pattern so that an extra potential can be gained in modelling complex DQ requirements.…”
Section: Developing a Meta-model For A Dq Requirementmentioning
confidence: 99%