278 research outputs found

    On requirements elicitation for Software Projects in ICT for development

    Get PDF
    Currently, there is much interest in harnessing the potential of new and affordable Information and Communication Technologies (ICT) such as mobile phones, to assist in reducing disparities in socioeconomic conditions throughout the world. Such efforts have come to be known as ICT for Development or ICT4D. While this field of research holds much promise, few projects have managed to achieve long-term sustained success. Among the many reasons for this, from a software engineering perspective, in many cases it can be attributed to inadequacies in the gathering and defining of software requirements. Failures in realising sustainable systems stern from inadequate consideration of the high-level socioeconomic development goals, neglect of environmental constraints, and a lack of adequate input from end-users regarding their specific needs and sociocultural context. The situation is exacerbated by inadequate reporting on the social impact of such interventions, making it difficult to assess a project's success, let alone apply lessons learned to new projects. In this thesis we propose enhancing conventional requirements elicitation with a complementary elicitation methodology specifically adapted to address these shortcomings. Our approach is based on a proposed novel technique of Structured Digital Storytelling to elicit input from end-users having limited literacy in the form of stories. The proposed methodology includes a systematic method for extracting and interpreting the informational content of the stories that applies a conceptual model derived from Communications Theory to identify constraints arising from the users' sociocultural context. The thesis introduces an ICT4D quality model identifying non-functional requirements related to the sociodynamics of a system's sustained use in a rural community. The needs, goals and constraints thus identified are integrated using a goal-based analysis to produce a more informed understanding of potential areas of technology intervention and to develop high-level functional and non-functional software requirements. The resulting goal model is also used in deriving a measurement framework for assessing a project's success based on its social impact. We illustrate our approach and validate its effectiveness with a field study. Keywords: ICT4D, digital divide. requirements engineering. needs elicitation, requirements elicitation, culture, storytellin

    Exploring Strategies for Capturing Requirements for Developing ICT4D Applications

    Get PDF
    Some software engineers make decisions using applications designed from poorly captured user requirements. The quality of user requirements is crucial in the requirements engineering process, costing 50 times more to remedy the defects of using poorly captured user requirements. Grounded in the socialization, externalization, combination and internalization model of Nonaka theoretical framework, the purpose of this qualitative multiple case study was to explore strategies software engineers in Southern African software houses and IT departments use for capturing information and communication technology for development (ICT4D) requirements. The participants consisted of software 12 engineers who were working in Southern Africa, capturing ICT4D requirements. The data were collected using semistructured interviews. Thematic analysis was used, and four themes emerged: (a) interacting with stakeholders—socialization, (b) transforming interactive knowledge into user requirements—externalization, (c) sharing documented knowledge about user requirements—combination, and (d) applying assimilated knowledge from documented knowledge—internalization. A recommendation is for software engineers to capture their users’ needs and experiences to develop reliable ICT4D software that can assist in delivering interventions to marginalized societies. The implications for positive social change include improving the socioeconomic status of marginalized citizens with ICT4D software applications due to potentially improved requirements engineering practices

    Towards communication and information access for deaf people

    Get PDF
    In tightly circumscribed communication situations an interactive system resident on a mobile device can assist Deaf people with their communication and information needs. The Deaf users considered here use South African Sign Language and information is conveyed by a collection of pre-recorded video clips and images. The system was developed according to our method of community-based co-design. We present several stages of the development as a series of case studies and highlight our experience. The first stage involved ethnographically inspired methods such as cultural probes. In the next stage we co-designed a medical consultation system that was ultimately dropped for technical reasons. A smaller system was developed for pharmaceutical dispensing and successfully implemented and tested. It now awaits deployment in an actual pharmacy. We also developed a preliminary authoring tool to tackle the problem of content generation for interactive computer literacy training. We are also working on another medical health information tool. We intend that a generic authoring tool be able to generate mobile applications for all of these scenarios. These mobile applications bridge communication gaps for Deaf people via accessible and affordable assistive technology

    Requirements elicitation techniques for software development: a systematic review of literature

    Get PDF
    Introduction: Requirements elicitation (RE) is a difficult task in which there are issues related to information ambiguity, incomplete and inconsistent data. It seeks to discover and understand the users' problems and needs. The success of software development depends on the correct elicitation of requirements, and its quality is influenced by the techniques used.  This research aims to identify the RE techniques most cited in the literature of software development projects within this context. Method: a systematic literature review was carried out, which analyzed 61 articles from the Scopus database. Results: We identified the 10 RE techniques most cited in the literature. The ranking of these techniques showed that those obtained by stakeholders' groups' involvement were the least mentioned. Conclusions: the research identified the opportunity and relevance for developing a descriptive or confirmatory analysis of RE techniques based on the interaction between groups of users and members of the software development team.Introdução: A elicitação de requisitos (ER) é uma tarefa difícil na qual é necessário lidar com ambiguidade de informações, dados incompletos e inconsistentes. Ela busca descobrir e entender o real problema e as necessidades dos usuários. O sucesso do desenvolvimento de software depende da elicitação correta dos requisitos, e a qualidade deles é influenciada pelas técnicas usadas. Dentro deste contexto, o objetivo desta pesquisa é identificar as técnicas de ER mais citadas na literatura em projetos de desenvolvimento de software. Método: Foi realizada uma revisão sistemática da literatura, que analisou 61 artigos da base de dados Scopus. Resultados: Foram identificadas as 10 técnicas de ER mais citadas na literatura. A classificação dessas técnicas mostrou que aquelas obtidas pelo envolvimento de grupos de stakeholders foram as menos citadas. Conclusão: A pesquisa identificou a oportunidade e relevância para o desenvolvimento de pesquisa acadêmica descritiva ou confirmatória sobre técnicas de ER baseadas na interação entre grupos de usuários e membros da equipe de desenvolvimento de software

    Intervention or Collaboration?:Rethinking Information and Communication Technologies for Development

    Get PDF
    Over the past decades information system developers and knowledge engineers in ICT projects in wealthy regions of the world have come to realize that technical work can only be successful when situated in a broader organizational context. However, for low-resource environments (or example rural Africa), where contextual embedding is even more demanding given the complexity of these environments, practical, context-oriented methodologies how to "do" information systems engineering are still lacking. This book gives a basic but thorough insight how to develop information systems and services for people in low resource environments, from a socio-technical, information systems engineering perspective, presenting field-validated methods that cover the complete lifecycle of information systems engineering, with emphasis on context analysis, needs assessment, use case and requirements analysis and (business) sustainability analysis. Since technical development does not go without critical reflection, this book also investigates which (tacit) assumptions affect the way technologies are implemented in poor, low-resource environments. Linking collaborative sociotechnical development with theories of complexity and social networks of innovation, this book offers a reflective and critical approach to information and communication technologies for development

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts
    corecore