Towards an approach to elicit domain requirements from social networks: the case of emergency systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The1 growth of social networks impacts on several areas of our society. They can be used during software development, more specifically in the requirements elicitation activity, for identifying, complementing and validating the domain requirements. In this paper, we propose an approach that shows how social networks can be used as a source for capturing domain requirements. The aim is to perform the initial modeling of the system domain, providing a systematic methodology (process) for rapidly capturing relevant features that would not be straightforwardly elicited using traditional approaches. We apply this approach to the emergency systems domain (more specifically, floods in coastal areas), extracting information from the Twitter social network. The result is a domain model whose features can be reused in several applications of that domain. The application of the approach has been evaluated for its usefulness by domain experts and replicated to verify the generation of similar results at different time periods.

Original languageEnglish
Title of host publicationProceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018
PublisherACM - Association for Computing Machinery
Pages1772-1781
Number of pages10
VolumePart F137816
ISBN (Electronic)9781450351911
DOIs
Publication statusPublished - 9 Apr 2018
Event33rd Annual ACM Symposium on Applied Computing, SAC 2018 - Pau, France
Duration: 9 Apr 201813 Apr 2018

Conference

Conference33rd Annual ACM Symposium on Applied Computing, SAC 2018
CountryFrance
CityPau
Period9/04/1813/04/18

Keywords

  • Domain model
  • Emergency systems
  • Feature model
  • Requirements elicitation
  • Social networks

Fingerprint Dive into the research topics of 'Towards an approach to elicit domain requirements from social networks: the case of emergency systems'. Together they form a unique fingerprint.

Cite this