Design of an Empirical Study for Evaluating an Automatic Layout Tool
Generating meaningful layout of iStar models is a challenging task, which currently requires significant manual efforts. However, it is time-consuming when dealing with large-scale iStar modeling, rising the need of having an automatic iStar layout tool. Previously, we have proposed an algorithm for laying out iStar SD models and have implemented a corresponding prototype tool. In this paper, we report our ongoing empirical work which aims to evaluate the effectiveness and usability of the prototype tool. In particular, we present a research design which is applied to compare manual layout and automatic layout in terms of efficiency and model comprehensibility. Based on such a design, we are planning to carry out empirical studies accordingly in the near future.
KeywordsiStar models Automatic layout Controlled experiment Prototype tool
This work is supported by National Key R&D Program of China (No. 2017YFC08033007), the National Natural Science of Foundation of China (No. 91546111, 91646201) and Basic Research Funding of Beijing University of Technology (No. 040000546318516).
- 1.Horkoff, J., et al.: Goal-oriented requirements engineering: an extended systematic mapping study. Requir. Eng. 1–28 (2017)Google Scholar
- 2.Santos, M., Gralha, C., Goulao, M., Araújo, J., Moreira, A., Cambeiro, J.: What is the impact of bad layout in the understandability of social goal models? In: IEEE 24th International Requirements Engineering Conference (RE) 2016, pp. 206–215. IEEE (2016)Google Scholar
- 3.Du, X., Li, T., Wang, D.: An automatic layout approach for istar models (2017)Google Scholar
- 4.Cares, C., Franch, X., Perini, A., Susi, A.: istarml: an xml-based interchange format for i* models. In: Proceedings of the 3rd International i* Workshop, Recife, Brazil, February, pp. 11–12. Citeseer (2008)Google Scholar
- 7.Buyens, K., De Win, B., Joosen, W.: Empirical and statistical analysis of risk analysis-driven techniques for threat management. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, PP. 1034–1041. IEEE (2007)Google Scholar