Task Modelling for Interactive System Design

2021 ◽  
Vol 5 (EICS) ◽  
pp. 1-22
Author(s):  
Judy Bowen ◽  
Anke Dittmar ◽  
Benjamin Weyers

Task models have been used for decades in interactive system design and there are several mature modelling approaches with corresponding tool support. However, in our own work, we have also experienced their limitations, especially in situations where task models are partial ancillary models and not primary artifacts. This was one of the motivations for this paper, which presents a systematic examination of literature to better understand the current place of task models in the continual evolution of user-centred software development practices. While overview work in this domain typically focuses on the analysis of representative task modelling notations and/or tools and relies on foundation papers, we apply a mixed top-down and bottom-up approach to identify relevant themes and trends in the use of task models over the last twenty-years. The paper identifies and discusses dominant patterns of use as well as gaps. It provides a comprehensive framing of both past and present trends in task modelling and supports those who want to incorporate task modelling in their own work. From this we identify areas of research that should receive greater attention in order to address future considerations.

Earth ◽  
2021 ◽  
Vol 2 (3) ◽  
pp. 440-456
Author(s):  
Roger A. Pielke ◽  
Jimmy Adegoke ◽  
Faisal Hossain ◽  
Dev Niyogi

Risks from human intervention in the climate system are raising concerns with respect to individual species and ecosystem health and resiliency. A dominant approach uses global climate models to predict changes in climate in the coming decades and then to downscale this information to assess impacts to plant communities, animal habitats, agricultural and urban ecosystems, and other parts of the Earth’s life system. To achieve robust assessments of the threats to these systems in this top-down, outcome vulnerability approach, however, requires skillful prediction, and representation of changes in regional and local climate processes, which has not yet been satisfactorily achieved. Moreover, threats to biodiversity and ecosystem function, such as from invasive species, are in general, not adequately included in the assessments. We discuss a complementary assessment framework that builds on a bottom-up vulnerability concept that requires the determination of the major human and natural forcings on the environment including extreme events, and the interactions between these forcings. After these forcings and interactions are identified, then the relative risks of each issue can be compared with other risks or forcings in order to adopt optimal mitigation/adaptation strategies. This framework is a more inclusive way of assessing risks, including climate variability and longer-term natural and anthropogenic-driven change, than the outcome vulnerability approach which is mainly based on multi-decadal global and regional climate model predictions. We therefore conclude that the top-down approach alone is outmoded as it is inadequate for robustly assessing risks to biodiversity and ecosystem function. In contrast the bottom-up, integrative approach is feasible and much more in line with the needs of the assessment and conservation community. A key message of our paper is to emphasize the need to consider coupled feedbacks since the Earth is a dynamically interactive system. This should be done not just in the model structure, but also in its application and subsequent analyses. We recognize that the community is moving toward that goal and we urge an accelerated pace.


Author(s):  
Daniela Soares Cruzes ◽  
Espen Agnalt Johansen

Improving software security in software development teams is an enduring challenge for software companies. In this chapter, the authors present one strategy for addressing this pursuit of improvement. The approach is ambidextrous in the sense that it focuses on approaching software security activities both from a top-down and a bottom-up perspective, combining elements usually found separately in software security initiatives. The approach combines (1) top-down formal regulatory mechanisms deterring breaches of protocol and enacting penalties where they occur and (2) bottom-up capacity building and persuasive encouragement of adherence to guidance by professional self-determination, implementation, and improvement support (e.g., training, stimulating, interventions). The ambidextrous governance framework illustrates distinct, yet complementary, global and local roles: (1) ensuring the adoption and implementation of software security practices, (2) enabling and (3) empowering software development teams to adapt and add to overall mandates, and (4) embedding cultures of improvement.


2022 ◽  
pp. 627-648
Author(s):  
Daniela Soares Cruzes ◽  
Espen Agnalt Johansen

Improving software security in software development teams is an enduring challenge for software companies. In this chapter, the authors present one strategy for addressing this pursuit of improvement. The approach is ambidextrous in the sense that it focuses on approaching software security activities both from a top-down and a bottom-up perspective, combining elements usually found separately in software security initiatives. The approach combines (1) top-down formal regulatory mechanisms deterring breaches of protocol and enacting penalties where they occur and (2) bottom-up capacity building and persuasive encouragement of adherence to guidance by professional self-determination, implementation, and improvement support (e.g., training, stimulating, interventions). The ambidextrous governance framework illustrates distinct, yet complementary, global and local roles: (1) ensuring the adoption and implementation of software security practices, (2) enabling and (3) empowering software development teams to adapt and add to overall mandates, and (4) embedding cultures of improvement.


Author(s):  
Benjamin L. Somberg ◽  
Mary Carol Day

Business reengineering is currently being employed by many companies to maintain and improve their effectiveness. However, 50% to 70% of all reengineering efforts fail to accomplish their objectives. Although business reengineering and human factors approaches to work process reengineering share many goals, their approaches differ in four significant ways: (1) a top-down vs. a bottom-up approach; (2) starting from scratch vs. learning from an analysis of strengths and weaknesses of the existing work environment, (3) relying mainly on data from management vs. data from workers at all levels, and (4) treating processes and systems independently without a view of the worker at the center vs. a worker-centered integrated approach to process and system design. An integration of human factors approaches into business reengineering can increase the success of reengineering efforts. Data from projects where human factors specialists worked on reengineering efforts illustrate the mutual benefit to both types of work that can be gained through collaboration.


1988 ◽  
Vol 19 (4) ◽  
pp. 24-26
Author(s):  
Hartmut Weule ◽  
Lukas Loffler

2014 ◽  
Vol 886 ◽  
pp. 625-628
Author(s):  
Yi Fei Zhang ◽  
Chun Yan Ke

Information applied technology has greatly promoted ELT efficiency by means of resources sharing, distributing and optimizing. In order to demonstrate how to construct a highly efficient teaching system, the paper starts with its remarkable characteristics, further to introduce its design principles, puts emphasis on its model design, which include activities analysis, activities design, rules design and steps design, involving software choosing, MVC architecture and so on, bringing forward the understandings of designing principles, such as accessibility, adaptability, affordability, durability, compatibility and reusability.


Sign in / Sign up

Export Citation Format

Share Document