{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T22:14:30Z","timestamp":1762899270199,"version":"3.41.0"},"reference-count":78,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T00:00:00Z","timestamp":1462924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2016,5,11]]},"abstract":"<jats:p>To build needed mobile applications in specific domains, requirements should be collected and analyzed in holistic approach. However, resource is limited for small vendor groups to perform holistic requirement acquisition and elicitation. The rise of crowdsourcing and crowdfunding gives small vendor groups new opportunities to build needed mobile applications for the crowd. By finding prior stakeholders and gathering requirements effectively from the crowd, mobile application projects can establish sound foundation in early phase of software process. Therefore, integration of crowd-based requirement engineering into software process is important for small vendor groups. Conventional requirement acquisition and elicitation methods are analyst-centric. Very little discussion is in adapting requirement acquisition tools for crowdcentric context. In this study, several tool features of use case documentation are revised in crowd-centric context. These features constitute a use case-based framework, called UCFrame, for crowd-centric requirement acquisition. An instantiation of UCFrame is also presented to demonstrate the effectiveness of UCFrame in collecting crowd requirements for building two mobile applications.<\/jats:p>","DOI":"10.1145\/2894784.2894795","type":"journal-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T14:30:58Z","timestamp":1463149858000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["UCFrame"],"prefix":"10.1145","volume":"41","author":[{"given":"Wei-Chung","family":"Hu","sequence":"first","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]},{"given":"Hewijin Christine","family":"Jiau","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028736"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.12.003"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568785"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178823.1178834"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/604251.604253"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.076"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/785408.785550"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811226.1811231"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.06.018"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.63"},{"volume-title":"Addison Wesley","year":"2001","author":"Cockburn A.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","first-page":"172","volume-title":"Use Case Analysis. In Proceedings of Technology of Object-Oriented Languages and Systems","author":"Collins-Cope M.","year":"1999"},{"volume-title":"ACM Press\/Addison Wesley","year":"1999","author":"Constantine L. L.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00032-6"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.12.485"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.11.1025"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363835"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107596.2107604"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647648.731612"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593902.2593917"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2530540"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774569"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581355"},{"volume-title":"Towards Crowdsourcing for Requirements Engineering. In The 20th International Working Conference on Requirements Engineering: Foundation for Software Quality","year":"2014","author":"Hosseini M.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598538"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176744"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593801.2593804"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.09.011"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985866"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.02.008"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.50"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.75"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647349"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.738342"},{"volume-title":"Addison Wesley","year":"2003","author":"Leffingwell D.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","first-page":"184","volume-title":"Proceedings of Technology of Object-Oriented Languages and Systems","author":"Li L.","year":"1999"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/645983.675403"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2360674"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985983"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/987680.987753"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062555"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695947"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/786768.786966"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/872750.873370"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03424-4_12"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/872020.872425"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS-COMSAR.2006.89"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.04.014"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.06.007"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.31"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-9006-z"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-007-9023-6"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.035"},{"issue":"7","key":"e_1_2_1_54_1","first-page":"46","volume":"13","author":"Ratcliff J. W.","year":"1988","journal-title":"Pattern Matching: The Gestalt Appproach. Dr.Dobb's Journal"},{"volume-title":"Proceedings of the 36th Annual Hawaii International Conference on System Sciences","year":"2003","author":"Roussev B.","key":"e_1_2_1_55_1"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2010.24"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2134254.2134256"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590748.2590766"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591193"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231942"},{"key":"e_1_2_1_61_1","unstructured":"S. R. Schach. Object-Oriented and Classical Software Engineering. McGraw-Hill 2002.   S. R. Schach. Object-Oriented and Classical Software Engineering. McGraw-Hill 2002."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCI.2006.5276507"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529362"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491521"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.96"},{"volume-title":"Department of Information and Computing Sciences","year":"2015","author":"Snijders R.","key":"e_1_2_1_66_1"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.02.006"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194010004931"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590748.2590768"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2013.37"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590748.2590754"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.06.004"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.46"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.45"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2014.26"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882360"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430539"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/505776.505788"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2894784.2894795","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2894784.2894795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:41Z","timestamp":1750273541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2894784.2894795"}},"subtitle":["A Use Case Framework for Crowd-Centric Requirement Acquisition"],"short-title":[],"issued":{"date-parts":[[2016,5,11]]},"references-count":78,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,5,11]]}},"alternative-id":["10.1145\/2894784.2894795"],"URL":"https:\/\/doi.org\/10.1145\/2894784.2894795","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2016,5,11]]},"assertion":[{"value":"2016-05-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}