{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:41:13Z","timestamp":1654137673721},"reference-count":33,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<p>IT Projects remain challenging to design and build despite improvements and efficiencies in the detailed-design and construction phases. Extended effort in early requirements gathering and analysis phases are unpopular at present, though poor requirements still impacts on IT project success. Intelligent tools may enhance these early phases but abstraction of the qualitative and wicked nature of Information Systems design problems (difficult enough for inexperienced humans) resists automation. An approach that moves from the concrete \u2018known' towards the abstract unknown in a prescriptive manner may be of use. This paper presents and offers the ATSA:OO methodology as a candidate for consideration as such an approach.<\/p>","DOI":"10.4018\/ijiit.2015010101","type":"journal-article","created":{"date-parts":[[2015,5,13]],"date-time":"2015-05-13T18:04:02Z","timestamp":1431540242000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Towards Intelligent Requirements"],"prefix":"10.4018","volume":"11","author":[{"given":"Robert B.K.","family":"Brown","sequence":"first","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]},{"given":"Angela M.E.","family":"Piper","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia"}]},{"given":"Ian C.","family":"Piper","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia"}]}],"member":"2432","reference":[{"key":"ijiit.2015010101-0","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.583"},{"key":"ijiit.2015010101-1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0403_1"},{"key":"ijiit.2015010101-2","author":"R. B. K.Brown","year":"2010","journal-title":"The ATSA Method for Specifying both System and User Interface Requirements, Doctoral Thesis"},{"key":"ijiit.2015010101-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7540-8_6"},{"key":"ijiit.2015010101-4","doi-asserted-by":"crossref","unstructured":"Brown, R. B. K., & Piper, I. C. (2013). What Users Do: SA&D with the ATSA Method, in Pooley, R. et al (Eds.), Information Systems Development, Reflections, Challenges and New Directions (pp. 305-316). Springer.","DOI":"10.1007\/978-1-4614-4951-5_25"},{"key":"ijiit.2015010101-5","author":"P.Checkland","year":"1981","journal-title":"Systems Thinking, Systems Practice"},{"key":"ijiit.2015010101-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-907-3_3"},{"key":"ijiit.2015010101-7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36792-7_1"},{"key":"ijiit.2015010101-8","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0146-3"},{"key":"ijiit.2015010101-9","author":"Y.Engstrom","year":"1987","journal-title":"Learning by Expanding: an activity-theoretical approach to developmental research"},{"key":"ijiit.2015010101-10","unstructured":"Fjuk, A., Sm\u00f8rdal, O., & Nurminen, M. I. (1997). Taking Articulation Work Seriously: an activity theoretical approach. http:\/\/citeseer.ist.psu.edu\/fjuk97taking.html"},{"key":"ijiit.2015010101-11","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-24620-6_8","article-title":"Activity Theory for the Analysis and Design of Multi-agent Systems","volume":"Vol. 2935","author":"R.Fuentes","year":"2004","journal-title":"Agent Oriented Software Engineering IV"},{"key":"ijiit.2015010101-12","doi-asserted-by":"crossref","unstructured":"Gifford, B. R., & Enyedy, N. D. (1999). Activity centered design: towards a theoretical framework for CSCL, In Proceedings of the 1999 conference on Computer Support for Collaborative Learning, article 22. http:\/\/dl.acm.org\/citation.cfm?id=1150262","DOI":"10.3115\/1150240.1150262"},{"issue":"1","key":"ijiit.2015010101-13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design Science in Information Systems Research.","volume":"28","author":"A. R.Hevner","year":"2004","journal-title":"Management Information Systems Quarterly"},{"key":"ijiit.2015010101-14","doi-asserted-by":"publisher","DOI":"10.1007\/BF02299477"},{"key":"ijiit.2015010101-15","author":"V.Kaptelinin","year":"2006","journal-title":"Acting with Technology: activity theory and interaction design"},{"key":"ijiit.2015010101-16","doi-asserted-by":"crossref","unstructured":"Kaptelinin, V., Nardi, B., & Macaulay, C. (1999). The Activity Checklist: A Tool For Representing the \u201cspace\u201d of context. interactions 6(4) (pp. 27-39).","DOI":"10.1145\/306412.306431"},{"issue":"2","key":"ijiit.2015010101-17","first-page":"1","article-title":"Software Process Models and Analysis on Failure of Software Development Projects","volume":"2","author":"R.Kaur","year":"2011","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ijiit.2015010101-18","first-page":"191","article-title":"Activity Analysis as a Method for Information Systems Development.","volume":"12","author":"M.Korpela","year":"2000","journal-title":"Scandinavian Journal of Information Systems"},{"key":"ijiit.2015010101-19","first-page":"529","article-title":"Activity Theory and its applications to information systems research and development","author":"K.Kuutti","year":"1991","journal-title":"Information Systems Research: Contemporary Approaches and Emergent Traditions"},{"key":"ijiit.2015010101-20","unstructured":"Kuutti, K., & Molin-Juustila, T. (1998). Information Systems Support for \u2018Loose\u2019 Coordination in a Network Organisation: an Activity-Theory Perspective. In H. Hassan, E. Gould, & P. Hyland (Eds.), Information Systems and Activity Theory: Volume 1, Tools in Context, (pp. 73-92). UOW Press."},{"issue":"1","key":"ijiit.2015010101-21","first-page":"v","article-title":"Inaugural Editor\u2019s Comments","volume":"23","author":"A.Lee","year":"1999","journal-title":"Management Information Systems Quarterly"},{"key":"ijiit.2015010101-22","author":"A. N.Leont\u2019ev","year":"1978","journal-title":"Activity, Consciousness, and Personality"},{"key":"ijiit.2015010101-23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1178058"},{"issue":"1","key":"ijiit.2015010101-24","first-page":"33","article-title":"Activity Theory as a feasible model for requirements elicitation processes, Scientia Interdisciplinary Studies","volume":"18","author":"L. E. G.Martins","year":"2007","journal-title":"Computer Science"},{"key":"ijiit.2015010101-25","unstructured":"Mwanza, D. (2002). Towards an Activity-Oriented Design Method for HCI Research and Practice. Doctoral Thesis. http:\/\/www.edu.helsinki.fi\/activity\/publications\/view\/98\/"},{"key":"ijiit.2015010101-26","doi-asserted-by":"publisher","DOI":"10.1007\/BF01405730"},{"key":"ijiit.2015010101-27","article-title":"Agile-User Experience Design: an Agile and User-Centered Process?","author":"L.Schwartz","year":"2013","journal-title":"The Eighth International Conference on Software Engineering Advances"},{"key":"ijiit.2015010101-28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2009.11"},{"key":"ijiit.2015010101-29","unstructured":"Uden, L., Valderas, P., & Pastor, O. (2008). An activity-theory-based model to analyse Web application requirements, Information Research, 13(2)."},{"key":"ijiit.2015010101-30","unstructured":"Vrazalic, L. (2004). Towards Holistic Human-Computer Interaction Evaluation Research and Practice: Development and Validation of the Distributed Usability Evaluation Method. Doctoral thesis, School of Information Systems, University of Wollongong, http:\/\/ro.uow.edu.au\/theses\/534\/"},{"key":"ijiit.2015010101-31","author":"L.Vygotsky","year":"1978","journal-title":"Mind in Society: Development of Higher Psychological Processes"},{"key":"ijiit.2015010101-32","doi-asserted-by":"publisher","DOI":"10.1145\/1621995.1621997"}],"container-title":["International Journal of Intelligent Information Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=128836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:12:58Z","timestamp":1654135978000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijiit.2015010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijiit.2015010101","relation":{},"ISSN":["1548-3657","1548-3665"],"issn-type":[{"value":"1548-3657","type":"print"},{"value":"1548-3665","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}