Details
Original language | English |
---|---|
Title of host publication | Managed Software Evolution |
Editors | Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin |
Publisher | Springer Open |
Pages | 77-105 |
Edition | 1. |
ISBN (electronic) | 978-3-030-13499-0 |
ISBN (print) | 978-3-030-13498-3, 978-3-030-13501-0 |
Publication status | Published - 8 Jul 2019 |
Abstract
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
Managed Software Evolution. ed. / Ralf Reussner; Michael Goedicke; Wilhelm Hasselbring; Birgit Vogel-Heuser; Jan Keim; Lukas Märtin. 1. ed. Springer Open, 2019. p. 77-105.
Research output: Chapter in book/report/conference proceeding › Contribution to book/anthology › Research › peer review
}
TY - CHAP
T1 - Tacit Knowledge in Software Evolution
AU - Johannsen, Jan Ole
AU - Viertel, Fabien Patrick
AU - Bruegge, Bernd
AU - Schneider, Kurt
N1 - © 2019 The Author(s)
PY - 2019/7/8
Y1 - 2019/7/8
N2 - This chapter describes two perspectives on the identification and externalisation of tacit knowledge, that is expertise that is difficult to verbalise, within long-living and continuously evolving systems. During the design time of a software system, heuristics and machine learning classifiers can be used to identify and externalise tacit knowledge. For instance, externalised tacit security knowledge supports requirement engineers to understand security-related requirements. During the run time of a software system, tacit knowledge about a system’s usability can be captured through monitoring user interactions. The identification and extraction of tacit usage knowledge can improve usability-related aspects and even trigger new functional requirement requests.
AB - This chapter describes two perspectives on the identification and externalisation of tacit knowledge, that is expertise that is difficult to verbalise, within long-living and continuously evolving systems. During the design time of a software system, heuristics and machine learning classifiers can be used to identify and externalise tacit knowledge. For instance, externalised tacit security knowledge supports requirement engineers to understand security-related requirements. During the run time of a software system, tacit knowledge about a system’s usability can be captured through monitoring user interactions. The identification and extraction of tacit usage knowledge can improve usability-related aspects and even trigger new functional requirement requests.
U2 - 10.1007/978-3-030-13499-0_5
DO - 10.1007/978-3-030-13499-0_5
M3 - Contribution to book/anthology
SN - 978-3-030-13498-3
SN - 978-3-030-13501-0
SP - 77
EP - 105
BT - Managed Software Evolution
A2 - Reussner, Ralf
A2 - Goedicke, Michael
A2 - Hasselbring, Wilhelm
A2 - Vogel-Heuser, Birgit
A2 - Keim, Jan
A2 - Märtin, Lukas
PB - Springer Open
ER -