Documente Academic
Documente Profesional
Documente Cultură
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
Unlike enterprise systems, we can’t simply elicit Hanako method, and its underlying strategy.
requirements from the unknown users. Section 4 describes the process and techniques of
In this research, we claim the importance of Hanako method. Section 5 reports a series of field
understanding the users in requirements studies applying the Hanako method to mobile
engineering. The contribution of this paper is to phone product lines. Section 6 discusses the
propose a methodology to identify persona, a rich evaluation of the field studies. Conclusions follow
contextual model of targeted users based on in Section 7.
conjoint analysis theory, and evaluate the
requirements through the interaction analysis 2. Conventional Methods and Problems
between personas and scenarios. To prove the
proposed methodology, we conducted a series of (1) User-Centered Requirements Engineering
field studies from 2003 to 2004 by applying the UCD (User-Centered Design) has been applied to
methodology to mobile phone product lines with many software products, mostly to the UI (User
more than 150 focused users. It revealed the Interface) design [6, 13]. In requirements
effectiveness and problems of the proposed engineering, User-Centered Requirements
methodology and lessons learned. Engineering has been emerged, and is applied to
We identified unique characteristics in various systems [23]. In this area, scenarios have
requirements engineering for software embedded to been widely used to model the interactions between
digital consumer products. users and systems [1, 4, 19]. However, the
fundamental problem in requirements engineering
(1) Unknown Many Users for digital consumer products lies that we don’t
In the requirements engineering for enterprise know the user. On the other hand, in industry
systems, we know, directly or indirectly, users. So, design, it’s frequently emphasized to know the
the key process is requirements elicitation from the users and to observe their behaviors [9, 13]. So, we
users. In digital consumer products, however, users focus on the user’s view points [17], and describe
are unknown many. So, we need to start with the rich contextual information of user behaviors.
identifying the users, if it’s possible, and elicit Therefore, the central issue of this article is how to
requirements from them. Shrink wrap software identify the user.
products, such as office tools, are also intended to (2) Persona
unknown many users. However, the difference of
embedded software from shrink wrap software One of the promising concepts to identify the
products lies that users are not aware software in user is persona, proposed by Cooper [5]. Reflecting
the digital consumer products. that Persona is a mask used in ancient Greek play,
Jung defined persona as a social role of person in a
(2) Wide Variety of Users specific context [22], which is an appropriate model
The users are extremely diverse in the sense of, in the context of requirements engineering.
for example, computer literacy. There is a big gap Although some key concepts to apply persons in
between developers and users in the level of software design are proposed [5, 18], any specific
computer literacy, which leads to a gap between methodology based on persona is not provided.
their perspectives to the requirements. Especially, there is no guideline to identify persona.
(3) Unexplored World in Requirements So, the major technique discussed in this paper is
Engineering rational method to identify the persona.
The importance of requirements engineering in (3) Product Marketing, Conjoint Analysis and
digital consumer products was pointed out in Marketing Engineering
requirements engineering community [21]. In practice, vendors of consumer products are
Requirements engineering is also attributed as a conducting market survey through their internal
major source of errors in embedded software organizations or external professional agencies [10].
systems [16]. However, there are little materials However, it’s often observed that the market
available in this area. survey and development organizations are
The structure of this paper is as follows: Section separated. Moreover, the market survey is
2 provides a survey of conventional techniques and sometimes very subjective. Recently, marketing
problems. Section 3 sketches our methodology, engineering is emerged as a systematic and
rational technique for studying market based on
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
statistical techniques. Among them, conjoint 3.2 Process of Hanako Method
analysis [11] and its variants have been used to
identify the user’s preference on multiple attributes As illustrated in Figure 2, Hanako method
of products, such as functionality, design and price consists of two stages of process: persona analysis
[7]. However, the application of conjoint analysis to and requirements value analysis between persona
requirements engineering is not explored yet. In and scenarios of services. The details of these
this research, we intended to integrate the conjoint processes are explained in the next section.
analysis with requirements engineering.
Persona Analysis Many Features of
3. Hanako Method and its Strategy Unknown Many Users
Requirements
Unknown Values
Disjoint Clustering
Traditionally, Hanako and Taro was the most Identification of
and Simultaneous
Identification of
Personas Hot Spot Scenarios
popular given name of Japanese women and men, Conjoint Analysis
the Most Influential Users and Services Hot Spots High Value
Distribution of
Primary Persona
Requirements Value
Analysis between
Hanako =
Professional
Developers
Persona
Persona
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
(3) Requirements Value Analysis representative mobile phone services while the axis
From the viewpoints of persona, we analyze the to upper right shows 7 disjoint user groups of 105
value and hot spots of requirements with scenarios. users. Figure 4 indicates how each user group
evaluates the value of each service.
4.2 Simultaneous Conjoint Analysis between From the simultaneous conjoint analysis, we
Users and Services classify the services into the following three usage
categories.
(1) Simultaneous Disjoint Clustering of Users and 1) Variant Services: This is a set of services varying
Services the value across different user groups. This is a hot
The first step of conjoint analysis is to spot in requirements attractive to specific user
simultaneously decompose the users and services groups.
into a set of disjoint groups, U and R, respectively. 2) Common Services: This is a set of services
We decompose user space U into a set of n commonly used by almost all user groups. These
disjoint user groups. services provide a foundation of all requirements,
U=ui for i = i..n (1) and can be a frozen spot in the requirements.
In conjoint analysis, the primary criteria of 3) Marginal Services: This is a set of services which
disjoint decomposition are user profiles. However, are much less frequently used by almost all user
selection of profile attributes varies. For market groups. These services can be interpreted as dead
segmentation, Kotler suggested a set of attributes services.
called segmentation variables [10]. Among them, ES Male
ES Female
demographic variables are most widely used. We PS Male
PS Female
have chosen a set of demographic variables of age, 5.00 BP over 35
4.00 BP under 35
gender, occupation and generation since they are 3.00
House Wife
Im q u i r s
a ry
H
id ge
B o us
N pl i W eo
n
BP P un e W
b
R=rj for i = i..m (2)
a v ca e
PS ov de ife
V
D V iga ti on
ce
Al Cal M ato n P F er r 3
riv ib tio
Fa
ES S M ema 35 5
a r cu o d r
m la e a l
Since we are interested in the value of new em le e
Ap
e r
C to r ES F
va
ck Ma al
le e
lo
Ja
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
(2) Identification of Primary Persona and Cast we interview to users corresponding to the primary
To identify primary persona and cast, we define persona to trace their interaction with scenarios.
the following two elicitation methods.
5. Field Studies
1) Elicitation of Simple Primary Persona
Primary persona is a user group, i, of the highest We conducted two stages of field studies from
coverage Ci. Cast is a set of personas of a certain 2003 to 2004 in Japan.
threshold level of coverage, C0, as defined in (4). The first field study was conducted in 2003 with
Cast = {i: Ci C0} (4) 60 users in order to verify the Hanako methodology
[3]. The second field study was conducted in 2004
2) Elicitation of Virtual/Composite Primary Persona
with 105 users in order to analyze the value and
To elaborate a primary persona with a certain hot spots in the requirements of 3G mobile phones.
level of coverage, which no single persona can meet, We also intended to verify the results of field study
we may compose multiple personas to create a in 2003 by those in 2004.
virtual primary persona by the following procedure.
a) Select an initial primary persona as the simple 5.1 First Field Study in 2003
primary persona identified by equation (4).
5.1.1 Design of Field Study in 2003
b) Add a persona complementing the coverage of
We conducted the first field study in the following
the initial primary persona so that the total
two steps.
coverage of two personas meets the criteria C0.
(1) Persona analysis by written questionnaire with
4.4 Analyzing Requirements Value Structure by 60 users.
Personas and Scenarios (2) To identify the interaction between persona and
scenarios, we interviewed to the users in the
(1) Value Analysis of Requirements by Persona
focused user group identified as a primary persona
In the second stage, persona plays a vital role to in the step (1).
increase the value of requirements. The following
process is proposed to identify the value-added 5.1.2 Simultaneous Disjoint Clustering of Users
requirements by analyzing the interaction between and Services
persona and scenario.
(1) Clustering Users
1) Analysis of value structure in the requirements
from the view points of primary persona/cast. To examine the contributions of the level of
computer literacy on the usage of mobile phones,
2) Identification of hot spots in the requirements we randomly selected 60 students from the Faculty
by analyzing the interaction between primary of Mathematical Sciences and Information
persona and scenario of use cases. Engineering and Faculty of Policy Studies in
3) Acquire new requirements from the hot spots. Nanzan University, as shown in Table 2.
(2) Identification of Hot Spots by Persona and Table 2 Participating User Groups in 2003
Scenarios Category Male Female Total
Scenarios are widely-used to describe interactions ES(Engineering Students) 14(ES M) 17(ES F) 32
PS(Policy Studies Students) 14(PS M) 15(PS F) 29
between users and services [1, 4]. Once primary Total 28 32 60
persona is identified, we can evaluate the
interactions between primary persona and service (2) Clustering Mobile Phone Services
in terms of persona’s usage of scenarios. We can
identify the hot spots of the requirements as the We allocated three major clusters of services,
parts of high usage, i.e. preference, of personas in defined in Section 4.2, as follows.
the scenarios. By tracing the scenarios in the hot 1) Communication services include voice phone, e-
spots, we can find extension points to add new mail, and video phone services.
services in order to increase the value of the 2) Contents/Multimedia services include Web
requirements. As a representation of scenario, we browser, music player, digital camera, video
introduce STD (Service Transition Diagram), a camera, and radio/TV receiver.
simplified state transition diagram [24]. With STD,
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
3) Commerce/Application services include Java groups. We can conclude ES F is the primary
application, game, navigator, alarm clock, and persona of mobile phones.
calculator. One of the advantages of persona approach is to
From three clusters, we selected some 20 services provide rich and concrete characteristics of persona
listed in Table 3. We further classified the services [5]. As a language to describe persona, we defined a
by the following two levels of required literacy: template of persona pattern language including
a) Popular services expected to be used by most personal profile, illustration of persona’s face,
users including less literate users. pattern of service usage, and specific interest to the
services. We collected students’ profiles and daily
b) Advanced services which less literate users usage patterns through interviews, and described
may not use. the primary persona as follows.
Table 3 Clusters of Mobile Phone Services in 2003
Service Groups Services Persona
Redialing, Vibrator, Personal Calling Name: Hiroko Niwa
Com- Voice Group: Senior female student in Engineering
Tone, Call Directory, Call Group
muni-
E- E-mail, Face Characters, Image Sign, 1) Personal Profile
cation
mail Copy & Paste, Attachment - Come to school 5 days a week, works part time job at
Contents/ restaurants during weekend
Image(Photo), Video(Movie), Web Access
Multimedia - Study computer science/engineering, and working for
Commerce/ Calculator, Alarm Clock, Schedule, term paper on software engineering
Application Secret Memory, Navigation
- Play tennis once a week
- Working with her personal Web page
5.1.3 Persona Identification and Requirements 2) Pattern of Service Usage
Value Analysis - Daily use of e-mail, browsing the web
(1) Identification of Primary Persona use the phone usually without reading manual
- Buy new phone at every one year and a half
Table 4 summarizes the average usages of user (when boring the capability of current model)
clusters against selected services. The average and - Send/receive some 15 e-mails per day(4lines/e-mail)
SD (Standard Deviation) of each service are also - Call 3 times per day (less than 10 min. per call)
calculated. The statistics implicates the following 3) Specific Interests to the Services
characteristics of service usage. - Easier to write/edit e-mail
Table 4 Usage Value Analysis of Services in 2003 Figure 5 Persona Description
Services ES F ES M PS F PS M Ave. SD (2) Value Analysis of Requirements
Redial 4.41 3.57 3.53 3.93 3.86 0.41
Calculator 3.35 2.43 3.33 2.71 2.96 0.46 From the usage statistics in Table 4 and its radar
Vibrator 4.94 4.93 4.87 4.79 4.88 0.07 chart illustrated in Figure 6, we can identify the
Personal
4.06 2.14 1.53 1.29 2.26 1.26
following types of mobile phone services.
Calling Tone
User Directory 3.59 2.71 2.60 2.71 2.90 0.46 1) Variant Services
Directory Group 4.53 4.14 3.67 3.86 4.05 0.37 In the conjoint statistics, this category is
Alarm Clock 4.82 3.93 3.87 3.93 4.14 0.46
characterized by high standard deviation. It
Scheduler 1.94 3.36 1.53 2.93 2.44 0.85
Secret Memory 3.24 1.29 1.27 1.00 1.70 1.04 includes navigation, receive folder, personal calling
E-mail tone, and e-mail attachment in Table 4.
4.53 2.21 2.67 2.50 2.98 1.05
Attachment
2) Common Services:
E-mail Editor 4.82 2.50 3.20 3.14 3.42 0.99
User Symbols 3.82 3.14 4.93 3.71 3.90 0.75 This category is characterized by high average
Face Character 3.59 4.07 4.87 3.71 4.06 0.58 and low standard deviation. It includes vibrator,
Receive Folder 1.47 4.71 3.40 4.00 3.40 1.39
alarm clock, face character, user symbols, and
Image 3.18 2.50 2.60 2.43 2.68 0.34
Video 1.88 1.29 1.47 1.00 1.41 0.37
redial.
Web 1.24 2.93 3.53 3.07 2.69 1.00 3) Marginal Services
Java App 3.24 2.36 1.67 1.64 2.23 0.75
Navigation 4.53 1.29 1.27 1.00 2.02 1.68 This category is characterized by low average
Total=Coverage 64.0 55.5 55.8 53.4 58.0 - and low standard deviation. It includes movie, and
secret memory.
The total usage value of ES F (Female Student in
Engineering), 64.0, significantly outperforms other
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
Table 6 Clusters of Mobile Phone Services in 2004
Marginal Services
Redial
Redial
55
Service Groups Services
Navigation
Navigation Calculator
Calculator
Common
Redialing, Vibrator, Drive Mode, Call
Jave
Jave App(i-Appli)
App(i-Appli) 44 Vibrator
Vibrator
Services Com- Voice History, Call Hold, Personal Calling Tone,
Web
Web Access
Access
33 Personal
Personal Calling
Calling Tone
Tone muni- Call Directory, Call Group
22 cation E- E-mail, Face Characters, Mail Inquiry,
Movie
Movie 11
User
User Directory
Directory mail Attachment
Contents/
00 Image(Photo), Video(Movie), Web Access
Image
Image Directory
Directory Group
Group Multimedia
Commerce/ Java Application (i-Appli), Navigation,
Receive
Receive Folders
Folders Alarm
Alarm Clock
Clock Application Wallet
ES
ES FF
Face
Face Characters Scheduler
Characters Scheduler
ES
ES MM 5.2.3 Persona Identification and Requirements
Symbols Secret
Secret Memory
Variant Symbols
E-mail
E-mail Copy
Copy &
& Paste
Paste E-mail
Memory
E-mail Attachment
Attachment
PS
PS FF Value Analysis
Services PS
PS MM
(1) Identification of Primary Persona
Figure 6 Three Usage Patterns of Services
Table 7 and Figure 7 show usage interactions
Identified in the Field Study in 2003
between user groups and services. Both female
5.2 Second Field Study in 2004 students in Engineering and Political Studies
represent the highest score of service usage.
5.2.1 Design of Field Study in 2004 Table 7 Usage Value Analysis of Services in 2004
The field study conducted in 2004 is intended to ES E S PS PS BP BP
Services HW
identify the value and hot spots of requirements of F M F M 35+ 35-
3G mobile phones. So, we extended the users Redial 4.40 3.87 4.53 3.80 4.20 3.87 2.93
Call History 4.40 3.80 4.47 4.53 4.53 4.13 2.73
including business people and house wife.
Call Hold 1.20 1.60 1.40 1.67 1.87 1.56 1.33
Face Char. 4.40 4.20 4.80 4.87 1.47 2.47 2.47
5.2.2 Simultaneous Disjoint Clustering of Users Mail Inq. 3.60 2.27 3.87 3.80 1.40 2.93 1.93
and Services Image 3.87 3.73 3.67 2.73 2.00 2.80 1.87
Video 2.60 2.07 2.26 1.67 1.13 1.93 1.00
(1) Clustering Users Web 4.07 3.53 4.33 3.00 1.87 4.00 1.93
We clustered the users into seven groups Java App 2.80 1.67 2.53 2.73 1.20 2.13 1.33
Navigation 1.20 1.13 1.27 1.00 1.00 1.00 1.13
summarized in Table 5. We further classified Vibrator 5.00 4.93 4.27 4.87 4.33 4.20 3.67
business people into two demographic groups by Drive Mode 1.00 1.00 1.27 1.00 1.60 1.00 1.13
the age of 35 since the people under 35 is a Calculator 3.33 2.93 3.13 2.47 1.73 2.80 2.07
generation who familiar with mobile phone since Alarm Clock 4.53 3.80 4.60 3.73 1.67 3.53 2.33
their college life. We included house wife who are Total
46.4 40.5 46.4 41.9 30.0 38.4 27.9
=Coverage
assumed to be less literate in computing in general.
Table 5 Clusters of Participating Users in 2004 In this study, we also intended to know the
preferred services of promising users. Female
Category Male Female Total
Engineering Students 15(ES M) 15(ES F) 30
students are expected to be leading users after
Policy Studies Students 15(PS M) 15(PS F) 30 graduated. So, we decided female students as the
Business (equal or over 35) 15(BP 35+) 15 primary persona, who is composed by female
Business (under 35) 15(BP 35-) 15 students of both Engineering and Political Studies.
House Wife 0 15(HW) 15
Total 105 (2) Value analysis and Hot Spot Analysis
For the primary persona representing the female
(2) Clustering Mobile Phone Services students, we traced the usage scenarios of the
As summarized in Table 6, we follow the same following several use cases of preferred services.
criteria of service categories used in 2003. However, 1) Services for called party including absence,
we included more new and advances services caller identification, and don’t-disturb
provided by only 2.5 G and 3G mobile phones of 2) Enhanced e-mail service, called deco-mail
NTT DoCoMo FOMA [14]. (decoration mail)
3) Wallet services
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
1) Scenario Analysis for Communication Services:
ES
ES Male
Male ES
ES Female
Female PS
PS Male
Male PS
PS Female
Female Case of Deco-mail Service
BP
BP over
over 35
35 BP
BP under
under 35
35 House
House Wife
Wife
Redialing
Redialing
Decoration mail, Deco-mail for short, is an e-mail
Alarm
Alarm Clock
Clock
5.00
5.00
Call
Call History
History
service targeted to young women. User can modify
4.00
4.00 style, fonts and formats of e-mails. Figure 9
Calculator Call
Call Hold
Calculator
3.00
3.00
Hold
Variant illustrates a part of STD (Service Transition
Marginal Services 2.00
2.00 Services Diagram) of Deco-mail service. The percent ratio on
Drive
Drive Mode
Mode 1.00
1.00
Face
Face Characters
Characters the transition indicates the usage ratio elicited
0.00
0.00 from interviews with female students, i.e. primary
Vibrator
Vibrator Mail
Mail Inquiry
Inquiry
persona. Among three usage patterns in Deco-mail
services, we found most of the users prefer only one
Common usage pattern indicated by bold line in Figure 9.
Services Navigation
Navigation Image
Image
The pattern suggests the users prefer to input the
Java
Java Application
Application Video
Video e-mail text first, then to modify the style.
Web
Web
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
Table 8 Comparison of Usages in Two Field Studies Almost 50% of non-technical users do not want
(1)2004 more functionality in the mobile phones. Some 20
Services 2004 (2)2003
(Student) (1)-(2) to 50% of them even prefer simpler phones. We
Ave. SD Ave. SD Ave SD believe this is a clear and strong message from
Redial 3.94 0.53 4.15 0.37 3.86 0.41 0.29
users to mobile phone developers.
Call
4.09 0.65 4.30 0.34 NA NA NA
History
Call Hold 1.52 0.22 1.47 0.21 NA NA NA 6. Evaluations and Discussions
Face Char. 3.52 1.36 4.57 0.32 4.06 0.58 0.51
Mail Inq. 2.83 0.98 3.38 0.75 NA NA NA
Image 2.95 0.83 3.50 0.52 2.68 0.34 0.82 (1) Finding Persona with Hanako Method
Video 1.81 0.58 2.15 0.39 1.41 0.37 0.87 From two field studies, it’s revealed Hanako
Web 3.25 1.02 3.73 0.59 2.69 1.00 1.04
method effectively provides a systematic procedure
Java App 2.06 0.66 2.43 0.52 2.23 0.75 0.20
Navigation 1.10 0.11 1.15 0.11 2.02 1.68 -0.87
to identify persona A case of failed application of
Vibrator 4.47 0.49 4.77 0.34 4.88 0.07 -0.11 persona to mass-market identified the problems of
Drive Mode 1.14 0.23 1.07 0.13 NA NA NA lacking of systematic identification of persona and
Calculator 2.64 0.58 2.97 0.37 2.96 0.46 0.01 confusion and conflicted view to the persona [20].
Alarm So, identification of persona is key success factor in
3.46 1.09 4.17 0.46 4.14 0.46 0.03
Clock
Total 38.8 NA 43.8 NA NA NA NA
applying persona.
5.0 (2) Analysis of Requirements Value and Hot Spots
4.5 2004 2003
4.0
3.5 Hanako method is intended to support analysis of
3.0
2.5
2.0
requirements value and its hot spots from the
1.5
1.0 interaction of persona and scenarios. We conducted
0.5
0.0 several case studies, and identified hot spots to
n
l
pp
or
eb
r.
eo
or
e
tio
ha
ag
t
ed
at
W
d
la
lo
ga
C
Vi
Im
br
va
cu
R
C
ce
Vi
av
rm
Ja
al
C
N
la
A
ES Male
impressive and striking. However, the statistics
0% 20% 40% 60% 80% 100% alone do not provide enough messages to the
developers. In some cases, we need to formulate
more concrete opinions from users.
Figure 11 Preference to the Mobile Phone Services
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE
7. Conclusions of Mobile Phone Systems, Proc. ICSE 2001, May
2001, p. 683.
We proposed Hanako method of persona- [9] T. Kelly, The Art of Innovation: Lessons in
scenario-based requirements analysis methodology Creativity from IDEO, America’s Leading Design
combining with conjoint analysis. We demonstrated Firm, Doubleday, 2001.
the effectiveness of Hanako method through two [10] P. Kotler and G. Armstrong, Principles of Marketing,
field studies with more than 150 users to the 9th Ed., Prentice Hall, 2001.
services of mobile phone product lines. We gained [11]R. D. Luce and J. W. Tukey, Simultaneous Conjoint
various new insights into both users and services, Measurement: A New Type of Fundamental
which are not recognized before. We believe the Measurement, J. of Mathematical Psychology, Vol. 1,
No. 1, 1964, pp. 1-27.
proposed methodology contributes to requirements
engineering in the domains of software embedded [12] C. Lindholm, T. Keinonen, and H. Kiljander, Mobile
Usability: How Nokia Changed the Face of the
in digital consumer products.
Mobile Phone, McGraw-Hill, 2003.
Requirements engineering for digital consumer [13] D. Norman, Emotional Design, Why We Love (Or
products is challenging. Similar problems will arise Hate) Everyday Things, Basic Books, 2004.
in automotive [26], Web [6], and other areas [1, 22]. [14] NTT DoCoMo, http://www.nttdocomo.co.jp/
We are looking at the application of Hanako english/p_s/products/index.html.
method to such area, and get the feedback to [15] NTT DoCoMo, i-mode Felica: Mobile Wallet, http://
improving Hanako method. www.nttdocomo.com/corebiz/imode/services/felica.html.
[16] R. Lutz: Analyzing Software Requirements Error in
Acknowledgements Safety-Critical Embedded Systems, Proc. RE ’93,
The author thanks to Ms. Kaoru Murase and Ms. Yumi IEEE CS Press, 1993, pp. 126-133.
Nakano for conducting a field study in 2003, and Ms. [17] B. Nuseibeh, et al., A Framework for Expressing the
Naoko Kurita and Ms. Yuki Ogino for that in 2004. The Relationships between Multiple Views in
author also thanks to Mr. Yoshiiku Hanai and Mr. Requirements Specification, IEEE Trans. Software
Katsuaki Akama for their support to the field study in Eng., Vol. 20, No. 10, Oct. 1994, pp. 760-773.
2004. This research is partly supported by Fujitsu [18] J. Pruitt and J. Grudin, Persona: Practice and
Limited under the contract UM-44150480. Theory, Proc. DUX 2003, Jun. 2003, http:/ research.
microsoft.com/research/coet/Grudin/Personas/Pruitt-
References Grudin.pdf.
[19] S. Robertson and J. Robertson, Requirements-Led
[1] I. F. Alexander and N. Maiden, Scenarios, Stories, Project Management, Addison Wesley, 2004.
Use Cases, through the Systems Development Life- [20]K. Rönkkö, et al., Persona is not Applicable: Local
Cycle, John Wiley & Sons, 2004. Remedies Interpreted in a Wider Context, Proc.
[2] M. Aoyama, Continuous and Discontinuous Software PDC ’04, Jul. 2004, pp. 112-120.
Evolution: Aspects of Software Evolution across [21]M. Rossi and T. Tuunanen, Marketing Meets
Multiple Product Lines, Proc. IWPSE 2001, ACM Requirements Engineering, Proc. RE ‘03, IEEE CS
Press, Sep. 2001, pp. 87-90. Press, Sep. 2003, p. 341.
[3] M. Aoyama, et al., Hanako Method: A User-Centered [22] A. Storr, The Essential Jung, Princeton University
Requirements Analysis Method for Ubiquitous and Press, 1983.
Embedded Software Systems, TR of IPSJ SIGSE,
[23] A. Sutcliffe, User-Centered Requirements
Mar. 2004, pp. 163-170 (In Japanese).
Engineering, Springer-Verlag, 2002.
[4] J. M. Carroll, Making Use: Scenario-Based Design of
[24] S. Uchitel, et al., Synthesis of Behavioral Models
Human-Computer Interactions, MIT Press, 2000.
from Scenarios, IEEE Trans. Software Eng., Vol. 29,
[5] A. Cooper, The Inmates Are Running the Asylum, No. 2, Feb. 2003, pp. 99-115.
SAMS, 1999.
[25] K. Väänänen-Vainio-Mattila and S. Ruuska,
[6] J. J. Garrett, The Elements of User Experience: Designing Mobile Phones and Communications for
User-Centered Design for the Web, New Riders, 2002. Consumers’ Needs at Nokia, Information Appliance
[7] A. Gustafsson, et al., Conjoint Measurement: and Beyond, Morgan Kaufmann, 2000, pp. 169-204.
Methods and Applications, 3rd ed., Springer-Verlag, [26] M. Weber and J. Weisbrod, Requirements
2003. Engineering in Automotive Development: Experience
[8] Y. Hanai and M. Aoyama, Challenge of Keitai and Challenges, Proc. RE ’02, IEEE CS Press, Sep.
Software: Software Engineering for Next Generation 2002, pp. 331-340.
Proceedings of the 2005 13th IEEE International Conference on Requirements Engineering (RE’05)
0-7695-2425-7/05 $20.00 © 2005 IEEE