2021
DOI: 10.1007/978-3-030-69717-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Genetic K-Means Adaption Algorithm for Clustering Stakeholders in System Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…One possible solution is to cluster many potential stakeholders for the mobile and web-based applications into smaller groups that can be easily managed and analyzed by introducing un-supervising clustering techniques, such as Genetic K-means, Kmeans, etc. [151]. Furthermore, it is mandatory to consider cultural and sociotechnical factors when identifying indirect system stakeholders for marketbased software applications, i-e., face recognition systems, etc., that are currently overlooked, which might have serious consequences [155].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…One possible solution is to cluster many potential stakeholders for the mobile and web-based applications into smaller groups that can be easily managed and analyzed by introducing un-supervising clustering techniques, such as Genetic K-means, Kmeans, etc. [151]. Furthermore, it is mandatory to consider cultural and sociotechnical factors when identifying indirect system stakeholders for marketbased software applications, i-e., face recognition systems, etc., that are currently overlooked, which might have serious consequences [155].…”
Section: Discussionmentioning
confidence: 99%
“…Next, we use text similarity algorithms, natural language toolkit, and unsupervised learning algorithms, such as KMean, genetic KMean, etc. to identify similar stakeholders in the social media platforms [151]. Finally, we can identify similar stakeholders if slightly different end-users names have similar email login names.…”
Section: Identify Similar Stakeholders In the Social Mediamentioning
confidence: 99%
“…This identification has a clear impact on the problem of requirement selection by reducing the workload; as with a smaller group of stakeholders, we can identify a set of requirements that satisfies the demands of the overall community of stakeholders. Other works, such as [20,21,32,9,36] focus on the impact that stakeholder weight has on requirement selection, but do not accomplish any stakeholder classification task. Instead, they embedded all stakeholder data into the requirement selection problem.…”
Section: Related Workmentioning
confidence: 99%
“…The first refers to our estimates about power, legitimacy, and urgency, which have been derived from the available data records. Being this adaptation of the hand a possible threat, it has been based, respectively, on the ground truth for power, on a recommendation network for legitimacy (which has been validated in several works [39,21,35,38]), and simple votes count for urgency. This mapping is adequate within the scope of our work and captures the meaning that stakeholder theory defines for each salience component [24].…”
Section: Limitations and Threats To Validitymentioning
confidence: 99%
See 1 more Smart Citation