Irit Hadar

Irit Hadar
University of Haifa | haifa · Department of Information Systems

About

138
Publications
34,132
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,849
Citations

Publications

Publications (138)
Conference Paper
Full-text available
Security challenges to cloud based AI systems come from both classical and quantum adversaries. In this research, an innovative framework that combines the quantum key distribution (QKD) with confidential computing, for the protection of AI system integrity and reliability against present and future quantum threats, is presented. With our approach,...
Article
Full-text available
Context and motivation: Climate change is manifested by climate variability, rising temperatures (and thus evaporation), and extreme events such as droughts and floods, which have a profound effect on the availability of natural resources, for example, high-quality water. While several technologies for addressing these challenges are available, the...
Article
Full-text available
This study investigates the influence of digital infrastructure on creating an organizational climate conducive to digital transformation. It highlights the critical role of data lakes, network connectivity, and a shared digital language in cultivating an environment that aligns managerial objectives with employee engagement in digital initiatives....
Article
Full-text available
This is one of two contributions written to commemorate Professor Uri Leron, who became Associate Editor of what was then the International Journal for Computers and Mathematical Learning, a journal founded by Seymour Papert, and upon which Digital Experiences in Mathematics Education builds. One contribution includes memories from several current...
Article
The rapid diffusion of software systems into all aspects of human life has exacerbated security threats and thus amplified the requirement for proactive approaches for designing security as a default. Following evidence from previous studies, indicating or ganizational climate as a key influencer on developers’ security mindsets and behaviors, this...
Chapter
During the last decades, process mining (PM) has matured and rapidly increased in its adoption. Making sense of data is a main part of the work of PM analysts, which involves cognitive processes. Recent work has leveraged behavioral data to explain these processes. Still, the process of process mining (PPM) is yet to be well understood and a theore...
Chapter
The improvement of business processes through learning and investigating workarounds has attracted research attention in recent years. Workarounds can be considered as a symptom of needed process improvements but adopting them does not necessarily lead to an appropriate one. Hence, identifying and understanding the underlying problems or perceived...
Article
Full-text available
Business process management, design, and analysis is mostly centered around a process model, which depicts the behavior of a process case (instance). As a result, behavior that associates several cases together has received less attention. Yet, it is important to understand and track associations among cases, as they bear substantial consequences f...
Article
Full-text available
Workarounds are a common practice in a broad range of organizational and technological contexts, which has received much attention in information systems research. They are sometimes considered negatively, associated with business risks and noncompliance, and sometimes positively, as a source of innovation and improvement. Although workaround-based...
Article
Full-text available
As software engineering (SE) practitioners, we can help society by using our communities of experts to address a software need of a socially conscious organization. Doing so can benefit society in the locale of a SE conference and provide access to international experts for local organizations. Furthermore, established SE researchers as well as pra...
Article
Full-text available
Recent research shows that people usually try to avoid exerting cognitive effort yet they are willing to exert effort to gain rewards. This cost–benefit framework provides predictions for behaviour outside the laboratory. Nevertheless, the extent to which such considerations affect real-life decisions is not clear. Here we experimentally examined c...
Article
Full-text available
Privacy and security by design are policy measures that guide software developers to engineer privacy and security solutions inherently into the software systems they develop. However, although these policy measures have been widely discussed and promoted over the years, recent studies still show a consistent underperformance of privacy and securit...
Article
Security by design is a recommended approach, addressing end-to-end security and privacy in the design of software systems. To realize this approach, proactive security behavior is required from software developers. This research follows results from previous studies that suggest that personal and organizational characteristics influence security-r...
Article
Full-text available
In this age of digital transformation, knowledge-intensive organizations strive to improve business outcomes and sustainability by improving their knowledge-intensive business processes (KIBPs) to obtain a competitive advantage. Many researchers have claimed that KIBP enhancement is possible through knowledge management (KM) initiatives supported b...
Article
Privacy and security by design are policy measures that guide software developers to engineer privacy and security solutions inherently into the software systems they develop. However, although these policy measures have been widely discussed and promoted over the years, recent studies still show a consistent underperformance of privacy and securit...
Chapter
Digital technologies are increasingly used by law enforcement in forensic processes. This opens the door to new opportunities for the use of conceptual modeling techniques to support pro-active collection and modeling of crime scene evidence—especially for the more challenging case of soft evidence. As opposed to digital evidence and other ‘hard’ e...
Chapter
Understanding developers’ attitudes towards handling personal data is vital in order to understand whether the software they create handles their users’ privacy fairly. We present the results of a study adapting an existing user-focused privacy concern scale to a software development context and running it with a sample of 123 software developers,...
Article
Full-text available
The importance of the role that knowledge management (KM) plays in the success of knowledge-intensive organizations has long been acknowledged. However, requirements engineering (RE) methods for KM solutions still lack maturity, as do the educational programs in this domain. In this paper, an agile-based educational method for teaching RE for KM so...
Chapter
Workarounds in business processes and information systems (IS) have attracted research attention in recent years. Deviating from official processes, workarounds are goal-driven adaptations. Understanding the underlying problems or perceived barriers that motivate workarounds is essential for suggesting appropriate solutions which would lead to proc...
Conference Paper
Full-text available
Workarounds in business processes and information systems (IS) have attracted research attention in recent years. Deviating from official processes, workarounds are goal-driven adaptations. Understanding the underlying problems or perceived barriers that motivate workarounds is essential for suggesting appropriate solutions which would lead to proc...
Article
Full-text available
We report on a mixed-method, comparative study investigating whether there is a difference between privacy concerns expressed about pet wearables as opposed to human wearables-and more importantly, why. We extracted the privacy concerns found in product reviews (N=8,038) of pet wearables (activity, location, and dual-function trackers), contrasting...
Article
Full-text available
This paper proposes a unified knowledge management requirements engineering methodology (KM-REM) for tackling the complex nature of knowledge-intensive organizations. Despite the importance of KM for the success of knowledge-intensive organizations, the concept of RE for KM solutions is still vague lacking. Its definitions and guidelines for addres...
Article
Full-text available
The problem of inconsistency in requirements engineering has been in the spotlight of the RE community from the early 1990s. In the early years, inconsistency was perceived in the literature as a problem that needs to be eliminated on sight. More recently, it has become recognized that maintaining consistency at all times is not only infeasible, bu...
Conference Paper
Understanding developers' attitudes towards handling personal data is vital in order to understand whether the software they create handles their users' privacy fairly. We present the results of a study adapting an existing user-focused privacy concern scale to a software development context and running it with a sample of 123 software developers,...
Conference Paper
Activity trackers for dogs are increasingly popular, having the potential to improve pets' welfare and providing a 'digital voice' for expressing their needs. ACI research has so far mainly focused on their impact on the pet-human bond. However, also privacy considerations play an important role as they may pose significant barriers towards their w...
Article
Full-text available
This research was aimed at eliciting the requirements of practitioners who use conceptual modeling in their professional work for the visual notations of modeling languages. While the use of conceptual modeling in practice has been addressed, what practitioners in fact require of the visual notation of the modeling languages they use has received l...
Chapter
Functions provide substantial benefits for software development, simplifying programming through decomposition, reusability and abstraction. In a previous study, our group identified a tendency of high-school students to not use functions, even in programming tasks where functions can be a good solution strategy. The current research extends this o...
Article
As an increasingly prevalent class of consumer device, pet wearables hold more privacy implications than might at first be apparent. Whilst marketed as devices for pets, through analysis of privacy policies we show that more data is captured about owners than pets-and what data is captured remains vague.
Article
As researchers and teachers and practitioners, we “software types” excel at multitasking. This, in part, led us to ask the question: Can one attend a software engineering conference and do something good for society? We found the answer to be a resounding yes. In this article, we present our first experience of running RE Cares, a conference colloc...
Article
The billion dollars' worth pet industry is catching up on the wearables market, as pet activity and location trackers are increasingly worn by our furry friends. Despite the growing body of work on user perceptions of human wearables, very few works have addressed canine activity trackers and their impact on pet owners' lifestyles and the human-ani...
Article
Advances in modern technology, such as the Internet of Things (IoT) and ubiquitous computing, open up new exciting opportunities for technology for animals. This is evidenced by the explosion of products and gadgets available for pets, digital enrichment for captive animals in zoos, sensor based smart farming, etc. At the same time, the emerging di...
Chapter
Full-text available
As software engineering (SE) and information systems (IS) projects become more and more of collaborative nature in practice, project-based courses become an integral part of IS and SE curricula. One major challenge in this type of courses is students’ tendency to write test cases for their projects at a very late stage, often neglecting code covera...
Conference Paper
Full-text available
Requirement engineering (RE) presents several challenges stemming from the required collaboration and knowledge transfer between analysists, developers and customers. Motivation theories have been used occasionally to analyze and encourage motivation and engagement of stakeholders in RE tasks. In recent years, gamification techniques have been used...
Conference Paper
Privacy by design (PbD) is a policy measure that calls for embedding privacy into the design of technologies at early stages of the development process and throughout its lifecycle. By introducing privacy considerations into the technological design, PbD delegates responsibility over privacy to those in charge of the design, namely software develop...
Article
INTRODUCTION: The Physics of Notations (PoN) is a theory for the design of cognitively effective visual notations, emphasizing the need for design grounded in objective and verifiable rationale. Although increasingly applied, no systematic analysis of PoN applications has yet been performed to assess the theory's efficacy in practice. OBJECTIVES: O...
Article
Full-text available
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers’ perceptions, interpretation and practices as to informational privacy (or data protection). To this end, we conducted in-depth intervie...
Article
Full-text available
Information quality (IQ) is a multidimensional construct, and includes dimensions such as accuracy, completeness, objectivity, and representation that are difficult to measure. Recently, research has shown that ratings of IQ by independent assessors yielded high inter-rater agreement for some information quality dimensions as opposed to others. The...
Article
Context: Industry-academia collaboration (IAC) in the field of software engineering is widely discussed in the literature, highlighting its importance and benefits. However, along with the benefits, academic researchers face challenges while performing empirical studies in industry, risking their success. Awareness of these challenges and the impor...
Conference Paper
This paper proposes a systematic framework for applying the Physics of Notations (PoN), a theory for the design of cognitively effective visual notations. The PoN consists of nine principles, but not all principles lend themselves equally to a clear and unambiguous operationalization. As a result, many visual notations designed according to the PoN...
Conference Paper
Functions can provide substantial benefits for programmers. They offer ways that can be used to simplify a given programming task through decomposition, reusability and abstraction. As observed by the first author, a graduate student and high school computer science (CS) teacher, students do not spontaneously use functions when they are asked to so...
Conference Paper
This research-in-progress paper proposes the need for a move towards more meaningful variability of visual notations. Evidence accumulated via an online survey on the requirements practitioners have for visual notations, indicate the need for variability of a modeling languages visual notation. Widely used modeling languages in practice such as UML...
Conference Paper
Full-text available
New technologies continuously challenge people's information privacy, while privacy protection practices, such as Privacy-by-Design, did not become widespread engineering practices. The difficulty of designing privacy-preserving information systems highlights the need for studying developers' privacy decision-making processes, as the developers' co...
Conference Paper
In a previous paper [12] we argued for more user-centric analysis of modeling languages’ visual notation quality. Here we present initial findings from a systematic literature review on the use of the Physics of Notations (PoN) to further that argument. Concretely, we show that while the PoN is widely applied, these applications rarely actively inv...
Conference Paper
The Physics of Notations [9] (PoN) is a design theory presenting nine principles that can be used to evaluate and improve the cognitive effectiveness of a visual notation. The PoN has been used to analyze existing standard visual notations (such as BPMN, UML, etc.), and is commonly used for evaluating newly introduced visual notations and their ext...
Article
Full-text available
Purpose – The purpose of this paper is to propose a conference-based online social network (OSN) for academics’ knowledge sharing and collaboration around and beyond a conference, while exploring the entanglement of the social and technical aspects of the system. Design/methodology/approach – Following an exploratory study, an OSN prototype was de...
Chapter
Software architecture is an important part of software development, aiming at ensuring a high-quality product. Recent research has shown that collaboration and knowledge management are important parts of the architecture process, and have significant role in architecture design and review. In this paper we present a prototype for a tool we develope...
Conference Paper
Inconsistency is a major challenge in requirements engineering. Traditionally, software requirements specifica-tions (SRSs) are expected to be consistent, with the underlying assumption that this consistency is always achievable. However, with the growing complexity of software systems it has become clear that this assump-tion is not always realist...
Conference Paper
Constructing enterprise-level solution requires integration of existing, modified, and new modular technologies. A customer specific solution is instantiated from a reference implementation owned by the services organization, as a result of multiple products and their reference design created by the R&D organization. Yet, the disciplines of R&D and...
Chapter
Wiki is a collaboration platform allowing building a corpus of knowledge in interlinked web pages created and edited by different users. Wiki has been applied in different domains and usage contexts in business and education. This paper reports on an exploratory study conducted as a part of an ongoing research regarding the use of wiki in software...
Article
Full-text available
Declarative approaches to process modeling are regarded as well suited for highly volatile environments as they provide a high degree of flexibility. However, problems in understanding and maintaining declarative business process models impede often their usage. In particular, how declarative models are understood has not been investigated yet. Thi...
Conference Paper
This paper proposes a gradual approach to crowd-based requirements engineering (RE) for supporting the establishment of a more engaged crowd, hence, mitigating the low involvement risk in crowd-based RE. Our approach advocates involving micro-crowds (MCs), where in each micro-crowd, the population is relatively cohesive and familiar with each other...
Conference Paper
Research on improving the cognitive effectiveness of conceptual modeling languages visual notations often lacks empirical consideration of the people and modeling tasks involved. Such consideration can generate insight into cognitive requirements set by different modeling tasks. In this position paper we propose an empirical research design for gai...
Article
Software architecture is integral part of the software development; however, its integration in the development process has become more challenging with the transition from traditional to agile development methods, and with the architects becoming much more than technological experts responsible for high-level design. Some attention has been paid i...
Conference Paper
The acceptance and correct use of new paradigms in information systems engineering is highly affected by cognitive dispositions of the individual engineers. In particular, the engineers’ intuition–based on their vast experience–may come in the way of accepting the rationale of a new paradigm. Analyzing engineers’ reaction to a newly introduced para...
Conference Paper
Technical debt represents the situation in a project where developers accept compromises in one dimension of a system in order to meet urgent demands in other dimensions. These compromises incur a “debt”, on which “interest” has to be paid to maintain the long-term health of the project. One of the elements of technical debt is documentation debt d...
Poster
Code review is an important task in software development. However, performing code review is perceived, for the most part, as an undesired task, presenting several challenges to the required collaboration and knowledge transfer between programmers and reviewers. In order to overcome these challenges and improve the effectiveness of code review, we...
Conference Paper
Conducting empirical research in industry is not an easy task. Previous research has discussed some of the challenges in this type of research and potential solutions have been proposed. However, conducting cross-organizational research introduces specific challenges, some of which are quite hard to overcome. In this paper, we present the use of pr...
Conference Paper
Conducting empirical research in industry is not an easy task. Previous research has discussed some of the challenges in this type of research and potential solutions have been proposed. However, conducting cross-organizational research introduces specific challenges, some of which are quite hard to overcome. In this paper, we present the use of pr...
Article
Full-text available
The topic of enhancing the software development process has received much attention in recent decades. Several models have been developed to this end, typically addressing the characteristics of the process or the organization. We believe that an additional, substantial enhancement of software development can be achieved via encouraging productive...
Article
Full-text available
Declarative approaches to business process modeling are regarded as well suited for highly volatile environments, as they enable a high degree of flexibility. However, problems in understanding and maintaining declarative process models often impede their adoption. Likewise, little research has been conducted into the understanding of declarative p...
Article
How do information systems designers handle privacy when designing systems? How do they perceive and interpret privacy?Privacy by Design (PbD) is the idea that designers should apply technological measures that aim to address privacy concerns, applied to the very same technology that might create the privacy risk. PbD requires system designers to a...
Article
Policymakers around the world constantly search for new tools to address growing concerns as to informational privacy (data protection). One solution that has gained support in recent years among policy makers is Privacy by Design (PbD). The idea is simple: think of privacy ex ante, and embed privacy within the design of a new technological system,...
Article
ContextOver the years, several modeling languages for requirements have been proposed. These languages employ different conceptual approaches, including scenario-based and goal-oriented ones. Empirical studies providing evidence about requirements model comprehensibility are rare, especially when addressing languages that belong to different modeli...
Article
This paper presents difficulties illustrated by software development practitioners with regard to the use and understanding of concepts and principles of the object-oriented paradigm. In order to understand these difficulties and the sources from which they stem, a theoretical framework borrowed from cognitive psychology, called the dual-process th...
Conference Paper
This paper presents a case study of an IT firm, in which the deployment architecture process was analyzed from a knowledge management (KM) perspective, using the KM audit methodology, SEKAM. The analysis identified several KM gaps, which can cause serious deployment requirements’ traceability (RT) problems. Based on these findings, we propose a pre...
Conference Paper
Full-text available
Deployment architecture is an important part of the software development lifecycle. Our preliminary research indicates that the process of constructing the deployment architecture holds several challenges which, if not properly met, may hinder the success of the project and result in low customer satisfaction. In this ongoing research, we analyze t...
Conference Paper
Deployment architecture is an integral part of the software development lifecycle. Few empirical studies regarding the deployment process are found in literature, most of which focus on defining the process and understanding its requirements. Deployment concerns that have not been widely inquired include the challenges along the process, and the pr...
Conference Paper
Academia and industry have been collaborating for over a century in different formats, including research projects' funds, commercialization of academic knowledge, academic consultancy in industrial projects, etc. Yet, academic researchers face various difficulties and challenges when performing research in industry. In this paper we describe sever...
Conference Paper
Full-text available
The contribution of academic research to projects in industry has been discussed and highlighted; yet it is still not easy for an academic researcher to establish collaboration with industrial partners. In this paper we describe an empirical research conducted in collaboration with multiple firms. This research was originally initiated as a single...
Conference Paper
The use of agile development methodologies in the software industry has increased significantly over the past decade. This has led to efforts to adjust these methodologies to enterprise products and complex systems' development, and specifically to combine the requirement of minimalism with the need for well-defined up-front architecture artifacts....
Article
Software maintenance constitutes a significant part of software development, which sometimes becomes the lion's share of the project workload. Being a highly knowledge-intensive process, software maintenance can greatly benefit from knowledge management. Many software projects integrate commercial off-the-shelf (COTS) systems components in their pr...
Article
Full-text available
This paper presents a case study of an IT firm, in which the deployment architecture process was analyzed from a knowledge management (KM) perspective, using the KM audit methodology, SEKAM. The analysis identified several KM gaps, which can cause serious deployment requirements' traceability (RT) problems. Based on these findings, we propose a pre...
Conference Paper
Full-text available
Literature on information systems (IS) method design provides little guidance for constructing and validating IS related methods based on components of existing methods. Method engineering, including method characteristics framework and super method, is a methodology for constructing holistic new methods from existing ones, based on the elicitation...
Conference Paper
Enterprise architecture software design is all about composing applications to assemble value-added solutions rather than standalone products. Yet, each product and technology may have been designed and developed separately because of software engineering practices, management control over the deliverables, or technology acquisitions. To promote ef...
Article
Documentation plays a significant role in software development in general and in software architecture in particular. In large and complex systems, many changes affecting architecture and architectural documentation occur. This derives the need for constant changes within architecture documents in order to keep them up to date. This research in-pro...
Article
The use of agile methodologies in industry has increased significantly over the past decade, promoting the value of human-centric software development process. This growing use derives the need t