Chehara Pathmabandu, J. Grundy, Mohan Baruwal Chhetri, Z. Baig
{"title":"An Informed Consent Model for Managing the Privacy Paradox in Smart Buildings","authors":"Chehara Pathmabandu, J. Grundy, Mohan Baruwal Chhetri, Z. Baig","doi":"10.1145/3417113.3422180","DOIUrl":"https://doi.org/10.1145/3417113.3422180","url":null,"abstract":"Smart Buildings are defined as the “buildings of the future” and use the latest Internet of Things (IoT) technologies to automate building operations and services. This is to both increase operational efficiency as well as maximize occupant comfort and environmental impact. However, these “smart devices” - typically used with default settings - also enable the capture and sharing of a variety of sensitive and personal data about the occupants. Given the non-intrusive nature of most IoT devices, individuals have little awareness of what data is being collected about them and what happens to it downstream. Even if they are aware, convenience overrides any privacy concerns, and they do not take sufficient steps to control the data collection, thereby exacerbating the privacy paradox. At the same time, IoT-based building automation systems are revealing highly sensitive insights about the building occupants by synthesizing data from multiple sources and this can be exploited by the device vendors and unauthorised third parties. To address the tension between privacy and convenience in an increasingly connected world, we propose a user-centric informed consent model to foster an accurate user discretion process for privacy choice in IoT-enabled smart buildings. The proposed model aims to (a) inform and increase user awareness about how their data is being collected and used, (b) provide fine-grained visibility into privacy compliance and infringement by IoT devices, and (c) recommend corrective actions through nudges (or soft notifications). We illustrate how our proposed consent model works through a use case scenario of a voice-activated smart office.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126647807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zimbabwean Non-Uptake of Protective Point-of-Sale Behaviours: Is this a Risk Homeostasis Response?","authors":"Alfred Musarurwa, K. Renaud, Tim Schürmann","doi":"10.1145/3417113.3422150","DOIUrl":"https://doi.org/10.1145/3417113.3422150","url":null,"abstract":"In a world which is increasingly relying on debit and credit cards to effect transactions, people are entering PINs in a wide range of situations and contexts. We all know we ought to shield PIN entry, and check for skimmers if we are using magnetic stripe cards. Yet previous studies have found that a minority of card users shield their PINs at Points of Sale (PoS). Previous studies into the incidence of PIN shielding have taken place in Europe, with stable currencies and relative wealth. Zimbabwe, in 2019, presented us with a unique opportunity to carry out a replication study that is essentially a “natural experiment” i.e. we can study behaviours in interesting contexts which happen by chance, not by design. The context of interest is one where the country's currency is devaluing steeply, and creating a great deal of uncertainty and hardship. This occurred because Zimbabwe introduced a number of currency reforms in a short period of time. Protection Motivation Theory (PMT) suggests that people engage in a calculus based on their threat and coping appraisals. The devaluing currency ought to heighten threat appraisals (loss being much harder to bear) and the protective action's cost is relatively low (using a hand to shield a PIN). We ought, therefore, to see a higher incidence of protective behaviours in Zimbabwe. Our observation and interview study surprisingly found lower levels of PIN shielding at Points of Sale (PoS) than in previous European studies. We also found that those participants who did not take protective behaviours tended to know how to recover from card fraud. The low incidence we observed contradicted our PMT-based predictions. A possible explanation is that we are observing a risk homeostasis response, which suggests that having a “safety net” (being able to get your money back) might make people decide not to make the effort to take protective actions.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128398350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boosting Component-based Synthesis with API Usage Knowledge","authors":"Jiaxin Liu, Wei Dong, Binbin Liu","doi":"10.1145/3417113.3423370","DOIUrl":"https://doi.org/10.1145/3417113.3423370","url":null,"abstract":"Component-based synthesis is one of the hottest research areas in automated software engineering. It aims to generate programs from a collection of components like Java library. However, the program space constituted by all the components in the library is fairly large, which leads to a vast number of candidate programs generated for a long time. The intractability of the program space affects the synthesis efficiency of the program and the size of the program generated. In this paper, we propose ITAs, a framework of iterative program synthesis via API usage knowledge from the Internet, which can significantly improve the efficiency of program synthesis. ITAs aims to constrain the program space by combining two main ideas. First, narrow down the program space from the outside via the guidance of API usage knowledge. Second, expand the program space from the inside via iterative strategy based on knowledge. For evaluation, we collect a set of programming tasks and compare our approach with a program synthesis tool on synthesizing these tasks. The experiment results show that Itas can significantly improve the efficiency of program synthesis, which can reduce the synthesis time by 97.1 % than the original synthesizer.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Vision to Mitigate Bioinformatics Software Development Challenges","authors":"A. Rahman, Farzana Ahamed Bhuiyan","doi":"10.1145/3417113.3422155","DOIUrl":"https://doi.org/10.1145/3417113.3422155","url":null,"abstract":"Developers construct bioinformatics software to automate crucial analysis and research related to biological science. However, challenges while developing bioinformatics software can prohibit advancement in biological science research. Through a human-centric systematic analysis, we can identify challenges related to bioinformatics software development and envision future research directions. From our qualitative analysis with 221 Stack Overflow questions, we identify six categories of challenges: file operations, searching genetic entities, defect resolution, configuration management, sequence alignment, and translation of genetic information. To mitigate the identified challenges we envision three research directions that require synergies between bioinformatics and automated software engineering: (i) automated configuration recommendation using optimization algorithms, (ii) automated and comprehensive defect categorization, and (iii) intelligent task assistance with active and reinforcement learning.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems","authors":"N. Arachchilage, M. A. Hameed","doi":"10.1145/3417113.3422149","DOIUrl":"https://doi.org/10.1145/3417113.3422149","url":null,"abstract":"Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related “privacy engineering” methodologies exist and provide clear instructions for developers to implement privacy into software systems they develop that preserve user privacy. However, those practices and methodologies are not yet a common practice in the software development community. There has been no previous research focused on developing “educational” interventions such as serious games to enhance software developers' coding behaviour. Therefore, this research proposes a game design framework as an educational tool for software developers to improve (secure) coding behaviour, so they can develop privacy-preserving software applications that people can use. The elements of the proposed framework were incorporated into a gaming application scenario that enhances the software developers' coding behaviour through their motivation. The proposed work not only enables the development of privacy-preserving software systems but also helping the software development community to put privacy guidelines and engineering methodologies into practice.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ecosystem Evolution Analysis and Trend Prediction of Projects in Android Application Framework","authors":"Zhehao Fan, Zhiyong Feng, Xiao Xue, Shizhan Chen, Hongyue Wu","doi":"10.1145/3417113.3422185","DOIUrl":"https://doi.org/10.1145/3417113.3422185","url":null,"abstract":"The application framework layer in the Android system consists of numerous project repositories, which rely on each other to form a co-evolving software ecosystem. Android's application framework layer provides many useful APIs to millions of Android Apps, so its evolution will affect the robustness and stability of Android Apps. Code dependency analysis technology is a common way to analyze software ecosystems. However, the code size of projects in the Android application framework layer is so huge that ordinary analysis methods are unacceptable due to the excessive resources required. In this paper, we propose an approach for evolution analysis and trend prediction based on the subgraph of code dependency network graph, in order to realize the effective analysis of large-scale software ecosystem. Based on the source code data of the application framework collected from AOSP, our proposed approach is verified. The prediction results of our model show that the average values of precision and recall are 90.0% and 90.4% respectively, which proves that our approach can well is effective.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116815735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AutoEPRS-20: Extracting Business Process Redesign Suggestions from Natural Language Text","authors":"Amina Mustansir, K. Shahzad, M. K. Malik","doi":"10.1145/3417113.3423374","DOIUrl":"https://doi.org/10.1145/3417113.3423374","url":null,"abstract":"In this paper, we have defined an NLP task, for the automatic extraction of business process redesign suggestions from natural language text. In particular, we have employed a systematic protocol to define the task, which is composed of three elements and three sub-tasks. The elements are: a) a real-world process model, b) actual feedback in natural language text, and c) three-level classification of the feedback. The task is composed of two binary and one multi-class classification sub-tasks. The evaluation of the AutoEPRS-20 task is performed using six traditional supervised learning techniques. The results show that the third sub-task is more challenging that the two binary sub-tasks.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing Delay Penalty of Multiple Concurrent Software Projects based on Overtime Planning","authors":"Wei Zhang, Yun Yang, Xiao Liu","doi":"10.1145/3417113.3422152","DOIUrl":"https://doi.org/10.1145/3417113.3422152","url":null,"abstract":"For software projects, significant delays can result in heavy penalty which may end up with project costs exceeding their budgets. As a consequence, employees, i.e., software developers, are often requested to work overtime in order to reduce or even eliminate the delays. By doing so, overtime payment may often be introduced and excessive overtime payment can also easily swallow company profit which may even lead to serious overdraft Hence software manager needs to decide who should work overtime and how much overtime they would take in order to control the cost. This means that it is important to investigate how to reduce or eliminate the overall penalties by taking multiple concurrent software projects into account. In practice, there is normally a number of available employees with same or similar skills and domain knowledge from other similar concurrent projects. In addition, they have different skill proficiency.So rescheduling those employees with appropriate overtime may be feasible to find a solution which can reduce or eliminate the penalties of delayed software projects. Since this kind of scheduling is a typical NP-hard problem, a novel generic strategy is proposed to help select appropriate employees and determine how much overtime to be assigned to the delayed activities. The new strategy combines the features of Ant Colony Optimization algorithm and Tabu strategy and includes four rules to reduce the search space. A set of comprehensive generic experiments is carried out in order to evaluate the performance of the proposed strategy in a general manner. In addition, three real world software project instances are also utilized to evaluate our strategy The results demonstrate that our strategy is effective which outperforms the other representative strategies which are applied successfully at software project scheduling.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roman Urdu Reviews Dataset for Aspect Based Opinion Mining","authors":"Rabail Zahid, M. Idrees, H. Mujtaba, M. O. Beg","doi":"10.1145/3417113.3423377","DOIUrl":"https://doi.org/10.1145/3417113.3423377","url":null,"abstract":"Social media, today, demonstrates the rapid growth of modern society as it becomes the main platform for Internet users to communicate and express themselves. People around the world, use a number of devices and resources to access the Internet, set up social networks, conduct online business, e-commerce, e-surveys, etc. Currently, social media is not only a technology that provides information to consumers, it also encourages users to connect and share their views and perspectives. It leads to an increase in inspiration towards Opinion Mining (OM), which is important for both customers and companies in making decisions. Individuals like to see the opinions provided by other customers about a particular product or a service. Companies need to analyze their customer's feedback to strengthen their business decisions. A lot of research has been performed in various languages in the field of Aspect Based OM (ABOM). However, there are still certain languages that need to be explored, such as Roman Urdu (RU). This paper presents a proposed reviews data-set (a RU data-set) of mobile reviews that has been manually annotated with multi-aspect sentiment labels at the sentence-level. It presents base-line results using different Machine Learning (ML) algorithms. The results demonstrate 71% F1-score for aspect detection and 64% for aspect-based polarity.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Requirements of Pandemic Awareness Systems: A Case Study of COVID-19 Using Social Media Data","authors":"Esmaeil Shakeri, B. Far","doi":"10.1145/3417113.3422151","DOIUrl":"https://doi.org/10.1145/3417113.3422151","url":null,"abstract":"With the exponential growth of social media platforms like Twitter, a seemingly vast amount of data has become available for mining to draw conclusions about various topics, including awareness systems requirements. The exchange of health-related information on social media has been heralded as a new way to explore information-seeking behaviour during pandemics and design and develop awareness systems that address the public's information needs. Online datasets such as Twitter, Google Trends and Reddit have several advantages over traditional data sources, including real-time data availability, ease of access, and reduced cost. In this paper, to explore the pandemic awareness systems (PAS), requirements, we utilize data from the large accessible database of tweets and Reddit's posts to explore the contextual patterns and temporal trends in Canadians' information-seeking behaviour during the COVID-19 pandemic. To validate our inferences and to understand how Google searches regarding COVID-19 were distributed throughout the course of the pandemic in Canada, we complement our Twitter and Reddit data with that collected through Google Trends, which tracks the popularity of specific search terms on Google. Our results show that Social media content contains useful technical information and can be used as a source to explore the requirements of pandemic awareness systems.","PeriodicalId":110590,"journal":{"name":"2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123527216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}