2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)最新文献

筛选
英文 中文
Towards Formal Concepts for Explanation Timing and Justifications 关于解释、时间和论证的形式概念
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00025
Akhila Bairy, Willem Hagemann, Astrid Rakow, Maike Schwammberger
{"title":"Towards Formal Concepts for Explanation Timing and Justifications","authors":"Akhila Bairy, Willem Hagemann, Astrid Rakow, Maike Schwammberger","doi":"10.1109/REW56159.2022.00025","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00025","url":null,"abstract":"Explainability of automated systems gains increasingly more importance, since these systems get more complex and at the same time we — individually and as a society — become more reliant on them. There is a vast amount of works on explainability in the field of computer science alone, but there is little work on formal concepts to model and design explanations. In order to contribute to paving the way for model based design of explanations, we formally approach two main questions \"How to provide a justified explanation?\" and \"When to provide an explanation?\".","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk-Based Security Requirements Model for Web Software 基于风险的Web软件安全需求模型
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00051
O. Ezenwoye, Yi Liu
{"title":"Risk-Based Security Requirements Model for Web Software","authors":"O. Ezenwoye, Yi Liu","doi":"10.1109/REW56159.2022.00051","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00051","url":null,"abstract":"With the proliferation of software vulnerabilities, tools are need to aid developers in infusing security requirements. This work introduces a risk-based security requirements model (RBSR) for web applications. With RBSR, security requirements for mitigating vulnerabilities are associated with weaknesses and risks. Events in the application’s functional requirements are also associated with risks. The functional requirements thus acquire the relevant security requirements. RBSR makes it possible to specify security requirements completely and consistently across use cases. The RBSR model is explained and a case study application is used to demonstrate the model.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Explanation in Systems of Systems 系统的系统中的自我解释
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00023
Goerschwin Fey, M. Fränzle, R. Drechsler
{"title":"Self-Explanation in Systems of Systems","authors":"Goerschwin Fey, M. Fränzle, R. Drechsler","doi":"10.1109/REW56159.2022.00023","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00023","url":null,"abstract":"Technical systems have reached a complexity rendering their behaviour difficult to comprehend or seemingly non-deterministic. Thus, self-explaining digital systems would be a strong support for tasks like debugging, diagnosis of failures, reliably operating the system or optimization. To be useful, self-explanation must be efficiently computable in a technical system and must be understandable to the addressee. The addressee might be another technical system at the same or another system layer or a human.We provide a conceptual framework for self-explanation including formalization of the inherent concepts of explanation, understandability etc. We instantiate these generic concepts on the example of Mealy machine models of embedded systems and illustrate their use via example from autonomous driving.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Welcome to REWBAH 2022: The Third International Workshop on Requirements Engineering for Well-Being, Aging, and Health 欢迎参加REWBAH 2022:第三届福祉,老龄化和健康需求工程国际研讨会
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00013
{"title":"Welcome to REWBAH 2022: The Third International Workshop on Requirements Engineering for Well-Being, Aging, and Health","authors":"","doi":"10.1109/REW56159.2022.00013","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00013","url":null,"abstract":"Technological systems are meant to address human needs. Today, mobile apps, IoT devices, sensor networks, and many other technologies can all contribute to improving the health and well-being of individuals and populations throughout life and as they advance in age. However, requirements engineering for applications in these areas present considerable challenges and complexities.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome to the Ninth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'22) 欢迎参加第九届安全与隐私要求工程国际研讨会(ESPRE'22)
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/rew56159.2022.00048
{"title":"Welcome to the Ninth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'22)","authors":"","doi":"10.1109/rew56159.2022.00048","DOIUrl":"https://doi.org/10.1109/rew56159.2022.00048","url":null,"abstract":"","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Attractive App Aspects from App Reviews using Clustering Techniques based on Kano Model 基于Kano模型的聚类技术从应用评论中提取有吸引力的应用方面
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00030
N. Alamoudi, Malak Baslyman, Motaz Ahmed
{"title":"Extracting Attractive App Aspects from App Reviews using Clustering Techniques based on Kano Model","authors":"N. Alamoudi, Malak Baslyman, Motaz Ahmed","doi":"10.1109/REW56159.2022.00030","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00030","url":null,"abstract":"Kano model is a technique to evaluate product features based on users’ satisfaction. The problem with the traditional Kano approach is that it is limited to the small amount of data collected manually from users and the sample of participants might not be representative. Many users are interested in evaluating product features via social media platforms. The limitation of the Kano model can be mitigated by using users’ feedback from social media as a source to understand their satisfaction. Nowadays, several mobile applications are developed to solve the same problem and serve the same domain. Hence, it has become difficult to compete with similar products and increase users’ satisfaction to win the market advantage. In this research, app reviews were analyzed using natural language processing and clustering techniques to extract app aspects that increase user satisfaction by labeling them according to the Kano model categories. The clustering was based on aspects dissatisfaction and satisfaction values. We evaluated the results of the clustering technique based on a ground truth that was built from a user survey. Experiments showed that our clustering and labeling approach was able to identify the attractive app aspects better than must-be and one-dimensional aspects.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phish Finders: Crowd-powered RE for anti-phishing training tools Phish finder:用于反网络钓鱼培训工具的众筹RE
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00031
Holly K. Rosser, Maylene Mayor, Adam Stemmler, V. Ahuja, Andrea Grover, Matthew Hale
{"title":"Phish Finders: Crowd-powered RE for anti-phishing training tools","authors":"Holly K. Rosser, Maylene Mayor, Adam Stemmler, V. Ahuja, Andrea Grover, Matthew Hale","doi":"10.1109/REW56159.2022.00031","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00031","url":null,"abstract":"Many organizations use internal phishing campaigns to gauge awareness and coordinate training efforts based on those findings. Ongoing content design is important for phishing training tools due to the influence recency has on phishing susceptibility. Traditional approaches for content development require significant investment and can be prohibitively costly, especially during the requirements engineering phase of software development and for applications that are constantly evolving. While prior research primarily depends upon already known phishing cues curated by experts, our project, Phish Finders, uses crowdsourcing to explore phishing cues through the unique perspectives and thought processes of everyday users in a realistic yet safe online environment, Zooniverse. This paper contributes qualitative analysis of crowdsourced comments that identifies novel cues, such as formatting and typography, which were identified by the crowd as potential phishing indicators. The paper also shows that crowdsourcing may have the potential to scale as a requirements engineering approach to meet the needs of content labeling for improved training tool development.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Requirements Patterns for Complex Embedded Systems 复杂嵌入式系统的需求模式
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00011
Xiaoqi Wang, Xiaohong Chen, X. Yang, Bo Yang
{"title":"Requirements Patterns for Complex Embedded Systems","authors":"Xiaoqi Wang, Xiaohong Chen, X. Yang, Bo Yang","doi":"10.1109/REW56159.2022.00011","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00011","url":null,"abstract":"With the development of networked embedded technology, the requirements of embedded systems are becoming more and more complex. This increases the difficulty of requirements analysis. Requirements patterns are a means for the comprehension and analysis of the requirements problem. In this paper, we propose seven functional requirements patterns for complex embedded systems on the basis of analyzing the characteristics of modern embedded systems. The main feature is explicitly distinguishing the controller, the system devices (controlled by the controller) and the external entities (monitored by the controller). In addition to the requirements problem description, we also provide observable system behavior description, I∼O logic and the execution mechanism for each pattern. Finally, we apply the patterns to a solar search subsystem of aerospace satellites, and all the 20 requirements can be matched against one of the patterns. This validates the usability of our patterns.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing Explainability 构建Explainability
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/rew56159.2022.00022
K. Rohlfing, Philipp Cimano
{"title":"Constructing Explainability","authors":"K. Rohlfing, Philipp Cimano","doi":"10.1109/rew56159.2022.00022","DOIUrl":"https://doi.org/10.1109/rew56159.2022.00022","url":null,"abstract":"In this short paper, we are introducing the main idea of the interdisciplinary Transregional Collaborative Research Centre TRR 318 “Constructing Explainability”. Based on investigations of explaining as a process and a social practice, the center has the aim to develop co-constructive explainable AI that are flexible in negotiating the relevant content of an explanation and thus empower citizens to be active participants in a digital society.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132924718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Socio-Technical Modelling for GDPR Principles: an Extension for the STS-ml GDPR原则的社会技术建模:STS-ml的扩展
2022 IEEE 30th International Requirements Engineering Conference Workshops (REW) Pub Date : 2022-08-01 DOI: 10.1109/REW56159.2022.00052
Claudia Negri Ribalta, René Noël, Nicolas Herbaut, Óscar Pastor, C. Salinesi
{"title":"Socio-Technical Modelling for GDPR Principles: an Extension for the STS-ml","authors":"Claudia Negri Ribalta, René Noël, Nicolas Herbaut, Óscar Pastor, C. Salinesi","doi":"10.1109/REW56159.2022.00052","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00052","url":null,"abstract":"Compliance with data protection regulations is vital for organizations and starts at the requirements level. The General Data Protection Regulation (GDPR) has been the European Union (EU) regulation on the topic since 2018. Organizations that operate within the territorial scope of the GDPR are expected to be compliant; otherwise, they can get high fines, and their reputation can be damaged. Thus, GDPR compliance sets challenges for the design of information systems that must be tackled starting from the requirements level.Given the difficulties of translating regulations and the drawbacks of natural language requirements, modeling languages can help requirements engineers analyze data protection. Socio-Technical Security modeling language (STS-ml) is a security modeling method that has been already extended for modeling privacy issues such as personal data, data controllers and processors, and specifying the legal basis for data processing. However, information critical for complying with GDPR principles still lacks modeling support. This article presents a proposal for extending the STS-ml to address GDPR principles. We show the need for modeling data protection requirements for each GDPR principle through a working privacy case and propose a set of five lightweight but meaningful extensions for the method. The extended language is intended to help requirements engineering practitioners with privacy requirements with little additional effort while preventing significant fines for EU organizations.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信