{"title":"Welcome from the RE 2022 Chairs","authors":"","doi":"10.1109/rew56159.2022.00005","DOIUrl":"https://doi.org/10.1109/rew56159.2022.00005","url":null,"abstract":"","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132029664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environment Assertion Driven Requirements Elicitation: A Preliminary Study","authors":"Austin Reid Thompson, Tanmay Bhowmik, Nan Niu","doi":"10.1109/REW56159.2022.00009","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00009","url":null,"abstract":"As the dependency on software systems grows, software developers need to be able to identify and meet the requirements for a system. In his prominent research, Jackson shows that both environment assertions and requirements reside together in the environment. Due to this close relation, it is natural that there is a form of influence between the two. Existing literature indicates the importance of environment assertions in different software engineering activities, including requirements-based testing. However, little is known about the influence of environment assertions in requirements elicitation. In this paper, we perform a preliminary study involving 48 developers and a prominent online conferencing software application, Webex. The results of our study suggest that environment assertions positively influence requirements elicitation activities. To that end, this preliminary study opens a new avenue for requirements engineering researchers and practitioners.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sharifi, Daniel Amyot, J. Mylopoulos, Patrick McLaughlin, Ray Feodoroff
{"title":"Towards Improved Certification of Complex FinTech Systems – A Requirements-based Approach","authors":"S. Sharifi, Daniel Amyot, J. Mylopoulos, Patrick McLaughlin, Ray Feodoroff","doi":"10.1109/REW56159.2022.00046","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00046","url":null,"abstract":"Context: Financial Technology (FinTech) systems, especially those involving custody of digital assets such as cryptocurrencies, are quickly emerging as a new class of software systems with associated high risks. So far, incidents involving such systems have costed billions of dollars. Problem: Providing regulators and insurers with certification cannot simply rely on simple reports generated by auditors. Current practices require a more rigorous and systematic approach for capturing and communicating the design rationale in order to certify such systems. Method: The User Requirements Notation (URN) is used to model and analyze the requirements of a FinTech system and capture its design rationale. Then, the Systems Theoretic Process Analysis (STPA) method is applied to the URN model to evaluate system hazards and introduce safety constraints/requirements that aim to avoid bad situations from happening (e.g., loss of assets, private data, or reputation). The results augment the URN model and are conveyed to the stakeholders (especially regulators, auditors, and insurers) in the form of assurance cases. Results: Guidelines are now available to model the requirements of FinTech systems and produce assurance cases for certification. The guidelines are illustrated with a real digital asset custodian example. Conclusion: This work provides new requirements-based guidelines exploiting URN and STPA that can potentially facilitate the certification process of FinTech systems.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Requirements Models from Natural-Language Document for Embedded Systems","authors":"Chunhui Wang, Lu Hou, Xiaohong Chen","doi":"10.1109/REW56159.2022.00012","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00012","url":null,"abstract":"Most of the requirements of embedded systems are written in natural language by users or customers. When the size of the document is large, it is not easy for developers to understand and analyze these requirements. Requirements modeling has been widely used and proven to be helpful to understand and analyze requirements. Manual analysis of these natural language requirements and extracting models are time-consuming and error-prone. Therefore, in this paper, we present a framework to extract model elements and semi-automatically generate requirements models from the NL requirements document for embedded systems. This leads to considerably simplify and accelerate the requirements development for embedded systems.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote - Requirements Conversations: A New Frontier in AI-for-RE","authors":"F. Dalpiaz","doi":"10.1109/REW56159.2022.00035","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00035","url":null,"abstract":"This extended abstract summarizes a keynote given at the 9th International Workshop on Artificial Intelligence and Requirements Engineering (AIRE). The keynote puts forward requirements conversations as a cornerstone activity in requirements engineering, and defines the role of artificial intelligence techniques that help analysts explore RE conversations.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Where Does Crowd-based Requirements Engineering End and Market Research Begin?","authors":"Eduard C. Groen","doi":"10.1109/REW56159.2022.00032","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00032","url":null,"abstract":"In recent years, market researchers have increasingly adopted automation, among other things to understand what users want from their product or service and how satisfied they are overall or with specific features or changes. Crowd-based Requirements Engineering (CrowdRE) is concerned with similar questions and employs requirements engineering (RE) methods to answer them. This suggests that the boundary between the fields of market research and CrowdRE has become blurred. This in turn raises the question: When is something still CrowdRE, and when has it become market research? This is an important question because it may require the community to rethink how industry might perceive CrowdRE in a wider context, and how future research should be framed. This problem statement paper explores this question along several real-world scenarios to trigger discussions in the community regarding possible solutions.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Infrastructure Protection and Supply Chain Risk Management","authors":"N. Mead","doi":"10.1109/REW56159.2022.00047","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00047","url":null,"abstract":"Critical infrastructure is a key area in cybersecurity. In the U.S., it was front and center in 1997 with the report from the President’s Commission on Critical Infrastructure Protection (PCCIP), and now affects countries worldwide. Critical Infrastructure Protection must address all types of cybersecurity threats - insider threat, ransomware, supply chain risk management issues, and so on. Unsurprisingly, in the past 25 years, the risks and incidents have increased rather than decreased and appear in the news daily. As an important component of critical infrastructure protection, secure supply chain risk management must be integrated into development projects. Both areas have important implications for security requirements engineering.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Emotion-Oriented Requirements Engineering: A Case Study of a Virtual Clinics Application","authors":"Mashail N. Alkhomsan, Malak Baslyman, M. Alshayeb","doi":"10.1109/REW56159.2022.00017","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00017","url":null,"abstract":"With the evolution of developing software systems serving a wide range of purposes, more requirements emerged to build competitive and widely accepted software. Taking into account intended users' emotions when using a system can reveal new requirements for that system, which can lead to a better user experience, hence, more acceptable and enhanced systems. In this paper, we investigate the potential for eliciting and modeling emotional requirements in developing software systems. Interviews and Think-aloud protocol were used to elicit emotional requirements, and Goal-oriented modeling was used to model emotional requirements in relation to other requirements. This paper illustrates the proposed approach through a case study on a virtual clinic feature in a healthcare application. The results of the case study indicate that failure to consider emotional requirements when designing an application for virtual clinics leads to issues that adversely affect user acceptance and continuity of use of the application.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123393165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote - Requirements Engineering for Machine Learning: Non-functional Requirements as Core Functions","authors":"Jennifer Horkoff","doi":"10.1109/REW56159.2022.00034","DOIUrl":"https://doi.org/10.1109/REW56159.2022.00034","url":null,"abstract":"This extended abstract gives a short summary of one of the keynotes for the 9th International Workshop on Artificial Intelligence and Requirements Engineering (AIRE), 2022, co-located with the 30th IEEE International Requirements Engineering 2022 Conference.","PeriodicalId":360738,"journal":{"name":"2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}