Khaled Ismaeel, A. Naumchev, A. Sadovykh, D. Truscan, Eduard Paul Enoiu, C. Seceleanu
{"title":"Security Requirements as Code: Example from VeriDevOps Project","authors":"Khaled Ismaeel, A. Naumchev, A. Sadovykh, D. Truscan, Eduard Paul Enoiu, C. Seceleanu","doi":"10.1109/REW53955.2021.00063","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00063","url":null,"abstract":"This position paper presents and illustrates the concept of security requirements as code – a novel approach to security requirements specification. The aspiration to minimize code duplication and maximize its reuse has always been driving the evolution of software development approaches. Object-Oriented programming (OOP) takes these approaches to the state in which the resulting code conceptually maps to the problem that the code is supposed to solve. People nowadays start learning to program in the primary school. On the other hand, requirements engineers still heavily rely on natural language based techniques to specify requirements. The key idea of this paper is: artifacts produced by the requirements process should be treated as input to the regular object-oriented analysis. Therefore, the contribution of this paper is the presentation of the major concepts for the security requirements as the code method that is illustrated with a real industry example from the VeriDevOps project.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130717290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ziabari, Daniel Amyot, W. Michalowski, E. M. Bouattane, Nassoh Hafez
{"title":"Creating Mobile Self-Triage Applications: Requirements and Usability Perspectives","authors":"M. Ziabari, Daniel Amyot, W. Michalowski, E. M. Bouattane, Nassoh Hafez","doi":"10.1109/REW53955.2021.00048","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00048","url":null,"abstract":"Many people visit an emergency department immediately after experiencing some unusual symptoms, without any regard to the scale of acuity of their condition. Some of these visits are unnecessary and lead to overcrowded emergency departments, increased wait times, and overutilization of scarce healthcare resources. At the other end of the spectrum, there are people who do not seek medical advice when they should. One solution to these problems is to provide a reliable source of information that would allow people to assess their need for consulting (self-triage) in a way that helps reduce the number of inappropriate visits and that promotes seeking medical help when necessary. This paper aims to identify requirements that make such self-triage applications usable. To this end, after assessing existing apps, we studied a new self-triage mobile application called Symptoms Pal, co-developed with Montfort Hospital in Ottawa, Canada. This application guides a user through a series of questions and, at the end, provides advice about the possible problem and course of action (911, visit an emergency department, visit a doctor, or self-care). The usability of Symptoms Pal was evaluated by a study involving 34 participants. Several strengths and weaknesses of the usability and perceived usefulness of the application were identified and led to additional requirements and a revised version. This research contributes 25 reusable requirements and validated user interface design artefacts for self-triage mobile applications that can be used by developers of similar applications.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theory of Constructed Emotion Meets RE","authors":"K. Taveter, Tahira Iqbal","doi":"10.1109/REW53955.2021.00067","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00067","url":null,"abstract":"This article proposes to employ one of the most up to date theories of emotion - the theory of constructed emotion for engineering and validating requirements. We first provide an overview of different theories of emotion and indicate where the theory of constructed emotion lies in relation to these theories. After that, we describe possible advantages in applying theory of constructed emotion to requirements engineering. Thereafter, we postulate how the theory of constructed emotion could be applied in requirements engineering. We then hypothesize how the theory of constructed could be supported by appropriate methods and tools. Finally, we draw conclusions, and sketch the research agenda in applying the theory of constructed emotion in requirements engineering.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarah Sterz, Kevin Baum, Anne Lauber-Rönsberg, H. Hermanns
{"title":"Towards Perspicuity Requirements","authors":"Sarah Sterz, Kevin Baum, Anne Lauber-Rönsberg, H. Hermanns","doi":"10.1109/REW53955.2021.00029","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00029","url":null,"abstract":"System quality attributes like explainability, transparency, traceability, explicability, interpretability, understand-ability, and the like are given an increasing weight, both in research and in the industry. All of these attributes can be sub-sumed under the term of “perspicuity”. We argue in this vision paper that perspicuity is to be regarded as a meaningful and distinct class of quality attributes from which new requirements along with new challenges arise, and that perspicuity as a requirement is needed for legal, societal, and moral reasons, as well as for reasons of consistency within requirements engineering.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sergej Japs, H. Anacker, L. Kaiser, Jörg Holtmann, R. Dumitrescu, F. Kargl
{"title":"D-REQs: Determination of security & safety requirements in workshops based on the use of model-based systems engineering*","authors":"Sergej Japs, H. Anacker, L. Kaiser, Jörg Holtmann, R. Dumitrescu, F. Kargl","doi":"10.1109/REW53955.2021.00073","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00073","url":null,"abstract":"Cyber-physical systems, like autonomous vehicles, are intelligent and networked. The development of such systems requires cooperation between different stakeholders. A lack of system understanding can lead to unidentified (safety relevant) security requirements (SRSR) in early engineering. This can increase product development costs or compromise system safety compliance. Model-based systems engineering (MBSE) improves the system understanding by using models. Conducting workshops in the context of MBSE promotes interaction between stakeholders so that confusion regarding SRSR can be resolved already in the workshop. Using the models created, requirements can be derived in the workshop. However, established security & safety approaches are not specifically designed to be used in conjunction with MBSE and requirements engineering. In this paper, we present an extension of our previously developed SAVE approach. This extension supports a team of stakeholders in workshops to derive SRSR using MBSE. We illustrate our approach with an example from the automotive domain and present an initial field study of the application of our approach, based on a 2-month student project.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Non-Functional Requirements for Blockchain-Oriented Systems","authors":"M. Kassab","doi":"10.1109/REW53955.2021.00040","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00040","url":null,"abstract":"Blockchain is a type of distributed ledger technology that is characterized by the five characteristics: Consensus, Decentralization, Immutability, Finality, and Provenance. Blockchain characteristics have been rapidly recognized as a turning point in many use case scenarios beyond the financial sector. Conversely, there is still a significant incongruity regarding how the blockchain’s unique characteristics can be mapped to the elicited non-functional requirements (NFRs) of blockchain-based systems. Motivated by exploring the potential categories of NFRs that dominate the landscape of blockchain-based systems, we conducted an inductive content analysis on a sample of extracted requirements from 7 different blockchain-based projects developed by two startup firms. This paper presents the initial view of the constructed mapping between the blockchain characteristics on one side and the dominating NFRs for the blockchain-based system.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132816302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifying Autonomous Driving Scenarios","authors":"Yue Yu, Tiexin Wang, T. Yue","doi":"10.1109/REW53955.2021.00079","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00079","url":null,"abstract":"Defects in Autonomous driving systems (ADSs) might result in catastrophic losses of lives and properties. To avoid such defects, we need to first ensure high quality requirements, which highly possibly would lead to the delivery of high-quality ADSs. Specifying requirements for ADSs, a method needs to have terms/notations specific to ADSs such as complex traffic environments (e.g., pedestrians, roads). Use case modeling is commonly practiced in industry for requirements specification and modeling. In this paper, we propose a novel use case modeling methodology, named RUCM4ADS, which specializes the Restricted Use Case Modeling (RUCM). RUCM4ADS aims to specify ADS scenarios by integrating elements from both the autonomous driving domain and Operational World Model (OWM) Ontology. Accompanied with RUCM4ADS, we also develop an editor for it. To evaluate RUCM4ADS, we conducted one real-world case study with 10 use cases. We also conducted a preliminary controlled experiment, in a laboratory setting, to evaluate the applicability of RUCM4ADS. Results show that RUCM4ADS can be used for modeling ADS scenarios and has the potential to improve the overall applicability for specifying ADS scenarios as use case models.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-based Estimation of Story Points in Agile Development: Industrial Experience and Lessons Learned","authors":"Macarious Abadeer, M. Sabetzadeh","doi":"10.1109/REW53955.2021.00022","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00022","url":null,"abstract":"Estimating story points is an important activity in agile software engineering. Story-point estimation enables software development teams to, among other things, better scope products, prioritize requirements, allocate resources and measure progress. Several machine learning techniques have been proposed for automated story-point estimation. However, most of these techniques use open-source projects for evaluation. There are important differences between open-source and commercial projects with respect to story authoring. The goal of this paper is to evaluate a state-of-the-art machine learning technique, known as Deep-SE [3], for estimating story points in a commercial project. Our dataset is comprised of 4,727 stories for a data anonymization product developed by a 27-member agile team at a healthcare data science company, IQVIA. Over this dataset, Deep-SE achieved a mean absolute error of 1.46, significantly better than three different baselines. Model performance nonetheless varied across stories, with the estimation error being larger for stories that had higher points. Our results further indicate that model performance is correlated with certain story characteristics such as the level of detail and the frequency of vague terms in the stories. An important take-away from our study is that, before organizations attempt to introduce machine learning-based estimation into agile development, they need to better embrace agile best practices, particularly in relation to story authoring and expert-based estimation.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Efficient Use Case Modeling with Automated Domain Classification and Term Recommendation","authors":"Zewen Qi, Tiexin Wang, Tao Yue","doi":"10.1109/REW53955.2021.00011","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00011","url":null,"abstract":"In requirements engineering, it takes significant time to specify requirements of various formats. Quality of specified requirements has direct impact on subsequent activities of software development, such as analysis and design. Motivated by this, in the paper, we aim to reduce effort required for specifying use case models and meanwhile improve their quality (in terms of consistency and correctness, for instance). Specifically, we investigate how to automatically classify a domain and recommend domain terminologies with natural language processing and information retrieval techniques, in the context of applying Restricted Use Case Modeling (RUCM) for developing use case models in natural language. To evaluate our approach (named RUCMBot), we evaluate it with seven subject systems. Results indicate that RUCMBot can help RUCM users by recommending domain terms with the accuracy being 0.6 in terms of F-score, on average. Moreover, RUCMBot is able to 100% correctly classify domains. RUCMBot also demonstrates its capability of constructing the domain terminology dictionary, and subsequently enhancing its recommendation accuracy along with the continuous use of RUCM for use case modeling.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environment Model based Requirements Consistency Verification: An Example","authors":"Qianqian Liu, Xiaohong Chen, Zhi Jin","doi":"10.1109/REW53955.2021.00076","DOIUrl":"https://doi.org/10.1109/REW53955.2021.00076","url":null,"abstract":"Nowadays formal methods have shown their ability in the requirements consistency verification, at least for safety-critical systems. But most requirements verification researches only focus on software requirements specification, without considering the software’s interactive environment. In this paper, we propose the environmental properties should be included into the specification verification. They should be considered as inherent constraints that must be satisfied. We extract environmental property constraints from interactive scenarios and state transitions of the environment entities, and transform them into formal models for verification. We use a running example to illustrate the role of environment models in requirements verification.","PeriodicalId":393646,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}