E. Canedo, A. Calazans, Anderson Jefferson Cerqueira, P. Costa, E. Masson
{"title":"Agile Teams’ Perception in Privacy Requirements Elicitation: LGPD’s compliance in Brazil","authors":"E. Canedo, A. Calazans, Anderson Jefferson Cerqueira, P. Costa, E. Masson","doi":"10.1109/RE51729.2021.00013","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00013","url":null,"abstract":"Context: The implementation of the Brazilian General Data Protection Law (LGPD) may impact activities carried out by the software development teams. It is necessary for developers to know the existing techniques and tools to carry out privacy requirements elicitation. Objectives: In this research, we investigated the perception of agile software development team members from different organizations, regarding the impact that LGPD will have on the activities of the software development process. Methods: We conducted an online survey and a systematic literature review to identify the techniques, methodologies and tools used in the literature to perform privacy requirements elicitation in the context of Agile Software Development (ASD). In addition, we also investigated the perception of an agile team from a Federal Public Administration organization regarding the impacts of the obligation to develop software in accordance with the LGPD. Results: Our findings reveal that agile teams know the concepts related to data privacy legislation, but they do not use the techniques proposed in the literature to perform privacy requirements elicitation. In addition, agile teams face problems with outdated software requirements specifications and stakeholders’ lack of knowledge regarding data privacy. Conclusions: Agile teams need to improve their knowledge on privacy requirements.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Tsilionis, Yves Wautelet, C. faut, Samedi Heng
{"title":"Unifying Behavior Driven Development Templates","authors":"Konstantinos Tsilionis, Yves Wautelet, C. faut, Samedi Heng","doi":"10.1109/RE51729.2021.00067","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00067","url":null,"abstract":"Behavior Driven Development (BDD) offers a way to express scenarios, written in structured natural language, on how the system should act to fulfill a requirement. Numerous templates have been written to construct BDD scenarios and various practices were born out of usage. Nevertheless, we mostly fail to find documentation on the used templates and understand empirical practices. This paper explores empirically the BDD templates used in practice by evaluating the keywords mostly associated to the GIVEN, WHEN and THEN scenario dimensions. It then studies whether we can use these existing keywords to build a set of non-redundant concepts covering the representational needs and being usable as reference when constructing BDD scenarios. We consolidate these findings in a meta-model.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Reuse for Exploring Stakeholder Needs","authors":"H. Kaindl, M. Mannion","doi":"10.1109/RE51729.2021.00078","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00078","url":null,"abstract":"This tutorial presents and compares two different approaches to requirements reuse. The first approach deals with requirements reuse and reusability using feature modelling. The second approach deals with requirements reuse and reusability in the context of case-based reasoning. Both approaches have different key properties and trade-offs between the costs of making software artefacts reusable and the benefits of reusing them. To aid large-scale development, we have proposed a Feature-Similarity Model, which draws on both approaches to facilitate discovering requirements relationships using similarity metrics. A FeatureSimilarity Model also helps with exploring stakeholder needs, since new requirements can be introduced first into a case base and then gradually included into a product line representation.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim
{"title":"DBRG: Description-Based Non-Quality Requirements Generator","authors":"Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim","doi":"10.1109/RE51729.2021.00052","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00052","url":null,"abstract":"Requirements quality checking is a key process in requirements engineering. For complex and large scale systems, it is recommended to use automated requirements quality checking tools because of the size and complexity of requirements. However, such tools are typically evaluated on a small set of manually curated requirements. This limitation affects the comprehensiveness and reliability of the evaluation and leaves several possible quality issues undetected. In this paper, we de-scribe a novel quality-checking-oriented synthesised requirements generator. We provide an input description language so that several quality checking issues and scenarios can be defined. The generator utilises an input dictionary of nouns and verb frames, and generates requirements sentences complying to a user-defined description of a quality affected requirement.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim
{"title":"Enhancing NL Requirements Formalisation Using a Quality Checking Model","authors":"Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim","doi":"10.1109/RE51729.2021.00064","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00064","url":null,"abstract":"The formalisation of natural language (NL) requirements is a challenging problem because NL is inherently vague and imprecise. Existing formalisation approaches only support requirements adhering to specific boilerplates or templates, and are affected by the requirements quality issues. Several quality models are developed to assess the quality of NL requirements. However, they do not focus on the quality issues affecting the formalisability of requirements. Such issues can greatly compromise the operation of complex systems and even lead to catastrophic consequences or loss of life (in case of critical systems). In this paper, we propose a requirements quality checking approach utilising natural language processing (NLP) analysis. The approach assesses the quality of the requirements against a quality model that we developed to enhance the formalisability of NL requirements. We evaluate the effectiveness of our approach by comparing the formalisation efficiency of a recent automatic formalisation technique before and after utilising our approach. The results show an increase of approximately 15% in the F-measure (from 83.8% to 98%).","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Centric Elicitation of Context-Oriented Personal Data Categories: An Exploratory Study in An Educational Institution","authors":"Deepti Balaji Raykar, V. Sridhar","doi":"10.1109/RE51729.2021.00056","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00056","url":null,"abstract":"Complying with data protection regulation is often considered a tedious task as they are generalized regulations that are applicable across domains. They guide acceptable behavior, rather than defining rules that impose specific conditions for a particular domain. Domain-specific context-oriented data categories that are to be protected in the domain of implementation need to be discovered for implementing data protection. We propose a human-centric approach to elicit such data categories causing privacy concerns to stakeholders in an educational institution. We conducted a study to understand the privacy concerns of the stakeholders related to different data categories to be protected. Using a combination of surveys and indepth interviews of the different stakeholders, we were able to gain insights into the privacy and data protection requirements that need to be incorporated into the associated information system design.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Ideas to Expressed Needs: an Empirical Study on the Evolution of Requirements during Elicitation","authors":"Sourav Debnath, P. Spoletini, Alessio Ferrari","doi":"10.1109/RE51729.2021.00028","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00028","url":null,"abstract":"Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Many communication phenomena may emerge in these early iterations, that lead initial ideas to be transformed, renegotiated, or reframed. Understanding how this process takes place can help in solving possible communication issues as well as their consequences. In this work, we perform an exploratory study of descriptive nature to understand in which way requirements get transformed from initial ideas into documented needs. To this end, we select 30 subjects that act as requirements analysts, and we perform a set of elicitation sessions with a fictional customer. The customer is required to study a sample requirements document for a system beforehand and to answer the questions of the analysts about the system. After the elicitation sessions, the analysts produce user stories for the system. These are compared with the original ones by two researchers to assess to which extent and in which way the initial requirements evolved throughout the interactive sessions. Our results show that between 30% and 38% of the produced user stories include content that can be fully traced to the initial ones, while the rest of the content is dedicated to new requirements. We also show what types of requirements are introduced through the elicitation process, and how they vary depending on the analyst. Our work contributes to theory in requirements engineering, with empirically grounded, quantitative data, concerning the impact of elicitation activities with respect to initial ideas.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Douraid Naouar, Jamal El Hachem, J. Voirin, Jacques Foisil, Y. Kermarrec
{"title":"Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering","authors":"Douraid Naouar, Jamal El Hachem, J. Voirin, Jacques Foisil, Y. Kermarrec","doi":"10.1109/RE51729.2021.00037","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00037","url":null,"abstract":"Engineering projects requires to consider the increasingly significant needs and constraints regarding expected behaviors, services, quality and security. These requirements are introduced into system and software engineering projects as functional and non-functional properties. Satisfying such properties implies rigorous processes that steer the project, from the requirements identification and definition to the system deployment and maintenance. Model-Based System Engineering (MBSE) is an effective approach to address security requirements and risk assessment at the early stages of the development life cycle, which enables cost-efficient fixes. The aim of this work is to investigate how cybersecurity risk assessment could be integrated into model-based requirement engineering. We propose a Model-based Cyberisk Assessment (MBCA) method, that comprises: (1) A semantic alignment between risk assessment concepts and system modeling concepts and (2) A modeling language extension to represent security concepts and metrics throughout the system modeling life cycle. To illustrate our approach, validate its applicability and evaluate its expressiveness, we applied it to an industrial in-flight entertainment system.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RV-SLC: A Tool for Regression Validation of Safety and Liveness Constraints on Goal Models in DevOps Environment","authors":"Palak Ambade, Diptiben Solanki, Novarun Deb","doi":"10.1109/RE51729.2021.00066","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00066","url":null,"abstract":"Requirements keep changing and getting updated in any incremental software development - including DevOps. The notion of regression validation ensures compliance to a given set of rules (or properties) even when either the requirement set changes or the associated rules themselves change due to new business policies and regulations. In this tool paper, we propose the RV-SLC tool which has the SLC framework at its core. The tool uses a formal data model that demonstrates how regression validation of safety and liveness constraints can be achieved across multiple iterations. The tool also has an analytics dashboard that allows the developers to monitor and visualize how the requirements and the associated safety and liveness constraints have been modified and updated across these iterations.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xavier Franch, Aron Henriksson, J. Ralyté, J. Zdravkovic
{"title":"Data-Driven Agile Requirements Elicitation through the Lenses of Situational Method Engineering","authors":"Xavier Franch, Aron Henriksson, J. Ralyté, J. Zdravkovic","doi":"10.1109/RE51729.2021.00045","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00045","url":null,"abstract":"Ubiquitous digitalization has led to the continuous generation of large amounts of digital data, both in organizations and in society at large. In the requirements engineering community, there has been a growing interest in considering digital data as new sources for requirements elicitation, in addition to stake-holders. The volume, dynamics, and variety of data makes iterative requirements elicitation increasingly continuous, but also unstructured and complex, which current agile methods are unable to consider and manage in a systematic and efficient manner. There is also the need to support software evolution by enabling a synergy of stakeholder-driven requirements elicitation and management with data-driven approaches. In this study, we propose extension of agile requirements elicitation by applying situational method engineering. The research is grounded on two studies in the business domains of video games and online banking.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}