2021 IEEE 29th International Requirements Engineering Conference (RE)最新文献

筛选
英文 中文
Agile Teams’ Perception in Privacy Requirements Elicitation: LGPD’s compliance in Brazil 敏捷团队在隐私需求引出中的感知:巴西LGPD的遵从性
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00013
E. Canedo, A. Calazans, Anderson Jefferson Cerqueira, P. Costa, E. Masson
{"title":"Agile Teams’ Perception in Privacy Requirements Elicitation: LGPD’s compliance in Brazil","authors":"E. Canedo, A. Calazans, Anderson Jefferson Cerqueira, P. Costa, E. Masson","doi":"10.1109/RE51729.2021.00013","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00013","url":null,"abstract":"Context: The implementation of the Brazilian General Data Protection Law (LGPD) may impact activities carried out by the software development teams. It is necessary for developers to know the existing techniques and tools to carry out privacy requirements elicitation. Objectives: In this research, we investigated the perception of agile software development team members from different organizations, regarding the impact that LGPD will have on the activities of the software development process. Methods: We conducted an online survey and a systematic literature review to identify the techniques, methodologies and tools used in the literature to perform privacy requirements elicitation in the context of Agile Software Development (ASD). In addition, we also investigated the perception of an agile team from a Federal Public Administration organization regarding the impacts of the obligation to develop software in accordance with the LGPD. Results: Our findings reveal that agile teams know the concepts related to data privacy legislation, but they do not use the techniques proposed in the literature to perform privacy requirements elicitation. In addition, agile teams face problems with outdated software requirements specifications and stakeholders’ lack of knowledge regarding data privacy. Conclusions: Agile teams need to improve their knowledge on privacy requirements.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unifying Behavior Driven Development Templates 统一行为驱动开发模板
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00067
Konstantinos Tsilionis, Yves Wautelet, C. faut, Samedi Heng
{"title":"Unifying Behavior Driven Development Templates","authors":"Konstantinos Tsilionis, Yves Wautelet, C. faut, Samedi Heng","doi":"10.1109/RE51729.2021.00067","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00067","url":null,"abstract":"Behavior Driven Development (BDD) offers a way to express scenarios, written in structured natural language, on how the system should act to fulfill a requirement. Numerous templates have been written to construct BDD scenarios and various practices were born out of usage. Nevertheless, we mostly fail to find documentation on the used templates and understand empirical practices. This paper explores empirically the BDD templates used in practice by evaluating the keywords mostly associated to the GIVEN, WHEN and THEN scenario dimensions. It then studies whether we can use these existing keywords to build a set of non-redundant concepts covering the representational needs and being usable as reference when constructing BDD scenarios. We consolidate these findings in a meta-model.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Requirements Reuse for Exploring Stakeholder Needs 用于探索涉众需求的需求重用
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00078
H. Kaindl, M. Mannion
{"title":"Requirements Reuse for Exploring Stakeholder Needs","authors":"H. Kaindl, M. Mannion","doi":"10.1109/RE51729.2021.00078","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00078","url":null,"abstract":"This tutorial presents and compares two different approaches to requirements reuse. The first approach deals with requirements reuse and reusability using feature modelling. The second approach deals with requirements reuse and reusability in the context of case-based reasoning. Both approaches have different key properties and trade-offs between the costs of making software artefacts reusable and the benefits of reusing them. To aid large-scale development, we have proposed a Feature-Similarity Model, which draws on both approaches to facilitate discovering requirements relationships using similarity metrics. A FeatureSimilarity Model also helps with exploring stakeholder needs, since new requirements can be introduced first into a case base and then gradually included into a product line representation.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBRG: Description-Based Non-Quality Requirements Generator 基于描述的非质量需求生成器
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00052
Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim
{"title":"DBRG: Description-Based Non-Quality Requirements Generator","authors":"Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim","doi":"10.1109/RE51729.2021.00052","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00052","url":null,"abstract":"Requirements quality checking is a key process in requirements engineering. For complex and large scale systems, it is recommended to use automated requirements quality checking tools because of the size and complexity of requirements. However, such tools are typically evaluated on a small set of manually curated requirements. This limitation affects the comprehensiveness and reliability of the evaluation and leaves several possible quality issues undetected. In this paper, we de-scribe a novel quality-checking-oriented synthesised requirements generator. We provide an input description language so that several quality checking issues and scenarios can be defined. The generator utilises an input dictionary of nouns and verb frames, and generates requirements sentences complying to a user-defined description of a quality affected requirement.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing NL Requirements Formalisation Using a Quality Checking Model 使用质量检查模型增强NL需求的形式化
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00064
Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim
{"title":"Enhancing NL Requirements Formalisation Using a Quality Checking Model","authors":"Mohamed Osama, Aya Zaki-Ismail, Mohamed Abdelrazek, J. Grundy, Amani S. Ibrahim","doi":"10.1109/RE51729.2021.00064","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00064","url":null,"abstract":"The formalisation of natural language (NL) requirements is a challenging problem because NL is inherently vague and imprecise. Existing formalisation approaches only support requirements adhering to specific boilerplates or templates, and are affected by the requirements quality issues. Several quality models are developed to assess the quality of NL requirements. However, they do not focus on the quality issues affecting the formalisability of requirements. Such issues can greatly compromise the operation of complex systems and even lead to catastrophic consequences or loss of life (in case of critical systems). In this paper, we propose a requirements quality checking approach utilising natural language processing (NLP) analysis. The approach assesses the quality of the requirements against a quality model that we developed to enhance the formalisability of NL requirements. We evaluate the effectiveness of our approach by comparing the formalisation efficiency of a recent automatic formalisation technique before and after utilising our approach. The results show an increase of approximately 15% in the F-measure (from 83.8% to 98%).","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human-Centric Elicitation of Context-Oriented Personal Data Categories: An Exploratory Study in An Educational Institution 以人为中心的情境导向的个人数据类别引出:一项教育机构的探索性研究
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00056
Deepti Balaji Raykar, V. Sridhar
{"title":"Human-Centric Elicitation of Context-Oriented Personal Data Categories: An Exploratory Study in An Educational Institution","authors":"Deepti Balaji Raykar, V. Sridhar","doi":"10.1109/RE51729.2021.00056","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00056","url":null,"abstract":"Complying with data protection regulation is often considered a tedious task as they are generalized regulations that are applicable across domains. They guide acceptable behavior, rather than defining rules that impose specific conditions for a particular domain. Domain-specific context-oriented data categories that are to be protected in the domain of implementation need to be discovered for implementing data protection. We propose a human-centric approach to elicit such data categories causing privacy concerns to stakeholders in an educational institution. We conducted a study to understand the privacy concerns of the stakeholders related to different data categories to be protected. Using a combination of surveys and indepth interviews of the different stakeholders, we were able to gain insights into the privacy and data protection requirements that need to be incorporated into the associated information system design.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Ideas to Expressed Needs: an Empirical Study on the Evolution of Requirements during Elicitation 从观念到表达需求:启发过程中需求演变的实证研究
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00028
Sourav Debnath, P. Spoletini, Alessio Ferrari
{"title":"From Ideas to Expressed Needs: an Empirical Study on the Evolution of Requirements during Elicitation","authors":"Sourav Debnath, P. Spoletini, Alessio Ferrari","doi":"10.1109/RE51729.2021.00028","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00028","url":null,"abstract":"Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Many communication phenomena may emerge in these early iterations, that lead initial ideas to be transformed, renegotiated, or reframed. Understanding how this process takes place can help in solving possible communication issues as well as their consequences. In this work, we perform an exploratory study of descriptive nature to understand in which way requirements get transformed from initial ideas into documented needs. To this end, we select 30 subjects that act as requirements analysts, and we perform a set of elicitation sessions with a fictional customer. The customer is required to study a sample requirements document for a system beforehand and to answer the questions of the analysts about the system. After the elicitation sessions, the analysts produce user stories for the system. These are compared with the original ones by two researchers to assess to which extent and in which way the initial requirements evolved throughout the interactive sessions. Our results show that between 30% and 38% of the produced user stories include content that can be fully traced to the initial ones, while the rest of the content is dedicated to new requirements. We also show what types of requirements are introduced through the elicitation process, and how they vary depending on the analyst. Our work contributes to theory in requirements engineering, with empirically grounded, quantitative data, concerning the impact of elicitation activities with respect to initial ideas.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering 网络安全风险评估与基于模型的需求工程集成研究
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00037
Douraid Naouar, Jamal El Hachem, J. Voirin, Jacques Foisil, Y. Kermarrec
{"title":"Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering","authors":"Douraid Naouar, Jamal El Hachem, J. Voirin, Jacques Foisil, Y. Kermarrec","doi":"10.1109/RE51729.2021.00037","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00037","url":null,"abstract":"Engineering projects requires to consider the increasingly significant needs and constraints regarding expected behaviors, services, quality and security. These requirements are introduced into system and software engineering projects as functional and non-functional properties. Satisfying such properties implies rigorous processes that steer the project, from the requirements identification and definition to the system deployment and maintenance. Model-Based System Engineering (MBSE) is an effective approach to address security requirements and risk assessment at the early stages of the development life cycle, which enables cost-efficient fixes. The aim of this work is to investigate how cybersecurity risk assessment could be integrated into model-based requirement engineering. We propose a Model-based Cyberisk Assessment (MBCA) method, that comprises: (1) A semantic alignment between risk assessment concepts and system modeling concepts and (2) A modeling language extension to represent security concepts and metrics throughout the system modeling life cycle. To illustrate our approach, validate its applicability and evaluate its expressiveness, we applied it to an industrial in-flight entertainment system.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RV-SLC: A Tool for Regression Validation of Safety and Liveness Constraints on Goal Models in DevOps Environment RV-SLC:用于在DevOps环境中对目标模型的安全性和活动性约束进行回归验证的工具
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00066
Palak Ambade, Diptiben Solanki, Novarun Deb
{"title":"RV-SLC: A Tool for Regression Validation of Safety and Liveness Constraints on Goal Models in DevOps Environment","authors":"Palak Ambade, Diptiben Solanki, Novarun Deb","doi":"10.1109/RE51729.2021.00066","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00066","url":null,"abstract":"Requirements keep changing and getting updated in any incremental software development - including DevOps. The notion of regression validation ensures compliance to a given set of rules (or properties) even when either the requirement set changes or the associated rules themselves change due to new business policies and regulations. In this tool paper, we propose the RV-SLC tool which has the SLC framework at its core. The tool uses a formal data model that demonstrates how regression validation of safety and liveness constraints can be achieved across multiple iterations. The tool also has an analytics dashboard that allows the developers to monitor and visualize how the requirements and the associated safety and liveness constraints have been modified and updated across these iterations.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Agile Requirements Elicitation through the Lenses of Situational Method Engineering 情境方法工程视角下的数据驱动敏捷需求提取
2021 IEEE 29th International Requirements Engineering Conference (RE) Pub Date : 2021-09-01 DOI: 10.1109/RE51729.2021.00045
Xavier Franch, Aron Henriksson, J. Ralyté, J. Zdravkovic
{"title":"Data-Driven Agile Requirements Elicitation through the Lenses of Situational Method Engineering","authors":"Xavier Franch, Aron Henriksson, J. Ralyté, J. Zdravkovic","doi":"10.1109/RE51729.2021.00045","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00045","url":null,"abstract":"Ubiquitous digitalization has led to the continuous generation of large amounts of digital data, both in organizations and in society at large. In the requirements engineering community, there has been a growing interest in considering digital data as new sources for requirements elicitation, in addition to stake-holders. The volume, dynamics, and variety of data makes iterative requirements elicitation increasingly continuous, but also unstructured and complex, which current agile methods are unable to consider and manage in a systematic and efficient manner. There is also the need to support software evolution by enabling a synergy of stakeholder-driven requirements elicitation and management with data-driven approaches. In this study, we propose extension of agile requirements elicitation by applying situational method engineering. The research is grounded on two studies in the business domains of video games and online banking.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信