{"title":"From Sustainability in Requirements Engineering to a Sustainability-Aware Scrum Framework","authors":"Peter Garscha","doi":"10.1109/RE51729.2021.00069","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00069","url":null,"abstract":"Sustainability has become an important topic in the field of requirements engineering. In general, five sustainability dimensions can be distinguished: economical, environmental, technical, social and individual. Software requirements can have positive and negative impacts on these different dimensions. A number of methods and frameworks have been already proposed that deal with the question on how impacts of software requirements on sustainability can be identified and managed as part of requirements engineering. Some open questions, however, remain: How can sustainability be supported by using agile development practices from frameworks like Scrum? Is it productive to consider sustainability in sprint planning meetings or product reviews? Is it useful to add sustainability aspects to acceptance criteria of user stories or a definition of done? This paper describes an ongoing doctoral study that attempts to find answers on the prior questions. The goal is to develop a sustainability-aware Scrum framework inspired by existing requirements engineering methods to improve the sustainability impacts of software systems and to make software as sustainable as possible.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEM: A Transparency Engineering Methodology Enabling Users’ Trust Judgement","authors":"Baraa Zieni, R. Heckel","doi":"10.1109/RE51729.2021.00016","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00016","url":null,"abstract":"Transparency is key to enhancing users’ trust by enabling their judgment on the outcomes and consequences of a system’s operations. This paper presents the transparency engineering methodology (TEM) to generate transparency requirements that enable users’ trust judgement. The idea is to identify where transparency is lacking and to address this through patterns augmenting the specification of data, use case, and process requirements. Due to the complexity of software, it is impossible (and undesirable) to achieve full transparency throughout the system. However, transparency can be improved for selected system aspects. This is demonstrated using the results from an industrial case study with a medical technology company where, with the help of TEM, existing functional requirements were refined, and transparency requirements generated systematically.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Screenplays to Podcasts - New Perspectives on Improving Requirements Communication in Interdisciplinary Teams","authors":"Anne Hess, Jill-Valerie Tamanini, Sven Storck","doi":"10.1109/RE51729.2021.00022","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00022","url":null,"abstract":"Software engineering projects are highly collaborative. They require interdisciplinary teams to cooperate and exchange information efficiently and effectively to successfully achieve their project goals within time and budget. In this collaborative context, the communication of requirements plays an important role in enabling all team members to accomplish their engineering activities. However, establishing a shared understanding of the requirements is challenging. In this perspective paper, we reflect on such challenges, which we experienced in an ongoing software development project, and propose novel approaches that seem promising for tackling the identified challenges. These ideas stem from best practices of non- SE disciplines such as criminology, film studies & dramatics, journalism & authoring, and psychology. Moreover, we outline our future research agenda, which comprises research questions and activities that aim to further elaborate on the envisioned ideas and to apply, respectively evaluate, their effect on improving requirements communication. This research agenda is intended to motivate the RE community to contribute to our research activities and to encourage both practitioners and researchers to get inspired by other disciplines as this is surely beneficial when it comes to addressing current challenges.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-centric Requirements Engineering for Artificial Intelligence Software Systems","authors":"Khlood Ahmad","doi":"10.1109/RE51729.2021.00070","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00070","url":null,"abstract":"The surge in data availability and processing power has made it possible for Artificial Intelligence (AI) to advance at a faster rate. However, the different nature of AI systems has posed significant new challenges to Requirements Engineering (RE). Literature has shown that AI systems do not use current RE methods. It was also found that data scientists are taking the role of the requirements engineers resulting in software that does not focus on users needs. Building AI software with a human-centric approach has proven to produce more ethical, transparent, inclusive and non-bias outcomes. This research will look into adjusting current RE methodologies to fit into AI systems from a human-centric perspective. The project will aim to establish requirements specifications for human-centric AI and map them into a modeling language. A platform will be used to visually model and present requirements. Finally, I plan to conduct a case study to evaluate the modeling language. To date, I have conducted a Systematic Literature Review (SLR) to find current RE methodologies and challenges in AI and currently in the planning phase of a survey to find adopted practices in the industry.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Falcão, Karina Villela, Vaninha Vieira, M. Trapp, Igor Faria
{"title":"The practical role of context modeling in the elicitation of context-aware functionalities: a survey","authors":"R. Falcão, Karina Villela, Vaninha Vieira, M. Trapp, Igor Faria","doi":"10.1109/RE51729.2021.00011","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00011","url":null,"abstract":"Context-aware functionalities are functionalities that consider the context to produce a certain system behavior, typically an adaptation or recommendation. As contextual elements such as time, location, weather, user activity, device characteristics, network status, and countless others are becoming increasingly more accessible, the potential for adding context awareness to applications is enormous. Identifying novel, unexpected, and even delightful context-aware functionalities in practice can be challenging, though: What context information is relevant for a given user task? How can contextual elements be combined? What if there is a large number of contextual elements? Context modeling has been described in the literature as an essential aspect in the elicitation of context-aware functionalities; however, reports on the state of the practice are rare. In this study, we conducted a survey with industrial practitioners, mostly experienced professionals from large enterprises, to investigate how context models and context-modeling activities have been used to support the elicitation of context-aware functionalities. The results indicate a gap between research and industry: Context models are rarely used in practice, and context-modeling activities such as analysis of relevance and especially analysis of combinations of contextual elements have been overlooked due to their high complexity, despite practitioners recognizing their importance.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements prioritization based on multiple criteria using Artificial Intelligence techniques","authors":"María Isabel Limaylla Lunarejo","doi":"10.1109/RE51729.2021.00072","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00072","url":null,"abstract":"Traditional methods for requirements prioritization (RP) are currently limited by scalability and lack of automation issues. In recent years, there has been an exponential growth in the use of Artificial Intelligence (AI) techniques in different areas of software engineering (e.g., requirements analysis, testing, maintenance). In particular, I have found thirteen RP methods applying AI techniques such as machine learning, or genetic algorithms. 38% of these approaches seek to improve the scalability problem, whereas only 15% of them aim to improve the automation aspect along the RP process. Moreover, all these studies have carried out their evaluations with a number of requirements no greater than 100.In order to address the issues of scalability and lack of automation in RP, the present research project aims to propose a semi-automatic multiple-criteria prioritization method for functional and non-functional requirements of software projects developed within the Software Product-Lines paradigm. The proposed RP method will be based on the combination of Natural Language Processing techniques and Machine Learning algorithms, and for its validation, empirical studies will be carried out with real web-based geographic information systems (GIS). This paper describes the problem and technical challenges to be addressed, the related works, as well as the main contributions of the proposed solution.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Engineering in the DevOps Era","authors":"Sébastien Mosser, J. Bruel","doi":"10.1109/RE51729.2021.00079","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00079","url":null,"abstract":"Traditional requirements engineering does not benefit from modern software development techniques. The goal of this tutorial is to revisit requirements elicitation and to bridge the gap between traditional requirements engineering and modern software development. This tutorial will provide the attendees with concrete and immediately applicable guidance by demonstrating how to operationalize a fully-fledged toolchain going from user stories to automated acceptance testing using open-source tools.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology","authors":"Ji-Wook Jung, Sihn-Hye Park, Seok-Won Lee","doi":"10.1109/RE51729.2021.00059","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00059","url":null,"abstract":"With the significant increase of various cyber threats, the strategies of the attacks are becoming more diverse. In particular, more attention needs to be paid to Advanced Persistent Threat (APT) attacks since these attacks are continuously performed on a specific target for an apparent purpose through numerous tactics and techniques without being discovered for a long time. Although it is difficult to detect and respond to such APT attacks, it is more challenging to elicit security requirements that sufficiently reflect these complex characteristics for proactive defense. To address this problem, we propose a tool that recommends security requirements for APT attacks using the Case-Based Problem Domain Ontology specialized for APT attacks.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing Privacy Conflicts in Web-Based Systems","authors":"Peter Inglis, Inah Omoronyia","doi":"10.1109/RE51729.2021.00055","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00055","url":null,"abstract":"Data protection Impact Assessments (DPIA) are used to assess how well a series of design choices safeguard the privacy concerns of data subjects, but they don’t address how to analyse privacy conflicts. The challenge with current work on privacy conflict is the necessity to understand the perceived levels of sensitivity to facilitate negotiations. It is unclear how this can be achieved in DPIA procedure. In this work we introduce our model checking tool along with our method to address privacy conflict. We present our evaluation plan before concluding with our research roadmap.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information on Potential Vulnerabilities for New Requirements: Does It Help Writing Secure Code?","authors":"Md Rayhan Amin, Tanmay Bhowmik","doi":"10.1109/RE51729.2021.00046","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00046","url":null,"abstract":"Recent research advocates a proactive approach toward addressing software vulnerability, i.e., identification and resolution of vulnerability before exploitation. To that end, a recent research has presented a framework to provide developers with information related to vulnerabilities that are identified with the existing implementation of functionally similar requirements. The idea is that a developer implementing a new requirement may learn from such vulnerability information and write her code in a secure manner. Given the various technologies and platforms a developer may use to implement the current system, to what extent such information would actually help in writing secure code is an open question. In this paper, we design a human subject study to explore how information related to potential vulnerabilities influence developers on secure implementation of new requirements. We further present a pilot run of our study with 50 participants. The results suggest that developers with limited professional experience could be a major beneficiary of the information on potential vulnerabilities.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"51 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}