Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security

被引:2
|
作者
Piras, Luca [1 ]
Calabrese, Federico [2 ]
Giorgini, Paolo [2 ]
机构
[1] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
[2] Univ Trento, Dept Informat Engn & Comp Sci, Trento, Italy
关键词
Requirements Engineering; Acceptance requirements; Gamification; Goal modeling; Privacy requirements;
D O I
10.1007/978-3-030-63479-7_25
中图分类号
F [经济];
学科分类号
02 ;
摘要
Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakeholders, concerning dozens of requirements types, from functional to qualitative, including adaptation, security and privacy, ethical, acceptance and more. In such settings, requirements engineers need support concerning such increasingly complex activities, and Requirements Engineering (RE) modeling tools have been developed for this. However, such tools, although effective, are complex, time-consuming and requiring steep learning curves. The consequent lack of acceptance and abandonment in using such tools, by engineers, paves the way to the application of RE techniques in a more error-prone, low-quality way, increasing the possibility to have failures in software systems delivered. In this paper, we identify main areas of lack of acceptance, affecting RE engineers, for such tools, and propose an approach for making modeling tools more effective in engaging the engineer in performing RE in a tool-based way, receiving adequate feedback and staying motivated to use modeling tools. This is accomplished by performing acceptance requirements analysis (through the Agon Framework) and using gamification to increase the engagement of engineers during the usage of RE modeling tools. Towards this end, we performed a case study, within the VisiOn European Project, for enhancing a tool for modeling privacy and security requirements. Our case study provides preliminary evidence that our approach supports in making RE modeling tools more engaging from the engineer perspective.
引用
收藏
页码:366 / 376
页数:11
相关论文
共 50 条
  • [1] Acceptance Requirements and their Gamification Solutions
    Piras, Luca
    Giorgini, Paolo
    Mylopoulos, John
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 365 - 370
  • [2] Modeling Security and Privacy Requirements: a Use Case-Driven Approach
    Mai, Phu X.
    Goknil, Arda
    Shar, Lwin Khin
    Pastore, Fabrizio
    Briand, Lionel C.
    Shaame, Shaban
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 100 : 165 - 182
  • [3] Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform
    Tsohou, Aggeliki
    Magkos, Manos
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Gallego-Nicasio Crespo, Beatriz
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 204 - 223
  • [4] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400
  • [5] Applying Gamification to Prioritize Requirements in Agile Projects
    Silva, Daniel
    Lencastre, Maria
    Pimentel, Joao
    Castro, Jaelson
    Lira, Luiza
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1498 - 1507
  • [6] Security, Privacy and Trust Oriented Requirements Modeling for Examination System
    Shah, Tejas R.
    Patel, S., V
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [7] Goal Models for Acceptance Requirements Analysis and Gamification Design
    Piras, Luca
    Paja, Elda
    Giorgini, Paolo
    Mylopoulos, John
    CONCEPTUAL MODELING, ER 2017, 2017, 10650 : 223 - 230
  • [8] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [9] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [10] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314