首页 > 最新文献

2014 IEEE 22nd International Requirements Engineering Conference (RE)最新文献

英文 中文
Efficient visual notations for efficient stakeholder communication 有效的可视化符号用于有效的利益相关者沟通
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912281
R. Laue, F. Hogrebe, Boris Böttcher, Markus Nüttgens
The visual syntax of modelling languages can support (or impede) the intuitive understandability of a model. We observed the process of problem solving with two notation variants of i* diagrams by means of an eye-tracking device. The number of wrongly answered questions was significantly lower when the alternative i* notation suggested by Moody et al. was used. For the eye-tracking metrics “time to solve a task” and “number of eye fixations”, no such significant result can be given. Furthermore, we identified a deficiency for the “dependency” symbol in the alternative notation.
建模语言的可视化语法可以支持(或阻碍)模型的直观可理解性。我们用眼动仪观察了用i*图的两种符号变体解决问题的过程。当使用Moody等人建议的替代i*符号时,错误回答的问题数量明显降低。对于眼动追踪指标“解决任务的时间”和“眼睛注视的次数”,没有这样显著的结果。此外,我们还发现了替代表示法中“依赖”符号的缺陷。
{"title":"Efficient visual notations for efficient stakeholder communication","authors":"R. Laue, F. Hogrebe, Boris Böttcher, Markus Nüttgens","doi":"10.1109/RE.2014.6912281","DOIUrl":"https://doi.org/10.1109/RE.2014.6912281","url":null,"abstract":"The visual syntax of modelling languages can support (or impede) the intuitive understandability of a model. We observed the process of problem solving with two notation variants of i* diagrams by means of an eye-tracking device. The number of wrongly answered questions was significantly lower when the alternative i* notation suggested by Moody et al. was used. For the eye-tracking metrics “time to solve a task” and “number of eye fixations”, no such significant result can be given. Furthermore, we identified a deficiency for the “dependency” symbol in the alternative notation.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maintaining requirements for long-living software systems by incorporating security knowledge 通过整合安全知识来维护长寿软件系统的需求
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912252
Stefan Gärtner, Thomas Ruhroth, J. Bürger, K. Schneider, J. Jürjens
Security is an increasingly important quality facet in modern information systems and needs to be retained. Due to a constantly changing environment, long-living software systems “age” not by wearing out, but by failing to keep up-to-date with their environment. The problem is that requirements engineers usually do not have a complete overview of the security-related knowledge necessary to retain security of long-living software systems. This includes security standards, principles and guidelines as well as reported security incidents. In this paper, we focus on the identification of known vulnerabilities (and their variations) in natural-language requirements by leveraging security knowledge. For this purpose, we present an integrative security knowledge model and a heuristic method to detect vulnerabilities in requirements based on reported security incidents. To support knowledge evolution, we further propose a method based on natural language analysis to refine and to adapt security knowledge. Our evaluation indicates that the proposed assessment approach detects vulnerable requirements more reliable than other methods (Bayes, SVM, k-NN). Thus, requirements engineers can react faster and more effectively to a changing environment that has an impact on the desired security level of the information system.
安全是现代信息系统日益重要的质量方面,需要保持。由于不断变化的环境,长寿的软件系统的“老化”不是由于磨损,而是由于未能与环境保持同步。问题是,需求工程师通常没有一个完整的安全相关知识的概述,这些知识是保持长期存在的软件系统安全所必需的。这包括安全标准、原则和指导方针以及报告的安全事件。在本文中,我们着重于通过利用安全知识来识别自然语言需求中的已知漏洞(及其变体)。为此,我们提出了一个集成的安全知识模型和一种基于报告的安全事件的启发式方法来检测需求中的漏洞。为了支持知识进化,我们进一步提出了一种基于自然语言分析的安全知识提炼和适应方法。我们的评估表明,所提出的评估方法比其他方法(贝叶斯,支持向量机,k-NN)更可靠地检测脆弱需求。因此,需求工程师可以更快、更有效地对对信息系统所需的安全级别有影响的不断变化的环境作出反应。
{"title":"Maintaining requirements for long-living software systems by incorporating security knowledge","authors":"Stefan Gärtner, Thomas Ruhroth, J. Bürger, K. Schneider, J. Jürjens","doi":"10.1109/RE.2014.6912252","DOIUrl":"https://doi.org/10.1109/RE.2014.6912252","url":null,"abstract":"Security is an increasingly important quality facet in modern information systems and needs to be retained. Due to a constantly changing environment, long-living software systems “age” not by wearing out, but by failing to keep up-to-date with their environment. The problem is that requirements engineers usually do not have a complete overview of the security-related knowledge necessary to retain security of long-living software systems. This includes security standards, principles and guidelines as well as reported security incidents. In this paper, we focus on the identification of known vulnerabilities (and their variations) in natural-language requirements by leveraging security knowledge. For this purpose, we present an integrative security knowledge model and a heuristic method to detect vulnerabilities in requirements based on reported security incidents. To support knowledge evolution, we further propose a method based on natural language analysis to refine and to adapt security knowledge. Our evaluation indicates that the proposed assessment approach detects vulnerable requirements more reliable than other methods (Bayes, SVM, k-NN). Thus, requirements engineers can react faster and more effectively to a changing environment that has an impact on the desired security level of the information system.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123444478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts 隐藏在显而易见的地方:从自然语言工件自动识别安全需求
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912260
M. Riaz, J. King, John Slankas, L. Williams
Natural language artifacts, such as requirements specifications, often explicitly state the security requirements for software systems. However, these artifacts may also imply additional security requirements that developers may overlook but should consider to strengthen the overall security of the system. The goal of this research is to aid requirements engineers in producing a more comprehensive and classified set of security requirements by (1) automatically identifying security-relevant sentences in natural language requirements artifacts, and (2) providing context-specific security requirements templates to help translate the security-relevant sentences into functional security requirements. Using machine learning techniques, we have developed a tool-assisted process that takes as input a set of natural language artifacts. Our process automatically identifies security-relevant sentences in the artifacts and classifies them according to the security objectives, either explicitly stated or implied by the sentences. We classified 10,963 sentences in six different documents from healthcare domain and extracted corresponding security objectives. Our manual analysis showed that 46% of the sentences were security-relevant. Of these, 28% explicitly mention security while 72% of the sentences are functional requirements with security implications. Using our tool, we correctly predict and classify 82% of the security objectives for all the sentences (precision). We identify 79% of all security objectives implied by the sentences within the documents (recall). Based on our analysis, we develop context-specific templates that can be instantiated into a set of functional security requirements by filling in key information from security-relevant sentences.
自然语言工件,例如需求规范,经常明确地说明软件系统的安全性需求。然而,这些工件也可能意味着额外的安全需求,开发人员可能会忽略这些需求,但是应该考虑加强系统的整体安全性。这项研究的目标是通过(1)在自然语言需求工件中自动识别与安全相关的句子,以及(2)提供特定于上下文的安全需求模板来帮助将与安全相关的句子转换为功能安全需求,从而帮助需求工程师生成更全面和分类的安全需求集。使用机器学习技术,我们开发了一种工具辅助过程,将一组自然语言工件作为输入。我们的流程自动识别工件中与安全相关的句子,并根据安全目标对它们进行分类,这些安全目标可以是显式陈述的,也可以是句子暗示的。我们对来自医疗保健领域的6个不同文档中的10,963个句子进行了分类,并提取了相应的安全目标。我们的人工分析显示46%的句子与安全相关。其中,28%明确提到了安全性,而72%的句子是带有安全性含义的功能需求。使用我们的工具,我们正确地预测和分类了所有句子的82%的安全目标(精度)。我们确定了文档中句子所暗示的79%的安全目标(回忆)。根据我们的分析,我们开发了特定于上下文的模板,通过填充与安全相关的句子中的关键信息,这些模板可以实例化为一组功能安全需求。
{"title":"Hidden in plain sight: Automatically identifying security requirements from natural language artifacts","authors":"M. Riaz, J. King, John Slankas, L. Williams","doi":"10.1109/RE.2014.6912260","DOIUrl":"https://doi.org/10.1109/RE.2014.6912260","url":null,"abstract":"Natural language artifacts, such as requirements specifications, often explicitly state the security requirements for software systems. However, these artifacts may also imply additional security requirements that developers may overlook but should consider to strengthen the overall security of the system. The goal of this research is to aid requirements engineers in producing a more comprehensive and classified set of security requirements by (1) automatically identifying security-relevant sentences in natural language requirements artifacts, and (2) providing context-specific security requirements templates to help translate the security-relevant sentences into functional security requirements. Using machine learning techniques, we have developed a tool-assisted process that takes as input a set of natural language artifacts. Our process automatically identifies security-relevant sentences in the artifacts and classifies them according to the security objectives, either explicitly stated or implied by the sentences. We classified 10,963 sentences in six different documents from healthcare domain and extracted corresponding security objectives. Our manual analysis showed that 46% of the sentences were security-relevant. Of these, 28% explicitly mention security while 72% of the sentences are functional requirements with security implications. Using our tool, we correctly predict and classify 82% of the security objectives for all the sentences (precision). We identify 79% of all security objectives implied by the sentences within the documents (recall). Based on our analysis, we develop context-specific templates that can be instantiated into a set of functional security requirements by filling in key information from security-relevant sentences.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Supporting traceability through affinity mining 通过关联挖掘支持可追溯性
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912256
V. Gervasi, D. Zowghi
Traceability among requirements artifacts (and beyond, in certain cases all the way to actual implementation) has long been identified as a critical challenge in industrial practice. Manually establishing and maintaining such traces is a high-skill, labour-intensive job. It is often the case that the ideal person for the job also has other, highly critical tasks to take care of, so offering semi-automated support for the management of traces is an effective way of improving the efficiency of the whole development process. In this paper, we present a technique to exploit the information contained in previously defined traces, in order to facilitate the creation and ongoing maintenance of traces, as the requirements evolve. A case study on a reference dataset is employed to measure the effectiveness of the technique, compared to other proposals from the literature.
需求工件之间的可追溯性(在某些情况下,一直到实际实现)长期以来一直被认为是工业实践中的一个关键挑战。手动建立和维护这些痕迹是一项高技能、劳动密集型的工作。通常情况下,理想的工作人员也有其他非常重要的任务要处理,因此为跟踪管理提供半自动化的支持是提高整个开发过程效率的有效方法。在本文中,我们提出了一种技术来利用先前定义的轨迹中包含的信息,以便随着需求的发展促进轨迹的创建和持续维护。通过对参考数据集的案例研究来衡量该技术的有效性,并与文献中的其他建议进行比较。
{"title":"Supporting traceability through affinity mining","authors":"V. Gervasi, D. Zowghi","doi":"10.1109/RE.2014.6912256","DOIUrl":"https://doi.org/10.1109/RE.2014.6912256","url":null,"abstract":"Traceability among requirements artifacts (and beyond, in certain cases all the way to actual implementation) has long been identified as a critical challenge in industrial practice. Manually establishing and maintaining such traces is a high-skill, labour-intensive job. It is often the case that the ideal person for the job also has other, highly critical tasks to take care of, so offering semi-automated support for the management of traces is an effective way of improving the efficiency of the whole development process. In this paper, we present a technique to exploit the information contained in previously defined traces, in order to facilitate the creation and ongoing maintenance of traces, as the requirements evolve. A case study on a reference dataset is employed to measure the effectiveness of the technique, compared to other proposals from the literature.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133686071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An Approach for Decision Support on the Uncertainty in Feature Model Evolution 特征模型演化不确定性下的决策支持方法
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912251
L. M. Tran, F. Massacci
Software systems could be seen as a hierarchy of features which are evolving due to the dynamic of the working environments. The companies who build software thus need to make an appropriate strategy, which takes into consideration of such dynamic, to select features to be implemented. In this work, we propose an approach to facilitate such selection by providing a means to capture the uncertainty of evolution in feature models. We also provide two analyses to support the decision makers. The approach is exemplified in the Smart Grid scenario.
软件系统可以被看作是由于工作环境的动态性而不断发展的特征层次结构。因此,构建软件的公司需要制定一个适当的策略,考虑到这种动态,以选择要实现的功能。在这项工作中,我们提出了一种方法,通过提供一种在特征模型中捕捉进化不确定性的方法来促进这种选择。我们还提供了两个分析来支持决策者。该方法在智能电网场景中得到了例证。
{"title":"An Approach for Decision Support on the Uncertainty in Feature Model Evolution","authors":"L. M. Tran, F. Massacci","doi":"10.1109/RE.2014.6912251","DOIUrl":"https://doi.org/10.1109/RE.2014.6912251","url":null,"abstract":"Software systems could be seen as a hierarchy of features which are evolving due to the dynamic of the working environments. The companies who build software thus need to make an appropriate strategy, which takes into consideration of such dynamic, to select features to be implemented. In this work, we propose an approach to facilitate such selection by providing a means to capture the uncertainty of evolution in feature models. We also provide two analyses to support the decision makers. The approach is exemplified in the Smart Grid scenario.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback 使用senite构建一个国家电子服务:使用senite的经验报告:一个基于志愿者的需求框架,由校准的人物角色和模拟的用户反馈驱动
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912288
C. Porter, Emmanuel Letier, M. Sasse
User experience (UX) is difficult to quantify and thus more challenging to require and guarantee. It is also difficult to gauge the potential impact on users' lived experience, especially at the earlier stages of the development life cycle, particularly before hi fidelity prototypes are developed. We believe that the enrolment process is a major hurdle for e-government service adoption and badly designed processes might result in negative repercussions for both the policy maker and the different user groups involved; non-adoption and resentment are two risks that may result in low return on investment (ROI), lost political goodwill and ultimately a negative lived experience for citizens. Identity assurance requirements need to balance out the real value of the assets being secured (risk) with the user groups' acceptance thresholds (based on a continuous cost-benefit exercise factoring in cognitive and physical workload). Sentire is a persona-centric requirements framework built on and extending the Volere requirements process with UX-analytics, reusable user behavioural models and simulated user feedback through calibrated personas. In this paper we present a story on how Sentire was adopted in the development of a national public-facing e-service. Daily journaling was used throughout the project and a custom built cloud-based CASE tool was used to manage the whole process. This paper outlines our experiences and lessons learnt.
用户体验(UX)很难量化,因此要求和保证更具有挑战性。也很难衡量对用户生活体验的潜在影响,特别是在开发生命周期的早期阶段,特别是在高保真度原型开发之前。我们认为,注册过程是采用电子政务服务的主要障碍,设计不当的过程可能会对政策制定者和不同的用户群体产生负面影响;不采纳和怨恨是两种可能导致低投资回报率(ROI)、失去政治善意并最终给公民带来负面生活体验的风险。身份保证需求需要平衡被保护资产的实际价值(风险)和用户组的接受阈值(基于持续的成本效益练习,将认知和物理工作量考虑在内)。senit是一个以用户角色为中心的需求框架,它建立在Volere需求过程的基础上,并通过用户分析、可重用的用户行为模型和通过校准的用户角色模拟的用户反馈来扩展Volere需求过程。在本文中,我们介绍了一个关于如何在面向公众的国家电子服务的发展中采用sente的故事。在整个项目中使用每日日志,并使用定制的基于云的CASE工具来管理整个过程。本文概述了我们的经验和教训。
{"title":"Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback","authors":"C. Porter, Emmanuel Letier, M. Sasse","doi":"10.1109/RE.2014.6912288","DOIUrl":"https://doi.org/10.1109/RE.2014.6912288","url":null,"abstract":"User experience (UX) is difficult to quantify and thus more challenging to require and guarantee. It is also difficult to gauge the potential impact on users' lived experience, especially at the earlier stages of the development life cycle, particularly before hi fidelity prototypes are developed. We believe that the enrolment process is a major hurdle for e-government service adoption and badly designed processes might result in negative repercussions for both the policy maker and the different user groups involved; non-adoption and resentment are two risks that may result in low return on investment (ROI), lost political goodwill and ultimately a negative lived experience for citizens. Identity assurance requirements need to balance out the real value of the assets being secured (risk) with the user groups' acceptance thresholds (based on a continuous cost-benefit exercise factoring in cognitive and physical workload). Sentire is a persona-centric requirements framework built on and extending the Volere requirements process with UX-analytics, reusable user behavioural models and simulated user feedback through calibrated personas. In this paper we present a story on how Sentire was adopted in the development of a national public-facing e-service. Daily journaling was used throughout the project and a custom built cloud-based CASE tool was used to manage the whole process. This paper outlines our experiences and lessons learnt.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scaling requirements extraction to the crowd: Experiments with privacy policies 向人群扩展需求提取:隐私策略实验
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912258
T. Breaux, F. Schaub
Natural language text sources have increasingly been used to develop new methods and tools for extracting and analyzing requirements. To validate these new approaches, researchers rely on a small number of trained experts to perform a labor-intensive manual analysis of the text. The time and resources needed to conduct manual extraction, however, has limited the size of case studies and thus the generalizability of results. To begin to address this issue, we conducted three experiments to evaluate crowdsourcing a manual requirements extraction task to a larger number of untrained workers. In these experiments, we carefully balance worker payment and overall cost, as well as worker training and data quality to study the feasibility of distributing requirements extraction to the crowd. The task consists of extracting descriptions of data collection, sharing and usage requirements from privacy policies. We present results from two pilot studies and a third experiment to justify applying a task decomposition approach to requirements extraction. Our contributions include the task decomposition workflow and three metrics for measuring worker performance. The final evaluation shows a 60% reduction in the cost of manual extraction with a 16% increase in extraction coverage.
自然语言文本源越来越多地用于开发新的方法和工具来提取和分析需求。为了验证这些新方法,研究人员依靠少数训练有素的专家对文本进行劳动密集型的手动分析。然而,进行手工提取所需的时间和资源限制了案例研究的规模,从而限制了结果的普遍性。为了开始解决这个问题,我们进行了三个实验来评估将人工需求提取任务众包给大量未经训练的工人。在这些实验中,我们仔细平衡了工人的工资和总成本,以及工人的培训和数据质量,研究了向人群分发需求提取的可行性。该任务包括从隐私策略中提取数据收集、共享和使用需求的描述。我们展示了来自两个试点研究和第三个实验的结果,以证明将任务分解方法应用于需求提取。我们的贡献包括任务分解工作流和三个度量工人绩效的指标。最终评估表明,人工提取的成本降低了60%,提取覆盖率提高了16%。
{"title":"Scaling requirements extraction to the crowd: Experiments with privacy policies","authors":"T. Breaux, F. Schaub","doi":"10.1109/RE.2014.6912258","DOIUrl":"https://doi.org/10.1109/RE.2014.6912258","url":null,"abstract":"Natural language text sources have increasingly been used to develop new methods and tools for extracting and analyzing requirements. To validate these new approaches, researchers rely on a small number of trained experts to perform a labor-intensive manual analysis of the text. The time and resources needed to conduct manual extraction, however, has limited the size of case studies and thus the generalizability of results. To begin to address this issue, we conducted three experiments to evaluate crowdsourcing a manual requirements extraction task to a larger number of untrained workers. In these experiments, we carefully balance worker payment and overall cost, as well as worker training and data quality to study the feasibility of distributing requirements extraction to the crowd. The task consists of extracting descriptions of data collection, sharing and usage requirements from privacy policies. We present results from two pilot studies and a third experiment to justify applying a task decomposition approach to requirements extraction. Our contributions include the task decomposition workflow and three metrics for measuring worker performance. The final evaluation shows a 60% reduction in the cost of manual extraction with a 16% increase in extraction coverage.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Context-sensitive Information security Risk identification and evaluation techniques 上下文敏感的信息安全风险识别和评估技术
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912303
D. Ionita
The objective of my research is to improve and support the process of Information security Risk Assessment by designing a scalable Risk argumentation framework for socio-digital-technical Risk. Due to the various types of IT systems, diversity of architectures and dynamic nature of Risk, there is no one-size-fits all RA method. As such, the research hopes to identify guidelines for conducting Risk Assessments in contexts that raise special challenges such as Telecom and virtualized infrastructures. Finally, it will suggest ways of qualitatively and quantitatively evaluating Information Security Risks in such scenarios by using argumentation and/or modelling attacker business cases.
我的研究目标是通过为社会数字技术风险设计一个可扩展的风险论证框架来改进和支持信息安全风险评估的过程。由于IT系统的不同类型、体系结构的多样性和风险的动态性,不存在放之四海而皆准的RA方法。因此,该研究希望确定在诸如电信和虚拟化基础设施等提出特殊挑战的环境中进行风险评估的指导方针。最后,它将通过使用论证和/或建模攻击者业务案例,提出定性和定量评估此类场景中的信息安全风险的方法。
{"title":"Context-sensitive Information security Risk identification and evaluation techniques","authors":"D. Ionita","doi":"10.1109/RE.2014.6912303","DOIUrl":"https://doi.org/10.1109/RE.2014.6912303","url":null,"abstract":"The objective of my research is to improve and support the process of Information security Risk Assessment by designing a scalable Risk argumentation framework for socio-digital-technical Risk. Due to the various types of IT systems, diversity of architectures and dynamic nature of Risk, there is no one-size-fits all RA method. As such, the research hopes to identify guidelines for conducting Risk Assessments in contexts that raise special challenges such as Telecom and virtualized infrastructures. Finally, it will suggest ways of qualitatively and quantitatively evaluating Information Security Risks in such scenarios by using argumentation and/or modelling attacker business cases.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Goal-oriented compliance with multiple regulations 以目标为导向,遵守多个法规
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912249
S. Ghanavati, André Rifaut, E. Dubois, Daniel Amyot
Most systems and business processes in organizations need to comply with more than one law or regulation. Different regulations can partially overlap (e.g., one can be more detailed than the other) or even conflict with each other. In addition, one regulation can permit an action whereas the same action in another regulation might be mandatory or forbidden. In each of these cases, an organization needs to take different strategies. This paper presents an approach to handle different situations when comparing and attempting to comply with multiple regulations as part of a goal-oriented modeling framework named LEGAL-URN. This framework helps organizations find suitable trade-offs and priorities when complying with multiple regulations while at the same time trying to meet their own business objectives. The approach is illustrated with a case study involving a Canadian health care organization that must comply with four laws related to privacy, quality of care, freedom of information, and care consent.
组织中的大多数系统和业务流程需要遵守不止一条法律或法规。不同的法规可能部分重叠(例如,一个可能比另一个更详细),甚至相互冲突。此外,一项法规可能允许某一行为,而同一行为在另一项法规中可能是强制性的或被禁止的。在每种情况下,组织都需要采取不同的策略。本文提出了一种方法,在比较和试图遵守多个规则时处理不同的情况,作为一个名为LEGAL-URN的面向目标的建模框架的一部分。此框架可帮助组织在遵守多个法规的同时尝试满足自己的业务目标时找到合适的权衡和优先级。通过一个涉及加拿大卫生保健组织的案例研究说明了这种方法,该组织必须遵守与隐私、护理质量、信息自由和护理同意有关的四项法律。
{"title":"Goal-oriented compliance with multiple regulations","authors":"S. Ghanavati, André Rifaut, E. Dubois, Daniel Amyot","doi":"10.1109/RE.2014.6912249","DOIUrl":"https://doi.org/10.1109/RE.2014.6912249","url":null,"abstract":"Most systems and business processes in organizations need to comply with more than one law or regulation. Different regulations can partially overlap (e.g., one can be more detailed than the other) or even conflict with each other. In addition, one regulation can permit an action whereas the same action in another regulation might be mandatory or forbidden. In each of these cases, an organization needs to take different strategies. This paper presents an approach to handle different situations when comparing and attempting to comply with multiple regulations as part of a goal-oriented modeling framework named LEGAL-URN. This framework helps organizations find suitable trade-offs and priorities when complying with multiple regulations while at the same time trying to meet their own business objectives. The approach is illustrated with a case study involving a Canadian health care organization that must comply with four laws related to privacy, quality of care, freedom of information, and care consent.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews 用户喜欢这个功能吗?应用评论的细粒度情感分析
Pub Date : 2014-09-29 DOI: 10.1109/RE.2014.6912257
Emitzá Guzmán, W. Maalej
App stores allow users to submit feedback for downloaded apps in form of star ratings and text reviews. Recent studies analyzed this feedback and found that it includes information useful for app developers, such as user requirements, ideas for improvements, user sentiments about specific features, and descriptions of experiences with these features. However, for many apps, the amount of reviews is too large to be processed manually and their quality varies largely. The star ratings are given to the whole app and developers do not have a mean to analyze the feedback for the single features. In this paper we propose an automated approach that helps developers filter, aggregate, and analyze user reviews. We use natural language processing techniques to identify fine-grained app features in the reviews. We then extract the user sentiments about the identified features and give them a general score across all reviews. Finally, we use topic modeling techniques to group fine-grained features into more meaningful high-level features. We evaluated our approach with 7 apps from the Apple App Store and Google Play Store and compared its results with a manually, peer-conducted analysis of the reviews. On average, our approach has a precision of 0.59 and a recall of 0.51. The extracted features were coherent and relevant to requirements evolution tasks. Our approach can help app developers to systematically analyze user opinions about single features and filter irrelevant reviews.
应用商店允许用户以星级和文字评论的形式提交下载应用的反馈。最近的研究分析了这些反馈,发现它包含了对应用开发者有用的信息,如用户需求、改进想法、用户对特定功能的看法以及对这些功能的体验描述。然而,对于许多应用来说,评论数量太大,无法手工处理,而且评论的质量参差不齐。星级评级是针对整个应用的,开发者无法分析单个功能的反馈。在本文中,我们提出了一种自动化的方法来帮助开发人员过滤、聚合和分析用户评论。我们使用自然语言处理技术在评论中识别细粒度的应用功能。然后,我们提取用户对已识别特征的看法,并在所有评论中给它们一个总体分数。最后,我们使用主题建模技术将细粒度特征分组为更有意义的高级特征。我们用来自Apple App Store和Google Play Store的7款应用评估了我们的方法,并将其结果与手动的同行评论分析进行了比较。平均而言,我们的方法的精度为0.59,召回率为0.51。提取的特征是一致的,并且与需求演化任务相关。我们的方法可以帮助应用开发者系统地分析用户对单个功能的意见,并过滤不相关的评论。
{"title":"How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews","authors":"Emitzá Guzmán, W. Maalej","doi":"10.1109/RE.2014.6912257","DOIUrl":"https://doi.org/10.1109/RE.2014.6912257","url":null,"abstract":"App stores allow users to submit feedback for downloaded apps in form of star ratings and text reviews. Recent studies analyzed this feedback and found that it includes information useful for app developers, such as user requirements, ideas for improvements, user sentiments about specific features, and descriptions of experiences with these features. However, for many apps, the amount of reviews is too large to be processed manually and their quality varies largely. The star ratings are given to the whole app and developers do not have a mean to analyze the feedback for the single features. In this paper we propose an automated approach that helps developers filter, aggregate, and analyze user reviews. We use natural language processing techniques to identify fine-grained app features in the reviews. We then extract the user sentiments about the identified features and give them a general score across all reviews. Finally, we use topic modeling techniques to group fine-grained features into more meaningful high-level features. We evaluated our approach with 7 apps from the Apple App Store and Google Play Store and compared its results with a manually, peer-conducted analysis of the reviews. On average, our approach has a precision of 0.59 and a recall of 0.51. The extracted features were coherent and relevant to requirements evolution tasks. Our approach can help app developers to systematically analyze user opinions about single features and filter irrelevant reviews.","PeriodicalId":307764,"journal":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 552
期刊
2014 IEEE 22nd International Requirements Engineering Conference (RE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1