{"title":"29th IEEE International Requirements Engineering Conference, RE 2021, Notre Dame, IN, USA, September 20-24, 2021","authors":"","doi":"10.1109/RE51729.2021","DOIUrl":"https://doi.org/10.1109/RE51729.2021","url":null,"abstract":"","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1109/RE51729.2021.00068
K. E. Shanks
{"title":"An Idea Generation Tool for Designing Behavior Change Games","authors":"K. E. Shanks","doi":"10.1109/RE51729.2021.00068","DOIUrl":"https://doi.org/10.1109/RE51729.2021.00068","url":null,"abstract":"","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"38 1","pages":"456-461"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73779491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Welcome to RE’18! The 26th edition of the premier IEEE International Requirements Engineering Conference takes place on August 20 to 24, 2018, in Canada. RE’18 brings together around 250 researchers, practitioners, educators, and students to present and discuss the most recent research results, innovations, experiences, and concerns in the discipline of requirements engineering. RE'18 is held at the Banff Centre for Arts and Creativity in the gorgeous Banff National Park, one of Canada's oldest and most popular tourist destinations. Known for its breathtaking mountainous surroundings and hot springs, Banff is a prime destination for outdoor sports and features extensive hiking, biking, and mountain climbing opportunities.
{"title":"Welcome Message from the RE'19 Chairs","authors":"D. Damian, A. Perini, Seok-Won Lee","doi":"10.1109/re.2019.00005","DOIUrl":"https://doi.org/10.1109/re.2019.00005","url":null,"abstract":"Welcome to RE’18! The 26th edition of the premier IEEE International Requirements Engineering Conference takes place on August 20 to 24, 2018, in Canada. RE’18 brings together around 250 researchers, practitioners, educators, and students to present and discuss the most recent research results, innovations, experiences, and concerns in the discipline of requirements engineering. RE'18 is held at the Banff Centre for Arts and Creativity in the gorgeous Banff National Park, one of Canada's oldest and most popular tourist destinations. Known for its breathtaking mountainous surroundings and hot springs, Banff is a prime destination for outdoor sports and features extensive hiking, biking, and mountain climbing opportunities.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"76 1","pages":"12-14"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79947634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This document includes the welcome message from the chairs of the 26th IEEE International Requirements Engineering Conference, including an introduction to the program and main contributors.
该文档包括来自第26届IEEE国际需求工程会议主席的欢迎信息,包括对程序和主要贡献者的介绍。
{"title":"Welcome Message from the RE18 Chairs","authors":"W. Maalej, Daniel Amyot, G. Ruhe","doi":"10.1109/RE.2018.00005","DOIUrl":"https://doi.org/10.1109/RE.2018.00005","url":null,"abstract":"This document includes the welcome message from the chairs of the 26th IEEE International Requirements Engineering Conference, including an introduction to the program and main contributors.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"351 1","pages":"13-16"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76582293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Requirement Engineering can become complex when the number of users who submit requirements is large. In the world of online Software as a Service businesses, the number of users can be massive - often in the millions. In the case of SurveyMonkey, the world's largest survey company, it can be in the tens of millions. In a world with increasing demands and where users have a louder voice than ever via Twitter, Facebook and LinkedIn, how does one prioritize feature requests, bug fixes and everything else requested by customers and partners? Is the roadmap in the hands of the company or the users? Is this a winnable battle? In this talk, I will tell the story of how product requirements were determined when Fluidware was first established almost eight years ago and how it evolved in the various accelerated growth stages of the company before and after acquisition by SurveyMonkey.
当提交需求的用户数量很大时,需求工程就会变得复杂。在在线软件即服务(Software as a Service)行业中,用户数量可能非常庞大——通常达到数百万。以全球最大的调查公司SurveyMonkey为例,这一数字可能达到数千万。在一个需求不断增长的世界里,用户通过Twitter、Facebook和LinkedIn发出的声音比以往任何时候都更大,一个人如何优先考虑客户和合作伙伴提出的功能请求、漏洞修复和其他所有要求?路线图是掌握在公司手中还是掌握在用户手中?这是一场能赢的战斗吗?在这次演讲中,我将讲述八年前Fluidware首次成立时如何确定产品需求的故事,以及在被SurveyMonkey收购前后公司的各个加速增长阶段中它是如何演变的。
{"title":"You versus users - who owns your roadmap? (keynote)","authors":"Aydin Y. Mirzaee","doi":"10.1109/RE.2015.7320400","DOIUrl":"https://doi.org/10.1109/RE.2015.7320400","url":null,"abstract":"Requirement Engineering can become complex when the number of users who submit requirements is large. In the world of online Software as a Service businesses, the number of users can be massive - often in the millions. In the case of SurveyMonkey, the world's largest survey company, it can be in the tens of millions. In a world with increasing demands and where users have a louder voice than ever via Twitter, Facebook and LinkedIn, how does one prioritize feature requests, bug fixes and everything else requested by customers and partners? Is the roadmap in the hands of the company or the users? Is this a winnable battle? In this talk, I will tell the story of how product requirements were determined when Fluidware was first established almost eight years ago and how it evolved in the various accelerated growth stages of the company before and after acquisition by SurveyMonkey.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"16 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87760952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tech startups typically approach requirements gathering differently from the process that is used to develop requirements in existing businesses and for existing products. Many of these startups operate in "stealth mode", taking care to minimize the number of people with whom they share their innovative ideas. It’s common for these startups to create a succession of early releases, and apply user feedback from those releases to evolve the features and functions of their products. This talk describes various approaches used by tech startups to define product requirements, and contrasts those approaches with those used in more traditional requirements engineering activities.
{"title":"Startups and requirements (keynote)","authors":"A. Wasserman","doi":"10.1109/RE.2014.6912240","DOIUrl":"https://doi.org/10.1109/RE.2014.6912240","url":null,"abstract":"Tech startups typically approach requirements gathering differently from the process that is used to develop requirements in existing businesses and for existing products. Many of these startups operate in \"stealth mode\", taking care to minimize the number of people with whom they share their innovative ideas. It’s common for these startups to create a succession of early releases, and apply user feedback from those releases to evolve the features and functions of their products. This talk describes various approaches used by tech startups to define product requirements, and contrasts those approaches with those used in more traditional requirements engineering activities.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"183 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77595303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Properly protecting information is in all our best interests, but it is a complex undertaking. The fact that regulation is often written by non-technologists, introduces additional challenges and obstacles. Moreover, those who design systems that collect, store, and maintain sensitive information have an obligation to design systems holistically within this broader context of regulatory and legal compliance. There are questions that should be asked when developing new requirements for information systems. For example, how do we build systems to handle data that must be kept secure and private when relevant regulations tie your hands? When building a system that maintains health or financial records for a large number of people, what do we need to do to protect the information against theft and abuse, keep the information private, AND at the same time, satisfy all governing privacy/security laws and restrictions? Moreover, how do we know that we’ve satisfied those laws? How do we monitor for compliance while ensuring that we’re monitoring the right things? And, how do you accomplish all this in a way that can be expressed clearly to end-users and legislators (or auditors) so they can be confident you are doing the right things? We’ve been working on technologies to make these tasks simpler, and in some senses, automatic. In this talk, I will describe some of the research that we have been conducting to address these problems.
{"title":"Now more than ever: Privacy and security are required (keynote)","authors":"A. Antón","doi":"10.1109/RE.2014.6912241","DOIUrl":"https://doi.org/10.1109/RE.2014.6912241","url":null,"abstract":"Properly protecting information is in all our best interests, but it is a complex undertaking. The fact that regulation is often written by non-technologists, introduces additional challenges and obstacles. Moreover, those who design systems that collect, store, and maintain sensitive information have an obligation to design systems holistically within this broader context of regulatory and legal compliance. There are questions that should be asked when developing new requirements for information systems. For example, how do we build systems to handle data that must be kept secure and private when relevant regulations tie your hands? When building a system that maintains health or financial records for a large number of people, what do we need to do to protect the information against theft and abuse, keep the information private, AND at the same time, satisfy all governing privacy/security laws and restrictions? Moreover, how do we know that we’ve satisfied those laws? How do we monitor for compliance while ensuring that we’re monitoring the right things? And, how do you accomplish all this in a way that can be expressed clearly to end-users and legislators (or auditors) so they can be confident you are doing the right things? We’ve been working on technologies to make these tasks simpler, and in some senses, automatic. In this talk, I will describe some of the research that we have been conducting to address these problems.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"4 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79001451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of this research is Creative Strategic Scenarios as predictive models of software evolution for socio-technical systems in organizations. This research seeks to combine theories of Strategic Planning and Creativity to generate strategic scenarios that could predict Organizational Changes. The work will integrate scenarios and the i* goal modelling mechanism to analyse the impacts of organizational change through strategic scenarios.
{"title":"Creative Strategic Scenarios for preparation to requirements evolution","authors":"Marilia Guterres Ferreira","doi":"10.1109/RE.2014.6912305","DOIUrl":"https://doi.org/10.1109/RE.2014.6912305","url":null,"abstract":"The focus of this research is Creative Strategic Scenarios as predictive models of software evolution for socio-technical systems in organizations. This research seeks to combine theories of Strategic Planning and Creativity to generate strategic scenarios that could predict Organizational Changes. The work will integrate scenarios and the i* goal modelling mechanism to analyse the impacts of organizational change through strategic scenarios.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"28 1","pages":"494-499"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86709680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
State-of-the-art in Requirements Engineering offers many frameworks and techniques to enable requirements engineers in their work. However, for critical systems there are gaps in state-of-the-art, and these can result in dire consequences, potentially putting lives in danger and damage infrastructure and threaten the environment. A well known technique used to help requirements engineers to understand safety hazards situations in the context of safety-critical software is Fault Tree Analysis (FTA). This technique is a good one to decompose hazards identified in the system context into events that may put the system functionalities in risk. However, FTA does not offer a protocol of how to derive safety functional requirements from fault trees. In this paper we present a case study adopting a protocol to help requirements engineers to derive safety functional requirements from FTA. The proposed protocol was based on a study performed in a Brazilian company in the area of electronic medical devices. The development of prototype of a low cost insulin infusion pump, which is a critical system, offered the basis to propose and test a protocol to derive safety functional requirements from FTA. During the case study we collected evidences that help us to discuss if FTA is sufficient to guide software engineers to implement the corresponding control software and also if FTA offers enough information to help requirements engineers to derive safety functional requirements.
{"title":"A case study using a protocol to derive safety functional requirements from Fault Tree Analysis","authors":"L. E. G. Martins, T. Oliveira","doi":"10.1109/RE.2014.6912292","DOIUrl":"https://doi.org/10.1109/RE.2014.6912292","url":null,"abstract":"State-of-the-art in Requirements Engineering offers many frameworks and techniques to enable requirements engineers in their work. However, for critical systems there are gaps in state-of-the-art, and these can result in dire consequences, potentially putting lives in danger and damage infrastructure and threaten the environment. A well known technique used to help requirements engineers to understand safety hazards situations in the context of safety-critical software is Fault Tree Analysis (FTA). This technique is a good one to decompose hazards identified in the system context into events that may put the system functionalities in risk. However, FTA does not offer a protocol of how to derive safety functional requirements from fault trees. In this paper we present a case study adopting a protocol to help requirements engineers to derive safety functional requirements from FTA. The proposed protocol was based on a study performed in a Brazilian company in the area of electronic medical devices. The development of prototype of a low cost insulin infusion pump, which is a critical system, offered the basis to propose and test a protocol to derive safety functional requirements from FTA. During the case study we collected evidences that help us to discuss if FTA is sufficient to guide software engineers to implement the corresponding control software and also if FTA offers enough information to help requirements engineers to derive safety functional requirements.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"75 1","pages":"412-419"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75920572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our built environment is a marvel of engineering. It is the continuously evolving product of collaboration between civil engineers, mechanical engineers, electrical engineers, architects, owners, governments, voters, contractors and more. Many of the requirements-related challenges that are commonly encountered in the engineering of software systems have been around for centuries in the construction industry. This keynote seeks to describe those requirements engineering problems that are intrinsic to the development of complex twenty-first century buildings and to explain the practices that have evolved to address them. It will highlight those requirements-related challenges that the construction industry is still grappling with and some new challenges that are emerging. The keynote will be illustrated with examples of complex building projects from Arup. The objective is to explore the potential synergies and the possible transfer of practical ideas between some of the oldest engineering disciplines and one of the youngest.
{"title":"Starchitects and Jack-Hammers: Requirements engineering challenges and practices in the construction industry (keynote)","authors":"Fiona Cousins","doi":"10.1109/RE.2013.6636698","DOIUrl":"https://doi.org/10.1109/RE.2013.6636698","url":null,"abstract":"Our built environment is a marvel of engineering. It is the continuously evolving product of collaboration between civil engineers, mechanical engineers, electrical engineers, architects, owners, governments, voters, contractors and more. Many of the requirements-related challenges that are commonly encountered in the engineering of software systems have been around for centuries in the construction industry. This keynote seeks to describe those requirements engineering problems that are intrinsic to the development of complex twenty-first century buildings and to explain the practices that have evolved to address them. It will highlight those requirements-related challenges that the construction industry is still grappling with and some new challenges that are emerging. The keynote will be illustrated with examples of complex building projects from Arup. The objective is to explore the potential synergies and the possible transfer of practical ideas between some of the oldest engineering disciplines and one of the youngest.","PeriodicalId":90955,"journal":{"name":"Proceedings. IEEE International Requirements Engineering Conference","volume":"177 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2013-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78016407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}