[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security

  • Conference paper
  • First Online:
The Practice of Enterprise Modeling (PoEM 2020)

Abstract

Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakeholders, concerning dozens of requirements types, from functional to qualitative, including adaptation, security and privacy, ethical, acceptance and more. In such settings, requirements engineers need support concerning such increasingly complex activities, and Requirements Engineering (RE) modeling tools have been developed for this. However, such tools, although effective, are complex, time-consuming and requiring steep learning curves. The consequent lack of acceptance and abandonment in using such tools, by engineers, paves the way to the application of RE techniques in a more error-prone, low-quality way, increasing the possibility to have failures in software systems delivered. In this paper, we identify main areas of lack of acceptance, affecting RE engineers, for such tools, and propose an approach for making modeling tools more effective in engaging the engineer in performing RE in a tool-based way, receiving adequate feedback and staying motivated to use modeling tools. This is accomplished by performing acceptance requirements analysis (through the Agon Framework) and using gamification to increase the engagement of engineers during the usage of RE modeling tools. Towards this end, we performed a case study, within the VisiOn European Project, for enhancing a tool for modeling privacy and security requirements. Our case study provides preliminary evidence that our approach supports in making RE modeling tools more engaging from the engineer perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.visioneuproject.eu/.

  2. 2.

    https://www.defendproject.eu/.

References

  1. Alami, D., Dalpiaz, F.: A gamified tutorial for learning about security requirements engineering. In: IEEE 25th International Requirements Engineering Conference (RE), September 2017

    Google Scholar 

  2. Calabrese, F.: Gamification with the agon framework: a case study on privacy requirements modeling. Bachelor thesis, University of Trento, Italy (2018)

    Google Scholar 

  3. Calabrese, F., et al.: Applying Agon Method: Resulting Dataset (Goal Models) (2018). https://data.mendeley.com/datasets/6s4c87c494/4

  4. Gharib, M., Salnitri, M., et al.: Privacy requirements: findings and lessons learned in developing a privacy platform. In: International Requirements Engineering Conference (RE). IEEE (2016)

    Google Scholar 

  5. Koivisto, J., Hamari, J.: Demographic differences in perceived benefits from gamification. Comput. Hum. Behav. 35, 179–188 (2014)

    Article  Google Scholar 

  6. Lombriser, P., Dalpiaz, F., Lucassen, G., Brinkkemper, S.: Gamified requirements engineering: model and experimentation. In: Daneva, M., Pastor, O. (eds.) REFSQ 2016. LNCS, vol. 9619, pp. 171–187. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30282-9_12

    Chapter  Google Scholar 

  7. Maguire, M.: Methods to support human-centered design. Int. J. Hum Comput Stud. 55, 587–634 (2001)

    Article  Google Scholar 

  8. Mouratidis, H.: Secure software systems engineering: the secure tropos approach. JSW 6, 331–339 (2011)

    Article  Google Scholar 

  9. Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P., Giorgini, P.: Specifying and reasoning over socio-technical security requirements with STS-tool. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 504–507. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41924-9_45

    Chapter  Google Scholar 

  10. Piras, L., et al.: DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2020. LNCS, vol. 12395, pp. 186–201. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58986-8_13

    Chapter  Google Scholar 

  11. Piras, L., Dallagiacoma, D., Perini, A., Susi, A., Giorgini, P., Mylopoulos, J.: Design thinking and acceptance requirements for designing gamified software. In: IEEE International Conference on Research Challenges in Information Science (RCIS) (2019)

    Google Scholar 

  12. Piras, L., Paja, E., Cuel, R., Ponte, D., Giorgini, P., Mylopoulos, J.: Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. In: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). IEEE (2017)

    Google Scholar 

  13. Piras, L., Paja, E., Giorgini, P., Mylopoulos, J.: Goal models for acceptance requirements analysis and gamification design. In: Mayr, H.C., Guizzardi, G., Ma, H., Pastor, O. (eds.) ER 2017. LNCS, vol. 10650, pp. 223–230. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69904-2_18

    Chapter  Google Scholar 

  14. Piras, L., et al.: DEFeND architecture: a privacy by design platform for gdpr compliance. In: Gritzalis, S., Weippl, E.R., Katsikas, S.K., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2019. LNCS, vol. 11711, pp. 78–93. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27813-7_6

    Chapter  Google Scholar 

  15. Snijders, R., et al.: REfine: a gamified platform for participatory requirements engineering. In: International Workshop on Crowd-Based Requirements Engineering (CrowdRE). IEEE (2015)

    Google Scholar 

  16. Tsohou, A., Magkos, M., et al.: Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. J. 28(4), 531–553 (2020)

    Google Scholar 

  17. Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O’Reilly Media, Inc., Sebastopol (2011)

    Google Scholar 

Download references

Acknowledgment

This work was partially supported by the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653642 (VisiOn).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Federico Calabrese .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Piras, L., Calabrese, F., Giorgini, P. (2020). Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security. In: Grabis, J., Bork, D. (eds) The Practice of Enterprise Modeling. PoEM 2020. Lecture Notes in Business Information Processing, vol 400. Springer, Cham. https://doi.org/10.1007/978-3-030-63479-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63479-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63478-0

  • Online ISBN: 978-3-030-63479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics