A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment
2017
Requirements Engineering: Foundation for Software Quality
We propose a controlled experiment to assess how well creativity techniques can support social engineering threat assessment. ...
Social engineering threats form the basis for the elicitation of security requirements, a type of quality requirement, which state what threat should be prevented or mitigated. ...
The results of our experiment should provide an indication of how suitable the two creativity techniques are for performing social engineering threat elicitation. ...
dblp:conf/refsq/BeckersFG017
fatcat:xljzox7qorchrglbqsxh2pakg4
Empathy and Criativity in Privacy Requirements Elicitation: Systematic Literature Review
2020
Workshop em Engenharia de Requisitos
This paper presents a Systematic Literature Review (SLR) in order to find in the literature papers that use creativity and empathy techniques in privacy requirements elicitation. ...
As a result of the SLR, we found few papers related to the use of Empathy in privacy requirements elicitation and no papers that relate Creativity to the elicitation of privacy requirements. ...
[31] combine goal modeling and creativity techniques for enhanced software Requirements Engineering (RE). ...
dblp:conf/wer/CalazansCC20
fatcat:b65xstcbfrfkdc76krysxose3u
A Serious Game for Eliciting Social Engineering Security Requirements
2016
2016 IEEE 24th International Requirements Engineering Conference (RE)
Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap. ...
We propose to use a card game to elicit these requirements, which all employees of a company can play to understand the threat and document security requirements. ...
Even for IT security professionals it is challenging to elicit security requirements for social engineering threats. ...
doi:10.1109/re.2016.39
dblp:conf/re/Beckers016
fatcat:wj5velrbozg6hpssaj3c4ia27i
A controlled experiment to evaluate the effects of mindfulness in software engineering
2014
Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '14
Many reports support the fact that some psycho-social aspects of software engineers are key factors for the quality of the software development process and its resulting products. ...
Based on the experience of some of the authors after more than a year of practising mindfulness-a meditation technique aimed to increase clearness of mind and awareness-we guessed that it could be interesting ...
Genero, from the University of Castilla-La Mancha, for being always willing to answer our experimental uncertainties. ...
doi:10.1145/2652524.2652539
dblp:conf/esem/BernardezDPC14
fatcat:y3assaayhbdmdk3wrjzhoafq6u
Stimulating Stakeholders' Imagination: New Creativity Triggers for Eliciting Novel Requirements
2016
2016 IEEE 24th International Requirements Engineering Conference (RE)
Few lightweight creativity techniques have been developed for use in requirements engineering. ...
Requirements engineering is a creative process in which stakeholders and engineers work together to create ideas for new products, services and systems. ...
We also designed a procedure to control the experimental settings and avoid irrelevancies. ...
doi:10.1109/re.2016.36
dblp:conf/re/BurnayHM16
fatcat:os3qieussfe5th4z3brpw2u7ia
Design Thinking: Challenges for Software Requirements Elicitation
2019
Information
Agile methods fit well for software development teams in the requirements elicitation activities. ...
Design Thinking has been used as a requirements elicitation technique and immersion in the process areas, which brings the client closer to the software project team and enables the creation of better ...
for Software Engineering: An Opportunity for Innovation [32] S19 The role of design thinking and physical prototyping in social software engineering [50] S20 Design thinking: A fruitful concept for ...
doi:10.3390/info10120371
fatcat:4gsianvm2nc6zbgbqqdxp5kgru
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Journal of Systems and Software
The authors would also like to thank Jouni Lappalainen from the University of Oulu for his support as one of the course assistants during the experimental research. ...
The authors thank Luke Hohmann from Innovation Games® for providing access to the online serious games used in this study. ...
[32] defined an innovative process of requirements elicitation called the EPM Creative Requirements Engineering Technique (EPMcreate). ...
doi:10.1016/j.jss.2015.07.017
fatcat:4ejmxfkpvvfrpesfjbk6baqdfy
Leveraging creativity in requirements elicitation within agile software development: a systematic literature review
2019
Journal of Systems and Software
To fill this gap, some authors argue in favor of the application of Creative thinking for requirements elicitation within agile software development. ...
Despite this being a new research field, there is a mixture of techniques, tools and processes that have already been and are currently being successfully tested in industry. ...
and exchange their experiences and techniques with each other, not via paper, but using social media. ...
doi:10.1016/j.jss.2019.110396
fatcat:76hrcyxlhzhblgyovdzq3tigsa
An Experimental Study of the Use of Design Thinking as a Requirements Elicitation Approach for Mobile Learning Environments
2015
CLEI Electronic Journal
In this context, this paper presents a process for requirements elicitation and documentation of mobile learning environments. ...
An experiment was conducted to evaluate if the proposed process contributes to create MLEs that present distinctive and interesting characteristics when compared to existing solutions for a specific problem ...
Acknowledgements This work was partially supported by FACEPE (Fundação de Amparo à Ciência e Tecnologia do Estado de Pernambuco) research grants. ...
doi:10.19153/cleiej.18.1.5
fatcat:qwhi3ywlkvfllovykqcwlzq4ru
CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems
2019
International Journal of Advanced Computer Science and Applications
We present Crowdsourcing based Requirements Elicitation for eLS (CREeLS), which is made up of a framework of the necessary elements of crowdsourcing suggesting specific tools for each element, and a phased ...
To the best of our knowledge, there is little evidence that a crowdsourcing based requirements elicitation approach especially tailored for eLS that addresses their special characteristics exists. ...
[51] , an experiment gives more control over the situation; it allows to compare the results when one variable is changing and the others are fixed. ...
doi:10.14569/ijacsa.2019.0101034
fatcat:oq4xc77cwndhdjpztill3x2kq4
Data-Driven Requirements Elicitation: A Systematic Literature Review
2021
SN Computer Science
A challenge to data-driven requirements engineering concerns the lack of methods to facilitate seamless and autonomous requirements elicitation from such dynamic and unintended digital sources. ...
Through a two-level screening and a complementary forward and backward reference search, 68 papers were selected for final analysis. ...
In a controlled experiment, the proposed artifact is evaluated in a controlled environment [34] . A case study aims to assess the artifact in-depth in a real-world context [34] . ...
doi:10.1007/s42979-020-00416-4
fatcat:g4g7nb4mwbhuhgmmfxi5vir5ly
Tailoring Gamification to Requirements Elicitation: A Stakeholder-Centric Motivation Concept
2017
2017 IEEE/ACM 10th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)
Involving stakeholders in requirements elicitation is a cornerstone of successful requirements engineering (RE). ...
Abstract-Involving stakeholders in requirements elicitation is a cornerstone of successful requirements engineering (RE). ...
can recommend other (potential) stakeholders over the platform.
4) Conducting an Experiment: We investigated the algorithms controlling single game elements in a field experiment with an implemented ...
doi:10.1109/chase.2017.4
dblp:conf/icse/KolpondinosG17
fatcat:obpxial7kjelvidbpw6o7nickq
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation
[chapter]
2017
Lecture Notes in Computer Science
can be extended to elicit Attribute Based Access Control style policies. ...
Recognising that the codes uncovered during a Grounded Theory analysis of semi-structured interview data can be interpreted as policy attributes, this paper describes how a Qualitative Research-based methodology ...
Acknowledgements Thanks to Simon O'Donovan who prototyped the Android photograph sharing assistant for his UCC Bachelor's degree project. ...
doi:10.1007/978-3-319-72817-9_15
fatcat:5kzgenfucveh3jcgtenooauub4
Effect of Domain Knowledge on Elicitation Effectiveness: An Internally Replicated Controlled Experiment
2016
IEEE Transactions on Software Engineering
We executed a controlled experiment with post-graduate students. The experimental task was to elicit requirements using open interview and consolidate the elicited information immediately afterwards. ...
Requirements elicitation is a highly communicative activity in which human interactions play a critical role. ...
Alejandrina Aranda holds a PhD grant from Itaipu Binacional, Paraguay. ...
doi:10.1109/tse.2015.2494588
fatcat:wv7ecr4mofg3xe7fs47sqa5x2e
How Do Requirements Evolve During Elicitation? An Empirical Study Combining Interviews and App Store Analysis
[article]
2022
arXiv
pre-print
After the sessions, the analysts produce a first set of requirements for the system. ...
To this end, we select 30 subjects that act as requirements analysts, and we perform interview-based elicitation sessions with a fictional customer. ...
This work was partially supported by National MIUR-PRIN 2020TL3X8X project T-LADIES (Typeful Language Adaptation for Dynamic, Interacting and Evolving Systems) and by the National Science Foundation under ...
arXiv:2208.00825v1
fatcat:47huyhjkpfgufiaevgbiftjf7i
« Previous
Showing results 1 — 15 out of 13,785 results