1
|
Canedo ED, Bandeira IN, Gonçalves LP, Sales ADV, Mendonça F, Costa CA, de Sousa Jr. RT. Business Process Modeling Supporting the Requirements Elicitation of an Audit System. International Journal of Electronic Government Research 2023. [DOI: 10.4018/ijegr.320192] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/19/2023]
Abstract
Requirements elicitation is a highly relevant part of the software development process. Due to the several techniques that exist to perform it, it is necessary to understand the complexity of this activity for it to be well performed, thus ensuring the quality of the final product. In addition, it is also worth emphasizing that the existence of well-defined processes is essential for the stakeholders' needs to be correctly identified in the initial stages of the software development process. This paper presents an experience report of the requirements elicitation and business process modeling teams. The teams used the best practices and reference frameworks to understand, model, and perform business process enhancements to the Brazilian Unified Health System General Audit Office (AUDSUS) audit system by using the business process model and notation (BPMN). Thus, all software requirements were specified based on the modeled business processes, providing a faster software development process and a more efficient information flow between stakeholders and the teams involved.
Collapse
|
2
|
Canedo ED, Calazans ATS, Bandeira IN, Costa PHT, Masson ETS. Guidelines adopted by agile teams in privacy requirements elicitation after the Brazilian general data protection law (LGPD) implementation. Requir Eng 2022; 27:545-567. [PMID: 36373010 PMCID: PMC9638239 DOI: 10.1007/s00766-022-00391-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/21/2022] [Accepted: 10/07/2022] [Indexed: 06/16/2023]
Abstract
The Brazilian General Data Protection Law (LGPD) implementation has impacted activities carried out by the software development teams. Due to it, developers had to become aware of the existing techniques and tools to carry out privacy requirements elicitation. Extending our previous work, we have investigated the actions taken by organizations regarding the LGPD, specifically in software development, considering the perception of agile development teams after two years of the LGPD implementation. In addition, we also investigated the perception of an agile team regarding the practices, techniques, and tools previously cited by practitioners as potential solutions for use in this context, along with techniques already in use in the current context. We have conducted a systematic literature review (SLR) and selected 36 primary studies. Furthermore, we have conducted a survey with 53 IT practitioners and semi-structured interviews with ten practitioners. The LGPD principles are known by most agile teams and are being implemented by the organizations, although the existing tools to support privacy requirements elicitation are still underused by agile teams. Moreover, agile teams consider that software requirements and software construction are the most impacted areas of knowledge by the LGPD, and most of them use user stories in privacy requirements elicitation. Our findings reveal that agile teams and Brazilian organizations are more concerned with user data privacy issues after the LGPD became effective. However, agile teams still face challenges in privacy requirements elicitation.
Collapse
Affiliation(s)
- Edna Dias Canedo
- Computer Science Department, University of Brasília (UnB), P.O. Box 4466 Brasília, DF Brazil
| | | | - Ian Nery Bandeira
- Computer Science Department, University of Brasília (UnB), P.O. Box 4466 Brasília, DF Brazil
| | | | | |
Collapse
|
3
|
Dias Canedo E, Cordeiro Mendes B. Software Requirements Classification Using Machine Learning Algorithms. Entropy (Basel) 2020; 22:E1057. [PMID: 33286826 PMCID: PMC7597130 DOI: 10.3390/e22091057] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/12/2020] [Revised: 09/02/2020] [Accepted: 09/03/2020] [Indexed: 11/16/2022]
Abstract
The correct classification of requirements has become an essential task within software engineering. This study shows a comparison among the text feature extraction techniques, and machine learning algorithms to the problem of requirements engineer classification to answer the two major questions "Which works best (Bag of Words (BoW) vs. Term Frequency-Inverse Document Frequency (TF-IDF) vs. Chi Squared (CHI2)) for classifying Software Requirements into Functional Requirements (FR) and Non-Functional Requirements (NF), and the sub-classes of Non-Functional Requirements?" and "Which Machine Learning Algorithm provides the best performance for the requirements classification task?". The data used to perform the research was the PROMISE_exp, a recently made dataset that expands the already known PROMISE repository, a repository that contains labeled software requirements. All the documents from the database were cleaned with a set of normalization steps and the two feature extractions, and feature selection techniques used were BoW, TF-IDF and CHI2 respectively. The algorithms used for classification were Logist Regression (LR), Support Vector Machine (SVM), Multinomial Naive Bayes (MNB) and k-Nearest Neighbors (kNN). The novelty of our work is the data used to perform the experiment, the details of the steps used to reproduce the classification, and the comparison between BoW, TF-IDF and CHI2 for this repository not having been covered by other studies. This work will serve as a reference for the software engineering community and will help other researchers to understand the requirement classification process. We noticed that the use of TF-IDF followed by the use of LR had a better classification result to differentiate requirements, with an F-measure of 0.91 in binary classification (tying with SVM in that case), 0.74 in NF classification and 0.78 in general classification. As future work we intend to compare more algorithms and new forms to improve the precision of our models.
Collapse
|
4
|
Clara AMC, Canedo ED, de Sousa Júnior RT. A synthesis of common guidelines for regulatory compliance verification in the context of ICT governance audits1. IP 2018. [DOI: 10.3233/ip-170059] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
| | - Edna Dias Canedo
- Computer Science Department, University of Brasília (UnB), Brasília, DF, Brazil
| | | |
Collapse
|
5
|
Pinheiro A, Dias Canedo E, de Sousa Junior RT, de Oliveira Albuquerque R, García Villalba LJ, Kim TH. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services. Sensors (Basel) 2018; 18:s18030753. [PMID: 29498641 PMCID: PMC5876826 DOI: 10.3390/s18030753] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/30/2018] [Revised: 02/17/2018] [Accepted: 02/23/2018] [Indexed: 11/16/2022]
Abstract
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.
Collapse
Affiliation(s)
- Alexandre Pinheiro
- Cybersecurity INCT Unit 6, Decision Technologies Laboratory—LATITUDE, Electrical Engineering Department (ENE), Technology College, University of Brasília (UnB), Brasília-DF, CEP 70910-900, Brazil; (A.P.); (R.T.d.S.J.); (R.d.O.A.)
| | - Edna Dias Canedo
- Department of Computer Science, University of Brasília (UnB), P.O. Box 4466—Brasília-DF, CEP 70910-900, Brazil;
| | - Rafael Timoteo de Sousa Junior
- Cybersecurity INCT Unit 6, Decision Technologies Laboratory—LATITUDE, Electrical Engineering Department (ENE), Technology College, University of Brasília (UnB), Brasília-DF, CEP 70910-900, Brazil; (A.P.); (R.T.d.S.J.); (R.d.O.A.)
| | - Robson de Oliveira Albuquerque
- Cybersecurity INCT Unit 6, Decision Technologies Laboratory—LATITUDE, Electrical Engineering Department (ENE), Technology College, University of Brasília (UnB), Brasília-DF, CEP 70910-900, Brazil; (A.P.); (R.T.d.S.J.); (R.d.O.A.)
| | - Luis Javier García Villalba
- Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain
- Correspondence: ; Tel.: +34-91-394-7638
| | - Tai-Hoon Kim
- Department of Convergence Security, Sungshin Women’s University, 249-1 Dongseon-Dong 3-ga, Seoul 136-742, Korea;
| |
Collapse
|