2020
DOI: 10.1007/978-3-030-63479-7_25
|View full text |Cite
|
Sign up to set email alerts
|

Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security

Abstract: Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakeholders, concerning dozens of requirements types, from functional to qualitative, including adaptation, security and privacy, ethical, acceptance and more. In such settings, requirements engineers need support concerning such increasingly complex activities, and Requi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
(50 reference statements)
0
1
0
Order By: Relevance
“…The internal and external key stakeholders, such as DPOs, IT managers, and citizens, were identified. For each user category, a questionnaire was prepared in a systematic way [35,36], aiming to capture the legal, functional, security, privacy and technology acceptance needs [28,29]. Specifically, we followed the approach of [4] for customer development, including steps such as Customer Segmentation, Problem Discovery and Validation, Product Discovery and Validation [35,36].…”
Section: Pbd Activities and Strategies For Gdpr Compliancementioning
confidence: 99%
“…The internal and external key stakeholders, such as DPOs, IT managers, and citizens, were identified. For each user category, a questionnaire was prepared in a systematic way [35,36], aiming to capture the legal, functional, security, privacy and technology acceptance needs [28,29]. Specifically, we followed the approach of [4] for customer development, including steps such as Customer Segmentation, Problem Discovery and Validation, Product Discovery and Validation [35,36].…”
Section: Pbd Activities and Strategies For Gdpr Compliancementioning
confidence: 99%