Understanding the Role of Human-Related Factors in Security Requirements Elicitation
Context and motivation: Many requirements engineering (RE) activities depend not only on the nature of the system itself, but also on human-centric characteristics of the RE teams. Question/problem: What role do human-related factors of RE teams play eliciting high-quality security requirements? Principal ideas/results: This research preview presents our preliminary work in discovering the cognitive factors that represent the intentions and motivations of RE teams to develop secure systems from early stages of the system development, and how these factors impact the quality of the elicited requirements. We outline a framework, with an illustrative example, for describing the variables that affect the decisions of RE teams when they elicit security requirements to address security concerns. Contribution: The proposed framework helps to characterize the different aspects of human-related factors, and the correlation between the impact of these factors on the quality of the requirements elicitation phase. This is a novel research direction which positions our long-term research agenda, and we urge community contributions in this direction to achieve an enhanced understanding of the role of human-related factors in requirements engineering for security domains.
Thu 20 AprDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
14:00 - 15:30 | Session R10 - Security Requirements and Best Poster and ToolResearch Papers at Llívia Chair(s): Sallam Abualhaija University of Luxembourg, Elda Paja IT University of Copenhagen Elda will chair the part of the session dedicated to the scientific papers, and Sallam will chair the best poster and best tool | ||
14:00 20mResearch preview | Understanding the Role of Human-Related Factors in Security Requirements Elicitation Research Papers P: Jason Jaskolka Carleton University, A: Sanaa Alwidian Ontario Tech University, D: Roman Trentinaglia Fraunhofer IEM | ||
14:20 20mExperience report | Eliciting Security Requirements - an Experience Report Research Papers P: Roman Trentinaglia Fraunhofer IEM, A: Sven Merschjohann Fraunhofer IEM, A: Markus Fockel Fraunhofer IEM, A: Hendrik Eikerling Fraunhofer IEM, D: Jason Jaskolka Carleton University | ||
14:40 20mJournal Early-Feedback | The Relationship between Team Climate and Implementation of Security in Software Development Research Papers A: Irit Hadar University of Haifa, P: Micha Prudjinski University of Haifa, A: Gil Luria University of Haifa, D: Paola Spoletini Kennesaw State University, D: Daniel Amyot University of Ottawa | ||
15:00 10m | Best Poster Research Papers | ||
15:10 10m | Best Tool Research Papers |