Abstract
Although agile software development (ASD) has been adopted in the industry, requirements approaches for ASD still neglect non-functional requirements. Privacy has become a concern due to new user demands and data protection laws. Hence, privacy needs to be properly specified, but agile requirements engineering techniques do not explicitly represent privacy requirements and, therefore, are not able to proper analyze such requirements. In this context, Privacy Criteria Method (PCM), an approach to specify privacy in requirements activities, was proposed to produce more complete and detailed privacy requirements. By considering PCM a promising approach to be used in ASD and the importance of empirical evaluation of new methods, we have as objectives: 1 evaluate the ability of PCM to support systems analysts in specifying privacy requirements when used in conjunction with some agile specification methods; and 2 show our lessons learned in conducting empirical research based on an mix-method approach defined to empirically evaluate the suitability of a requirements specification in specifying privacy requirements. Mixed-method approach is a controlled experiment as a quantitative evaluation and a feasibility study (questionnaire and task analysis based) study as a qualitative and quantitative evaluation. The requirements specifications following PCM allow to represent privacy aspects, such as user’s personal data and the privacy mechanism that can be used to mitigate a privacy risk scenario. We also observed that some extra time is necessary to specify privacy requirements with PCM, but it does not imply a greater perceived effort. Specifications produced with PCM are of good quality and more privacy detailed. Additionally, we attest to the importance of conducting empirical research to evaluate new methods. PCM assists in specifying more complete and detailed in relation to traditional techniques used in ASD, which facilitates communication between the requirements analysts and developers.








Similar content being viewed by others
Availability of data and material
More details about the materials produced, including questionnaires, can be found here: google/document.
References
AbdElazim K, Moawad R, Elfakharany E (2020) A framework for requirements prioritization process in Agile software development. J Phys Conf Ser 1454:012001. https://doi.org/10.1088/1742-6596/1454/1/012001
Alharbi S, Drew S (2014) Using the technology acceptance model in understanding academics’ behavioural intention to use learning management systems. Int J Adv Comput Sci Appl 5(1):143–155. https://doi.org/10.14569/IJACSA.2014.050120
Altman I (1975) The environment and social behavior: privacy, personal space, territory, and crowding. ERIC
Ambreen T, Ikram N, Usman M, Niazi M (2018) Empirical research in requirements engineering: trends and opportunities. Requirements Eng 23(1):63–95. https://doi.org/10.1007/s00766-016-0258-2
Antón AI, Earp JB (2001) Strategies for developing policies and requirements for secure and private electronic commerce. In: E-commerce security and privacy. Springer, Boston, pp 67–86. https://doi.org/10.1007/978-1-4615-1467-1_5
Assembly UG (1948) Universal declaration of human rights. UN General Assembly 302(2)
Ayala-Rivera V, Pasquale L (2018) The grace period has ended: an approach to operationalize GDPR requirements. In: 2018 IEEE 26th international requirements engineering conference (RE). IEEE, pp 136–146. https://doi.org/10.1109/RE.2018.00023
Ayed GB, Ghernaouti-Hélie S (2011) Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy. In: 2011 international conference for internet technology and secured transactions (ICITST). IEEE, pp 602–607. https://ieeexplore.ieee.org/abstract/document/6148406
Bartolini C, Daoudagh S, Lenzini G, Marchetti E (2019) GDPR-based user stories in the access control perspective. In: Quality of information and communications technology. Springer, Cham, pp 3–17. https://doi.org/10.1007/978-3-030-29238-6_1
Basso T, Montecchi L, Moraes R, Jino M, Bondavalli A (2015) Towards a UML profile for privacy-aware applications. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing, pp 371–378. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.53
Behutiye W, Karhapää P, Costal D, Oivo M, Franch X (2017) Non-functional requirements documentation in Agile software development: challenges and solution proposal. In: Product-focused software process improvement. Springer, Cham, pp 515–522. https://doi.org/10.1007/978-3-319-69926-4_41
Bijwe A, Mead N (2010) Adapting the square process for privacy requirements engineering. Software Engineering Institute. Carnegie Mellon University, technical report, CMU/SEI-2010-TN-022. Technical report. https://resources.sei.cmu.edu/asset_files/technicalnote/2010_004_001_15185.pdf
Bik N, Lucassen G, Brinkkemper S (2017) A reference method for user story requirements in Agile systems development. In: 2017 IEEE 25th international requirements engineering conference workshops (REW), pp 292–298. https://doi.org/10.1109/REW.2017.83
Brandeis L, Warren S (1890) The right to privacy. Harv Law Rev 4(5):193–220
Canedo ED, Bandeira IN, Calazans ATS, Costa PHT, Cançado ECR, Bonifácio R (2022) Privacy requirements elicitation: a systematic literature review and perception analysis of it practitioners. Requir Eng. https://doi.org/10.1007/s00766-022-00382-8
Carver J, Jaccheri L, Morasca S, Shull F (2003) Issues in using students in empirical studies in software engineering education. In: Proceedings. 5th international workshop on enterprise networking and computing in healthcare industry (IEEE Cat. No.03EX717), pp 239–249. https://doi.org/10.1109/METRIC.2003.1232471
Carver JC, Jaccheri L, Morasca S, Shull F (2010) A checklist for integrating student empirical studies with research and teaching goals. Empir Softw Eng 15(1):35–59. https://doi.org/10.1007/s10664-009-9109-9
Cavoukian A (2009) Privacy by design: the 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada 5. https://privacy.ucsc.edu/resources/privacy-by-design---foundational-principles.pdf
Cavoukian A (2012) Operationalizing privacy by design: a guide to implementing. Commun ACM 55(Issue 9):7. https://doi.org/10.1145/2330667.2330669
Chazette L, Schneider K (2020) Explainability as a non-functional requirement: challenges and recommendations. Requirements Eng 25(4):493–514. https://doi.org/10.1007/s00766-020-00333-1
Cohn M (2004) User stories applied: for Agile software development. Addison-Wesley Professional, Reading
Creswell JW (2002) Educational research: planning, conducting, and evaluating quantitative. Prentice Hall, Upper Saddle River, NJ
Creswell JW, Creswell JD (2017) Research design: qualitative, quantitative, and mixed methods approaches. Sage Publications, Thousand Oaks
Curcio K, Navarro T, Malucelli A, Reinehr S (2018) Requirements engineering: a systematic mapping study in agile software development. J Syst Softw 139:32–50. https://doi.org/10.1016/j.jss.2018.01.036
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340. https://doi.org/10.2307/249008
DeCew J (2018) Privacy. In: Zalta EN (ed) The Stanford encyclopedia of philosophy, spring 2018. Metaphysics Research Lab, Stanford University, Stanford
Deng M, Wuyts K, Scandariato R, Preneel B, Joosen W (2011) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16(1):3–32. https://doi.org/10.1007/s00766-010-0115-7
Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting empirical methods for software engineering research. In: Guide to advanced empirical SE. Springer, London, pp 285–311. https://doi.org/10.1007/978-1-84800-044-5_11
Falessi D, Juristo N, Wohlin C, Turhan B, Münch J, Jedlitschka A, Oivo M (2018) Empirical software engineering experts on the use of students and professionals in experiments. Empir Softw Eng 23(1):452–489. https://doi.org/10.1007/s10664-017-9523-3
Ferrari R, Miller JA, Madhavji NH (2010) A controlled experiment to assess the impact of system architectures on new system requirements. Requirements Eng 15(2):215–233. https://doi.org/10.1007/s00766-010-0099-3
Gharib M, Giorgini P, Mylopoulos J (2017) Towards an ontology for privacy requirements via a systematic literature review. In: Conceptual modeling. Springer, Cham, pp 193–208. https://doi.org/10.1007/978-3-319-69904-2_16
Gharib M, Mylopoulos J, Giorgini P (2020) COPri—a core ontology for privacy requirements engineering. In: International conference on research challenges in information science. Springer, Cham, pp 472–489. https://doi.org/10.1007/978-3-030-50316-1_28
Hadar I, Hasson T, Ayalon O, Toch E, Birnhack M, Sherman S, Balissa A (2018) Privacy by designers: software developers’ privacy mindset. Empir Softw Eng 23(1):259–289. https://doi.org/10.1007/s10664-017-9517-1
Hart SG, Staveland LE (1988) Development of NASA-TLX (Task Load Index): results of empirical and theoretical research. In: Human mental workload, advances in psychology, vol 52. North-Holland, pp 139–183. https://doi.org/10.1016/S0166-4115(08)62386-9
Heaps J, Krishnan R, Huang Y, Niu J, Sandhu R (2021) Access control policy generation from user stories using machine learning. In: Data and applications security and privacy XXXV. Springer, Cham, pp 171–188. https://doi.org/10.1007/978-3-030-81242-3_10
Höst M, Regnell B, Wohlin C (2000) Using students as subjects-a comparative study of students and professionals in lead-time impact assessment. Empir Softw Eng 5(3):201–214. https://doi.org/10.1023/A:1026586415054
ISO I (2011) IEEE. 29148: 2011-systems and software engineering-requirements engineering. Technical report
Izquierdo JLC, Salas J (2018) A uml profile for privacy enforcement. Software technologies: applications and foundations. Springer, Cham, pp 609–616
Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3):241–255. https://doi.org/10.1007/s00766-008-0067-3
Kalloniatis C, Kavakli E, Gritzalis S (2009) Methods for designing privacy aware information systems: a review. In: 2009 13th panhellenic conference on informatics. IEEE, pp 185–194. https://doi.org/10.1109/PCI.2009.45
Kasauli R, Liebel G, Knauss E, Gopakumar S, Kanagwa B (2017) Requirements engineering challenges in large-scale agile system development. In: 2017 IEEE 25th international requirements engineering conference (RE). IEEE, pp 352–361. https://doi.org/10.1109/RE.2017.60
Labda W, Mehandjiev N, Sampaio P (2014) Modeling of privacy-aware business processes in BPMN to protect personal data. In: Proceedings of the 29th annual ACM symposium on applied computing. Association for Computing Machinery, New York, NY, USA, SAC ’14, pp 1399–1405. https://doi.org/10.1145/2554850.2555014
Lucassen G, Dalpiaz F, Van der Werf J, Brinkkemper S (2016) The use and effectiveness of user stories in practice. In: Requirements engineering: foundation for software quality. Springer, Cham, pp 205–222. https://doi.org/10.1007/978-3-319-30282-9_14
Lucassen G, Dalpiaz F, Van der Werf JME, Brinkkemper S (2016) Improving agile requirements: the quality user story framework and tool. Requir Eng 21(3):383–403. https://doi.org/10.1007/s00766-016-0250-x
Lucassen G, Dalpiaz F, van der Werf J, Brinkkemper S (2017) Improving user story practice with the grimm method: a multiple case study in the software industry. In: Requirements engineering: foundation for software quality. Springer, Cham, pp 235–252. https://doi.org/10.1007/978-3-319-54045-0_18
Mai PX, Goknil A, Shar LK, Pastore F, Briand LC, Shaame S (2018) Modeling security and privacy requirements: a use case-driven approach. Inf Softw Technol 100:165–182. https://doi.org/10.1016/j.infsof.2018.04.007
Mouratidis H, Giorgini P, Manson G (2005) When security meets software engineering: a case of modelling secure information systems. Inf Syst 30(8):609–629. https://doi.org/10.1016/j.is.2004.06.002
Mouratidis H, Islam S, Kalloniatis C, Gritzalis S (2013) A framework to support selection of cloud providers based on security and privacy requirements. J Syst Softw 86(9):2276–2293. https://doi.org/10.1016/j.jss.2013.03.011
Nachar N (2008) The Mann–Whitney u: a test for assessing whether two independent samples come from the same distribution. Tutor Quant Methods Psychol 4(1):13–20. https://doi.org/10.20982/tqmp.04.1.p013
Nguyen M (2010) Empirical evaluation of a universal requirements engineering process maturity model
Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, California
Olsson T, Sentilles S, Papatheocharous E (2022) A systematic literature review of empirical research on quality requirements. Requir Eng 27:249–271. https://doi.org/10.1007/s00766-022-00373-9
Pachidi S (2009) Goal-oriented requirements engineering with KAOS. Utrecht University, Utrecht
Pullonen P, Matulevičius R, Bogdanov D (2017) PE-BPMN: privacy-enhanced business process model and notation. In: International conference on business process management. Springer, Cham, pp 40–56. https://doi.org/10.1007/978-3-319-65000-5_3
Rygge H, Jøsang A (2018) Threat poker: solving security and privacy threats in agile software development. In: Nordic conference on secure IT systems. Springer, pp 468–483
Salman I, Misirli AT, Juristo N (2015) Are students representatives of professionals in software engineering experiments? In: 2015 IEEE/ACM 37th IEEE international conference on software engineering, vol 1. IEEE, pp 666–676
Santos PO, de Carvalho MM (2022) Exploring the challenges and benefits for scaling agile project management to large projects: a review. Requir Eng 27:117–134. https://doi.org/10.1007/s00766-021-00363-3
Spafford EH, Antón AI (2007) The balance of privacy and security. In: Science and technology in society: from biotechnology to the internet
Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82. https://doi.org/10.1109/TSE.2008.88
Suleiman H, Svetinovic D (2013) Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using smart grid advanced metering infrastructure. Requir Eng 18(3):251–279. https://doi.org/10.1007/s00766-012-0153-4
Svahnberg M, Aurum A, Wohlin C (2008) Using students as subjects-an empirical evaluation. In: Proceedings of the second ACM-IEEE international symposium on Empirical software engineering and measurement, pp 288–290
Thomas K, Bandara AK, Price BA, Nuseibeh B (2014) Distilling privacy requirements for mobile applications. In: Proceedings of the 36th international conference on software engineering. Association for Computing Machinery, New York, NY, USA, ICSE 2014, pp 871–882. https://doi.org/10.1145/2568225.2568240
Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186–204
Viitaniemi M (2017) Privacy by design in agile software development. Master’s thesis, Tampere University of Technology
Vilela J, Castro J, Martins LEG, Gorschek T (2020) Safety practices in requirements engineering: the Uni-REPM safety module. IEEE Trans Softw Eng 46(3):222–250. https://doi.org/10.1109/TSE.2018.2846576
Villamizar H, Kalinowski M, Garcia A, Mendez D (2020) An efficient approach for reviewing security-related aspects in agile requirements specifications of web applications. Requir Eng 25(4):439–468. https://doi.org/10.1007/s00766-020-00338-w
Wagner S, Méndez-Fernández D, Kalinowski M, Felderer M (2018) Agile requirements engineering in practice: status quo and critical problems. CLEI Electron J 21(1):15. https://doi.org/10.19153/cleiej.21.1.6
Wagner S, Fernández DM, Felderer M, Vetrò A, Kalinowski M, Wieringa R, Pfahl D, Conte T, Christiansson MT, Greer D, Lassenius C, Männistö T, Nayebi M, Oivo M, Penzenstadler B, Prikladnicki R, Ruhe G, Schekelmann A, Sen S, Spínola R, Tuzcu A, De La Vara JL, Winkler D (2019) Status quo in requirements engineering: a theory and a global family of surveys. ACM Trans Softw Eng Methodol (TOSEM) 28(2):9. https://doi.org/10.1145/3306607
Westin AF, Ruebhausen OM (1967) Privacy and freedom, vol 1. Atheneum, New York
Wohlin C, Höst M, Henningsson K (2003) Empirical research methods in software engineering. In: Empirical methods and studies in software engineering. Springer, pp 7–23
Wohlin C, Runeson P, Höst M, Ohlsson MC, Regnell B, Wesslén A (2012) Experimentation in software engineering. Springer, Berlin. https://doi.org/10.1007/978-3-642-29044-2
Peixoto M, Silva C, Lima R, Ara ́ujo J, Gorschek T, Silva J (2019) PCM Tool: Privacy Requirements Specification in Agile Software Development. In: 10th Brazilian Software Conference: Theory and Practice (CBSoft’19), Extended Annals of the, SBC, Porto Alegre, RS, Brasil, pp 108–113. https://doi.org/10.5753/cbsoft_estendido.2019.7666
Peixoto MM, Silva C (2018) Specifying privacy requirements with goal-oriented modeling lanuages. In: Proceedings of the XXXII Brazilian Symposium on Software Engineering, Association for Computing Machinery, New York, NY, USA, SBES’18, pp 112–121. https://doi.org/10.1145/3266237.3266270
Peixoto M, Ferreira D, Cavalcanti M, Silva C, Vilela J, Araújo J, Gorschek T (2020) On undertanding how developers perceive and interpret privacy requirements research preview. In: Requirements Engineering: Foundation for Software Quality: 26th International Working Conference, REFSQ 2020, Pisa, Italy, March 24–27, 2020, Proceedings, Springer-Verlag, Berlin, Heidelberg, pp 116–123. https://doi.org/10.1007/978-3-030-44429-7_8
Medeiros J, Vasconcelos A, Silva C, Goulão M (2018) Quality of software requirements specification in agile projects: A cross-case analysis of six companies. J Syst Softw 142:171–194. https://doi.org/10.1016/j.jss.2018.04.064
Zhang L, Tian JH, Jiang J, Liu YJ, Pu MY, Yue T (2018) Empirical research in software engineering—a literature survey. J Comput Sci Technol 33:876–899. https://doi.org/10.1007/s11390-018-1864-x
Acknowledgements
The authors would like to thank the study participants.
Funding
Part of this study was funded by the Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - Brasil (CAPES) (Finance Code 001) and the KKS foundation Profile Project ReThought.se. It was also supported by NOVA LINCS Research Laboratory (Ref. UID/CEC/04516/2019).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Code availability
Not applicable.
Ethics approval
Ethical considerations need to be addressed when research involves humans. Therefore, when the studies were scheduled, the participants were informed of the research objectives. In addition, the participants were informed that their identities would be kept confidential. Also they answered a informed consent document. Students in the experiment participated voluntarily. Students in the feasibility study received a partial grade. However, the partial grade had not enough weight in the student’s total grade, if he did not perform the specification satisfactorily.
Consent to participate
Study participants agreed through informed consent.
Consent for publication
Study participants agreed through informed consent.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
1.1 Appendix A: task of both studies
Students were asked to complete the task below.
Scenario
Virtual Movie Rental System The video store Imperial is undergoing a restructuring, that is, it will become a virtual movie rental company. Therefore, they need an information system to support the rental of movies. For their activities to be supported, it is necessary to control information about movies and customers. In addition, consultation facilities must be provided to the virtual collection of the rental company, allowing consultations for various information about the movies.
Imperial also decided to include some new features in the system. They are: Customized customer registration; Registration and monitoring of rental habits; Promotion presentation according to rental habits; and Sale of rental habits to third parties.
The system specification process has started, and the features in bold have already been specified:
-
1. Control of movie information
-
a. Record movies.
-
-
2. Control of customer information
-
a. Register customer;
-
b. Monitor rental habits;
-
c. Present promotion according to rental habits;
-
d. Selling rental habits to third parties.
-
-
3.Movie consultation
-
a. Presentation of the catalog of movies and releases, with respective prices.
-
-
4. Movie rental
-
a. Information for rental availability;
-
b. Devolution;
-
c. Register rent.
-
Below is further detail of each feature.
1. Control of movie information(Specification already made)
The system should allow making all movies available in the following formats: High Definition (HD) or Standard Definition (SD). The movies are also classified in the following genres: action, animation, adventure, comedy, documentary, drama, fiction, war, musical, police, romance, suspense, and terror. Also, the rental company distinguishes between movies in the catalog and release.
One wants to know about a movie: original title, country, year, direction, cast, synopsis, trailer, duration, IMDB rating, format, and genre.
2. Control of customer information (Specification not made)
a. Register customer (Specification not made)
To perform the registration, it is necessary to request the following registration information: name *, password *, e-mail *, address (name, number, neighborhood, city and zip code), education level *, workplace, telephone (cell phone and home), gender *, date of birth *, personal ID.
- Note 1: * Mandatory information.
- Note 2: The customer must be over 18 years old.
- Note 3: The customer must have the autonomy to delete the registration in the system at any time.
- Note 4: The data of customers who choose to delete the registration must be completely removed from the system.
- Note 5: It is necessary to inform the intention and ask for consent to monitor rental habits.
- Note 6: It is necessary for the customer to authorize the monitoring of rental habits according to the registration information (Personal ID).
- Note 7: It is necessary for the customer to authorize the sending of promotions according to rental habits and registration information (Personal ID).
- Note 8: It is necessary to inform the intention and ask for consent for the sale of rental habits.
- Note 9: It is necessary for the customer to authorize the sale of rental habits according to the registration information (Personal ID).
- Note 10: It is necessary for the system to provide security via one notification that personal information is being kept private.
b. Monitor rental habits (Specification not made)
In order to monitor rental habits, the system should allow making the following relationships:
-
1.
Personal ID: Informational report on the number of rented items by movie genre.
-
2.
Gender: Informative report on the number of rented items by movie genre.
-
3.
Age: Information report on the number of rented items by movie genre.
-
4.
Degree of instruction: Informative report on the number of items rented by movie genre.
- Note 9: It is necessary for the customer to be aware and present consent for the monitoring of rental habits (That is, note 5 must be satisfied).
- Note 11: It is necessary for the customer to authorize the monitoring of rental habits according to the Personal ID (That is, note 6 must be satisfied).
c. Present promotion according to rental habits (Specification not made)
The discount must occur according to: For every 5 items of the same genre of the movie: 15
The system must still send an automatic email with promotions to customers according to: Personal ID.
- Note 12: Promotions must be sent by email to customers who have authorized the sending of promotions (i.e., Note 7 must be satisfied).
d. Selling rental habits to third parties (Specification not made)
The sale of information to third parties will take place as follows:
1. Personal ID: Information report on the number of rented items by movie genre.
2. Gender: Informative report on the number of rented items by movie genre.
3. Age: Information report on the number of rented items by movie genre.
4. Education level: Information report on the number of leased items by gender.
- Note 13: The sale of shopping habits to third parties must occur to customers who have consented (That is, note 8 must be satisfied).
- Note 14: The sale of purchasing habits, according to the CPF, to third parties must take place for customers who have authorized (That is, note 9 must be satisfied).
- Note 15: Customers must be aware of the names of the third parties to whom their data is being sold (send information by e-mail).
3. Movie consultation (Specification already made)
The system should allow users to access the list of movies and releases, according to: original title, title in Portuguese, country of origin, year, direction, cast, synopsis, trailer, duration, IMDB rating format, genre, and price.
- Note 16: The user must be logged into the system with an access control system.
4. Movie rental (Specification partially made)
a. Information for rental availability (Specification already made)
The system should allow the renting of movies. The default rental values are given by the type of media being rented. Currently, the following amounts are charged: SD (5.00), HD (7.50), and launches have an increase of 50
b. Devolution (Specification already made)
The return of the rented movie must occur automatically, that is, the system must end the presentation of the rent. The deadline for return is one day for releases and three days for movies in the catalog.
c. Register rent (Specification not made)
To register the rent, it is necessary to register each item rented by title and associate them with the client’s personal ID.
- Note 16: The user must be logged into the system with an access control system.
- Note 17: It is necessary for the customer to authorize the registration of each rental item according to the personal ID.
Group 1 Task. Please carry out the specification of system requirements that have not yet been specified. Use User Story, Acceptance Criteria and Privacy Criteria to make the specification. Use the following formatting for User Story (US), Acceptance Criteria (CA) and Privacy Criteria (PC):
[US01] As a type of user, I want role, so<some reason/benefit
[CA01-01]
[CA01-02]
[CA01-03
.....
[PC-01]
Group 2 Task. Please carry out the specification of system requirements that have not yet been specified. Use User Story, Acceptance Criteria and Privacy Criteria to make the specification. Use the following formatting for User Story (US) and Acceptance Criteria (CA):
[US01] As a type of user, I want role, so<some reason/benefit
[CA01-01]
[CA01-02]
[CA01-03]
.....
[PC-01]
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Peixoto, M., Silva, C., Araújo, J. et al. Evaluating a privacy requirements specification method by using a mixed-method approach: results and lessons learned. Requirements Eng 28, 229–255 (2023). https://doi.org/10.1007/s00766-022-00388-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00766-022-00388-2