ABSTRACT
Information systems designers have been increasingly convinced about the importance of dealing with quality issues at early stages of development. Over the landscape of quality issues, several proposals have been published as to help with respect to security. On the other hand, designers do also need to care about other quality issues; for instance, transparency. Transparency is the quality of having open information to the public. At first, the general intuition is that security and transparency conflict, but how should designers deal with these antagonistic issues? Departing from the use of the Non-Functional Requirements Framework we propose a process, based on Personal Construct Theory, to perform early analysis of antagonistic design issues. Having early analysis of antagonistic quality issues makes it possible for informed decision to be taken early on during IS design. We use the election domain to illustrate the application of our proposal.
- Holzner B., Holzner L., Transparency in Global Change: The Vanguard of the Open Society. University of Pittsburgh Press; 1 edition (2006).Google Scholar
- Henriques A., Corporate Truth The Limits to Transparency, EARTHSCAN, UK (2007).Google Scholar
- European Union - Data Protection, http://ec.europa.eu/justice_home/fsj/privacy/index_en.htm (2007).Google Scholar
- Brazilian Law N° 9.507, 12 th, November 1997, http://www.planalto.gov.br/ccivil/Leis/L9507.htm (2007).Google Scholar
- United States Department of Justice, http://www.usdoj.gov/oip/index.htmlGoogle Scholar
- Cappelli, C., Oliveira, A. P., Leite, J. C. S. P, Exploring Business Process Transparency Concepts, RE 2007, IEEE Computer Society Press, pp. 389--390 (2007).Google Scholar
- Bishop, M. Wagner, D., Risks of e-voting. Communications of ACM 50, 11, 120--120, http://doi.acm.org/10.1145/1297797.1297827 (2007). Google ScholarDigital Library
- Camp L. J., Varieties of Software and their Implications for Effective Democratic Government. Proceedings of the British Academy, Vol. 135, pp. 183--185, 2006.Google Scholar
- Matulevicius, R.; Mayer, N.; Mouratidis, H.;, Dubois, E.;, Heymans, P.; Genon, N. Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. CAiSE 2008: 541--555 Google ScholarDigital Library
- Liu, L.; Yu. E.; Mylopoulos, J. Security and Privacy Requirements Analysis within a Social Setting. Proceedings of the International Conference on Requirements Engineering (RE'03). Monterey, California, September 2003. Pags. 151--161. Google ScholarDigital Library
- R Prieto-Diaz, Requirements Engineering in the Information Assurance Domain: The Common Criteria Evaluation Process. In Perspectives on Software Requirements, 2004 - pages 139--168 Kluwer Academic PublishersGoogle ScholarCross Ref
- Devanbu, P.; Stubblebine, S. Software Engineering for Security: a Roadmap. The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering - ICSE 2000, (2000). Google ScholarDigital Library
- CERT, http://www.cert.org/stats/cert_stats.html, (2007).Google Scholar
- Cunha, H.; "Uso de estratégias orientadas a metas para modelagem de requisitos de segurança", Dissertação (Mestrado em Informática) - Departamento de Informática Pontifícia Universidade Católica do Rio de Janeiro, Rio de Janeiro - 2007 - 145 f.Google Scholar
- Cysneiros, L. M.; Leite, J. C. S. P., Nonfunctional Requirements: From Elicitation to Conceptual Models. IEEE Trans. Software Eng. 30(5): 328--350 (2004). Google ScholarDigital Library
- Barry Boehm, Hoh In, "Identifying Quality-Requirement Conflicts" IEEE Software, vol. 13, no. 2, pp. 25--35, Mar., 1996. Google ScholarDigital Library
- Chung, L.; Nixon, B.; Yu, E.; Mylopoulos, J. Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers. Boston/Dordrecht/London. 2000Google Scholar
- Kelly, G. A., The Psychology of Personal Constructs. New York: Norton, 1955.Google Scholar
- González-Baixauli, B., Laguna, M., Leite, J. C. S. P.: "Aplicación de la Teoría de Constructos Personales a la Elicitación de Requisitos" Revista IEEE América Latina Vol. 3(1), 2005. Avail. at http://www.ewh.ieee.org/reg/9/etrans/Google Scholar
- Ford, K. M., Petry, F. E., Adams-Webber, J. R., and Chang, P. J.: "An Approach to Knowledge Acquisition Based on the Structure of Personal Construct Systems," IEEE Trans. Knowledge and Data Eng., 3(1), pp. 78--88. 1991. Google ScholarDigital Library
- Gonzalez-Baixauli, B.; Leite, J. C. S. P.; Laguna, M. A., "Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory," Requirements Engineering, 14th IEEE International Conference, vol., no., pp. 347--348, 11--15 Sept. 2006 Google ScholarDigital Library
- Giorgini, P., Mylopoulos, J., Nicchiarelli, E., and Sebastiani, R., "Reasoning with Goal Models," In: 21st Intl. Conference on Conceptual Modeling (ER 02), pp. 167--181. Google ScholarDigital Library
- Leite, J. C. S. P.; Yu, Y.; Liu, L.; Yu, E.; Mylopoulos, J., Quality-Based Software Reuse. CAiSE 2005: 535--550 Google ScholarDigital Library
- Mussbacher, G.; Whittle, J.; Amyot, D., Semantic-Based Interaction Detection in Aspect-Oriented Scenarios. 17th IEEE Requirements Engineering Conference, IEEE Computer Society Press, pp. 203--212, 2009. Google ScholarDigital Library
Index Terms
- Transparency versus security: early analysis of antagonistic requirements
Recommendations
iStar Goal Model to Z Formal Model Translation and Model Checking of CBTC Moving Block Interlocking System
The reliability and safety of complex software systems are provided by extracting safety requirements from regulations and operational environments and later specifying these requirements precisely. At the early stage, these extracted safety requirements ...
Transparency and Accountability After 2015: e-Parliament for Citizens' Engagement in the Ghanaian Environment
ICEGOV '15-16: Proceedings of the 9th International Conference on Theory and Practice of Electronic GovernanceBeyond providing information, Information and Communication Technology (ICT) really contributes to citizens' participation to public debate. With the use of ICT, Civil societies have played a big role especially in the areas of training, research, ...
Using internet to promote the transparency and fight corruption: Latin American transparency portals
ICEGOV '10: Proceedings of the 4th International Conference on Theory and Practice of Electronic GovernanceThe right to social control of the government refers to the monitoring of the formulation of policies and initiatives of government by citizens and their social organizations. This category of rights creates conditions for the establishment of relations ...
Comments