Uncovering Patterns of Users' Ethical Concerns about Software
Ethical concerns about software applications, e.g., worries about privacy breaches, user manipulation, and discrimination, have gained prominence recently. Research shows that users voice these concerns in app reviews and that they can be detected using machine learning and deep learning techniques. These techniques usually operate as black-boxes, making it difficult to understand the context of users’ ethical concerns. We address this issue by presenting a transparent approach that uses pattern mining and graph theory to yield additional context to the ethical concern classifications made by machine learning algorithms. We compare a simple frequent pattern mining and a high-utility mining algorithm and assess the resulting rules through commonly used metrics. Finally, we visualize and interpret preliminary results in an interactive graph. We mined 3,101 reviews of ten popular apps mentioning diverse ethical concerns and present the results for two apps in detail. Our results show that pattern mining algorithms and graph visualizations are promising directions for detecting contextual information of ethical concerns about software. This work is a step toward ensuring that ethical concerns are methodically thought through and integrated into the software development life cycle.
Wed 26 JunDisplayed time zone: (UTC) Coordinated Universal Time change
15:45 - 17:45 | Responsible RequirementsRE@Next! Papers / Research Papers at V201 Chair(s): Jacek Dąbrowski Lero - the Science Foundation Ireland Research Centre for Software | ||
15:45 30mPaper | A Vision to Enhance Trust Requirements for Peer Support Systems by Revisiting Trust Theories RE@Next! Papers File Attached | ||
16:15 30mPaper | Uncovering Patterns of Users' Ethical Concerns about Software RE@Next! Papers Özge Karaçam Vrije Universiteit Amsterdam, Tom P Humbert Vrije Universiteit Amsterdam, Emitzá Guzmán Vrije Universiteit Amsterdam Pre-print | ||
16:45 30mPaper | How do practitioners reason about security requirements? An interview study Research Papers Pre-print |