This program is tentative and subject to change.

Wed 26 Jun 2024 16:15 - 16:45 at M101 - Responsible Requirements Chair(s): Jacek Dąbrowski

Ethical concerns about software applications, e.g., worries about privacy breaches, user manipulation, and discrimination, have gained prominence recently. Research shows that users voice these concerns in app reviews and that they can be detected using machine learning and deep learning techniques. These techniques usually operate as black-boxes, making it difficult to understand the context of users’ ethical concerns. We address this issue by presenting a transparent approach that uses pattern mining and graph theory to yield additional context to the ethical concern classifications made by machine learning algorithms. We compare a simple frequent pattern mining and a high-utility mining algorithm and assess the resulting rules through commonly used metrics. Finally, we visualize and interpret preliminary results in an interactive graph. We mined 3,101 reviews of ten popular apps mentioning diverse ethical concerns and present the results for two apps in detail. Our results show that pattern mining algorithms and graph visualizations are promising directions for detecting contextual information of ethical concerns about software. This work is a step toward ensuring that ethical concerns are methodically thought through and integrated into the software development life cycle.

This program is tentative and subject to change.

Wed 26 Jun

Displayed time zone: (UTC) Coordinated Universal Time change

15:45 - 17:45
Responsible RequirementsRE@Next! Papers / Research Papers at M101
Chair(s): Jacek Dąbrowski Lero - the Science Foundation Ireland Research Centre for Software
15:45
30m
Paper
Revisiting Trust Theories to Enhance Trust Requirements for Peer Support Systems
RE@Next! Papers
Yasaman Gheidar , Lysanne Lessard University of Ottawa, Yao Yao
File Attached
16:15
30m
Paper
Uncovering Patterns of Users' Ethical Concerns about Software
RE@Next! Papers
Özge Karaçam Vrije Universiteit Amsterdam, Tom Humbert Vrije Universiteit Amsterdam, Emitzá Guzmán Vrije Universiteit Amsterdam
Pre-print
16:45
30m
Paper
How do practitioners reason about security requirements? An interview study
Research Papers
Luciana Provenzano Mälardalen University, Robbert Jongeling Mälardalen University
Pre-print