Social Threats and the New Challenges for Requirements Engineering - - PowerPoint PPT Presentation

social threats and the new challenges for requirements
SMART_READER_LITE
LIVE PREVIEW

Social Threats and the New Challenges for Requirements Engineering - - PowerPoint PPT Presentation

Social Threats and the New Challenges for Requirements Engineering Fabiano Dalpiaz University of Trento, Italy RESC workshop August 29th, 2011 Outline Social computing: a viewpoint The new wave of social threats New challenges


slide-1
SLIDE 1

Social Threats and the New Challenges for Requirements Engineering

Fabiano Dalpiaz University of Trento, Italy

RESC workshop – August 29th, 2011

slide-2
SLIDE 2
  • F. Dalpiaz

2

Outline

Social computing: a viewpoint

The new wave of social threats

New challenges for Requirements Engineering

slide-3
SLIDE 3
  • F. Dalpiaz

3

Social computing: a viewpoint

slide-4
SLIDE 4
  • F. Dalpiaz

4

The social layer

Computing heavily relies on technical layers

– To simplify the engineering of complex computing artefacts – e.g. network stacks, architectures

People use computing artefacts to interact with other people

– A social layer virtually exists on top of technical layers! – However, such layer is not part of current computing paradigms

slide-5
SLIDE 5
  • F. Dalpiaz

5

The social layer exemplified

Jim places a bid in an eBay auction

Jim's PC eBay server HTTP request/ response Auctioneer's PC HTTP request/ response Auctioneer Jim I will pay 10€ for the book you are selling on eBay (auction ID xyz) Technical layer Social layer

slide-6
SLIDE 6
  • F. Dalpiaz

6

Social computing

We understand social computing as a computing paradigm founded upon the social layer

Social computing is conceived in terms of social primitives

– Roles, agents, and commitments – Trust and reputation – Identity

Example: Agent Jim playing role buyer takes the commitment to sell a book by Mark, playing seller, only if Jim trusts Mark and has proofs of the authenticity of the seller's website

slide-7
SLIDE 7
  • F. Dalpiaz

7

The new wave of social threats

slide-8
SLIDE 8
  • F. Dalpiaz

8

Social threats

Technical threats affect technical layers

– By exploiting vulnerabilities: DDoS, virus & worms, etc.

On the other hand, social threats

– Affect social relationships and artefacts – Are enacted via social mechanisms

Many social threats are not new, but they will become of utmost importance with the advent of social computing!

slide-9
SLIDE 9
  • F. Dalpiaz

9

Social threats (1)

Name Affects Example

  • T1. Fake reporting

Reputation Jim rates Mike as a bad seller even if Mike has delivered the goods on time

  • T2. Decreasing

reputation Reputation Jim is waiting for some service to be delivered by Mike; however, Mike's reputation is becoming lower and lower

  • T3. Lack of trust

Interaction Mike offers a service to the general public. Jim decides to take such service; however, since Mike does not trust Jim, he does not want to interact with Jim

slide-10
SLIDE 10
  • F. Dalpiaz

10

Social threats (2)

Name Affects Example

  • T4. Untrusted

delegation Trust Jim delegates some service to Mike; Mike delegates such service to Laura. Jim does not trust Laura

  • T5. Dissolved

redundancy Reliability Jim relies on Mike and Tony for the redundant delivery of a service. Both Mike and Tony delegate the task to Laura.

  • T6. Incompatible laws

Compliance Mike deploys a service that complies with privacy laws. However, stricter laws are introduced and, now, the service is not compliant anymore

slide-11
SLIDE 11
  • F. Dalpiaz

11

New challenges for RE

slide-12
SLIDE 12
  • F. Dalpiaz

12

New challenges for RE

Requirements Engineering (RE) is about eliciting, analysing, and specifying requirements for (software) artefacts

Which are the artefacts these threats introduce?

– Engineering requirements for these artefacts will be the challenge! – These challenges are not only for RE, but also for later stages in

Software Engineering

slide-13
SLIDE 13
  • F. Dalpiaz

13

Challenges for RE (1)

Challenge Addressed threats Description Trustworthiness management systems T1, T2 Robust mechanisms to compute trustworthiness of actors based on

  • pinions by peers, compliance, certificates.

Service interface specification and monitoring T4, T5 Represent the commitments the provider makes to the consumer while ensuring flexible negotiation, access control policies, accountability, compensation rules

slide-14
SLIDE 14
  • F. Dalpiaz

14

Challenges for RE (2)

Challenge Addressed threats Description Adaptation mechanisms T2, T5 Logically distributed adaptation, from the perspective of a single agent; social threats trigger adaptation; incremental planning to deal with volatility Early warning and response mechanisms T2 Enable software to prevent bad events (e.g. via risk assessment) and switch to a different configuration

slide-15
SLIDE 15
  • F. Dalpiaz

15

Challenges for RE (3)

Challenge Addressed threats Description Law representation and compliance T6 Software shall be able to understand and check compliance with laws (e.g. data confidentiality restrictions). Also, enforcement is a hot topic Identity management systems T1, T3 Develop robust identity management systems so unequivocally bind software systems to an accoutable legal entity

slide-16
SLIDE 16
  • F. Dalpiaz

16

Conclusions

Social computing is centred around the social layer

– The social layer captures the business meaning of computing

Social threats will be pervasive

– We presented/reviewed some of them

These threats originate new challenges for RE

– Resulting in new artefacts to design

slide-17
SLIDE 17
  • F. Dalpiaz

17

Thank you! dalpiaz@disi.unitn.it Thanks to John Mylopoulos, Paolo Giorgini, Amit K. Chopra, and Raian Ali for the useful discussions

This research is sponsored by the European Community's Seventh Framework Program under grant agreement no. 257930