Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Stakeholder Inclusion and Value Diversity: An Evaluation Using an Access Control System

  • Conference paper
  • First Online:
Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium (ECSA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14590))

Included in the following conference series:

  • 230 Accesses

Abstract

Software systems bring great benefits to people’s lives. Nevertheless, they can cause issues in terms of social and ethical implications toward individuals and society, and compromise their ethical values. Therefore, it is crucial to consider all potentially-concerned stakeholders during the system design process, as they are the primary source of value and requirements identification. In this study, we aim to evaluate the effect that two ethics-driven instruments we have created (i.e., a stakeholder map and a value model) may have on supporting ethical considerations (such as stakeholder and ethical value), using the case of an Access Control System. The paper presents the insights gained from this evaluation, performed as a retrospective study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    In the stakeholder map, solid circles represent stakeholders identified before introducing the instruments, while dotted circles correspond to those identified after the introduction.

  2. 2.

    In the value model, solid circles depict values identified before introducing instruments, while dotted circles represent them after the introduction.

  3. 3.

    Appendix A is available in the GitHub repository https://github.com/S2-group/ECSA23-SIVD-rep-pkg.git.

  4. 4.

    To enhance readability, ethical concerns identified in part 1 are presented in Table 2, while those identified in part 2 are summarized in Table 3.

References

  1. Alidoosti, R., Lago, P., Poort, E., Razavian, M.: Ethics-aware decidarch game: Designing a game to reflect on ethical considerations in software architecture design decision making. In: 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), pp. 96–100. IEEE (2023)

    Google Scholar 

  2. Alidoosti, R., Lago, P., Razavian, M., Tang, A.: Ethics in software engineering: a systematic literature review. Technical report, Vrije Universiteit Amsterdam (2022). https://tinyurl.com/39crpyn2

  3. Bittner, K., Spence, I.: Establishing the Vision for Use Case Modeling, Use Case Modeling. Addison Wesley Professional, Reading (2003)

    Google Scholar 

  4. De Sanctis, M., Di Salle, A., Iovino, L., Rossi, M.T.: A technology transfer journey to a model-driven access control system. Int. J. Softw. Tools Technol. Transf. 1–26 (2023)

    Google Scholar 

  5. Friese, S.: Qualitative Data Analysis with ATLAS.ti. Sage, Thousand Oaks (2019)

    Google Scholar 

  6. Leong, B.: Facial recognition and the future of privacy: I always feel like... somebody’s watching me. Bull. Atomic Sci. 75(3), 109–115 (2019)

    Google Scholar 

  7. Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: An Expanded Sourcebook. Sage, Thousand Oaks(1994)

    Google Scholar 

  8. Moreno, M.V., Hernández, J.L., Skarmeta, A.F.: A new location-aware authorization mechanism for indoor environments. In: International Conference on Advanced Information Networking and Applications Workshops, pp. 791–796. IEEE (2014)

    Google Scholar 

  9. Neudecker, T., Hayrapetyan, A., Degitz, A., Andelfinger, P.: Consideration of values in the design of access control systems. In: Informatik 2016 (2016)

    Google Scholar 

  10. Robson, C.: Small-Scale Evaluation: Principles and Practice. Sage, Thousand Oaks (2017)

    Google Scholar 

  11. Schwartz, S.H.: Universals in the content and structure of values: theoretical advances and empirical tests in 20 countries. In: Advances in Experimental Social Psychology, vol. 25, pp. 1–65. Elsevier, Amsterdam (1992)

    Google Scholar 

  12. Schwartz, S.H.: Basic human values: theory, measurement, and applications. Rev. Fr. Sociol. 47(4), 929 (2007)

    Article  Google Scholar 

  13. Schwartz, S.H.: An overview of the schwartz theory of basic values. Online readings in Psychology and Culture 2(1), 2307–0919 (2012)

    Article  Google Scholar 

  14. Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: Security policy enforcement for networked smart objects. Comput. Netw. 108, 133–147 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

We would like to thank the ACS designers for their contribution to enhancing our understanding of the system from an ethical standpoint. Also, we thank the gym members for their valuable feedback. The work has been partially supported by ARS01_00540 - RASTA project, funded by the Italian Ministry of Research PNR 2015–2020. The authors De Sanctis and Iovino acknowledge the support of the MUR (Italy) Department of Excellence 2023–2027 for GSSI.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Razieh Alidoosti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alidoosti, R., De Sanctis, M., Iovino, L., Lago, P., Razavian, M. (2024). Stakeholder Inclusion and Value Diversity: An Evaluation Using an Access Control System. In: Tekinerdoğan, B., Spalazzese, R., Sözer, H., Bonfanti, S., Weyns, D. (eds) Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium. ECSA 2023. Lecture Notes in Computer Science, vol 14590. Springer, Cham. https://doi.org/10.1007/978-3-031-66326-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-66326-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-66325-3

  • Online ISBN: 978-3-031-66326-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics