A Gamified Tutorial for Learning About Security Requirements Engineering

Thanks to the advent of interactive technologies, education institutions are looking for innovative teaching methods to increase the engagement and reach of students. Besides the uprise of MOOCs, gamification has been shown to produce positive results when it comes to increasing people's engagement and interest in conducting tasks. Unfortunately, the application and benefits of these technologies in teaching requirements engineering remain largely unexplored. In this paper we introduce the STS-Tooltorial, an interactive gamified platform that executes within a security requirements modeling tool and helps learners apprehend the STS-ml language and basic notions about security requirements. We present the design principles of our functional prototype: its educational content and the embedded game elements. Furthermore, we report on an early evaluation with IT professionals and postgraduate information science students focused on the platform's effectiveness and usability.

[1]  Peng Liang,et al.  Experiences of using role playing andwiki in requirements engineering course projects , 2010, 2010 5th International Workshop on Requirements Engineering Education and Training.

[2]  Galia Angelova,et al.  Gamification in Education: A Systematic Mapping Study , 2015, J. Educ. Technol. Soc..

[3]  E. Deci,et al.  Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.

[4]  Xavier Franch,et al.  iStar 2.0 Language Guide , 2016, ArXiv.

[5]  Yu-kai Chou,et al.  Actionable Gamification: Beyond Points, Badges, and Leaderboards , 2015 .

[6]  Premkumar T. Devanbu,et al.  Software engineering for security: a roadmap , 2000, ICSE '00.

[7]  Pierluigi Roberti,et al.  STS-tool: Socio-technical Security Requirements through social commitments , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).

[8]  I. Ajzen The theory of planned behavior , 1991 .

[9]  Klaus Pohl,et al.  Requirements Engineering - Fundamentals, Principles, and Techniques , 2010 .

[10]  Ljerka Beus-Dukic Final year project: A test case for requirements engineering skills , 2011, 2011 6th International Workshop on Requirements Engineering Education and Training.

[11]  Gary McGraw,et al.  Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.

[12]  G. Boulton‐Lewis Teaching for quality learning at university , 2008 .

[13]  Mario Piattini,et al.  Quality in conceptual modeling: five examples of the state of the art , 2005, Data Knowl. Eng..

[14]  David A. Basin,et al.  Automated analysis of security-design models , 2009, Inf. Softw. Technol..

[15]  John W. Rice,et al.  The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education , 2012, Int. J. Gaming Comput. Mediat. Simulations.

[16]  Monique Snoeck,et al.  Assessing the effectiveness of feedback enabled simulation in teaching conceptual modeling , 2014, Comput. Educ..

[17]  Michelle K. Smith,et al.  Active learning increases student performance in science, engineering, and mathematics , 2014, Proceedings of the National Academy of Sciences.

[18]  Siobhan O'Donovan,et al.  A case study in the gamification of a university-level games development course , 2013, SAICSIT '13.

[19]  Andrew J. Martin,et al.  Long and short measures of flow: the construct validity of the FSS-2, DFS-2, and new brief counterparts. , 2008, Journal of sport & exercise psychology.

[20]  E. Deci,et al.  Self-determination theory and the facilitation of intrinsic motivation , 2000 .

[21]  Rüdiger Weißbach,et al.  ImProject: Improving RE Trainings by Combining them with Improvisation Theatre Sessions A Research Proposal , 2014, REET.

[22]  Haralambos Mouratidis,et al.  Guest editorial: security requirements engineering: past, present and future , 2009, Requirements Engineering.

[23]  Paolo Giorgini,et al.  Modelling and reasoning about security requirements in socio-technical systems , 2015, Data Knowl. Eng..

[24]  Vero Vanden Abeele,et al.  Gradequest - Evaluating the impact of using game design techniques in an undergraduate course , 2014, FDG.

[25]  Yair Wand,et al.  Theoretical foundations for conceptual modelling in information systems development , 1995, Decis. Support Syst..

[26]  Daniela E. Damian,et al.  Instructional design and assessment strategies for teaching global software development: a framework , 2006, ICSE.

[27]  Tovi Grossman,et al.  ToolClips: an investigation of contextual video assistance for functionality understanding , 2010, CHI.

[28]  Michael J. Hannafin,et al.  Empirically-based guidelines for the design of interactive multimedia , 1993 .

[29]  Didar Zowghi,et al.  Teaching requirements engineering through role playing: lessons learnt , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[30]  Nancy R. Mead,et al.  Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.

[31]  Luisa Mich Teaching Requirements Analysis: A Student Project Framework to Bridge the Gap between Business Analysis and Software Engineering , 2014, REET.

[32]  Ben Shneiderman,et al.  Show Me! Guidelines for producing recorded demonstrations , 2005, 2005 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC'05).

[33]  Paolo Giorgini,et al.  Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .

[34]  Sebastian Deterding,et al.  Eudaimonic Design, or: Six Invitations to Rethink Gamification , 2014 .

[35]  John M. Carroll,et al.  Principles and Heuristics for Designing Minimalist Instruction , 1998 .