Ze Shi Li's research while affiliated with University of Victoria and other places

Publications (14)

Preprint
Privacy requirements are increasingly growing in importance as new privacy regulations are enacted. To adequately manage privacy requirements, organizations not only need to comply with privacy regulations, but also consider user privacy concerns. In this exploratory study, we used Reddit as a source to understand users' privacy concerns regarding...
Article
Context Complying with privacy regulations has taken on new importance with the introduction of the EU’s General Data Protection Regulation (GDPR) and other privacy regulations. Privacy measures are becoming a paramount requirement demanding software organizations’ attention as recent privacy breaches such as the Capital One data breach affected mi...
Chapter
Smart cities represent the epitome of utilizing data sourced from sensors and devices in a city to make informed decisions. Facilitating the massive breadth of data are millions and billions of “smart” devices interconnected through high-speed telecommunication networks, so naturally software organizations began specializing in various parts of the...
Article
Non-functional requirements (NFR), which include performance, availability, and maintainability, are vitally important to overall software quality. However, research has shown NFRs are, in practice, poorly defined and difficult to verify. Continuous software engineering practices, which extend agile practices, emphasize fast paced, automated, and r...
Preprint
Non-functional requirements (NFR), which include performance, availability, and maintainability, are vitally important to overall software quality. However, research has shown NFRs are, in practice, poorly defined and difficult to verify. Continuous software engineering practices, which extend agile practices, emphasize fast paced, automated, and r...
Article
In 2006, Fowler and Foemmel defined ten core Continuous Integration (CI) practices that could increase the speed of software development feedback cycles and improve software quality. Since then, these practices have been widely adopted by industry and subsequent research has shown they improve software quality. However, there is poor understanding...
Preprint
In 2006, Fowler and Foemmel defined ten core Continuous Integration (CI) practices that could increase the speed of software development feedback cycles and improve software quality. Since then, these practices have been widely adopted by industry and subsequent research has shown they improve software quality. However, there is poor understanding...
Chapter
This chapter assesses whether the short-term benefits of using digital technology to suppress the Covid-19 pandemic justify the detrimental long-term consequences for privacy. It addresses this complex question through an inevitably incomplete discussion of privacy data protection laws, technology design, and trust in governments and technology pro...
Preprint
Building shared understanding of requirements is key to ensuring downstream software activities are efficient and effective. However, in continuous software engineering (CSE) some lack of shared understanding is an expected, and essential, part of a rapid feedback learning cycle. At the same time, there is a key trade-off with avoidable costs, such...
Preprint
The enactment of the General Data Protection Regulation (GDPR) in 2018 forced any organization that collects and/or processes EU-based personal data to comply with stringent privacy regulations. Software organizations have struggled to achieve GDPR compliance both before and after the GDPR deadline. While some studies have relied on surveys or inte...
Article
Given the connection between the state of a customer's happiness, or lack thereof, and whether a support ticket is escalated, utilizing emotional awareness with respect to support ticket escalations could enhance a software organization's support performance to help ensure customers are satisfied. We describe an approach that 1.) analyzes and monit...

Citations

... This is however challenging for many organizations, particularly small resource constrained ones, that struggle with privacy compliance and must strike a delicate balance between regulatory compliance and business requirements. Consequently, user involvement and feedback is becoming an important avenue for organizations to identify areas of privacy concerns that users may have about their software, as well as privacy requirements that could be developed to address these concerns [8]. Determining when and what concerns users express about privacy can be critical success factors for an organization's privacy measures. ...
... However, previous research has identified the lack of shared understanding as a significant challenge in managing nonfunctional requirements (NFRs) in CSE [49]. Shared understanding of NFRs is essential due to the complex, crosscutting nature of NFRs [2] and the importance of NFRs to the success of software projects. ...
... Alpha adopted CSE practices such as frequent feedback loops, continuous verification, and continuous testing based on stakeholder needs. Empirical evidence suggests an organization that adopts CSE may focus on certain CSE practices such as continuous integration for several reasons to suit their business and stakeholder needs [14]. The software engineering team at Alpha uses continuous delivery to frequently deliver working software in short cycles, welcoming changing requirements to meet the stakeholders' needs. ...
... For example, consider NFRs such as security [47] [43]; e.g. if data encryption is poorly implemented, a data breach can expose user information. Werner et al. describe the factors that contribute to the lack of shared understanding of NFRs, such as the fast pace of change and lack of domain knowledge [48]. However, there is still a lack of empirical evidence regarding how a CSE organization builds and manages a shared understanding of NFRs. ...
... GDPR's impact on databases [37] and how databases, by design, can comply with GDPR [34,22] are also analyzed. Recent work investigates how systems can violate GDPR [38], proposes benchmarks [37] and provides tools [26] that test GDPRcompliance, and that explore the benefits of Trusted hardware to prove GDPR-compliance [28]. ...
... The second place (7 papers) is taken by (versions of) the Random Forrest (RF) approach that performed best in 3 papers. Here, we found maximal accuracies of 78% [30], 90% [6] and 92 % [36]. ...