{"id":"https://openalex.org/W3170805470","doi":"https://doi.org/10.1109/syscon48628.2021.9447113","title":"(UN)Ethical Software Engineering : A critical review about Software Engineering in face of Security Requirements in the IoT/ IoE Society","display_name":"(UN)Ethical Software Engineering : A critical review about Software Engineering in face of Security Requirements in the IoT/ IoE Society","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3170805470","doi":"https://doi.org/10.1109/syscon48628.2021.9447113","mag":"3170805470"},"language":"en","primary_location":{"id":"doi:10.1109/syscon48628.2021.9447113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041267202","display_name":"Fabiana Figueira Sanches Flores","orcid":null},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Fabiana Figueira Sanches Flores","raw_affiliation_strings":["Centro de Inform\u00e1tica, Universidade Federal de Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Centro de Inform\u00e1tica, Universidade Federal de Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003805293","display_name":"S\u00edlvio Romero de Lemos Meira","orcid":"https://orcid.org/0000-0002-4319-6918"},"institutions":[{"id":"https://openalex.org/I25112270","display_name":"Universidade Federal de Pernambuco","ror":"https://ror.org/047908t24","country_code":"BR","type":"education","lineage":["https://openalex.org/I25112270"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Silvio Romero de Lemos Meira","raw_affiliation_strings":["Centro de Inform\u00e1tica, Universidade Federal de Pernambuco, Recife, Brazil"],"affiliations":[{"raw_affiliation_string":"Centro de Inform\u00e1tica, Universidade Federal de Pernambuco, Recife, Brazil","institution_ids":["https://openalex.org/I25112270"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041267202"],"corresponding_institution_ids":["https://openalex.org/I25112270"],"apc_list":null,"apc_paid":null,"fwci":0.6112,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69192736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.6704873442649841},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.5530451536178589},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5372099876403809},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5216876864433289},{"id":"https://openalex.org/keywords/software-requirements","display_name":"Software requirements","score":0.5037845969200134},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4526599645614624},{"id":"https://openalex.org/keywords/software-peer-review","display_name":"Software peer review","score":0.44046643376350403},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.43047627806663513},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4182840585708618},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.37794262170791626},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.3653259873390198},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.22214895486831665},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.17087724804878235}],"concepts":[{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6704873442649841},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.5530451536178589},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5372099876403809},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5216876864433289},{"id":"https://openalex.org/C54534927","wikidata":"https://www.wikidata.org/wiki/Q4462275","display_name":"Software requirements","level":5,"score":0.5037845969200134},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4526599645614624},{"id":"https://openalex.org/C74579156","wikidata":"https://www.wikidata.org/wiki/Q7554342","display_name":"Software peer review","level":5,"score":0.44046643376350403},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.43047627806663513},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4182840585708618},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.37794262170791626},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.3653259873390198},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.22214895486831665},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.17087724804878235},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon48628.2021.9447113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.75,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W23650822","https://openalex.org/W1538836445","https://openalex.org/W1553078293","https://openalex.org/W1861088438","https://openalex.org/W1992025196","https://openalex.org/W2047163986","https://openalex.org/W2120605757","https://openalex.org/W2157803804","https://openalex.org/W2228364600","https://openalex.org/W2262510573","https://openalex.org/W2579171466","https://openalex.org/W2983995785","https://openalex.org/W4285719527","https://openalex.org/W4299360380","https://openalex.org/W6732513926"],"related_works":["https://openalex.org/W2170778849","https://openalex.org/W2033170485","https://openalex.org/W2120376006","https://openalex.org/W2186532739","https://openalex.org/W2362955522","https://openalex.org/W2052544251","https://openalex.org/W1871001366","https://openalex.org/W2368620653","https://openalex.org/W2088814939","https://openalex.org/W2559524254"],"abstract_inverted_index":{"Due":[0],"to":[1,79,95,160,214,267,366],"the":[2,5,61,73,80,129,141,154,161,186,200,249,254,263,318,368,377],"advent":[3],"of":[4,13,30,63,67,75,82,101,107,118,132,144,157,163,173,185,188,192,203,224,251,253],"Internet,":[6],"software":[7,14,77,96,119,149,158,179,191,217,372],"is":[8,127,181,197,242,246,333,344,376],"literally":[9],"everywhere.":[10],"This":[11],"omnipresence":[12],"may":[15,52,351,362],"impact":[16],"people`s":[17],"lives":[18],"in":[19,49,85,148,167,208,216,229,239,306,338,348,371],"such":[20],"a":[21,28,39,64,105,336],"way":[22],"that":[23,46,57,257],"Software":[24,50,255,302,339,381],"Engineering":[25,51],"has":[26],"reached":[27],"level":[29],"importance":[31],"without":[32],"precedence.":[33],"Although":[34],"important,":[35],"it":[36,147,245,332,375],"seems,":[37],"as":[38,104,138,140,289],"result":[40,106],"from":[41,199,297,321],"real":[42,324],"world":[43],"data":[44,114],"analysis,":[45],"some":[47],"practices":[48,143],"reveal":[53],"an":[54,108],"unethical":[55,292],"face":[56],"unfolds":[58],"when":[59],"considered":[60],"disregard":[62,164],"special":[65],"kind":[66],"non-functional":[68],"requirements":[69,150,238,260],"(Security":[70],"Requirements)":[71],"and":[72,92,124,153,171,190,227,272,277,284,291,299,304,315,328,341,355],"approach":[74],"conditioning":[76,156],"use":[78,159],"acceptance":[81,162],"abusive":[83,290],"documents":[84],"which":[86],"all":[87,184,367],"developers`":[88,219],"responsibility":[89,165,276,285],"for":[90,326,335,379],"hazards":[91],"failures":[93],"related":[94],"are":[97,311],"excluded.":[98],"The":[99],"focus":[100],"this":[102,342,349],"paper,":[103],"exploratory":[109],"inquiry":[110],"based":[111],"on":[112],"multiple":[113,211],"gathering":[115],"(pentesting,":[116],"observation":[117],"development":[120],"teams,":[121],"interviews,":[122],"survey":[123],"documental":[125],"analysis),":[126],"discussing":[128],"present":[130],"relevance":[131],"Security":[133,329],"Requirements":[134],"at":[135,262],"contemporary":[136],"societies,":[137],"well":[139,314],"questionable":[142],"not":[145,235,247,312,363],"considering":[146,236],"elicitation/":[151],"prioritization":[152],"simultaneous":[155],"clauses":[166],"End-User":[168],"License":[169],"Agreements":[170],"Terms":[172],"Services.":[174],"Results":[175],"suggest":[176],"that:":[177],"a)":[178],"insecurity":[180,196,215],"everywhere,":[182],"affecting":[183],"layers":[187],"systems":[189],"several":[193],"niches;":[194],"b)":[195],"evident":[198],"great":[201],"amount":[202],"security":[204,225,237,259],"vulnerabilities":[205],"found":[206],"out":[207],"software;":[209],"c)":[210],"factors":[212],"contribute":[213],"(insufficient":[218],"knowledge":[220],"about":[221],"Security,":[222],"neglection":[223],"requirements,":[226],"omissions":[228],"undergraduate":[230],"courses":[231],"curricula,":[232],"e.g.);":[233],"d)":[234],"nowadays":[240],"society":[241],"unethical;":[243],"e)":[244],"appropriate":[248],"attitude":[250],"part":[252],"Industry,":[256],"neglects":[258],"and,":[261],"same":[264],"time,":[265],"tries":[266],"hide":[268],"itself":[269],"behind":[270],"EULAs":[271,298],"ToSs":[273],"filled":[274],"with":[275],"liability":[278,283],"limitation/":[279],"exclusion":[280],"clauses;":[281],"f)":[282],"exclusion/":[286],"limitation":[287],"clauses,":[288],"conditions,":[293],"shall":[294,308],"be":[295,364],"suppressed":[296],"ToSs;":[300],"g)":[301],"Industry":[303,340],"developers":[305],"general":[307],"recognize":[309],"they":[310],"behaving":[313],"begin":[316],"doing":[317],"right":[319],"thing":[320],"scratch":[322],"(taking":[323],"care":[325],"quality":[327],"Requirements);":[330],"h)":[331],"time":[334,378],"change":[337,343],"urgent":[345],"because":[346],"inertia,":[347],"case,":[350],"favor":[352],"professional":[353],"licensing":[354],"external":[356],"regulation":[357],"initiatives,":[358],"measures":[359],"that,":[360],"obviously,":[361],"interesting":[365],"actors":[369],"involved":[370],"production;":[373],"i)":[374],"Ethical":[380],"Engineering.":[382]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
