Trustworthiness Requirements: The Pix Case Study

Glenda Amaral, Renata Guizzardi - Silva Souza, Giancarlo Guizzardi, John Mylopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
57 Downloads (Pure)


The advent of socio-technical, cyber-physical and artificial intelligence systems has broadened the scope of requirements engineering, which must now deal with new classes of requirements, concerning ethics, privacy and trust. This brings new challenges to Requirements Engineering, in particular regarding the understanding of the non-functional requirements behind these new types of systems. To address this issue, we propose the Ontology-based Requirements Engineering (ObRE) method, which aims to systematize the elicitation and analysis of requirements, by using an ontology to conceptually clarify the meaning of a class of requirements, such as privacy, ethicality and trustworthiness. We illustrate the working of ObRE by applying it to a real case study concerning trustworthiness requirements.
Original languageEnglish
Title of host publicationConceptual Modeling
Subtitle of host publication40th International Conference, ER 2021, Virtual Event, October 18–21, 2021, Proceedings
EditorsAditya Ghose, Jennifer Horkoff, Vítor E. Silva Souza, Jeffrey Parsons, Joerg Evermann
Place of PublicationCham
Number of pages11
ISBN (Electronic)978-3-030-89022-3
ISBN (Print)978-3-030-89021-6
Publication statusPublished - 16 Oct 2021
Event40th International Conference on Conceptual Modeling, ER 2021 - Virtually, Virtual, Online, Canada
Duration: 18 Oct 202121 Oct 2021
Conference number: 40

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference40th International Conference on Conceptual Modeling, ER 2021
Abbreviated titleER 2021
CityVirtual, Online
Internet address


  • Requirements elicitation and analysis
  • Trustworthiness requirements
  • Unified Foundational Ontology (UFO)
  • 2024 OA procedure


Dive into the research topics of 'Trustworthiness Requirements: The Pix Case Study'. Together they form a unique fingerprint.

Cite this