=Paper=
{{Paper
|id=Vol-2223/paper4
|storemode=property
|title=Public Policy Challenges: An RE Perspective
|pdfUrl=https://ceur-ws.org/Vol-2223/paper4.pdf
|volume=Vol-2223
|authors=David Callele,Birgit Penzenstadler,Krzysztof Wnuk
|dblpUrl=https://dblp.org/rec/conf/re/CallelePW18
}}
==Public Policy Challenges: An RE Perspective==
Public Policy Challenges: An RE Perspective
David Callele Birgit Penzenstadler Krzysztof Wnuk
Dept. of Computer Science Dept. of Comp. Eng. and Comp. Sci. Department of Software Engineering
University of Saskatchewan, Canada CSULB, Long Beach, USA Blekinge Institute of Technology
Callele@cs.usask.ca birgit.penzenstadler@csulb.edu Karlskrona, Sweden
Krzysztof.Wnuk@bth.se
Abstract— In this perspective paper, we investigate the paral- Given the perceived correspondence between the domains,
lels between public policy and IT projects from the perspective of we decided to investigate further. However, we are not public
traditional RE practice. Using the mainstream media as an in- policy experts and we chose to investigate the issues just as
formation source (as would an average citizen), over a period of members of the public would do, using the information source
approximately one year we captured documents that presented
most readily available – the Main Stream Media (MSM), rather
analyses of public policy issues. The documents were categorized
into eight topic areas, then analyzed to identify patterns that RE than using the (traditional) peer-reviewed literature. In other
practitioners would recognize. We found evidence of policy fail- words, we wanted to know whether public policy initiatives
ures that parallel project failures traceable to requirements engi- that received MSM coverage appeared to have any characteris-
neering problems. Our analysis revealed evidence of bias across tics revealed in their reporting that confirmed the analogy with
all stakeholder groups, similar to the rise of the “beliefs over RE for software artifacts. We observed evidence of bias in the
facts” phenomenon often associated with “fake news”. We also reported positions, bias in those doing the reporting and even
found substantial evidence of unintended consequences due to evidence of “fake news” effects.
inadequate problem scoping, terminology definition, domain
Our initial investigations led to the following research ques-
knowledge, and stakeholder identification and engagement. Fur-
ther, ideological motivations were found to affect constraint defi- tions:
nitions resulting in solution spaces that may approach locally 1. Can we identify challenges associated with defining, for-
optimal but may not be globally optimal. Public policy addresses mulating and realizing public policies?
societal issues; our analysis supports our conclusion that RE 1.1. Do the challenges have analogs in RE for software in-
techniques could be utilized to support policy creation and im- tensive systems?
plementation. (Abstract) 2. How could RE techniques help mitigate the identified pub-
Index Terms—Requirements engineering, public policy, bias, lic policy challenges?
unintended consequences, mainstream media, ideology and belief,
2.1. Can RE techniques be used to proactively identify
failure. (key words)
possible public policy challenges during formulation
and before enactment?
I. INTRODUCTION To answer these questions, we performed an explorative
We believe that there is a strong parallel between crafting case study using North American mainstream media and cate-
public policy in response to (societal needs to meet) citizen’s gorized the motivating problem, goals and solutions for eight
goals and software crafted (in response to requirements) to topics that received significant MSM coverage over the study
meet stakeholder goals. In this context, we define public policy period. The study materials were gathered by monitoring news
as the mechanism through which societal challenges are identi- feeds (e.g. Google News) for a period of approximately one
fied and addressed by the creation of policies, laws and regula- year and capturing those documents that presented a public
tions as enacted by government. We see sustainability as a sig- policy issue along with analysis or commentary. We reviewed
nificant societal challenge that could be addressed by effective the documents en masse, then categorized and coded them.
policy creation and implementation. Our analysis revealed evidence of (apparently unintentional
Requirements Engineering (RE) practices such as goal and often large-scale) side effects. These unintended artifacts
identification and modeling, requirements analysis, require- appear to exhibit many of the classic RE problems that occur
ments negotiation, prioritization and triage have direct corre- during the development of software-intensive systems.
spondence with the political process of policy identification, The rest of this paper is organized as follows. In Section 2
policy creation and with resolving challenges associated with we review prior and related work. Section 3 presents the re-
realizing policy goals [16]. What is not as clear is the corre- search methodology, research design and discusses threats to
spondence between RE practices associated with identifying validity. Section 4 describes the data collection and analysis
risks, threats and unintended consequences [11], and develop- efforts and Section 5 presents our observations. A supplemen-
ing appropriate mitigation strategies for the proposed policies. tary discussion follows in Section 6 and Section 7 presents the
Unintended consequences and mitigation strategies are particu- conclusions and directions for future work.
larly important for sustainability initiatives.
Copyright held by the author(s).
II. PRIOR AND RELATED WORK Wright and Hinson [54] analyze the impact of social media
We present related work from the topic areas of ideological on public relations practices and conclude that traditional news
biases in stakeholders, mainstream media as information source media still receive higher credibility than social media.
in RE, challenges of data mining versus humanism, and prob- Maalej [30] and Pagano [33] have used app store reviews to
lem analysis in other domains using RE tools. extract requirements. Guzman and Maalei [19] found sentiment
analysis to be very insightful. App store reviews are signifi-
A. Ideological biases in stakeholders cantly different from the mainstream media analyzed in this
The works on ideological biases in stakeholders are princi- paper, but also use public opinions for informing RE practice.
pally in the area of business policy. For example, in 1986, Guzman and Maalei also investigated Twitter messages to
Shrivastava [45] discusses whether strategic management is understand their potential to help requirements engineers better
ideological, and reviews 20 years of strategic management and understand user needs, using the micro-blogging system as an
business policy research and practice. He points out critical additional information source for RE. In contrast, our research
criteria like the denial of contradiction and conflicts as well as uses RE analysis to understand parallels between RE for soft-
the naturalization of the status quo, and advocates for an open ware intensive systems and crafting public policy.
conversation between managerial interests and societal stake-
C. Challenges of data mining versus humanism
holders of organizations. Parts of such an open conversation,
albeit very limited, are mass media articles like the ones ana- Manovich [31] discusses the promises and challenges of big
lyzed in the current work. social data with the optimistic conclusion that the new, en-
Handelmann et al. [25] discuss ideological framing in larged surface and enlarged depth could facilitate asking new
stakeholder marketing based on a longitudinal analysis of types of research questions.
stakeholder dynamics in more than 2,000 articles from 45 years Kirschenbaum [28] explores the opportunity of using data
of grocery retail trade. They conclude that the interpenetration mining for literary criticism in digital humanities. Kirschen-
of strategic and institutional factors has implications for stake- baum rightfully argues that literary criticism rarely uses ground
holder marketing. This ideological influence on institutions is truth, and that data mining could point out outliers that ‘pro-
also detectable in the media analyzed in our study. voke’ human subject experts. The authors conclude that “While
Entine [16] critiques the myth of social investing based on there will hopefully always be a place for long, leisurely hours
an analysis of the flaws of proclaimed objective ratings and of spent reading under a tree, this is not the only kind of reading
‘socially responsible’ businesses and their strategies. He con- that is meaningful or necessary.” (p. 5) [28] This result may
cludes that social screening is highly anachronistic and based indicate that the current work may be observing some, or all, of
on ideologically constructed notions of corporate social respon- the same characteristics.
sibility. Taking a stance against Entine’s analysis, Waddock Sculley and Pasanek [42] investigate the impact of implicit
[52] explores the myths and realities of social investing and assumptions in data mining for the humanities and argue that
provides evidence of the objectiveness of the ratings while not- the standards for evidence production in digital humanities
ing their remaining issues. We see similar tendencies of cri- should be even more rigorous than in empirical sciences. Their
tique and counter-critique in some of the news articles we ana- most important conclusion is to keep the “boundary between
lyzed – two sides with reasonable arguments, and the use of computational results and subsequent interpretation as clearly
inflammatory terms elicits stronger responses from the public. delineated as possible.”
B. Mainstream Media as Information Source in RE D. Problem analysis in other domains using RE tools
Chomsky [14] discusses what makes mainstream media Chandrasekaran [12] provides a task analysis of design
“mainstream”. He elaborates that most of mass media is in- problem solving. Byrd et al. [8] synthesize research on re-
tended to divert attention (consumers as spectators), the elite quirements analysis and knowledge acquisition techniques for
media is geared towards the educated, wealthy and powerful, management information systems.
and most academic articles are still within the boundaries of The requirements engineering community has made signifi-
institutional obedience. He concludes that, from these charac- cant contributions in the area of legislative work, for traceabil-
teristics, we can predict what we would expect to find in the ity and analysis [2][6], for resolving cross-references [38], for
current work – and we did. conformance checks [2], and for technology transfer [39].
Kwak et al. [29] compare user-generated content to main- There is further work in the legislative application domains of
stream-media-generated content, specifically around sport public governance [1], taxes [46], medical device development
communication, and concludes that message valence had a [27], procurement [40][41], nuclear [50], aviation [49], auto-
strong impact on triggering biased source evaluation and atti- motive [29], and corporate intellectual policy [9]. The work at
tude. We see a similar tendency in the streams we analyzed. hand expands this body of work to new areas.
Newman [32] explores mainstream media and the distribu- Due to space restrictions, there are large areas of work
tion of news. He highlights the contribution of social media to within RE which this work has not referenced.
social discovery and their function as network nodes for social III. RESEARCH METHODOLOGY
distribution – and points out the disruptive effects this has on
the business models of news organizations. We conducted an exploratory case study over a period of
approximately one year during which we investigated public
policy topics where there was significant Main Stream Media • Climate change (e.g. resilience, carbon emissions, en-
(MSM) press coverage. The MSM was used as an information ergy, electric vehicles, pipelines)
source, rather than the academic literature, because we were • Controlled substances (e.g. state versus federal law,
focused upon public policy and the MSM is the principal in- avoiding crime, licensing, taxes)
formation source for members of the general public. • Equalization (e.g. income, taxes, resources, cost of liv-
The MSM was monitored using news feeds such as Google ing)
News (https://news.google.com), content aggregators that can During the coding phase, we attempted to identify the chal-
be trained (via click through on articles) to perform some de- lenges that the policies were meant to address and the subse-
gree of filtering upon the vast quantity of available material. quent problems that arose because of the policy implementa-
Whenever we identified an article related in some way to an- tion. We then mapped the results to traditional RE nomencla-
nounced public policy and the author’s commentary identified ture (e.g. in some articles we found indicators of inadequate
inadequate results or unintended consequences, we then cap- stakeholder identification). A sample of the coding sheet is
tured that article to the document repository for later analysis. presented in Table 1.
The resulting dataset is a collection of 152 articles or doc-
uments on government policies, policy topics or policy initia- A. Threats to Validity
tives, government procurement and policy implementation This study has several validity threats that need to be dis-
strategies. Sustainability was the primary focus of 37 of the cussed. One of the significant construct validity threats is the
articles or documents. In each case, the topic of the article was assumption that RE processes and policy crafting processes
an initiative that was (seemingly) made with the best of inten- share a strong parallel. We believe that the collected evidence
tions. Unfortunately, the results ranged from simply inadequate and discussion presented in the paper provides sufficient evi-
to outright failure and the incidence of (potentially large-scale) dence to support our claims. Still, further empirical validation
unintended consequences was high. We include in the category of this assumption needs to be performed in the future.
of unintended consequences, policies that even a superficial RE The most significant threat to internal validity is that the
analysis would identify as probably not achievable given the observed unintentional effects and consequences have not been
solution constraints. The unintended consequences were either statistically analyzed or confirmed. We have not used experi-
explicitly identified by the author of the article or they were mental methods to study the effect of changes in the independ-
identified after our own analytic efforts (e.g. diverging or con- ent variables on the dependent variables (for example, involv-
tradicting policy goals) or prior domain experience. ing a class of stakeholders in relation to unintended conse-
As a counterpoint to the MSM sources, we also investigat- quences). However, the study has an exploratory nature and we
ed sustainability policies in California, USA [9][36]. We had do not claim that the presented consequences are complete or
access to very detailed policy and implementation plans that true for all contexts.
had large investments in their development and which we ex- Conclusion validity threats have limited impact on this
pected to be of significantly higher quality than the MSM doc- study since we have not used statistical tests to obtain our re-
uments and to be relatively bias-free. sults. At the same time, We made several efforts to minimize
At the end of the document collection phase, the documents subjectivity and resolve potential conflicts when analyzing and
were reviewed in their entirety in two sessions totaling approx- categorizing qualitative evidence. We used researcher triangu-
imately 12 hours. We used researcher triangulation to decrease lation to decrease the subjectivity bias, with the first two au-
the subjectivity bias, with the first two authors performing the thors performing the analysis in discourse and the third author
analysis in discourse and the third author reviewing the coding reviewing the coding and interpretation for consistency and
and interpretation for consistency and correctness. The coding correctness.
was emergent and led to the following eight categories. Given Since the study is exploratory, external validity remains the
the topic areas, there is some potential that a document could main limitation of our work. We aim for analytical generaliza-
be coded into more than one category; the final placement was tion rather than statistical generalization [16] and present the
based on discussion among the researchers. case and method details to enable replications and further stud-
• Algorithms (e.g. big data analysis, artificial intelli- ies. Still, we studied only a limited dataset of 152 articles on
gence) that have drawn sufficient attention to warrant government policies and policy initiatives.
public policy discussions We note that we are taking a humanistic approach to our
• IT projects (e.g. large-scale publicly funded projects, analysis. While there is a significant body of research in
generally in support of some policy goal) automated processing of news feeds and sources like Twitter,
• Social (e.g. free speech, critical thinking, gender issues, that work generally analyzes large corpuses. Unfortunately,
fake news, radicalism) that is not the way “the average person works”; they do not
• Privacy (e.g. location data, social media, children’s read hundreds or thousands of articles on an issue, they might
self-determination) read one or two. This is a substantial validity threat, but we
• Policy (e.g. cybersecurity, copyright, taxes, housing) mitigated this risk by individually reading every article and
performing the final coding after discussion.
TABLE 1. DETAILED CODING SAMPLE
ID Category Goal Solution Unintended Keywords Problems
Consequences
Reuters AI Algorithms Make news faster, Use 13 AI algorithms Potential to eliminate the News, media, Stakeholders
more accurate, and that mine Twitter and jobs of 2500 highly AI, algorithm not considered
more resilient against cluster and extract educated and skilled
fake news attempts. news reporters
Amazon sales Algorithms Make customers want Sales algorithm that (1) Suggesting composites Sales, online, Unintended
algorithm to buy more and feel works well in selling that are potentially useful algorithm consequences,
well taken care of things that are useful to build explosive devices, incorrect
because frequently (2) could potentially serve interferences
bought together to detect potential terrorists
Passport Canada IT projects / Make passports safe Electronic system to At least $75 million over Passport, IT Failed to
New passport and secure with produce the new budget and well behind consider
processing physical robustness passports schedule. The project "did specific quality
system not include a plan for requirements
security requirements."
Sight of personal Privacy Software company Software can be given Loss of privacy, complete - Privacy EU has data
privacy, Google, needs to make money away for free if we unintended by the user. privacy policies
Facebook collect the users’ data Unintended consequence that would make
instead by the companies is a lot of US
regulatory pushback of startups illegal
various jurisdictions. No
understanding of
consequences (e.g. why I
didn't get the job/loan/etc.)
Controlled Controlled Get people to relax and Pot legalized. Potentially reversing Controlled A federal
substances substances not be anxious. policy. You smoke pot in substances marshal could
summary Cali, leave to EU, return, if walk across the
you deny to have smoked US and throw
upon return to the US you anyone in jail
can be charged, perhaps that has smoked
jailed. pot.
Equalization Equalization Ensure that all political A formula. It is People don't have trust that Equalization People don't
summary regions in the country criticized as being far equalization is fair. Some bother to learn –
are able to provide too complex. From a regions experience greater what it costs to
approximately mathematician's levels of taxation than deliver a public
equivalent public perspective the model others. The people who policy initiative.
services to the citizens is grossly inadequate, receive the money say Stakeholders
inaccurate, and everyone gets taxed the can’t understand
simplistic. First year same, but the federal a correct
calculus is way more government takes that solution so they
complex than this money and reallocates it as (grudgingly)
model, but the general rebates to different regions, accept a flawed
public still perceives it so it has the same effect as solution.
as too complex. different taxation.
California California California aspires to be How many things are Millions of dollars are Sustainability Prioritization
Sustainability Sustainability a thought-leader and being considered at being spent on these policy
Policies summary Policies puts into action a lot of CSULB and the Port initiatives. What could
what we have learned of LA as examples - have been achieved if that
on mitigating shows you can make money would have been
sustainability substantial differences spent somewhere else, e.g.
challenges over the but at high costs in India or another
past years. developing country where
it can help far more people
with the same resources?
of the categories Controlled Substances, Equalization, and Cal-
ifornia Sustainability Policy, as we found the results more in-
IV. REFLECTIONS UPON THE METHODOLOGY sightful on the aggregated level. For each row, we identify the
We retrieved and analyzed 152 articles and an excerpt of Goal as the original intention for the policy and the Solution
our analysis is presented in Table 1. The left column indicates that was chosen. We then identify the Unintended Consequence
the identifier of the news item, then the category into which we arising from that solution. We further tagged with Keywords
classified the article. The bottom three rows are summary rows and identified Problems of the scenario.
For example, the first row identifies the issue of the Reuters V. OBSERVATIONS
AI, in the category Algorithms, where the decision makers had We begin each grouping of our results with a descriptive
the intention of making news faster, more accurate, and more label, present our observations and, generally, present one or
resilient against fake news attempts (in response to public out- more (sometimes rhetorical) questions.
cry and nascent public policy initiatives). The established solu- Legislative Contradictions: We observed cases where
tion was to deploy 13 AI algorithms that mine Twitter feeds to there are contradictions within legislation – how do the indi-
identify topics of interest. The (potentially) unintended conse- viduals responsible create legislation that contradicts? Are
quence of the desire to more quickly react to current events is these conflicts deliberately created by those responsible or is
that the jobs of 2,500 highly educated and skilled reporters are there something else influencing (and possibly corrupting) the
potentially being eliminated. We associated the keywords process? For example, on the topic of marijuana legalization,
news, media, AI and algorithms, and the main problem that all individual states in the USA have decriminalized personal use
relevant stakeholders were not considered. while federal law continues to make possession a crime. Legis-
The retrieved articles are dominated by works wherein the lators in individual states have deliberately chosen to contradict
author reflects upon some policy initiative and the associated federal law. Would we tolerate conflicting, and unresolved,
successes and failures. These kinds of articles appear to be in- requirements when designing a software intensive system?
herently biased towards negative critique (perhaps in an effort Related work represented policy constraints as logic program
to generate more page views?) and they became a rich source, [44], but that is only a very first step in solving these issues.
perhaps even a treasure trove, of unintended consequences. Same Old Problems: Despite 50 years of experience in IT
These articles all contain strong observer bias (they are opinion systems, the last 30 years of (approximately) which RE has
pieces), but we use them as data sources anyway – for these are been a formal discipline, we observe that system after system
the same data sources that shape their reader’s opinions and continues to experience problems such as missing requirements
perceptions. After all, just because a source is biased it does not and missing stakeholders. For example, the Government of
mean that the inherent message is not reality to the reader. We Canada embarked upon the creation of a unified payroll system
also gathered resources for two instances where policy was for all federal government employees. The system must man-
reduced to practice (sustainability and environmental policy age the contracts for hundreds of different unions, each of
initiatives at California State University Long Beach and the which has their own pay scales, promotions, benefits packages
Port of Long Beach, including significant traditional engineer- and retirement plans. Individual employees could spend their
ing technology analyses and engineering economic analyses). entire career within a single union or change to a new union
The first two authors coded the articles in discussion and each time they change the position in which they are employed.
we applied significant domain knowledge of their own to pro- RE practitioners would immediately recognize the likelihood of
vide context for the observations and to enhance the richness of a combinatorial explosion in the business rules and data ele-
the conclusions. This technique has the potential to provide ments that must be managed and would identify the issue to the
greater insight but is also a significant threat to validity. We are stakeholders. In this case, the issue appears to have been trivial-
trying to be humanistic in this work, we are analytical but not ized or ignored, and while we do not have any “insider infor-
coldly so. In other words, we are reacting as people, not as a mation” that would allow us to elaborate further, we do note
machine algorithm. We are observing emotional content and that the project is considered a near-complete disaster by all
there is the potential that we have introduced some of our own stakeholders and projected implementation and remediation
emotional bias on some of the topics. For each article, we read costs are in excess of 400% of the original budget (the Gov-
the content and (typically) the first 50 to 100 reader comments ernment recently announced1 that cost estimates have exceeded
(assuming that comments are present). $1B CDN and the creation of a task force to find a replacement
Within the first few months of our study, we realized that before this system is even fully functional). Other government
our data set would have an inherent bias: it would not be unrea- IT projects (especially those related to health care) do not seem
sonable to assert that the MSM generally reports upon things in to fare much better.
a negative manner, and the associated comments are often Holistic Perspectives: What is possible and highly desired
more extreme than the studied article. from a political perspective is often not possible from an eco-
With this realization we adjusted our research effort, focus- nomic perspective and it seems that policy makers rarely take
ing more of our efforts upon those reports wherein there ap- this holistic view. For example, promoting the use of electric
peared to be unintended consequences of some public policy cars should reduce CO2 emissions and is relatively easy to jus-
initiative. We note that there were many, many reports of unin- tify if the only metric used is emissions per distance traveled.
tended consequences and not all were negative. We then re- However, electric vehicle production creates significant CO2
fined our effort to identifying the unintended consequences and emissions [17] and the consumption of significant quantities of
evaluated them using a system model. Our analysis was based rare metals. The electricity used must be generated by low
on the question “If this was a software system and we were emission sources and (somehow) delivered to the vehicles. It is
performing a post hoc evaluation using RE techniques, what well-known in electrical engineering practice that the North
observations and recommendations would we make?”
The complete codebook is available on Google Drive [15]
1
http://www.ctvnews.ca/politics/minister-fixing-phoenix-pay-system-could-
cost-1b-1.3672663
American electric distribution grid was not designed to deliver address these differences. Despite the well-established princi-
this much energy and can only hope to do so with careful de- ple that federal powers overrule provincial powers, individual
mand management (e.g. only charge your vehicle after 9 p.m. if provinces that do not agree with federal policy on a given topic
you live in a residential neighborhood) unless significant in- can, and do, attempt to override the federal policy by crafting
vestments are made in infrastructure improvements. Despite confounding or competing legislation within those aspects of
the challenges, to achieve the desired public policy objectives exclusive provincial jurisdiction. For example, inter-provincial
systemic changes and early adopters will be necessary. For this, and international pipelines are clearly placed under federal ju-
we can use the foundations of systems thinking [13][21] and risdiction. Environmental regulatory powers exist at both the
apply them to engineering activities [3]. federal and provincial levels and anti-pipeline activists attempt
Identifying the “Right” problem: Our review identified to use provincial environmental regulatory powers to impede or
numerous cases where those directly involved with a policy or completely block any federal approvals for such projects.
project appear to believe that they have correctly identified the While conflict identification and resolution have been targeted
problem, and that their proposed (or actual) solution addresses by [51][4], these policy-level conflicts require a more holistic
the problem. However, when other parties look at the problem level of modeling and reasoning than technical requirements.
they quite strongly disagree upon the problem definition – con- Privacy: Even though users legally agree to having their
sider the acrimony that exists between perspectives on climate data tracked by many of the apps and services that they use,
change challenges and proposed solutions. This pattern implies most people grossly underestimate the magnitude of the data
that there is a class of problems where perspective is very im- trail that they create. While this data collection activity is pre-
portant. If that is the case, is our established body of RE prac- sented to the user as a way to improve the user experience,
tices applicable to those problems? Does RE have to evolve to more and more users are learning that the same data can also
be able to support these problems or do we just ignore that have significant unintended consequences – especially when
class of problems? This concern is partly addressed by some that data is licensed to a third party. We routinely see reports of
work in RE on viewpoints[48], but only on a level of technical individuals that use social media experiencing negative conse-
representation in requirements documentation. Do these prob- quences (e.g. denied insurance claims, denied bank financing,
lems also affect RE for (software-intensive and other) systems? inability to get job interviews, etc.) [26].
Side Effects: When reviewing the articles, we were repeat- Public policy is responding to these reports, most notably in
edly given the impression that comprehensive analyses of po- the European Union, and there is increasing pressure on the
tential complicating factors is either performed badly or not providers of these services to support correction and deletion of
performed. This is an area where RE can significantly contrib- data collected about individual users, including the “right to be
ute beyond the work in [55]. For example, the Swedish gov- forgotten” [19] [53]. But, what about the effect that the data
ernment performed an analysis that showed that (in their opin- had on the analyses before it was modified or deleted? And
ion) too many motor vehicle accidents occurred when overtak- how does the modification or deletion request propagate to
ing (passing). To reduce the accident levels, flexible posts were third parties that may have a copy of the original data or anal-
installed in numerous stretches of the roads. While these flexi- yses that were based upon the original data? How do we con-
ble dividers may have reduced the accident rate for cars and struct requirements not just for the originating system but also
trucks, they have made travel more dangerous for motorcycle for third-parties?
riders who cannot hit these barriers without serious conse- Biases in AI and Data Mining: Bias in automated deci-
quences. sion-making systems is receiving ever-increasing public policy
(Magnitude of) Unintended Consequences: The unin- attention. Closely related to privacy issues, deliberate or unin-
tended consequences of the policies under investigation have a tentional bias has the potential for significant unintended con-
much larger scope and scale than we expected. And, larger than sequences. The specialists in the field don’t always know why
the original policy intervention necessarily would have made they are accepting the results they get out of the algorithms,
many people believe. leading to backlash from observers (“Will anyone ever write
As an example, consider affirmative action policies whose another positive story about a tech startup? I said probably not”
goals are to “level the playing field” between disparate groups. [22]). If the algorithms that are being used to mine these data
Superficially, these policies obtain at least grudging acceptance repositories have biases (intended or unintended), they may
by a majority of the populace in North American jurisdictions. amplify negative conclusions about individuals that are un-
However, we see evidence that different special interest groups founded or unwarranted. The same technologies can also be
“weaponize” these policies, in different ways, and use them to applied to induce bias in users, from addictive video game
increase conflict rather than decrease conflict. As a result, posi- properties and Facebook’s deliberate design to induce emotion-
tions become ever more polarized and compromise solutions al reward to the numerous reports of election interference in the
become more difficult to achieve. US presidential elections2 and the Brexit campaign.
Affected Domains: Different regions within a state, prov- Significant elements of the technology sector could find
ince or country tend to have different social mores and these themselves regulated, or at least required to justify or defend
can translate to differences in local legislation and increased
potential for conflicts. In Canada, legislative powers are delib-
2
erately split between the federal and provincial levels to help to https://www.theguardian.com/technology/2017/oct/30/facebook-russia-fake-
accounts-126-million
their algorithms in ways that can be comprehended by policy ple simply cannot afford to travel except in absolute necessity
makers and by the general public. What happens when the will have the effect of reducing emissions, but is this even pos-
technology sector answers “We don’t know. We just know that sible to implement in a democratic society where people need
it (seems to) work better than anything that we have done be- to travel to work? If you believe that climate change is caused
fore.”? What will happen to “technological progress” if every- by human intervention, perhaps you could target non-essential
one believes that they have “the right” to provide input any travel – for example, ban tourism. Superficially, this would
time that they believe that this class of algorithms is affecting create non-trivial reduction in emissions. However, such a poli-
their lives (or they will threaten to claim some form of oppres- cy would eliminate a significant source of income for many
sion or human rights violation)? How many companies that developing nations and seriously impede their ability to offer
rely upon data mining would find their business models at risk public services such as health care.
in such a regulated environment? This is a significant unintended consequence. The policy
Deployment of these technologies in support of public poli- would destroy the livelihoods of everyone in the tourism indus-
cy will require us to truly understand what is “going on inside.” try and of many third world nation service industries – is that
Otherwise, how do we evaluate whether we are or not exclud- what the ‘environmentalists’ want to happen? We posit that this
ing people from fair treatment in our society based upon what is unlikely.
some algorithm returns as a result. In the world of the movie To make this point even more strongly, the Government of
“Minority Report”, precognition was combined with significant Canada attended the Paris climate convention and signed the
technical support to eliminate murder. What happens when we Paris climate accords. Later that year, the Parliamentary Budget
replace precognition with data mining and AI? The computa- Office (an agency that provides independent cost analyses of
tional techniques may be mathematically accurate but how do parliamentary initiatives) issued a report that sought to bring
we know if we are correctly interpreting the results? If, for ex- the commitments into perspective for the average citizen
ample, ethnic heritage in combination with neighborhood, so- [23][34][46]. The report identified that achieving Canada’s
cioeconomic status and educational level, leads to a person commitments would require emissions reductions of a magni-
being identified as a potential future criminal, does that mean tude that was more than the equivalent of the elimination of all
the individual is indeed a criminal and should be treated as motorized transportation in Canada – no aircraft, no shipping,
one? Does that mean that the analysis has identified fundamen- no busses, no cars, no motorcycles, etc.. How can a govern-
tal flaws or failures in society’s structure? Even though these ment maintain any credibility with its citizens if they make
factors often correlate, they are not necessarily causal and, commitments that appear to be unachievable? After all, mobili-
therefore, should we be working on fixing the cause of the ty of people and goods lies at the heart of the global economy
problem and not the symptom? Finally, if the models are telling and while the government’s actions were strongly supported by
us things we don’t want to hear, then maybe the models are the environmental movement, the average person’s position has
simply identifying opportunities for improvement. shifted toward disbelief, apathy and resentment. Rather than
Social Perspectives: We identified a pattern of hardening fostering support for the initiative, they have created resistance.
of positions by factions interested in public policy topics. Ra- In contrast, sustainability initiatives in California underwent
ther than looking for compromise, it appears that the factions significant planning efforts, culminating in realistic implemen-
are treating issues as a zero-sum game: “we adopt my position, tation plans [9][36]. Even though engineering economic anal-
or else…” Can RE techniques (especially those related to con- yses showed that some of the goals were not cost effective, an
flict resolution and mediation) be used to find common ground informed decision was made to proceed in pursuit of those
between these stakeholders? What does it mean to practitioners goals – unlike the public perception of the Canadian initiative.
(and society in general) when stakeholders tell us there can be Emotional Content: Emotionally charged content is preva-
no validity in a common ground? As Brown points out, in our lent across many of the articles, as evidenced by the author’s
current society there is a “phenomenon of you are either with selection of adjectives and adverbs and by the positions taken
us or against us.” [7] This behavior pattern, if it continues to by supporters and detractors within the accompanying com-
grow, is serious cause for concern. ment sections. From the Twitter storms of President Trump and
For example, this pattern is very evident in people’s posi- his interactions with Kim Jong-un to people issuing threats on
tions about climate change. Do you believe humans contribute social media platforms toward people who oppose their posi-
to something that is called climate change? Do you believe that tion on issues of the day, how do we get past all of that negativ-
greenhouse gasses can be absorbed by the environment without ity and unwillingness to compromise to even get to the point of
significant damage or not? Do you feel we should be minimiz- being able to agree upon a goal, let alone solutions? Are these
ing our human byproducts and pollution? behavior patterns evident even when performing RE for soft-
You can interpret these questions with sufficient qualifiers ware intensive systems?
such that eventually you will get almost every climate change Time: The time needed to introduce and pass legislation in
denier or promoter to agree. For example, many climate change support of policy initiatives (e.g. reduce industrial CO2 emis-
deniers are not against mitigation policies per se, rather they sions), and to see the effects of the policies (often measured in
tend to be against specific policies because they do not believe decades), is much longer than the average time a government
that those policies are a cost-effective solution to the problem. holds power (four to six years in most democratic countries).
For example, taxing carbon emissions at such a level that peo- This reality has led to two patterns: New governments try to
reverse policies set by previous governments resulting in abort- would be more organized and better structured than they are,
ed efforts and significant waste and, in anticipation, current but we can’t help but wonder what it would be like if they were
governments try to establish policies in such a way that they as relatively error-free as well-crafted software.
cannot be easily modified. What is lost if the original policy
implementation was actually going to be effective? How does a VII. CONCLUSIONS AND FUTURE WORK
new government undo a policy that has proven deleterious? In this work, we investigated the use of the mainstream me-
dia as a data source for an analysis of public policy and related
VI. DISCUSSION governmental initiatives. Our first research question asked
Using the MSM as a data source, rather than peer-reviewed whether we could identify challenges associated with defining,
academic papers is certainly a ‘different’ research experience. formulating and realizing public policies from this data source.
The prevalence of opinion, often strong opinion, without sub- We were able to identify challenges by analyzing the content,
stantiating evidence converts the quality evaluation process to removing the commentary, then identifying the underlying
one of (1) how well is the article written (for me)? (2) does the “facts”. We were also able to identify how people perceived the
article align with my personal biases and (3) what do I perceive challenges, which often were biased by ideology. Furthermore,
to be the reputation of the author? When one includes the we found that the challenges do have analogs in RE for soft-
comments in the analysis, it is easy to be affected by the ware intensive systems, so there is potential that RE can help to
strength of the (often negative) positions held by the comment- proactively identify possible public policy challenges.
ers. This negativity bias can easily be passed on to the analysts A metaphor that we find useful is that public policy is the
and this contagion is a known psychological phenomenon algorithm for governing the operation of the machine that is
[42].3 Researchers interested in performing a humanistic inves- society. As such it is easy to answer the next research question
tigation into these materials are advised to be prepared for the in the affirmative: how could RE techniques help mitigate the
potential emotional side-effects. identified public policy challenges? We saw no evidence that
How does the MSM affect stakeholder perceptions, opin- RE techniques could not be successfully applied in this do-
ions, and the hardening of both? There seems to be an accelera- main. Finally, we asked whether RE techniques could be used
tion and hardening of positions in mainstream media – is this to proactively identify possible public policy challenges during
something that RE might have to consider or be more cogni- formulation and before enactment? The final research question
zant of moving forward? For example, do you send your (polit- is not as easy to answer. Certainly, validation and verification
ically) left-leaning team in when you have a (politically) left- techniques could be used to identify issues and mitigate risks if
leaning client? Such a proactive effort can amplify the biases the participants had sufficient domain expertise and, dare we
(prejudices) but has the potential to lower the risk of mis- say it, wisdom.
communication. We take special note of the seeming rise in We see sufficient evidence for there to be a role for RE in
ideological bias on the part of policy makers, thought leaders helping people at large to understand the technology that seems
and the general public. This trend toward the adherence to a to overwhelm them, possible consequences and side effects.
position or interpretation independent of rational analysis of the While this work is another piece of evidence of the univer-
underlying facts could have far-reaching and unexpected ef- sal nature of problem patterns and critical thinking, it has also
fects. While we have observed evidence of ideological bias in delivered significant context for future work. Each of the major
policy, we must ask whether this trend will have an effect on points in Section V could readily become a research thrust:
RE for software artifacts. For example, will practitioners need • Legislative contradictions
to be more diligent in exploring stakeholder statements of their • Same old problems
wants, exploring whether or not these wants can be evaluated • Identifying the “right” problem
as stated (in the transition from wants to needs during prioriti-
• Side effects
zation) or whether the statements must be further explored to
• Magnitude of unintended consequences
identify ideological biases? When attempting to understand the
risks and threats arising from this trend we are prompted to ask: • Holistic perspectives
How does this knowledge inform us about how they (policy • Affected domains
makers, their constituents, and politicians) perceive circum- • Biases in AI and data mining
stances and issues; what gains, risks and threats does this offer • Social perspectives
to RE practice? In this context, miscommunication challenges • Emotional content
can potentially be greater than anticipated. • Time
We were somewhat surprised, if not shocked, by the num- Upon reflection, we must also ask whether the focus of this
ber of instances of open conflict in regulations and legislation. work is even something with which RE practitioners should be
Perhaps we were naïve in assuming that the legal structures concerned. What are, and should be, the bounds of RE? Despite
the fact we are pushing the bounds of RE, are we pushing too
far into ethics and overreaching? Are we oblivious to the fact
3
Associates of the lead author actually held what could (charitably) that there are many other people already attempting to address
be called a mini-intervention with him in an effort to determine what these issues?
had caused him to become increasingly negative over the prior six
months.
Other research questions that are prompted by our experi- [6] T. D. Breaux, M. W. Vail, and A. I. Anton. "Towards regulatory
ence, but farther afield from RE include: compliance: Extracting rights and obligations to align
• Do opinion article writers become thought leaders? Are requirements with regulations." Requirements Engineering, 14th
IEEE International Conference. IEEE, 2006.
they good barometers of the populous and their emo-
tions? [7] B. Brown, “Braving the wilderness: The quest for true belonging
and the courage to stand alone”. 2017. New York, NY: Random
• Can we use machine learning across the “wisdom of House
the crowd” as a means to validate what the pundits and
[8] T. A. Byrd, K. L. Cossick, and R. W. Zmud. "A synthesis of
politicians are saying? research on requirements analysis and knowledge acquisition
• Can we extract the core content of each document and techniques." MIS quarterly, 1992, pp. 117-138.
perform formal semantic analysis to identify the biases [9] California State University, Long Beach. “Strategic Energy
in the presentation and to quantify the intensity of the Plan.” California State University, Long Beach. July 5, 2011
bias? We could attempt to identify the ideology of the [10] David Callele, Krzysztof Wnuk. More than requirements:
policy authors, reporters and commentators, but sense Applying requirements engineering techniques to the challenge
that this is far out of our traditional field. of setting corporate intellectual policy, an experience report.
• Are things really “as bad” as the MSM would seem to RELAW 2011: 35-42
want to have us believe? Is it possible to know the rela- [11] V. Cerf, “Unintended Consequences” Communications of the
tive scale of the negative elements – were the reported ACM, vol. 61, March 2018.
negatives only a small proportion of the overall initia- [12] B. Chandrasekaran, "Design problem solving: A task
tives? Were the reported negatives only relatively rare analysis." AI magazine 11.4 (1990): 59
occurrences in the greater context of society? [13] Checkland, Peter. "Systems thinking." Rethinking management
This work has proven to be a rich source of research ques- information systems (1999): 45-56.
tions and opportunities that provide ample pointers towards [14] N. Chomsky, "What makes mainstream media mainstream." Z
future work. First, we want to deepen our analysis using empir- magazine 10.10 (1997): 17-23.
ical methods and expand on this exploratory study with a quan- [15] Results Codebook, https://drive.google.com/file/d/14ErlsN
titative analysis of evidence for said RE challenges. Second, we OOMj79GnXknWvOxu1UtG3ZUB1_/view?usp=sharing
want to use that data for a scenario analysis, applying RE tech- [16] W. N. Dunn, Public policy analysis. Routledge, 2015.
niques to explore whether we can use this form of analysis to [17] Dyer, Ezra. ”That Tesla Battery Emissions Study Maming the
prevent some of the unintended consequences that played out Round? It’s Bunk.” Popular mechanics, June 2017.
in those scenarios. Third, we plan to detail a research agenda of https://www.popularmechanics.com/cars/hybrid-
other opportunities outside of software and systems engineer- electric/news/a27039/tesla-battery-emissions-study-fake-news/
ing where requirements engineering techniques could have [18] J. Entine, "The myth of social investing: A critique of its
significant positive impact and improvement potential for the practice and consequences for corporate social performance
situations under analysis. Finally, we plan to perform an RE research." Organization & Environment 16.3 (2003): 352-368.
analysis of the goals of the GDPR, their feasibility, validation [19] EUREKA “The right to be forgotten”
and verification techniques, and monitor for evidence of unin- https://eureka.eu.com/gdpr/the-right-to-be-forgotten/
Last visited February 28, 2018
tended consequences.
[20] B. Flyvbjerg, "Five misunderstandings about case-study re-
REFERENCES search." Qualitative inquiry, vol. 12, 2006, pp. 219-245.
[21] Forrester, Jay W. "System dynamics, systems thinking, and soft
[1] A. Okhaide, M. Alhaj, D. Amyot, O. Bahy Badreddin, E. OR." System dynamics review 10.2‐3 (1994): 245-256.
Braun, N. Cartwright, G. Richards, G. Mussbacher, Creating [22] E. Griffith, “The other tech bubble” WIRED, December 16,
Quantitative Goal Models: Governmental Experience, 2017, https://www.wired.com/story/the-other-tech-bubble/
ER 2014: 466-473 Last visited February 28, 2018
[2] C. Arora, M. Sabetzadeh, L. C. Briand, F. Zimmer: Automated [23] G. Lorrie “GOLDSTEIN: Trudeau breaks his promise on carbon
Checking of Conformance to Requirements Templates Using taxing” Toronto SUN, December 14, 2017
Natural Language Processing. Trans. Software Eng. 41(10), http://torontosun.com/opinion/columnists/goldstein-trudeau-
2015, pp. 944-968. breaks-his-promise-on-carbon-pricing,
[3] Bahill, A. Terry, and Bruce Gissing. "Re-evaluating systems Last visited February 28, 2018
engineering concepts using systems thinking." IEEE [24] E. Guzman, W. Maalej. "How do users like this feature? A fine
Transactions on Systems, Man, and Cybernetics, Part C grained sentiment analysis of app reviews." Requirements Engi-
(Applications and Reviews) 28.4 (1998): 516-527. neering Conference (RE), 2014 IEEE 22nd International. IEEE,
[4] Boehm, Barry, and Hoh In. "Identifying quality-requirement 2014.
conflicts." IEEE software 2 (1996): 25-35 [25] J. M. Handelman, P. H. Cunningham, and M. A. Bourassa.
"Stakeholder marketing and the organizational field: The role of
[5] T. D. Breaux, D. G. Gordon. "Regulatory requirements institutional capital and ideological framing" Journal of Public
traceability and analysis using semi-formal Policy & Marketing 29.1 (2010): 27-37.
specifications." International working conference on
requirements engineering: Foundation for software quality. [26] J. Harris, “Take it from the insiders: Silicon Valley is eating
Springer, Berlin, Heidelberg, 2013 your soul” The Guardian, January 1, 2018
[27] H. Dagny Hauksdottir, B. Ritsing, J. Christian Andersen, N. procurement process of IT solutions for the Brazilian Federal
Henrik Mortensen: Establishing Reusable Requirements Derived Public Administration” RELAW 2014: 39-40
from Laws and Regulations for Medical Device [42] P. Rozin, E. B. Royzman. "Negativity bias, negativity domi-
Development. RELAW 2016: 220-228 nance, and contagion." Personality and social psychology re-
[28] M. G. Kirschenbaum, “The remaking of reading: Data mining view, vol. 5, 2001, pp. 296-320.
and the digital humanities." The National Science Foundation [43] D. Sculley, M. B. Pasanek. "Meaning and mining: the impact of
Symposium on Next Generation of Data Mining and Cyber- implicit assumptions in data mining for the
Enabled Discovery for Innovation, Baltimore, MD. 2007. humanities." Literary and Linguistic Computing 23.4 (2008):
[29] D. H. Kwak, K. Yu Kyoum Kim, and M. H. Zimmerman. "User- 409-424.
versus mainstream-media-generated content: Media source, [44] Sergot, Marek J., et al. "The British Nationality Act as a logic
message valence, and team identification and sport consumers’ program." Communications of the ACM 29.5 (1986): 370-386.
response." International Journal of Sport Communication, [45] P. Shrivastava, "Is strategic management ideological?" Journal
vol. 3, 2010, pp. 402-421. of management 12.3 (1986): 363-377.
[30] W. Maalej and N. Hadeer, "Bug report, feature request, or simp- [46] J. Snyder, “Canada still to fall short of Paris target”, Financial
ly praise? On automatically classifying app reviews. "Require- Post Canada, December 29 2017,
ments Engineering Conference (RE), 2015 IEEE 23rd Interna- http://business.financialpost.com/commodities/energy/canada-
tional. IEEE, 2015. still-on-pace-to-fall-short-of-paris-target-despite-ambitious-
[31] L. Manovich, "Trending: The promises and the challenges of big climate-policies-un-filings. Last visited February 28, 2018
social data." Debates in the digital humanities, vol. 2, 2011, pp.
[47] G. Soltana, M. Sabetzadeh, L. C. Briand, “Model-Based
460-475.
Simulation of Legal Requirements: Experience from Tax Policy
[32] N. Newman, "Mainstream media and the distribution of news in Simulation” RE2016: 303-312
the age of social discovery." Reuters Institute for the Study of
[48] Sommerville, Ian, and Pete Sawyer. "Viewpoints: principles,
Journalism, University of Oxford (2011).
problems and a practical approach to requirements engineering."
[33] D. Pagano and W. Maalej. "User feedback in the appstore: An Annals of software engineering 3.1 (1997): 101-130.
empirical study." Requirements Engineering Conference (RE),
[49] R. Tawhid, E. Braun, N. Cartwright, M. Alhaj, G.
2013 21st IEEE International. IEEE, 2013.
Mussbacher, A. Shamsaei, D. Amyot, S. B. Ahmadi, G.
[34] Pilling, David. “Clean electric cars are built on pollution in
Richards: “Towards outcome-based regulatory compliance in
Congo”, Financial Times, July 2017
aviation security”, RE 2012: 267-272
[35] Canada’s Greenhouse Gas Emissions: Developments, Prospects
and Reductions, http://www.pbo- [50] E. J. Uusitalo, M. Raatikainen, M.Ylikangas, T. Männistö,
dpb.gc.ca/web/default/files/Documents/Reports/2016/ClimateCh “Experiences from an industry-wide initiative for setting
ange/PBO_Climate_Change_EN.pdf metadata for regulatory requirements in the nuclear
[36] Ports of Long Beach and Los Angeles. “Roadmap for Moving domain”, RELAW 2014, pp. 2-9.
Forward with Zero Emission Technologies at the Ports of Long [51] Van Lamsweerde, Axel, Robert Darimont, and Emmanuel
Beach and Los Angeles.” Roadmap for Zero Emissions – Letier. "Managing conflicts in goal-driven requirements
Technical Report, August, 2011. engineering." IEEE transactions on Software engineering24.11
[37] Birgit Penzenstadler and Jörg Leuser: Complying with Law for (1998): 908-926.
RE in the Automotive Domain. RELAW 2008: 11-15 [52] S. Waddock, "Myths and realities of social
[38] N. Sannier, M. Adedjouma, M. Sabetzadeh, L. C. Briand, “An investing." Organization & environment 16.3 (2003): 369-380.
automated framework for detection and resolution of cross [53] Wikipedia “The right to be forgotten”
references in legal texts”. Requir. Eng. 22(2): 215-237 (2017) https://en.wikipedia.org/wiki/Right_to_be_forgotten,
[39] N. Sannier, M. Sabetzadeh, L. C. Briand, “From RELAW Last visited February 28, 2018
Research to Practice: Reflections on an Ongoing Technology [54] D. K. Wright, M. D. Hinson. "An updated look at the impact of
Transfer Project”. RELAW 2017: 204-208 social media on public relations practice." Public relations
[40] G. Lamartine da Silva Barboza, F. Cysneiros Filho, R. A. C. de Journal, Volume 3, 2009, pp. 68–73.
Souza, “Towards Legal Compliance in IT Procurement Planning [55] Yen, John, and W. Amos Tiao. "A systematic tradeoff analysis
in Brazil's Federal Public Administration”. RELAW 2016: 229- for conflicting imprecise requirements." Requirements
238 Engineering, 1997., Proceedings of the Third IEEE International
[41] G. Lamartine da Silva Barboza, F. Cysneiros Filho, R.A. C. de Symposium on. IEEE, 1997.
Souza “Towards a legal compliance verification approach on the .