groupf_report_proposal

37
Proposal Background Young people use a variety of interaction methods: from harmless interactions such as youth clubs and after school meetings, to behaviours that can cause distress to the community such as graffiti and petty crime. Today, the youth culture is so diverse that it would seem impossible to envision a common ground. Technology has reinvented the social wheel, it has created environments that are utilised daily for users to share their opinions and associate with others using an interactive system that is tailored to an individual’s interests. For the Ohara Council, it is easy to see that a social network is the new cultural trend amongst youth. Creating a positive, safe and interactive youth environment is important to any council because it helps to enhance the community. A secondary factor is the long-term benefit a council may provide by investing in its young people. A young person’s upbringing may be the cornerstone of their adult life and aid in the development of their social ethos at such an early stage may help sculpt a contributing member of society. A localised social network can also help to fill the time of teenagers with more constructive activities. As teenagers spend more time in a virtual environment, rather than a physical one, it is logical that fewer problems concerning the youth will arise if their time is better spent online. With Ohara Council setting up their own social network, inclusive of hardware, software and staff, meaning that the community would reap many benefits as it is bespoke. Those involved are the youth who will use this social network and by extension, their parents who are concerned about their safety and privacy. The Ohara Council is doing this for the community as well as the youth, thus adding both the council and the community to the list of stakeholders (although they do not directly use it). Each of these stakeholders’ criteria would ideally be met, but as it is often said, the “customer” does not always know what they want. It is essential to employ a different method of research before querying the stakeholders about their respective needs. A wide spectrum of literature is also a key necessity; the smallest detail can be as crucial as a given axiom when considering young people online. It is undeniable that young people can be, and far too often are, taken advantage of in the privacy of their own home in a virtual environment. Careful attention to detail must be undertaken continuously and iteratively throughout this work-in-progress; it seems suitable to use an iterative development process. This will allow full-flexibility in development, with room for alteration whilst staying on track. The framework of Scrum fits well in this respect.

Upload: a-hassan-azimi

Post on 08-Aug-2015

37 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: GroupF_Report_Proposal

Proposal

Background

Young people use a variety of interaction methods: from harmless interactions such as

youth clubs and after school meetings, to behaviours that can cause distress to the community

such as graffiti and petty crime. Today, the youth culture is so diverse that it would seem

impossible to envision a common ground. Technology has reinvented the social wheel, it has

created environments that are utilised daily for users to share their opinions and associate

with others using an interactive system that is tailored to an individual’s interests.

For the Ohara Council, it is easy to see that a social network is the new cultural trend

amongst youth. Creating a positive, safe and interactive youth environment is important to

any council because it helps to enhance the community. A secondary factor is the long-term

benefit a council may provide by investing in its young people. A young person’s upbringing

may be the cornerstone of their adult life and aid in the development of their social ethos at

such an early stage may help sculpt a contributing member of society.

A localised social network can also help to fill the time of teenagers with more

constructive activities. As teenagers spend more time in a virtual environment, rather than a

physical one, it is logical that fewer problems concerning the youth will arise if their time is

better spent online.

With Ohara Council setting up their own social network, inclusive of hardware,

software and staff, meaning that the community would reap many benefits as it is bespoke.

Those involved are the youth who will use this social network and by extension, their parents

who are concerned about their safety and privacy. The Ohara Council is doing this for the

community as well as the youth, thus adding both the council and the community to the list of

stakeholders (although they do not directly use it). Each of these stakeholders’ criteria would

ideally be met, but as it is often said, the “customer” does not always know what they want. It

is essential to employ a different method of research before querying the stakeholders about

their respective needs. A wide spectrum of literature is also a key necessity; the smallest

detail can be as crucial as a given axiom when considering young people online.

It is undeniable that young people can be, and far too often are, taken advantage of in

the privacy of their own home in a virtual environment. Careful attention to detail must be

undertaken continuously and iteratively throughout this work-in-progress; it seems suitable to

use an iterative development process. This will allow full-flexibility in development, with

room for alteration whilst staying on track. The framework of Scrum fits well in this respect.

Page 2: GroupF_Report_Proposal

The problem to be solved is privacy, the most pertinent difficulty in this age of technology.

Any misjudgement where privacy is an issue can have serious ramifications. The ability to

protect these fragile digital footprints in a professional and precise manner is one in which

Scrum can yield many benefits.

Objectives

When given the task of creating a proposal for a social network site for children aged

between 12-18 years old, the team quickly realised that there are several issues that would

need to be dealt with; there are many concerns related to youths using the Internet and social

networking sites. First and foremost, there are matters related to the safety of the young users.

The age of the people involved causes a very dangerous conflict between their legal rights

and their need for social communication through medium of the Internet. Without the proper

education and protection, inexperienced users can quickly find themselves in uncomfortable

and possibly even dangerous situations. An example of such a situation could be getting

approached by an unknown individual online, or photos of users appearing online without

their consent. The proposed social networking site will have protective features in place, to

prevent these things from happening.

Another common problem that the proposed social networking site needs to take very

seriously is cyberbullying. This is something that happens quite frequently amongst

adolescents online and it can cause an abundance of problems. The wellbeing of children is

related to how they perform at school and later in life, which further justifies why

cyberbullying needs to be eradicated. A secondary goal of the project is to also create a social

networking site that gets the children more involved in the youth department of the council. It

is suggested in this proposal that this can be achieved by creating a playing area online that is

simultaneously safe, fun and educational.

In this proposal, the software development framework of Scrum is being used.

Something so agile, focused and flexible, yet structured can ensure that all of the questions

are answered and that all of the problems discovered are resolved quickly. This will also

build the requirements through research conducted by the team. Evaluation of literature,

studies and publications will allow the research team to approach the given problem of

privacy with an in-depth knowledge, reinforcing the way the difficulties of such a sensitive

subject is being approached.

Page 3: GroupF_Report_Proposal

Literature Review

In order to design the aforementioned website, the team had to go through previous

research that had been done in the field and find the issues which may be faced, and propose

solutions for them. In order to have more refined and focused research, the team analysed the

issues with privacy within the structure of the proposed social networking site. There are

several fundamental issues in creating a social networking site that need to be considered,

especially when it comes to young people. Disclosure of personal information is one of the

major issues; therefore, it is crucial that it is controlled in order to prevent the potential

consequences. According to Bryce and Klang (2009), there are a variety of ways in which

young people disclose their personal information online. They could be giving it out in

passive ways, such as posting on profile pages or blogs; they could be actively divulging this

information via chats and e-mail. This is a serious concern to the Ohara council and the team,

seeing as this could lead to potential risks such as cyberbullying or online sexual exploitation.

They also examined the level of choice and control over information disclosure. Users have a

high level of control and choice over what they disclose in interactions, but very low control

over its potential uses by others. However, a case study done by Gross and Aquisti (Beye,

Jeckmans, Erkin, Hartel, Lagendijk) states that users do not change the default privacy

settings provided by social networking sites, despite the fact that they are easy to use.

Furthermore, Tuffield and Harris have stated that a study has been done on young

Americans who are active social networking site members. The study shows that young

Americans were uneducated towards issues relating to privacy; 42 percent of young

Americans answered all of the five online privacy questions incorrectly, while 88 percent

answered only two or fewer correctly. In another study done by Stoddart (2011) school

children want to protect their online privacy, but many of them do not know how.

Bryce and Klang conclude that, to control this behaviour, one of the main strategies to

employ is encouraging safe and responsible use of the Internet by educating children and

increasing awareness. Also Beech,et al.,(2012) show that grooming can be another

consequence of giving out sensitive information, therefore it is fundamental to take

preventative measures by developing education for youths against online abuse.

Privacy largely involves keeping information in its intended scope. A breach can

occur when information is shared with a party for whom it was not intended. It can also

happen when information is abused for a different purpose than was intended, or when

information is accessed after its intended lifetime. This is also reflected in data protection

Page 4: GroupF_Report_Proposal

laws, such as the Data Protection Act of 1998 in the United Kingdom, where limitations are

imposed to the extent and duration of use of personal data. (Beye et al.)

Different operating environments complicate the use of security and safety settings on

individual devices. Numerous applications that are the disposal of children tend not to

disclose the company’s data collection and sharing practices. Nor do they usually provide

easy-to-use opt-out options for parents or children (Holloway, Green and Livingstone, 2013).

Browsing history and user interactions are rich sources of information. Preferences,

friendships or even explicit data such as physical location can be inferred from them.

Teenagers who use social networking sites as a platform to flirt are 300% more likely of

being harassed online in comparison to those who do not (Sengupta, Chaudhuri, 2011). 11%

of UK children have encountered sexual images online (although, 41% of parents are

unaware of this), 8% say they have been bullied on the internet (21% say that have been

bullied at all, online or offline), 12% of 11-16 year old internet users have received sexual

messages and 4% have sent them (UK Council for Child Internet Safety, 2010). These

statistics show that there is a strong need for the content of websites to be monitored.

Hunter (2004) found that when bullied, most 9 to 14-year-old schoolchildren told

their friends or families rather than their teachers. From that research, it was also found that

when students were cyber bullied, most of them reported telling their friends. Students may

be reluctant to tell their families and teachers about cyber bullying because they might find

their friends to be more tech-savvy and therefore a better resource for advice. (Aricak et al.,

2008)

In conclusion, educating young people on how to use the social networking sites

privacy settings and how to protect their personal data is the main safeguard against abuse.

Also, increasing awareness with both parents and social networking sites providers is another

way of protection.

Work Packages

Focus and Objectives:

The goal that the team is working towards is to create an independent social

networking site for children and teens who are involved with the council’s youth department

while simultaneously keeping them safe while online. One of the main concerns that the

council has is privacy and how much information children are able to give away freely online

to strangers, without realising how this can be harmful and damaging to not only themselves,

Page 5: GroupF_Report_Proposal

but the people around them as well. The council is also extremely focused on the ability that

children have to easily form relationships within the social network. Forming relationships on

the social network will help children engage with one another, on and offline, about common

interests and ideas they might want to share.

Resources:

During the course of the project, the team would be comprised of six members. Each

member of the team will have a specific job role within the project. A product owner and

scrum master will be elected by the team and each of the other members will have a

designated topic to produce. The project will take an estimated fourteen weeks to complete

from start to finish. The team will meet on a weekly basis for an average of four hours to

discuss progress, difficulties, successes and goals. Team meetings can and will be held if

deemed necessary by the scrum master. Each member of the team will be responsible for

producing quality work each week and all work will be reviewed by the team, critiqued and

revised if necessary. Every member of the team will have access to readily available hard and

software that includes but is not limited to: monitor, keyboard and CPU, each being the

component of a computer, drawing boards for note taking and team discussions, notebooks

used for personal notes, printers for printing leaflets and informative documents and Internet

access for web searches and use as a multi-person platform for a collaborative workspace.

The budget has been set by the team through an analysis of each component of the project,

based on the resources needed. Furthermore, each task assigned to a team member has a

smaller budget within itself, to keep the team on track with it is finances. Once the project is

completed, the team will implement a group of unbiased testers to test the project for any

technical, aesthetic, grammatical and usability flaws. The testers will also check for relevance

of the project based on the specifications provided by the Ohara council.

Deliverables:

With the completion of the project, the team intends to deliver a fully functional

social networking site for children that is to be delivered to the Ohara council. In order to

clearly state the deliverables, the team has compiled a list of deliverables broken down into

different categories.

Hardware deliverables:

Server rental and equipment that are required to run the social network: a suitable

server and equipment. These will be chosen by the team to host the social network online. A

Page 6: GroupF_Report_Proposal

partner hosting company will provide a lease for the server and its equipment and will

maintain it at a specified rate. Increased complexity of the social network’s functionality and

user base growth will likely require an upgrade of the server; use of additional servers might

be considered in the future.

For an additional cost, technical support can be provided to look after the server faults

and technical problems that might arise. Contracted technical support will ensure that the

server’s technical problems are resolved in a timely manner, meaning the website will be up

and running at all times.

Software deliverables (website-specific)

Software packages to maintain the website: The team will install and configure any

software required to run the social network. With contracted technical support software

updates, monitoring of resources and intrusion will be included. Verifiable parental consent

will be also implemented to restrict children of certain ages from registering for an account

on the social network. It will be a social network’s feature in which users under a set age

have to get their parents to verify their account by either post or telephone. After each age

verification request, the social network’s administrators will be able to either allow or refuse

the request by using administrator’s access to the social network. A graphical user interface

(GUI) will be provided.

Opt-out option for data sharing will be available at the time of the user registration

and the user will later be able to change the option in the user settings page. The option will

simply disallow any data sharing that otherwise, if data sharing is allowed, would be used for

internal and third party user data analysis, or to provide personalised content. Also, User

Access Control will be implemented so that a user will be able to cease all connections with

specified users, meaning that the access to user’s activity, profile and communicating will be

denied for blocked people and vice versa. The social network will have tracking features that

will enable the client to track user behaviour within the website for different reasons such as

betterment of existing features, or personalised content for the user. Users will have an option

to opt-out off tracking features, or disable it later in user settings page.

User management features will be provided for the administrators which will include

user management functionality such as user deletion and suspension, giving users warnings

for misconduct, and editing user details. This feature will allow the administrators to update

user details to keep them accurate and warn and prevent offending users from further

misconduct. User interaction monitoring feature will be implemented for the administrators to

Page 7: GroupF_Report_Proposal

monitor user interactions for any harassment, cyber-bullying, flirting, sexting, or other

inappropriate communication and content between the users. Live monitoring with automated

word filter will be provided to monitor the user interactions. When the monitoring system

reports a user, administrators will be able promptly warn and suspend users, or treat the

automated report as a false-positive meaning it has mistakenly been treated as a positive.

With the delivery of this feature the team will provide sample abuse scenarios with possible

outcomes to help you define the boundaries between user warnings, user suspensions, false-

positives, and cases where further action is required. The sample scenarios can then be

adjusted to meet your internal requirements and/or the law. The administrators will also be

able to access any previous reports and warnings of users at any given time.

User reporting feature will extend the user interaction feature and will allow users to

report cyberbullying, harassment and other misbehaviour of other users to the administrators.

Users will be able to select the type of misconduct so the administrators would be able to

prioritise and handle the reports based on importance. Private profile setting will be

implemented to allow social network users to keep their profiles private. Private profiles

would hide information such as thumbnails, messages on friends’ pages, tags, team

membership from users that are not added as friends. When users register for the social

networking site, the setting will be turned on by default, and users will have the option to

change the setting after registration.

The social network’s users will have access to functionality to delete their own

content. This feature will however keep the content archived, but not accessible by the public.

This is to avoid the users from fully deleting the content which may have to be used as

evidence in more serious cases of misconduct. A feature to notify a different user login

location will be implemented so a user would be notified if his/her account is being used from

a different location than usual (e.g. further than 50 miles radius of usual location, or a

different country). This will help users detect any odd locations and act on it promptly by

changing their password or contacting the website administrators. Users will be able to add

current session locations to a safe location list to prevent the system sending further

notification e-mails.

Other deliverables

The team will provide software documentation with the delivery of the software. The

documentation will consist of two parts. Part 1 will be end-user documentation that will

Page 8: GroupF_Report_Proposal

include information on how to use the website, from both user’s and administrator’s

perspectives. Part 2 will include technical software specification, maintenance requirements,

key files for the website, overall website’s file structure, as well as documentation on

functions, subroutines, variables and constants used in the source code. Part 2 is going to be

an important for maintaining the website, and future feature updates as it will include

information on how the social network is coded, so that it can be used by future developers to

familiarise with the source code.

Benefits

To ascertain that a parent is present when their child is using services such as social

networking sites creates many benefits when concerning legal integrity. This provides an

informative approach to exactly what the social network will provide. This concept is known

as “verifiable parental consent benefit” [1] (Bauman & Tatum, 2009). It encompasses direct

communication to the parents and sufficient control of their Childs activity. Furthermore, it

ensures that only the parent of the child for whom consent is being requested, can access and

respond to these requests. This process will also record and report a parent’s reply to a

consent-request to the operator. If need be, it will request to revoke consent earlier granted so

that they have their child’s personal information removed immediately. Opting out of data

sharing ensures that nobody will be able to share user data without their consent. It simply

allows registered and non-registered people to contact them or view their profile, preventing

identity theft from anyone whether they use the social networking site or not.

Turning off the tracking feature means you will get rid of the unique ID identifier

cookie saved in your device, which prevents the social networking website from tracking

your location, as well as sharing that information with other people, advertisers and

marketing corporations. By being able to cease connections with other users who are

displaying abusive behaviour, users will be less vulnerable to online harassment. This feature

will help with the number of reported and unreported cases of online bullying each year.

Hopefully, this will deter users who either deliberately or accidentally display abusive

behaviour while interacting on a social networking site. Monitoring the interaction of users

for signs of harassment helps maintain healthy communication and aids administrators in the

hopes of terminating an abusive conversation before it begins. It is also a useful feature for all

types of stakeholders. Parents can view their child’s activity whenever they deem fit. An

administrator of the network can warn users and remove accounts that are displaying abusive

behaviour to prevent them from any misuse. By monitoring the content of the website, it will

Page 9: GroupF_Report_Proposal

prove that it is reliable for children to have an account, because lots of advertisers and

marketing companies do not care about their viewer’s age. Checking everyone’s history and

behaviour when reported is beneficial when it comes to social participations such as joining

groups, having conversations and debates. Sometimes within such debates, children do not

know how to handle it; the debates can then become problematic and they therefore must be

reported in order to prevent children from accessing them again. The benefit of not sharing

information such as thumbnails, messages, friends, pages, tags, group membership etc. is to

ensure that a child cannot be found online by predators.

Having a report feature allows users to report instances of abusive behaviour, for

example, bullying, to admins, which can be tracked down and prevented in the future. In

addition, the victim could receive support from teachers if they wished; teachers would be

able to help solve their issue or report to a higher authority if need be. Educating the masses

about online privacy could help teach children how to better use social networking, for

example things such as: the amount of time they should spend online, appropriate photo

sharing, what information to share and what not to share and genuine friend’s requests. One

of the main benefits in having children educated about online social networking is because

the lines between public and private are unclear for children and it is vital to get them to

comprehend the limits of online privacy. Unusual activity alerts such as sending email when

user login from different location that normally login could raise the question of whether they

recognize this activity or not (Beye et al., 2010) If not, then an option to change their

password immediately could be sent to prevent their account from being hacked. Having an

educational page about online grooming upon registering is beneficial to prevent things like

that from happening. Children need to understand that not everyone on a social networking

site or in a chat-room is necessarily who they say they are. Private information should only be

shared with family and friends whom children have met in real life and not just in a social

networking site. Moreover, if children wish to meet with someone whom they’ve met in a

social networking setting, they should inform their parents and also be accompanied by one

for their own safety. If a child is aware of the dangers, they will become a more responsible

online user. Deleting content that has previously been posted will stop predators from

stalking users and help protect user’s activity by deleting old posts (Madden, 2012). A user

might wish to delete old posts for any number of reasons, such as: irrelevancy, unimportant

or too old.

Page 10: GroupF_Report_Proposal
Page 11: GroupF_Report_Proposal
Page 12: GroupF_Report_Proposal
Page 13: GroupF_Report_Proposal
Page 14: GroupF_Report_Proposal
Page 15: GroupF_Report_Proposal
Page 16: GroupF_Report_Proposal
Page 17: GroupF_Report_Proposal

Sprint Backlog 1

Sprint Duration: October 21st– October 28th

User Story Tasks

1 I demand that

“verifiable parental

consent” is used in

the collection, use or

disclosure of

personal information

for my child/children

Design the Verification Request Page

Code the Verification Request Page

Test the Verification Page

Save any file(s) relation to the consent request to the database

2. I want to easily

opt out of data

sharing to ensure my

child's privacy

Create Opt-out button in privacy section

Code the Opt-out button

Design the UI

Test the Out-out button

I want users to have

the option of ceasing

connections with

other users who are

having abusive

behaviours

Design "block user communication" button

Design "unblock user communication" button

Code the "block user communication" button

Code the "unblock user communication" button

Test the "block user communication" button

Test the "unblock user communication" button

Page 18: GroupF_Report_Proposal

I want to be able to

turn off tracking

features

Design tickbox button for registration page

Design tickbox button for settings page

Code the tickbox buttons

Test the tickbox tracking option

Page 19: GroupF_Report_Proposal

Sprint Backlog 2

Sprint Duration: October 28th– November 3rd

User Story Tasks

1 I want to see

monitoring of user

interactions to see if

they are being

harassed online

Design activity report page

Code activity report page

Test the Verification Page

Save any file(s) relation to the consent request to the database

Test the activity report page

Update terms and conditions page

Design automated word filter UI

Code automated word filter

Test automated word filter

Design live monitoring system

Code and implement live monitoring system

Test live monitoring system

Create possible abuse scenarios with outcomes (for admin use)

Page 20: GroupF_Report_Proposal

Sprint Backlog 3

Sprint Duration : November 3rd

– November 10th

User Story Tasks I want to have the

ability to warn a user

or delete their account

Code user warning function

Test warning function

Code account deletion function

I want to see

monitoring of user

interactions to see if

they are flirting

Categorize flirting keyword

Add keywords to filtering system

Apply filtering system to pages

Test the applied filter on pages

Page 21: GroupF_Report_Proposal

Sprint Backlog 4

Sprint Duration : November 10th– November 17th

User Story Tasks

I want the website’s

content to be

monitored so that

inappropriate content

would not be seen by

my child

Analyse new keywords to determine what leads to inappropriate content

Add new keywords to filtering system

I want everyone's

history and

behaviour to be

checked when

reported

Code report function

Test report function

Create profile history function

Test profile history function

Code administrator page to give access to history and behaviour of users

Page 22: GroupF_Report_Proposal

Sprint Backlog 5

Sprint Duration : November 17th– November 24th

User Story Tasks 1.I want my

information such as

thumbnails, messages

on friends’ pages, tags,

group membership etc.

not to be shared even

when my profile is

private

Create option for profiles to be private

Set private option as default option Disable sharing function if profile is private

2.I want to report

instances of cyber

bullying to computer-

savvy teachers or

administrators

In the report function, add a new option to report cyber-bullying Create a procedure that administrators follows in the case of a reported bullying

3.I want users to be

better educated in how

online privacy works

Create a privacy tutorial that has to be completeted in order to access main functions

of the page. Create a game that quiz the user about privacy and security online Create function that gives every user profile a golden star if they finish the privacy

quiz Test tutorial

Test game

4.I want to be able to

delete content that I

posted

Create deletion function

Test deletion function

Page 23: GroupF_Report_Proposal

Sprint Backlog 6

Sprint Duration: November 24th– December 1st

User Story Tasks 1. I want the system to

send me an email

when I login from

different location than

I normally login

Let system access, store and encrypt the location of each user

Create a function when logging in, that check is the location is the same as normal.

Create an automatic email that is sent to the users email, if the locations don't match

In the email, create a function that let's the user "add location to preferred locations"

2. I want the awareness

of children to be

increased by educating

them on risks of online

grooming

Add info about online grooming to the privacy tutorial and to the quiz game.

Page 24: GroupF_Report_Proposal

References

Annual Report to the Parliament of Canada (2011), Report on the Personal Information

Protection and Electronic Documents Act

Aricak, T., Ahhan S. S., Uzunhasanoglu, A., Saribeyoglu, S. , Ciplak S., Yilmaz N., &

Memmedov C., (2007). Cyberbullying among Turkish Adolescents

Bauman, S. and Tatum, T. 2009. Web Sites for Young Children: Gateway to Online Social

Networking?.Professional School Counseling, 13 (1), pp.2

Beye, M., Jeckmans, A., Erkin, Z., Hartel, P., Lagendijk, R. and Tang, Q. n.d.Privacy in

Online Social Networks. [e-book] p. 13.

Bryce, J. and Klang, M. 2009. Young people, disclosure of personal information and online

privacy: Control, choice and consequences. Information Security Technical Report, 14 (3),

pp. 160--166.

Cohn, M. (2012). ScrumMaster.

COPPA. (1998). Child Online Privacy Protection Act p. 1,2,5,9

Holloway, D., Green, L. and Livingstone, S. (2013). Zero to eight: young children and their

internet use

Hunter, S. C., Boyle, J. M. and Warden, D. 2004. Help seeking amongst child and adolescent

victims of peer-aggression and bullying: The influence of school-stage, gender, victimisation,

appraisal, and emotion.British Journal of Educational Psychology, 74 (3), pp. 375--390.

Madden, M. 2012. Privacy management on social media sites. p. 3.

Marwick, A. E., Diaz D. M. , Palfrey J. (2010),Youth, Privacy, and Reputation

Schwaber, K. (1994). Agile Project Management with Scrum p. 9

Sengupta, A. and Chaudhuri, A. 2008. Are Social Networking Sites a Source of Online

Harassment for Teens? Evidence from Survey Data. p. 4,5,6,7.

Tuffield, M. and Harris, S. n.d. Pudsey of a Friend: Issues and Concerns. [e-book].

UK Council for Child Internet Safety (2010), Good practice guidance for the providers of

social networking and other user-interactive services

Whittle, H., Hamilton-Giachritsis, C., Beech, A. and Collins, G. (2012) 'A review of

online grooming: characterstics and concerns', Journal of Aggression and Violent

Behaviour, 18 (1), pp 62–70.

Page 25: GroupF_Report_Proposal

Report

Project Objectives

The first objective was to design a social networking website for a local council,

which will be used by children, aged twelve to eighteen. The team was required to research

any issues regarding the design and to propose solutions. In order for the team to differentiate

between issues that were more or less important, a mass literature search was conducted. The

conclusion was that the most pressing concern was privacy. Once the research had been

completed, user stories were identified. In order for the Scrum work to be completed, a

backlog refinement meeting was planned. From there, sprints, daily Scrum, sprint reviews

and sprint retrospective meetings were outlined. The product backlog items were mulled over

multiple times in order to make sure they were up to the INVEST standards: independent,

negotiable, valuable, estimate, small and testable. (Cohn, 2010) Within the Scrum framework

of project management, it states that a product backlog has to be created; user stories should

be prioritized by asking and voting for each item within the product backlog. (Schwaber &

Sutherland, 2013)

Each member of the team is responsible for reaching a sprint goal and negotiating

which items from the product backlog will be committed to a specific sprint backlog. Within

each sprint backlog, requirements of each sprint are clarified and tasks are identified. Work is

then divided between each member of the team, depending on availability and amount of

time that it will take to complete each task. Once all sprints have been defined and assigned,

the work is completed, followed by a sprint review meeting of the tasks that have been

completed. Lastly, work is then reviewed, finalised and considered to be “Done” before being

presented to the council. Having a clear definition of “Done”, helps the team work together

more collaboratively. It helps to increase clearness and even eventually results in the

consistent development of a high quality of work. This ultimately means the creation of

software that has been properly tested, which can then be made for immediate use of its

intended users.

Page 26: GroupF_Report_Proposal

Estimating and Planning

After the product owner provided the team with a compiled list of user requirements

collected from stakeholders, the user requirements were translated into user stories as

required; the development framework of Scrum was applied (M. Cohn, 2004). The user

stories were then broken down into smaller tasks which allowed the team to have a better

understanding of the size of each user story; each user story had to be prioritised and have its

size estimated. The use of user stories combined with Scrum’s estimation and planning

techniques has allowed the team to work on the project’s deliverables in an organised way.

The team estimated the size of each user story by using story points and Scrum’s

Poker planning technique. Story points helped to determine how much time and effort was

required for each user story to be implemented. Scrum’s Poker planning technique allowed

each member of the team to fairly participate in the story point size estimation process. This

has proven to work in several instances, because we have found that the high or/and low

estimators’ reasoning has led to a change of the initially allocated story points after re-

estimating.

To prioritise the user stories the team has carried out Kano model analysis which

allowed the determination of the customers’ needs with respect to feature desirability. The

completion of the analysis provided the team with the user stories that were categorised into

categories of must-have, linear, exciter, and indifferent features. The mentioned categories in

Kano model determined the priority and because the must-have features are expected by the

end-user, it was important to implement them first, otherwise the team would not have met

the client’s expectations. Linear features were second most important to implement as they

could have caused customer dissatisfaction if not implemented, but increase customer

satisfaction if implemented. Exciter features were third most important to implement as they

would not cause customer dissatisfaction if not implemented; indifferent features were least

important because they wouldn’t affect the customer satisfaction at all.

The team chose to use weekly sprint iteration because the project’s completion

timeframe was short. Frequent, weekly sprint iterations have also helped the team to maintain

a steady workflow and a prompt response to any tasks that haven’t been completed in any of

the sprints on time. To reduce the effort spent on estimating, large and uncertain-size user

stories were marked as epics, as they may not fit into one sprint.

Page 27: GroupF_Report_Proposal

Product Owner and Product Backlog

A clear distinction for the role of the product owner must be made when using Scrum

to create a proposal. There are obvious roles within the scope of the project; however,

deriving user stories from these roles tends to cause uncertainty. Categorising certain roles

such as a “report writer” is vague and covers the entire group role as a collective. Naturally, it

was decided to distinguish the stakeholders of the proposal using their roles in the same way

in which Scrum works. A group of six would be split into the three roles of Product Owner,

Scrum Master and the team. Although the third categorisation involves four of the six people

involved, the empirical nature of Scrum means that it would not enhance the project by

giving any specificity to the roles of these people; the definition is used to initially define

different stakeholders and their requirements. A fortunate facet to the project is that there are

six parts to the proposal. This is, however, a double edged sword as these are defining roles

within themselves; they would have to act as a parallel to the aforementioned roles, but not

mentioned in the product backlogs to ensure clarity. Once each user had settled into the roles

and the capturing of requirements had begun, it was easy to assume the roles that had initially

been defined.

In the proposal, the complexity of the task had been exacerbated by the fact that it was

necessary to assume the roles of the stakeholders. The users, their parents and the

administrators were all theoretical users and fictional stakeholders based on the literature.

This was used to identify the target demographic and to envision the scope of their

requirements. The benefit of having the “stakeholders” in the room for the completion of the

proposal was that real questions could be asked and answered. Real user stories could be

derived from a person who had actually invested in the project. It was therefore decided that

user stories would initially refer to the most relevant role to create specific user stories. The

format of a user story had potential to be utilised in the understanding of why certain parts of

the proposal are important, but it had some pitfalls. One of these arose when the purpose of

each component in the proposal was questioned. Here is an example: “As a team member, I

want to write the background because...”, this is where the difficulty began. It is not enough

to say that the background must be written as it is necessary to complete the work as they are

all equally necessary components. When it would come to using the Kano model, each user

story would be identical as no stakeholder would be satisfied with the absence of any vital

component within the proposal. It could be argued that prioritisation could still occur in later

stages, when referring to the Scrum Master. However, it is not fulfilling the purpose of the

Page 28: GroupF_Report_Proposal

Product Owner's role or the purpose in Scrum and a new approach needed to be taken. The

way in which such user stories were to be structured had everything to do with the content of

the user story and the purpose behind it. The user story was, therefore, defined using that

person’s role and why it is an important feature within the scope of the project. Little has

changed but the assumed role of each stakeholder was to be one that defines the purpose of

the part within the proposal. A version of the user story would then be “As a team member, I

want to write the background so that people understand the purpose of the project.” Once this

structure had been adopted, the first iteration could begin.

The first product backlog, as it would be expected, was naturally quite rudimentary, as

it is necessary to use the iterative nature of Scrum to give the project depth and to let it

“evolve”. The face value of the requirements, at first glance, seemed to suggest that the work

was to be completed and nothing more. A great emphasis in Scrum is placed in the definition

of the word “done”; this may be a qualitative and/or quantitative argument within the scope

of the proposal (Schwaber & Sutherland, 2013). The dynamic nature of the product backlog

was dependent on the two factors which have just been discussed i.e. its “evolution” upon

iteration and how that alters the definition of the word “complete”. An example of how this

occurred would be in the “benefits” section of the proposal and how it alters according to the

“literature review”. Upon iteration, the literature review would uncover certain aspects of the

“Privacy” theme which were perhaps omitted beforehand. Certain laws were discovered to be

relevant to child privacy such as the Child Online Privacy Protection Act of 1998 (COPPA,

1998). Though this law pertained to the United States of America, the international nature of

the Internet and the potential for the servers allocated to be located outside of the United

Kingdom meant that international law must be taken into consideration. Once this was

established the user story “As the product owner, I want the literature review to cover a

diverse demographic because it is necessary to consider all potential users” needed to be

changed. For clarity and to reinforce the appropriation of the user stories, it was decided that

it is most relevant to the product owner because it is their role to “deliver the vision”

(Schwaber, 1994). The vision in this case, is privacy, which has many legal implications and

ramifications if it is not handled correctly. The new content of this user story within the

product backlog is as follows “As the product owner, I want the literature review to cover a

diverse demographic, including but not limited to; international law because there are legal

responsibilities a social network must embrace.” This is one example of how the product

owner changed the product backlog as they are responsible for the contents, grouping and

prioritisation of the product backlog and ensuring the scope of the project is clearly

Page 29: GroupF_Report_Proposal

envisioned. Below is an example of the second iteration of the product backlog, with the new

user story in context.

Scrum Master and Sprint Backlog

The Scrum Master is responsible for making sure that the Scrum Master and Product

Owner are performing -Cohn, (2012). A Scrum Master helps to develop the Product Owner’s

effectiveness by helping them find ways to maintain the Product Backlog and release plan.

Therefore, in the team, Scrum Master Hassan Azimi designed a Sprint Backlog to visualise

the tasks related to every specific user stories, the time the team needs to do the tasks, break

down and divide the tasks between team members and estimating the time which the team

needs to do all tasks as well as individual tasks.

The team’s Product Owner was responsible to prioritise the user stories. Requirements

from each team members related to the issue captured in the Product Backlog. One of the

important theories was evaluating the requirements, particularly those on the top of the

Product Backlog, to be better communicated as INVEST; independent, negotiable, valuable,

estimable, small, and testable user stories (Cohn, 2012). The other important material was

reassuring that does everyone knows how to use Scrum. Azimi helped inform team members

by displaying everyone’s job and or building visible charts in Sprint Backlog. Although

prioritizing the Product Backlog Item was one of the Product Owner’s, Azimi also helped

Berry to organize backlog items into suitable releases and priority collections.

Arranged Sprint Planning Meetings by Azimi or sometimes Berry helped the team to

define objects that resulted from these meetings, which was a Sprint Target and a Sprint

Backlog. Furthermore, the Scrum Master arranged meeting stand-up for everyone asking

what they have done, what they are going to do and what their problems have been. It is

obvious that the group must have a definition of complete and in each Sprint review meeting,

each team member acknowledged if any of their items is “complete”.

Another responsibility of the Scrum Master was to eliminate obstructions to the

team’s progress as far as Scrum is concerned. The Scrum Master promotes teamwork, which

means the group itself should eliminate problems wherever is possible.

Azimi served the product owner in several ways, including discovering techniques for

effective Product Backlog management, openly communicating vision, targets, and Product

Backlog items to the Development Team, teaching the Scrum Team to create clear and

concise Product Backlog items, apprehending long-term product planning in an empirical

Page 30: GroupF_Report_Proposal

environment, apprehending and practicing agility and facilitating Scrum events as requested

or needed.

Sprint Meetings

Sprint Meeting 1 Date: October 3rd

What was done:

• The group members got together for the first time

• Decided that Jake Berry was going to be the Product Owner, and Hassan Azimi was the

Scrum Master

• Chose a particular area of the proposed social network site to focus on, which

was privacy.

• Split up the task of finding literature into smaller tasks, and delegated them to the

different team members

Sprint Meeting 2

Date: October 10th

What was done:

• Decided to continue finding literature related to the problems regarding social networking

sites, privacy and security.

• Talked about how the proposed social networking site could work for youths. This

discussion

side-tracked after a while, the group might have benefitted from better leadership.

Sprint Meeting 3

Date: October 14th

What was done:

• Shared our main findings from the literature, discussed if the sources were credible.

• Some of the team members missed this meeting, which was unfortunate for the group

and for the coursework progression.

• Decided that the task for next meeting was to create user stories from the chosen literature.

Sprint Meeting 4

Date: October 21st

What was done:

• Presented and discussed the user stories of the different team members

• Prioritised desirability of the user stories in order to create the product backlog

Page 31: GroupF_Report_Proposal

Sprint Meeting 5

Date: October 28th (Reading Week)

What was done:

• Started making Sprint Backlogs

• Finalised the Product Backlog

Sprint Meeting 6

Date: November 4th

What was done:

• Found some additional literature that was turned into user stories and added to the

product backlog

• Not much else was done during this meeting; the group was not very productive

Sprint Meeting 7

Date: November 11th

What was done:

• Started planning the work on the proposal

• Delegated different parts of the proposal to the different team members, the work was

delegated as follows:

Jake Berry - Background

Joakim Randulff - Objectives

Hassan Azimi - Benefits

Shannon Greene - Work Packages

Zilvinas Pikelis - Work Packages

Sediqa Rezaee - Literature Review

Sprint Meeting 8

Date: November 18th

What was done:

• Reviewed what had been done for the proposal so far

• Continued working on proposal parts

Sprint Meeting 9

Date: November 25th

What was done:

• Started planning the work on the report

• Delegated report parts to different team members; the work was split up as follows:

Sediqa Rezaee - Objectives

Zilvinas Pikelis - Estimating and Planning

Jake Berry - Product Backlog

Hassan Azimi - Sprint Backlog

Joakim Randulff - Sprint Meetings

Shannon Greene - Critical Review

Page 32: GroupF_Report_Proposal

Sprint Meeting 10 Date: December 2nd

What was done:

• Some team members worked on their part of the proposal, others on the report.

• Started stitching together the proposal, and began the process of proofreading and

correcting mistakes.

Sprint Meeting 11

Date: December 9th

What was done:

• Continued working on proposal and report

• Decided some deadlines for when different parts of the coursework should be finished

over the winter break.

Page 33: GroupF_Report_Proposal

Critical Review

During the course of the project, a few valuable lessons were learned about the

meaning of teamwork. There were a great number of benefits in completing this project and

many more important lessons learned. The overall outcome of the project was a success, with

only a few complications that were overcome easily.

The most obvious benefit that was received from completing this project would be a

better understanding of how Scrum is implemented. The Scrum method is very beneficial

when it comes to managing a project. It was found that once the techniques that Scrum used

were understood, it was very easy to apply them to the project. Another major benefit from

this project was the importance of working in a team. It was obvious from the beginning that

if a team is not willing or able to participate in group work, then this project would be a

failure. Throughout the project, good communication was maintained; this helped over time.

All members of the team were willing to stay in constant communication with one another

through means of Google Docs, Facebook, text messaging and phone calls. Lastly, it was felt

that the team learned how to effective time management during the course of this project. It

was instantly clear the team would have to keep up with a set schedule in order for all of our

work to be completed by the due date with a high quality of standard.

Within every team, there are bound to be a few issues that arise. One of the main

concerns throughout the course of the project was the lack of communication in terms of the

assignment specifications. This only occurred during the first half of the project. Each

member of the team had a different idea of what the assignment was about and how it was to

be completed. There was some confusion on the team’s general understanding of the given

task, but once the project was discussed in more in depth, the difficulty was conquered.

The second most imperative issue that was faced during the project was attendance.

Having six members in one group, it was difficult for everyone to be present at all times.

There were many meetings where all members were present and ready to work, but just as

many meetings took place where at least one or two members of the team were not present or

late. Keeping the team informed of all decisions that are made at meetings is difficult when

not every member is present. Also, when advice and feedback was sought through a module

leader, each member of the team would interpret that information differently. It’s easy to pass

on misconstrued information to a team member when solely relying off of memory and a

personal interpretation of information given.

Throughout the duration of the project, almost every member of team put in an ample

amount of effort to ensure that work was produced in a timely fashion, while also keeping it

Page 34: GroupF_Report_Proposal

at a high level of quality. The division of labour was equal, but the effort put in by each

member of the team was not. There were times when a team member didn’t contribute the

amount of proficient work that was thought to be required of them. This in turn, caused a

strain on the other members of the group who would have to make up for this redundancy.

Also, keeping to a time table was a difficulty faced. Most of the team members were prompt

with their work and wouldn’t have to be asked to show proof that their work had been

completed, whereas there were instances where a team member would have to be asked,

sometimes numerous times, to produce a piece of work.

Lastly, keeping all members of the team informed on the update of our personal

efforts was impractical. From the beginning, a shared folder on the Google Drive was set up

meaning the collaborative sharing and editing of work was possible. In most cases, a team

member would upload an entire document to the system and then other team members would

be open to view and edit it at their leisure. It was found that on occasion, some ideas and

instructions would be misconstrued so that a piece of work was either not relevant or not up

to the standard of quality that was aimed for and would have to be heavily edited. In these

instances, it would have been beneficial to have more frequent meetings with updates on

advances in the assignment. This would have prevented an entire portion of work from

having been done incorrectly and having to spend time on correcting it.

Though the team had these weaknesses, there were a greater number of strengths. The

grace period between an inquiry from a member of the team and a response from another

member of the team was sufficient and productive. In most cases, responses from team

members were immediate or shortly after the inquiry had been made. In worst case scenarios,

it would only take from twelve to twenty four hours for a team member to respond to a

question that had been posted. Taking all aspects of a person’s daily activities into

consideration, this seemed like a reasonable and appropriate amount of time.

The team also collaborated very well. In the beginning of the project, there was some

confusion as to what the specifications of the assignment were, but as more time passed and

more insight was gained, the team was willing to help one another accomplish tasks in a

timely manner while simultaneously maintaining a high standard of work. Nearly every

member of the team was willing to put in the necessary effort. Throughout the course of the

project, almost all members of the team were focused, driven and attentive.

There were many aspects of this project that were crucial to its success. One of the

main supporting team elements was Google Docs, a virtual environment where the team

could have a collaborative workspace that was editing enabled. When it was time for all team

Page 35: GroupF_Report_Proposal

members to produce a certain part of the project, Google Docs was very helpful with regard

to making a collective document of all work that had been fashioned. After the initial

introduction of the project, most of the team had a good understanding of what was being

expected of them. Some members of our team had background knowledge in Scrum, which

proved to be incredibly beneficial. Those who didn’t have said knowledge quickly did

independent research to keep themselves informed and on track. The team was very good at

helping one another, each member was assigned a specific part of the project to manage and

produce. If a question was to arise not pertaining to a certain team members designated work,

they would usually attempt to help and respond to the question. Nearly every member of the

team was willing to help if necessary. Another advantageous standpoint was that most of the

members were always on time and presents to workshops and scheduled meetings. Over the

course of the semester, meetings were held which were additional to the scheduled

workshops. Almost every member of the team was present to these meetings and on time.

Lastly, one of the most beneficial aspects of our group was the fact that every member was an

avid Facebook user and therefore could read and respond to inquisitions at their own leisure,

almost any time of day.

Through many trials and tribulations of all sorts, the project was a success. The team

managed to pull through and produced a piece of collaborative work which was a lesson in

the practice of Scrum as well as teamwork.

Page 36: GroupF_Report_Proposal

Product Backlog

Priority Estimate Sprint User type User Story

1 8 1 Product Owner As the product owner, I want the

literature review to cover a diverse

demographic, including but not

limited to international law because

there are legal responsibilities a

Social network must embrace.

2 5 1 Sprint Master As the Sprint master, I want to aid in

the understanding of scrum because

the team, as a whole is partially

dependent on my knowledge of it.

3 3 2 Team Member As a team member I want the work

packages to be clearly defined so

people understand what needs to be

done.

4 5 2 Product Owner As the product owner, I want to

emphasise the vision of privacy

within

the proposal because I am

committed to this project.

5 5 2 Team Member as a Team member I want the

literature review to be from credible

sources so that our information is

valid.

6 3 2 Product Owner As The product owner I want the

benefits to be reflective of the

literature review so we can solve

problems based on relevant

problems.

7 5 1 Sprint Master As the Sprint Master, I need to

implement scrum where necessary

to ensure the project is complete

within the correct framework.

8 5 3 Product Owner As the product owner I want the

objectives to represent the view of

all

stakeholders so that the empirical

data is valid

9 3 3 Team Member As a team member I want to write

the background so that people

understand the purpose of privacy

within a social network for young

people.

10 3 3 Team Member As a team member I want the work

packages to be of a manageable size

so that the work is measurable.

Page 37: GroupF_Report_Proposal

References

Cohn, M. (2004). User stories applied. Boston: Addison-Wesley. p. 3,4,5,6)

Cohn, M. (2012). ScrumMaster (2012). The Scrum Almanac. Berlin: iBooks.

COPPA. (1998). Child Online Privacy Protection Act.

Schwaber, K. (1994). Agile Project Management with Scrum

Schwaber, K. and Sutherland, J. 2013. The Scrum Guide. p. 12, 13, 14, 15.