Conceptual Framework for Understanding Security Requirements: A Preliminary Study on Stuxnet

Author(s):  
Bong-Jae Kim ◽  
Seok-Won Lee
1980 ◽  
Vol 7 (1-4) ◽  
pp. 103-136 ◽  
Author(s):  
Margaret M. Bubolz ◽  
Joanne B. Eicher ◽  
Sandra J. Evers ◽  
M. Suzanne Sontag

2012 ◽  
Vol 17 (6) ◽  
pp. 761-774 ◽  
Author(s):  
Sangwon Park ◽  
Yvette Reisinger

This article analyzes cultural differences in web communication in the tourism context. the conceptual framework presenting cultural differences in the three types of web communication is developed. the specific hypotheses are tested on the US American and Chinese sample. Although the findings support the developed framework they also reveal nonsignificant differences between the groups. theoretical and practical implications of the findings are identified and recommendations for future studies are made.


Author(s):  
Harinda Sahadeva Fernando ◽  
Jemal H. Abawajy

In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.


2022 ◽  
pp. 247-279
Author(s):  
Inger Anne Tøndel ◽  
Martin Gilje Jaatun

Security requirement work plays a key role in achieving cost-effective and adequate security in a software development project. Knowledge about software companies' experiences of security requirement work is important in order to bridge the observed gap between software security practices and security risks in many projects today. Particularly, such knowledge can help researchers improve on available practices and recommendations. This article uses the results of published empirical studies on security requirement work to create a conceptual framework that shows key concepts related to work context, this work itself and the effects of this work. The resulting framework points to the following research challenges: 1) Identifying and understanding factors important for the effect of security requirements work; 2) Understanding what is the importance of the chosen requirements approach itself, and; 3) Properly taking into account contextual factors, especially factors related to individuals and interactions, in planning and analysis of empirical studies on security requirements work.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Steve Willcocks ◽  
Tony Conway

PurposeThe purpose of this paper is to explore leadership in the context of the policy shift to collaborative working and integration currently being pursued in the UK NHS. As ways of integrating care are being explored in other countries it can be argued that this topic may have wider policy significance. This paper is particularly concerned with leadership in Primary Care Networks in the English NHS.Design/methodology/approachThis paper is a conceptual paper using literature relating to the antecedents of shared leadership and relevant policy documents pertaining to the English NHS. The paper is informed, theoretically by the conceptual lens of shared leadership. A conceptual framework is developed identifying the antecedents of shared leadership that help to explain how shared leadership may be developed.FindingsThe paper identifies the challenges that may be faced by policymakers and those involved in Primary Care Networks in developing shared leadership. It also reveals the implications for policymakers in developing shared leadership.Research limitations/implicationsThe paper is conceptual. It is acknowledged that this is a preliminary study and further work will be required to test the conceptual framework empirically.Practical implicationsThe paper discusses the policy implications of developing leadership in primary care networks. This has relevance to both the NHS and other countries.Originality/valueThere is limited research on the antecedents of shared leadership. In addition, the conceptual framework is applied to a new policy initiative.


Author(s):  
Inger Anne Tøndel ◽  
Martin Gilje Jaatun

Security requirement work plays a key role in achieving cost-effective and adequate security in a software development project. Knowledge about software companies' experiences of security requirement work is important in order to bridge the observed gap between software security practices and security risks in many projects today. Particularly, such knowledge can help researchers improve on available practices and recommendations. This article uses the results of published empirical studies on security requirement work to create a conceptual framework that shows key concepts related to work context, this work itself and the effects of this work. The resulting framework points to the following research challenges: 1) Identifying and understanding factors important for the effect of security requirements work; 2) Understanding what is the importance of the chosen requirements approach itself, and; 3) Properly taking into account contextual factors, especially factors related to individuals and interactions, in planning and analysis of empirical studies on security requirements work.


2021 ◽  
pp. 95-108
Author(s):  
Shirley A. Fitzgibbons ◽  
Carol L. Tilley

This preliminary study of 20 contemporary realistic fiction books for youth in middle school and above, analyzed images of poverty using a framework adapted from Leahy (1981, 1983). Findings indicate that, as a whole, the books in this sample rely on concrete images of poverty and do not adequately represent current demographic data for people living in poverty in the United States. The paper concludes with suggestions for how teachers and school librarians/media specialists can use these books with students.


Sign in / Sign up

Export Citation Format

Share Document