Information quality requirements engineering with STS-IQ

2019 ◽  
Vol 107 ◽  
pp. 83-100
Author(s):  
Mohamad Gharib ◽  
Paolo Giorgini
Author(s):  
Zbigniew J. Gackowski

This chapter presents a logical technology-independent fully content-focused inquiry into the operations quality problems of any symbolic representations of reality. This teleological operations-research-based approach demonstrates that a purpose-focused view, natural within the operation- research (OR) methodology, facilitates faster progress in identifying the fundamental relationships of more lasting validity for business, public administration, and military purposive operations. Products of the Information Quality Programs and Initiatives at MIT (MITIQ Program) serve as recognized research references. It contains definitions of (1)A tentatively universal hierarchical taxonomy of the entire universe of quality requirements, (2) The tentative definitions of the first five tentatively universal operations quality requirements for any situation, (3) An economic sequence of their examination, and (4) The first seven tentatively universal principles in this domain. This quality framework may assist researchers in further studies and assist practitioners in understanding the intricate relationships among operations quality attributes. The chapter presents the tentative results of the author’s research in progress.


Author(s):  
N. R. Mead

In this chapter, we describe general issues in developing security requirements, meth-ods that have been useful, and a method (SQUARE) that can be used for eliciting, analyzing, and documenting security requirements for software systems. SQUARE, which was developed by the CERT Program at Carnegie Mellon University’s Soft-ware Engineering Institute, provides a systematic approach to security requirements engineering. SQUARE has been used on a number of client projects by Carnegie Mellon student teams, prototype tools have been developed, and research is ongoing to improve this promising method.


Author(s):  
N. R. Mead

In this chapter, we describe general issues in developing security requirements, methods that have been useful, and a method (SQUARE) that can be used for eliciting, analyzing, and documenting security requirements for software systems. SQUARE, which was developed by the CERT Program at Carnegie Mellon University’s Soft-ware Engineering Institute, provides a systematic approach to security requirements engineering. SQUARE has been used on a number of client projects by Carnegie Mellon student teams, prototype tools have been developed, and research is ongoing to improve this promising method.


Author(s):  
Elizabeth M. Pierce

This chapter demonstrates how conjoint analysis can be used to improve the design and delivery of mass consumer information products. Conjoint analysis is a technique that market researchers have used since the 1960’s to better understand how buyers make complex purchase decisions, to estimate preferences and importance ratings for product features, and to predict buyer behavior. This chapter describes the steps for performing a conjoint analysis to assess information quality preferences of potential home buyers interested in using a real estate website to help them locate properties for sale. The author hopes that this tutorial will convince information systems professionals of the usefulness of conjoint analysis as a tool for discerning how to prioritize information quality requirements so that the resulting systems produce information products that better serve the needs of their customers.


Author(s):  
Nancy R. Mead

The premise of this paper is that pilot case studies in security requirements engineering provide both benefits and challenges to the underlying research, education, and technology transition effort. Over the past four years we have worked with seven development groups in five organizations in the process of refining and transitioning the Security Quality Requirements Engineering (SQUARE) and SQUARE-Lite methods into practice. These experiences have provided the opportunity to step back and assess the use of pilots in conjunction with student projects to support method refinement and technology transition. Although SQUARE and SQUARE-Lite are concerned with security requirements, the benefits and challenges that have been observed would apply to many security research and technology transition efforts. We itemize and justify these benefits and challenges and discuss their practical relevance and application to ensuring adequate information assurance protection.


Sign in / Sign up

Export Citation Format

Share Document