scholarly journals A Framework for Enhanced Tropos Goal-Driven Risk Assessment in Requirements Engineering

2018 ◽  
Vol 7 (2.23) ◽  
pp. 510
Author(s):  
ShankarNayak Bhkukya ◽  
Dr Suresh Pabboju

Every process model used by software industry has different phases including requirement engineering. This is the crucial phase as it is preceded by other phases and provides valuable inputs to the design phase. Risk assessment made in this phase can help avoid wastage of time, effort, cost and budget overruns and even missed delivery deadlines. Traditionally risks are analyzed in terms of technical aspects like failures in the working system, unavailability of certain services, and fault intolerances to mention few. The identified risks are used to have countermeasures. However, it causes the life cycle of the system to be repeated right from the requirements engineering. On the contrary, risk analysis in the requirements engineering phase can prove fact that a stitch in time saves nine. Therefore early detection of risks in the system can help improve efficiency of software development process. Goal-oriented risk assessment has thus gained popularity as it is done in the requirements analysis phase. Stakeholder interests are considered to analyze risks and provide countermeasures to leverage quality of the system being developed. In this paper, a formal framework pertaining to Tropos goal modelling is enhanced with quantitative reasoning technique coupled with qualitative ones. Towards this end we used a conceptual framework with three layer such as asset layer, event layer and treatment layer. We used a case study project named Loan Origination Process (LOP) to evaluate the proposed framework. Our framework supports probability of satisfaction (SAT) and denial (DEN) values in addition to supporting qualitative values. The Goal-Reasoning tool is extended to have the proposed quantitative solution for risk analysis in requirements engineering. The tool performs risk analysis and produces different alternative solutions with weights that enable software engineers or domain experts to choose best solution in terms of cost and risk. The results revealed the performance improvement and utility when compared with an existing goal-driven risk assessment approach.  

Author(s):  
Cheah WaiShiang ◽  
Aida Shafreena bt Ahmad Puad ◽  
Puah Chin Hong ◽  
Alfian Abdul Halin

<span>Mobile application development is receiving much attention nowadays. With the enhancement of mobile application tools like an Android studio, etc. and kinds of online support, the development of the mobile application is getting easier. Indeed, mobile application development is not a trivial task. When given a particular problem, a novice mobile programmer will commonly sketch the mobile interface followed by coding. The rapid prototyping technique and trial from errors have led to issues such as poor domain understanding. We argue that a complete understanding of the domain is needed for mobile application development. Hence, requirements engineering is an important phase. This paper introduces a technique to assist mobile application development through Agent-Oriented Requirements Engineering (AORE). AORE consists of goal modelling to analyse and understand a mobile-based project. With goal modelling, AORE allows a modeller to identify and analyse the functionalities and non-functionalities of the system and present a holistic view of the proposed system. It showcases the services, operations and constraints of the proposed system. AORE is a useful part of the development phase and can complement current steps in mobile application development lifecycle.</span>


1997 ◽  
Vol 60 (11) ◽  
pp. 1432-1438 ◽  
Author(s):  
STEVE C. HATHAWAY

The international food safety environment is currently in a unique period of reevaluation and change. In an emerging trading environment regulated more according to food safety requirements than nontariff trade protection barriers, food safety risk analysis is pivotal to future Codex activities and implementation of the World Trade Organisation (WTO) Sanitary and Phytosanitary (SPS) Agreement. Development of guidelines for food safety risk assessment requires determination of scope, internationally agreed definitions, general principles, guidelines tailored for each class of foodborne hazards, and linkages and interactions with risk management and risk communication. Food safety risk assessments need to be soundly based on science, should incorporate the four analytical steps of the risk assessment paradigm, and should be documented in a transparent and readily understandable form. The particular needs of Codex, the WTO, national governments, industry, and consumers need to be taken into account, and this includes identification of the essential linkages between risk assessment and the design of HACCP plans. With respect to chemical hazards in food, a risk assessment approach provides the opportunity to broaden the understanding of acceptable daily intakes, maximum residue levels, and their public health significance. Guidelines for chemicals in foods will inevitably have to address the differences between safety evaluation and a genuine risk assessment approach. With respect to microbiological hazards, the unique problems associated with risk assessment of living organisms in food make it likely that application of guidelines in the medium term will more commonly use qualitative approaches. In the absence of a history of safety evaluation according to a notionally zero risk baseline, as is the case with chemicals, the objective of microbiological risk analysis to reduce microbial risks to “the minimum which is technologically feasible and practical” represents a genuine focus for risk assessment. As risk assessment is increasing applied and internationally accepted guidelines become established, decision criteria for risk management arguably present the greatest challenge in establishing and maintaining quantitative SPS measures for food in international trade and judging their equivalence. However, the desire of all interested parties for scientifically justified food safety measures may be tempered according to the ability of the global scientific community to generate the necessary data and the political will to accept food safety programmes in different countries that have equivalent outputs.


2017 ◽  
Vol 15 (1) ◽  
pp. 79-103 ◽  
Author(s):  
Nini Xia ◽  
Xueqing Wang ◽  
Ye Wang ◽  
Qiubo Yang ◽  
Xing Liu

Purpose Previous research has little specific guidance on how to improve large infrastructures’ risk analysis. This paper aims to propose a practical risk analysis framework across the project lifecycle with Bayesian Networks (BNs). Design/methodology/approach The framework includes three phases. In the qualitative phase, primary risks were identified by literature reviews and interviews; questionnaires were used to determine key risks at each project stage and causal relationships between stage-related risks. In the quantitation, brainstorming and questionnaires, and techniques of ranked nodes/paths, risk map and Bayesian truth serum were adopted. Then, a BN-based risk assessment model was developed, and risk analysis was conducted with AgenaRisk software. Findings Twenty key risks across the lifecycle were determined: some risks were recurring and different risks emerged at various stages with the construction and feasibility most risky. Results showed that previous stages’ risks significantly amplified subsequent stages’ risks. Based on the causality of stage-related risks, a qualitative model was easily constructed. Ranked nodes/paths facilitated the quantification by requiring less statistical knowledge and fewer parameters than traditional BNs. As articulated by a case, this model yielded very simple and easy-to-understand representations of risks and risk propagation pathways. Originality/value Rare research has developed a BN risk assessment model from the perspective of project stages. A structured model, a propagation network among individual risks, stage-related risks, and the final adverse consequence, has been designed. This research provides practitioners with a realistic risk assessment approach and further understanding of dynamic and stage-related risks throughout large infrastructures’ lifecycle. The framework can be modified and used in other real-world risk analysis where risks are complex and develop in stages.


Author(s):  
Joseph Nyansiro ◽  
Joel Mtebe ◽  
Mussa Kissaka

E-government information systems projects in developing countries face several challenges that lead to their partial or total failure. Several causes of e-government information systems project failure have been identified, including inadequate requirement engineering. The overall failure rate of e-government information systems projects due to requirements engineering inadequacies is still high. Inadequate requirement engineering leads to systems with missing features, low quality, project costs, and time overrun. This research aims to design a framework to guide practitioners in e-government information systems requirements engineering processes. The design science research approach and qualitative data collection and analysis methods were applied through three iterative cycles of rigor, design, and relevancy.  The proposed framework is based on goals and viewpoints requirements engineering. It consists of three models: the e-government viewpoints model, the e-government goals model, and the e-government requirements engineering process model. The framework was validated through two rounds of Delphi focus group discussion techniques and a single technical action research case study. The results showed a strong consensus among practitioners about the proposed framework's ease of use and utility with a mean agreement of 4.429/5. The technical action research involved five practitioners who applied the proposed framework to discover the requirements of the road emergency response module of road safety information systems of Tanzania. A total of 104 requirements were discovered compared to nine requirements elicited before without using the proposed framework. The overall objective of the proposed framework is to facilitate the discovery and specification of adequate and relevant requirements for e-government information systems projects and ultimately reduce the rate of e-government projects failure and contribute to the realisation of e-government benefits.


2020 ◽  
Vol 5 (2) ◽  
pp. 98-105
Author(s):  
Seif El Islam Bouasla ◽  
Youcef ZENNIR ◽  
El-Arkam MECHHOUD

The purpose of this work is the risk assessment of a stabilizer reflux drum using HAZOP - Fault tree - Event tree approach. This risk assessment approach aims first of all to identify potential accident scenarios using Hazard an Operability study (HAZOP), these scenarios need more detailed frequencies estimation, it is performed thanks to fault tree analysis. Then, to analyze events issuing after success or fail of safety barriers, the event tree is used. Finally, in order to better appreciate accident scenarios, ALOHA is utilized to simulate them.


Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.


2021 ◽  
Vol 190 ◽  
pp. 105319
Author(s):  
Gustavo Machado ◽  
Luis Gustavo Corbellini ◽  
Alba Frias-De-Diego ◽  
Gustavo Nogueira Dieh ◽  
Diego Viali dos Santos ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document