Security Requirements Engineering in the Wild: A Survey of Common Practices
|
|
|
- Tamsyn Blair
- 10 years ago
- Views:
Transcription
1 Security Requirements Engineering in the Wild: A Survey of Common Practices Golnaz Elahi Department of Computer Science University of Toronto, Canada [email protected] Eric Yu Faculty of Information University of Toronto, Canada [email protected] Tong Li, Lin Liu School of Software Tsinghua University, China tong,[email protected] Abstract Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements in real-world practice? This paper intends to answer such questions through a survey of security requirements engineering practices. 374 software professionals from 237 International and Chinese rms participated in the survey. The results show businesses often try to consider security from early stages of the development life cycle; however, ultimately, security is left to be built into the system at the implementation phase. We observed that practitioners favour qualitative risk assessment rather than quantitative approaches, and this helps them consider more varieties of factors when comparing alternative security design solutions. Keywords-Requirements Engineering; Security Requirements; Common Security Attacks and Vulnerabilities; I. INTRODUCTION Security attacks against new services (e.g., social media) and new operating environments (e.g., mobile devices) emerge rapidly. Costs of security breaches are a huge burden on governments and businesses. Various governmental or academic institutes survey the current security trends, and report discovered vulnerability, breaches, and their costs (e.g., CERT maintains and publishes reports of discovered vulnerabilities, Open Web Application Security Project (OWASP) keeps track of top web application security risks). Most of security-related surveys focus on trends of vulnerabilities and breaches, but security Requirements Engineering (RE) practices that are actually adopted in industrial projects are unclear. Although we have a relatively extensive knowledge about common vulnerabilities and historical attacks (e.g., NVD, CWE, NIST), the real-world approach to software security, (e.g., the modeling and analysis techniques that are used in practice) are not well studied. Few research studies have sough for answers to these questions: How security expectations of stakeholders are involved in security RE practices? What modeling methods are used as part of the activities for eliciting, analyzing, and documenting security requirements? Do practitioners use available empirical security knowledge sources such as National Vulnerability Database (NVD), Common Weakness Enumeration (CWE), and security standards? Do practitioners analyze vulnerabilities and attacks, evaluate their risks, and then decide on security solutions? Do practitioners rather assess risks and attacks qualitatively or quantitatively? The answer to these questions helps understand current practices; Researchers and practitioners would learn from successful and failed methods, which helps evaluate whether the research on security RE has contributed to real-world practices. Such studies can lead to identifying methods and activities that are actually needed, and uncover main and immediate challenges of practitioners which demands further research focus. This paper reports on an empirical study to answer some of the raised questions about security RE practices in the wild. The survey consists of a series of questions about security RE practices in a number of Chinese and International rms located in China. In this work, we survey how software professionals deal with security requirements and make trade-offs in practice, what are their sources of security knowledge, and what explicit security RE modeling and analysis methods they use. Based on the survey results, we develop hypotheses about current practices and methods of security requirements analysis, and extract a set of criteria for a practical and systematic security requirements modeling and analysis method. II. PURPOSE AND RESEARCH QUESTIONS The purpose of this study is to draw an understanding of real-world security RE practices. This study intends to discover practical challenges, which help us form hypotheses about missing or inef cient security RE methods. The goals of this study are to discover: The development stage that security concerns are considered. The approach to security requirements elicitation, modeling, and documentation. Security knowledge sources and standards that are exercised by software professionals. The approach to identify and analyze potential attacks for risk assessment and elicitation of security requirements. III. RESEARCH METHODOLOGY This work is an exploratory study to form hypotheses about actual practices and knowledge sources for dealing with security requirements in real-world software projects.
2 Three different research methods can typically help for such purposes: ethnography, interview, and survey. Interviews and specially surveys may pose various biases due to questions phrasing, multiple-choice questions that are biased toward speci c answers, ambiguous questions, and data analysis methods. Ethnography studies may prevent many of such biases and provide a very detailed and accurate observation of the activities within teams and individual practitioners. However, accomplishing ethnography studies takes a long time while can target a limited number of rms or usually one team within one organization. In contrast, surveys are quick ways to collect uniform and massive amount of data from multiple and different rms and contexts. A. Structure of the Survey The survey in this study consists of 18 multiple choice questions. The list of questions and multiple choices are available in [1], and due to space limitations, we do not repeat questions in this paper. The questions focus on different aspects or methods related to security RE practices: 1.General and background: The rst group of questions gather general information about the type of the business domain, size of participating organizations, respondents background and education, their role in the organization, and the use of security standards in the organization. We also asked about the regulation of security practices across the organization. 2. Security requirements: The second group of questions in the survey inquiries about the (security) RE practices such as modeling notations, documentation methods, and knowledge sources. 3. Security trade-off analysis: This group of questions investigates how security countermeasures are analyzed and whether security trade-offs are considered in selecting security mechanisms. 4. Security risk and attacks analysis: Finally, in the fourth group of questions, participants were asked about the risk assessment methods and consideration of common attacks in evaluating risk and eliciting security requirements. B. Data Collection Method In this survey, 400 software professionals from 237 Chinese and International organizations/ rms (located in China) were contacted, from which, 374 subjects participated in the survey. The survey was sent electronically to a network of software professionals, which had previous collaborations with the lead researcher in this project. Respondents feedbacks were collected through a web-based survey. C. Participants Participants of the survey are software professionals of diverse roles from 237 Chinese organizations or branches of International companies in China. The majority of participating organizations belong to the IT industry (71 %), and the remained are involved in various sectors such as education, nance, banking, etc. 58 % of the companies are private businesses, 15 % are government-owned corporations, and the rest are multi-national rms, government agencies, and universities. Table I lists roles of 374 participants in the survey. The majority of participants described their role as programmers (48 %), and in addition, 49 business and requirements analysts, 87 designers, and 63 project managers also responded to the survey. 64 % of the participants have post-secondary education in computer science. IV. RESULTS AND OBSERVATIONS The survey of security RE practices shows interesting and surprising security RE trends. This section provides the most signi cant observations as well as some correlation between different practices. A. Signi cant Findings Security education and training: good enough. 55 % of total participants had received security training during postsecondary education, and 27 % had received security training at their jobs. 17 % of the participants never had any security training. Table 1 shows the status of security education and training with respect to their roles. IT and network specialists have received more security training than other groups, at their jobs and in total. Other groups with highest percentage of security training are requirements engineers and designers. Since, in total only 17% of participants have not received any security training, the population of participants have a suf cient security awareness to provide relevant feedback in the survey. Adoption of security knowledge sources: moderately widespread. 48 % of the respondents use security standards or guidelines. 42 % stated that they themselves do not use any security standard or guideline, however, security standards are used in their organization. Among the participants who use security standards, 51 % use Common Criteria and 19 % use ISO Security Standard. Figure 1 summarizes the use of different security knowledge sources. Although security knowledge portals such as NVD and CWE provide extensive and updated information about critical common vulnerabilities, 2 % of participants were familiar with these portals and use them in security RE activities. The direct conclusion from this observation is that requirements analysts elicit security requirements isolated from known vulnerabilities. We hypothesize that these resources are not well known enough or they are not designed in a usable fashion. The vast amount of information provided in most of these knowledge sources are overwhelming, which makes nding relevant information to target domain, platforms, and technologies challenging. The most popular sources of security knowledge are standards (30 %), books and design patterns (30 %), and
3 Table I SECURITY TRAINING STATUS FOR DIFFERENT ROLES governmental security standards (12 %). We hypothesize that the widespread use of standards usually stem from compliance requirements and audit processes. Patterns and best practices are favored by designers because these resources are reliable and easy to use. Figure 1. Security knowledge sources used by participants. Security requirements elicitation and documentation: not a common practice. The survey results show that security requirements are often left undocumented, although analysts consider security issues at the early stages of the development. Only 9 % of participants expressed that they explicitly document security requirements. 59 % of participants expressed that they consider security requirements (implicitly), without documenting them explicitly. 31 % expressed that they do not elicit security requirements at all, which con rms the existing belief that security requirements are not typically analyzed in enough detail and from early phases of the development life cycle [2]. This survey con rms the common belief that the software engineering community is beginning to realize that information and application security is also important for software whose primary function is not related to security [3]. For example, a decades ago the software engineering community started to move from the penetrate and patch approach to preventing the introduction of security vulnerabilities in the design and coding phases [4]. This survey shows security is not only considered at the coding and testing phases, and security requirements are being analyzed in earlier stages, often implicitly and sometimes explicitly. Security is about trade-offs, but these trade-offs are usually ignored. The majority of participants (88 %) stated that security requirements and mechanisms may cause tradeoffs with other requirements and goals. In their opinion, security most often has con icts with performance, ef ciency, and some functionalities and features. 23 % of participants do not consider multiple alternative security solutions for a given problem. From the rest of participants, 65 % expressed that they only consider security level or nancial costs, or both to make trade-offs and select a solution among multiple alternative solutions. We concluded that trade-off analysis with full understanding of interactions among all requirements is not a common practice. Consideration of common attacks: once bitten, twice shy. 72 % of the participants stated that they document security attacks that have occurred, look for common attacks, or consult with security experts to prevent common attacks. The rest of the participants (28 %) do not consider attacks that have happened in the past as a source for eliciting security requirements. This shows that software professionals generally think about common attacks to elicit security requirements, thus, security RE frameworks need to provide methods to extract security requirements by relating them to common attacks (and vulnerabilities) and evaluating security countermeasures by the level of protection they provide against well-known attacks. Security risk assessment: qualitative methods are favoured. Majority of the respondents (82%) expressed that they analyze security risks. Respondents were given four options for evaluating security risks: 1- Qualitative labels of Low, Medium, High (33% selected) 2- Ordinal scale of 1-9 (49% selected) 3- Ordinal scale of (8% selected) 4- Risks in terms of nancial costs (10% selected). This observation indicates that evaluating risks in low-granular scales is preferred to detailed and numerical measures. Conceptually, the ordinal scales of Low, Medium, High, 1-9, and are similar ways to assess risks; however, nearly half of the respondents state that the scale of 1-9 is more feasible and useful than the scale of Only 8 % of the respondents prefer the scale of Table II summarizes the relation of participants role to their opinion about the most feasible and useful measures to evaluate security risks. Compared to other roles, designers and requirements analysts are more interested in assessing risks in qualitative measures that have a low granularity. Business and security analysts relatively show more interests
4 Table II USEFULNESS AND FEASIBILITY OF DIFFERENT SCALES FOR RISK EVALUATION FROM PARTICIPANTS POINT OF VIEW in using nancial costs than other groups. Project managers tend to avoid assessing risks in granular scales more than some other roles. This shows that a silver bullet method for risk assessment may not be favoured by all professional roles in software development. The use of modeling notations: it is surprisingly widespread. 20 % of the respondents document requirements in the natural language, and 54 % structure requirements into tables. 57 % also use some UML models to express the requirements, and 68 % use non-uml models. The majority of respondents (73 %) expressed that they use standard or tailored modeling notations in their RE practices. Half of the respondents use tailored modeling notations for dealing with security requirements, 36 % use the same modeling notations that they use for analyzing other types of requirements, and 19 % use a totally different modeling notation for analyzing security requirements. A decade ago, security requirements and policies were seemed to be largely independent of system requirements and system models, and typically, system requirements and design are done rst, and security is added as an afterthought [2]. This survey shows that businesses have begun to realize the importance of considering security in modeling and analysis activities from earlier stages of the development. B. Correlation Analysis We pertained correlation analysis to discover relations and trends between different security RE practices. For example, is there any relation between the role of participants, such as requirements engineer, designers and security analyst, and taking more systematic approaches in dealing with security requirements? Does the risk evaluation method correlate with the diversity of factors that practitioners take into account for selecting countermeasures? We apply Chi-square test to examine the statistical signi cance of the correlations. This test uses frequencies and proportions from a sample to test hypothesis about the corresponding population. Chi-square test works based on obtaining the observed frequency (i.e., the number of individuals in each category) and calculating the expected frequency (i.e., the hypothetical sample distribution that would be obtained if the sample proportions were according to the null hypothesis) [5]. The more the observed frequency differs from the expected frequency, the higher the probability of a signi cant correlation between elements being observed. Security requirements elicitation and documentation. Unexpectedly, we discovered that there is no correlation between the roles of respondents and their approach to security requirements elicitation. Intuitively we expected to see that requirements engineers and security experts would elicit and document security requirements more explicitly than other roles do, but they tend to leave identifying and operationalizing security needs to developers. The survey results show that project managers are relatively more sensitive about eliciting and documenting security requirements compared to any other group. Project managers interest in security may stem from their responsibility to assure security or may be due to the fact that managers are asked to take security into account from higher level management. While the survey clearly shows security is left to be achieved by the implementation team, relatively, developers show the least interest in security concerns. The Chi-square test shows a signi cant correlation between explicit security requirements elicitation and consideration of common attacks. 50 % of the participants who do not consider eliciting and documenting security requirements, do not consider common attacks to elicit security requirements either. 86 % of the participants who document security requirements explicitly, tend to document or consider security attacks as well. In order to explore why some analysts tailor common modeling techniques for security analysis (or use a different notation), we analyze the correlation between modeling notations and the consideration of common attacks in security RE. Our initial hypothesis was that analysts may need a tailored or different modeling technique to deal with security requirements if they analyze attacks and vulnerabilities. However, the Chi-square test does not con rm our hypothesis strongly. There is a (non-signi cant) correlation between the subjects who look into attack and vulnerability data bases or ask security experts about common attacks and the type of modeling notation that they use when dealing with security requirements. 68% of participants who look into common attacks, tailor their modeling notations or use a totally different notation for analyzing security requirements. We hypothesize that attack and vulnerability analysis requires speci c security modeling elements which are not provided in common modeling techniques.
5 Security risk assessment. The Chi-square test shows that there is a signi cant correlation between using qualitative risk assessment and considering multiple factors to select a solution among alternatives. We found out that people who assess risks qualitatively tend to consider more varieties of factors for selecting a solution. (56 % of respondents who use multiple criteria to decide on a security solution prefer qualitative risk assessment methods). We hypothesize that applying qualitative risk assessment methods require less detailed information about decision criteria, thus practitioners are able to take more diverse factors into consideration. The correlation analysis shows that there is also a statistically signi cant correlation between neglecting risk analysis and considering nancial costs as the only factor: people who do not assess risks tend to consider only nancial costs for selecting a solution. 83 % of respondents who expressed that they assess risk qualitatively, stated that evaluating risks by labels like Low, Medium, High or in the scale of 1-9 is more feasible than using nancial costs or more detailed scales. Respondents who prefer to assess risks quantitatively, in a later question, showed more interest in using Low, Medium, High and the scale of 1-9 (84 %) than the scale of and nancial costs (16 %). This shows that the scale of 1-9 is understood both as a qualitative and quantitative method for assessing attacks impacts. The Chi-square test shows a statistically signi cant correlation between the way the respondents elicit requirements preferences and the use of qualitative evaluation to assess the risks of attacks. Participants who rather using qualitative labels such as Low, Medium, High for evaluating risks, tend to rank requirements based on preferences instead of assigning numerical importance weights to each requirement. V. THREATS TO VALIDITY This section discusses the biases and threats to validity of the survey results. We discuss how the impact of biases can be reduced. A. Survey Biases The quality of collected data in this surveys is subject to various validity issues. For example, factual questions sometimes elicit invalid or inaccurate answers. What respondents report as what they do may not accurately correspond to what they actually do. Small changes in wording of survey questions sometimes produce major changes in responses. The context in which a question is presented often has an impact on the way respondents answer questions. Although this research is not prompted by prede ned hypotheses, the research did not start without any preconceived expectations. However it is possible that researchers have had strong values and commitment to the topic. For example, we expected that the study would show security requirements are not dealt in early phases of the development, security requirements are not usually gathered and communicated explicitly, and security trade-offs are invisible to the decision makers. Such hypotheses may have in uenced the survey, questions phrasing, and data analysis methods. Nevertheless, the survey results do not con rm some of the assumptions, which shows our initial hypothesis did not lead the survey toward biased conclusions. B. Bias Reduction Strategies Before lunching the survey, rst a pilot survey was conducted to examine the questions wording and discover ambiguities in questions. The results of the pilot survey showed that some questions might be confusing, encouraging, or leading, which we corrected them in the actual survey. The pilot questionnaire was designed in English language. In order to avoid misinterpretations of questions by participants, in the nal survey, the questionnaire was translated to Chinese language. The accuracy of responses is veri ed by having multiple respondents with similar roles in the same organization whose descriptions of the methods and practices should be similar. For example, in a rm with 8 respondents, 7 participants con rm that they consider common attacks, 6 respondents described their risk assessment method similarly, and 7 expressed that they do not use modeling notations. In total, although there exist few inconsistencies, the majority of responses converge toward similar directions. In another approach to check the consistency of answers, a number of questions were repeated with different phrasing. For example, the risk assessment approach was investigated in more than one question. We compared the results with respect to these two questions, which shows there is a consistency between respondents answers. For example, respondents who assess risks quantitatively, in later questions, showed more interest in using qualitative scales for evaluating the risks of attacks (84 %). VI. RELATED WORK A few empirical surveys study the current RE practices [6], [7], [8], [9]. Similar eld studies and survey of current practices have been conducted speci cally on security RE methods. In [10], the requirements documents of 11 Swedish software projects have been analyzed and the study concluded that security requirements are inconsistent and poorly speci ed. Mouratidis et al. [11] conducted a survey to explore the rationale that governs implementation of information systems and network security expenditures. Another group of work focus on interactions of users with security mechanisms and human factors in developing secure solutions [12], [13]. There are industrial surveys that show the criticality of considering security measures in developing software systems, e.g., by estimating the costs of data breaches [14]. The study published by National Cyber Security Alliance [15] looks at security training within companies of variety
6 of scale. WhiteHat website security statistics report [16] surveys the number of serious vulnerabilities in large, medium and small organizations. Such eld studies and surveys of security practices do not uncover the methods and processes adopted by practitioners for eliciting, documenting, and analyzing security requirements. Studies such as [10] are useful to evaluate the performance of current security RE approaches, but these studies do not shed light on methods being used and their utility and usability. VII. SUMMARY AND CONCLUSIONS This paper describes an empirical study of security RE methods in real-world practice. In this study, different software development roles and positions in a number of Chinese and International rms were surveyed. We surveyed the approach in industry to security requirements elicitation, involvement of attacks and risk in the analysis, and the use of modeling, risk assessment, and quanti cation. We observed security requirements are not often explicitly elicited and documented in the early stages of the development, but instead are mostly considered during the implementation phase. The common approach about security requirements analysis has been the Penetrate and Patch scenario [4], but this survey shows the patching process has been replaced by secure software development at the coding stage. In contrast to some existing assumptions about the lack of security training [17], in this survey, requirements engineers, product managers, software designers, and programmers stated that they have had security training and also use security knowledge sources and standards. We conclude that security requirements are usually handled similar to other requirements and by ordinary software professionals. Trade-offs between security and other quality requirements are usually invisible to the software professionals. At the same time, most of the available body of software security knowledge is either unknown to the software professionals, and are not practical or are not intertwine with security RE activities. Therefore, a practical security RE method needs to provide enough guidelines and methods for software professionals that are not security experts, and help them incorporate available security knowledge (from standards, check lists, web portals) into security requirements analysis activities. Security RE methods need to provide ways to identify security trade-offs and help decision stakeholders make an explicit and informed judgement. A major limitation of this work is that the survey does not provide justi cation or explanations for the observations or correlations among practices. Assessing security risks by using qualitative value is more favoured by the practitioners, but we cannot conclude whether this is due to the unavailability and inaccuracy of detailed measures, lack of time and budget to acquire such measures, complexity of quantitative methods, or due to the lack of knowledge and training.. Another limitations of this study is the population biases. The security was conducted in China within a number of Chinese and international rms, which may not represent the global view of the security RE methods. ACKNOWLEDGMENT Financial support from Natural Science and Engineering Research Council of Canada, National Natural Science Foundation of China grant number and is gratefully acknowledged. REFERENCES [1] G. Elahi and E. Yu, Security Requirements Engineering Practices in the Wild: A Survey, available at ftp://ftp.cs.toronto.edu/csrg-technicalreports/610/surveysuvrey Questions, [2] P. T. Devanbu and S. G. Stubblebine, Software engineering for security: a roadmap, in Proc. of ICSE 00. ACM, 2000, pp [3] I. A. Tondel, M. G. Jaatun, and P. H. Meland, Security requirements for the rest of us: A survey, IEEE Software, vol. 25, pp , [4] G. Mcgraw, Testing for security during development: Why we should scrap penetrate-and-patch, IEEE Aerospace and Electronic Systems, vol. 13, pp , [5] F. J. Gravetter and L. B. Wallnau, Statistics for the Behavioral Sciences. Wadsworth Publishing, [6] J. Aranda, S. Easterbrook, and G. Wilson, Requirements in the wild: How small companies do it, Requirements Engineering,, vol. 0, pp , [7] L. Liu, H. Zhang, F. Peng, and W. Ma, Understanding chinese characteristics of requirements engineering, Requirements Engineering, [8] K. El Emam and N. H. Madhavji, A eld study of requirements engineering practices in information systems development, in RE 95, 1995, p. 68. [9] D. Zowghi and D. Damian, Field studies of requirements engineering in a multi-site software development organization: research in progress, in Proc. of Australian Workshop on Requirements Engineering, [10] J. Wilander and J. Gustavsson, Security requirements - a eld study of current practice, in E-Proc. of the Symposium on Requirements Engineering for Information Security, [11] H. Mouratidis, H. Jahankhani, and M. Z. Nkhoma, Management versus security specialists: an empirical study on security related perceptions, Inf. Manag. Comput. Security, vol. 16, no. 2, pp , [12] P. Dourish, E. Grinter, J. Delgado de la Flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem, Personal Ubiquitous Comput., vol. 8, no. 6, pp , [13] A. Adams and M. A. Sasse, Users are not the enemy, Commun. ACM, vol. 42, no. 12, pp , [14] C. LeGrande and A. Hartman, Does application security pay? Mainstay Partners, [15] National small business study, National Cyber Security Alliance, [16] Whitehat security, whitehat website security statistic report, industry benchmarks, [17] D. Firesmith, Engineering security requirements, in Journal of Object Technology, vol. 2, no. 1, pp , 2003.
SD Elements: A Tool for Secure Application Development Management
SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
How to Develop a Research Protocol
How to Develop a Research Protocol Goals & Objectives: To explain the theory of science To explain the theory of research To list the steps involved in developing and conducting a research protocol Outline:
Security Risk Management by Qualitative Vulnerability Analysis
Security Risk Management by Qualitative Vulnerability Analysis Golnaz Elahi University of Toronto [email protected] Eric Yu University of Toronto [email protected] Nicola Zannone Eindhoven University
The use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
CHAPTER III RESEARCH METHODS
CHAPTER III RESEARCH METHODS 3.1. Introduction Advertising management has become a prominent organizational activity in public and private corporate houses in India and abroad. Advertising is practiced
Requirements Engineering Process Models in Practice
AWRE 2002 141 Engineering Process Models in Practice Sacha Martin 1, Aybüke Aurum 1, Ross Jeffery 2, Barbara Paech 3 1 School of Information Systems, Technology and Management, University of New South
Software Engineering Practices in Jordan
Software Engineering Practices in Jordan Nuha El-Khalili Faculty of Information Technology, University of Petra, Amman, Jordan [email protected] Dima Damen Faculty of Information Technology, University
Software Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
The Contextualization of Project Management Practice and Best Practice
The Contextualization of Project Management Practice and Best Practice Claude Besner PhD, University of Quebec at Montreal Brian Hobbs PhD, University of Quebec at Montreal Abstract This research aims
Requirements Engineering Current Practice and Capability in Small and Medium Software Development Enterprises in New Zealand
Requirements Engineering Current Practice and Capability in Small and Medium Software Development Enterprises in New Zealand Alison Talbot Software Engineering Research Lab Auckland University of Technology
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities Golnaz Elahi University of Toronto [email protected]
THE ROLE OF MARKETING IN MULTINATIONAL SUBSIDIARIES: STANDARDIZATION VERSUS LOCALIZATION
THE ROLE OF MARKETING IN MULTINATIONAL SUBSIDIARIES: STANDARDIZATION VERSUS LOCALIZATION Miroslav Karlíãek, Zuzana Chytková, Nikola Hofiej, Hana Mohelská, Jakub Fischer Introduction In the international
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.
Review Protocol Agile Software Development
Review Protocol Agile Software Development Tore Dybå 1. Background The concept of Agile Software Development has sparked a lot of interest in both industry and academia. Advocates of agile methods consider
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Towards Security Risk-oriented Misuse Cases
Towards Security Risk-oriented Misuse Cases Inam Soomro and Naved Ahmed Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia {inam, naved}@ut.ee Abstract. Security has turn
An Enterprise Framework for Evaluating and Improving Software Quality
An Enterprise Framework for Evaluating and Improving Software Quality Abstract Philip Lew [email protected] With the world s economy increasingly driven by software products, there has been a relentless
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
DESIGNING HR ORGANIZATIONAL STRUCTURES IN TERMS OF THE HR BUSINESS PARTNER MODEL PRINCIPLES FROM THE PERSPECTIVE OF CZECH ORGANIZATIONS
DESIGNING HR ORGANIZATIONAL STRUCTURES IN TERMS OF THE HR BUSINESS PARTNER MODEL PRINCIPLES FROM THE PERSPECTIVE OF CZECH ORGANIZATIONS Stříteský, M., Quigley, M. J. D. This paper describes new trends
Characteristics of Computational Intelligence (Quantitative Approach)
Characteristics of Computational Intelligence (Quantitative Approach) Shiva Vafadar, Ahmad Abdollahzadeh Barfourosh Intelligent Systems Lab Computer Engineering and Information Faculty Amirkabir University
Teaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations Golnaz Elahi 1, Eric Yu 2, and Nicola Zannone 3 1 Department of Computer Science, University of Toronto
The Role of Controlled Experiments in Software Engineering Research
The Role of Controlled Experiments in Software Engineering Research Victor R. Basili 1 The Experimental Discipline in Software Engineering Empirical studies play an important role in the evolution of the
The Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
CHAPTER III METHODOLOGY. The purpose of this study was to describe which aspects of course design
CHAPTER III METHODOLOGY The purpose of this study was to describe which aspects of course design and/or instruction are more effective and successful in the online environment than in the face-to-face
Feature. Multiagent Model for System User Access Rights Audit
Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and
Errors in Operational Spreadsheets: A Review of the State of the Art
Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College [email protected] Kenneth R. Baker Tuck School of Business Dartmouth College
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development ARBI GHAZARIAN University of Toronto Department of Computer Science 10 King s College Road, Toronto,
STUDENT THESIS PROPOSAL GUIDELINES
STUDENT THESIS PROPOSAL GUIDELINES Thesis Proposal Students must work closely with their advisor to develop the proposal. Proposal Form The research proposal is expected to be completed during the normal
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
ISO 27001 Gap Analysis - Case Study
ISO 27001 Gap Analysis - Case Study Ibrahim Al-Mayahi, Sa ad P. Mansoor School of Computer Science, Bangor University, Bangor, Gwynedd, UK Abstract This work describes the initial steps taken toward the
Importance of Online Product Reviews from a Consumer s Perspective
Advances in Economics and Business 1(1): 1-5, 2013 DOI: 10.13189/aeb.2013.010101 http://www.hrpub.org Importance of Online Product Reviews from a Consumer s Perspective Georg Lackermair 1,2, Daniel Kailer
Using i for Transformational Creativity in Requirements Engineering
Using i for Transformational Creativity in Requirements Engineering Sushma Rayasam and Nan Niu Department of EECS, University of Cincinnati Cincinnati, OH, USA 45221 [email protected], [email protected]
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities
ACH 1.1 : A Tool for Analyzing Competing Hypotheses Technical Description for Version 1.1
ACH 1.1 : A Tool for Analyzing Competing Hypotheses Technical Description for Version 1.1 By PARC AI 3 Team with Richards Heuer Lance Good, Jeff Shrager, Mark Stefik, Peter Pirolli, & Stuart Card ACH 1.1
Quality Information by Charity Organizations and its Relationship with Donations
Quality Information by Charity Organizations and its Relationship with Donations RUHAYA ATAN 1, SAUNAH ZAINON 2, YAP BEE WAH 3 Faculty of Accountancy 1,2 Faculty of Computer and Mathematical Science 3
UNIT 2: CRITICAL THINKING IN GAME DESIGN
UNIT 2: CRITICAL THINKING IN GAME DESIGN UNIT 2: CRITICAL THINKING IN GAME DESIGN 2.A: Unit Overview 2.B: Instructional Resource Guide 2.C: Learning Activities Guide 2.D: Standards Alignment Guide 2.E:
STRESS TESTING GUIDELINE
STRESS TESTING GUIDELINE JUIN 2012 Table of Contents Preamble... 2 Introduction... 3 Scope... 5 Coming into effect and updating... 6 1. Stress testing... 7 A. Concept... 7 B. Approaches underlying stress
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Rede ning medical students' disease to reduce morbidity
Research papers Rede ning medical students' disease to reduce morbidity Rona Moss-Morris & Keith J Petrie Objectives To gain a clearer conceptual understanding of medical students' disease and its impact
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
A Methodology for Capturing Software Systems Security Requirements
A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security
Requirements Engineering: Elicitation Techniques
2008:PR003 Requirements Engineering: Elicitation Techniques Sai Ganesh. Gunda Source:http://www.marcocioffi.com/archives/2005/04/requirements-engineering/ MASTER S THESIS Software Engineering, 2008 Department
Software Risk Management Practice: Evidence From Thai Software Firms
, March 12-14, 2014, Hong Kong Software Management Practice: Evidence From Thai Software Firms Tharwon Arnuphaptrairong Abstract Software risk management has been around at least since it was introduced
Prediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
Web Applications Development and Software Process Improvement in Small Software Firms: a Review
Web Applications Development and Software Process Improvement in Small Software Firms: a Review Haroon Tarawneh Al-balqa Applied University [email protected] Sattam Allahawiah Al-balqa Applied University
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Performance Management Systems: Conceptual Modeling
2011 International Conference on Economics and Business Information IPEDR vol.9 (2011) (2011) IACSIT Press, Bangkok, Thailand Performance Management Systems: Conceptual Modeling Dmitry Isaev Business Analytics
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective Testimony for the House Committee on Homeland Security s Subcommittee on Emerging Threats, Cybersecurity, and Science
Empirical Software Engineering Introduction & Basic Concepts
Empirical Software Engineering Introduction & Basic Concepts Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems [email protected]
Fourth generation techniques (4GT)
Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some
Key Factors for Developing a Successful E-commerce Website
IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 763461, 9 pages Key Factors for Developing a Successful E-commerce Website
Evaluation of Students' Modeling and Programming Skills
Evaluation of Students' Modeling and Programming Skills Birgit Demuth, Sebastian Götz, Harry Sneed, and Uwe Schmidt Technische Universität Dresden Faculty of Computer Science Abstract. In winter semester
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
9. Data-Collection Tools
9. Data-Collection Tools Depending on the nature of the information to be gathered, different instruments are used to conduct the assessment: forms for gathering data from official sources such as police
Data Quality Assurance
CHAPTER 4 Data Quality Assurance The previous chapters define accurate data. They talk about the importance of data and in particular the importance of accurate data. They describe how complex the topic
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Long term Predictive Ability of Bankruptcy Models in the Czech Republic: Evidence from 2007 2012
Long term Predictive Ability of Bankruptcy Models in the Czech Republic: Evidence from 2007 2012 «Long term Predictive Ability of Bankruptcy Models in the Czech Republic: Evidence from 2007 2012» by Ondřej
User and Client Satisfaction in Agile Development
User and Client Satisfaction in Agile Development Marta Larusdottir 1, Effie Law 2, Åsa Cajander 3 1 School of Computer Science, Reykjavik University, Iceland, Menntavegur 1, 101 Reykjavik 2 Department
DATA ANALYSIS, INTERPRETATION AND PRESENTATION
DATA ANALYSIS, INTERPRETATION AND PRESENTATION OVERVIEW Qualitative and quantitative Simple quantitative analysis Simple qualitative analysis Tools to support data analysis Theoretical frameworks: grounded
An Investigation on Learning of College Students and the Current Application Situation of the Web-based Courses
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.127 An Investigation on Learning
Considering the Cultural Issues of Web Design in Implementing Web-Based E-Commerce for International Customers
Considering the Cultural Issues of Web Design in Implementing Web-Based E-Commerce for International Customers Kyeong. S. Kang The First International Conference on Electronic Business, Faculty of Information
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
Feature. Understanding Software Metric Use
Feature David Henderson is assistant professor of accounting in the College of Business at the University of Mary Washington (Fredericksburg, Virginia, USA). He can be reached at [email protected]. Steven
Competency Frameworks as a foundation for successful Talent Management. part of our We think series
Competency Frameworks as a foundation for successful part of our We think series Contents Contents 2 Introduction 3 If only they solved all of our problems 3 What tools and techniques can we use to help
The Research Competency and Interest of Accountancy Faculty Among State Colleges and Universities in Region III
Rev. Integr. Bus. Econ. Res. Vol 2(1) 51 The Research Competency and Interest of Accountancy Faculty Among State Colleges and Universities in Region III Myrna Q. Mallari Tarlac State University Myrel M.
1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN
1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN 1.1 INTRODUCTION Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In this dynamic
Critical Success Factors of Information Technology Projects
Critical Success Factors of Information Technology Projects Md. Athar Imtiaz, Abduljalil S. Al-Mudhary, Md. Taha Mirhashemi, Roslina Ibrahim Abstract Information Technology (IT) is being used by almost
To Comply Software and IT System Development with Related Laws Abstract. Keywords: 1. PROBLEM STATEMENT
To Comply Software and IT System Development with Related Laws Fatemeh Zarrabi Supervising team: Haris Mouratidis, David Preston, Shareeful Islam School of Computing, Information Technology and Engineering,
Workforce Insights Employee Satisfaction Surveying
Workforce Insights Employee Satisfaction Surveying Overview One significant factor in your call center s success is how happy and satisfied the employees are. Employee satisfaction has an extremely high
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
8 Evaluating Search Engines
8 Evaluating Search Engines Evaluation, Mr. Spock Captain Kirk, Star Trek: e Motion Picture 8.1 Why Evaluate? Evaluation is the key to making progress in building better search engines. It is also essential
MARKETING RESEARCH AND MARKET INTELLIGENCE (MRM711S) FEEDBACK TUTORIAL LETTER SEMESTER `1 OF 2016. Dear Student
MARKETING RESEARCH AND MARKET INTELLIGENCE (MRM711S) FEEDBACK TUTORIAL LETTER SEMESTER `1 OF 2016 Dear Student Assignment 1 has been marked and this serves as feedback on the assignment. I have included
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
