13 research outputs found

    Software Architecture Risk Containers

    Get PDF
    Our motivation is to determine whether risks such as im- plementation error-proneness can be isolated into three types of con- tainers at design time. This paper identifies several container candidates in other research that fit the risk container concept. Two industrial case studies were used to determine which of three container types tested is most effective at isolating and predicting at design time the risk of im- plementation error-proneness. We found that Design Rule Containers were more effective than Use Case and Resource Containers

    E-commerce development risk evaluation using MCDM techniques

    Full text link
    © Springer International Publishing Switzerland 2016. Electronic commerce (EC) development takes place in a complex and dynamic environment that includes high levels of risk and uncertainty. This paper proposes a new method for assessing the risks associated with EC development using multi-criteria decision-making techniques A model based on the analytic hierarchy process (AHP) and the technique for order of preference by similarity to ideal solution (TOPSIS) is proposed to assist EC project managers and decision makers in formalizing the types of thinking that are required in assessing the current risk environment of their EC development in a more systematic manner than previously. The solution includes the use of AHP for analyzing the problem structure and determining the weights of risk factors. The TOPSIS technique helps to obtain a final ranking among projects, and the results of an evaluation show the usefulness performance of the method

    Fusing Quantitative Requirements Analysis with Model-based Systems Engineering

    Get PDF
    A vision is presented for fusing quantitative requirements analysis with model-based systems engineering. This vision draws upon and combines emergent themes in the engineering milieu. “Requirements engineering” provides means to explicitly represent requirements (both functional and non-functional) as constraints and preferences on acceptable solutions, and emphasizes early-lifecycle review, analysis and verification of design and development plans. “Design by shopping” emphasizes revealing the space of options available from which to choose (without presuming that all selection criteria have previously been elicited), and provides means to make understandable the range of choices and their ramifications. “Model-based engineering” emphasizes the goal of utilizing a formal representation of all aspects of system design, from development through operations, and provides powerful tool suites that support the practical application of these principles. A first step prototype towards this vision is described, embodying the key capabilities. Illustrations, implications, further challenges and opportunities are outlined

    A Model-Based Soft Errors Risks Minimization Approach

    Get PDF
    Minimizing the risk of system failure in any computer structure requires identifying those components whose failure is likely to impact on system functionality. Clearly, the degree of protection or prevention required against faults is not the same for all components. Tolerating soft errors can be much improved if critical components can be identified at an early design phase and measures are taken to lower their criticalities at that stage. This improvement is achieved by presenting a criticality ranking (among the components) formed by combining a prediction of faults, consequences of them, and a propagation of errors at the system modeling phase; and pointing out ways to apply changes in the model to minimize the risk of degradation of desired functionalities. Case study results are given to validate the approach

    A Novel Approach to Minimizing the Risks of Soft Errors in Mobile and Ubiquitous Systems

    Get PDF
    A novel approach to minimizing the risks of soft errors at modelling level of mobile and ubiquitous systems is outlined. From a pure dependability viewpoint, critical components, whose failure is likely to impact on system functionality, attract more attention of protection/prevention mechanisms (against soft errors) than others do. Tolerating soft errors can be much improved if critical components can be identified at an early design phase and measures are taken to lower their criticalities at that stage. This improvement is achieved by presenting a criticality ranking (among the components) formed by combining a prediction of soft errors, consequences of them, and a propagation of failures at system modelling phase; and pointing out the ways to apply changes in the model to minimize the risks of degradation of desired functionalities. Case study results are given to illustrate and validate the approach

    The Inadaptability of Government Projects to High Risk: Causes and Implications

    Get PDF
    Enhanced planning can effectively mitigate high levels of project risk. However, this approach requires organizations to be adaptable in their planning practices to the project in hand. This article investigates whether government organizations are adaptable in their planning to the level of risk projects and programs introduce. For this purpose, this research studied planning in 992 government and private projects. Results show that planning in government is ineffective (i.e., it does not lead to enhanced project performance) because managers invest a similar level of effort in planning regardless of the risk level. In particular, when risk levels increase, government projects invest less (rather than more) effort in resource, budget, human resources, and procurement planning. This article contributes to the risk-planning-performance theory and supports government managers making better planning and resource allocation decisions

    Modeling an Adaptive System with Complex Queuing Networks and Simulation

    Get PDF
    An adaptive system differs from a non-adaptive system in that an adaptive system uses a specific process to identify and implement adaptations to system parameters during run time in an effort to increase system performance.;In order to develop an adaptive system one of the most important aspects is the ability to accurately predict and manage system behavior. If an unexpected event has occurred, accurate prediction of system behavior is needed in order to determine whether or not the system is able to continually meet expectations and/or requirements. When considering any possible adaptations to the system, one must be able to accurately predict their consequences as well.;In a feedback loop of an adaptive system performance analysis and prediction performance analysis and prediction may lead to a large number of different states. Therefore, the method of analyzing the system must be fast. For complex systems, however, the most popular method for predicting performance is simulation. Simulations, depending on the size of the system, are known for being slow.;In this thesis we develop a fast method for prediction of performance of a complex system. We use this method to allocate resources to the system initially, and then make decisions for system adaptation during runtime. Finally we test various modifications to the system in order to measure the robustness of our method

    Risk analysis in biometric-based Border Inspection System

    Get PDF
    The main goal of a Border Inspection System is to prevent the entry of individuals who pose a threat to a country. The entry of just one of these persons could have severe consequences. Nevertheless, performing a lengthy border inspection is not possible, given that 240,737 international passengers enter the country in an average day [5]. For this reason, the primary inspection is performed using biometrics traits and information flow processes that have a low false acceptance rate and have a high throughput.;This thesis uses the analytic modeling tool called LQNS (Layered Queueing Network Solver) to solve open models for biometric-based border inspection system and cost curves to evaluate the risk. The contributions of the thesis include a performance model of a biometric-based border inspection using open workloads and a risk model of a biometric-based border inspection using cost curves. Further, we propose an original methodology for analyzing a combination of performance risk and security risk in the border inspection system

    Risk Analysis at Design Level using UML Behavioral Diagrams

    Get PDF
    The Risk analysis process recognizes the different type of hazards that can occur and recommend control measures that are frequently used for that hazard. Risk is a measure of the probability and severity of undesired effects. Accomplishment of risk analysis in the early development phases improves resource sharing decisions. This method will aid to find the high-risk components and connectors of the system architecture, so that corrective actions may be implemented to control and improve the development process as well as the quality of the system. We propose a technique for risk analysis at design level using UML behavioral diagrams. We have used state chart and sequence diagram to find the risk factor of components and connectors involved in the system. Next, we have calculated the risk factor of each scenario of a use case and combined them to obtain the overall risk factor of the targeted system. We have used concurrent control flow graph to evaluate the scenario level risk factor which takes into consideration the concurrent execution of threads. Along with this interaction overview diagram is used to estimate the overall system level risk factor. In our approach, we have also done the sensitivity analysis to find the critical components and connectors with respect to each scenario and also in overall system level. So we can give careful analysis, design, implementation and testing effort to these components and connectors

    Dealing with unpredictable risk - The influence of external factors on information systems development and implementations

    No full text
    Organisations and especially Government departments develop information systems for their own specific needs, due to this Government departments invests a great deal in information systems development and implementation projects. The intention is to save on cost and develop information systems according to their needs and requirements. Unfortunately such projects are vulnerable and subject to a range of risks. This case study identifies the risk factors involved in information systems development and implementation projects and the risk processes that are in place to mitigate against those risk factors. Furthermore the case study investigates an information systems development and implementation project where four legacy systems were to be merged into one newly developed system. The project was interrupted when an organisational merger resulted in the loss of key members of the governance board and the project team, either through redundancy or being allocated other responsibilities within the organisation. This exposed the project to unpredictable risk which caused the project to head down the path of possible failure. The case study outlines the project plan, what actually happened and what according to the interviewed participants happened during the project. It is clear that the risk management processes wasn't followed and that wrongful decisions were made during the organisational merger. Unpredictable risks as a result of the merger and the decision to continue the project required a strong governance board, proper project management, proper risk management and the execution of the risk management processes. The lack of governance and project management had a huge impact on the project while the loss of expertise and knowledge added to the risk profile which resulted in further complications to the project. It’s during these situation that a strong governance board and proper project management is needed to make those critical decisions and steer the project towards success
    corecore