246 research outputs found
Automated goal operationalisation based on interpolation and SAT solving
Goal oriented methods have been successfully employed for eliciting and elaborating software requirements. When goals are assigned to an agent, they have to be operationalised: the agentâs operations have to be refined, by equipping them with appropriate enabling and triggering conditions, so that the goals are fulfilled. Goal operationalisation generally demands a significant effort of the engineer. Although there exist approaches that tackle this problem, they are either in-formal or at most semi automated, requiring the engineer to assist in the process. In this paper, we present an approach for goal operationalisation that automatically computes required preconditions and required triggering conditions for operations, so that the resulting operations establish the goals. The process is iterative, is able to deal with safety goals and particular kinds of liveness goals, and is based on the use of interpolation and SAT solving
Finding and Resolving Security Misusability with Misusability Cases
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems
Annotation management: a Group decision support system for nurses tasks
International audienceWe develop a 5-year empirical investigation that is giving us broad and deep insights to characterise activity management in the palliative ward of an oncology hospital, and offer effective support for group decision-making and collaborative activity of caregivers. Following this observation period, we propose a software prototype based upon annotations in which dealing with patientsâ state and evolution is a complex organisational task. We based our conception of an annotation tool on the observations of the rich writing practices of medical professionals. We rely on the innovative strategy of intermediate management to introduce a new technology able to bridge heterogeneous, valuable data flows that addresses both management support and activity support in a single tool
A wide-spectrum approach to modelling and analysis of organisation for machine-assisted decision-making
This paper describes a modeling approach that helps to represent necessary aspects of complex socio-technical systems, such as organization, in an integrated form and provides a simulation technique for analyzing these organisations. An actor-based language is introduced and compared to a conventional simulation approach (Stock-and-Flow) by simulating aspects of a software services company
Human-centered specification exemplars for critical infrastructure environments.
Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities, as well as technology. This paper presents human-centered specification exemplars that capture the nuances associated with interactions between people, technology, and critical infrastructure environments. We describe requirements each exemplar needs to satisfy, and present preliminary results in developing and evaluating them
Software security requirements engineering: State of the art
Software Engineering has established techniques, methods and technology over two decades. However, due to the lack of understanding of software security vulnerabilities, we have not been so successful in applying software engineering principles that have been established for the past at least 25 years, when developing secure software systems. Therefore, software security can not be just added after a system has been built and delivered to customers as seen in todayâs software applications. This keynote paper provides concise methods, techniques, and best practice requirements guidelines on software security and also discusses an Integrated-Secure SDLC model (IS-SDLC), which will benefit practitioners, researchers, learners, and educators
Timing of Coronavirus Disease 2019 (COVID-19) Vaccination and Effects on Menstrual Cycle Changes
Objective: To assess whether menstrual cycle timing (follicular or luteal phase) of coronavirus disease 2019 (COVID-19) vaccine administration is associated with cycle length changes.Methods: We used prospectively collected (2021-2022) menstrual cycle tracking data from 19,497 reproductive-aged users of the application "Natural Cycles." We identified whether vaccine was delivered in the follicular or luteal phase and also included an unvaccinated control group. Our primary outcome was the adjusted within-individual change in cycle length (in days) from the average of the three menstrual cycles before the first vaccination cycle (individuals in the unvaccinated control group were assigned a notional vaccine date). We also assessed cycle length changes in the second vaccination cycle and whether a clinically significant change in cycle length (8 days or more) occurred in either cycle.Results: Most individuals were younger than age 35 years (80.1%) and from North America (28.6%), continental Europe (33.5%), or the United Kingdom (31.7%). In the vaccinated group, the majority received an mRNA vaccine (63.8% of the full sample). Individuals vaccinated in the follicular phase experienced an average 1-day longer adjusted cycle length with a first or second dose of COVID-19 vaccine compared with their prevaccination average (first dose: 1.00 day [98.75% CI, 0.88-1.13], second dose: 1.11 days [98.75% CI, 0.93-1.29]); those vaccinated in the luteal phase and those in the unvaccinated control group experienced no change in cycle length (respectively, first dose: -0.09 days [98.75% CI, -0.26 to 0.07], second dose: 0.06 days [98.75% CI, -0.16 to 0.29], unvaccinated notional first dose: 0.08 days [98.75% CI, -0.10 to 0.27], second dose: 0.17 days [98.75% CI, -0.04 to 0.38]). Those vaccinated during the follicular phase were also more likely to experience a clinically significant change in cycle length (8 days or more; first dose: 6.8%) than those vaccinated in the luteal phase or unvaccinated (3.3% and 5.0%, respectively; P <.001).Conclusion: COVID-19 vaccine-related cycle length increases are associated with receipt of vaccination in the first half of the menstrual cycle (follicular phase)
From social machines to social protocols:Software engineering foundations for sociotechnical systems
The overarching vision of social machines is to facilitate social processes by having computers provide administrative support. We conceive of a social machine as a sociotechnical system (STS): a software-supported system in which autonomous principals such as humans and organizations interact to exchange information and services. Existing approaches for social machines emphasize the technical aspects and inadequately support the meanings of social processes, leaving them informally realized in human interactions. We posit that a fundamental rethinking is needed to incorporate accountability, essential for addressing the openness of the Web and the autonomy of its principals. We introduce Interaction-Oriented Software Engineering (IOSE) as a paradigm expressly suited to capturing the social basis of STSs. Motivated by promoting openness and autonomy, IOSE focuses not on implementation but on social protocols, specifying how social relationships, characterizing the accountability of the concerned parties, progress as they interact. Motivated by providing computational support, IOSE adopts the accountability representation to capture the meaning of a social machineâs states and transitions. We demonstrate IOSE via examples drawn from healthcare. We reinterpret the classical software engineering (SE) principles for the STS setting and show how IOSE is better suited than traditional software engineering for supporting social processes. The contribution of this paper is a new paradigm for STSs, evaluated via conceptual analysis
Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development
Security is a major target for todayâs information systems (IS) designers. Security modelling languages exist to reason on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analysing risk, and effectively communicating risk-related information. However, we think that current languages can be improved in this respect. In this paper, we discuss this issue for Secure Tropos, the language supporting the eponymous agent-based IS development. We analyse it and suggest improvements in the light of an existing reference model for IS security risk management. This allows for checking Secure Tropos concepts and terminology against those of current risk management standards, thereby improving the conceptual appropriateness of the language. The paper follows a running example, called eSAP, located in the healthcare domain
Identifying Implicit Vulnerabilities through Personas as Goal Models
When used in requirements processes and tools, personas
have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however,
this potential is unfulfilled as personas and system goals are captured
with different mindsets, by different teams, and for different purposes. If
personas are visualised as goal models, it may be easier for stakeholders
to see implications of their goals being satisfied or denied, and designers
to incorporate the creation and analysis of such models into the broader
RE tool-chain. This paper outlines a tool-supported approach for finding
implicit vulnerabilities from user and system goals by reframing personas
as social goal models. We illustrate this approach with a case study where
previously hidden vulnerabilities based on human behaviour were identified
- âŠ