5,605 research outputs found
Product risk assessment: a Bayesian network approach
Product risk assessment is the overall process of determining whether a product, which could be anything from a type of washing machine to a type of teddy bear, is judged safe for consumers to use. There are several methods used for product risk assessment, including RAPEX, which is the primary method used by regulators in the UK and EU. However, despite its widespread use, we identify several limitations of RAPEX including a limited approach to handling uncertainty and the inability to incorporate causal explanations for using and interpreting test data. In contrast, Bayesian Networks (BNs) are a rigorous, normative method for modelling uncertainty and causality which are already used for risk assessment in domains such as medicine and finance, as well as critical systems generally. This article proposes a BN model that provides an improved systematic method for product risk assessment that resolves the identified limitations with RAPEX. We use our proposed method to demonstrate risk assessments for a teddy bear and a new uncertified kettle for which there is no testing data and the number of product instances is unknown. We show that, while we can replicate the results of the RAPEX method, the BN approach is more powerful and flexible
Towards operational measures of computer security
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of âthe ability of the system to resist attackâ. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit âmore secure behaviourâ in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of âoperational securityâ similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf rate of occurrence of failures in reliability), or the probability that a specified âmissionâ can be accomplished without a security breach (cf reliability function). This new approach is based on the analogy between system failure and security breach. A number of other analogies to support this view are introduced. We examine this duality critically, and have identified a number of important open questions that need to be answered before this quantitative approach can be taken further. The work described here is therefore somewhat tentative, and one of our major intentions is to invite discussion about the plausibility and feasibility of this new approach
Recommended from our members
Bayesian belief network model for the safety assessment of nuclear computer-based systems
The formalism of Bayesian Belief Networks (BBNs) is being increasingly applied to probabilistic modelling and decision problems in a widening variety of fields. This method provides the advantages of a formal probabilistic model, presented in an easily assimilated visual form, together with the ready availability of efficient computational methods and tools for exploring model consequences. Here we formulate one BBN model of a part of the safety assessment task for computer and software based nuclear systems important to safety. Our model is developed from the perspective of an independent safety assessor who is presented with the task of evaluating evidence from disparate sources: the requirement specification and verification documentation of the system licensee and of the system manufacturer; the previous reputation of the various participants in the design process; knowledge of commercial pressures;information about tools and resources used; and many other sources. Based on these multiple sources of evidence, the independent assessor is ultimately obliged to make a decision as to whether or not the system should be licensed for operation within a particular nuclear plant environment. Our BBN model is a contribution towards a formal model of this decision problem. We restrict attention to a part of this problem: the safety analysis of the Computer System Specification documentation. As with other BBN applications we see this modelling activity as having several potential benefits. It employs a rigorous formalism as a focus for examination, discussion, and criticism of arguments about safety. It obliges the modeller to be very explicit about assumptions concerning probabilistic dependencies, correlations, and causal relationships. It allows sensitivity analyses to be carried out. Ultimately we envisage this BBN, or some later development of it, forming part of a larger model, which might well take the form of a larger BBN model, covering all sources of evidence about pre-operational life-cycle stages. This could provide an integrated model of all aspects of the task of the independent assessor, leading up to the final judgement about system safety in a particular context. We expect to offer some results of this further work later in the DeVa project
Risk assessment and risk management of violent reoffending among prisoners
âThe final publication is available at Springer via http://dx.doi.org/10.1016/j.eswa.2015.05.025â
The Cataclysmic Variable CW 1045+525: A Secondary-Dominated Dwarf Nova?
We present spectroscopic and photometric observations of the cataclysmic variable CW 1045+525. Both the optical spectrum and the photometric lightcurve show a strong contribution of a K5VâM0V secondary. We derive an orbital period Porb = 0.271278(1) d by measuring the radial velocities of the absorption lines of the secondary. The period and spectral type of the secondary suggest a distance of 350â700 pc. There is evidence for additional sources of line- and continuum emission, but no direct evidence of an accretion disc. We discuss several scenarios for the nature of CW 1045+525 on the basis of our results, finding a dwarf nova classification to be the most probable, although not completely satisfying, explanation for the observed characteristics
Cardiac cell modelling: Observations from the heart of the cardiac physiome project
In this manuscript we review the state of cardiac cell modelling in the context of international initiatives such as the IUPS Physiome and Virtual Physiological Human Projects, which aim to integrate computational models across scales and physics. In particular we focus on the relationship between experimental data and model parameterisation across a range of model types and cellular physiological systems. Finally, in the context of parameter identification and model reuse within the Cardiac Physiome, we suggest some future priority areas for this field
Educational aspirations in inner city schools
The research aimed to assess the nature and level of pupilsâ educational aspirations and to elucidate the factors that influence these aspirations. A sample of five inner city comprehensive secondary schools were selected by their Local Authority because of poor pupil attendance, below average examination results and low rates of continuing in full-time education after the age of 16. Schools were all ethnically mixed and co-educational. Over 800 pupils aged 12-14 completed a questionnaire assessing pupilsâ experience of home, school and their peers. A sub-sample of 48 pupils selected by teachers to reflect ethnicity and ability levels in individual schools also participated in detailed focus group interviews. There were no significant differences in aspirations by gender or year group, but differences between ethnic groups were marked. Black African, Asian Other and Pakistani groups had significantly higher educational aspirations than the White British group, who had the lowest aspirations. The results suggest the high aspirations of Black African, Asian Other and Pakistani pupils are mediated through strong academic self-concept, positive peer support, a commitment to schooling and high educational aspirations in the home. They also suggest that low educational aspirations may have different mediating influences in different ethnic groups. The low aspirations of White British pupils seem to relate most strongly to poor academic self-concept and low educational aspirations in the home, while for Black Caribbean pupils disaffection, negative peers and low commitment to schooling appear more relevant. Interviews with pupils corroborated the above findings and further illuminated the factors students described as important in their educational aspirations. The results are discussed in relation to theories of aspiration which stress its nature as a cultural capacity
A framework for the simulation of structural software evolution
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2008 ACM.As functionality is added to an aging piece of software, its original design and structure will tend to erode. This can lead to high coupling, low cohesion and other undesirable effects associated with spaghetti architectures. The underlying forces that cause such degradation have been the subject of much research. However, progress in this field is slow, as its complexity makes it difficult to isolate the causal flows leading to these effects. This is further complicated by the difficulty of generating enough empirical data, in sufficient quantity, and attributing such data to specific points in the causal chain. This article describes a framework for simulating the structural evolution of software. A complete simulation model is built by incrementally adding modules to the framework, each of which contributes an individual evolutionary effect. These effects are then combined to form a multifaceted simulation that evolves a fictitious code base in a manner approximating real-world behavior. We describe the underlying principles and structures of our framework from a theoretical and user perspective; a validation of a simple set of evolutionary parameters is then provided and three empirical software studies generated from open-source software (OSS) are used to support claims and generated results. The research illustrates how simulation can be used to investigate a complex and under-researched area of the development cycle. It also shows the value of incorporating certain human traits into a simulationâfactors that, in real-world system development, can significantly influence evolutionary structures
- âŠ