A systematic literature review of applications of the physics of notations

D Van Der Linden, I Hadar - IEEE Transactions on Software …, 2018 - ieeexplore.ieee.org
INTRODUCTION: The Physics of Notations (PoN) is a theory for the design of cognitively
effective visual notations, emphasizing the need for design grounded in objective and …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

An extension of business process model and notation for security risk management

O Altuhhov, R Matulevičius, N Ahmed - … , Methodologies, Tools, and …, 2015 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …

Conceptual integration of enterprise architecture management and security risk management

E Grandry, C Feltus, E Dubois - 2013 17th IEEE International …, 2013 - ieeexplore.ieee.org
Enterprise Architecture Management (EAM) is considered to provide the mechanism for,
amongst others, governing enterprise transformations required by changes in the …

Securing business processes using security risk-oriented patterns

N Ahmed, R Matulevičius - Computer Standards & Interfaces, 2014 - Elsevier
Business process modelling and security engineering are two important concerns when
developing information system. However current practices report that security is addressed …

Medical device standards' requirements for traceability during the software development lifecycle and implementation of a traceability assessment model

G Regan, F Mc Caffery, K Mc Daid, D Flood - Computer Standards & …, 2013 - Elsevier
Developing safety critical software is a complex process. Due to the fact that medical device
software failure can lead to catastrophic consequences, numerous standards have been …

Components of a multi-perspective modeling method for designing and managing IT security systems

A Goldstein, U Frank - Information Systems and e-Business Management, 2016 - Springer
Abstract Information technology (IT) security design and management are a major concern
and substantial challenge for IT management. Today's highly complex business and …

Automatic academic advisor

K Taha - 8th International Conference on Collaborative …, 2012 - ieeexplore.ieee.org
One of the problems that face a Distance Education academic advisor (and for lesser degree
local academic advisors) is to identify courses that best suit a student's interests and …

Towards security risk-oriented misuse cases

I Soomro, N Ahmed - … : BPM 2012 International Workshops, Tallinn, Estonia …, 2013 - Springer
Security has turn out to be a necessity of information systems (ISs) and information per se.
Nevertheless, existing practices report on numerous cases when security aspects were …

Multi-objective risk analysis with goal models

FB Aydemir, P Giorgini… - 2016 IEEE Tenth …, 2016 - ieeexplore.ieee.org
Risks of software projects are often ignored and risk analysis is left for later stages of project
life-cycle, resulting in serious financial losses. This paper proposes a goal-oriented risk …