Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2022
Influencing the security prioritisation of an agile software development project
AbstractSoftware security is a complex topic, and for development projects it can be challenging to assess what security is necessary and cost-effective. Agile Software Development (ASD) values self-management. Thus, teams and their Product ...
- research-articleFebruary 2022
Assessing cyber threats for storyless systems
Journal of Information Security and Applications (JISA), Volume 64, Issue Chttps://doi.org/10.1016/j.jisa.2021.103050AbstractA proper assessment of potential cyber threats is vital for security decision-making. This becomes an even more challenging task when dealing with new system designs and industry sectors where there is little or no historical data ...
- research-articleOctober 2021
Study Behavior in Computing Education—A Systematic Literature Review
ACM Transactions on Computing Education (TOCE), Volume 22, Issue 1Article No.: 9, Pages 1–40https://doi.org/10.1145/3469129As the field of computing education grows and matures, it has become essential to unite computing education and higher education research. Educational research has highlighted that how students study is crucial to their learning progress, and study ...
- research-articleOctober 2020
Code Writing vs Code Completion Puzzles: Analyzing Questions in an E-exam
2020 IEEE Frontiers in Education Conference (FIE)Pages 1–9https://doi.org/10.1109/FIE44824.2020.9273919This Research Full Paper investigates the relationship between code writing tasks and other tasks like program comprehension and completion. In the context of exams, it is interesting to know whether auto-gradable comprehension and completion tasks can to ...
- ArticleJune 2020
Breaking the Cyber Kill Chain by Modelling Resource Costs
AbstractTo combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations about the necessary ...
-
- proceedingDecember 2020
ITiCSE-WGR '20: Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education
- Guido Rößling,
- Birgit R. Krogstie,
- Michail Giannakos,
- Guttorm Sindre,
- Andrew Luxton-Reilly,
- Monica Divitini
In these proceedings, we present reports from the Working Groups that worked in the context of the 25th Annual Conference on Innovation & Technology in Computer Science Education (ITiCSE), held virtually at the Norwegian University of Science & ...
- proceedingJune 2020
ITiCSE '20: Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education
We welcome you to the 25th annual conference on Innovation and Technology in Computer Science Education (ITiCSE 2020). ITiCSE 2020 was planned to take place from June 17 to 19 in Trondheim, Norway. However, due to the Covid-19 pandemic a physical ...
- ArticleSeptember 2019
E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?
Digital Transformation for a Sustainable Society in the 21st CenturyPages 585–596https://doi.org/10.1007/978-3-030-29374-1_47AbstractWhile a number of advantages have been discussed on e-learning/e-assessment tools, little research has been reported on programming courses. Today, the different types of questions have been used in exams based on course type, e.g., Text-based ...
- articleJanuary 2018
A Systematic Mapping Study on Requirements Engineering in Software Ecosystems
Journal of Information Technology Research (JITR-IGI), Volume 11, Issue 1Pages 49–69https://doi.org/10.4018/JITR.2018010104Software ecosystems SECOs and open innovation processes have been claimed as a way forward for the software industry. A proper understanding of requirements is as important for SECOs as for more traditional ones. This article presents a mapping study on ...
- research-articleMay 2016
Challenges and strategies for motivating software testing personnel
Information and Software Technology (INST), Volume 73, Issue CPages 1–15https://doi.org/10.1016/j.infsof.2016.01.002ContextSoftware testing is the key to ensuring a successful and reliable software product or service, yet testing is often considered uninteresting work compared to design or coding. As any human-based activity, the outcome of the final software product ...
- research-articleJuly 2015
Extending the UML Statecharts Notation to Model Security Aspects
IEEE Transactions on Software Engineering (ISOF), Volume 41, Issue 7Pages 661–690https://doi.org/10.1109/TSE.2015.2396526Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little ...
- research-articleJune 2015
Investigating security threats in architectural context
Journal of Systems and Software (JSSO), Volume 104, Issue CPages 90–111https://doi.org/10.1016/j.jss.2015.02.040Misuse case maps (MUCM) augment use case maps with misuse case concepts.MUCMs provide integrated views of security issues and software systems architecture.MUCM were evaluated in controlled experiments with complex real-life intrusions.Misuse case maps ...
- research-articleMarch 2014
Comparing attack trees and misuse cases in an industrial setting
Information and Software Technology (INST), Volume 56, Issue 3Pages 294–308https://doi.org/10.1016/j.infsof.2013.10.004The last decade has seen an increasing focus on addressing security already during the earliest stages of system development, such as requirements determination. Attack trees and misuse cases are established techniques for representing security threats ...
- articleJanuary 2014
An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards
International Journal of Information System Modeling and Design (IJISMD-IGI), Volume 5, Issue 1Pages 1–24https://doi.org/10.4018/ijismd.2014010101Requirement defects are more costly to correct the later in the development process they are discovered. The same applies to safety requirements, and defects that remain in the fielded system are then not only costly, but potentially life-threatening. ...
- articleJuly 2012
Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation
International Journal of Information System Modeling and Design (IJISMD-IGI), Volume 3, Issue 3Pages 24–45https://doi.org/10.4018/jismd.2012070102For mobile and multi-channel information systems it is often relevant to model where something is supposed to take place. Traditional business process modeling notations seldom capture location. Examining if there might be any gain in extending ...
- articleApril 2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks
International Journal of Secure Software Engineering (IJSSE-IGI), Volume 3, Issue 2Pages 54–73https://doi.org/10.4018/jsse.2012040103Understanding the social engineering threat is important in requirements engineering for security-critical information systems. Mal-activity diagrams have been proposed as being better than misuse cases for this purpose, but without any empirical ...
- ArticleMarch 2012
Managing implicit requirements using semantic case-based reasoning research preview
REFSQ'12: Proceedings of the 18th international conference on Requirements Engineering: foundation for software qualityPages 172–178https://doi.org/10.1007/978-3-642-28714-5_15[Context and motivation] Implicit requirements (ImRs) are defined as requirements of a system which are not explicitly expressed during requirements elicitation, often because they are considered so basic that developers should already know them. Many ...
- ArticleMarch 2012
Aligning mal-activity diagrams and security risk management for security requirements definitions
REFSQ'12: Proceedings of the 18th international conference on Requirements Engineering: foundation for software qualityPages 132–139https://doi.org/10.1007/978-3-642-28714-5_11[Context and motivation] Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process. There are several languages for security modelling that help dealing with ...
- research-articleNovember 2011
Using a multi-criteria decision making approach to evaluate format migration solutions
MEDES '11: Proceedings of the International Conference on Management of Emergent Digital EcoSystemsPages 48–52https://doi.org/10.1145/2077489.2077498Migration is a strategy used in preservation systems to make digital objects survive from the continuing evolution of technology. However, it is difficult for custodians to decide an objective migration solution, as heterogeneous data, many system ...
- ArticleAugust 2011
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations
ARES '11: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and SecurityPages 507–514https://doi.org/10.1109/ARES.2011.77The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements ...