Abstract:Part 7: Managing Risks and ThreatsInternational audienceThe Requirements Engineering (RE) community recognizes the importance of trust proposing several approaches to model and analyze trust requirements. However, such approaches mainly focus on trust as social relations without relating them to the requirements of the system’s components. We propose a belief-based trust approach based on an extended version of Secure Tropos, where social relations are modeled and analyzed along with beliefs concerning capabil… Show more
“…Finally, the language adopts the notion of trust and distrust to capture the actors' expectations of one another concerning their delegated entitlements and authorities [27]. For example, the investor distrusts Best trading for achieving the goal G2.2.…”
Many business processes (BPs) involving critical decision-making activities require good quality information for their successful enactment. Despite this fact, existing BP approaches focus on control-flow and ignore the complementary information perspective, or simply treat it as a technical issue, rather than a social and organizational one. To tackle this problem, we propose a comprehensive framework for modeling and analyzing information quality requirements for business processes using the WFA-net BP modeling language. In addition, we describe a prototype implementation, and present two realistic examples concerning the stock market domain, intended to illustrate our approach.
“…Finally, the language adopts the notion of trust and distrust to capture the actors' expectations of one another concerning their delegated entitlements and authorities [27]. For example, the investor distrusts Best trading for achieving the goal G2.2.…”
Many business processes (BPs) involving critical decision-making activities require good quality information for their successful enactment. Despite this fact, existing BP approaches focus on control-flow and ignore the complementary information perspective, or simply treat it as a technical issue, rather than a social and organizational one. To tackle this problem, we propose a comprehensive framework for modeling and analyzing information quality requirements for business processes using the WFA-net BP modeling language. In addition, we describe a prototype implementation, and present two realistic examples concerning the stock market domain, intended to illustrate our approach.
“…Entities social trust: the need for trust arises when actors depend on one another for goals or permissions since such dependencies might entail risk [18]. Trust has a type that can be either: (1) Trust means the trustor expects that the trustee will behave as expected considering the trustum (e.g., a trustee will not misuse the trustum), and (2) Distrust means the trustor expects that the trustee may not behave as expected considering the trustum.…”
In their daily practice, most enterprises collect, store, and manage personal information for customers in order to deliver their services. In such a setting, privacy has emerged as a key concern as companies often neglect or even misuse personal data. In response to this, governments around the world have enacted laws and regulations for privacy protection. These laws dictate privacy requirements for any system that acquires and manages personal data. Unfortunately, these requirements are often incomplete and/or inaccurate as many RE practitioners might be unsure of what exactly are privacy requirements and how are they different from other requirements, such as security. To tackle this problem, we developed a comprehensive ontology for privacy requirements. To make it comprehensive, we base our ontology on a systematic review of the literature on privacy requirements. The contributions of this work include the derivation of an ontology from a previously conducted systematic literature review, an implementation using an ontology definition tool (Protégé), a demonstration of its coverage through an extensive example on Ambient Assisted Living, and a validation through a competence questionnaire answered by lexical semantics experts as well as privacy and security researchers.
“…The references to the selected papers in SLR are shown in sequence. 14,15,17,18,19,32,36,39,42,45,51,73 Process 20,21,23,25,28,30,31,61,62,63,64,69,70,84,79,94 19,22,25,27,35,36,38,39,49,55,60,66,73,74,75 5,6,11,19,21,22,24,27,…”
Section: Springermentioning
confidence: 99%
“…Only Nodes 1,8,10,11,12,16,24,30,33,37,41,44,64,54,60,61,62,63,68,72,75,77,79,80,84,85,86,91,93 and 95 Only Links 5,13,14,15,17,21,34,35,36,38,39,54 and 96 Nodes and Links 2,3,6,7,9,18,19,20,22,23,25,26,…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.